ANALYSIS AND IMPLEMENTATION OF UBUNTU AND MIKROTIK BASED SERVER
DOI:
https://doi.org/10.26905/jeemecs.v2i1.2928Keywords:
internet, server, ubuntu, MikroTik, bandwidth managementAbstract
Internet is a primary requirement in this modern era because it is one of the information’s media and communication. Due to its rapid advancement, internet is now a main infrastructure which must be possessed by an organization, institution (education, government, service provider and others). Besides internet, other infrastructure which is also a primary requirement in an institution is a centralized storage or server. Regarding internet’s availability and server, PT Indonesia Terbit Media faces some setbacks such as the unavailability of sufficient bandwidth management and unavailability of centralized information storage. To solve those setbacks, a MikroTik router is offered to be implemented in the company’s network. Before doing research, observation is held in the company to gather information’s regarding current network. Along with observation, focus group discussion is held with the staffs. After information’s are gathered, current network is analyzed then a new topology is proposed. After the proposal is approved, testing phase is initiated to know the contributions of newly proposed network in solving the mentioned setbacks. Results from the implementation are such as bandwidth management is applied in new network which is resulting in stable internet’s speed even though a user is downloading a quite large file and Ubuntu-based centralized server.
References
H. S. Oluwatosin, “Client-Server Model,†IOSR J. Comput. Eng., vol. 16, no. 1, pp. 57–71, 2014.
A. L. I. A. A. RAMADHAN et al., “Analysis of Effectiveness of Using Simple Queue With Per Connection Queue (Pcq) in the Bandwidth Management (a Case Study At the Academy of Information Management and Computer Mataram (Amikom) Mataram),†Journal of Theoretical and Applied Information Technology, vol. 83, no. 3. 2016.
A. Rahman and Haviluddin, “Implementation of Bandwidth Management Authentication,†Int. J. Comput. Informatics, vol. 1, no. 1, pp. 1–8, 2016.
P. Mollick, S. Biswas, A. Halder, and M. R. Salmani, “Mikrotik Router Configuration using IPv6,†Int. J. Innov. Res. Comput. Commun. Eng., vol. 4, no. 2, pp. 2001–2007, 2016.
I. Perwira and Liantoni, “Queue Tree Implementation for Bandwidth Management in Modern Campus Network Architecture,†vol. 3, no. 1, pp. 17–26, 2018.
W. Von Hagen, Ubuntu 8.10 Linux ® ®. Indianapolis: Wiley Publishing, Inc., 2009.
W. Sugeng, J. E. Istiyanto, K. Mustofa, and A. Ashari, “The Impact of QoS Changes towards Network Performance,†Int. J. Comput. Networks Commun. Secur., vol. 3, no. 2, pp. 48–53, 2015.
W. Stallings, Network Security Essentials : Applications and Standards Fourth Edition, 4th (Fourt. Upper Saddle River, New Jearsey: Pearson Education, Inc., 2011.
A. Lockhart, Network Security Hacks, Second Edition, Second Edi. California: O’Reilly Media, Inc., 2009.
D. J. Barrett, R. E. Silverman, and R. G. Byrnes, SSH The Secure Shell, Second Edi. California: O’Reilly Media, Inc., 2005.
H. Hours, E. Biersack, P. Loiseau, A. Finamore, and M. Mellia, “A Study of the Impact of DNS Resolvers on CDN Performance Using a Causal Approach,†Comput. Networks, vol. 109, pp. 200–210, 2016.
W. Stallings, Data and Computer Communications (Eighth Edition). New Jersey: Pearson Education, Inc., 2007.
M. D. L. Siahaan, M. S. Panjaitan, and A. P. U. Siahaan, “MikroTik Bandwidth Management to Gain the Users Prosperity Prevalent,†Int. J. Eng. Trends Technol., vol. 42, no. 5, pp. 218–222, 2016.
V. Negi et al., “Network Security in Embedded System Using TLS,†Int. J. Secur. its Appl., vol. 10, no. 2, pp. 375–384, 2016.
M. A. Zulkifli and U. A. Dahlan, “Live Forensics Method for Analysis Denial of Service ( DOS ) Attack on Routerboard,†Int. J. Comput. Appl., vol. 180, no. 35, pp. 23–30, 2018.
Downloads
Additional Files
Published
Issue
Section
License
Our ethic statements are based on COPE’s Best Practice Guidelines for Journal Editors.
Publication decisions
The editor is responsible for deciding which of the articles submitted to the journal should be published.
The editor may be guided by the policies of the journal's editorial board and constrained by such legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. The editor may confer with other editors or reviewers in making this decision.
Fair play
An editor at any time evaluate manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors.
Confidentiality
The editor and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate.
Disclosure and conflicts of interest
Unpublished materials disclosed in a submitted manuscript must not be used in an editor's own research without the express written consent of the author.
Duties of Reviewers
Contribution to Editorial Decisions
Peer review assists the editor in making editorial decisions and through the editorial communications with the author may also assist the author in improving the paper.
Promptness
Any selected referee who feels unqualified to review the research reported in a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process.
Confidentiality
Any manuscripts received for review must be treated as confidential documents. They must not be shown to or discussed with others except as authorized by the editor.
Standards of Objectivity
Reviews should be conducted objectively. Personal criticism of the author is inappropriate. Referees should express their views clearly with supporting arguments.
Acknowledgement of Sources
Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.
Disclosure and Conflict of Interest
Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.
Duties of Authors
Reporting standards
Authors of reports of original research should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work. Fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable.
Originality and Plagiarism
The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted.
Multiple, Redundant or Concurrent Publication
An author should not in general publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behaviour and is unacceptable.
Acknowledgement of Sources
Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work.
Authorship of the Paper
Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors.
The corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included on the paper, and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication.
Disclosure and Conflicts of Interest
All authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed.
Fundamental errors in published works
When an author discovers a significant error or inaccuracy in his/her own published work, it is the author’s obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper.