You are on page 1of 7



$1$/,6,6'$1'(6$,1.($0$1$1


-$5,1*$1.20387(5'(1*$10(72'(
NETWORK DEVELOPMENT LIFE CYCLE
678',.$68681,9(56,7$67(/.20


5DPDGKDQ7UL\DQWR3UDERZR0RFKDPDG7HJXK.XUQLDZDQ

3URJUDP6WXGL6LVWHP,QIRUPDVL)DNXOWDV5HND\DVD,QGXVWUL7HONRP8QLYHUVLW\
UDPDGKDQWUL\DQWRSUDERZR#JPDLOFRPXMDQJWHJRHK#JPDLOFRP

 

$EVWUDN².HDPDQDQ MDULQJDQ NRPSXWHU PHUXSDNDQ KDO \DQJ EHULVLsocial security numbersDODPDWWUDQVNULSQLODLDVUDPD
WLGDNWHUSLVDKNDQGDODPMDULQJDQNRPSXWHU.HDPDQDQMDULQJDQ GDQEDQWXDQNHXDQJDQPLOLNPDKDVLVZDPHQJDODPLSHUHWDVDQ
NRPSXWHU\DQJWLGDNGLUDQFDQJGHQJDQEDLNGDSDWPHQ\HEDENDQ VHKLQJJD GDWDGDWD WHUVHEXW GDSDW GLDNVHV ROHK \DQJ WLGDN
NHERFRUDQGDWD SHODQJJDUDQ SULYDVLKLQJJDNHUXJLDQILQDQVLDO EHUKDN >@ $SDELOD GDWDGDWD WHUVHEXW GLVDODKJXQDNDQ PDND
2OHK NDUHQD LWX GLEXWXKNDQ UDQFDQJDQ NHDPDQDQ MDULQJDQ
NRPSXWHU \DQJ GDSDW PHPHQXKL NHEXWXKDQ GDUL SHQJJXQD
DNDQ PHQLPEXONDQ NHUXJLDQ EDJL PDKDVLVZD 8QLYHUVLW\ RI
OD\DQDQ MDULQJDQ NRPSXWHU 3HQHOLWLDQ LQL EHUWXMXDQ XQWXN 1HEUDVND %HUGDVDUNDQ FRQWRK WHUVHEXW NHDPDQDQ WHNQRORJL
PHQGHVDLQNHDPDQDQMDULQJDQNRPSXWHUGHQJDQRE\HNSHQHOLWLDQ LQIRUPDVLXQWXNVHEXDKXQLYHUVLWDVKDUXVPXODLGLSHUKDWLNDQ
DGDODK 8QLYHUVLWDV 7HONRP GHQJDQ PHQJJXQDNDQ 1'/& +DVLO 
GHVDLQ NHDPDQDQ MDULQJDQ NRPSXWHU PHQMDGL XVXODQ XQWXN ,, 0(72'(3(1(/,7,$1
SHQJHPEDQJDQ NHDPDQDQ MDULQJDQ NRPSXWHU SDGD XQLYHUVLWDV 
WHUVHEXW +DVLO GDQ GHVDLQ NHPDQDQ MDULQJDQ NRPSXWHU GL 1HWZRUN 'HYHORSPHQW /LIH &\FOH 1'/&  PHUXSDNDQ
8QLYHUVLWDV 7HONRP GLSHUOXNDQ DGDQ\D ,'36 XQWXN PHQGHWHNVL VXDWX PHWRGH \DQJ GLJXQDNDQ GDODP PHQJHPEDQJNDQ DWDX
DGDQ\D VHUDQJDQ NDUHQD SDGD NRQGLVL existing WLGDN GDSDW PHUDQFDQJ MDULQJDQ LQIUDVWUXNWXU \DQJ PHPXQJNLQNDQ
WHUGHWHNVL

WHUMDGLQ\DSHPDQWDXDQMDULQJDQXQWXNPHQJHWDKXLVWDWLVWLNGDQ
.DWDNXQFL8QLYHUVLWDV7HONRP.HDPDQDQ1'/& NLQHUMD MDULQJDQ >@ 0HWRGH LQL EHUVLIDW continuous
 improvement GLPDQD KDVLO GDUL DQDOLVLV DNDQ WHUXV GLMDGLNDQ
, 3(1'$+8/8$1 VHEDJDLEDKDQSHUWLPEDQJDQXQWXNPHODNXNDQSHUEDLNDQWHUXV
 PHQHUXV
3DGD HUD JOREDOLVDVL VHNDUDQJ NHDPDQDQ WHNQRORJL
LQIRUPDVL PHPLOLNL SHUDQ \DQJ SHQWLQJ EDJL SHUXVDKDDQ EDLN
\DQJ EHUJHUDN GL ELGDQJ EDUDQJ PDXSXQ MDVD .HDPDQDQ
WHNQRORJLLQIRUPDVLGLDQJJDSSHQWLQJNDUHQDGDSDWPHQFHJDK
SHUXVDKDDQPHQJDODPLNHUXJLDQEDLNILQDQVLDOPDXSXQKXNXP
6DODK VDWX IXQJVL NHDPDQDQ WHNQRORJL LQIRUPDVL DGDODK
PHQMDJD GDWD \DQJ EHUVLIDW UDKDVLD -LND GDWD \DQJ EHUVLIDW
UDKDVLDLQLGLGDSDWNDQGDQGLXEDKROHKSLKDN\DQJWLGDNEHUKDN
PDND DNDQ PHQLPEXONDQ NHUXJLDQ GDODP KDO PDWHUL PDXSXQ
NHERFRUDQLQIRUPDVLSULEDGL
8QLYHUVLWDV DGDODK SHUJXUXDQ WLQJJL \DQJ WHUGLUL GDUL 

