Metode PCQ dan Queue Tree untuk Implementasi Manajemen Bandwidth Berbasis Mikrotik

2021 ◽  
Vol 5 (2) ◽  
pp. 407-412
Author(s):  
Febrian Wahyu Christanto ◽  
April Firman Daru ◽  
Arif Kurniawan

Bandwidth problems are the most frequently encountered problems in sharing information traffic or internet access on computer networks. The factor that causes slow internet access is the large number of devices connected to the internet that are not matched by the availability of sufficient bandwidth and the lack of available bandwidth. This can be accommodated with bandwidth management methods. Bandwidth management in Mikotik uses several bandwidth sharing methods such as PCQ (Per Connection Queue), Queue Tree, and HTB (Hierchichal Token Bucket). This research uses 2 (two) bandwidth management methods, namely PCQ and Queue Tree because these methods can divide bandwidth automatically according to the number of active users and are more effective in sharing bandwidth based on Mikrotik. PCQ is a method aimed at optimizing QoS for large-scale internet networks where all queues are the same for all sub-streams, while Queue Tree is a method designed to carry out more complex queuing tasks for network traffic. The purpose of this research is to optimize the limited internet bandwidth so that it can be accessed by all users in the Local Area Network and automate the queue of devices connected to the network according to user needs so as to produce a more stable computer network performance using the network development method, namely NDLC. The results of the tests were carried out 10 times using a bandwidth of 10 Mbps which resulted in an average jitter of 1.64 ms, ping 36.8 ms, 2 Mbps throughput, and 0.1% packet loss so that the QoS of internet access was categorized as satisfactory. It is hoped that from this research the company will be able to save on internet access expenses by maximizing a small bandwidth without having to increase the existing bandwidth.  

Author(s):  
MUSMUHARAM . ◽  
Cosmas Eko Suharyanto

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.


JURTEKSI ◽  
2019 ◽  
Vol 5 (2) ◽  
pp. 113-118
Author(s):  
Mohd. Siddik

Abstract: The use of computer networks at this time has proven to be a very reliable means of communication and source of information. Government agencies, offices are now using the network as a medium for disseminating information. At present, in the implementation of computer networks, it is very necessary for management to optimize the network itself. Therefore it is necessary to do QoS (Quality of Service) Analysis, in order to get optimal network. QoS (Quality of Service) is a technology that can be applied in computer networks to provide optimal services for network users. With the existence of QoS (Quality of Service) allows network administrators to be able to perform bandwidth management to handle various effects due to congestion (congestion) in packet flow traffic in the network. In performing QoS (Quality of Service), a device that can do bandwidth management to the network is built. Mikrotik Routerboard750 is a network device using Linux-based MicroticOS that can be used in the application of QoS (Quality of Service). Keywords: Computer Network, QoS (Quality of Service), Mikrotik Routerboard750  Abstrak: Penggunaan Jaringan komputer pada saat ini telah terbukti sebagai sarana komunikasi dan sumber informasi yang sangat diandalkan. Seluruh instansi pemerintahan, perkantoran saat ini sudah memanfaatkan jaringan sebagai media sarana penyebaran informasi. Saat ini dalam implementasinya jaringan komputer sangat butuh dilakukan manajemen guna optimalimalisasi jaringan itu sendiri. Maka dari itu perlu dilakukan Analasis QoS (Quality of Service), guna mendapatkan jaringan yang optimal. QoS (Quality of Service) merupakan teknologi yang dapat diterapkan dalam jaringan komputer guna memberikan layanan yang optimal bagi para pengguna jaringan. Dengan adanya QoS (Quality of Service) memungkinkan administrator jaringan untuk dapat melakukan manajemen bandwidth guna menangani berbagai efek akibat terjadinya kemacetan (congestion) pada lalu lintas aliran paket di dalam jaringan. Dalam melakukan QoS (Quality of Service) dibutauhan sebuah perangkat yang dapat melakukan manajemen bandwidth terhadap jaringan. Mikrotik Routerboard750 adalah perangkat jaringan menggunakana  MikrotikOS berbasis Linux yang dapat digunakan dalam penerapan QoS (Quality of Service) ini. Kata Kunci: Jaringan Komputer, QoS (Quality of Service), Mikrotik Routerboard750


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 693
Author(s):  
Kvitoslava Obelovska ◽  
Olga Panova ◽  
Vincent Karovič

The performance of Wireless Local Area Network (WLAN) is highly dependent on the processes that are implemented in the Medium Access Control (MAC) sublayer regulated by the IEEE 802.11 standard. In turn, various parameters affect the performance of the MAC sublayer, the most important of which is the number of stations in the network and the offered load. With the massive growth of multimedia traffic, research of the network performance depending on traffic types is relevant. In this paper, we present the impact of a high-/low-priority traffic ratio on WLAN performance with different numbers of access categories. The simulation results show different impact of high-/low-priority traffic ratio on the performance of the MAC sublayer of wireless LANs depending on different network-sizes and on network conditions. Performance of the large network with two access categories and with the prevalent high-priority traffic is significantly higher than in the case of using four categories on the MAC sublayer. This allows us to conclude that the performance improvement of the large network with the prevalent high-priority traffic can be achieved by an adaptive adjustment of the access categories number on the MAC sublayer.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


2021 ◽  
Vol 12 (06) ◽  
pp. 4750-4762
Author(s):  
Yakubu Ajiji Makeri ◽  
Giuseppe T. Cirella ◽  
Francisco Javier Galas ◽  
Hamid Mohsin Jadah ◽  
Adetayo Olaniyi Adeniran

1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


Sign in / Sign up

Export Citation Format

Share Document