Per Connection Classifier Load Balancing dan Failover MikroTik pada Dua Line Internet
Abstract
Internet is a primary need for all people. Many companies integrate Web sites with back-office systems such as databases. Problem that occurs is that the utilization of the two internet lines is less than optimal and efficient. This happens because the two lines are not in the same network. Likewise at PT. ICC Export, it can be seen from two internet lines that are not managed and go directly to switch. so that there is often a buildup of internet traffic on one line, resulting in slow internet access. When one internet line is disconnected, internet connection will automatically be disconnected because modem is not managed by router, so it can't back up automatically. Purpose of making load balancing and failover at PT. ICC Export to try a solution if one of two internet lines is dead, other line is active and if both lines are active then it can run simultaneously. Per Connection Classifier Load Balancing and Failover MikroTik on Two Internet Lines managed to spread the connection load on ISP gateway used in a balanced way. Size of the packets that are passed to each ISP is not balanced, because the PCC method only divides based on the connection, not the size of packets that pass through ISP. When one line is disconnected, internet connection will be automatically transferred to an active internet line.
References
Abdullah, M. T., Qidri, S., Nuryadi, W., & Widianto, S. R. (2020). Failover Cluster Nodes and ISCSI Storage Area Network on Virtualization Windows Server 2016. JOIN (Jurnal Online Informatika), 5(1), 89–96. https://doi.org/10.15575/join.
Adhiwibowo, W., & Irawan, A. R. (2019). Implementasi Redundant Link Untuk Mengatasi Downtime Dengan Metode Failover. Jurnal Pengembangan Rekayasa Dan Teknologi, 15(1), 48. https://doi.org/10.26623/jprt.v15i1.1490
Christanto, F. W., Susanto, S., & Priyanto, A. (2019). Load Balancing-Failover Methods using Static Route with Address List, ECMP, PCC, and Nth for Optimizing LAN Network: A Comparison. International Journal of Communication Networks and Information Security, 11(3), 409–416.
Cristescu, G. C., Croitoru, V., & Sorici, V. (2016). Implementing an AAA-RADIUS solution based on legacy authentication protocols. 2016 12th International Symposium on Electronics and Telecommunications, ISETC 2016 - Conference Proceedings, 75–80. https://doi.org/10.1109/ISETC.2016.7781061
Discher, S. (2016). Load Balancing Using. What Is Load Balancing and Why Would I Want It?, 29–33. Retrieved from https://mum.mikrotik.com/presentations/US12/steve.pdf
Djumhadi, D., & Roring, R. S. (2020). Perancangan Dan Implementasi Jaringan Failover Menggunakan Protokol Spanning Tree Pada Pt. Pln Up3B Kalimantan Timur. Jurnal Ilmiah Matrik, 22(3), 249–256. https://doi.org/10.33557/jurnalmatrik.v22i3.1120
Duque, J. P., Beltrán, D. D., & Leguizamón, G. P. (2018). OpenDaylight vs. floodlight: Comparative analysis of a load balancing algorithm for software defined networking. International Journal of Communication Networks and Information Security, 10(2), 348–357.
Johnson, R. A., Wild, K., & Quammen, G. (2012). (12) United States Patent. 2(12). Retrieved from https://patentimages.storage.googleapis.com/6a/9c/f1/c2fc5cc1425463/US8341722.pdf
Jose, S. (2006). Cisco Unified Communications System for Contact Center Release 5 . 1 ( 1 ). Communications, 1(1).
Mishra Assistant Professor, A. (2015). Network Load Balancing and Its Performance Measures. International Journal of Computer Science Trends and Technology, 3(1), 77–81. Retrieved from www.ijcstjournal.org
Pauzhi, W., & Coronel, J. (2015). Security for WISP through Mikrotik equipment Mikrotik ). 2015 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), 229–233. Santiago, Chile.
Rahman, T. (2017). Implementasi Jaringan Vpn Eoip Tunnel Menggunakan Gns3. 306–314.
Safrianti, E. (2021). Peer Connection Classifier Method for Load Balancing Technique. International Journal of Electrical, Energy and Power System Engineering, 4(1), 127–133. https://doi.org/10.31258/ijeepse.4.1.127-133
Setiawan, R., Kartikasari, D. P., Rahayudi, B., Ilmu, F., Universitas, K., & Korespondensi, P. (2021). Implementasi Arsitektur Web Server Cluster Menggunakan Single Board Computer Untuk Menunjang Kebutuhan High Implementation of Web Server Cluster Using Single Board. Nasional, 8(2), 329–332. https://doi.org/10.25126/jtiik.202184512
Yuan, C., Du, J., Yue, M., & Ma, T. (2020). The design of large scale IP address and port scanning tool. Sensors (Switzerland), 20(16), 1–12. https://doi.org/10.3390/s20164423
Copyright (c) 2021 JIKA (Jurnal Informatika)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.