VHMXPODK IDNXOWDV \DQJ PHQ\HOHQJJDUDNDQ SHQGLGLNDQ LOPLDK *DPEDU8UXWDQPHWRGH1'/&
DWDX SURIHVLRQDO GDODP VHMXPODK GLVLSOLQ LOPX WHUWHQWX >@ 
'DODP PHQ\HOHQJJDUDNDQ SURVHV ELVQLVQ\D XQLYHUVLWDV 'DUL*DPEDUGDSDWGLOLKDWDGDQ\DSHUEDLNDQ\DQJGLODNXNDQ
PHPEXWXKNDQWHNQRORJLLQIRUPDVLXQWXNPHQ\LPSDQEHUEDJDL WHUXVPHQHUXVGDULSHUDQFDQJDQVLPXODVLLPSOHPHQWDVLmonitoring
GDWD VHSHUWL GDWD SULEDGL PDKDVLVZD QLODLQLODL PDKDVLVZD VDPSDLNHDQDOLVLVGDQVHWHUXVQ\D
EDKNDQGDWDGDWDUDKDVLDVHSHUWLQRPRULGHQWLWDVSHQGXGXNGDQ 
QRPRU UHNHQLQJ -LND GDWDGDWD SULEDGL GDQ UDKDVLD WHUVHEXW ,,, +$6,/'$13(0%$+$6$1
EHUKDVLOGLGDSDWNDQGDQGLXEDKROHK\DQJWLGDNEHUKDNPDND 
DNDQ PHQLPEXONDQ NHUXJLDQ EDLN GDUL SLKDN XQLYHUVLWDV 3HUDQFDQJDQ NHDPDQDQ data center PHQJDFX SDGD
PDXSXQ SLKDNSLKDN \DQJ WHUNDLW GHQJDQ XQLYHUVLWDV VHSHUWL NRQGLVLexistingGDQLGHQWLILNDVLNHEXWXKDQ'DULKDVLODQDOLVLV
PDKDVLVZD+DOLQLSHUQDKWHUMDGLSDGDWDQJJDO0HLGL NRQGLVLexistingGDQNHEXWXKDQGDULSHQJJXQDdata centerPDND
8QLYHUVLW\RI 1HEUDVND GL PDQD 1H6,6 \DLWX GDWDEDVH \DQJ GDSDWGLUDQFDQJVXDWXGHVDLQNHDPDQDQdata center


Jurnal Rekayasa Sistem & Industri 
Volume 2, Nomor 1, Januari 2015
%HUGDVDUNDQ PHWRGH \DQJ GLJXQDNDQ VLPXODVL  .RQGLVL'0=
GLEXWXKNDQGDODPSHQJXMLDQXQWXNPHPDVWLNDQEDKZDGHVDLQ 'LWLQMDXGDULWRSRORJL\DQJDGDfirewall\DQJGLOHWDNNDQ
XVXODQ GDSDW PHPHQXKL NHEXWXKDQ GDUL SHQJJXQD -LND KDVLO SDGD MDULQJDQ '0= \DQJ PHQJKDGDS NH MDULQJDQ SXEOLN
VLPXODVL PDPSX XQWXN PHPHQXKL NHEXWXKDQ GDUL SHQJJXQD ,QWHUQHW  PHQJJXQDNDQ SHUDQJNDW -XQLSHU WLSH 65; 
PDNDUDQFDQJDQXVXODQNHDPDQDQdata centerGDSDWGLNDWDNDQ .RQILJXUDVLfirewallLQLPHPXQJNLQNDQSHQJJXQDGDUL,QWHUQHW
EHUKDVLO XQWXN PHQJDNVHV EHEHUDSD VHUYHU SHQWLQJ PHQJJXQDNDQ
 SURWRNRO+773GDQ66+1DPXQNKXVXVXQWXNNRQHNVL66+
$ .HDGDDQExisting KDQ\D GLEDWDVL VHEDQ\DN  NRQHNVL VHODPD VDWX PHQLW XQWXN
.HDGDDQ existing DGDODK GDWD \DQJ GLEXWXKNDQ XQWXN VHWLDS,3address
PHUDQFDQJ NHDPDQDQ GDWD FHQWHU SDGD 8QLYHUVLWDV 7HONRP Firewall \DQJ GLJXQDNDQ SDGD MDULQJDQ LQL WLGDN
'DWD NHDGDDQ existing GLGDSDWNDQ GHQJDQ FDUD PHODNXNDQ GLWHUDSNDQ PHNDQLVPH monitoring +DO LQL PHQJDNLEDWNDQ
ZDZDQFDUD GL 'LUHNWRUDW 6LVWHP ,QIRUPDVL SXVDW GDQ SDGD NRQGLVL real-time firewall WHUVHEXW VXOLW GLDZDVL GHQJDQ EDLN
PDVLQJPDVLQJ IDNXOWDV $GDSXQ IDNXOWDV \DQJ GLPDNVXG VHKLQJJD WHUGDSDW EHEHUDSD DNLEDW \DQJ GLWLPEXONDQ VHSHUWL
DGDODK )DNXOWDV 7HNQLN (OHNWUR )7(  )DNXOWDV 5HND\DVD load &38 NHWHUVHGLDDQ memory GDQ NRQGLVL ODOX OLQWDV GDWD
,QGXVWUL )5,  )DNXOWDV ,QIRUPDWLND ),)  )DNXOWDV PHQMDGLVXOLWGLNHWDKXL

