Concept of Analysis and Implementation of Burst On Mikrotik Router

Similar documents
The Development of the Education Related Multimedia Whitelist Filter using Cache Proxy Log Analysis

BANDWIDTH MANAGEMENT USING SIMPLE QUEUE METHOD IN INFORMATIC ENGINEERING LABORATORY OF MUSAMUS UNIVERSITY USING MICROTICS

Monitoring and Indentification Packet in Wireless With Deep Packet Inspection Method

Load balancing factor using greedy algorithm in the routing protocol for improving internet access

Optimizing the hotspot performances by using load and resource balancing method

Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm

Nearby Search Indekos Based Android Using A Star (A*) Algorithm

Journal of Physics: Conference Series PAPER OPEN ACCESS. To cite this article: B E Zaiwani et al 2018 J. Phys.: Conf. Ser.

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

Conveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering

Application Marketing Strategy Search Engine Optimization (SEO)

Development of Smart Home System to Controlling and Monitoring Electronic Devices using Microcontroller

Quality Performance Test of Service Due to the Band-width Management Using Hierarchical Token Bucket Method and Queuing Connection

Plug and play solution for managing lan users with MikroTik RouterOS

ANALYSIS OF THE POWER OF WIFI SIGNALS ON THE INFORMATICS ENGINEERING LABORATORY OF MUSAMUS UNIVERSITY USING INSIDDER

Classification of stroke disease using convolutional neural network

The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function

Dynamic QoS RouterOS v6.3

Implementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem

Design and Development of an Asynchronous Serial Communication Learning Media to Visualize the Bit Data

Optimizing Libraries Content Findability Using Simple Object Access Protocol (SOAP) With Multi- Tier Architecture

Model of load balancing using reliable algorithm with multi-agent system

Analysis of labor employment assessment on production machine to minimize time production

Performance Analysis of Frame Relay Network Using OSPF (Open Shortest Path First) and MPLS (Multi-Protocol Label Switching) based on GNS3

Wireless Network Security Information System on Banking Company with Radius Server Using Authentication, Authorization, Accounting (AAA)

The Performance Analysis of Wireless Distribution System Using Point to Multipoint Network Topology

The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

Performance Test of Openflow Agent on Openflow Software-Based Mikrotik RB750 Switch

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

Live Forensics on RouterOS using API Services to Investigate Network Attacks

Implementation Analysis of GLCM and Naive Bayes Methods in Conducting Extractions on Dental Image

Developing Control System of Electrical Devices with Operational Expense Prediction

Feature weighting using particle swarm optimization for learning vector quantization classifier

HTB vs PCQ. by: Valens Riyadi Citraweb Nusa Infomedia, Indonesia

Manual:Packet Flow - MikroTik Wiki

Analysis of System Requirements of Go-Edu Indonesia Application as a Media to Order Teaching Services and Education in Indonesia

Fast Learning for Big Data Using Dynamic Function

The Role of Participatory Design in Mobile Application Development

Undercut feature recognition for core and cavity generation

Hole Feature on Conical Face Recognition for Turning Part Model

Usability evaluation of user interface of thesis title review system

Real-time monitoring system for elderly people in detecting falling movement using accelerometer and gyroscope

14 December, Mikrotik V2 9 DAILY BOOKS # Kindle # 3TB3OLQRB7. 14 December, 2017 E-BOOK MIKROTIK V2 9. Document Filetype: PDF 259.

Competency Assessment Parameters for System Analyst Using System Development Life Cycle

Comparison of segmentation using fast marching and geodesic active contours methods for bone

SSL/TLS Vulnerability Detection Using Black Box Approach

The Implementation of Alert System for LAN Network Monitoring Using the Dude Based

MIKROTIK ROUTER SETUP SERVICE MANUAL

Development of design monitoring and electricity tokens top-up system in two-ways energy meters based on IoT (Internet of Things)

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process

Standalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm

Queue Tree Implementation for Bandwidth Management in Modern Campus Network Architecture

Energy consumption model on WiMAX subscriber station

COURSE O V E R V I E W

Grouping the community health center patients based on the disease characteristics using C4.5 decision tree

Analyzing traffic source impact on returning visitors ratio in information provider website

Internet authentication and billing (hotspot) system using MikroTik router operating system

You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).

