Implementation of Wi-Fi User Restrictions at The Patra Mandiri Foundation Office 01 Palembang

Main Article Content

Rahmat Novrianda Dasmen
Muhamad Dito Nugraha
Adelia Adelia


The need for the use of the internet has become very important in helping daily life along with the development of information technology. Wi-fi (wireless fidelity) has a role in building computer network systems today. Wi-Fi can be defined as a technology that uses electronic equipment to exchange data using radio waves (wireless) through a computer network. Yayasan Patra Mandiri 01 Palembang office has used the Wi-Fi facility but there is no user restriction facility available. This causes frequent lag when accessing the internet. This study aims to limit Wi-Fi users at the Yayasan Patra Mandiri 01 Palembang office and to find out the importance of using a Wi-Fi network in meeting information needs at the Kantor Yayasan Patra Mandiri 01 Palembang office. The user restriction process is carried out by configuring internet protocol (IP) addresses using the dynamic host configuration protocol (DHCP) facility on Mikrotik equipment. The result of this research is that there is a user restriction facility on the Wi-Fi network of the Patra Mandiri 01 Palembang Foundation Office.


Download data is not yet available.

Article Details

How to Cite
R. Dasmen, M. Nugraha, and A. Adelia, “Implementation of Wi-Fi User Restrictions at The Patra Mandiri Foundation Office 01 Palembang”, jicon, vol. 10, no. 1, pp. 18-23, Mar. 2022.


[1] E. T. A. Apriyanto and M. B. R. Mubaraq, “Perancangan Program Pengajuan Pemasangan Wifi Publik Kota Depok Berbasis Web,” Jurnal Sistem Informasi & Manajemen Basis Data (SIMADA) Vol, vol. 4, no. 2, pp. 79–91, 2021.
[2] G. Ardiansa and R. Primananda, “Manajemen Bandwidth dan Manajemen Pengguna pada Jaringan Wireless Mesh Network dengan Mikrotik,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 1, no. 11, 2017.
[3] M. F. Asnawi, “APLIKASI KONFIGURASI MIKROTIK SEBAGAI MANAJEMEN BANDWIDTH DAN INTERNET GATEWAY BERBASIS WEB,” Jurnal Penelitian dan Pengabdian Kepada Masyarakat UNSIQ, vol. 5, no. 1, 2018, doi: 10.32699/ppkm.v5i1.437.
[4] M. J. N. Yudianto, “Jaringan Komputer dan Pengertiannya,” Ilmukomputer.Com, vol. Vol.1, 2014.
[5] R. N. Dasmen and F. Kurniawan, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” Techno.Com, vol. 20, no. 4, pp. 527–539, 2021, doi: 10.33633/tc.v20i4.5170.
[6] M. Prawiro, “Pengertian Switch: Fungsi, Jenis, dan Cara Kerja Switch,”, 2019.
[7] I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” Jurnal Teknologi Informasi Indonesia (JTII), vol. 2, no. 2, 2019, doi: 10.30869/jtii.v2i2.312.
[8] M. K. Sriani, “Arsitektur Dan Organisasi Komputer,” Arsitektur Dan Organisasi Komputer, 2020.
[9] R. Novrianda Dasmen, “Implementasi Raspberry Pi 3 Sebagai Wireless Access Point Pada STIPER Sriwigama Palembang,” Jurnal Informatika: Jurnal Pengembangan IT, vol. 3, no. 3, pp. 387–393, 2018, doi: 10.30591/jpit.v3i3.943.
[10] A. D. L. Tumuli, X. B. N. Najoan, and A. Sambul, “Implementasi Teknologi Biometrical Identification untuk Login Hotspot,” Jurnal Teknik Informatika, vol. 12, no. 1, 2017, doi: 10.35793/jti.12.1.2017.17873.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.