Server Redundancy: Performa Jaringan Mengunakan DNS Failover MikroTik pada Kasus Private Server dan Public Server
DOI:
https://doi.org/10.14421/jiska.2024.9.1.50-58Keywords:
Server Redundancy, DNS Failover, RTT, Mdev, Private Server, Public ServerAbstract
The digitization of user services has increased, in line with the need for VPS and cloud computing services, which are rampant among application and platform developers. Quite a few companies that create applications or application users have servers to handle user needs. Testing is carried out using the ICMP Protocol to get real-time results and can be measured. From Scenario 1, carrying out 20 test requests, we get a packet loss of 5% with RTT Avarage of 195,838ms and Mdev 4,103ms. If you apply DNS failover in scenario 2, the client will likely access the web a little slower, as evidenced by the packet loss being 25% greater in value. Compared to scenario 1, having a high standard deviation (Mdev) of round-trip times is not desirable. This variation is also known as jitter. Increased jitter can cause a bad user experience, especially in real-time audio and video streaming applications. However, this is still understandable because it only has a 1-5 second effect on the service. Next, in scenario 3, we can see that private and public servers have relatively high gab with 0% packet loss, which has a small Mdev value of 0.309ms. Therefore, the DNS failover method is a solution for network administrators who have problems related to server migration between public servers and private servers so that services can run even if a server is maintaining or downlinking.
References
’Abidah, I. N., Hamdani, M. A., & Amrozi, Y. (2020). Implementasi Sistem Basis Data Cloud Computing pada Sektor Pendidikan. KELUWIH: Jurnal Sains Dan Teknologi, 1(2), 77–84. https://doi.org/10.24123/saintek.v1i2.2868
Alyas, T., Javed, I., Namoun, A., Tufail, A., Alshmrany, S., & Tabassum, N. (2022). Live Migration of Virtual Machines Using a Mamdani Fuzzy Inference System. Computers, Materials & Continua, 71(2), 3019–3033. https://doi.org/10.32604/cmc.2022.019836
Bhardwaj, A., & Rama Krishna, C. (2022). A Container-Based Technique to Improve Virtual Machine Migration in Cloud Computing. IETE Journal of Research, 68(1), 401–416. https://doi.org/10.1080/03772063.2019.1605848
Dooley, K. (n.d.). What is Network Redundancy & Why is It Important? Auvik. Retrieved January 25, 2024, from https://www.auvik.com/franklyit/blog/simple-network-redundancy/
Ďulík, M., Harakaľ, M., & Javurek, M. (2023). Advanced Methods for Network Infrastructure Analysis and Security. 2023 Communication and Information Technologies (KIT), 1–7. https://doi.org/10.1109/KIT59097.2023.10297110
Hae, Y. (2021). ANALISIS KEAMANAN JARINGAN PADA WEB DARI SERANGAN SNIFFING DENGAN METODE EKSPERIMEN. JATISI (Jurnal Teknik Informatika Dan Sistem Informasi), 8(4), 2095–2105. https://doi.org/10.35957/jatisi.v8i4.1196
Hosseini Shirvani, M., Rahmani, A. M., & Sahafi, A. (2020). A survey study on virtual machine migration and server consolidation techniques in DVFS-enabled cloud datacenter: Taxonomy and challenges. Journal of King Saud University - Computer and Information Sciences, 32(3), 267–286. https://doi.org/10.1016/j.jksuci.2018.07.001
Jupriyadi, J., Hijriyanto, B., & Ulum, F. (2021). Komparasi Mod Evasive dan DDoS Deflate Untuk Mitigasi Serangan Slow Post. Techno.Com, 20(1), 59–68. https://doi.org/10.33633/tc.v20i1.4116
Khan, R. A., Khan, S. U., Khan, H. U., & Ilyas, M. (2022). Systematic Literature Review on Security Risks and its Practices in Secure Software Development. IEEE Access, 10, 5456–5481. https://doi.org/10.1109/ACCESS.2022.3140181
Mafakhiri, J. (2019). Proses Migrasi Cloud Computing Dari Lingkungan Amazon Ec2 Ke Vmware. Jurnal Bangkit Indonesia, 8(1), 1. https://doi.org/10.52771/bangkitindonesia.v8i1.85
Maila, H. H., Indra, D., & Satra, R. (2020). Analisis Perbandingan Layanan Data Server Menggunakan Failover Cluster pada Platform Nginx dan Apache. Buletin Sistem Informasi Dan Teknologi Islam, 1(2), 87–91. https://doi.org/10.33096/busiti.v1i2.829
Malla, S., & Christensen, K. (2020). HPC in the cloud: Performance comparison of function as a service (FaaS) vs infrastructure as a service (IaaS). Internet Technology Letters, 3(1), e137. https://doi.org/10.1002/itl2.137
Marzuki, K., Hanif, N., & Hariyadi, I. P. (2022). Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers. International Journal of Electronics and Communications Systems, 2(2), 65–73. https://doi.org/10.24042/ijecs.v2i2.13543
Nadeem, F. (2022). Evaluating and Ranking Cloud IaaS, PaaS and SaaS Models Based on Functional and Non-Functional Key Performance Indicators. IEEE Access, 10, 63245–63257. https://doi.org/10.1109/ACCESS.2022.3182688
Nannipieri, L., Cacciaguerra, S., Mirenna, S., Locati, M., Marletta, M., & Gucciardi, E. (2019). Making Linked Data more reliable with a failover server system: a case study with seismological data at INGV. Annals of Geophysics, 62(Vol 62 (2019)), DM567. https://doi.org/10.4401/ag-8050
Ri, O.-C., Kim, Y.-J., & Jong, Y.-J. (2023). Hybrid load balancing method with failover capability in server cluster using SDN. http://arxiv.org/abs/2307.05552
Rifiera, S. N., & Nurwarsito, H. (2022). Implementasi Load Balancing dan Failover pada Proses Migrasi Container Docker. Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 6(5), 2025–2033. https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/10967
Rouse, M. (2013, April 15). Network Redundancy. Techopedia. https://www.techopedia.com/definition/29305/network-redundancy
Sandi, T. A. A., Heristian, S., & Leksono, I. N. (2021). OPTIMALISASI FAILOVER DENGAN NETWATCH PADA MIKROTIK. CONTEN : Computer and Network Technology, 1(1), 23–30. https://doi.org/10.31294/conten.v1i1.388
Wijayanto, D., Firdonsyah, A., Adhinata, F. D., & Jayadi, A. (2021). Rancang Bangung Private Server Menggunakan Platform Proxmox dengan Studi Kasus: PT.MKNT. Journal ICTEE, 2(2), 41. https://doi.org/10.33365/jictee.v2i2.1333
W, Y., & Fitriana, Y. B. (2021). Analisis Network Security Komputer Tingkat Desa Menggunakan Metode Security Policy Development Life Cycle (SPDLC). Jurnal Teknik Juara Aktif Global Optimis, 1(2), 11–21. https://doi.org/10.53620/jtg.v1i2.28
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Tommi Alfian Armawan Sandi, Firmansyah Firmansyah, Ahmad Fauzi
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.