scholarly journals Analisis Performa RouterOS MikroTik pada Jaringan Internet

2020 ◽  
Vol 5 (1) ◽  
pp. 178
Author(s):  
Taufik Rahman ◽  
Sumarna Sumarna ◽  
Hafis Nurdin

The internet network enters various sectors and is used in various activities, especially in the automation, industry 4.0 trend. Where almost all applications, ranging from desktops, websites, mobile (android and ios) that are used in various fields of education, transportation, banks, logistics, services, of course use high complexity internet networks that need to be analyzed so that high performance can be obtained. Analyzing the performance of MikroTik on the internet is the aim of this research. Research by configuring includes ip route, firewall filter, NAT, Mangle for packet tagging, Queue (bandwidth management), bridge wireless, DHCP and ip cloud DDNS on MikroTik. The results concluded that moving the configuration center point on the modem (giving the IP address down) to the MikroTik router can be done well, it can also translate company, institutional, school and even parent policies to the home internet when children access the internet, such as when it is allowed to access the internet can be arranged, things that may or may not be arranged in order to educate children to use the internet positively, use MikroTik to analyze internet network performance. As for the further research by looking at problems that exist after MikroTik is configured.

2021 ◽  
Vol 8 (1) ◽  
pp. 92-97
Author(s):  
Muhammad Fariz ◽  
Riza Arifudin

The purpose of this research is to make comparisons on the internet network using the application of the Burst method and processed with Quality of Service analysis in which there are parameters of throughput, delay, and jitter. This analysis was carried out because there was a problem with a slow internet network. This happens because there is no configured bandwidth management on the Microtic router and also the unequal distribution of bandwidth when more and more bandwidth users. Burst is one of the bandwidth management methods available on the Microtic router. This study focuses on the implementation of Burst which is applied to one client2 and will be compared with client1 without the application of Burst. Quality of Service analysis is performed to test the parameters of throughput, delay, and jitter on each of the internet networks. After this test is complete, it shows that the results of using the Burst method as a bandwidth regulator, internet network access can be controlled and each client gets the bandwidth evenly as needed. The work result using Burst is more optimal than performance without using Burst. By using Burst the number of packets lost and failed transactions is reduced by more than 70%.


Author(s):  
Nurbaiti Nurbaiti ◽  
Nadhrah Al Aflah ◽  
Supardi Supardi

Almost all corners of the world have been affected or affected by this Covid-19 virus disease, even some countries have set a lockdown status and other anticipations for the spread of the Covid-19 virus. The alternative used in this bold learning activity system is to utilize the internet network, namely the Zoom Meeting and Classroom application. This study aims to determine students' perceptions of the use of internet networks such as zoom meetings and classrooms used and how effective learning is during the Covid-19 pandemic. The research conducted here uses descriptive qualitative research methods. And the results of this study indicate that the zoom application is an application that is very effective and preferred by students because it is easier to use and very efficient when the learning process is bold and shows that some students who give their perception of the application used during learning that are brave are the Zoom Meeting application, namely the application. Zoom Meeting. by 66.7%, followed by the Google Meet application at 22.2% and the Classrom application at 11.1%.  


2019 ◽  
Vol 10 (03) ◽  
pp. 114-121
Author(s):  
Armanto Armanto

ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover


2021 ◽  
Vol 5 (2) ◽  
pp. 407-412
Author(s):  
Febrian Wahyu Christanto ◽  
April Firman Daru ◽  
Arif Kurniawan

Bandwidth problems are the most frequently encountered problems in sharing information traffic or internet access on computer networks. The factor that causes slow internet access is the large number of devices connected to the internet that are not matched by the availability of sufficient bandwidth and the lack of available bandwidth. This can be accommodated with bandwidth management methods. Bandwidth management in Mikotik uses several bandwidth sharing methods such as PCQ (Per Connection Queue), Queue Tree, and HTB (Hierchichal Token Bucket). This research uses 2 (two) bandwidth management methods, namely PCQ and Queue Tree because these methods can divide bandwidth automatically according to the number of active users and are more effective in sharing bandwidth based on Mikrotik. PCQ is a method aimed at optimizing QoS for large-scale internet networks where all queues are the same for all sub-streams, while Queue Tree is a method designed to carry out more complex queuing tasks for network traffic. The purpose of this research is to optimize the limited internet bandwidth so that it can be accessed by all users in the Local Area Network and automate the queue of devices connected to the network according to user needs so as to produce a more stable computer network performance using the network development method, namely NDLC. The results of the tests were carried out 10 times using a bandwidth of 10 Mbps which resulted in an average jitter of 1.64 ms, ping 36.8 ms, 2 Mbps throughput, and 0.1% packet loss so that the QoS of internet access was categorized as satisfactory. It is hoped that from this research the company will be able to save on internet access expenses by maximizing a small bandwidth without having to increase the existing bandwidth.  


2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.


2020 ◽  
Vol 2 (2) ◽  
pp. 70
Author(s):  
Galih Fanani ◽  
Imam Riadi

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.


2019 ◽  
Vol 5 (1) ◽  
pp. 87-92
Author(s):  
Mugi Raharjo ◽  
Frengki Pernando ◽  
Ahmad Fauzi

The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks


Low internet usage by extension agent, impact on the inhibition of the flow of information to the farmers and lead to the income received by farmers. In the digital era today, if the extension agent is not encouraged to use the internet then they will be left behind and will be left out by the farmers. This study aimed to (1) analyze the internet availability in Lampung Province (2) to analyze the level of internet usage for extension agent in Lampung and (3) to analyze factors influencing internet usage of extension agent. This research was conducted in Lampung Province with analysis unit of extension agent in the office of BP3K (Extension Agency of Agriculture, Fisheries, and Forestry) which has been facilitated by computer and internet network. Respondents consisted of 355 extension agent served in BP3K. Multiple Linear Regression Analysis was used to determine the effect of independent variables on the dependent variable. The availability of facilities and internet network in Extension Offices is not sufficient even extension agent used their private facilities. The Internet network had reached the remote areas very well in spreading and transmitting information. Almost all extension agent have internet-connected devices and internet-based applications. Extension agents facilitated by computer and internet network communicating using social media, however capabilities in using the internet to search information related agricultural technology remained low. The use of the internet by extension agent was influenced by the nature of internet innovation, the number of Internet-based applications and the amount of existed hardware.


2018 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Khairul Saleh ◽  
Tini Fitriani

Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account.   Keywords - Security System, Speedy Network


Author(s):  
Bayu Kanigoro ◽  
Denny Christanto ◽  
Sigit Hartanto ◽  
Steven Steven

This research describes the improvement of computer network performance with bandwidth management in Kemurnian II Senior High School. The main issue of this research is the absence of bandwidth division on computer, which makes user who is downloading data, the provided bandwidth will be absorbed by the user. It leads other users do not get the bandwidth. Besides that, it has been done IP address division on each room, such as computer, teacher and administration room for supporting learning process in Kemurnian II Senior High School, so wireless network is needed. The method is location observation and interview with related parties in Kemurnian II Senior High School, the network analysis has run and designed a new topology network including the wireless network along with its configuration and separation bandwidth on microtic router and its limitation. The result is network traffic on Kemurnian II Senior High School can be shared evenly to each user; IX and IIX traffic are separated, which improve the speed on network access at school and the implementation of wireless network.Keywords: Bandwidth Management; Wireless Network


Sign in / Sign up

Export Citation Format

Share Document