Computer Network Analysis Using The Queue System In Mikrotik Computer Network Analysis Using The Queue System In Mikrotik
Main Article Content
Abstract
Nowadays the development of the internet has been very rapid along with its development, internet traffic has become very dense. Therefore an administrator must be very clever to do bandwidth management. Bandwidth management is very important in managing bandwidth allocation that will be given to users to avoid struggling for bandwidth allocation on the network. By using a proxy router, an administrator can easily do that, however, within the proxy router, there are several queuing methods that can be used to manage bandwidth. the purpose of this study is (i) Can implement bandwidth management using the queue system on the router, (ii) Can know the queuing system testing to handle network traffic using a router. The research methods used are identification, design, implementation and testing. The results obtained are the best transfer rate with a total value of 112.7216 KB/second using the BFIFO queuing system. The smallest bytes queue is PCQ with a total value of 276.8 MiB and the most is SFQ with a total value of 283.4 MiB, the smallest queue of packets is RED with a total value of 220861 packets and the most is BFIFO with a total value of 225414 packets.
Downloads
Article Details
[2] Ritzkal, Keamanan Jaringan Cyber, 1st ed. Bogor: UIKA Press, 2019.
[3] Agustia Wilmadi, Kadek. “Analisis Management Bandwitdh Dengan Metode PCQ (Per Connection Queue) dan HTB (Hierarchical Token Bucket) dengan menggunakan router mikrotik” Januari 2013..
[4] Sofana, Iwan. Jaringan Komputer Berbasis Mikrotik, Penerbit Informatika, 2017.
[5] Sukri, Jumiati. “Analisa Bandwitdh Menggunakan Metode Antrian Per Connection Queue”, Fakultas Teknik, Universitas Abdurrab, 2017.
[6] D. S. Firdaus, R. Ritzkal, and A. H. Hendrawan, “Analisis Keamanan Vulnerability pada Server Cloud Open Media Vault di Fakultas Teknik Universitas Ibn Khaldun Bogor,” Pros. Semnastek, vol. 0, no. 0, Nov. 2019, Accessed: Jan 29, 2020. [Online]. Available: https://jurnal.umj.ac.id/index.php/semnastek/article/view/5241.
[7] I. Kamilah, R. Ritzkal, and A. H. Hendrawan, “A nalisis Keamanan Vulnerability p ada Server Absensi Kehadiran L aboratorium d i Program Studi Teknik Informatika,” Pros. Semnastek, vol. 0, no. 0, Nov. 2019, Accessed: Jan 29, 2020. [Online]. Available: https://jurnal.umj.ac.id/index.php/semnastek/article/view/5233.
[8] R. Ritzkal, “Kinerja Jaringan Nirkable untuk Penentuan Jarak Jangkauan Signal dengan Metode Link Budget,” Dec. 2017, Accessed: Aug. 07, 2019. [Online]. Available: http://publikasiilmiah.ums.ac.id/handle/11617/9494.
[9] M. S. Setiawan, B. A. Prakosa, and A. H. Hendrawan, “SISTEM PENDAFTARAN HOTSPOT MENGGUNAKAN ROUTER MIKROTIK BERBASIS WEB (STUDI KASUS FAKULTAS TEKNIK),” Semin. Nas. Teknol. Inf., vol. 1, pp. 492–506, Jul. 2018.
[10] R. Ritzkal, A. Goeritno, and E. H. P, “PENGUKURAN KUALITAS PERANGKAT LUNAK SISTEM E-LEARNING MENGGUNAKAN METRIC FUNCTION ORIENTED,” Pros. SNATIF, vol. 0, no. 0, pp. 769–776, Sep. 2017.
[11] Ritzkal. “Keamanan Jaringan Cyber – UIKA PRESS.” https://uikapress.uika-bogor.ac.id/?p=639 (accessed Jan 29, 2020).
[12] Ritzkal. “Manajemen Jaringan Untuk Pemula – UIKA PRESS.” https://uikapress.uika-bogor.ac.id/?p=564 (accessed Aug. 29, 2018).