Analysys and Implementation IEEE 802.1Q to Improve Network Security
PDF

Keywords

LAN (Local Area Network)
NDLC (Network Development Life Cycle)
VLAN (Virtual Local Area Network)
Mode Access
Network

How to Cite

Bahry, M. S., & Sugiantoro, B. (2018). Analysys and Implementation IEEE 802.1Q to Improve Network Security. IJID (International Journal on Informatics for Development), 6(2), 28–33. https://doi.org/10.14421/ijid.2017.06202

Abstract

The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.
https://doi.org/10.14421/ijid.2017.06202
PDF

References

Alabady, Salah. (2009). Design and Implementasi of a Network Security Model for Coorperative Network. Iraq: Computer Engineering Department, University of Mosul.

Arifin, Zaenal. (2003). Langkah Mudah Mengkonfigurasi Router Cisco. Yogjakarta : Andi

Efendi, Rissal., Widiastari, Indrastanti Ratna. (2012). Pengujian Kinerja Jaringan pada Virtual Local Area Network (VLAN) menggunakan Virtual Trunking Protocol (VTP). Salatiga: Universitas Kristen Satya Wacana(UKSW).

Efendi, Rissal., Widiastari, Indrastanti Ratna. (2012). Segmentasi Broadcast Domain Dalam Virtual Local Area Network (VLAN) Dengan Memanfaatkan Virtual Trunking Protocol (VTP) Pruning Untuk Menghemat Bandwidth. Salatiga: Universitas Kristen Satya Wacana(UKSW).

Kadir, Abdul., Triwahyuni, Terra. (2003). Pengenalan Teknologi Informasi. Yogyakarta: Andi

Komputer, Wahana. (2003). Konsep Jaringan Komputer dan Pengembangannya. Jakarta: Salemba Infotek.

Odum, Wendell. (2005). Computer Networking First-Step. Yogjakarta: Andi

Pal, Gyan Prakash., Pal, Sadhana. (2013). Virtual Local Area Network(VLAN). Faculty of Electronics & Communication Engineering Department.

Puspito, Faesol., Widyastutui, Hj. Naniek., Triyono, Joko. (2014). Perancangan Blue Print Jaringan Menggunakan Virtual LAN (VLAN) Dengan Studi Kasus (PT. PLN Persero Area Kudus). Yogyakarta: Institut Sains & Teknologi AKPRIND.

Shaffi, Abubucker Samsudeen. (2012). Effective Implementation Of VLAN And Acl In Local Area Network. Sultanate of Oman: Faculty of Computing Studies, Gulf College Muscat.

Supandi, Dede. (2008). Instalasi Dan Konfigurasi Jaringan Komputer. Bandung : Informatika Bandung

Sutanto, Felix Andreas., Yulianton, Heribertus., Razaq, Jeffri Alfa. (2011). Rancang Bangun VLAN untuk Segmentasi Jaringan pada Cyber Campus Laboratory Universitas Stikubank. Fakultas Teknologi Informasi: Universitas Stikubank.

Syafrizal, Melwin. (2005). Pengantar jaringan komputer. Yogyakarta: Andi Offset.

Yani, Ahmad. (2005). Jaringan Komputer. Jakarta: PT.Kawan Pustaka.

Creative Commons License
IJID (International Journal on Informatics for Development) is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License