scholarly journals ANALISA PERANCANGAN SERVER VOIP (VOICE INTERNET PROTOCOL) DENGAN OPENSOURCE ASTERISK DAN VPN (VIRTUAL PRIVATE NETWORK) SEBAGAI PENGAMAN JARINGAN ANTAR CLIENT

2012 ◽  
Vol 1 (1) ◽  
Author(s):  
Domiko Fahdi Jaya Patih

Abstrack Voice over Internet Protocol (VoIP) is a technology that utilizes the Internet Protocol to provide real-time voice communication. VoIP technology is a today telecommunication technology, where the costs of the technology infrastructure is much cheaper than the telecommunications technology that is commonly used today. Forming elements are VoIP User Agent, Proxy, Protocol and Coder-Decoder (CODEC). Asterisk is a softswicth to operate a proxy, which is based on session initiation protocol (SIP). 10.10 Ubuntu operating system as a VoIP server is flexible to support a package of performance Asterisk. The goal of this research is to build Asterisk-based VoIP server, that can be developed in further research as needed. The methodology of research conducted, is devided by two, the study of literature and experimental. The research was conducted at the installation that has been built before the Internet network. VoIP so here functioned as maximizing existing internet network is to reduce expenses communication needs. Services provided in this study form with voice and video call services client to server, client to client call, video call conferencing, video conferencingKey Word : Voice over Internet Protocol (VoIP), Asterisk, Session Initiaton Protocol (SIP), VPN

Techno Com ◽  
2020 ◽  
Vol 19 (1) ◽  
pp. 1-11
Author(s):  
Agus Heriyanto ◽  
Lailis Syafaah ◽  
Amrul Faruq

Di dalam komunikasi Voice over Internet Protocol (VoIP) mengenal beberapa macam protocol tambahan selain protocol standar internet Transfer Control Protocol/Internet Protocol (TCP/IP), beberapa diantaranya adalah protocol Session Initation Protocol (SIP), Inter-Asterisk eXchange (IAX) dan H.323. Performansi perlu dijaga mengingat VoIP mempunyai kemungkinan melakukan berbagai cara kompresi untuk menciptakan efisiensi saluran dan pemilihan protocol yang tepat. Teknologi VoIP pada dasarnya tidak memiliki jaminan keamanan pada setiap komunikasi. Keamanan ketika melakukan komunikasi suara merupakan sesuatu yang sangat penting karena menyangkut privasi penggunanya. Penggunaan Virtual Private Network (VPN) merupakan salah satu solusi untuk menutup celah keamanan pada kasus di atas. Analisis yang dilakukan pada artikel ini adalah performa yang dihasilkan VoIP yang menggunakan protocol IAX dan SIP. Penelitian ini mengahasilkan kesimpulan bahwa performansi yang paling baik digunakan untuk membangun sistem komunikasi VoIP adalah protocol IAX dengan menggunakan sistem keamanan VPN Point to Point Protocol (PPTP) dikarenakan nilai Quality of Service (QoS)  lebih tinggi daripada protocol SIP dan juga terbukti lebih aman saat diterapkan sistem keamanan Virtual Private Network Point to Point Protocol (VPN PPTP).


Author(s):  
Indranil Bose ◽  
Fong Man Chun

One of the hottest technologies these days is voice communication over packet-switched data networks. This is known as voice over Internet protocol (VoIP). Hardy (2003) defines VoIP as “the interactive voice exchange capability carried over packet switched transport employing the Internet protocol.” With VoIP, voice signal from the sender is digitized into packets that are transmitted to the receiver through a network,which often includes the Internet. As the Internet is a free resource, the communication cost of VoIP is much lower than that of traditional telephone systems. This is a major advantage of VoIP. VoIP system also increases the efficiency and service quality of businesses. As a result of VoIP, many advanced applications can be built and these include unified messaging, video conferencing, and ring list. But VoIP is not without its limitations. Its main drawback is low reliability. It also suffers from uncertain quality of voice transmission. In addition, it cannot guarantee security because it uses public networks. Although the idea of VoIP was known from the 1970s, it did not become commercially viable until 1995, when Vocaltec became the first company to produce the first commercially available VoIP product (Varshney et al., 2002).


