Computer Network Design Using the Simple Queue Method in Maximising Network Performance in Companies

: Computer Network Design Using the Simple Queue Method at CV. Ide Maju Berkarya is made to maximise the performance of existing networks in the company. This design is to provide network capacity for users evenly using the Simple Queue method and can monitor the existing network in the company so that there can be no more problems in getting network capacity where previously the capacity that each user got was uneven. This computer network design is based on a case study at CV. Ide Maju Berkarya which lasted for 4 (four) months. The object of activity carried out in the form of direct observation to the field to see the circumstances and situations that occur, how the performance of the existing network at CV. Ide Maju Berkarya. From the conditions that occur in the field, it can be seen that the distribution of nets for each employee is not evenly distributed, there is no network that can monitor the network in the company so that problems often occur when using the internet becomes slow and disconnected. Conclusions and suggestions on the design of this computer network are to be able to improve the performance of existing networks in the company by sharing the capacity of each user evenly when using internet access in the company and can monitor traffic and users connected to the network.


Introduction
Science and technology that develops from time to time causes human needs to increase (Reeves & Crippen, 2021;Vladova et al., 2021).To deal with these technological developments, is to develop human resources and improve skills so that they are able to compete in facing the challenges of technological development (Haleem et al., 2022;Indrawati & Kuncoro, 2021;Kang et al., 2019).Communication using internet technology is almost a primary need for everyone today (Ayaz et al., 2019;Selvaraj et al., 2021).Almost everyone in this world needs an internet network for their daily needs.The Wireless Fidelity network or commonly called wifi is very familiar to our ears, because at this time it is very easy for us to find in various places such as in offices, in educational institutions or in the business sector there is a Wireless network (Liao et al., 2017).
The results of interviews on 15 September 2021 with Mr Suhendri as general manager at CV. Ide Maju Berkarya and also made observations in the field directly.The amount of internet needs at CV. Ide Maju Berkarya where currently the internet used by Indihome is 50 Mbps and there are seventeen devices connected to the internet where five computers and seven leptops are on the second floor, two computers and three leptops on the first floor which are all computer and laptop devices.High internet requirements affect the network capacity provided by the internet provide (Poulopoulos & Wallace, 2022).Where for employees who use leptops, they still access the internet using Wireless Fidelity which is uneven because the range of routers on the second floor is far away, making employees on the first floor slow and disconnected in accessing the internet (Hariadi et al., 2019;Indrawati & Kuncoro, 2021).There is no network system to monitor the company's existing network.So that in checking the network when the network has problems, the information obtained is not optimal so that it cannot be repaired quickly (Liang et al., 2020).The distribution of network capacity that is not equally large for each user results in users having difficulty using the internet facilities that have been provided (Healy et al., 2022), sometimes there are those who access the internet smoothly, there are also some employees who are slow in accessing the internet.This is caused by the absence of maximum or minimum bandwidth restrictions for each user.
The purpose of the computer network is to make it easier to monitor the network in the company, because this computer network has a server that can monitor the computer client network in CV.Ide Maju Berkarya, and also this bandwidth network management can divide the network according to the needs of each division of the company with this management is very useful because it can maximise network performance so that no one is disconnected and slow in accessing the internet.
According to (Tao et al., 2021), The Simple Queue method is a fairly simple method of configuring it.In the simple queue method we cannot allocate special bandwidth for ICMP (internet Control Message Protocol) so that if the bandwidth usage on the client is full the ping time will increase and even RTO (Request time out).According to (Prasetya et al., 2023), Network Development Life Cyle (NDLC) is one of the methods used in developing methods in networks.Where NDLC has six (6) stages, namely Analysis, Design, Prototype Simulation, Implementation Monitoring and Management.

Methods
In this study the authors used the process at the stages of the Network Development Life Cyle (NDLC) method, which is one of the methods used in developing methods in the network.Where NDLC has six (6) stages, namely Analysis, Design, Simulation Prototype, Implementation Monitoring and Management.This method is a method that is easy to control, flexible and can contain developer strategies to be comprehensive where the entire team works as a unit to achieve the same goal.The stages in the development of the Network Development Life Cycle (NDLC) method are as follows (Siswanto et al., 2021): The stages in the development of the Network Development Life Cycle (NDLC) method are as follows: a. Analysis is the first stage of research including problem analysis, and analysis of existing network topology.b.Design is the second stage that researchers do, where in this design stage a depiction of the proposed existing network scheme architecture will be made.c.Simulation Prototyping is the third stage that researchers do, where at this simulation stage will build a prototype system from the data that has been obtained in the previous stage using Cisco packet tracert software as a replica of the system to be run.Implementation of the fourth stage that researchers do, where at this stage the design specifications will be carried out including network configuration installation, hardware network installation (hadware); d.Monitoring the fifth stage that researchers do, where at this monitoring stage testing of the network infrastructure that has been implemented runs or not; e. Management is the sixth stage that researchers do, where at this management stage it regulates so that the system can run well and can last a long time.

