COMPARISON ANALYSIS OF BANDWIDTH SPEED USING MIKROTIK ROUTERBOARD 750
Abstract
The purpose of this study is to analyze and optimize bandwidth management at aminet cafes which often experience bandwidth leakage problems where users can access the internet without any bandwidth restrictions. Bandwidth management in this study uses a proxy and Queue Tree with the Network Development Life Cycle (NDLC) system development method. The results of the study show that bandwidth management runs optimally with balanced upload and download speeds for each user because the bandwidth distribution process has been carried out. The average upload speed is 121 kbps and the download speed is 732kbps.
References
Arius, E. D., Sucipto, & Andriyanto, T. (2022). Sistem Manajemen Jaringan Menggunakan Sistem Voucher dengan Monitoring Telegram Network Management System Using Voucher System with Telegram Monitoring. Research : Journal of Computer, 5(1), 41–47.
Arta, Y., Syukur, A., & Kharisma, R. (2018). Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik. It Journal Research and Development, 3(1), 104–114. https://doi.org/10.25299/itjrd.2018.vol3(1).1346
Darmadi, E. A. (2019). Manajemen Bandwidth Internet Menggunakan Mikrotik Router Di Politeknik Tri Mitra Karya Mandiri. Ikra-ITH Teknologi: Jurnal Sains & Teknologi, 3(3), 7–13. http://journals.upi-yai.ac.id/index.php/ikraith-humaniora/article/download/698/538
Dasmen, R. N., Pangestu, K., & Saputra, K. (2022). Aplikasi Mikrotik Dasar Sebagai Pembatasan Bandwidth pada Warung Internet Teranet One di Prabumulih. Jurnal Komputer Dan Informatika, 10(1), 72–77. https://doi.org/10.35508/jicon.v10i1.6270
Gunawan, H., Simorangkir, H., & Ghiffari, M. (2018). Pengelolaan Jaringan Dengan Router Mikrotik Untuk Meningkatkan Efektifitas Penggunaan Bandwith Internet (Studi Kasus Smk Ki Hajar Dewantoro Kota Tangerang). Jurnal Ilmu Komputer, 3(1), 54.
Naya, C., Zahroh, L., Studi, P., Informatika, T., Teknik, F., Pelita, U., Management, B., & Routeros, M. (2021). Jurnal Teknologi Pelita Bangsa. 12(4), 231–236.
Prayoga, S. (2021). Analisa Manajemen Bandwith Simple Queue Dan Queue Tree. Jurnal Mahasiswa Aplikasi Teknologi Komputer Dan Informasi, 3(3), 95–101.
Prihantoro, C., Hidayah, A. K., & Fernandez, S. (2021). Analisis Manajemen Bandwidth Menggunakan Metode Queue Tree pada Jaringan Internet Universitas Muhammadiyah Bengkulu. Just TI (Jurnal Sains Terapan Teknologi Informasi), 13(2), 81. https://doi.org/10.46964/justti.v13i2.750
Putra, Y. K., Sadali, M., & Mahpuz. (2020). Penerapan Mikrotik Dalam Mengembangkan Infrastruktur Jaringan Pada Kantor Desa Rumbuk Kecamatan Sakra. Infotek : Jurnal Informatika Dan Teknologi, 3(2), 182–193. https://doi.org/10.29408/jit.v3i2.2350
Rahmawan, A., Saitya, I., Putri, I. A., & Rahman, S. (2022). Pembangunan Infastruktur Internet Murah (RT/RW Net) pada Masyarakat Santi Kota Bima. Remik, 6(3), 448–454. https://doi.org/10.33395/remik.v6i3.11606
Rizal, R. A., & HS, C. (2019). Analysis of Facial Image Extraction on Facial Recognition using Kohonen SOM for UNPRI SIAKAD Online User Authentication. SinkrOn, 4(1), 171. https://doi.org/10.33395/sinkron.v4i1.10242
Rizal, R. A., Purba, N. O., Siregar, L. A., Sinaga, K., & Azizah, N. (2020). Analysis of Tuberculosis (TB) on X-ray Image Using SURF Feature Extraction and the K-Nearest Neighbor (KNN) Classification Method. Jaict, 5(2), 9. https://doi.org/10.32497/jaict.v5i2.1979
Siddik, M., Lubis, A. P., & Sahren. (2023). OPTIMALISASI KECEPATAN JARINGAN INTERNET PADA MTS. 4307(1), 117–122.
Syukur, A. (2018). Analisis Management Bandwidth Menggunakan Metode Per Connection Queue (PCQ) dengan Authentikasi RADIUS. It Journal Research and Development, 2(2), 78–89. https://doi.org/10.25299/itjrd.2018.vol2(2).1260
Tantoni, A., Zaen, M. T. A., & Imtihan, K. (2019). ANALISIS KEBUTUHAN KECEPATAN BANDWIDTH GAME ONLINE (Free fire, Mobile Legends, Pubg mobile). Jurnal Informatika Dan Rekayasa Elektronik, 2(2), 81. https://doi.org/10.36595/jire.v2i2.122
Yennimar, Rizal, R. A., Husein, A. M., & Harahap, M. (2019). Sentiment analysis for opinion IESM product with recurrent neural network approach based on long short term memory. 2019 International Conference of Computer Science and Information Technology, ICoSNIKOM 2019, December 2020. https://doi.org/10.1109/ICoSNIKOM48755.2019.9111516
Copyright (c) 2023 Ericky Benna Perolihin Manurung, Mutammimul Ula
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The copyright of any article in the TECHNO Nusa Mandiri Journal is fully held by the author under the Creative Commons CC BY-NC license.
- The copyright in each article belongs to the author.
- Authors retain all their rights to published works, not limited to the rights set out on this page.
- The author acknowledges that Techno Nusa Mandiri: Journal of Computing and Information Technology (TECHNO Nusa Mandiri) is the first to publish with a Creative Commons Attribution 4.0 International license (CC BY-NC).
- Authors can enter articles separately, manage non-exclusive distribution, from manuscripts that have been published in this journal into another version (for example: sent to author affiliation respository, publication into books, etc.), by acknowledging that the manuscript was published for the first time in Techno Nusa Mandiri: Journal of Computing and Information Technology (TECHNO Nusa Mandiri);
- The author guarantees that the original article, written by the stated author, has never been published before, does not contain any statements that violate the law, does not violate the rights of others, is subject to the copyright which is exclusively held by the author.
- If an article was prepared jointly by more than one author, each author submitting the manuscript warrants that he has been authorized by all co-authors to agree to copyright and license notices (agreements) on their behalf, and agrees to notify the co-authors of the terms of this policy. Techno Nusa Mandiri: Journal of Computing and Information Technology (TECHNO Nusa Mandiri) will not be held responsible for anything that may have occurred due to the author's internal disputes.