.RPXQLNDVL %LVQLV ).%  )DNXOWDV (NRQRPL %LVQLV )(% 
)DNXOWDV,OPX7HUDSDQ ),7 )DNXOWDV,QGXVWUL.UHDWLI ),.  % 3HUDQFDQJDQ.HDPDQDQData Center8VXODQ
GDQWHUGDSDWMXJD'LUHNWRUDW%DQGXQJ7HFKQR3DUN %73  %HUGDVDUNDQ KDVLO DQDOLVLV \DQJ WHODK GLODNXNDQ PDND
 DNDQ GLODNXNDQ SHUDQFDQJDQ NHDPDQDQ MDULQJDQ NRPSXWHU GL
 ,QVLGHQ.HDPDQDQ-DULQJDQSDGD8QLYHUVLWDV 8QLYHUVLWDV
3DGD WDKXQ  VDODK VDWX IDNXOWDV SDGD 8QLYHUVLWDV  7RSRORJL-DULQJDQ8VXODQ
\DQJ GLWHOLWL PHQHULPD VHUDQJDQ 'R6 GDUL LQWHUQHW 6HUDQJDQ 7RSRORJLMDULQJDQNRPSXWHU\DQJGLXVXONDQGDSDWGLOLKDW
WHUVHEXWPHQJJXQDNDQSURWRNRO8'3GHQJDQportWXMXDQGLDWDV SDGD*DPEDU
 +DO LWX PHQJDNLEDWNDQ EHEHUDSD VHUYHU WLGDN GDSDW 3DGD MDULQJDQ XVXODQ GLODNXNDQ SHQDPEDKDQ SHUDQJNDW
GLDNVHV3HQ\HEDEQ\DDGDODKWLGDNDGDQ\DSHUOLQGXQJDQVHUYHU intrusion detection/prevention system \DQJ WHUOHWDN DQWDUD
SDGDVHUDQJDQ'R6''R6 firewall GHQJDQ '0= 6HODLQ LWX EHEHUDSD data center \DQJ
3DGDWDKXQ\DQJVDPDIDNXOWDVODLQSDGD8QLYHUVLWDV\DQJ WHUGLVWULEXVLSDGDPDVLQJPDVLQJIDNXOWDVGLWHPSDWNDQWHUSXVDW
VDPDPHQHULPDVHUDQJDQdefaceSDGDVDODKVDWXVHUYHUQ\D SDGD server farm \DQJ WHUOHWDN GL EHODNDQJ ,'6 XQWXN


 7RSRORJL-DULQJDQExisting PHPXGDKNDQSHQJHORODDQ


7RSRORJLMDULQJDQexistingDGDODKVHEDJDLEHULNXW  'LDJUDP/D\DQDQ8VXODQ
3DGD *DPEDU  8QLYHUVLWDV PHPLOLNL OLPD EXDK router 5DQFDQJDQ GLDJUDP OD\DQDQ XVXODQ DGDODK VHEDJDL
GHQJDQ PHUHN -XQLSHU \DQJ GLPLOLNL ROHK PDVLQJPDVLQJ EHULNXW
IDNXOWDV 3DGD router \DQJ WHUKXEXQJ NH ,QWHUQHW router
WHUVHEXWMXJDPHPLOLNLILWXUfirewall

 'LDJUDP/D\DQDQExisting
3DGD *DPEDU  OD\DQDQ \DQJ GLVHGLDNDQ SDGD layer
Internet edge DGDODK firewall :$1 routing VHNDOLJXV
PHQMDODQNDQ IXQJVL high-speed routing SDGD layer core
/D\DQDQ \DQJ GLEHULNDQ ROHK ,QWHUQHW edge layer WXPSDQJ
WLQGLK GHQJDQ OD\DQDQ \DQJ GLEHULNDQ ROHK core layer 6DWX
VDWXQ\DSHUOLQGXQJDQSDGDGDWDFHQWHUDGDODKfirewall