Results and Discussion
The author develops network technology that can monitor the existing network at CV. Ide Maju Berkarya and distribute capacity evenly to get existing results.According to the author, the company really needs the Network Development Life Cyle (NDLC) method, which is one of the methods used in developing methods in the network.Where NDLC has six (6) stages, namely Analysis, Design, Simulation Prototype, Implementation Monitoring and Management (Siswanto et al., 2021).

Analysis
The stage of describing all the needs used to describe the needs in detail with the aim of producing something new or updating (Kondaveeti et al., 2021).At this stage, the process of identifying the system concept is carried out, as well as defining the needs of a number of elements or components of the system.

Hardware Requirements Analysis
As for some of the hardware needed in the design of this computer network, we can see from the table below:

Software Requirements Analysis
There are several software applications that are also needed in building a computer network that we can see from the table below:

Design
The design stage is part of the design process of the network infrastructure to connect each client and server computer in CV Ide Maju Berkarya (Huda et al., 2021).Furthermore, the initial stage carried out is to choose the appropriate topology from the room in CV Ide Maju Berkarya.And User IP Adrees Design.We can see from the description below:

Network structure design
The following is part of several network structure drawings that will be applied according to the results of observing the room at CV Ide Maju Berkarya.The following is the design of the Overall Network structure at this stage is an overview of the overall design of the network being built and can be seen as follows:

IP Adrees Usage Design
At this stage, the IP address design in CV Ide Maju Berkarya will be used in the network, and the distribution of this IP address is divided into 2 networks from the router. 1 network is used for the Mikrotik Router Internet IP network, 1 network is used for the Wifi IP network and LAN IP is used for LAN networks.Network division is in the table below:

Simululasi Jaringan
At this stage the author selects the simulator that will be used in this research, namely using Cisco Paket Tracer Version 7.0, in this simulation process there are features that make it easy to design and build networks that have various real network capabilities in their configuration, so this will make network simulation in accordance with reality and in this case simulation can also make it possible to combine several levels.The network topology design after the application of supporting devices in building the network is as follows: In Figure 3 shows that the network topology that the researcher wants to build and has implemented additional supporting devices in building the network, where there are proxy routers, switches, and the addition of two access ponit routers and repeaters that are interconnected and work together in the network so that employees at CV Ide Maju Berkarya can feel internet access and connect to the network during working hours and break hours because the network that has been installed is already accessible and in simulation form ready for implementation.

Implementation
In implementing the network design using several supporting devices, the author installs from device installation to network settings using the winbox application to configure and provide security on the network via proxy (Fachrurrozi et al., 2023;Owens, 2019;Safaei Pour et al., 2023).

Physical Implementation
As for this stage, it can be seen that the installation of proxy devices, switches, routers in CV.Ide Maju Berkarya.which can be seen below in Figure 4. Below which is placed inside.

Configuration Implementation
The stages of configuration implementation at CV. Ide Maju Berkarya there are several stages described below, as well as the results of the configuration.a. Mikrotik Configuration The proxy configuration consists of several parts starting from login until the configuration is complete as explained in each of the following points: 1) Interface Settings The author makes settings in the Interface menu where in the Interface menu the author only changes the name on each Ether to make it easier for the author when doing other configurations, here the author changes ether1 Next, create a schedule to run the monitoring script where the script functions to send traffic messages in telegram.For this CV.Ide Maju Berkarya, the author makes 2 schedules.Where the schedule is made to run the script at 10:30 and 15:00.By way of system> Schedule> click +> Name: Monitoring1 > Star Time: 10:30 > Interval: 1d > input the command to run the script on On Event.Then choose Apply and ok.Then do the same thing to create monitring2, system > Schedule > click + > Name: Monitoring2 > Star Time : 15:00 >Interval: 1d > input the command to run the script on On Event.Then choose Apply and ok.f.WI-FI Portal Login Configuration At this stage the author creates a login portal for the Wi-FI network in CV.Ide Maju Berkarya.this portal login has several stages.The first stage enters the templet that has been created on the proxy by entering the file menu in the winbox then copying the templet file on the file menu.
Then enter IP> Hotspot> Server> Hotspot Setup> HotSpot Interface: LAN then select next.
For the next DNS Name input here the author enters the DNS Name: IMB.net then select next.Next, enter the user and password to log in to the network at CV. Ide Maju Berkarya.then choose next.Select Hotspot Server Profile select Hostpot with DNS Name IMB.net, then in the HTML Directory select the templet file that was copied in the file menu.Then choose Apply and ok.

