Main Article Content
The need for the use of the internet has become very important in helping daily life along with the development of information technology. Wi-fi (wireless fidelity) has a role in building computer network systems today. Wi-Fi can be defined as a technology that uses electronic equipment to exchange data using radio waves (wireless) through a computer network. Yayasan Patra Mandiri 01 Palembang office has used the Wi-Fi facility but there is no user restriction facility available. This causes frequent lag when accessing the internet. This study aims to limit Wi-Fi users at the Yayasan Patra Mandiri 01 Palembang office and to find out the importance of using a Wi-Fi network in meeting information needs at the Kantor Yayasan Patra Mandiri 01 Palembang office. The user restriction process is carried out by configuring internet protocol (IP) addresses using the dynamic host configuration protocol (DHCP) facility on Mikrotik equipment. The result of this research is that there is a user restriction facility on the Wi-Fi network of the Patra Mandiri 01 Palembang Foundation Office.
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author who submits the manuscript must understand and agree that if accepted for publication, the copyright of the article belongs to JICON and Nusa Cendana University as the journal publisher. Copyright (copyright) includes the exclusive right to reproduce and provide articles in all forms and media, including reprints, photographs, microfilm and any other similar reproductions, as well as translations. The author has the right for the following:
1. reproduce all or part of published material for the author's own use as classroom teaching materials or oral presentation materials in various forums;
2. reuse part or all of the material as compilation material for the author's written work;
2. make copies of published material for distribution within the institution where the author works.
JICON and Nusa Cendana University and Editors make every effort to ensure that no data, opinion or statement is wrong or misleading to be published in this journal. The content of articles published on JICON is the sole and exclusive responsibility of their respective authors.
 G. Ardiansa and R. Primananda, “Manajemen Bandwidth dan Manajemen Pengguna pada Jaringan Wireless Mesh Network dengan Mikrotik,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 1, no. 11, 2017.
 M. F. Asnawi, “APLIKASI KONFIGURASI MIKROTIK SEBAGAI MANAJEMEN BANDWIDTH DAN INTERNET GATEWAY BERBASIS WEB,” Jurnal Penelitian dan Pengabdian Kepada Masyarakat UNSIQ, vol. 5, no. 1, 2018, doi: 10.32699/ppkm.v5i1.437.
 M. J. N. Yudianto, “Jaringan Komputer dan Pengertiannya,” Ilmukomputer.Com, vol. Vol.1, 2014.
 R. N. Dasmen and F. Kurniawan, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” Techno.Com, vol. 20, no. 4, pp. 527–539, 2021, doi: 10.33633/tc.v20i4.5170.
 M. Prawiro, “Pengertian Switch: Fungsi, Jenis, dan Cara Kerja Switch,” maxmanroe.com, 2019.
 I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” Jurnal Teknologi Informasi Indonesia (JTII), vol. 2, no. 2, 2019, doi: 10.30869/jtii.v2i2.312.
 M. K. Sriani, “Arsitektur Dan Organisasi Komputer,” Arsitektur Dan Organisasi Komputer, 2020.
 R. Novrianda Dasmen, “Implementasi Raspberry Pi 3 Sebagai Wireless Access Point Pada STIPER Sriwigama Palembang,” Jurnal Informatika: Jurnal Pengembangan IT, vol. 3, no. 3, pp. 387–393, 2018, doi: 10.30591/jpit.v3i3.943.
 A. D. L. Tumuli, X. B. N. Najoan, and A. Sambul, “Implementasi Teknologi Biometrical Identification untuk Login Hotspot,” Jurnal Teknik Informatika, vol. 12, no. 1, 2017, doi: 10.35793/jti.12.1.2017.17873.