Rancangan Up-Link Point to Point Menggunakan Konfigurasi Load Balance and Failover Pada CV. Vyasti Network
Abstract
CV Vyasti Network, a home internet service provider established in 2022, places the stability of internet connectivity as a top priority in its services. Maximum effort is made in the configuration of devices and systems to ensure a stable level of internet availability. In support of this goal, CV Vyasti Network adopts a design that involves the use of wireless back-up media and mixed routing protocol with NDLC method. The main purpose of this design is to minimize downtime when the main link experiences problems. To achieve this, load balancing is used so that downtime can be minimized when one of the links experiences interference. This method has proven to be very effective, especially in the results of its application on CV Fiber To The Home Vyasti.
References
A. M. L. - AMIK BSI Purwokerto and Y. B. - AMIK BSI Purwokerto, “Analisis Sistem Pengelolaan, Pemeliharaan dan Keamanan Jaringan Internet Pada IT Telkom Purwokerto” Evolusi J. Sains dan Manaj., vol. 6, no. 2, pp. 49–56, 2018, doi: 10.31294/evolusi.v6i2.4427.
Adi Wibowo, Ristyo “Perancangan Dan Implementasi Jaringan Wireless Point to Point Untuk Warga Desa Trimodadi Kec Abung Selatan” 2019, [Online].
Annisa Azzahra (2020) berjudul “Simulasi dan Analisa Link Failover sebagai Backup Link Pada Jaringan MultiProtocol Label Switching (MPLS) Menggunakan Routing Border Gateway Protocol (BGP)”
F. Fauzi, R. Darmawan, and J. Junaidi, “Analisis dan Perancangan Load Balancing dan Failover menggunakan link kartu GSM” J. Jiifor, vol. 5, no. 2, p. 39, 2021.
Fathan Abdurrahman Shani Amarta Putra, Primantara Hari Trisnawan, Achmad Basuki (2021). “Analisis Perbandingan Kinerja Metode Single Homing dan Multihoming dengan Protokol Border Gateway Protocol (BGP)” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer e-ISSN: 2548-964X Vol. 5, No. 3, Maret 2021, hlm. 1086-1092 https://j-ptiik.ub.ac.id.
Iwan Sofana, “Network Security Dan Cyber Security” BI-Obses, April 2019, ISBN: 978-623-7131-03-8.
M. Anto, “Implementasi Jaringan Point to Multipoint Menggunakan Metode NDLC” Multinetics, vol. 8, no. 2, pp. 151–159, 2023, doi: 10.32722/multinetics.v8i2.5066.
Rifkie Primartha, “Belajar Security Jaringan Komputer Berbasis Certified Ethical Hacker (CEH)”, BI-Obses, Februari 20223, ISBN: 978-623-7131-74-8.
S. Arisya, Waluyo, and H. Darmono, “Analisis Rugi-Rugi Macrobending Pada Core Serat Optik Berstruktur Singlemode-Multimode-Singlemode” J. JARTEL, vol. 9, no. 2, pp. 11–16, 2019, [Online]. Available: https://jartel.polinema.ac.id/index.php/jartel/article/view/169%0Ahttps://jartel.polinema.ac.id/index.php/jartel/article/download/169/109.
S. Darmawan Suhendar and I. Ikbal, “Optimalisasi Load Balancing Untuk Manajemen Bandwidth Mikrotik Multi Isp Dengan Sistem Konfigurasi Dan Notifikasi Berbasis Android Di Sma Negeri 27 Bandung” 2019, [Online].
S. Darmawan Suhendar and I. Ikbal, “Optimalisasi Load Balancing Untuk Manajemen Bandwidth Mikrotik Multi Isp Dengan Sistem Konfigurasi Dan Notifikasi Berbasis Android Di Sma Negeri 27 Bandung” 2019, [Online].
Uke Kurniawan Usman, Agus Ganda Permana, Gunawan Wibisono (2018). “Jaringan Telekomunikasi Dan Teknologi Informasi”. Buku Konsep dan Teknik Jaringan Telekomunikasi Dan Teknologi Informasi ISBN: 978-602-6232-95-3.
Copyright (c) 2024 Jurnal Teknologi Informasi (JUTECH)

This work is licensed under a Creative Commons Attribution 4.0 International License.