Analisis Fungsi Keamanan Terhadap Kinerja Router Pada Jaringan Berkecepatan Tinggi
DOI:
https://doi.org/10.33633/tc.v16i1.1317Abstract
Router adalah sebuah perangkat pada jaringan komputer yang digunakan untuk meneruskan paket data. Karena fungsinya, router menjadi peran penting dalam mengukur kinerja jaringan komputer. Router perlu memproses paket data yang masuk dengan kecepatan tinggi dan delay sedikit mungkin. Oleh karena itu, router harus didukung dengan sistem keamanan yang baik juga. Aktivasi aplikasi keamanan dan enkripsi data pada router dan firewall dapat mengkonsumsi sumber daya CPU untuk komputasi tambahan dan hal ini dapat mempengaruhi penurunan kinerja router. Selain itu, mekanisme keamanan di router bisa membawa kemungkinan kemacetan di jaringan pada saat ON/OFF fungsi keamanan sehingga dapat mempengaruhi kinerja router dalam meneruskan paket data. Sebuah analisis kuantitatif didasarkan pada teori antrian dapat digunakan untuk mengukur dan memprediksi serta meningkatkan kinerja router. Dalam tulisan ini, beberapa skenario simulasi akan dilakukan untuk menganalisis pengaruh fungsi keamanan di router pada jaringan kecepatan tinggi. Skenario tersebut menggunakan distribusi Generalized Exponential (GE-type) untuk mencerminkan interarrival bursty dan waktu servis pada router. Hasil penelitian menunjukkan bahwa fungsi keamanan di router bisa membawa penurunan pada kinerjanya. Kata kunci— router, keamanan, kinerja, teori antrian, jaringan berkecepatan tinggiReferences
P. Jungck and S. S. Y. Shim, “Issues in high-speed Internet security,†in IEEE Computer Society, 2004, vol. 37, no. 7, pp. 36–42.
G. Miskeen, D. D. Kouvatsos, and M. Akhlaq, “Performance and Security Trade-off for Routers in High Speed Networks,†in the 26th UK Performance Engineering Workshop (UKPEW 2010), 2010, pp. 119–128.
S. Alabady, “Design and Implementation of a Network Security Model for Cooperative Network,†Int. Arab J. e-Technology, vol. 1, no. 2, pp. 26–36, 2009.
I. Al-Khatib, “Performance Analysis of Wireless LAN Access Points,†Royal Institute of Technology, Stockholm, Sweden, 2003.
V. Zorkadis, “Security Versus performance in Data Communication Systems,†in Computer Security — ESORICS 94, USA: Springer Berlin Heidelberg, 1994, pp. 19–30.
I. A. Almerhag and M. E. Woodward, “Security As A Quality Of Service Routing Problem,†in Conext, 2005, pp. 222–223.
P. D. R. Sethmann, “Access Control Lists (ACLs),†2006.
W. Stallings, “Queuing Analysis,†p. 18, 2000.
K. D. Irianto and D. D. Kouvatsos, “An Investigation of Performance versus Security in Cognitive Radio Networks with Supporting Cloud Platforms,†Int. J. Comput. Electr. Autom. Control Inf. Eng., vol. 8, no. 10, pp. 1702–1709, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2017 Kurniawan Dwi Irianto

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
License Terms
All articles published in Techno.COM Journal are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This means:
1. Attribution
Readers and users are free to:
-
Share – Copy and redistribute the material in any medium or format.
-
Adapt – Remix, transform, and build upon the material.
As long as proper credit is given to the original work by citing the author(s) and the journal.
2. Non-Commercial Use
-
The material cannot be used for commercial purposes.
-
Commercial use includes selling the content, using it in commercial advertising, or integrating it into products/services for profit.
3. Rights of Authors
-
Authors retain copyright and grant Techno.COM Journal the right to publish the article.
-
Authors can distribute their work (e.g., in institutional repositories or personal websites) with proper acknowledgment of the journal.
4. No Additional Restrictions
-
The journal cannot apply legal terms or technological measures that restrict others from using the material in ways allowed by the license.
5. Disclaimer
-
The journal is not responsible for how the published content is used by third parties.
-
The opinions expressed in the articles are solely those of the authors.
For more details, visit the Creative Commons License Page:
? https://creativecommons.org/licenses/by-nc/4.0/