LOAD DISTRIBUTION ANALYSIS ON BIPARTITE TOPOLOGY USING FLOODLIGHT CONTROLLER

Reducing a congestion with introduce the greedy algorithm on traffic light control

Building Api Student Store at Iris Labs Unikom

PPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel

The application of EOQ and lead time crashing cost models in material with limited life time (Case study: CN-235 Aircraft at PT Dirgantara Indonesia)

A fuzzy mathematical model of West Java population with logistic growth model

Optimization of Data Communication on Air Control Device Based on Internet of Things with Application of HTTP and MQTT Protocols

A comparative study of Message Digest 5(MD5) and SHA256 algorithm

Implementation and evaluation of LMS mobile application: scele mobile based on user-centered design

IP ACCOUNTING MODULE. A guide to the IP Accounting Module on DataTill. Imel Rautenbach, Jennifer du Plessis DATATILL (PTY) LTD

Evaluation of expert system application based on usability aspects

A New Approach To Manage a Best Effort IP WAN Services

Coordinated and Unified Control Scheme of IP and Optical Networks for Smart Power Grid

Simulation of the effectiveness evaluation process of security systems

Attendance fingerprint identification system using arduino and single board computer

Hotspot with Active Directory

Certified Network Associate (MTCNA) Riga, Latvia January 1 - January 3, 2016

APPLICATION CONFIGURATION CENTRALIZED LINUX WEB-BASED SERVER AT PT. XYZ

Insecure Whatsapp Chat History, Data Storage and Proposed Security

Cloud Hosted Network Monitoring and Authentication. Simple Solution using MikroTik RouterOS

Augmented Reality (AR) Technology on The Android Operating System in Chemistry Learning

Designing Energy and Power Monitoring System on Solar Power Plant Using Raspberry Pi

MikroWall Hotspot Router and Firewall System

Deployments and Network Topologies

MikroTik RouterOS Training User Management. VRProService Co.,Ltd.

UDP-Lite Enhancement Through Checksum Protection

Routeros Firewall Mikrotik

Design of Smart Home Systems Prototype Using MyRIO

Comparative Analysis of Sequitur Algorithm with Adaptive Huffman Coding Algorithm on Text File Compression with Exponential Method

MIKROTIK ROUTEROS BURMESE VERSION ONLINE TRAINING CLASS CHAPTER 1

RESTful Web Service Optimization with Compression and Encryption Algorithm

User class mechanisms for quality of service in network mobility

MikroTik, A Router for Today & Tomorrow

Using the rear projection of the Socibot Desktop robot for creation of applications with facial expressions

Service Description Safecom Customer Connection Version 3.5

Hybrid learning vector quantization (LVQ) algorithm on face recognition using webcam

Steps in Designing Queue and Interview Process using Information System: A Case of Re-registration of New Students in Universitas Negeri Makassar

Measuring the power consumption of social media applications on a mobile device

MikroTik RouterOS Training Class. MTCNA Townet Wispmax 3 Febbraio 2010

Performance analysis of parallel de novo genome assembly in shared memory system

Improved Information Retrieval Performance on SQL Database Using Data Adapter

Transcription:

Journal of Physics: Conference Series PAPER OPEN ACCESS Concept of Analysis and Implementation of Burst On Mikrotik Router To cite this article: Guntur Maha Putra et al 2018 J. Phys.: Conf. Ser. 1114 012071 View the article online for updates and enhancements. This content was downloaded from IP address 148.251.232.83 on 05/01/2019 at 17:07

