scholarly journals Simulasi Multi Protocol Label Switching Virtual Private Network (MPLS VPN) Dengan Virtual Local Area Network (VLAN) Menggunakan Router MIKROTIK

2019 ◽  
Vol 20 (2) ◽  
pp. 109
Author(s):  
Bertha Euginia ◽  
Theresia Ghozali
2020 ◽  
Vol 6 (2) ◽  
pp. 63-73
Author(s):  
Aziz Setyawan Hidayat ◽  
Sobari - ◽  
Baginda Oloan Lubis ◽  
Pas Mahyu Akhirianto

Di zaman sekarang ini komputer merupakan sebuah peralatan yang sangat penting dalam melakukan sistem administrasi dalam sebuah perusahaan dan pertukaran data perusahaan. PT. Tasya Gaya Pesona merupakan perusahaan yang memiliki beberapa cabang yang berada dalam satu kota, yang menggunakan layanan jaringan internet LAN (Local Area Network), sehingga kurang efisien dan perturan data melalui email. Teknologi Metro Ethernet merupakan salah satu perkembangan dari teknologi Ethernet yang dapat menempuh jarak yang luas berskala perkotaan, dengan dilengkapi berbagai fitur yang terdapat pada jaringan Ethernet umumnya. Jaringan Metro Ethernet memberikan layanan dengan menggunakan protokol Ethernet sebagai Metropolitan Area Network (MAN) dengan cara yang sama dengan Local Area Network (LAN) yang menggunakan protokol Ethernet, sehingga jaringan berskala metro dapat dibentuk dengan menggunakan teknologi Ethernet biasa. Metro Ethernet bertindak sebagai jembatan atau bridge dari suatu jaringan menghubungkan wilayah yang terpisah juga menghubungkan LAN dan WAN atau backbone network yang umumnya dimiliki oleh service provider. Pada metropolitan area, perusahaan-perusahaan besar dapat memanfaatkan teknologi Metro Ethernet untuk menghubungkan kantor-kantor cabang mereka ke dalam sistem intranet yang ada di dalam perusahaan tersebut. Dalam transport data, Metro Ethernet menggunakan Multi Protocol Label Switching (MPLS) dan Fiber Optic. Jaringan Metro Ethernet yang saat ini beroperasi di Indonesia menggunakan kabel serat optik dan mempunyai kapasitas 1.000 Mbps atau 1 Gbps. Pada penulisan skripsi ini akan dibahas mengenai konsep dasar jaringan Metro Ethernet, konfigurasi jaringan Metro Ethernet dan perancangan jaringan Metro Ethernet pada PT. Tasya Gaya Pesona sebagai layanan penghubung jaringan antar cabang


2011 ◽  
Vol 8 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Marius Roşu ◽  
George Drăgoi

In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).


2015 ◽  
Vol 12 (1) ◽  
Author(s):  
Irawan Afrianto ◽  
Eko Budi Setiawan

Jaringan komputer dapat dikatakan sebagai sebuah sistem yang terdiri dari berbagai komputer beserta resource-nya yang didesain agar dapat menggunakan sumber daya yang ada, sehingga dapat mengakses informasi yang diperlukan. Informasi tersebut dapat diakses melalui komputer yang lain dengan konsep computer networking, baik itu Local Area Network, Metropolitan Area Network, Wide Area Network ataupun juga internet. Untuk mengamankan suatu koneksi pada jaringan dapat menggunakan jaringan yang bersifat virtual yang dikenal dengan istilah Virtual Private Network (VPN).Virtual Private Network (VPN) adalah sebuah teknologi komunikasi yang memungkinkan untuk dapat terkoneksi ke jaringan publik dan menggunakannya untuk bergabung dengan jaringan lokal. Dengan cara tersebut maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam kantor atau network itu sendiri, walaupun sebenarnya menggunakan jaringan milik publik.UNIKOM sebagai salah satu perguruan tinggi yang dalam melakukan kegiatan operasionalnya terdiri dari beberapa stakeholder yang saling terhubung dalam jaringan komputer, perlu menerapkan konsep VPN untuk mengamankan informasi yang dimiliki pada suatu jaringan, ataupun untuk memudahkan dalam mengakses jaringan lokal yang ada di UNIKOM walaupun dalam mengaksesnya menggunakan jaringan yang bersifat public (internet).Hasil dari penelitian ini adalah berupa suatu rekomendasi dasar yang dapat digunakan oleh UNIKOM untuk menerapkan konsep Virtual Private Network (VPN) dalam pengembangan jaringan komputer yang dimiliki sehingga dalam pengaksesan informasi dapat berlangsung lebih aman dan efektif.


Compiler ◽  
2013 ◽  
Vol 2 (1) ◽  
Author(s):  
Masih Musliatun ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless  effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Fitra Nugraha

AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), yang digunakan untuk menyerang LAN.Penelitian akan dilakukan di Jaringan UNIKUNET (Jaringan Wireless Universitas Kuningan Kampus 1) yang menggunakan captive portal sebagai media autentikasi jaringan public hotspotnya. Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Visual Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel. Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Visual Network Stumbler, diikuti oleh Aircrack dan Wireshark, dan kemungkinan celah keamanan yang didapat.Kata kunci: Wireless Protected Access, Captive Portal, WLAN, Web Proxy dan Virtual Private Network�AbstractThis study discusses the analysis of Wireless LAN (Wireless Local Area Network) security against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, which are used to attack LANs.The research will be conducted at the UNIKUNET Network (Kuningan University Campus Wireless Network 1) that uses captive portal as a media authentication for its public hotspot network. Three types of software are used as attackers, namely, attackers Visual Network Stumbler, Aircrack and Wireshark. The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it was seen that the fastest time was responded to by the WPA Protocol provided by Visual Network Stumbler attackers, followed by Aircrack and Wireshark, and possible security gaps were obtained.Keywords: Wireless Protected Access, Captive Portal, WLAN, Web Proxy and Virtual Private Network�


2015 ◽  
Vol 1 (1) ◽  
pp. 62-74
Author(s):  
Sonny Rumalutur

Penelitian ini membahas tentang analisis keamanan Wireless Local Area Network (Wireless LAN) di PT. PLN (Persero) Wilayah P2B Area Sorong terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), digunakan untuk menyerang LAN.Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel.Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Network Stumbler, diikuti oleh Aircrack dan Wireshark.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Ibrahim Saleh ◽  
Hero Wintolo ◽  
Dwi Nugraheny

MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed


2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


TecnoLógicas ◽  
2013 ◽  
pp. 425
Author(s):  
Mónica Espinosa-Buitrago ◽  
Octavio Salcedo-Parra ◽  
Ricardo Goméz-Vargas

Los routers de borde del proveedor de servicios establecen VPNs (Virtual Private Network) realizando el enrutamiento entre los usuarios y la red de núcleo (Core) por medio de Routers Virtuales (VR). Los routers virtuales establecen el enrutamiento a las redes MPLS/VPN/BGP por medio de las tablas VRF (Virtual Router Forwarding), las cuales utilizan el algoritmo de enrutamiento Borde Gateway Protocol (BGP) para sus anuncios. Las sesiones BGP son del tipo malla completa en donde se establecen mayores costos en los anuncios, por ello se realiza un análisis comparativo con rutas reflejadas, obteniendo un 31% de mejora a nivel de los costos del algoritmo, en la configuración de rutas reflejadas en la función de encapsulamiento MPLS (Multiprotocol Label Switching).


Sign in / Sign up

Export Citation Format

Share Document