scholarly journals Analisa Perbandingan Performansi Hot Standby Router Protocol (HSRP) dengan Gateway Load Balancing Protocol (GLBP) Pada Router Spoke DMVPN

2021 ◽  
Vol 5 (2) ◽  
pp. 504
Author(s):  
Michelle Claudia ◽  
Muhammad Rifqi

The use of internet connections to develop Virtual Private Network (VPN) lines in companies has been massively applied. An example is the use of Dynamic Multipoint VPN (DMVPN) technology from Cisco, which can connect Spoke or branch offices through HUB or data centers. Besides requiring a secure network, companies also need high network availability. One of them is by using the redundancy method in order to minimize downtime when device damage occurs. In this research, the spoke router will apply two redundancy methods by Cisco, which are Hot Standby Router Protocol (HSRP) and Gateway Load Balancing (GLBP). This research aims to compare the QoS performances and downtime between the two protocols in order to discover the suitable method for DMVPN networks at branch offices. The test scenario is conducted on the GNS-3 simulator using the File Trasnfer Protocol (FTP) service. The obtained test result shows that the HSRP throughput value is smaller from the GLBP with a difference of 0.20%, the increase in the average delay of the HSRP is smaller from the GLBP with a difference of 1.07%. The HSRP data transfer time is faster than GLBP with a difference of 1.49%, and HSRP downtime is 4.13% faster than GLBP. The conclusion is that a suitable redundancy solution for spoke router using the HSRP method

Author(s):  
Aulia Desy Aulia Nur Utomo

Abstract In the use of internet networks that are general in nature need to implement an appropriate network configuration to maximize the use of internet connections provided by service providers. This is important for the optimal use of internet services and in accordance with utilities that are basically general and shared can be achieved. Per Connection Classifier is a load balancing method for distributing traffic loads to more than one network connection point in a balanced way, so that traffic can run optimally. This research focuses on network configuration methods to maximize internet usage for all users. Quality of Service is used to see the performance of network traffic which is indicated by the value of the parameter delay, throughput, and packet loss. Based on the results of testing and research that have been carried out before and after using load balancing per connection clasifier, the delay value is decreased from 180.26 ms to 148.36 ms and throughput increased from 1.76% to 2.03%, then packet loss decreased from 25.37% to 18.59% according to the TIPHON standard. Keywords: Quality of Service, Per Connection Classification, load balancing, delay, throughput, packet loss


2021 ◽  
Vol 6 (4) ◽  
pp. 90-101
Author(s):  
Mohd Faris Mohd Fuzi ◽  
Mohamad Ridzuan Mohd Alias ◽  
Naginder Kaur ◽  
Iman Hazwam Abd Halim

Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.


2018 ◽  
Vol 6 (2) ◽  
pp. 179-188
Author(s):  
Maryanto Maryanto ◽  
Maisyaroh Maisyaroh ◽  
Budi Santoso

Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security.   Keywords: Networking, Secur, Virtual Private Network.   Abstrak   Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data.   Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).


SISTEMASI ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 259
Author(s):  
Alpan Hikmat Muharram Permana ◽  
Nur Widiyasono ◽  
Alam Rahmatulloh

2019 ◽  
Vol 29 (3) ◽  
pp. 279-282
Author(s):  
Jeffrey Trageser ◽  
Judy E. Davidson

Because extensive data from medical records are gathered by organ procurement teams, the process of data transfer between sites created a data security risk. This includes the use of fax machines, courier services, and employees’ vehicles. Even health records transmitted over public Wi-Fi become at risk for a data breach. The Plan-Do-Study-Act method for performance improvement was used to address this time-consuming and labor-intensive process. A secured virtual private network from within the donor hospital site setting was developed to improve the transfer of images and data. The goal was to improve the process and increase data security. Once the new network was in place, the process steps decreased and eliminated data vulnerability. Average process time decreased by approximately 1 hour. Organs procured increased from pre (expected 3, observed 2) to post (expected 3, observed 5) implementation of the new process.