*DPEDU'LDJUDPOD\DQDQXVXODQ

3DGD*DPEDUdata centerWLGDNODJLPHQMDGLWDQJJXQJ
MDZDE PDVLQJPDVLQJ IDNXOWDV WHWDSL WHUSXVDW GDQ PHQMDGL
WDQJJXQJMDZDE'LUHNWRUDW6LVWHP,QIRUPDVL8QLYHUVLWDV
6HODLQ LWX ORNDVL data center EHUDGD GL EHODNDQJ
aggregation layer \DQJPHPEHULNDQOD\DQDQNHDPDQDQVHSHUWL
intrusion detection/prevention system GDQ firewall VHKLQJJD
GDWDFHQWHUPHQMDGLOHELKWHUOLQGXQJ

& 6LPXODVL3HUEDQGLQJDQ.HDGDDQExistingGHQJDQ8VXODQ
 8QWXN PHQJHWDKXL HIHNWLYLWDV GDUL NHDGDDQ XVXODQ
*DPEDU'LDJUDPOD\DQDQexisting
GLEDQGLQJNDQ GHQJDQ NHDGDDQ existing PDND GLODNXNDQ
VLPXODVLSDGDOLQJNXQJDQ\DQJWHUNRQWURO

$QDOLVLVGDQ'HVDLQ.HDPDQDQ-DULQJDQ.RPSXWHUGHQJDQ0HWRGHNetwork Development Life Cycle


  
 6WXGL.DVXV8QLYHUVLWDV7HONRP
Ramadhan Triyanto Prabowo, Mochamad Teguh Kurniawan (hal. 1 – 7)





*DPEDU7RSRORJLMDULQJDQGDQGDWDFHQWHUexisting




*DPEDU7RSRORJLMDULQJDQGDQGDWDFHQWHUXVXODQ

 6LPXODVL6HUDQJDQ'R6''R6 server. 3DGD *DPEDU  GDSDW GLVLPSXONDQ EDKZD GDODP


6DODK VDWX VHUDQJDQ \DQJ SHUQDK WHUMDGL DGDODK 8'3 LQWHUYDOGHWLNUDWDUDWDGDSDWGLEDQMLULODOXOLQWDVSDNHWGDWD
flooding$NDQGLODNXNDQVLPXODVLXQWXNPHQJHWDKXLGDPSDN EHUXUXWDQ  GDUL    GDQ  0ESV VHGDQJNDQ
GDUL VHUDQJDQ WHUVHEXW 6LPXODVL GLODNXNDQ GHQJDQ FDUD VHWHODKGLODNXNDQVLPXODVLWHUKDGDSXVXODQNHDPDQDQMDULQJDQ
PHQJLULPNDQSDNHW8'3VHFDUDWHUXVPHQHUXVROHKVDWXKLQJJD NRPSXWHUKDVLOQ\DGDSDWGLOLKDWSDGD*DPEDU
HPSDW KRVW ODOX GLXNXU MXPODK ODOX OLQWDV SDNHW 8'3 SDGD


Jurnal Rekayasa Sistem & Industri 
Volume 2, Nomor 1, Januari 2015

GLPXQJNLQNDQ XQWXN PHODQMXWNDQ SHQJXMLDQ GHQJDQ
SHQDPEDKDQSHQ\HUDQJ



+RVW
 6LPXODVL3HQJXNXUDQ(IHNWLYLWDV,'36
%LW
 6DODK VDWX XVXODQ \DQJ GLEHULNDQ XQWXN PHQLQJNDWNDQ
+RVW
 NHDPDQDQ DGDODK SHUOLQGXQJDQ data center GDUL DQFDPDQ
 +RVW SHUHWDV PHQJJXQDNDQ SHUDQJNDW Intrusion
 +RVW Detection/Prevention System ,'36  $GD EDQ\DN MHQLV
17 VHUDQJDQ\DQJGDSDWGLGHWHNVLROHK,'36EHEHUDSDGLDQWDUDQ\D
33
49
65
81
97
1

113
DGDODK VHUDQJDQ 7&3 6<1 flood GDQ VHUDQJDQ 8'3 flood
'HWLN 6LPXODVLGLODNXNDQGHQJDQFDUDPHQJLULPNDQSDNHW6<1GDQ
 SDNHW8'3VHFDUDWHUXVPHQHUXV *DPEDUDGDODKKDVLOGDUL
*DPEDU*UDILNODOXOLQWDVVHUDQJDQ'R6''R6
VLPXODVLVHUDQJDQ7&36<1IORRG


































