NETWATCH MIKROTIK PADA JARINGAN PT DINASTI KURNIA SEJAHTERA
Main Article Content
Abstract
A computer network is of course very much needed by an institution or company to be able to exchange data or do work, especially on the internet network, so not a few companies or institutions have more than one internet subscription to a service provider. However, in reality the rented internet does not automatically replace or switch on the internet that turns off, sometimes you have to move ports and configurations so that trouble occurs when users access the internet and disrupt work. Using netwatch which is a method on the network to avoid connection down time. Used if the company has more than 1 internet source. The way it works is to make the backup of the second line automatically run if the main line dies. However, the problem is when the connection from the ISP (Internet Service Provider) to the internet is interrupted, while the company's MikroTik router can still be connected, so the router will read that there is still a connection and will not change the router's connection to the backup path. By using netwatch which is one of the features of MikroTik, it functions to monitor a host's condition at certain intervals. Netwatch works by periodically sending ICMP messages to the intended host, in this case it can send it to an internet host that is definitely always on. A down connection from the ISP will read down so that the router will automatically change the connection using the backup path.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
References
[2] R. Y. Pratama, M. Orisa, and F. X. Ariwibisono, “APLIKASI MONITORING DAN CONTROLLING SERVER MENGGUNAKAN PROTOCOL ICMP ( INTERNET CONTROL MESSAGE PROTOCOL ) DAN SSH ( SECURE SHELL ) BERBASIS WEBSITE,” JATI (Jurnal Mhs. Tek. Inform., vol. 4, no. 1, pp. 397–403, 2020.
[3] D. Haryanto et al., “PERANCANGAN JARINGAN WIRELESS ACCESS POIN MENGGUNAKAN,” vol. 7, no. 1, pp. 53–60, 2022.
[4] W. MikroTik, “Netwatch,” Media Wiki, 2022. .
[5] S. Asst Prof Dr Ekarin, “Monitoring the Internet Connections of WAN Links with Only Routing Configuration,” in MikroTik User Meeting Conference Bangkok, 2018.
[6] M. K. Anwar and I. Nurhaida, “Implementasi Load Balancing Menggunakan Metode Equal Cost Multi Path ( ECMP ) Pada Interkoneksi Jaringan,” InComTech J. Telekomun. dan Komput., vol. 9, no. 1, pp. 39–48, 2019.
[7] Harvest and R. F. Noor, “IMPLEMENTASI MONITORING PERANGKAT JARINGAN MENGGUNAKAN NETWATCH TERINTEGRASI DENGAN APLIKASI TELEGRAM DI KANTOR DEWAN PERWAKILAN RAKYAT DAERAH KABUPATEN KARIMUN,” J. TIKAR, vol. 1, no. 2, pp. 145–159, 2020.
[8] Wahyat and A. Teddyana, “Monitoring Jaringan Internet Menggunakan Notifikasi Bot API Telegram,” SATIN – Sains dan Teknol. Inf., vol. 07, no. 01, pp. 01–11, 2021.
[9] J. Goldman and P. Rawles, Applied Data Communications, 4th ed. John Wiley & Sons, 2004.