Implementation of Configuration Results
The implementation of the results of this configuration shows the results of the configuration made at CV. Ide Maju Berkarya which is described below: a. Router configuration results In the picture below is the result of configuring the TP-Link Router model TD-W8951ND with the name WI-FI: IMB where this Router Access point can already be used by employees at CV. Ide Maju Berkarya.

Monitoring
At the monitoring stage, the process is carried out to monitor the network that was built and this monitoring can see the success of the previous stages, with this because in this monitoring the author and the admin can later find out the errors or successes of the network that have been built at the monitoring results stage.In Figure 13 a network speed test is carried out with speedtest, and in Figure 12 it can be seen the results of monitoring traffic usage via Telegram in CV.Ide Maju Berkarya.

Management
From the 5 stages above, it is certain that the computer network built at CV. Ide Maju Berkaraya has been running well, and has a long period of use.The network that is formed is also very helpful in the work of employees at CV Ide Maju Berkaya.With well-designed bandwidth management to limit upload and download speeds so that the speed of internet access for other activities can be maximised.

Conclusion and Suggestion
Based on the results of the discussion of writing in all sections regarding Computer Network Design Using the Simple Queue Method at CV. Ide Maju Berkarya, the authors put forward the following conclusions: a.In the Design of Computer Networks Using the Simple Queue Method at CV. Ide Maju Berkarya, the author has designed a network that can monitor the network, distribute the capacity of the network that is evenly distributed and add access points on the first floor with results that run well, where previously the network in the company did not have an uneven distribution of network capacity which often resulted in slow and disconnected when using the network.b.The role of the Network Development Life Cycle (NDLC) method in this research has gone well, so that it can facilitate the implementation of making the system built from scratch until the system is ready for use.
Based on the conclusions that the author has made, the author puts forward several suggestions that can be used as input and consideration by the company CV.Ide Maju Berkarya.These suggestions include: a. Improving the quality of internet speed in provaider because the needs of every user who uses the network increase with the times.b.Implementing Web Proxy, where a web proxy is a server computer that acts as another computer to receive or request content from an internet network, with the aim that later users who use the internet.Forward Working Idea access rights are limited, meaning that there are certain websites that cannot be accessed or there are several websites that can be accessed but with certain times and hours.c.Implementing Firewalls with Network Security using several software, one of which is the Intrusion Detection System (IDS) with the aim of being able to detect suspicious activity in a system or network.d.Implement Load Balance because Load Balance itself is a technique for dividing the load into several link paths, with the aim that no link gets a bigger load than other links.It is hoped that by dividing the load into several links, there will be a balance in the use of existing links in an Autonomous System (AS).

Figure 7 :
Figure 7: Bandwidth Management Configuration Results

Figure 8 :
Figure 8: Results before Bandwidth Management In Figure 9 is the result after Bandwidth Management is carried out at CV. Ide Maju Berkarya