'HWLN 8'3 ELWV



*DPEDU*UDILNODOXOLQWDVVHUDQJDQSDGDXVXODQ

3DGD *DPEDU  GDSDW GLVLPSXONDQ EDKZD GDODP ZDNWX


 GHWLN KDQ\D DGD ODOX OLQWDV SDNHW 8'3 UDWDUDWD  NESV
6HUDQJDQ LQL GLODNXNDQ ROHK VDWX host -XPODK LQL FXNXS
EHUEHGDMLNDGLEDQGLQJNDQGHQJDQWDQSDSHUOLQGXQJDQWHUKDGDS
'R6'GR6.HWLNDGLODNXNDQSHQJXMLDQVHUDQJDQROHKGXDhost

GLGDSDWNDQKDVLOVHSHUWL*DPEDU *DPEDU7&36<1DWWDFN

3DGD(UURU5HIHUHQFHVRXUFHQRWIRXQGDPEDUGDSDW
GLVLPSXONDQEDKZDSHUDQJNDW,'36GDSDWPHQGHWHNVLVHUDQJDQ
7&36<1flood*DPEDUPHPSHULKDWNDQVLPXODVLVHUDQJDQ
8'3flood



*DPEDU+DVLOGHWHNVLVHUDQJDQ8'3IORRG

3DGD *DPEDU  GDSDW GLVLPSXONDQ EDKZD SHUDQJNDW


 ,'36PHQGHWHNVLVHUDQJDQWHUVHEXWGDQGDSDWPHODNXNDQDNVL
*DPEDU6HUDQJDQROHKGXDhost
GURSSDGDSDNHWKLQJJDSDNHW
3DGD*DPEDUGDSDWGLOLKDWEDKZDVHUDQJDQ'R6''R6 
ROHK GXD KRVW SDGD MDULQJDQ XVXODQ PHQ\HEDENDQ SHUDQJNDW  6LPXODVL931XQWXN.RQHNVL66+
\DQJPHQ\HGLDNDQOD\DQDQSHUOLQGXQJDQWHUKDGDS'R6''R6 .RQHNVL 66+ GLSHUOXNDQ XQWXN PHQJDNVHV GDQ
WLGDN PDPSX PHQDQJDQL SDNHW GDWD \DQJ PDVXN VHKLQJJD PHQJHQGDOLNDQserverGDULMDUDNMDXK.RQHNVLLQLKDUXVDPDQ
SHUDQJNDW WHUVHEXW PHPDWLNDQ interface XQWXN PHQFHJDK NDUHQDNRQHNVLLQLPHPSHUEROHKNDQSHQJJXQDGDULMDUDNMDXK
VHUDQJDQ WHUVHEXW EHUODQMXW +DO LQL PHQJDNLEDWNDQ WLGDN XQWXN GDSDW PHODNXNDQ SHUXEDKDQ VLVWHP SDGD VHUYHU 2OHK

$QDOLVLVGDQ'HVDLQ.HDPDQDQ-DULQJDQ.RPSXWHUGHQJDQ0HWRGHNetwork Development Life Cycle


  
 6WXGL.DVXV8QLYHUVLWDV7HONRP
Ramadhan Triyanto Prabowo, Mochamad Teguh Kurniawan (hal. 1 – 7)


VHEDELWXGLSHUOXNDQ931XQWXNPHQJDPDQNDQNRQHNVL66+ ' $QDOLVLV
*DPEDUDGDODKSHQJXMLDQNRQHNVL66+WDQSD931 6HWHODK GLODNXNDQ SHUDQFDQJDQ GDQ VLPXODVL  PDND
 GLODNXNDQDQDOLVLVDSDNDKNHDPDQDQMDULQJDQNRPSXWHUXVXODQ
OD\DNGDQPDPSXPHPHQXKLNHEXWXKDQSHQJJXQDDWDXWLGDN
 $QDOLVLV3HUEDQGLQJDQExistingGHQJDQ8VXODQ
$UVLWHNWXU MDULQJDQ GDQ GDWD FHQWHU \DQJ LGHDO KDUXV
 PHQFDNXSOD\DQDQOD\DQDQVHSHUWLOD\DQDQInternet edge, core
*DPEDU.RQHNVL66+WDQSD931 data center\DQJWHUSLVDKGHQJDQMDULQJDQLQWHUQDOaggregation
layer server farm layered access network GDQ disaster
3DGD*DPEDUGDSDWGLVLPSXONDQEDKZDNRQHNVL66+ recovery center >@.
WDQSD 931 WLGDN GDSDW GLODNXNDQ VHKLQJJD WLGDN ELVD
PHODNXNDQ PHODNXNDQ remote GDQ SHUXEDKDQ VLVWHP SDGD
server. 6HWHODKGLODNXNDQSHQJXMLDQNRQHNVL66+GHQJDQ931
KDVLOQ\DDGDODKVHEDJDLEHULNXW



