Perbandingan Kinerja Jaringan Kabel dan Nirkabel Pada Lingkungan Perkantoran
Kata Kunci:
Kata Kunci: jaringan komputer, jaringan kabel, jaringan nirkabel, Quality of Service, lingkungan perkantoranAbstrak
Jaringan komputer merupakan infrastruktur utama dalam lingkungan perkantoran modern yang mendukung berbagai layanan digital. Secara umum, jaringan kabel dikenal memiliki kestabilan dan kinerja tinggi, sedangkan jaringan nirkabel menawarkan fleksibilitas dan mobilitas. Namun, perbedaan karakteristik teknis kedua jenis jaringan tersebut menimbulkan variasi kinerja yang perlu dikaji secara empiris pada kondisi perkantoran nyata. Penelitian ini bertujuan untuk menganalisis dan membandingkan kinerja jaringan kabel dan jaringan nirkabel pada lingkungan perkantoran berdasarkan parameter Quality of Service (QoS). Penelitian ini menggunakan metode kuantitatif dengan pendekatan eksperimental. Pengujian dilakukan pada dua skenario jaringan, yaitu jaringan kabel dan jaringan nirkabel, dengan parameter pengukuran meliputi throughput, delay, jitter, dan packet loss. Pengambilan data dilakukan melalui beberapa kali pengujian dengan skenario lalu lintas data yang sama, kemudian dianalisis menggunakan statistik deskriptif. Hasil penelitian menunjukkan bahwa jaringan kabel memiliki kinerja yang lebih unggul dibandingkan jaringan nirkabel pada seluruh parameter QoS. Jaringan kabel menghasilkan throughput rata-rata sebesar 370 Mbps, delay 5,8 ms, jitter 4,9 ms, dan packet loss 0,8%. Sementara itu, jaringan nirkabel menghasilkan throughput rata-rata 210 Mbps, delay 13,5 ms, jitter 9,4 ms, dan packet loss 2,1%. Perbedaan ini dipengaruhi oleh media transmisi, mekanisme akses jaringan, serta kondisi lingkungan. Penelitian ini menyimpulkan bahwa jaringan kabel lebih andal untuk mendukung aplikasi perkantoran yang membutuhkan kestabilan dan performa tinggi, sedangkan jaringan nirkabel tetap relevan untuk mendukung mobilitas pengguna. Penelitian selanjutnya disarankan untuk mengkaji pengaruh standar Wi-Fi terbaru dan skenario beban jaringan yang lebih kompleks.
Unduhan
Referensi
REFERENSI
[1] F. P. E. Putra, F. Muslim, N. Hasanah, R. Paradina, and ..., “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. …, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/325
[2] F. P. E. Putra, S. R. Sutarsih, S. Sofiyulloh, and ..., “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang–Madura Berbasis Website,” 2024, jurnal.univrab.ac.id. [Online]. Available: https://jurnal.univrab.ac.id/index.php/rabit/article/download/4840/1965
[3] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. [Online]. Available: https://www.researchgate.net/profile/Fauzan-Eka-Putra-2/publication/392420575_Pemanfaatan_Mikrotik_Dalam_Manajemen_Bandwidth_Pada_Jaringan_Sekolah/links/6848fab46b5a287c304a61ca/Pemanfaatan-Mikrotik-Dalam-Manajemen-Bandwidth-Pada-Jaringan-Sekolah.pdf
[4] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” 2024. doi: 10.47709/digitech.v3i2.3446.
[5] F. P. E. Putra, S. M. Dewi, Maugfiroh, and A. Hamzah, “Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” 2023. [Online]. Available: https://jsisfotek.org/index.php/JSisfotek/article/view/232
[6] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.
[7] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[8] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.
[9] F. P. E. Putra, A. M. U. Solichin, and ..., “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. …, 2025, [Online]. Available: https://e-journal.hamzanwadi.ac.id/index.php/infotek/article/view/30559
[10] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.