2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Dahnial Dahnial

<p align="center"><strong>ABSTRACT</strong></p><p><em>The internet as a data transmission backbone has security threats in sending data. To overcome the security problem of every data communication that is done through a public network (public network), then a connection is needed that requires a connection between workstations running privately, so that only workstations that have access can connect, by using a virtual private network or VPN. The advantage of a VPN is that data sent over an encrypted VPN is quite safe and the secret is maintained even through the internet network because the data sent will go through the tunnel. Tunneling itself is a method for transferring data from one network to another by using a veiled internet network. Two protocols can be chosen in a VPN, namely Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). However, the performance of each of these protocols is unknown yet. To find out the performance of the two protocols we need a test with a simulation method. Using a Mikrotik router and Wireshark application with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput on 2 clients connected to the mikrotik router and each client uses a different protocol. All clients will stream videos simultaneously to get a data packet capture. The test results will be grouped into four categories, namely bad, moderate, good and very good. It is expected that data will be able to show the quality of service of both protocols. so that it can be used as a reference in the selection of VPN protocol to be used.</em></p><p><strong><em>Keywords: </em></strong><em>Quality of Service, PPTP, L2TP</em></p><p align="center"><strong>ABSTRAK</strong></p><p><em>Internet sebagai backbone pengiriman data memiliki ancaman keamanan dalam pengiriman data. Untuk mengatasi masalah keamanan setiap komunikasi data yang dilakukan melalui jaringan publik (public network) maka diperlukan suatu mekanisme yang memungkinkan koneksi antar workstation berjalan secara private, sehingga hanya workstation yang memiliki akses yang dapat saling terhubung, dengan cara memanfaatkan virtual private network atau VPN.</em> <em>Keuntungan VPN adalah data yang dikirimkan melalui VPN terenkripsi sehingga cukup aman dan rahasianya tetap terjaga meskipun melalui jaringan internet, karena data yang dikirim akan melalui tunnel.</em> <em>Tunneling sendiri merupakan metode untuk transfer data dari suatu jaringan ke jaringan lain dengan memanfaatkan jaringan internet secara terselubung. Terdapat dua protokol yang dapat dipilih dalam VPN yaitu Point to Point Tunneling Protocol (PPTP) dan Layer 2 Tunneling Protocol (L2TP). Akan tetapi belum diketahui performa dari masing – masing protokol tersebut. Untuk mengetahui kinerja dari kedua protokol tersebut diperlukan sebuah pengujian dengan metode simulasi. Menggunakan router mikrotik dan aplikasi Wireshark dengan parameter Quality of Service (QoS) yang terdiri dari Packet Loss, Delay, dan Throughtput pada 2 client yang terhubung ke router mikrotik dan setiap client akan menggunakan protokol yang berbeda. Semua client akan melakukan video streaming secara bersamaan untuk mendapatkan capture paket data. Hasil pengujian akan dikelompokkan menjadi empat kategori, yaitu kategori buruk, sedang, bagus dan sangat bagus. Diharapkan akan dihasilkan sebuah data yang dapat menunjukkan kualitas dari layanan kedua protokol tersebut. sehingga dapat dijadikan acuan dalam pemilihan protokol vpn yang akan digunakan.</em></p><strong><em>Kata kunci:</em></strong><em> Quality of Service, PPTP, L2TP</em>


2018 ◽  
Vol 5 (2) ◽  
pp. 1-12
Author(s):  
Hadria Octavia

VoIP ( Voice over Internet Protocol ) is a technology used for communication in the form of IP based voice media over long distances. The concept of a VPN (Virtual Private Network) in this paper makes a client that is on the public network can be connected to a LAN network. To use the VoIP server in the Linux operating system Trixbox,  whereas for the VPN server using ClearOS and X-lite is used as a softphone to make calls to the client. Of testing at 64kbps bandwidth using the G711 codec produces value performance (delay, jitter, and packet loss ) is not good, so that voice data delivered is less clear. Thus the choice of bandwidth for the G.711 codec 512kbps up is the best solution to get the value of the performance (delay, jitter, and packet loss) better . And a choice of 3 Greed (low, medium, high) on setting bandwidth, high is the best option. Because it can produce the best performance for VoIP VPN technology.


