The selection of the topology used is based on devices that have a non-stop work rate with network devices that have a low level of work being a method of grouping within the network topology. The company has 500 employees and consists of 17 branch offices and 1 head office, while the IP addresses used on all network devices use IPv4 using class B, which is 172.16.0.0 with a subnet mask of /24 or 255.255.255. With the use of class B subnet blocks 172.16.0.0/24, 18 subnet blocks are needed, namely subnet blocks 172.16.0.0/24 to 172.16.17.0/24 because PT Bimasakti Mandiri Perkasa has 1 head office and 17 branch offices. spread throughout Indonesia. Furthermore, when viewed from the side of the use of IP addresses, many IP addresses are not used because they equally divide the provision of addresses at the 18 company offices as many as 254 IP addresses, while the use of IP addresses in each office is different. To make efficient use of IP addresses that will be applied to computer networks, a good method is to use VLSM.
Jurnal Genap 21-22
ST Penelitian Genap 21-22
[1] S. T. Samuel, S. Raharjo, and M. Sholeh, “Perancangan Jaringan Komputer
Pada Rumah Sakit Soedarsono Darmosoewito Di Batam,” J. JARKOM, vol. 7,
no. 1, pp. 44–59, 2019.
[2] R. N. Dasmen, “Implementasi
Metode VLSM (Variable Length Subnet Mask) Pada Pemetaan Ip Address Lan (Local
Area Network) Stiper Srwigama Palembang,” Comput. J. Comput. Sci. Inf. Syst., vol. 2, no.
2, p. 112, 2018, doi: 10.24912/computatio.v2i2.1703.
[3] M. A. Zakariah, V. Alfriani,
and K. M. Zakariah, “METODOLOGI PENELITIAN KUALITATIF, KUANTITATIF, ACTION
RESEARCH, RESEARCH AND DEVELOPMENT (R n D).” Yayasan Pondok Pesantren Al
Mawaddah Warrahmah, Kolaka, p. 118, 2020.
[4] S. N. Khasanah, “Keamanan
Jaringan Dengan Packet Filtering Firewall (Studi Kasus : PT Sukses Berkat
Mandiri Jakarta),” Rev. Bras. Ergon., vol. 3, no. 2, pp. 80–91, 2016,
[Online]. Available:
https://ejournal.bsi.ac.id/ejurnal/index.php/khatulistiwa/article/view/1270.
[5] S. Pujowati and B. B.
Harianto, “Pengenalan Dasar Jaringan Komputer.” Pustaka Rumah Cinta, Magelang,
2021.
[6] W. Najib, “Panduan Praktikum
Jaringan Komputer Laboratorium Jaringan Komputer dan Aplikasi Terdistribusi.”
Gadjah Mada University Press, Yogyakarta, 2020.
[7] G. E. Clarke and E. Tetz,
“CompTIA A+ Certification All-In-One for Dummies 2nd Edition.” Wiley Publishing
Inc, Indianapolis, Indiana, 2010.
[8] K. Thakur, A. Kamruzzaman,
and A.-S. K. Pathan, “A Deeper Perspective on the Fundamentals od Digital
Communication Security and Privacy Protocols.” CRC Press, Florida, USA, 2022.
[9] O. K. Sulaiman, “13 Lab
Cisco Packet Tracer.” Kekata Publisher, Surakarta, 2017.
[10] T. Lammle, “CCNA Routing and
Switching Complete Deluxe Study Guide Second Edition.” John Wiley and Sons,
Inc, Indianapolis, Indiana, 2016.
[11] R. Weaver, D. Weaver, and D.
Farwood, “Guide to Network Defense and Countermeasures Third Edition.” Course
Techonlogy, Boston, USA, 2014.
[12] Agusriandi, A. Saputra, K.
Asmar, and S. Raehan, “Analisis Rancangan jaringan Komputer dalam Mendukung
W-Government.” CV Kitami, Enrekang, 2018.
[13] J. Al Amien and H. Mukhtar,
“Implementasi Jaringan Komputer.” Deepublish Publisher, Yogyakarta, 2020.