Syntax Literate: Jurnal Ilmiah Indonesia p�ISSN:
2541-0849
e-ISSN:
2548-1398
Vol.
7, No. 4, April 2022
ANALYSIS AND DESIGN WIRELESS NETWORK AND SECURITY BASED ON FIREWALL IN PIT MINING
AREA PT ABC
Yanto Setiawan, Agustiawan Sembiring, Muhammad Arif, Wihdayati
Computer Science Bina
Nusantara, Jakarta, Indonesia
Email: [email protected], [email protected], [email protected], [email protected]
Abstract
The 4.0 Industrial revolution has entered the
mining industry. One of them is the application of big data technology in PT
ABC, a coal mining contractor in Indonesia. To support the project's
performance, an extensive internet connection covering certain areas, including
pit areas, is needed. However, there are areas outside the GSM or Wi-Fi service
in PT ABC District XYZ. To solve the issue, proper planning and analysis of
Wi-Fi network coverage development and firewall-based wireless security are
needed to support the operational of big data technology in the company's
internal system. The planning and development of this network coverage and
wireless security use the Network Development Life Cycle (NDLC) method. This
method is useful to continue the improvement on wireless network in PT XYZ. The
benefit of the NDLC method is that when someday an alteration is needed on the
network, life cycle data has been recorded in the NDLC method. The result of
this study is a design that can fix or cover the deficiency of the existing
network condition. The design is in the form of Access Point placement design
and access network settings using wireless security.
Keywords: Wireless network; wireless security;
firewall; NDLC; access point
Introduction
Various countries in the world, one of which is Indonesia,
has entered the Era Revolution of Industry 4.0. In general, Industry 4.0
describes the growing trend towards automation and data exchange in technology
and processes in the manufacturing industry (Hermann, Pentek, & Otto, 2016);
(Landherr, Schneider, & Bauernhansl, 2016);
(Lasi, Fettke, Kemper, Feld, & Hoffmann, 2014).
These trends include the Internet of Things (IoT), Industrial Internet of
Things (IoT), cyber-physical systems (CPS), artificial intelligence (AI), smart
factories, cloud computing systems, and so on. In addition to technology, the
development of Big Data is also starting to affect our lives today (Suherman, Wijoyo, & Indrawan, 2020).
The use of the internet using wireless connectivity is an
important part of the process of sending and receiving data between devices.
Today's internet connection has become part of the needs of every individual,
one of which is the use of Wi-Fi (Wireless Fidelity). Wi-Fi is one of the technologies
of WLAN (Wireless Local Area Network), which is commonly found in industrial
sector. Wi-Fi Usageaccess to the internet continues
to increase along with the increasing use of smartphones.
Wireless Local Area Network (WLAN) is a development of Local
Area Network (LAN) (Jaringan Wireless et al., 2014).
In WLAN no longer used cables for the process of sending and receiving data
between devices. Thus, the network is easier to build without designing paths
for cabling. In addition, the construction of WLAN is also relatively cheaper
because there is no need for connecting cables between devices. Currently, WLAN
has two frequencies used, namely at 2.4 GHz and 5 GHz.
One of the important parts of a Wi-Fi device is the Access
Point (AP). Access point is interpreted as a device that can transmit signals
to and from the receiver. These devices are very easy to find in the market at
an affordable price. However, the device access point also sometimes gives
problems, for example Improper placement of access points makes some location
points into areas that get a bad Wi-Fi signal and may also not get a signal at
all or known as the blankspot area.
The industrial revolution 4.0 has also entered the world of
the mining industry. One of them is the use of big data technology in one of
the coal mining contractor companies in Indonesia, namely PT ABC. To support
the smooth running of the project, an internet connection is needed that covers
certain areas, especially in the pit area. However, the actual conditions in the
work environment at PT ABC District XYZ still have several location areas that
are not covered by GSM or Wi-Fi networks at all. This will certainly disrupt
the smooth operation of big data in the company's
internal.
Therefore, the authors are interested in analyzing the
planning for the development of Wi-Fi network coverage and wireless security in
the blank spot area in the PT ABC pit District XYZ so that it can help the
smooth operation of the use of big data technology in the company's
internal.
Research
Methods
This qualitative research was conducted in four blank spot
areas in the PT ABC District XYZ pit using the Network Development Life Cycle
development method. The method consists of six stages, including:
1.
Analysis
Stage is carried out by
analysis to obtain overall information regarding the development that will be
carried out to suit user needs. The following is an overview of the initial
topology of the development of Wi-Fi access in the corporate environment.