*DPEDU'LDJUDPOD\DQDQLGHDO

3DGD*DPEDUVHWLDSlayerPHPLOLNLNRPSRQHQ\DQJ
UHGXQGDQ VHKLQJJD WLGDN DGD single point of failure +DO LQL
GLEXWXKNDQDJDUNHWHUVHGLDDQOD\DQDQPHQLQJNDW
3DGD VLVL internet edge OD\DQDQ \DQJ GLVHGLDNDQ DGDODK
OD\DQDQ :$1 routing GDQ NHDPDQDQ 3HUDQJNDW \DQJ
GLJXQDNDQ PHOLSXWL firewall, intrusion detection system GDQ
intrusion prevention system 'L VLVL core OD\DQDQ \DQJ
GLVHGLDNDQDGDODKroutingDQWDUDMDULQJDQLQWHUQDOdata center
GDQ public :$1 DWDX ,QWHUQHW 3DGD OD\HU LQL GLEXWXKNDQ
OD\DQDQ forwarding data \DQJ FHSDW GDQ redundan NDUHQD
PHQJKXEXQJNDQ WLJD OD\DQDQ NULWLV 3DGD VLVL aggregation

*DPEDU.RQHNVL931 OD\DQDQ \DQJ GLVHGLDNDQ DGDODK OD\DQDQ UHGXQGDQVL default
gateway VHKLQJJD data center GDSDW PHQFDSDL NHWHUVHGLDDQ
\DQJ WLQJJL 3DGD OD\HU LQL SXOD intrusion detection system
Network Analysis Module 1$0 GDQSHUOLQGXQJDQVHUDQJDQ
'R6''R6 GLLPSOHPHQWDVLNDQ 'L server farm layer DGDODK
OD\DQDQOD\DQDQ DSOLNDVL GDQ SHQ\LPSDQDQ GDWD \DQJ
GLEXWXKNDQROHKRUJDQLVDVL3DGDlayerLQLSXODEHEHUDSDDWDX
VHPXD DSOLNDVLDSOLNDVL GDQ GDWDGDWD SHQWLQJ GLODNXNDQ
backupNHdisaster recovery
'L MDULQJDQ \DQJ PHOD\DQL SHQJJXQD MDULQJDQ WHUGDSDW
distribution layer \DQJ PHPEHULNDQ OD\DQDQ VHSHUWL inter
9/$1 routing access list quality of service 4R6  GDQ
 UHGXQGDQVL default gateway SDGD SHQJJXQD XQWXN
*DPEDU.RQHNVL66+EHUKDVLOGLODNXNDQ
PHQLQJNDWNDQ NHWHUVHGLDDQ OD\DQDQ 3DGD access layer
6LPXODVL GLODNXNDQ GHQJDQ SHUDQJNDW OXQDN &LVFR GLWHUDSNDQ OD\DQDQ \DQJ PHQJKXEXQJNDQ ODQJVXQJ GHQJDQ
$Q\&RQQHFW &OLHQW 6LPXODVL LQL PHPEXWXKNDQ SURVHV SHQJJXQD VHSHUWL power over ethernet 3R(  patch panel
RWHQWLNDVLVHEDQ\DNNDOL\DLWXRWHQWLNDVL931GDQRWHQWLNDVL switchGDQOD\DQDQwireless
66+6HWHODKNRQHNVL931EHUKDVLOGLODNXNDQPDNDSHQJJXQD 3HUEDQGLQJDQ DQWDUD GLDJUDP OD\DQDQ existing GHQJDQ
GDSDW PHODNXNDQ NRQHNVL 66+ SDGD server PHQJJXQDNDQ GLDJUDPOD\DQDQLGHDOPHPLOLNLPHPLOLNLSHUEHGDDQ\DLWXWLGDN
private,3addressPLOLNserver. DGDQ\D aggregation layer Layer LQL SHQWLQJ NDUHQD