[11] H. Liu, Z. Yang, N. Zhao, Y. Gu, and C. Yuen, “Interference-Aware Multihop Routing in UAV Networks: A Harmonic-Function-Based Potential Field Approach,” IEEE Internet Things J., vol. 11, no. 11, pp. 19406–19420, 2024, doi: 10.1109/JIOT.2024.3366580.
[12] A. Sghaier and A. Meddeb, “Real Time QoS in WSN-based Network Coding and Reinforcement Learning,” Inform., vol. 47, no. 4, pp. 477–486, 2023, doi: 10.31449/inf.v47i4.3102.
[13] Q. Ducasse, P. Cotret, and L. Lagadec, “War on JITs: Software-Based Attacks and Hybrid Defenses for JIT Compilers - A Comprehensive Survey,” ACM Comput. Surv., vol. 57, no. 9, 2025, doi: 10.1145/3731598.
[14] N. Singh and S. Suresh, “A Red-Zone-Based Randomized Angular Routing Protocol for Multisource Location Privacy in IoT Applications,” Int. J. Commun. Syst., vol. 38, no. 5, 2025, doi: 10.1002/dac.6014.
[15] X. Yu, “Exploiting data transmission for route discoveries in mobile ad hoc networks,” Wirel. Networks, vol. 31, no. 2, pp. 1337–1359, 2025, doi: 10.1007/s11276-024-03796-0.
[16] X. Zhao et al., “Framework Design of an Edge Gateway System Supporting Multi-Protocol Standardized Access Detection,” J. Adv. Comput. Intell. Intell. Informatics, vol. 27, no. 3, pp. 431–437, 2023, doi: 10.20965/jaciii.2023.p0431.
[17] W. Jerbi, O. Cheikhrouhou, A. Guermazi, and H. Hafedh, “MSU-TSCH: A Mobile Scheduling Updated Algorithm for TSCH in the Internet of Things,” IEEE Trans. Ind. Informatics, vol. 19, no. 7, pp. 7978–7985, 2023, doi: 10.1109/TII.2022.3215990.
[18] T. Prantl et al., “De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem,” Int. J. Inf. Secur., vol. 23, no. 2, pp. 1149–1169, 2024, doi: 10.1007/s10207-023-00781-0.
[19] C. Wang et al., “High-Entropy Ceramics Enhanced Droplet Electricity Generator for Energy Harvesting and Bacterial Detection,” Adv. Mater., vol. 36, no. 31, 2024, doi: 10.1002/adma.202400505.
[20] S. Newby, W. Mirihanage, and A. Anura Fernando, “Wearable, Knitted 3D Spacer Thermoelectric Generator with Detachable p-n Junctions for Body Heat Energy Harvesting,” Sensors, vol. 24, no. 16, 2024, doi: 10.3390/s24165140.
[21] B. A. Akram, A. Zafar, A. Saeed, S. H. Almotiri, and M. A. Al Ghamdi, “An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks,” KSII Trans. Internet Inf. Syst., vol. 18, no. 5, pp. 1390–1411, 2024, doi: 10.3837/tiis.2024.05.013.
[22] D. Sharma, V. Tilwari, and S. Pack, “An Overview for Designing 6G Networks: Technologies, Spectrum Management, Enhanced Air Interface, and AI/ML Optimization,” IEEE Internet Things J., vol. 12, no. 6, pp. 6133–6157, 2025, doi: 10.1109/JIOT.2024.3505617.
[23] I. Bansal and A. Thakur, “Broken promises and empty carts: the reality of online shopping,” J. Syst. Inf. Technol., vol. 27, no. 3, pp. 487–514, 2025, doi: 10.1108/JSIT-08-2024-0310.
[24] J. A. Zanoni, N. W. Emanetoglu, and M. da Cunha, “Room Temperature to 300°C SiC MOSFET Oscillator Under Fixed Bias,” IEEE Access, vol. 13, pp. 163640–163647, 2025, doi: 10.1109/ACCESS.2025.3611143.
