scholarly journals Analisa dan Perancangan Jaringan Berbasis VPN Pada PT. Finroll

Author(s):  
Johan Muliadi Kerta ◽  
David Wennoris ◽  
Tonny Gunawan ◽  
Erny Erny

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 

2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


2018 ◽  
Vol 6 (2) ◽  
pp. 179-188
Author(s):  
Maryanto Maryanto ◽  
Maisyaroh Maisyaroh ◽  
Budi Santoso

Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security.   Keywords: Networking, Secur, Virtual Private Network.   Abstrak   Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data.   Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).


2011 ◽  
Vol 474-476 ◽  
pp. 79-82 ◽  
Author(s):  
Kun Zhang ◽  
Hai Feng Wang ◽  
Yu Chun Ma ◽  
Zhuang Li

Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on computer communications with the same security.


2018 ◽  
Vol 5 (2) ◽  
pp. 1-12
Author(s):  
Hadria Octavia

VoIP ( Voice over Internet Protocol ) is a technology used for communication in the form of IP based voice media over long distances. The concept of a VPN (Virtual Private Network) in this paper makes a client that is on the public network can be connected to a LAN network. To use the VoIP server in the Linux operating system Trixbox,  whereas for the VPN server using ClearOS and X-lite is used as a softphone to make calls to the client. Of testing at 64kbps bandwidth using the G711 codec produces value performance (delay, jitter, and packet loss ) is not good, so that voice data delivered is less clear. Thus the choice of bandwidth for the G.711 codec 512kbps up is the best solution to get the value of the performance (delay, jitter, and packet loss) better . And a choice of 3 Greed (low, medium, high) on setting bandwidth, high is the best option. Because it can produce the best performance for VoIP VPN technology.


Respati ◽  
2017 ◽  
Vol 7 (20) ◽  
Author(s):  
Riduwan Napianto ◽  
Emma Utami ◽  
Sudarmawan Sudarmawan

Tomato Digital Printing Company is a company engaged in the display promo has started on the development of sales techniques and information with menerimaan orders or orders from customers who are served at the customer's premises is located. Development is done to improve service to customers and to face the competition in this business.Basic problem, how companies can transmit data or files from the customer premises to the office or otherwise be safely, effectively and efficiently through the public network or the internet.To overcome this problem researchers implement a VPN with Hamachi as a method of data delivery solutions for enterprises and be the right choice for the company. Keywords: Internet, VPN, Hamachi


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Gajendra Sharma

With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.


2021 ◽  
Author(s):  
◽  
Rebekah Wilson

<p>Performing music together over a public network while being located at a distance from each other necessarily means performing under a particular set of technical and performative constraints. These constraints are antithetical to—and make cumbersome—the performance of tightly synchronised music, which traditionally depends on the conditions of transmission stability, ultra-low latency, and shared presence. These conditions are experienced optimally only when musicians perform at the same time and in the same place. Except for specialized private network services, public networks are inherently latent and unstable, which disrupts musicians’ ability to achieve precise vertical synchronisation and create an environment where approaches to music performance and composition must be reconsidered. It is widely considered that these conditions mean that networked music performance is a future genre for when network latencies and throughput improve, or one that is currently reserved for high-end heavily optimised networks afforded by institutions and not individuals, or one that is primarily reserved for improvisatory or aleatoric composition and performance techniques. I disagree that networked music is dependent on access to advanced Internet technologies and suggest that music compositions for networked music performance can be highly successful over regular broadband conditions when the composer considers the limitations as opportunities for new creative strategies and aesthetic approaches. In this exegesis, I outline the constraints that prove that while networked music performance is latent, asynchronous, multi-located, multi-authorial, and hopelessly, intrinsically, and passionately digitally mediated, these constraints provide rich creative opportunities for the composition and performance of synchronised and resonant music. I introduce four aesthetic approaches, which I determine as being critical towards the development of networked music: 1) postvertical harmony, where the asynchronous arrival of signals ruptures the harmonic experience; 2) new timbral fusions created through multi-located resonant sources; 3) a contribution to performative relationships through the generation and transmission of vital information in the musical score and through the development of new technologies for facilitating performer synchronisation; and 4) the post-digital experience, where all digital means of manipulation are permitted and embraced, leading to new ways of listening to and forming reproduced realities. Each of these four aesthetic approaches are considered individually in relation to the core constraints, through discussion of the present-day technical conditions, and how each of these approaches are applied to my musical portfolio through practical illustration.</p>