Jurnal Rekayasa Sistem & Industri 
Volume 2, Nomor 1, Januari 2015
PHQ\HGLDNDQ OD\DQDQ UHGXQGDQVL default gateway intrusion *DPEDUPHQ\DWDNDQEDKZDSHUEDQGLQJDQDQWDUDODOX
detection systemnetwork analysis moduleGDQPHQ\HGLDNDQ OLQWDV SDNHW 8'3 SDGD MDULQJDQ existing GHQJDQ XVXODQ
SHUOLQGXQJDQWHUKDGDSVHUDQJDQ'R6''R66HODLQLWXinternet PHPLOLNL SHUEHGDDQ VHEHVDU  VHKLQJJD GDSDW
edge layerWLGDNUHGXQGDQGDQGLOHWDNNDQPHQMDGLVDWXGHQJDQ GLVLPSXONDQEDKZDXVXODQNHDPDQDQMDULQJDQNRPSXWHUGDSDW
core layer VHKLQJJD PHQJDNLEDWNDQ NRQGLVL single point of PHPHQXKLNHEXWXKDQSHUWDKDQDQWHUKDGDS'R6''R6
failure\DQJPHQ\HEDENDQNHWHUVHGLDDQOD\DQDQWLGDNWHUMDPLQ  $QDOLVLV6LPXODVL3HQJXNXUDQ(IHNWLYLWDV,'36
6HODLQLWXMLNDDGDVHUDQJDQ\DQJGLODNXNDQSDGDMDULQJDQ $QDOLVLVVLPXODVLSHQJXNXUDQHIHNWLYLWDV,'36GLSHUOXNDQ
LQWHUQDO /$1 PDNDdata center\DQJDGDGLEHEHUDSDIDNXOWDV XQWXN PHQJHWDKXL DSDNDK SHUDQJNDW ,'36 \DQJ GLXVXONDQ
PHQMDGLWLGDNWHUOLQGXQJLNDUHQDODOXOLQWDVGDWDGDULMDULQJDQ GDSDW PHPHQXKL NHEXWXKDQ GHWHNVL SHQ\HUDQJDQ SDGD data
LQWHUQDONHdata centerWLGDNWHUOLQGXQJROHKfirewall. center. %HUGDVDUNDQ GDWD SDGD *DPEDU  GDQ *DPEDU 
PHQ\DWDNDQ EDKZD SHUDQJNDW ,'36 PDPSX PHQJHQDOL
EHEHUDSD VHUDQJDQ GDQ GDSDW PHQGHWHNVL PDXSXQ PHQFHJDK
VHUDQJDQWHUVHEXWWHUMDGL.HDPDQDQMDULQJDQNRPSXWHUXVXODQ
WHODK PDPSX XQWXN PHPHQXKL NHEXWXKDQ NHDPDQDQ MDULQJDQ
NRPSXWHU
 $QDOLVLV6LPXODVL931XQWXN.RQHNVL66+
$QDOLVLV VLPXODVL 931 XQWXN NRQHNVL 66+ GLSHUOXNDQ
XQWXN PHQJHWDKXL DSDNDK WHNQRORJL 931 PDPSX XQWXN
PHQLQJNDWNDQNHDPDQDQNRQHNVL66+GDULMDULQJDQSXEOLNDWDX
,QWHUQHW +DVLO SHQJXMLDQ PHQXQMXNNDQ EDKZD NRQHNVL 66+
 WDQSD PHQJJXQDNDQ 931 WLGDN GLPXQJNLQNDQ 6HGDQJNDQ
*DPEDU&RQWRKVHUDQJDQGDULMDULQJDQLQWHUQDO
NRQHNVL 66+ VHWHODK SHQHUDSDQ WHNQRORJL 931 GDSDW
%HUGDVDUNDQ*DPEDUWHUGDSDWNHPXQJNLQDQVHUDQJDQ GLODNXNDQ
SDGDMDULQJDQLQWHUQDO /$1 NDUHQDDNVHVPHQXMXdata center 
WLGDN GLOLQGXQJL ROHK firewall 2OHK NDUHQD LWX GLEXWXKNDQ ,9.(6,038/$1
GHVDLQ MDULQJDQ \DQJ PHPXQJNLQNDQ data center GDSDW 
WHUOLQGXQJROHKfirewall. 'DULSHQHOLWLDQ\DQJWHODKGLODNXNDQPDNDGDSDWGLWDULN
 $QDOLVLV+DVLO6LPXODVL NHVLPSXODQVHEDJDLEHULNXW
$QDOLVLV KDVLO VLPXODVL GLSHUOXNDQ XQWXN PHQJHWDKXL   3DGD WDKDS LGHQWLILNDVL NHDPDQDQ MDULQJDQ NRPSXWHU
DSDNDK NHDPDQDQ MDULQJDQ NRPSXWHU XVXODQ WHODK GDSDW 8QLYHUVLWDV 7HONRP GHQJDQ PHQJJXQDNDQ PHWRGH
PHPHQXKL NHEXWXKDQ NHDPDQDQ MDULQJDQ NRPSXWHU SDGD 1'/& XQWXN WDKDS DQDOLVLV GLGDSDW KDVLO VHEDJDL
8QLYHUVLWDV EHULNXW
 $QDOLVLV6LPXODVL6HUDQJDQ'R6''R6 D 7HODK PHQHUDSNDQ OD\DQDQ NHDPDQDQ XQWXN
3DGD GDSDW GLVLPSXONDQ EDKZD VHPDNLQ EDQ\DN MXPODK MDULQJDQLQWHUQDOGDQ'0=WHWDSLEHEHUDSDserver
KRVW \DQJ EHUSDUWLVLSDVL GDODP VHUDQJDQ 8'3 flood PDND GLEHEHUDSDIDNXOWDVWLGDNWHUOLQGXQJGDULVHUDQJDQ
VHPDNLQ EDQ\DN SXOD ODOX OLQWDV SDNHW 8'3 +DO LQL GDSDW \DQJEHUDVDOGDULMDULQJDQLQWHUQDO
PHQJKDELVNDQ bandwidth \DQJ WHUVHGLD VHKLQJJD ODOX OLQWDV E /RNDVL data center \DQJ WHUSLVDK PHQ\HEDENDQ
GDWD \DQJ QRUPDO WLGDN PHQGDSDW SRUVL bandwidth \DQJ SHQJHORODDQ NHDPDQDQ SDGD data center PHQMDGL
VHPHVWLQ\D -LND GLEDQGLQJNDQ GHQJDQ ODOX OLQWDV SDNHW 8'3 VXOLWGLODNXNDQ
SDGD XVXODQ NHDPDQDQ MDULQJDQ NRPSXWHU DGDODK VHEDJDL F -DULQJDQNRPSXWHUSDGD8QLYHUVLWDV7HONRPEHOXP
EHULNXW PHQHUDSNDQ SHUOLQGXQJDQ WHUKDGDS 'R6''R6
 ROHK NDUHQD LWX SDGD NHDPDQDQMDULQJDQ NRPSXWHU
XVXODQ GLODNXNDQ SHQDPEDKDQ SHUOLQGXQJDQ
14000000
WHUKDGDS'R6''R6
12000000   5DQFDQJDQNHDPDQDQMDULQJDQNRPSXWHUGL8QLYHUVLWDV
10000000 7HONRPGLXVXONDQGHQJDQPHQJJXQDNDQPHWRGH1'/&
8000000 SDGDWDKDSGHVDLQGDQVLPXODWRUDGDODKVHEDJDLEHULNXW
6000000 Eksisting D GDWDFHQWHUGL8QLYHUVLWDV7HONRPEHOXPGLEHULNDQ
4000000 OD\DQDQXQWXNPHQGHWHNVLGDQPHQFHJDKVHUDQJDQ
2000000 Usulan ROHK NDUHQD LWX GLEHULNDQ XVXODQ SHQDPEDKDQ
OD\DQDQ ,'36 XQWXN PHQGHWHNVL GDQ PHQFHJDK
0
VHUDQJDQ WHUMDGL +DVLO SHQJXMLDQ PHQXQMXNNDQ
1
22
43
64
85
106

