Integral : Jurnal Penelitian Pendidikan Matematika p - ISSN 2654-4539 e Ae ISSN 2654-8720 Vol. 6 No. Mei 2024 Page 96 of 104 IMPLEMENTATION OF COMPUTER PROGRAMMING MATHEMATICAL ALGORITHM ON A SERVER WITH THE DEBIAN LINUX OPERATING SYSTEM VIA VIRTUALBOX AS SUPPORTING THE ADMISSION OF NEW STUDENTS IN VOCATIONAL SCHOOLS Ibnu Sina1. Nugroho Adhi Santoso2. Ahmadi3 1,3 Pendidikan Matematika. FKIP. UPS Tegal 2 Sistem Informasi. STMIK YMI Tegal Email : 1 ibnusinaupstegal@gmail. com, 2 nugrohoadhisantoso@stmik-tegal. Abstract. In a network connected to the internet, a server computer or computer program is needed that can act as another computer to make requests for content from the internet or intranet. Apart from that, the server computer acts as a gateway to the internet world for each client. Thus, local networks that are connected to other networks or the internet are not directly connected to external networks or the internet, but must pass through a gateway, which acts as a boundary between the local network and the external network. The internet connection is shared among all computers through a component that functions as a proxy server. As is known, algorithm is a syllable that originally originated from mathematics and programming which originated from a computer or cellular network. Therefore, its use can be linked to one of the roles in the operating system where there is a programming algorithm. The purpose of this research is for researchers to carry out the process of learning about work methods and activities in an agency in the field directly. Researchers can get to know the actual work atmosphere so that they can build a good work ethic as well as an effort to broaden their work horizons, and increase their insight and knowledge of information technology in general. general, and especially in server implementations with programming algorithms. Mikrotik in this research is an operating system used to turn a computer into a reliable network router, including various features created for IP networks and wireless networks, suitable for use by Internet Service Providers (ISP) and hostspot providers. In this research, the proxy was installed built in to the router. Bina Islam Mandiri Kersana Vocational School is also one of the Vocational High Schools leading to the National Standard School. Therefore, human resources are also expected to support this goal. To obtain superior human resources, the new student admissions system has begun to set appropriate criteria and is also prepared as fully as possible. Keywords: mathematics, algorithm, programming, proxy server. Internet Service Provider (ISP) INTRODUCTION agency office, company, campus, school. Nowadays internet needs are no longer internet cafe, or other location actually dominated by the upper middle class, but only requires one account that is almost every campus, office and school connected to all computers. These also provides internet facilities that can computers are connected together in a be used together. What's more, now that internet cafes and hotspot areas have reached many corners of the city, computers through a component that everyone has the opportunity to use the functions as a proxy server. In order for As is known, algorithm is a the research carried out to be carried out syllable that originally originated from effectively, it is necessary to have mathematics and programming which problem limitations. The limitations of originated from a computer or cellular the problem in this research are using Therefore, its use can be linked the Clear OS operating system and to one of the roles in the operating implementation on a proxy server. system where there is a programming The The aim of this research is for researchers to carry out a learning In a network connected to the internet, a server computer or computer activities at an agency in the field program is needed that can act as another computer to make requests for It is hoped that this research will content from the internet or intranet. be able to analyze and solve problems Where a server computer is used to that arise in the field using a theoretical secure a private network that is approach, and increase insight and connected to a public network. Apart knowledge of information technology in from that, the server computer acts as a gateway to the internet world for each Thus, local networks that are The benefits of research are that a connected to other networks or the good partnership pattern is created with internet are not directly connected to school agencies such as places where external networks or the internet, but researchers carry out research on must pass through a gateway, which acts various problems that arise and then as a boundary between the local network look for better joint solutions, and there and the external network. is useful input that can be used, including An internet connection at an accordance company location. According to its type, observations made. researchers while LAN can be client/server or peer to peer. carrying out research. According to Winarno Sugeng, defines a LAN network as follows: "LAN (Local 1 Computer Networks Area Networ. Kadir . Network in the computers, where there are several computer field can be interpreted as two computer units . and a computer unit for the data bank . One way LAN is used to connect In a computer network, personal computers and workstations in what is communicated is data, a a company that uses equipment together and exchanges information, apart from computers and communicate with each that. LAN can