[25] A. A. Yinusa et al., “Development of an App for analyzing and monitoring non-linear fluid-induced vibration of nanotube using analytical and machine learning approaches,” Next Mater., vol. 9, 2025, doi: 10.1016/j.nxmate.2025.101277.
[26] D. Saini et al., “A Spin-Charge-Regulated Self-Powered Nanogenerator for Simultaneous Pyro-Magneto-Electric Energy Harvesting,” ACS Nano, vol. 18, no. 18, pp. 11964–11977, 2024, doi: 10.1021/acsnano.4c02406.
[27] J. Garshasbi and M. Teimouri, “CNNPRE: A CNN-Based Protocol Reverse Engineering Method,” IEEE Access, vol. 11, pp. 116255–116268, 2023, doi: 10.1109/ACCESS.2023.3325391.
[28] A. I. Omi, A. Jiang, and B. Chatterjee, “Efficient Inductive Link Design: A Systematic Method for Optimum Biomedical Wireless Power Transfer in Area-Constrained Implants,” IEEE Trans. Biomed. Circuits Syst., vol. 19, no. 2, pp. 300–316, 2025, doi: 10.1109/TBCAS.2025.3531995.
[29] I. Villordo-Jiménez, N. Torres-Cruz, R. Menchaca-Méndez, and M. E. Rivero-Ángeles, “A Scalable and Energy-Efficient MAC Protocol for Linear Sensor Networks,” IEEE Access, vol. 10, pp. 36697–36710, 2022, doi: 10.1109/ACCESS.2022.3163728.
[30] H. Shekhawat and D. S. Gupta, “Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure,” Pervasive Mob. Comput., vol. 100, 2024, doi: 10.1016/j.pmcj.2024.101919.
[31] A. He, K. Wang, T. Li, C. Du, S. Xia, and H. Fu, “H2Former: An Efficient Hierarchical Hybrid Transformer for Medical Image Segmentation,” IEEE Trans. Med. Imaging, vol. 42, no. 9, pp. 2763–2775, 2023, doi: 10.1109/TMI.2023.3264513.
[32] W. Liao, X. Su, and F. Fang, “A centrifugal spring mechanism empowers self-adjusting in piezoelectric wind energy harvesting,” Nano Energy, vol. 133, 2025, doi: 10.1016/j.nanoen.2024.110462.
[33] T. S. Varun, C. J. Jilna, and R. S. Chandra Bose, “Impact of Temperature Mismatch on Power Output of Flexible Paper-Based Thermoelectric Generators in Series, Parallel, and Series–Parallel Configurations,” J. Electron. Mater., vol. 54, no. 5, pp. 3389–3396, 2025, doi: 10.1007/s11664-025-11809-7.
[34] A. Kandil, A. C. Francis, A. Elsaid, and W. K. Zahra, “Effect of the suspended block’s weight on the nonlinear dynamics of a non-ideal magnetic levitation model connected to an energy harvester,” Int. J. Non. Linear. Mech., vol. 170, 2025, doi: 10.1016/j.ijnonlinmec.2024.104974.
[35] X. Jing, N. Chen, and H. Liu, “Resource allocation scheme for multi-cluster NOMA-SWIPT systems with multiple IRSs,” Phys. Commun., vol. 71, 2025, doi: 10.1016/j.phycom.2025.102677.
[36] C. H. Rashid et al., “Software Cost and Effort Estimation: Current Approaches and Future Trends,” IEEE Access, vol. 11, pp. 99268–99288, 2023, doi: 10.1109/ACCESS.2023.3312716.
[37] V. Thulasi, P. Lakshmi, and J. Jeeva, “Design and fabrication of an optimized flexible piezoelectric energy harvester for smart vehicle application,” J. Brazilian Soc. Mech. Sci. Eng., vol. 47, no. 5, 2025, doi: 10.1007/s40430-025-05514-z.
[38] F. Zhao et al., “Wall effects on fluid-structure interaction of tandem flapping foils operating in energy extraction mode,” Ocean Eng., vol. 341, 2025, doi: 10.1016/j.oceaneng.2025.122662.
