Basic Mikrotik Application as Bandwidth Limitation at Teranet One Internet Cafe in Prabumulih
Main Article Content
Abstract
With the development of information technology, the need for the use of the internet is becoming increasingly important in helping daily life. Computer network support equipment is still very much needed. Currently the internet is not only needed to do office work but also to communicate, play games and do school work. Mikrotik has the most important task in building a computer network system. Mikrotik is a computer network hardware that can transmit data to the network. Mikrotik also acts as a liaison between many networks to transfer data from one network to another. Mikrotik is priced at a fairly high price and is still difficult to reach by the general public, so an operating system is formed, namely Mikrotik Router OS. Mikrotik Router OS is a solution for those who need a reliable router only with a personal computer (standalone) with the Mikrotik operating system. The internet cafe (warnet) of Teranet One is experiencing a bandwidth leak problem where users can access the internet without any bandwidth restrictions. Therefore, it takes a bandwidth limitation system using Mikrotik. With this bandwidth limitation system, bandwidth leaks can be overcome and the upload and download speeds of each user can be regulated.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
The author who submits the manuscript must understand and agree that if accepted for publication, the copyright of the article belongs to JICON and Nusa Cendana University as the journal publisher. Copyright (copyright) includes the exclusive right to reproduce and provide articles in all forms and media, including reprints, photographs, microfilm and any other similar reproductions, as well as translations. The author has the right for the following:
1. reproduce all or part of published material for the author's own use as classroom teaching materials or oral presentation materials in various forums;
2. reuse part or all of the material as compilation material for the author's written work;
2. make copies of published material for distribution within the institution where the author works.
JICON and Nusa Cendana University and Editors make every effort to ensure that no data, opinion or statement is wrong or misleading to be published in this journal. The content of articles published on JICON is the sole and exclusive responsibility of their respective authors.
References
[2] R. Aliansyah, Y. N. Kuanag, M. Kom, A. I. Wijaya, and L. B. Handoko, “Manajemen Bandwidth Dengan Metode Htb (Hierarchical Token Bucket) Pada Sekolah Menengah Pertama Negeri 5 Semarang,” Jurnal Teknik Informatika Udinus, vol. 1, no. 1, pp. 5–7, 2015.
[3] E. Darmawan, I. Purnama, T. Ihromi, R. Mahardika, and I. W. S. Wicaksana, “Bandwidth Manajemen Queue Tree VS Simple Queue,” Konferensi Nasional Sistem Informasi, pp. 642–647, 2012.
[4] Purwanto, Kusrini, and R. R. Huizen, “Manajemen Jaringan Internet Sekolah Menggunakan Router Mikrotik Dan Proxy Server,” XI Nomor Jurnal Teknologi Informasi, vol. 32, pp. 1907–2430, 2016.
[5] A. Restu Mukti and R. Novrianda Dasmen, “Prototipe Manajemen Bandwidth pada Jaringan Internet Hotel Harvani dengan Mikrotik RB 750r2,” Jurnal Informatika: Jurnal Pengembangan IT, vol. 4, no. 2, 2019, doi: 10.30591/jpit.v4i2.1322.
[6] A. Putri, Fatoni, and I. Solikin, “Analisa Kinerja Koneksi Jaringan Komputer Pada Smk Teknologi Bistek Palembang,” Universitas Bina Darma, no. 12, 2016.
[7] M. Nahak, “Bab II Tinjauan Pustaka Dan Landasan Teori,” Journal of Chemical Information and Modeling, vol. 53, no. 9, pp. 21–25, 2017.
[8] G. Ardiansa and R. Primananda, “Manajemen Bandwidth dan Manajemen Pengguna pada Jaringan Wireless Mesh Network dengan Mikrotik,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 1, no. 11, p. 47, 2017.
[9] U. Udayana, I. D. Made, B. Atmaja, I. G. Oka, and G. Atitama, “Modul Workshop Mikrotik Fundamental”.
[10] Dataglobal.com, “Pengertian LAN, MAN, WAN serta fungsi & kelebihan kekurangan,” 4 november 2020, 2020.
[11] M. Prawiro, “Pengertian Switch: Fungsi, Jenis, dan Cara Kerja Switch,” maxmanroe.com, 2019.
[12] R. Novrianda Dasmen, “Implementasi Raspberry Pi 3 Sebagai Wireless Access Point Pada STIPER Sriwigama Palembang,” Jurnal Informatika: Jurnal Pengembangan IT, vol. 3, no. 3, pp. 387–393, 2018, doi: 10.30591/jpit.v3i3.943.
[13] R. N. Dasmen and F. Kurniawan, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” Techno.Com, vol. 20, no. 4, 2021, doi: 10.33633/tc.v20i4.5170.