also be used to connect other . ne of which is exchanging dat. nodes located in areas that are not too far without having to carry a flash disk from away with a maximum radius of 10 km. one computer to another as we usually In computer networks, there are 2 Metropolitan Area Network A protocol is a rule or (MAN) Network mechanism by which two or more Kustanto . A MAN network is computers can connect to each other. a network that uses the same method as The main function of the TCP/IP protocol a LAN but the coverage area of this is to provide a point-to-point mechanism network is wider. MAN connects several on the TCP/IP protocol, to identify each small networks into a larger area machine, each machine connected to the network must have a unique address and supporting text and voice data, and can this address is regulated by the IP protocol which is 32 bits long. networks or radio waves. 2 Types of Computer Networks 3 Wide Area Network (WAN) 1 Local Area Network (LAN) Network MAN Sugeng . A LAN network is a Winarno . WAN networks computer network that covers an area in are networks whose scope already uses one room, one building, or several satellite, wireless or fiber optic cables. adjacent buildings. For example, a WAN has a wider reach into the network in one integrated campus or at a authority areas of other countries. WAN network systems can also use existing public networks, namely the internet. professional associations, business However, when using the internet, you associations, various communication need to pay attention to data security. 4 Internet 3 Algorithm Sofana . Internet is an Interconnection step-by-step procedure for a calculation. Networking. This computer network is Algorithms are used for calculations, international in scale which allows each computer to communicate with each So an algorithm can be said to This network forms an inter- be a way to achieve its goals. The connected network which is connected via the TCP/IP protocol. Developed and procedure of steps has been done in first tested in 1969 by the US Department order to cover the material and get the of Defense in the ARPAnet project. The In mathematics, there is a lot of material such as algorithms, for example computer networks in the world. Its fractions, we have to follow several steps coverage is wider than other computer to do it in order to get the final result. Meanwhile. Maulana . An algorithm is a Connections computer networks can be carried out connected to programming such as with the support of a typical protocol: computer devices and so on. Internal Protocol (IP). Budiman . As we also know. Hakim . In general, there are a lot of material in mathematics can be many benefits that can be obtained if linked or closely related to everyday life. someone has access to the internet. Here Therefore, the conclusion is that an is some of what is available on the algorithm is a set of steps that can cover several materials so that they can be Information is something for personal The algorithm also begins with an attempt to solve the decision problem that has been proposed. Information One of the simple algorithms is to professional/worker find the largest number in an unordered series of numbers. The description is: If there are no numbers in a series then there is no largest number. created on the basis of a tracking mission Think of the first number in the in ancient times. So the existence of a series as the largest. programming device creates a storage of For each last number in the series, device files which becomes evidence if and if the last number is greater entered into a computer network. And if than the largest number, let's say it's damaged you can never get it. that number is the largest number in the series. 1 C Programming Language Then the last one, if there are no The C language is a powerful and more numbers left to check, flexible programming language that has assume it is the largest in the programmers to develop programs. So, in a material scope, several steps are Every program written using the C actually set out which are even clearly language must have a main function, called main(). This function will be called first 4 Programing during the program execution process. Retta . Programming is a This means that if we have other step in writing, testing and digesting or functions besides the main function, then improving and embedding code that can these other functions will only be called improve a program on a computer. The when used. The main() function can goal of programming is to carry out return the value 0 to the operating programming based on calculations or system, which means that the program is work that can be adjusted to the running well without any errors. (Joni, programming desires. Programming can also be said to be Below are two forms of the main() an art that can carry out certain systems function framework in C that can both be so that it is often connected with algorithms to become a complete unit of First Form . o return of value to The the operating syste. void main. { created to make it easier in today's modern era where more and more Statement_to_be_executed. technology is being created. The programming itself was also b. Second Form . y returning the value 0 to the operating syste. 50, so the student is unlikely to graduate. The algorithm is as follows: Int main. { Remember and read the names and grades of some of these students. Statement_to_be_executed. If the value is > : 50 so A the statement = passed Return 0. but if value = 50 description = did not pass. The void keyword above is also optional. However, generally these keywords are GNU-Linux Operating System in functions that do not have parameters. Linux is an operating system created by Linus Torvald from Finland in The way Linux works and looks is similar to the UNIX operating system which is the result of the implementation Institute Electrical Electronics Engineers (I. standard for operating systems called Operating Interfacers (POSIX). POSIX standard-based capabilities such as multitasking, virtual memory, shared libraries, proper memory management, and multiuser are already available in Linux. Almost all free software organized by GNU can run on Linux. Even Linux has better performance compared to other commercial operating systems. (Gery. Figure 1. Narrative Algorithm Student graduation algorithm 1 Debian Distribution Question: Loaded some data containing Linux packages can be obtained in the names and grades of students. If a various distributions. Distribution or student's score is greater than or equal to more often called Distro, is the term for 50 then they are declared to have passed. all operating systems that use the Linux Meanwhile, if the value is lower than (Bowo, 2. One of the Linux distributions that is very popular and Approach will also be used in developing this technique is Full Virtualization using Debian Virtual Box. The Top Down approach GNU/Linux distro. Debian has a very requires that a network systems analyst wide community, and has given birth to must understand in depth the school's various derivative distros. business needs and goals as a whole. Here are some interesting things about before building a school computer Debian: network system, including all types of 100% Free information system applications needed Stable and tested distribution to facilitate service activities to network To be able to produce good There are many packages and research that is in line with the research package arrangements available objectives, a research flow is created that with APT facilities is in accordance with the research title Supports and contains steps that can be carried out in the research. Community support is extensive. RESEARCH METHODOLOGY A research method is a scientific method or technique used to obtain data for certain purposes and uses. What is techniques is that a research activity is empirical and systematic. Figure 2. Research Flow RESEARCH FLOW RESULTS Data collection is an important The computer network installed at step for the scientific method, because in general the data collected is used to test Vocational School is a tree topology. This hypotheses that have been formulated. tree topology is a combination of several Apart from that, the author also uses an star topologies used in each VLAN analysis method using the Top Down The following is a picture of the Bina Islam Mandiri Kersana physical network topology installed at DNS used is the DNS server from Bina Islam Mandiri Kersana Vocational Telkom. School as a whole. Web/HTTP Proxy servers are useful for storing or caching certain files from web pages that have been accessed by the client so that if another client accesses the same website, the files will be retrieved from the proxy cache. This is to speed up internet access and reduce traffic congestion on internet routes, because some files are taken from the Figure 3. Physical Network Topology server, not from the internet directly. Installed at Bina Islam Mandiri Kersana Here ClearOs really supports the proxy Vocational School. server function. To start the proxy server, first go to the gateway, then select To set up the ClearOS server, it is proxy and filtering and then select web easier to use Web Config. By connecting a As shown in the following picture: UTP cable from the LAN card server to the client computer . ia switc. then checking the connection by pinging the server from the client. When everything is finished, then open the browser and enter the web config URL and port. Then a picture will appear as follows: Figure 5. Web Proxy Server CONCLUSION Figure 4. DNS server from the ISP, the An algorithm is a step-by-step procedure for a calculation. Algorithms Router OSAy. Andi Yogyakarta,. are used for calculations, data processing Kadir. Abdul. Tri Wahyuni. Terra. AuPengenalan Teknologi InformasiAy. Andi. Yogyakarta algorithm can be said to be a way to achieve its goals. Programming is a step in writing, testing and digesting or improving and embedding code that can Kustanto. Daniel T Saputra. AuMembangun server Internet dengan Mikrotik OSAy. Gava Media. Yogyakarta. improve a program on a computer. The goal of programming is to carry out programming based on calculations or work that can be adjusted to the programming desires. Implementation of research at Bina Islam Mandiri Kersana Vocational School is research that is able to implement a Linux server using ClearOS. The Linux server that has been installed is running according to plan. Based on the connection test results, it can be concluded that the designed virtual network ran well when testing was carried out on the researcher's computer Maulana. Gun Gun. AuPembelajaran Dasar Algoritma Dan Pemrograman Menggunakan ElGoritma Berbasis WebAy. Vol. Halaman 69-73. Sofana. Iwan. AuMembangun Jaringan KomputerAy. Informatika. Bandung. Sugeng,Winarno. Au Jaringan Komputer Dengan TCP/ IP Ay. Modula. Bandung. Suharyanto. Cosmas Eko. AuAnalisis Komparatif Sistem Keamanan Windows 7 Dan Windows 8Ay. Vol. Nomor 1. Halaman 1-21. http://w. com/doc/73119684/ ClearOS-New-Tuto-5-2 and laptop hardware. BIBLIOGRAPHY