• Tidak ada hasil yang ditemukan

BANDWIDTH MANAGEMENT USING HOTSPOT AND MANGLE METHODS AND ANALYSIS OF INTERNET USING TRAFFIC FOR ONLINE GAMES AND STREAMING AND ATTACK TRAFFIC USING MICROTIK IN DALU KOPI

N/A
N/A
Protected

Academic year: 2023

Membagikan "BANDWIDTH MANAGEMENT USING HOTSPOT AND MANGLE METHODS AND ANALYSIS OF INTERNET USING TRAFFIC FOR ONLINE GAMES AND STREAMING AND ATTACK TRAFFIC USING MICROTIK IN DALU KOPI"

Copied!
1
0
0

Teks penuh

(1)

BANDWIDTH MANAGEMENT USING HOTSPOT AND MANGLE METHODS AND ANALYSIS OF INTERNET USING TRAFFIC FOR ONLINE GAMES AND STREAMING AND ATTACK TRAFFIC USING

MICROTIK IN DALU KOPI

Muhammad Ridwan

Computer Engineering Study Program, Faculty of Science and Technology University of Technology Yogyakarta

Jl. Ringroad Utara Jombor Sleman Yogyakarta E-mail : [email protected]

ABSTRACT

Bandwidth is the frequency band width where this frequency band is used for data transmission in electronic transmission media in data communications. The large number of users using internet connections to access various sites can result in congestion in the use of available bandwidth and cause connections to slow down.

One way to overcome this is by implementing bandwidth management techniques. Hotspot itself is a network connection without using cables or commonly known as wireless. Wireless connections are now widely used, especially in places like coffee shops because this connection is considered more practical than a cable connection. Plus, today's users mostly use devices such as cellphones and laptops that don't have ports for LAN cables, so wireless connections are very easy to implement. An access point is a device used in a wireless network connection (Hotspot area) where all users are connected without using a LAN cable but using air media. Apart from Bandwidth Management, another thing that needs to be considered is the network security system, which is very important to pay attention to so that network security is better maintained. DDOS attack or Distributed Denial of Service is a cyber attack by continuously sending fake traffic to a system or server. As a result, the server cannot manage all traffic, causing it to go down. Usually before carrying out a DDoS attack, the attacker will carry out port scanning to look for open ports to find out which ports can be used as an attack route. The implementation of this network installation consists of installing an RJ45 connector on a UTP cable, configuring an access point, configuring a MikroTik Hotspot server.

Keywords: Wireless, MikroTik, Hotspot, Bandwidth Management, Traffic

Referensi

Dokumen terkait

Dear Faculty Member You can embed an image to the answer choices as follows: 1.Test Panel  Question Settings.. 2.Enable Add image, files and web link to

2016; Total 2016 Target Performance Indicator 2 : Percentage of graduates who engaged in employment or whose employment status improved within 1 year of graduation Survey conducted