Performance analysis and development of OPD interconnection network using NDLC method in Boven Digoel Diskominfo Papua Province

Puspa Ira Dewi Candra Wulan, Danis Putra Perdana, Aldhi Ari Kurniawan

Submitted : 2022-02-15, Published : 2022-06-30.

Abstract

Computer network analysis is very important to help improve network performance. Many companies, including digoel boven diskominfo designed their network but not according to their business goals, so their current performance is not what they expected. Boven Digoel Diskominfo uses internet interconnection between Local Government Organizations (OPD) to manage the system. Network analysis at the Boven Diego Diskominfo is carried out using the Network Development Life Cycle (NDLC) method relying on the previous infrastructure development process which has several stages, namely analysis, design, prototype simulation, implementation, monitoring, and management. The results of this network analysis are the optimization of the core router and the optimization of the Wireless Access Point

Keywords

Computer Network, Interconection, NDLC

Full Text:

PDF

References

Y. Mulyanto and S. B. Prasetyo, “Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawadengan Metode Network Development Life Cycle (NDLC): Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawadengan Metode Network Development Life Cycle (NDLC),” Jurnal Informatika Teknologi dan Sains, vol. 2, no. 4, pp. 223-233, 2020.

T. Sanjaya and D. Setiyadi, “1-10 Teknik Informatika; STMIK Bina Insani.”

A. Fariz, S. el Yumin, R. T. Siregar, and T. Taryo, “Arsitektur Jaringan Komputer Berbasis Framework Togaf-Adm Menggunakan Proses NDLC (Computer Network Architecture Based on Framework Togaf-Adm Using NDLC Process),” 2019.

H. Sujadi and A. Mutaqin, “RANCANG BANGUN ARSITEKTUR JARINGAN KOMPUTER TEKNOLOGI METROPOLITAN AREA NETWORK (MAN) DENGAN MENGGUNAKAN METODE NETWORK DEVELOPMENT LIFE CYCLE (NDLC) (Studi Kasus : Universitas Majalengka),” 2017.

S. Aji, A. Fadlil, and I. Riadi, “Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 3, no. 1, p. 11, Jun. 2017, doi: 10.26555/jiteki.v3i1.5665.

A. Zappone, M. di Renzo, and M. Debbah, “Wireless Networks Design in the Era of Deep Learning: Model-Based, AI-Based, or Both?,” Feb. 2019, [Online]. Available: http://arxiv.org/abs/1902.02647

M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication”.

T. R. Naibaho, S. Sumarno, Z. M. Nasution, I. Gunawan, B. E. Damanik, and S. T. Bangsa, “Disk-Less Network Implementation using Cyberindo Program (Case: BAHONET2 Siantar Game Center),” International Journal of Information System & Technology, vol. 3, no. 1, pp. 64–72, 2019.

Cyberindo, 2014. FAQ. (Online) http://www.cyberindo.co.id/faq/seputarcyberindo# cyb-2 (13 Januari 2021).

Article Metrics

Abstract view: 317 times
Download     : 247   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Refbacks

  • There are currently no refbacks.