ANALISA PERBANDINGAN PENERAPAN PBR DAN NON PBR PADA PROTOCOL OSPF UNTUK KONEKSI INTERNET
DOI:
https://doi.org/10.30812/matrik.v15i1.26Keywords:
OSPF, Policy Based Routing (PBR), Quality of Service (QoS), Routing, InternetAbstract
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. The stages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confguring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffc transmission of data packets or internet traffc usage by users.
Downloads
References
[2] Putera, Hasdi. (2013). Implementasi dan Analisa Kinerja Policy Based Routing Pada Perangkat CISCO Da HUAWEI, 20, 17-24.
[3] Silk, L.M dan Suhardi. (2011). Pengaruh Model Jaringan Terhadap Optimasi Routing Open Shortest Path First (OSPF), 1, 68-80.
[4] Stiawan, D. (2009). Fundamental Internetworking Development & Design Life Cycle.
[5] Tangaguling, J.S, Limpraptono, F.Y dan Sotyohadi. (2012). Perancangan dan Pembuatan Aplikasi Monitoring Traffc Jaringan Intranet Berbasis Web Dengan Menggunakan Protokol SNMP, 3, 198-202.
[6] Wijaya, C. (2011). Simulasi Pemanfaatan Dynamic Routing Protocol OSPF Pada Router di Jaringan Komputer Unpar. (Internet)
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Ilham Firman Ashari, Vanesa Adhelia, Expert System and IoT for Diagnose of Feline Panleukopenia Virus using Certainty Factor , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Frans Mikael Sinaga, Sio Jurnalis Pipin, Sunaryo Winardi, Karina Mannita Tarigan, Ananda Putra Brahmana, Analyzing Sentiment with Self-Organizing Map and Long Short-Term Memory Algorithms , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Mudafiq Riyan Pratama, Muhammad Yunus, Sistem Deteksi Struktur Kalimat Bahasa Arab Menggunakan Algoritma Light Stemming , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Annisa Nurul Puteri, Suryadi Syamsu, Topan Leoni Putra, Andita Dani Achmad, Support Vector Machine for Predicting Candlestick Chart Movement on Foreign Exchange , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Agus Pribadi, Rancangan Atribut Data Pada Informasi Spasial Satuan Kerja Perangkat Daerah (Pendidikan) Untuk SIGDa Kabupaten Lombok Barat , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Bakhtiyar Hadi Prakoso, Implementasi Support Vector Regression pada Prediksi Inflasi Indeks Harga Konsumen , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Khaerul Yasin, Ahmat Adil, Implementasi Google Maps API Pemetaan Jalur Evakuasi Bencana Alam di Kabupatem Lombok Utara , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Eddy Prasetyo Nugroho, Irawan Afrianto, Rini Nuraini Sukmana, Pengukuran Kelayakan Simulator Forensik Digital Menggunakan Metode Multimedia Mania , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Herman Kabetta, Hermawan Setiawan, Fetty Amelia, Muhammad Qolby Fawzan, Seamless Security on Mobile Devices Textual Password Quantification Model Based Usability Evaluation of Secure Rotary Entry Pad Authentication , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Imam Riadi, Herman Herman, Fitriah Fitriah, Suprihatin Suprihatin, Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Anthony Anggrawan, Raisul Azhar, Bambang Krismono Triwijoyo, Mayadi Mayadi, Developing Application in Anticipating DDoS Attacks on Server Computer Machines , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- Dadang Priyanto, Raisul Azhar, SISTEM APLIKASI UNTUK KEAMANAN DATA DENGAN ALGORITMA 'DES' (Data Encryption Standard) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
- Sadam Husen, Raisul Azhar, APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Raisul Azhar, Kurniawan Kurniawan, APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA RIJNDAEL , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
.png)











