Main Article Content

Aziz Setyawan Hidayat
Felix Wuryo Handono
Sumarna

Abstract

The selection of the topology used is based on devices that have a non-stop work rate with network devices that have a low level of work being a method of grouping within the network topology. The company has 500 employees and consists of 17 branch offices and 1 head office, while the IP addresses used on all network devices use IPv4 using class B, which is 172.16.0.0 with a subnet mask of /24 or 255.255.255. With the use of class B subnet blocks 172.16.0.0/24, 18 subnet blocks are needed, namely subnet blocks 172.16.0.0/24 to 172.16.17.0/24 because PT Bimasakti Mandiri Perkasa has 1 head office and 17 branch offices. spread throughout Indonesia. Furthermore, when viewed from the side of the use of IP addresses, many IP addresses are not used because they equally divide the provision of addresses at the 18 company offices as many as 254 IP addresses, while the use of IP addresses in each office is different. To make efficient use of IP addresses that will be applied to computer networks, a good method is to use VLSM.

Downloads

Download data is not yet available.

Article Details

How to Cite
Hidayat, A. S., Felix Wuryo Handono and Sumarna (2022) “Ipv4 Lan Mapping Using Vlsm At Pt Bimasakti Mandiri Perkasa Indonesia”, Jurnal Mantik, 6(2), pp. 1876-1884. doi: 10.35335/mantik.v6i2.2690.
References
S. T. Samuel, S. Raharjo, and M. Sholeh, “Perancangan Jaringan Komputer Pada Rumah Sakit Soedarsono Darmosoewito Di Batam,” J. JARKOM, vol. 7, no. 1, pp. 44–59, 2019.

R. N. Dasmen, “Implementasi Metode VLSM (Variable Length Subnet Mask) Pada Pemetaan Ip Address Lan (Local Area Network) Stiper Srwigama Palembang,” Comput. J. Comput. Sci. Inf. Syst., vol. 2, no. 2, p. 112, 2018, doi: 10.24912/computatio.v2i2.1703.

M. A. Zakariah, V. Alfriani, and K. M. Zakariah, “METODOLOGI PENELITIAN KUALITATIF, KUANTITATIF, ACTION RESEARCH, RESEARCH AND DEVELOPMENT (R n D).” Yayasan Pondok Pesantren Al Mawaddah Warrahmah, Kolaka, p. 118, 2020.

S. N. Khasanah, “Keamanan Jaringan Dengan Packet Filtering Firewall (Studi Kasus?: PT Sukses Berkat Mandiri Jakarta),” Rev. Bras. Ergon., vol. 3, no. 2, pp. 80–91, 2016, [Online]. Available: https://ejournal.bsi.ac.id/ejurnal/index.php/khatulistiwa/article/view/1270.

S. Pujowati and B. B. Harianto, “Pengenalan Dasar Jaringan Komputer.” Pustaka Rumah Cinta, Magelang, 2021.

W. Najib, “Panduan Praktikum Jaringan Komputer Laboratorium Jaringan Komputer dan Aplikasi Terdistribusi.” Gadjah Mada University Press, Yogyakarta, 2020.

G. E. Clarke and E. Tetz, “CompTIA A+ Certification All-In-One for Dummies 2nd Edition.” Wiley Publishing Inc, Indianapolis, Indiana, 2010.
K. Thakur, A. Kamruzzaman, and A.-S. K. Pathan, “A Deeper Perspective on the Fundamentals od Digital Communication Security and Privacy Protocols.” CRC Press, Florida, USA, 2022.

O. K. Sulaiman, “13 Lab Cisco Packet Tracer.” Kekata Publisher, Surakarta, 2017.

T. Lammle, “CCNA Routing and Switching Complete Deluxe Study Guide Second Edition.” John Wiley and Sons, Inc, Indianapolis, Indiana, 2016.

R. Weaver, D. Weaver, and D. Farwood, “Guide to Network Defense and Countermeasures Third Edition.” Course Techonlogy, Boston, USA, 2014.

Agusriandi, A. Saputra, K. Asmar, and S. Raehan, “Analisis Rancangan jaringan Komputer dalam Mendukung W-Government.” CV Kitami, Enrekang, 2018.

Al Amien and H. Mukhtar, “Implementasi Jaringan Komputer.” Deepublish Publisher, Yogyakarta, 2020.