Concept of Analysis and Implementation of Burst On Mikrotik Router Guntur Maha Putra 1, Muhammad Ardiansyah Sembiring 1, Akmal 1, Andy Sapta 1, Febri Dristyan 1, Rizaldi 1, Ada Udi Firmansyah 1, Irianto 1, Dahlan Abdullah 2 and Janner Simarmata 3 1 Sekolah Tinggi Manajemen Informatika dan Komputer Royal Kisaran, Kisaran, Indonesia 2 Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia 3 Universitas Negeri Medan, Medan, Indonesia * guntur_maha_putra@royal.ac.id Abstract. Implementation of bandwidth management by optimizing the use of existing facilities and features, is a way / effort improvements to the quality of service on the network (Quality of Service). Mikrotik router has queue facility that can make bandwidth allocation arrangement for each user computer with analysis and application of careful burst calculation. Burst is a feature of the mikrotik router that allows a user's computer to gain more than Maximum Information Rate (MIR) bandwidth allocation in a given time period. In this research we analyze burst calculation from bandwidth with upload / download capacity 1024 kbps (1 Mbps) and application of simple queue configuration. A careful calculation and understanding technique must be performed if the burst will be applied to properly calculate the burstthreshold, the burst run, data-rate, average data-rate, burst-limit, max-limit and bandwidth available on the network, can be optimally managed. 1. Introduction Mikrotik RouterOS is an operating system and software that can be used to make the computer a reliable network router, covering various features including: firewall and nat, routing, hotspot, point to point tunneling protocol, DNS server, DHCP server, hotspot, burst and still many more features [1], [2]. Mikrotik suitable for use by ISP and hotspot provider [3]. For the installation of mikrotik is not required additional software or other additional components. Mikrotik is designed to be easy to use and very well used for the purposes of computer network administration such as designing and building a small to complex computer network system though [3]. Based on the form of hardware in use, mikrotik can be classified into two types [1], [4], [5]: a. Mikrotik RouterOS in the form of ISO software from RouterOS which can be downloaded at www.mikrotik.com or www.mikrotik.co.id and can be installed on PC / X86 computer. b. Mikrotik Routerboard (Embedded Router) in the form of hardware that is specifically packed include with Mikrotik RouterOS. In network management, it is very important to do bandwidth usage management that will be used by each user computer [6] [10]. Mikrotik routers have queue facilities that can perform bandwidth allocation management for each user's computer [5]. By implementing bandwidth management, is a Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd 1

way / effort to improve the quality of service on the network (Quality of Service) [2], [11]. Quality of Service (QoS) will guarantee the minimum bandwidth allocation / Committed Information Rate (CIR) on each user's computer in the network and the bandwidth allocation over Maximum Information Rate (MIR) within a certain time period, so each computer user will not have to worry about not get the bandwidth [12]. Implementation the use of the burst feature with careful calculation and in accordance with the desired conditions, allows a user's computer to obtain a bandwidth allocation over Maximum Information Rate (MIR) within a certain time frame. Burst can only occur if the average queue level for the last burst is smaller than the burst-threshold threshold. The burst will stop if the average queue for the last seconds is greater than or equal to the burst-threshold. 2. Methodology The method used in this research is Network Development Life Cycle (NDLC) which begins with the stages of analysis, design, simulation prototyping, implementation, monitoring and management [12]. Management Monitoring Figure 1. Network Development Life Cycle (NDLC) Model For burst implementations, there are options that must be known before the configuration is done. Here are the options in` the burst feature [12]: a. Burst-limit is the maximum bandwidth value (either upload / download) to be received by a user when a burst occurs. The burst-limit value must be greater than the max-limit (MIR) given. b. Burst-time is the time period used to calculate the average data-rate, not to indicate how long the burst takes. c. Burst-threshold is the value that determines when burst can be executed and when burst should be stopped. The burst-threshold value is generally ¾ of the max-limit value. If the average data-rate value is lower than the burst-threshold, then the burst will run. But if the average data-rate value is equal to or greater than the burst-threshold, then the burst will be stopped. To calculate how long a user gets the burst when first using the bandwidth allocation, the following formula can be used: Old burst run = Analysis Implementation burst threshold burst limit burst time In burst feature there are some variables that must be determined its value, among others burstlimit, burst-threshold and. Note that if the average data flow is lower than the burstthreshold, the burst will actually follow the burst-limit, where every second the router will calculate the average data achieved through the last. Design Simulation prototyping 2

