Implementasi Manajemen Bandwidth Menggunakan Metode Queue Tree Pada Jaringan Internet

MUSMUHARAM ., Cosmas Eko Suharyanto

Abstract

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.

Full Text:

PDF 69-76

References

B. Prasetyo, A. Puspitasari, and R. Nasution, “IMPLEMENTASI MANAJEMEN BANDWIDTH DAN FILTERING WEB ACCESS CONTROL MENGGUNAKAN METODE ADDRESS LIST,†no. November, pp. 73–82, 2019.

K. & D. T. Saputra, “Pengertian Jaringan Komputer,†in Belajar Jaringan Komputer berbasis Mikrotik OS, Dharna.A, Ed. Yogyakarta: GAVA MEDIA, 2015, pp. 1–16.

R. Towidjojo, “Introduction to Wireless Local Area Network (WLAN),†in Router Mikrotik Implementasi Wireless LAN Indoor, JASAKOM, 2015, pp. 1–27.

A. Keamanan Jaringan, W. Dengan, K. Bayu, M. Yamin, L. F. Aksara, and J. T. Informatika, “Metode Penetration Testing (Studi Kasus : Laboratorium Sistem Informasi Dan Programming Teknik Informatika Uho),†vol. 3, no. 2, pp. 69–78, 2017.

K. Y. E. A. dan K. S. Mahedy, “Wireless Lan,†in JARINGAN KOMPUTER, Bab 6: GRAHA ILMU, 2014, pp. 37–39.

H. Supendar and Y. Handrianto, “Simple Queue Dalam Menyelesaikan Masalah Manajemen Bandwidth Pada Mikrotik Bridge,†Ict J., vol. 4, no. 1, pp. 21–30, 2017.

R. Towidjojo, Mikrotik Kungfu Kitab Manajemen Bandwith. JASAKOM, 2013.

D. Susianto, “6. Didi Susianto-1-7,†vol. 12, no. 1, 2016.

R. Rudolf Huizen, “Manajemen Jaringan Internet Sekolah Menggunakan Router Mikrotik Dan Proxy Server,†XI Nomor J. Teknol. Inf., vol. 32, pp. 1907–2430, 2016.

P. Simanjuntak et al., “Analisis Penggunaan Access Control List ( Acl ) Dalam Jaringan Komputer Di Kawasan,†J. Teknol. Inf. Politek. Telkom, vol. 1, no. 1, pp. 1–35, 2019.

Refbacks

  • There are currently no refbacks.