scholarly journals IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG

2020 ◽  
Vol 41 (2) ◽  
pp. 193
Author(s):  
Lia Umaroh ◽  
Machsun Rifauddin

This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a VPN server, configuration is required which includes IP pool configuration, IP router configuration, PPP configuration, DHCP server configuration, NAT by pass firewall configuration and IP security configuration. The library selection of VPN products considers the aspects of strong authentication, encryption that is strong enough, meets standards, integration with other field network services.

2006 ◽  
Author(s):  
Tomonori Takeda ◽  
Ryuichi Matsuzaki ◽  
Ichiro Inoue ◽  
Shigeo Urushidani

2020 ◽  
Vol 42 (3) ◽  
pp. 329-348 ◽  
Author(s):  
Toussaint Nothias

This article explores one of the most notorious and controversial initiatives by tech corporations to increase connectivity across the Global South: Facebook’s Free Basics project. Public attention focused on its ban in India following nationwide protests about net neutrality. In Africa, however, Free Basics expanded without much public scrutiny to some 32 countries. This article traces this quiet expansion by using an innovative virtual private network (VPN)-based method and by calling for an analytical focus on the landscape of the digital civil society in Africa. Specifically, I outline two key, interrelated phenomena: (1) Facebook’s evolving strategy, including a greater engagement with civil society organizations and (2) the focus of digital rights activists in Africa on issues like Internet shutdowns, government surveillance, and the lack of data privacy frameworks. In the process, I illuminate broader trends in the digital industry including tech corporations’ growing investments in mobile social media, network infrastructures, and in civil society; the use of disadvantaged populations and unregulated territories for digital experiments and data extraction; and the mounting recognition of Facebook’s political role, both within and outside the corporation.


2008 ◽  
Vol 27 (4) ◽  
pp. 301-307 ◽  
Author(s):  
Luca Rea ◽  
Sergio Pompei ◽  
Alessandro Valenti ◽  
Francesco Matera ◽  
Cristiano Zema ◽  
...  

Respati ◽  
2020 ◽  
Vol 15 (2) ◽  
pp. 16
Author(s):  
Lukman Lukman ◽  
Aiman Mukhlishah

INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang  digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec.  SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode  tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service


2006 ◽  
Vol E89-B (11) ◽  
pp. 3046-3054
Author(s):  
T. TAKEDA ◽  
R. MATSUZAKI ◽  
I. INOUE ◽  
S. URUSHIDANI

Author(s):  
Mirjana D. Stojanovic ◽  
Vladanka S. Acimovic-Raspopovic

A virtual private network (VPN) can be broadly defined as a “restricted communication between a set of sites, making use of a backbone that is shared with other traffic not belonging to that communication” (Carugi & De Clercq, 2004, p.116). Since the late nineties, with pervasive deployment of the Internet protocol (IP) technology in corporate networks, IP-based VPNs, in several forms and based on different network technologies, have become a promising solution for a wide range of corporate network services.


Sign in / Sign up

Export Citation Format

Share Document