[39] M. Pirc, Z. Ajdič, D. Uršič, M. Jošt, and M. Topic, “Indoor Energy Harvesting With Perovskite Solar Cells for IoT Applications─A Full Year Monitoring Study,” ACS Appl. Energy Mater., vol. 7, no. 2, pp. 565–575, 2024, doi: 10.1021/acsaem.3c02498.
[40] Z. Peng et al., “Scalable coaxial wet-spinning of core-shell triboelectric fibers for self-powered smart fabrics,” Chem. Eng. J., vol. 524, 2025, doi: 10.1016/j.cej.2025.169304.
[41] V. Vahidinasab, C. Ardalan, B. Mohammadi-ivatloo, D. Giaouris, and S. L. Walker, “Active Building as an Energy System: Concept, Challenges, and Outlook,” IEEE Access, vol. 9, pp. 58009–58024, 2021, doi: 10.1109/ACCESS.2021.3073087.
[42] Y. Oh, N. Lee, Y.-S. Jeon, and H. V Vincent Poor, “Communication-Efficient Federated Learning via Quantized Compressed Sensing,” IEEE Trans. Wirel. Commun., vol. 22, no. 2, pp. 1087–1100, 2023, doi: 10.1109/TWC.2022.3201207.
[43] H. Sun et al., “Calibration strategy of energy harvesting technology to real-timely power sensors keeping their inherent high accuracy,” Nano Energy, vol. 144, 2025, doi: 10.1016/j.nanoen.2025.111346.
[44] W. Bin Sun, J. Xie, X. Yang, L. Wang, and W. X. Meng, “Efficient Computation Offloading and Resource Allocation Scheme for Opportunistic Access Fog-Cloud Computing Networks,” IEEE Trans. Cogn. Commun. Netw., vol. 9, no. 2, pp. 521–533, 2023, doi: 10.1109/TCCN.2023.3234290.
[45] Y. Lu et al., “Power generation mechanism of carboxyl functionalized graphene oxide based hydroelectric generator,” J. Power Sources, vol. 660, 2025, doi: 10.1016/j.jpowsour.2025.238484.
[46] T.-X. Ma, X. Duan, Y. Xu, R.-L. Wang, and X.-Y. Li, “Research on Fault Location in DC Distribution Network Based on Adaptive Artificial Bee Colony Slime Mould Algorithm,” IEEE Access, vol. 11, pp. 62630–62638, 2023, doi: 10.1109/ACCESS.2023.3287322.
[47] S. Raed and S. A. Alabady, “SBER: stable and balanced energy routing protocol to enhance the stability and energy for WBANs,” Int. J. Wirel. Mob. Comput., vol. 29, no. 2, pp. 150–162, 2025, doi: 10.1504/IJWMC.2025.148065.
[48] A. Rozario, E. Ahmed, and N. Mansoor, “A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks,” Sensors, vol. 24, no. 19, 2024, doi: 10.3390/s24196334.
[49] M. K. Jabbar and T. A. Kareem, “CCOA-DC: A Novel Optimization with NMF Data Compression in WSN Data Aggregation,” Int. J. Intell. Eng. Syst., vol. 17, no. 3, pp. 428–444, 2024, doi: 10.22266/ijies2024.0630.34.
[50] T. Zheng Hui Ernest and A. S. Madhukumar, “Peak Age of Information Analysis of Status Update Strategies in Cache-Enabled IIoT Networks,” IEEE Internet Things J., vol. 12, no. 3, pp. 3028–3042, 2025, doi: 10.1109/JIOT.2024.3476389.
[51] V. Kavitha, C.-S. Shieh, and M.-F. Horng, “EdgeAware CHNet A Federated Deep Learning Framework for Adaptive Cluster Head Selection in Scalable IoT Enabled WSNs,” J. Mach. Comput., vol. 5, no. 4, pp. 2461–2474, 2025, doi: 10.53759/7669/jmc202505189.
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Deni Mahmudi, Samsuri (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