3. Result and Discussion In this study the researchers conducted a burst calculation analysis of bandwidth with upload / download capacity of 1024 kbps (1 Mbps). The following topology of the network scenario will be calculated long burst run along with the average data-rate calculation in every second. 192.168.20.5 192.168.20.4 192.168.20.3 192.168.20.2 Router 1024 kbps (upload) Figure 2. Network Scenario 1024 kbps (download) internet Suppose the configuration is applied with the provision: limit-at = 128 kbps, max-limit = 512 kbps, burst-threshold = 384 kbps, burst-limit = 1024 kbps and = 8s for each user based on the picture above network scenario with the following command: Figure 3. Burst Configuration On The User's Computer To see the configuration results can be used the following command: Figure 4. Result of Quee Simple Print 3

The above burst-threshold determination is obtained from the following formula: Burst threshold = 3 max limit (1) 4 Burst threshold = 3 4 512 = 384 k So from the configuration can be calculated long burst run, to get bandwidth allocation of 1024 kbps (1Mbps) to the user. Old burst run = Old burst run = burst threshold burst limit 384 1024 8 = 3 seconds burst time (2) The results obtained from the above calculation is the burst will be given to the user for the first 3 seconds. Then the data-rate of the above scenario is calculated from the 1/16 used ie 8s, following the calculation: Data rate = Data rate = 8 16 burst time 16 = 0,5 seconds(s) So the average data-rate will be calculated every 0.5 second interval to determine if the burst can be given: Yes or No. Here's the formula for calculating the average data-rate: Average data rate = Seconds (s) 0 0,5 1 1,5 2 actual rat e burst time Table 1. Burst Calculations Data-rate rata-rata / average-rate (Kbps) (0+0+0+0+0+0+0+0+0+0+0+0+0+0+0 +0)/8 = 0 (0+0+0+0+0+0+0+0+0+0+0+0+0+0+0 +512)/8 = 64 (0+0+0+0+0+0+0+0+0+0+0+0+0+0+5 12+512)/8 = 128 (0+0+0+0+0+0+0+0+0+0+0+0+0+512 +512+512)/8 = 192 (0+0+0+0+0+0+0+0+0+0+0+0+512+5 12+512+512)/8 = 256 Burst (Yes /No) (3) (4) Actual Rate `(Kbps) Actual Rate (per 0,5 s) 4

Seconds (s) 2,5 3 3,5 4 4,5 5 Data-rate rata-rata / average-rate (Kbps) (0+0+0+0+0+0+0+0+0+0+0+512+512 +512+512+512)/8 = 320 (0+0+0+0+0+0+0+0+0+0+512+512+5 12+512+512+512)/8 = 384 (0+0+0+0+0+0+0+0+0+512+512+512 +512+512+512+256)/8 = 416 (0+0+0+0+0+0+0+0+512+512+512+5 12+512+512+256+256)/8 = 448 (0+0+0+0+0+0+0+512+512+512+512 +512+512+256+256+256)/8 = 480 (0+0+0+0+0+0+512+512+512+512+5 12+512+256+256+256+256)/8 = 512 Burst (Yes /No) Actual Rate `(Kbps) Actual Rate (per 0,5 s) Actual-rate (Kbps) in the above table is the allocation of bandwidth provided to the user's computer, either in burst condition given or burst not given. Here's how to calculate average data-rate with 1 second interval: Seconds to-0 Average data rate = (0+0+0+0+0+0+0+0) = 0/8 = 0 kbps Seconds to -1 Average data rate = (0+0+0+0+0+0+0+1024) = 1024/8 = 128 kbps Seconds to -2 Average data rate = (0+0+0+0+0+0+1024+1024) = 2048/8 = 256 kbps Seconds to -3 Average data rate = (0+0+0+0+0+1024+1024+1024) = 3072/8 = 384 kbps Seconds to -4 Average data rate = (0+0+0+0+1024+1024+1024+512) = 3584/8 = 448 kbps 5

