Sistem Otentifikasi Otomatis Kendala Perangkat Jaringan Menggunakan NDLC
Abstract
The authentication system is a monitoring system where if there is a network problem, it can provide information quickly. The research was conducted at Bumigora University, using 3 buildings as research materials implemented in the form of topology design. The monitoring is carried out to anticipate lost connections or network disconnections caused by certain factors. The Network Development Life Cycle (NDLC) method is the appropriate method for conducting this analysis, because it focuses on parameters such as network reliability and the ability to secure data transmission. The stages of the NDLC method consist of analysis, design, simulation prototype, implementation, monitoring and management, but in this study the author only used 3 stages, namely analysis, design, simulation prototype and implementation. The NDLC method has been proven to increase network security and reliability, as well as minimize downtime due to device failure or disconnection of data transmission. Automatic authentication implemented through NDLC allows real-time device monitoring, by connecting the API with telegram. Telegram will provide notifications in the form of network condition statuses that are experiencing problems. So that the IT team can control the condition of network devices through telegram notifications. This can facilitate network management and efficiency of checking time in maintaining the stability and performance of the network as a whole.
Downloads
References
M. A. Putra, D. N. Anjani, S. Rofi, And N. Fitri, “Pengaruh Perceived Organizational Support Terhadap Organizational Commitment ( Studi Pada Universitas Bumigora Mataram Pasca Perubahan Organisasi ),” Jurnal Mirai Management, Vol. 9, No. 1, Pp. 67–74, 2024.
B. S. Nugroho, Y. Sutanto, “Metode Quality Of Service Pada Laboratorium,” 2024.
M. Taufan Et Al., “Penerapan Network Development Life Cycle ( Ndlc ) Dalam Pengembangan Jaringan Komputer Pada Badan Pengelolaan Keuangan Dan Aset Daerah ( Bpkad ) Provinsi Ntb,” Jurnal Ilmiah VIVO, Vol. Xiv, No. 1, 2022.
B. Siber, N. Bssn , “Hybrid Acquisition Pada Forensik Digital Berbasis Iso / Iec 27037 : 2012 Menggunakan Port Mirroring Dan Single Board Computer Abstraksi Keywords : Pendahuluan Metode Penelitian Tinjauan Pustaka,” Joism, Vol. 5, No. 1, 2023.
M. Y. Fardiansyah, “Optimasi Jaringan Internet Menggunakan Kombinasi Load Balancing Dan Queue Pada Router Mikrotik,” Jurnal Elektrika, Vol 16, No 2, Doi: 10.26623/Elektrika.
A. R. Kamila, G. H. Derhass, D. A. Rabbani, J. F. Andry, And F. S. Lee, “Aplikasi Absensi Berbasis Android Pada Sekolah Boarding Sebagai Transformasi Digital Bidang Pendidikan,” Nuansa Inform., Vol. 18, No. 2, Pp. 26–34, 2024, Doi: 10.25134/Ilkom.V18i2.155.
M. B. Al Mukasyah And H. Yulianton, “Analisa Penggunaan Zerotier Pada Jaringan Rt/Rw Net Dengan Metode Quality Of Service,” Progresif J. Ilm. Komput., Vol. 20, No. 1, P. 477, 2024, Doi: 10.35889/Progresif.V20i1.1784.
M. A. Husna And P. Rosyani, “Implementasi Sistem Monitoring Jaringan Dan Server Menggunakan Zabbix Yang Terintegrasi Dengan Grafana Dan Telegram,” Jurikom, Vol. 8, No. 6, Pp. 247–255, 2021, Doi: 10.30865/Jurikom.V8i6.3631.
N. Fernando And E. Asri, “Monitoring Jaringan Dan Notifikasi Dengan Telegram Pada Dinas Komunikasi Dan Informatika Kota Padang,” JITSI, Vol. 1, No. 4, Pp. 121–126, 2020.
A. Teddyana, “Monitoring Jaringan Internet Menggunakan Notifikasi Bot Api Telegram,” 2021
K. Nalakhudin Et Al., “Pemanfaatan Notifikasi Telegram Untuk Monitoring Perangkat Cctv Rumah Sakit Orthopaedi Purwokerto,” Technomedia Journal, Vol. 6, No. 1, Pp. 56–65, 2021.
W. Iqbal Et Al., “Alam: Anonymous Lightweight Authentication Mechanism For Sdn-Enabled Smart Homes,” Ieee Internet Things J., Vol. 8, No. 12, Pp. 9622–9633, 2021, Doi: 10.1109/Jiot.2020.3024058.
S. Ahmad And A. H. Mir, Scalability, Consistency, Reliability And Security In Sdn Controllers: A Survey Of Diverse Sdn Controllers, Vol. 29, No. 1. Springer Us, 2021. Doi: 10.1007/S10922-020-09575-4.
A. Mardiyono, W. Sholihah, And F. Hakim, “Mobile-Based Network Monitoring System Using Zabbix And Telegram,” 2020 3rd Int. Conf. Comput. Informatics Eng. Ic2ie 2020, Pp. 473–477, 2020, Doi: 10.1109/Ic2ie50715.2020.9274582.
C. E. Swandi, K. A. Nugraha, D. Sebastian, And Restyandito, “Middleware Development To Connect Telegram Messenger And Instant Messenger For The Elderly,” Iop Conf. Ser. Mater. Sci. Eng., Vol. 1077, No. 1, P. 012007, 2021, Doi: 10.1088/1757-899x/1077/1/012007.
