The Implementation of Top-Down Approach Method on Redesign of LAN Harvani Hotel Palembang
Main Article Content
Abstract
In this research, the object was taken from one of the hotels in Palembang, namely Harvani Hotel Palembang. This hotel is one of the hotels in South Sumatra Province, where this hotel has 4 floors. Harvani Hotel Palembang has a Local Area Network (LAN) which consists of several computers. LAN is very important to be applied to Harvani Hotel Palembang in order to support administrative work processes (management of hotel data, employee data, guest data to financial data) and guest needs (internet usage in every room of the Hotel which is one of the services provided by Harvani Hotel Palembang). However, the LAN owned by the Harvani Hotel Palembang still has disadvantages, such as LAN still cannot reach every hotel room on the 2nd floor. In addition, the administration side also faces obstacles because each floor of the Harvani Hotel Palembang has its own administrative section and then at the end of each work shift, reports from each administrative section are submitted to the administrative department on the 1st floor using external storage media. Therefore, it is necessary to redesign the Harvani Hotel Palembang LAN by applying the Top-Down Approach Method. The results of LAN redesign in this research will be displayed using Cisco Packet Tracer simulator software, where from the simulation results it can be seen that the new design of the Harvani LAN Hotel Palembang has connected the entire computer of each room and every floor of the Hotel. Therefore, if the results of this simulation are applied to Harvani Hotel Palembang, then the administrative work process can be managed directly because all data has been stored on the database server. In addition, this new LAN design has also reached all guest rooms of Harvani Hotel Palembang, so guests can access the internet in their respective rooms more comfortable.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
References
[2] I. Afrianto and E. B. Setiawan, “Kajian Virtual Private Network (VPN) sebagai Sistem Pengamanan Data pada Jaringan Komputer (Studi Kasus Jaringan Komputer UNIKOM),” Majalah Ilmiah UNIKOM, vol. 12, no. 1, 2015.
[3] S. D. Anggadini, “Analisis Sistem Informasi Manajemen berbasis Komputer dalam Proses Pengambilan Keputusan,” Majalah Ilmiah UNIKOM, 2013.
[4] R. Novrianda.D, “Implementasi Metode VLSM (Variable Length Subnet Mask) pada Pemetaan IP Address LAN (Local Area Network) STIPER Sriwigama Palembang,” Comput. J. Comput. Sci. Inf. Syst., vol. 2, no. 2, pp. 112–118, 2018.
[5] H. M. Kom, “Pengelolaan Jalur Data Menggunakan ‘XXX’ Bandwidth Management Pada ISP WAN,” Menara Ilmu, vol. 10, pp. 60–65, 2016.
[6] A. P. Sujana, “Perangkat Pendukung Forensik Lalu Lintas Jaringan,” KOMPUTIKA - J. Sist. Komput., vol. 3, no. 1, 2015.
[7] R. Wulandari, “Analisis QoS (Quality of Service) Pada Jaringan Internet (Studi Kasus: UPT Lokal Uji Teknik Penambangan Jampang Kulon–LIPI),” J. Tek. Inform. dan Sist. Inf., vol. 2, no. 2, 2016.
[8] Y. Y. Joefrie, “Perancangan Program Simulasi Perintah Dasar Jaringan Komputer,” FORISTEK Forum Tek. Elektro dan Teknol. Inf., vol. 3, no. 2, 2013.
[9] I. Susilo and G. K. Nugraha, “Pembangunan Web Server menggunakan Debian Server untuk Media Pembelajaran di Sekolah Menengah Kejuruan (SMK) Negeri 1 Sragen,” Indones. J. Netw. Secur., vol. 2, no. 1, pp. 22–27, 2013.
[10] P. A. Nugroho, “Pemanfaatan Teknologi Barcode berbasis Client Server untuk Inventaris Barang pada SMA Negeri 2 Demak,” J. Mhs., vol. 1, no. 1, 2014.
[11] Handayani, N. Kristanti, A. F. Rochim, and R. R. Isnanto, “Simulasi Jaringan Multiprotocol Label Switching (MPLS) menggunakan Graphical Network Simulator (GNS3),” J. Tek. Elektro, Fak. Tek. Univ. Diponegoro, pp. 1–7, 2015.
[12] M. R. Samad, “Efektivitas Penggunaan Aplikasi Simulasi Cisco Packet Tracer pada Pembelajaran Instalasi Jaringan Komputer di SMK Negeri 5 Takalar,” Universitas Negeri Makasar, 2017.
[13] R. M. Negara and R. Tulloh, “Analisis Simulasi Penerapan Algoritma OSPF Menggunakan RouteFlow pada Jaringan Software Defined Network (SDN),” J. INFOTEL (Informatika - Telekomun. - Elektron., vol. 9, no. 1, pp. 75–83, 2017.
[14] G. Ramadias, Z. Mazalisa, and T. D. Purwanto, “Redesain Jaringan Komputer Dengan Menggunakan Metode Top Down,” J. Tek. Inform. Univ. Bina Darma, 2012.
[15] R. Tulloh, “Analisis Performansi VLAN pada Jaringan Software Defined Network (SDN),” J. INFOTEL (Informatika - Telekomun. - Elektron., vol. 9, no. 4, pp. 406–411, 2017.