ANALISA PERBANDINGAN PENERAPAN PBR DAN NON PBR PADA PROTOCOL OSPF UNTUK KONEKSI INTERNET
DOI:
https://doi.org/10.30812/matrik.v15i1.26Keywords:
OSPF, Policy Based Routing (PBR), Quality of Service (QoS), Routing, InternetAbstract
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. The stages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confguring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffc transmission of data packets or internet traffc usage by users.
Downloads
References
[2] Putera, Hasdi. (2013). Implementasi dan Analisa Kinerja Policy Based Routing Pada Perangkat CISCO Da HUAWEI, 20, 17-24.
[3] Silk, L.M dan Suhardi. (2011). Pengaruh Model Jaringan Terhadap Optimasi Routing Open Shortest Path First (OSPF), 1, 68-80.
[4] Stiawan, D. (2009). Fundamental Internetworking Development & Design Life Cycle.
[5] Tangaguling, J.S, Limpraptono, F.Y dan Sotyohadi. (2012). Perancangan dan Pembuatan Aplikasi Monitoring Traffc Jaringan Intranet Berbasis Web Dengan Menggunakan Protokol SNMP, 3, 198-202.
[6] Wijaya, C. (2011). Simulasi Pemanfaatan Dynamic Routing Protocol OSPF Pada Router di Jaringan Komputer Unpar. (Internet)
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Muhammad Zaki Wiryawan, Didik Dwi Prasetya, Anik Nur Handayani, Tsukasa Hirashima, Wahyu Styo Pratama, Lalu Ganda Rady Putra, Enhancing Semantic Similarity in Concept Maps Using LargeLanguage Models , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Donny Kurniawan, Anthony Anggrawan, Hairani Hairani, Graduation Prediction System on Students Using C4.5 Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 2 (2020)
- Denny Indrajaya, Adi Setiawan, Bambang Susanto, Comparison of k-Nearest Neighbor and Naive Bayes Methods for SNP Data Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Lilik Widyawati, Imam Riadi, Yudi Prayudi, Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)
- Miftahuddin Fahmi, Anton Yudhana, Sunardi Sunardi, Image Processing Using Morphology on Support Vector Machine Classification Model for Waste Image , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Syafri Arlis, Muhammad Reza Putra, Musli Yanto, Improved Image Segmentation using Adaptive Threshold Morphology on CT-Scan Images for Brain Tumor Detection , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- I Putu Hariyadi, Khairan Marzuki, Implementation of Configuration Management Virtual Private Server Using Ansible , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 2 (2020)
- Heru Pramono Hadi, Eko Hari Rachmawanto, Rabei Raad Ali, Comparison of DenseNet-121 and MobileNet for Coral Reef Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Faisal Reza Pradhana, Ilham Mufandi, Aziz Musthafa, Dian Afif Arifah, Khairul Munzilin Al Kahfi, Implementation of Conversational Artificial Intelligence in a3-Dimensional Game onWaste Impact , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Muhammad Yusuf, Arizal Arizal, Ira Rosianal Hikmah, Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Anthony Anggrawan, Raisul Azhar, Bambang Krismono Triwijoyo, Mayadi Mayadi, Developing Application in Anticipating DDoS Attacks on Server Computer Machines , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- Dadang Priyanto, Raisul Azhar, SISTEM APLIKASI UNTUK KEAMANAN DATA DENGAN ALGORITMA 'DES' (Data Encryption Standard) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
- Sadam Husen, Raisul Azhar, APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Raisul Azhar, Kurniawan Kurniawan, APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA RIJNDAEL , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
.png)











