ANALISA PERBANDINGAN PENERAPAN PBR DAN NON PBR PADA PROTOCOL OSPF UNTUK KONEKSI INTERNET
DOI:
https://doi.org/10.30812/matrik.v15i1.26Keywords:
OSPF, Policy Based Routing (PBR), Quality of Service (QoS), Routing, InternetAbstract
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. The stages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confguring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffc transmission of data packets or internet traffc usage by users.
Downloads
References
[2] Putera, Hasdi. (2013). Implementasi dan Analisa Kinerja Policy Based Routing Pada Perangkat CISCO Da HUAWEI, 20, 17-24.
[3] Silk, L.M dan Suhardi. (2011). Pengaruh Model Jaringan Terhadap Optimasi Routing Open Shortest Path First (OSPF), 1, 68-80.
[4] Stiawan, D. (2009). Fundamental Internetworking Development & Design Life Cycle.
[5] Tangaguling, J.S, Limpraptono, F.Y dan Sotyohadi. (2012). Perancangan dan Pembuatan Aplikasi Monitoring Traffc Jaringan Intranet Berbasis Web Dengan Menggunakan Protokol SNMP, 3, 198-202.
[6] Wijaya, C. (2011). Simulasi Pemanfaatan Dynamic Routing Protocol OSPF Pada Router di Jaringan Komputer Unpar. (Internet)
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Lusiana Efrizoni, Junadhi Junadhi, Agustin Agustin, Optimization of Content Recommendation System Based on User Preferences Using Neural Collaborative Filtering , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 2 (2025)
- Arfiani Nur Khusna, Krisvan Patra Delasano, Dimas Chaerul Ekty Saputra, Penerapan User-Based Collaborative Filtering Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- Imam Riadi, Abdul Fadlil, Muhammad Amirul Mu'min, OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Annisa Nurul Puteri, Arizal Arizal, Andini Dani Achmad, Feature Selection Correlation-Based pada Prediksi Nasabah Bank Telemarketing untuk Deposito , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- William Barkem, Jeckson Sidabutar, Digital Forensic Analysis of WhatsApp Business Applications on Android-Based Smartphones Using NIST , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Luh Kesuma Wardhani, Nenny Anggraini, Nashrul Hakiem, M. Tabah Rosyadi, Amin Rois, IoT-based Integrated System Portable Prayer Mat and DailyWorship Monitoring System , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Viva Arifin, Velia Handayani, Luh Kesuma Wardhani, Hendra Bayu Suseno, Siti Ummi Masruroh, User Interface and Exprience Gamification-Based E-Learning with Design Science Research Methodology , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Sri Suwarno, Erick Kurniawan, Multi-Level Pooling Model for Fingerprint-Based Gender Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Pradita Dwi Rahman, Heri Wijayanto, Royana Afwani, Wirarama Wesdawara, Ahmad Zafrullah Mardiansyah, Blockchain-Based TraditionalWeaving Certification and Elliptic Curve Digital Signature , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)
- Irawan Afrianto, Andri Heryandi, Sufa Atin, Blockchain-based Trust, Transparent, Traceable Modeling on Learning Recognition System Kampus Merdeka , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Anthony Anggrawan, Raisul Azhar, Bambang Krismono Triwijoyo, Mayadi Mayadi, Developing Application in Anticipating DDoS Attacks on Server Computer Machines , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- Dadang Priyanto, Raisul Azhar, SISTEM APLIKASI UNTUK KEAMANAN DATA DENGAN ALGORITMA 'DES' (Data Encryption Standard) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
- Sadam Husen, Raisul Azhar, APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Raisul Azhar, Kurniawan Kurniawan, APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA RIJNDAEL , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
.png)