EDKZD SHUDQJNDW XVXODQ GDSDW PHPHQXKL


Detik NHEXWXKDQWHUVHEXW
E .RQHNVL 66+ NH server GDUL MDULQJDQ SXEOLN WLGDN
 GLEHULNDQNHDPDQDQWDPEDKDQVHKLQJJDGLSHUOXNDQ
*DPEDU3HUEDQGLQJDQexistingGHQJDQXVXODQ
WHNQRORJL 931 XQWXN PHQLQJNDWNDQ NHDPDQDQ

$QDOLVLVGDQ'HVDLQ.HDPDQDQ-DULQJDQ.RPSXWHUGHQJDQ0HWRGHNetwork Development Life Cycle


  
 6WXGL.DVXV8QLYHUVLWDV7HONRP
Ramadhan Triyanto Prabowo, Mochamad Teguh Kurniawan (hal. 1 – 7)


NRQHNVL66++DVLOSHQJXMLDQSDGDNRQGLVLexisting
PDXSXQ XVXODQ NHDPDQDQ MDULQJDQ NRPSXWHU
PHQXQMXNNDQ EDKZD NRQHNVL 66+ WLGDN
GLPXQJNLQNDQ MLND SHQJJXQD EHOXP WHUNRQHNVL
GHQJDQ931VHGDQJNDQVHWHODKGLODNXNDQNRQHNVL
GHQJDQ931PDNDNRQHNVL66+GDSDWGLODNXNDQ
  3DGDWDKDSmonitoringSDGDPHWRGH1'/&GLGDSDW
XVXODQVHEDJDLEHULNXW
D 'LEHULNDQ XVXODQ DJDU server WHUVHEXW WHUOLQGXQJ
ROHKILUHZDOO
E 'LEHULNDQ XVXODQ XQWXN SHQHPSDWDQ data center
VHFDUDWHUSXVDWDJDUPHPXGDKNDQSHQJHORODDQ

'$)7$53867$.$

>@ .HPHQWULDQ 3HQGLGLNDQ 1DVLRQDO Kamus Besar Bahasa
Indonesia-DNDUWD%DODL3XVWDND
>@ 8QLYHUVLW\ RI 1HEUDVND  0D\  8QLYHUVLW\ RI
1HEUDVND >2QOLQH@ KWWSQHEUDVNDHGXPHGLDUHVRXUFH
FHQWHUQHZVUHOHDVHVXQLYHUVLW\RIQHEUDVND
LQYHVWLJDWLQJVHFXULW\EUHDFKLQWRVWXGHQWLQIRUPDWLRQ
V\VWHPKWPO
>@ DPHV ( *ROGPDQ DQG 3KLOOLS 7 5DZOHV Applied Data
Communication: A Business-Oriented Approach 1HZ
<RUN:LOH\
>@ 0DXULFLR$UUHJRFHVDQG0DXUL]LR3RUWRODQLData Center
Fundamentals,QGLDQD&LVFR3UHVV



Jurnal Rekayasa Sistem & Industri 
Volume 2, Nomor 1, Januari 2015

You might also like