Figure
1
Initial
Topology of Development
The wireless coverage development
method used in this research is point-to-multipoint wireless coverage. This is
because it is more cost-effective, reduces frequency interference, and is
suitable for implementation in the development of PT ABC's wireless pit area
coverage, District XYZ.
For the method of restricting user
access, the method used is Firewall Packet Filtering. This type of method is
used to filter data packets based on the specified address and options. The
method is designed to control the flow of packets based on the origin,
destination, port, and type of packet information contained in each packet.
2.
Design
The following is the
design for the development of wireless network coverage and the design of
wireless security proposed in this study.
Figure
2
Wireless
Topology and Wireless Security Development Plan
In the design of the
development of wireless coverage, there is the installation of one point in the
main office tower area as a Base Station, which will later reach the four location
points.
While in the design of
wireless security based on firewalls, there is a plan in bandwidth usage which
are differentiated in each of the different department�s user groups.
3.
Simulation Prototype
In this study, a
simulation was carried out using the InfiPlanner application
which is then carried out several simulation tests to determine the required
height in the placement of the Access Point repeater points to cover the
required areas that have been described previously.
Meanwhile, for the simulation
in the design of wireless security, this research was carried out directly with
the configuration of the FortiGate device which was then tested directly using
a gadget or laptop.
4.
Implementation
This stage will take
longer than the previous stage. In implementation Network Engineer implements
everything that has been planned and previously designed.
Implementation is a very
decisive stage of the success/failure of the project to be built and it is at
this stage that Teamwork will be tested in the field to solve technical and
non-technical problems.
5.
Monitoring
After the implementation
of the monitoring stage is an important stage, so that the computer and
communication network can run according to the wishes and initial goals of the user in
the early stages of analysis, it is necessary to carry out monitoring
activities. In this study, the monitoring tools used are the monitoring tools,
the dude mikrotik and cacti.
6.
Management
Management or regulation,
one of which is of particular concern is the issue of policy, policies need to
be made to make/manage so that the system that has been built and runs well can
last a long time and the element of reliability is maintained. The policy will
depend on the management level policy and the company's business strategy,
which should support the company's business strategy as much as possible.
Results and
Discussion
A. Implementation
1.
Wireless Coverage Development
Design
From the results of
determining the height with a simulation using the InfiPlanner
tools needed for the installation of an access point to reach the location, the
highest point is found in 4 areas, which is 39 meters. The following is the
throughput of each connected station.
Figure
3
Throughput
Results of All Stations in the Pit Area
2.
Wireless Security
Development Design
Firewall-based wireless
security configuration is done by using a FortiGate device. The role of
FortiGate devices in limiting access rights is to restrict users from accessing
websites and mobile applications.
Figure
4
Configure
Application Control
Figure
5
Example
of Wireless Web Filter Configuration
Figure
6
Configuring
Rules and Policies for Wi-Fi Access
After all the
configuration is done, the ethernet interface on the previously configured
FortiGate is directly connected to the company's core switch which we then give
access to the new VLAN. In this case, we set it to VLAN 35 and VLAN 40. This is
the VLAN that we will use later for Wi-Fi access all devices in the office area
and mining area.
3.
Results of Monitoring
Dashboard Design
a)
The dude mikrotik
The dude mikrotik is a built-in tool for mikrotik
products that is used as monitoring network development of wireless coverage.
To activate this feature, it is necessary to install this tool on two sides,
namely on the server side (from the router board) and on the client side
(client computer). Here's what the monitoring tools look like: the dude mikrotik after all repeater devices in the mine area has
been added to the dashboard.
Figure
7
Display
of the Dude Device Monitoring Dashboard
b)
Cacti
In contrast to Dude Mikrotik, cacti are quite install
on one of the computers that will be used as a server based on the Ubuntu
operating system. To enable cacti, need to install the required packages like
apache2 as a web server and MySQL as database server.
Figure
8
WAN
1 Monitoring Graph Configuration on Cacti
Figure
9
WAN
2 Monitoring Graph Configuration on Cacti
c)
Unifi Controller
Unifi controller is the
default software from Ubiquiti products that are used to manage and monitor a
large number of unifi access point devices. Because
in this study the access point used is an unifi
device, so we need to install and configure this controller.
Figure
10
Adding
an UniFi Access Point Device to the Controller
Figure
11
SSID
Configuration on UniFi Controller
B. Testing
and Evaluation
1. Result of the Speed test
Internet access
In this step, internet
access testing will be carried out by connecting to a Wi-Fi network access with
the PMob SSID. Here is the results ratio test try
internet access with using speedtest in each area
where the repeater has been installed.
