scholarly journals Analisis Kinerja Virtual Router Redudancy Protocol (VRRP) Di Mikrotik Router Pada Dirjen Sumber Daya Air Balai Besar Wilayah Sungai Sumatera VIII

2021 ◽  
Vol 1 (4) ◽  
pp. 233-243
Author(s):  
Alhimni Alhimni ◽  
Ilman Zuhri Yadi

This research is based on the observations and experiences of researchers, that now the internet has become a basic need for an agency, almost all Directorates of Water Resources (SDA) have a computer network. The Directorate of Water Resources (SDA) Central Sumatra River Basin VIII has implemented a network to support the performance of the Directorate of Water Resources (SDA), but still has problems where the network often experiences disconnections due to damage, interference with switches, damage to cables and network connectors. and Hang routers. To meet the internet needs at the Directorate of Water Resources (SDA) Central Sumatra VIII River Basin, stable internet is needed, therefore a failover method is needed. The problem in this research is that there are frequent disturbances in the internet network. The transfer of the main internet line to the backup path is done manually. Given how important the network is to support performance at the Directorate of Water Resources (SDA), the authors suggest to create a failover backup system for Mikrotik routers in the Directorate of Water Resources (SDA). This research uses the Action Research development method, which consists of Diagnostic, Action planning, action taking, evaluating and e-learning. With this application, it is hoped that if there is a problem with the router device, it will not interfere with the use of the existing network. On the internet network of the Directorate of Water Resources (SDA) Central Sumatra River Region VIII.

2019 ◽  
Vol 5 (1) ◽  
pp. 87-92
Author(s):  
Mugi Raharjo ◽  
Frengki Pernando ◽  
Ahmad Fauzi

The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks


Low internet usage by extension agent, impact on the inhibition of the flow of information to the farmers and lead to the income received by farmers. In the digital era today, if the extension agent is not encouraged to use the internet then they will be left behind and will be left out by the farmers. This study aimed to (1) analyze the internet availability in Lampung Province (2) to analyze the level of internet usage for extension agent in Lampung and (3) to analyze factors influencing internet usage of extension agent. This research was conducted in Lampung Province with analysis unit of extension agent in the office of BP3K (Extension Agency of Agriculture, Fisheries, and Forestry) which has been facilitated by computer and internet network. Respondents consisted of 355 extension agent served in BP3K. Multiple Linear Regression Analysis was used to determine the effect of independent variables on the dependent variable. The availability of facilities and internet network in Extension Offices is not sufficient even extension agent used their private facilities. The Internet network had reached the remote areas very well in spreading and transmitting information. Almost all extension agent have internet-connected devices and internet-based applications. Extension agents facilitated by computer and internet network communicating using social media, however capabilities in using the internet to search information related agricultural technology remained low. The use of the internet by extension agent was influenced by the nature of internet innovation, the number of Internet-based applications and the amount of existed hardware.


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2020 ◽  
Vol 5 (1) ◽  
pp. 178
Author(s):  
Taufik Rahman ◽  
Sumarna Sumarna ◽  
Hafis Nurdin

The internet network enters various sectors and is used in various activities, especially in the automation, industry 4.0 trend. Where almost all applications, ranging from desktops, websites, mobile (android and ios) that are used in various fields of education, transportation, banks, logistics, services, of course use high complexity internet networks that need to be analyzed so that high performance can be obtained. Analyzing the performance of MikroTik on the internet is the aim of this research. Research by configuring includes ip route, firewall filter, NAT, Mangle for packet tagging, Queue (bandwidth management), bridge wireless, DHCP and ip cloud DDNS on MikroTik. The results concluded that moving the configuration center point on the modem (giving the IP address down) to the MikroTik router can be done well, it can also translate company, institutional, school and even parent policies to the home internet when children access the internet, such as when it is allowed to access the internet can be arranged, things that may or may not be arranged in order to educate children to use the internet positively, use MikroTik to analyze internet network performance. As for the further research by looking at problems that exist after MikroTik is configured.


2021 ◽  
Vol 9 (2) ◽  
pp. 16-25
Author(s):  
Renaldi Adha Nawawi

Bandwidth management is very important in a computer network concept. Bandwidth management functions to regulate network bandwidth so that each network user gets an evenly distributed bandwidth as a whole, even though there are many network users. In this Java shop, the distribution of bandwidth to each client has not been implemented. , there is no bandwidth management on the Java cafe internet network. The results of the internet speed test at the Java cafe use speedtest.net. The result is the distribution of bandwidth between client 1 and client 2 is not evenly distributed. On client 1 get download and upload speeds up to 0.65 and 1.14 Mbps. While on client 2 only get 2.9 and 1.14 Mbps, due to the absence of a bandwidth management system. Hierarchical Token Bucket (HTB) is a method of bandwidth management, HTB can provide more bandwidth to the client in a few seconds the client will get more bandwidth, the research methodology used is (Network Development Life Cycle) with a system development method for the network which includes the stages of Analysis, Design, Simulation, Implementation, Monitoring, and Management. The results show that bandwidth distribution in each client can be done with each client getting a maximum bandwidth of 768Kbps and getting a bandwidth limit-at of 268Kbps so that customers can still get an internet network even though internet traffic is heavy. . and the use of burst limit as a research method can make each client get additional bandwidth when the internet network is empty and can be accepted by clients or visitors to Java stalls.. and the use of burst limit as a research method can make each client get additional bandwidth when the internet network is empty and can accepted by clients or visitors to shop jawa..


2021 ◽  
Vol 1335-8243 (1338-3957) ◽  
pp. 30-34
Author(s):  
Cyril Filip KOVACIK ◽  
◽  
Gabriel BUGAR ◽  

Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.


2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.


Author(s):  
Jakub Mészáros ◽  
◽  
Pavol Miklánek ◽  
Pavla Pekárová ◽  
◽  
...  

In this paper the results are presented of estimation of T-year specific discharge of several streams in two regions in Slovakia. The Qmax time series used in the study were observed at water gauges from lowland Slovak part of the Morava River basin, and from the mountainous Belá River basin. For estimating the design values, we have studied the use of only one type of probability distribution, namely the Log-Pearson Type III Distribution (LP3 distribution). The use of only one type of distribution brings several benefits, e.g. possibility of the regionalization of the distribution parameters (in this study skew coefficient). In the first step the design values of the specific discharge series qmax (with historical data) were estimated and regional skew coefficients Gr of the LP3 distribution were computed. Regional skewness coefficient Gr was estimated to be 0.38 in the Morava River region, and 0.73 in the Belá River region. In many cases the estimate of the 1000-year specific discharge is two times higher than the value of the 100-year specific discharge. Then we have derived the empirical relations between station skew coefficient G and the elevation of the water gauge. In the second step we have derived the empirical relationships between 1000-years specific discharge q1000 and the elevation of the water gauge for both regions separately. The derived empirical regional equations can be used to estimate the 1000-years specific discharge of other streams in the region.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Sign in / Sign up

Export Citation Format

Share Document