Seconds to -5 Average data rate = (0+0+0+1024+1024+1024+512+512) = 4096/8 = 512 kbps From the burst calculation in the above table it is obtained from 0 to 0.5 to 1 to 1.5 to 2 and second to 2.5 indicates that the average data-rate obtained is lower than the configured burst-threshold value of 384 Kbps, so the burst is still given on seconds with the value of 1024 Kbps bandwidth. Then at the 3rd second and later shows that the burst is no longer given to the user's computer, since the average data-rate obtained is the same as the burst-threshold value of 384 Kbps or greater than the 384 Kbps burst-threshold value. So that computer user will only get a bandwidth allocation of max-limit of 512 Kbps. 4. Conclusion Based on the discussion conducted, it can be concluded several things as follows: a. If the average data-rate (Kbps) value is equal to or greater than the burst-threshold value, then the burst will not be given again on the user's computer, but will only get the bandwidth allocation of max-limit that has been predefined. b. Implementation of burst will be very beneficial for users who only do browsing, because it will get additional bandwidth in the first time to open the website, but otherwise will not be profitable for users who perform download activities. c. By utilizing burst-limit facilities, then we can really allocate bandwidth to the device with the maximum. References [1] M. D. L. Siahaan, M. S. Panjaitan, and A. P. U. Siahaan, MikroTik Bandwidth Management to Gain the Users Prosperity Prevalent, Int. J. Eng. Trends Technol., vol. 42, no. 5, pp. 218 222, 2016. [2] A. Rahman and H. Haviluddin, Implementation of Bandwidth Management Authentication, Int. J. Comput. Informatics, vol. 1, no. 1, pp. 1 8, 2016. [3] S. agung S. heru Putra, Jurnal Emitor Vol.16 No. 02 ISSN 1411-8890, Sist. Inf. Pengelolaan Serv. Toko Komput. Berbas. Qrcode, vol. 16, no. 02, pp. 23 30, 2014. [4] H. G. Ardiansyah Taufiq A.; Afdhal, Afdhal, Pengaturan Pemakaian Bandwidth Menggunakan Mikrotik Bridge, J. Rekayasa Elektr., vol. 9, no. Vol 9, No 2 (2010), pp. 69 76, 2010. [5] A. L. I. A. A. RAMADHAN et al., Analysis of Effectiveness of Using Simple Queue With Per Connection Queue (Pcq) in the Bandwidth Management (a Case Study At the Academy of Information Management and Computer Mataram (Amikom) Mataram), J. Theor. Appl. Inf. Technol., vol. 83, no. 3, pp. 319 326, 2016. [6] V. Kumar and K. D. Jangra, A probability based Dynamic Bandwidth Allocation Algorithm in Optical Networks, pp. 71 80, 2015. [7] V. Sharma, V. Kumar, and B. S. Thakur, Need of bandwidth management and formulation of policy framework for effective utilization of Internet services within a university campus, Int. J. Comput. Sci. Commun., vol. 2, no. 1, pp. 173 178, 2011. [8] U. Ikechukwu, A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers, Glob. J. Comput. Sci. Technol., vol. 17, no. 4, 2017. [9] R. Rahim et al., Internet based remote desktop using INDY and socket component, 6

vol. 7, pp. 44 47, 2018. [10] R. Rahim et al., Block Architecture Problem with Depth First Search Solution and Its Application, J. Phys. Conf. Ser., vol. 954, no. 1, 2018. [11] K. R. U, K. S. O, O. S. O, and A. A. A, Management and Control of Bandwidth in Computer Networks, vol. 2, no. 3, pp. 342 348, 2012. [12] R. Kurniawan, Penerapan Teknik Burst Bandwidth Untuk Network Management Pada Dinas Kebudayaan dan Pariwisata Kota Lubuklinggau, vol. 9, no. 1, pp. 7 16, 2017. 7