Table
1
Speedtest Test
Results at Pit Locations
Location |
Test |
Results |
|
Download |
Upload |
||
CD pit |
Speedtest |
4.26 |
3.97 |
East CH Pit |
Speedtest |
4.66 |
2.77 |
West CH Pit |
Speedtest |
3.32 |
2.43 |
CM pit |
Speedtest |
3.98 |
3.62 |
Speed test
comparison in each area for Internet access has been met. In this case, it can
be proven by the speed test results obtained in each area that have met the
needs. Where in need to carry out big data processing transactions, a minimum
bandwidth of 1 Mbps is required.
In addition,
from the test results above, when referring to the Tiphon standard which has
been discussed in the previous chapter, it can be described according to the
following table:
Table 2
Speedtest
Results Evaluation Table
Category |
CD pit |
East CH Pit |
West CH Pit |
CM pit |
Jitter |
18 ms |
35 ms |
17 ms |
33 ms |
Loss Packet |
3.9% |
3.1% |
3.3 % |
5.7% |
Loss Packet 3.9% 3.1% 3.3 % 5.7%
From these
results, if converted into standard Tiphon QoS Parameters, the results of the
speed test carried outfall into the medium category for Jitter and good for the
Packet Loss category.
2. Results
of Testing Wireless Security
At this
stage, testing the configured wireless security configuration is carried out by
accessing some websites that are allowed and not permitted in need. Here are
the test results by accessing several applications that are in the firewall
policy rule the one in the block.
Figure 12
Test Results Try Accessing YouTube Pages
Figure 13
Test Results Try Accessing Facebook Page
The
display above indicates that wireless security is running well where users
cannot access the website. The next test is to access several websites that are
allowed by the firewall.
Figure 14
Test Results Try Accessing WhatsApp Page
Figure 15
Test Results for Access to Company Pages
In the
display above the WhatsApp website can be accessed by the user. The rules and
policies that we have previously set are running well.
3. Results
of Testing Wireless Security
At this
testing stage, bandwidth utilization testing will be carried out after the
development wireless coverage and firewall-based wireless security.
Figure 16
Astinet Traffic After Implementing Packet Filtering
In the graph
above, it can be seen that the bandwidth utilization performance is stable even
though it occasionally approaches over-capacity bandwidth. This will affect
maintaining the stability of internet access.
Conclusion
Based
on the results development that has been carried out, it can be concluded that:
1) with the method of developing point-to-multipoint wireless network coverage,
there is an expansion of coverage wireless is about 25% of the previous
condition wherefrom the results of the Q o S standard parameters of Tiphon all pit locations in the development design have
obtained Wi-Fi coverage with the Jitter category it is in the medium-scale and
for the packet loss category it is in the good scale with the addition of the
following devices: a) basestation, addition of infinet Wireless R5000-Smnb/5.300.2x63.2x16 device - InfiMAN 2x2 on the station side in the tower office area at
the height of 39 meters to reach all locations of wireless coverage
development. b) station, in addition by using the device Infinet
Wireless R5000-Smn/5.300.2x63.2x19 as a station at 4 pit locations. c) access
Point Wi-Fi, Wi-Fi signal transmitters, UniFi Access
Point devices are added in 4 locations that can be monitored directly from the
office area. 2) with the development method of wireless security packet
filtering on FortiGate devices, it helps in maintaining the stability of
bandwidth utilization where the average bandwidth utilization is still at 50% -
70% of the existing bandwidth capacity.
Hermann, M., Pentek, T., & Otto, B.
(2016). Design principles for Industrie 4.0 scenarios (Vol. 2016). IEEE
Computer Society. Google Scholar
Landherr, Martin, Schneider, Ulrich, &
Bauernhansl, Thomas. (2016). The Application Center Industrie
4.0-Industry-driven manufacturing, research and development. Procedia Cirp,
57, 26�31. Google Scholar
Lasi, Heiner, Fettke, Peter, Kemper, Hans
Georg, Feld, Thomas, & Hoffmann, Michael. (2014). Industry 4.0. Business
& Information Systems Engineering, 6(4), 239�242. Google Scholar
Suherman, Musnaini, Wijoyo, Hadion, &
Indrawan, Irjus. (2020). Industry 4.0 Vs Society 5.0. Cv. Pena Persada. Google Scholar
Copyright holder: Yanto Setiawan, Agustiawan
Sembiring, Muhammad Arif,
Wihdayati (2022) |
First publication right: Syntax Literate: Jurnal Ilmiah
Indonesia |
This article is licensed
under: |