Figure 9 :
Figure 9: Results After Bandwidth Management

Figure 10 :
Figure 10: Network Monitoring Configuration via Telegram

Figure 11 :
Figure 11: Default Login and Portal Login Pages

Table 1 :
Hardware Required

Table 2 :
Required Software

Table 2 :
Pengguna IP Address The table above can be explained that the Internet interface has an IP address of192.168.1.100-192.168.1.254andthesubnetmask of the modem interface is 255.255.255.0IPaddress192.168.1.1 will be used for the modem network Gateway, will not be used by other clients.Then for the LAN interface, it can be explained that it has an IP address of192.168.10.2 -192.168.10.254and the subnetmask of the LAN interface is255.255.255.0IPaddress 192.168.10.1 will be used to give its IP address given by DHCP.
= Internet and Ether2 = LAN.2) IP Address Configuration At this stage the author enters Ip Adrees in accordance with the Interface that has been created by the author entering Ip 192.168.1.100/24,the Intefacenya The author chooses the Internet because the Ip is for the internet, and in the network the IP will automatically appear after selecting the applay.Next do the same thing add another IP to the address list, namely the IP for LAN = 192.168.10.1/24.We can see the results in the picture below.3) Gateway Configuration in this configuration the author enters the Gateway in the routes menu for the IP on this Geteway It must be in accordance with each internet provider used here the author uses indihome So for indihome Gateway IP is 192.168.1.1.4) 4) Firewal Configuration at the Firewall configuration stage, the writer adds mascurade to the NAT menu.It can be explained that the Mikrotik Router in this scenario is a router that is between the public network (internet) and the Local LAN network.Routers in this position must run Network Address Translation (NAT) which functions to change the IP address on each data packet that comes out of the user device (Private IP Address) to a public IP Address.For out.interface select internet, then select Action then select mascuerade which we can see in the picture below.5) DNS configuration at this stage is part of mapping hostnames or sites on the internet into IP addresses.Based on the scenario, the DNS Server used is the Google DNS Server with an IP address of 8.8.8.8 which will make the Mikrotik Router a DNS Server as well.So that later the DNS configuration on the user device is simply directed to the Mikrotik Router, and no longer directed to the ISP's DNS Server.This technique can save bandwidth because DNS queries will only be given to the Mikrotik Router.b.Access point Router Configuration Next on the quick start page -Wlan dpda at this stage I only change the SSID and Pre-Sharde key where for SSID = IMB and for Pre-Sharde key = ImbLantai1 then select Next.Next enter the Quick Star complete page on this page the end of the configuration in Quick Star.And to save the results of what has been edited above, select next.That way it is automatically saved.From the several stages above, the configuration of the Access point Router section using the TP-LINK TD-W8951IND router model has been completed.c.Access Point Repeater Configuration The repeater configuration consists of several steps using hardware devices, namely Samsung HP and TP-Link Extender model TL-WA820RE.As well as using the Tether application provided by TP-Link which can be downloaded at the play store.Which has several stages that can be explained below.The first stage turns on the TP-Link Extender model TL-WA820RE.Connect the TP-Link Extender device with a mobile phone using WI-FI.Then select the WI-FI that you want to connect with the TP-Link Extender, namely IMB.Next, enter the WI-FI IMB password then select next.At this stage I only changed the SSID = IMB_LT1 which is to distinguish the WI-FI router on the second floor from the repeater on the first floor.d.Bandwidth Management Configuration Bandwidth Management configuration consists of several steps where I use a Mikrotik router and use winbox software and use the Simple Queue method in Bandwidth Management at CV. Ide Maju Berkarya.The first step is to create a Parent in the Simple Queue with IP subnet by logging in Mikrotik using winbox and entering the queue section> Simple Queue> click Icon +> Name: TrafficLocal > Target: 192.168.10.0/24> Max Limit: 50M / 50M (Target Upload / Target Download).Then select Apply and ok.The next stage is to enter a script on the DHCP Server where this script is used for Bandwidth Management where every user or device connected to the network at CV. Ide Maju works will be listed in a simple queue list where the Mac Address, IP of each device, with Max Limit: 45M/45M (Target Upload/Target Download) and Limit at : 25M/25M (Target Upload/Target Download) by using the parent that has been created.By entering IP> DHCP Server> double click on dhcp1> input script.Then select Apply and Ok e. Configuration of network monitoring via Telegram Configuring network monitoring via Telegram at CV.Ide Maju Berkarya consists of several steps where I use winbox and Telegram software.Where the steps are explained below.The first step that must be done is to create a Telegram Bot.open the Telgram application, then search for the @BotFather account then we chat by just clicking on the account, then click Start and type /newbot.Next create a bot name, the /newbot command is used to create a new bot.In this step I created a bot with the name NetworkComputerImb_bot.After the name is verified and there is no duplication of names, the Bot is successfully created.Then information about the HTTP API Token appears, please note it because this token is used in the script later.Furthermore, the author creates a group in telegram where this group functions to send network monitoring traffic in CV.Ide Maju Berkarya by entering the telegram bot that has been created.With the name IMB_Monitoring_Network Group.The next step is to enter the script in the winbox by selecting system> Script> click +> enter the script in the source column.Then choose Apply and ok.