Topologi Redundansi Link Untuk Keamanan Serta Mitigasi Ketersediaan Jaringan Komputer Menggunakan Rapid Spanning Tree Protocol
Abstract
The frequent occurrence of natural disasters requires telecommunications companies to require a backup internet backbone line if the telecommunications infrastructure is damaged/disconnected due to natural disasters. Reporting from inet.detik.com APJII revealed that the Jakarta-Singapore fiber optic network had broken, which had an impact on internet services in Indonesia. Fiber optic repair can take up to 2-3 weeks requiring network backup, the main solution for network backup with satellite, but problems will arise when configuration for satellite lines takes 1-2 days. Problems arise again when combined between fiber optic internet lines and satellite internet lines which cause the looping network to create network disturbances, to maintain interference, a spanning tree protocol method is needed to backup lines automatically and create link redundancy if one of the lines is problematic or disconnected. The purpose of this study is to design a link redundancy topology for security and mitigation of network availability using the rapid spanning tree protocol (RSTP) with router rb750gr3, switch rb260gs and switch dgs-108. In the RSTP network topology, it is designed with 3 redundant lines connected between the rb260gs switch and the dgs-108 switch, with an on-stick router rb750gr3 and is designed with 6 access mode vlan lines. In testing the inter-vlan network, RSTP terminates the redundancy link and then uses the ping command at the command prompt to determine how many minutes to backup the link. The NDLC method is used in determining how many seconds to backup this redundancy link using. The results of testing the link termination ether2-switch-mikrotik and ether1-switch-dlink using the "ping" command for 20 seconds in determining how many seconds to backup the link get the result that Request Time Out does not occur and the average time for each pc in determining the backup path for the pc-vlan20 22.9ms, pc-vlan30 35ms, pc-vlan70 23.5ms. The results of link termination testing ether3-switch-mikrotik and ether2-switch-dlink using the "ping" command for 20 seconds in determining how many seconds to backup the link get the result that there is no Request Time Out and the average time for each pc in determining the backup path for the pc-vlan20 23ms, pc-vlan30 24ms, pc-vlan70 43.7ms.
Downloads
References
A. T. Haryanto, “Kabar Terkini Jaringan Fiber Optik Jakarta-Singapura yang Putus,” inet.detik.com, Feb. 22, 2021. [Online]. Available: https://inet.detik.com/telecommunication/d-5400427/kabar-terkini-jaringan-fiber-optik-jakarta-singapura-yang-putus
P. F. Mayaut and L. Sariwating, “PT. Telkom Maluku aktifkan jalur backup via satelit,” ambon.antaranews.com, Ambon, Sep. 27, 2019. Accessed: Jul. 08, 2022. [Online]. Available: https://ambon.antaranews.com/berita/67676/pt-telkom-maluku-aktifkan-jalur-backup-via-satelit
Citraweb, “Fitur Baru - Loop Protect,” citraweb.com, 2016. https://citraweb.com/artikel_lihat.php?id=228#:~:text=Loop pada jaringan terjadi karena,data pada kedua switch tersebut. (accessed Jul. 07, 2022).
Citraweb, “Bridge Looping,” citraweb.com, 2016. https://citraweb.com/artikel_lihat.php?id=226 (accessed Jul. 07, 2022).
TR 101 329 V2.1.1., “Telecomunication and Internet Protocol Hamonization Over Network (TIPHON),” in General Aspects of QoS, 1999.
B. A. Forouzan, Data Communications and Networking. New York: McGraw-Hill, 2013.
J. A, Packet Tracer Network Simulator. Birminghang-Mumbai: Packt Publishing Enterprise, 2014.
I. Sofana, CISCO CCNA dan Jaringan Komputer. Bandung: Informatika, 2010.
I. Sofana, Cisco CCNP & Jaringan Komputer. Bandung: Informatika, 2012.
F. Shahriar, M. S. Newaz, S. Z. Rashid, M. A. Rahman, and M. F. Rahman, “Designing a Reliable and Redundant Network for Multiple VLANs with Spanning Tree Protocol (STP) and Fast Hop Redundancy Protocol (FHRP),” Proc. Int. Conf. Ind. Eng. Oper. Manag., vol. 2018, no. September, pp. 534–540, 2018, [Online]. Available: https://www.researchgate.net/publication/337220955_Designing_a_reliable_and_redundant_network_for_multiple_VLANs_with_Spanning_Tree_Protocol_STP_and_Fast_Hop_Redundancy_Protocol_FHRP
Djumhadi and R. S. Roring, “Perancangan Dan Implementasi Jaringan Failover Menggunakan Protokol Spanning Tree Pada PT. PLN UP3B Kalimantan Timur,” J. Ilm. Matrik, vol. 22, no. 3, pp. 249–256, 2020, doi: 10.33557/jurnalmatrik.v22i3.1120.
N. Z. Abidin, “Analisis Performansi Controller POX Dan RYU Pada Jaringan Software Defined Network Dengan Protokol Spanning Tree,” Universitas Islam Negeri Syarif Hidayatullah, 2021. [Online]. Available: https://repository.uinjkt.ac.id/dspace/handle/123456789/56384
P. A. Rahman, “An Algorithm for Selection of The Preferable Root Switch for The Spanning Tree Protocol in Computer Networks,” J. Phys. Conf. Ser., vol. 1661, no. 1, 2020, doi: 10.1088/1742-6596/1661/1/012010.
A. Biswas, S. R. Mondal, and C. Biswas, “A Review On Loops In A Computer Network & Spanning Tree Protocol (STP),” Int. Res. J. Mod. Eng. Technol. Sci., vol. 4, no. 2, pp. 612–615, 2022, [Online]. Available: https://www.irjmets.com/uploadedfiles/paper//issue_2_february_2022/19020/final/fin_irjmets1644570037.pdf
V. M. J. Renwarin and U. Radiyah, “Implementasi Spanning Tree Protocol (STP) Pada Perancangan Virtual Local Area Network (VLAN) Pada PT Regalindo Sakti Jakarta,” J. JI-Tech, vol. 17, no. 1, pp. 6–11, 2021, [Online]. Available: https://jitech.i-tech.ac.id/index.php/jitech/article/view/179
J. E. Goldman and P. T. Rawles, Applied Data Communications, A business-Oriented Approach, Third Edit. John Wiley & Sons, 2000.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Topologi Redundansi Link Untuk Keamanan Serta Mitigasi Ketersediaan Jaringan Komputer Menggunakan Rapid Spanning Tree Protocol
Pages: 88-100
Copyright (c) 2022 Mohammad Taufan Asri Zaen, Ahmad Tantoni

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).