2020 ◽  
Vol 245 ◽  
pp. 07018
Author(s):  
Bruno Hoeft ◽  
Samuel Ambroj Pérez ◽  
Magnus Bergroth ◽  
Michael O’Connor ◽  
Richard Cziva

This paper explores the methods and results confirming the baseline assumption that LHCONE[1] (Large Hadron Collider Open Network Environment) traffic is science traffic. The LHCONE is a network conceived to support globally distributed collaborative science. LHCONE connects thousands of researchers to Large Hadron Collider (LHC) datasets at hundreds of universities and labs performing analysis within the global collaboration on high-energy physics. It is “Open” to all levels of the LHC as well as a short list of approved non-LHC science collaborations. LHCONE satisfies the need for a high performance global data transfer network of supporting scientific analysis. Even though LHCONE is a closed virtual private network, packets from non-LHCONE sites were found within the network on multiple occasions. This paper describes the findings, discusses the reasons and proposes some ideas on how to prevent “unroutable LHCONE packets” in order to maintain trust and integrity within the network.


SINERGI ◽  
2019 ◽  
Vol 24 (1) ◽  
pp. 1
Author(s):  
Ida Nurhaida ◽  
Dimas Widya Putra Pratama ◽  
Remmy A. M. Zen ◽  
Hong Wei

The stability and convergence time become an essential factor in network availability performance. Multiprotocol Label Switching (MPLS) is one of the Virtual Private Network (VPN) technologies that can support the quality of communication media on the high-speed backbone network. Therefore, it is necessary to determine the proper protocol routing in espousing VPN technology based on MPLS supported by direct-link backup to improve network availability in the Data Center. The purpose of this study is comparing the convergence time and Quality of Service (QoS) among the three IGP protocols routing, namely Routing Information Protocol version 2 (RIP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP) based on two autonomous system number using Ring topology design between Data Center and DRC. Network scenario is created using the Graphic Network Simulator (GNS3) application to measure convergence time and QoS parameters of the three protocols routing and the use of MPLS-TE and RR in enhancing MPLS backbone performance. The results revealed that QoS in the three protocols routing has a good quality level according to TIPHON’s standard with the number of indexes up to 3.25 (Good). On the other hand, the fastest convergence time when interruption on the main link (VPN) is EIGRP with convergence time for about 15 seconds. 


KOMTEKINFO ◽  
2021 ◽  
pp. 169-175
Author(s):  
Prayogi Wicaksana ◽  
Febri Hadi ◽  
Aulia Fitrul Hadi

One of the ways to maintain and improve the quality of service and security on the network of an agency of the Barangin Sub-District Office, Sawahlunto City (Central) is to add a VPN feature. Administrators who always monitor the flow of traffic by accessing routers and access points to find out network conditions. There are times when the Administrator is on a public network, he or she cannot access routers and access point devices because the Public IP obtained is Dynamic (random). To solve this problem, it is done through the Network Development Life Cycle (NDLC) method by combining the L2TP and IPsec VPN protocol systems on Mikrotik. A Virtual Private Network (VPN) is a private and secure network using a public network such as the internet. One of the bases for securing VPN technology is Internet Protocol Security (IPSec). IPSec is a protocol used to secure datagram transmission on TCP/IP-based networks. This study aims to design and implement a VPN network system by utilizing a public network, where this system provides advanced security enhancements on the internet network using IPSec. The information/data sent will be confidential with an automatic encryption method through the L2TP tunnel method from the server to the branch/client computer and vice versa. The VPN is implemented using a layer 2 (L2TP) tunneling protocol using two Mikrotik routers. There are few changes to the computer network configuration to minimize costs and implementation time. Tests are carried out to implement security on the network using the command prompt, where the admin observes packet loss and delay parameters to determine the increase in security quality on the network.


Author(s):  
Alok Vishwakarma

Virtual Private Network, Its ‘Virtual', Its ‘Private' and it's a ‘Network'. A virtual private network (VPN) provides a secure connection between a sender and a receiver over a public non-secure network such as the Internet. A secure connection is generally associated with private networks. (A private network is a network that is owned, or at least controlled via leased lines, by an organization.). We can define a VPN by the following relationship: VPN = Tunneling + Security + QoS Parameters. This Chapter deals with Advantages of VPNs, Types of VPNs, VPN Architectures, VPN Models, VPN Devices, Technologies and Protocols Used to Enable Remote Access VPNs.


Sign in / Sign up

Export Citation Format

Share Document