2021 ◽  
Author(s):  
◽  
Rebekah Wilson

<p>Performing music together over a public network while being located at a distance from each other necessarily means performing under a particular set of technical and performative constraints. These constraints are antithetical to—and make cumbersome—the performance of tightly synchronised music, which traditionally depends on the conditions of transmission stability, ultra-low latency, and shared presence. These conditions are experienced optimally only when musicians perform at the same time and in the same place. Except for specialized private network services, public networks are inherently latent and unstable, which disrupts musicians’ ability to achieve precise vertical synchronisation and create an environment where approaches to music performance and composition must be reconsidered. It is widely considered that these conditions mean that networked music performance is a future genre for when network latencies and throughput improve, or one that is currently reserved for high-end heavily optimised networks afforded by institutions and not individuals, or one that is primarily reserved for improvisatory or aleatoric composition and performance techniques. I disagree that networked music is dependent on access to advanced Internet technologies and suggest that music compositions for networked music performance can be highly successful over regular broadband conditions when the composer considers the limitations as opportunities for new creative strategies and aesthetic approaches. In this exegesis, I outline the constraints that prove that while networked music performance is latent, asynchronous, multi-located, multi-authorial, and hopelessly, intrinsically, and passionately digitally mediated, these constraints provide rich creative opportunities for the composition and performance of synchronised and resonant music. I introduce four aesthetic approaches, which I determine as being critical towards the development of networked music: 1) postvertical harmony, where the asynchronous arrival of signals ruptures the harmonic experience; 2) new timbral fusions created through multi-located resonant sources; 3) a contribution to performative relationships through the generation and transmission of vital information in the musical score and through the development of new technologies for facilitating performer synchronisation; and 4) the post-digital experience, where all digital means of manipulation are permitted and embraced, leading to new ways of listening to and forming reproduced realities. Each of these four aesthetic approaches are considered individually in relation to the core constraints, through discussion of the present-day technical conditions, and how each of these approaches are applied to my musical portfolio through practical illustration.</p>


2021 ◽  
Vol 7 (1) ◽  
pp. 51
Author(s):  
Hedy Pratama ◽  
Nila Feby Puspitasari

Salah satu cara yang dilakukan untuk menjaga dan meningkatkan kualitas layanan yang diberikan oleh suatu Perusahaan XYZ, seorang administrator setiap saat memonitoring lalu lintas data dengan mengakses router dan access point untuk mengetahui kondisi jaringan. Hal tersebut hanya dapat dilakukan Administrator ketika sedang berada dalam jaringan lokal.  Permasalahannya, ketika Administrator berada pada jaringan publik, maka tidak dapat mengakses router dan perangkat access point yang ada. Hal ini dikarenakan IP publik yang didapatkan dari Provider utama bersifat Dynamic IP Public. Untuk mengatasi masalah tersebut dilakukan penelitian melalui metode NDLC dengan penggabungan sistem protokol VPN L2TP/IPSec dan port forwarding yang ada di mikrotik VPS. VPN L2TP/IPSec yang dapat membantu menghubungkan dua router yang berbeda dalam satu jaringan private yang aman dan memungkingkan data terenkripsi dengan aman. Penggunaan VPS untuk mendapatkan Static Public IP sehingga dapat di port forward untuk membuka akses terhadap perangkat pada jaringan lokal agar dapat diakses melalui jaringan publik melalui remote address VPN. Hasil pengujian penggabungan VPN L2TP/IPSec dan port forwarding dapat digunakan Administrator dari jaringan publik untuk melakukan remote router mikrotik dan wireless access point pada jaringan Dynamic IP Public. Sehingga memudahkan Administrator dalam memonitoring jaringan secara realtime meningkatkan kualitas layanan internet.Kata Kunci—VPN, L2TP/IP Sec, Port Forwarding, Dynamic IPAbstractOne way that is done to maintain and improve the quality of services provided by XYZ Company, is that an administrator will monitor data traffic by accessing routers and access points to find out network conditions at any time. This can only be done by the Administrator while on the local network. The problem is that when an Administrator is on a public network, it cannot access the existing routers and access point devices. This is because the public IP obtained from the main Provider is Dynamic Public IP. To overcome this problem, research was carried out through the NDLC method by combining the L2TP / IPSec VPN protocol system and the port forwarding in the VPS proxy. The L2TP / IPSec VPN helps to connect two different routers in a secure private network and allows encrypted data to be safe during the communication process between routers. The use of VPS is to get a Static Public IP so that it can be ported forward to open access to devices on the local network so that it can be accessed through a public network via a VPN remote address. The results of testing the merging of VPN L2TP / IPSec and port forwarding, an Administrator from a public network can use a remote router and a wireless access point on a Dynamic IP Public network. Making it easy for Administrators to monitor networks in realtime and improve the quality of internet services.Keywords—3-5 VPN, L2TP/IP Sec, Port Forwarding, Dynamic IP


2021 ◽  
Vol 6 (4) ◽  
pp. 90-101
Author(s):  
Mohd Faris Mohd Fuzi ◽  
Mohamad Ridzuan Mohd Alias ◽  
Naginder Kaur ◽  
Iman Hazwam Abd Halim

Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.


Sign in / Sign up

Export Citation Format

Share Document