CAPTIVE PORTALDAN IMPLEMENTASI BANDWIDTH MANAGEMENT DI STIKES St. ELISABETH SEMARANG

Authors

  • Eko Siswanto Universitas Sains dan Teknologi Komputer
  • Indra Ava Dianta Universitas Sains dan Teknologi Komputer
  • Danang Danang Universitas Sains dan Teknologi Komputer

DOI:

https://doi.org/10.51903/imk.v1i1.55

Keywords:

Wireless computer network Network Security

Abstract

Computer network is one of the important technologies in the field of information and communication technology which is currently growing rapidly and rapidly. Computer networks within a company or agency are very helpful for work activities to be carried out quickly, precisely and efficiently. Basically, computer network technology cannot be separated by cable as an intermediary medium. Excessive use of cable media will certainly affect the mobility and flexibility of internet and intranet users. Wireless technology is a solution to meet the need for high mobility and flexibility. Wireless technology uses radio waves as a transmission medium, this technology has several advantages including high freedom and flexibility. Users or users can access the internet or intranet as long as they are within wireless range.STICK St. Elisabeth as one of the educational institutions in the health sector so far has had a wireless network or hotspot area, so that teaching staff, students, and visitors at STIKES St. Elisabeth who wants to be connected to the internet or intranet can directly connect to the network without going through network security. This causes the user hotspot not to be managed so that it affects the efficiency of bandwidth usage and network security. To provide a solution to these problems, the authors propose the design of Captive Portal and Implementation of Bandwidth Management STIKES St. Elisabeth uses a Mikrotik RB750G Router.This final project report will describe the stages of designing and implementing hotspot network security at STIKES St. Elisabeth. These stages include analysis of existing networks, planning and design stages of network security which consist of determining security systems, determining topology, data collection and user management. The implementation phase is the process of installing and configuring the network security device system. The things that have been done, and the testing of the security system will be reviewed at the end of the report.

References

Tanenbaum. 2001. Organisasi Komputer Terstruktur. Penerbit Salemba Teknika. Jakarta.

Zakaria, Muhammad. 2015. Pengertian dan Manfaat Jaringan Komputer. Tersedia : http://www.nesabamedia.com. (Akses : Mei 2021)

Izaas el Said. 2009. Pengertian Jaringan Komputer. Tersedia : http://teknodaily.comp/pengertian dan manfaat jaringan komputer. (Akses : Maret 2021)

http://wikipedia.com akses : Maret 2021 Kata Kunci : Pengertian Jaringan Komputer

http://wiipedia.com akses : Maret 2021 Kata Kunci : Switch sebagai Jembatan Pancaporta

http://wikipedia.com akses : Maret 2021 Kata Kunci : Repeater

http://deenugraha.wordpress.com akses : Februari 2021 Kata Kunci : Membuat kabel UTP straight dan Crossover

Edi S Mulyanta. 2005. Pengenalan Protokol Jaringan Wireless. Penerbit Andi. Yogyakarta.

Fahrial, Jaka. 2003. Teknik Konfigurasi LAN.

Hillsouth,. 2009. WLAN, www.hillsouth.com/solutions/pdf/WLAN.pdf (akses : Maret 2021)

https://id.wikipedia.org/wiki/MikroTik akses : Maret 2021 Kata Kunci : Pengertian Mikrotik

http://mikrotikindo.blogspot.co.id/ akses : Maret 2021 Kata Kunci : Konfigurasi Mikrotik

http://mikrotik.co.id akses : Maret 2021 Kata Kunci : Manajemen Hotspot

http://mikrotikindo.blogspot.co.id/ akses : Maret 2021 Kata Kunci : Routerboard Mikrotik

Windowsnetworking.com,“Introduction-Wireless-Networking-Part1”, http://www.windowsnetworking.com/articles_tutorials/IntroductionWireless Networking-Part1.html (akses Maret 2021)

Downloads

Published

2021-06-01

How to Cite

Eko Siswanto, Indra Ava Dianta, & Danang Danang. (2021). CAPTIVE PORTALDAN IMPLEMENTASI BANDWIDTH MANAGEMENT DI STIKES St. ELISABETH SEMARANG. MANAJEMEN, 1(1), 1–16. https://doi.org/10.51903/imk.v1i1.55