Author(s):  
I Wayan Eka Putra Darmawan

VoIP (Voice over Internet) dikenal juga dengan sebutan IP (Internet Protocol) Telephony saat ini semakin banyak digunakan karena memiliki beberapa keunggulan, salah satu diantaranya yaitu tarif yang jauh lebih murah daripada tarif telepon tradisional sehinggapengguna telepon dapat memilih layanan tersebut sesuai dengan kebutuhannya. VoIP dapat mereduksi biaya percakapan sampai 70%. Selain memiliki beberapa keunggulan di atas,VoIP juga memiliki kelemahan yang sangat vital yaitu dari segi keamanan transfer suarakarena berbasis IP, sehingga siapapun bisa melakukan penyadapan dan perekaman terhadap data VoIP. Ganguan yang terjadi pada sistem VoIP ada berbagai macam diantaranya, transferdata yang lewat pada suatu jaringan seperti misalnya dapat disalahgunakan (abuse), dapatdibajak isi data tersebut (sniffing), dan tidak dapat mengakses server dikarenakan server yang kelebihan muatan (Denial of Services).Ada beberapa cara untuk mengamankan komunikasi data VoIP, antara lain, dengan mengamankan jalur yang digunakan pengguna untuk melakukan komunikasi VoIP denganmenggunakan metode VPN (Virtual Private Network) dan juga dapat dilakukan suatu metode kriptografi pada aplikasi VoIP tersebut sehingga data yang dikirimkan dapat dilindungidengan baik. VPN adalah teknik pengaman jaringan yang bekerja dengan cara membuat suatu tunnel sehingga jaringan yang dipercaya dapat menghubungkan jaringan yang ada diluar melalui internet. Titik akhir dari VPN adalah tersambungnya Virtual Channels (VCs)dengan cara pemisahan. Kenyataannya koneksi sebuah end-to-end VPN tergantung dari sebuah nilai dari hubungan daripada titik-titiknya. VPN mempunyai dua metode dalampengamanan yakni IPSec dan Crypto IP Encapsulation (CIPE). Selain itu dapat dipergunakan teknik Kriptografi (cryptography) yang merupakan ilmu dan seni penyimpanan pesan, data,atau informasi secara aman.Sistem VoIP menggunakan VPN ini diharapkan dapat memberikan keamanan transfer data pada jaringan internet maupun intranet.


2021 ◽  
Vol 17 (1) ◽  
pp. 11-22
Author(s):  
Wahyu Adi Prijono

Voice over Internet Protocol (VoIP) is a technology that is capable of passing voice traffic, in the form of packets through the network Internet Protocol (IP). IP network itself is a data communications network based packet-switch. The voice signal before experiencing bundled voice coding or format conversion of sound into digital form that can be passed over an IP network. Telephony, Internet telephony, or termed VoIP (Voice Over Internet Protocol.This communication system use VoIP (Voice over Internet Protocol), ie voice calls over data services (internet). This communication was developed using Android-based devices. Based on characteristics, android devices are open source, so users do not need to have a license to be able to have android-based devices. In addition, the android device that must be connected to a SIP (Session Iniation Protocol) is a data service that can be done with a paid subscription of the user of the operator using a conventional pulse. Telecommunications designed will use a hybrid system, the merger between VoIP communications with data communications GSM network. With basic calculations where Coding standards G 729, is a standard that can be used for voice communication system through data networks with rate of 8 Kbps. The implementation of the G729 codec is effect on communication systems VOIP.


Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


Author(s):  
Bongsik Shin ◽  
Daniel C. Kinsella Jr.

An Internet-based Virtual Private Network (IVPN) is a system and service that enables secure communication within a controlled user group across the Internet public infrastructure. For the last few years, the Internet-based VPN has been available, providing organizational use for meaningful applications. The paper empirically investigates the value of IVPNs in managing communications among distributed business entities. For this, we conducted two case studies based on the information gathered from two companies. Then, a general decision model of the IVPN is proposed, which could be used for the assessment of its strategic value as well as for the design of virtual telecommunication networks at other organizations.


2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


Sign in / Sign up

Export Citation Format

Share Document