M. F. J. S. Wiriaatmadja And N. Ratama, “Sistem Monitoring Jaringan Melalui Notifikasi Telegram Dengan Application Programming Interface (Api) Menggunakan Netwatch Mikrotik Pada Jaringan,” Oktal J. Ilmu Komput. Dan Sains, Vol. 1, No. 6, Pp. 771–781, 2022.
M. A. Faizi And F. W. Christanto, “Manajemen Perangkat Jaringan Access Point Menggunakan Unifi Controller Di Jaringan Kampus Access Point Network Device Management Using Unifi Controller On Campus Networks,” Jurnal Sistem Dan Teknologi Informasi Indonesia, Vol. 9, No. 2, Pp. 67–76, 2024.
D. N. Amadi, A. Budiman, And P. Utomo, “Analysis Of The Effectiveness Of Vpn And Pptp Protocol In E-Link Health Report Application Using Ndlc Method,” J. Inf. Syst. Informatics, Vol. 6, No. 2, Pp. 949–958, 2024, Doi: 10.51519/Journalisi.V6i2.746.
M. Syani, R. M. Tresna, E. A. Firdaus, And F. F. Nugraha, “Penerapan Network Access Control Autentikasi Internal Network Security Protokol 802.1 X,” Nuansa Inform., Vol. 16, No. 2, Pp. 77–86, 2022, Doi: 10.25134/Nuansa.V16i2.5800.
L. A. J. Sigit, A. S. Y. Irawan, And D. Juardi, “Analisis Perancangan Arsitektur Jaringan Smk Negeri 3 Kota Bekasi Menggunakan Metode Ndlc Dengan Pemanfaatan Software-Defined Networking,” Infotech J., Vol. 9, No. 2, Pp. 520–531, 2023, Doi: 10.31949/Infotech.V9i2.6536.
A. Tantoni, M. T. A. Zaen, And L. Mutawalli, “Komparasi Qos Load Balancing Pada 4 Line Internet Dengan Metode Pcc, Ecmp Dan Nth,” J. Media Inform. Budidarma, Vol. 6, No. 1, P. 110, 2022, Doi: 10.30865/Mib.V6i1.3436.
A. Al Muhaimin, T. Hardiani, And D. Wijayanto, “Sistem Monitoring Jaringan Menggunakan Zabbix Dengan Metode Ndlc ( Network Development Life Cycle ) Netwrok Monitoring System Using Zabbix With Ndlc ( Network Development Life Cycle ) Method,” Prosiding Nasional Penelitian dan Pengabdian Kepada Masyarakat, Vol. 2, No. September, Pp. 1926–1933, 2024.
M. Siddik, A. Nasution, And A. P. Lubis, “Load Balance Dan Perancangan Infrastruktur Jaringan Sekolah Menggunakan Mikrotik Berbasis Cisco Packet Tracer,” J. Sci. Soc. Res., Vol. 6, No. 3, Pp. 744–749, 2023.
S. I. Santosa, D. Juardi, And N. Heryana, “Penerapan Manajemen Bandwith Jaringan Internet Sekolah Menggunakan Metode Peer Connection Queue ( Studi Kasus : Smp Sandrem ),” Jurnal Informasi dan Komputer, Vol 12, No. 1, Pp. 180–188, 2024.
L. Lukman And S. Selviana, “Analisis Dan Impelementasi Sistem Otentikasi Dan Manajement Bandwidth Menggunakan Ndlc Pada Desa Mekar Jaya Jambi,” Respati, Vol. Xviii, Pp. 1–9, 2023.
R. Yulianto And F. Aprilyani, “Sistem Keamanan Jaringan Komputer Menggunakan Metode Ndlc Dengan Linux Zentyal Pada Instansi Kemenko Maritim,” J. Tek. Inform. Stmik Antar Bangsa, Vol. Vi, No. 2, Pp. 79–86, 2020.
M. H. Fikri And I. Nurhaida, “Pemantauan Jaringan Menggunakan Nagios Dan Zabbix Dengan Notifikasi Telegram Messenger Dan Google Mail,” Simetris J. Tek. Mesin, Elektro Dan Ilmu Komput., Vol. 11, No. 2, Pp. 578–593, 2021, Doi: 10.24176/Simet.V11i2.5320.
D. Syafaah, “Strategi Mindmapping Untuk Meningkatkan Penguasaan Mufrodat Bagi Mahasiswa Ilmu Perpustakaan Dan Informasi Islam Iain Tulungagung,” Pros. Konf. Nas. Bhs. Arab Vi, No. Oktober, Pp. 157–168, 2020.
A. B. Isro, A. T. Zy, And S. Andika, “Optimalisasi Load Balancing Menggunakan Metode Ndlc Untuk Meningkatkan Kualitas Layanan Jaringan Internet,” J. Inf. Syst. Res., Vol. 5, No. 4, Pp. 988–997, 2024, Doi: 10.47065/Josh.V5i4.5484.
M. Rivan, A. Arsandi, And A. Syaripudin, “Perancangan Sistem Monitoring Jaringan Berbasis Web Server Terintegrasi Zabbix Dan Notifikasi Telegram Pada Pt Time Excelindo,” Jurnal Ilmu Komputer dan Sains, Vol. 3, No. 6, Pp. 1553–1561, 2024.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Sistem Otentifikasi Otomatis Kendala Perangkat Jaringan Menggunakan NDLC
Pages: 1512-1519
Copyright (c) 2025 Muhammad Fawazi Hadi, Viviana Herlita Vidiasari, Christoper Michael Lauwl, Husain Husain, Farda Milanda Amin

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).