scholarly journals Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)

2019 ◽  
Vol 5 (1) ◽  
pp. 87-92
Author(s):  
Mugi Raharjo ◽  
Frengki Pernando ◽  
Ahmad Fauzi

The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks

Respati ◽  
2020 ◽  
Vol 15 (2) ◽  
pp. 16
Author(s):  
Lukman Lukman ◽  
Aiman Mukhlishah

INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang  digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec.  SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode  tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service


Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


2018 ◽  
Vol 2 (02) ◽  
Author(s):  
Julycia Verent Manderos ◽  
I Gede Suwetja

The Directorate General of Taxation currently utilizes internet technology to improve service, one of which is by conducting an online registration of NPWP or e-Registration so that new taxpayers are easier to register anywhere and anytime. But in this case there are things that hinder the process. Based on the research there are several factors that hinder the e-Registration process, such as: (1) Data received by the Extensification Section is incomplete, (2) The internet network are often disrupted, (3) The lack of public attention to the socialization that has been carried out. The author suggests for KPP Pratama Manado to re-socializing about e-Registration, improving the quality of the socialization and improving the internet network.Keyword : E-Registration, NPWP, Taxpayers, Socialization, Public Attention, Internet Network


Author(s):  
Cláudio César Vasconcelos Barros ◽  
Jonas Gomes da Silva

The article evaluated the control of Stencil in the subprocess of Printing of the SMD line of a company located in the Industrial Pole of Manaus (PIM), to provide subsidies to develop a computerized system. With computerization, the focus of employees will be directed to the activities of production and quality of manufactured products, also, the collection of process data, done in real-time, will allow managers to better monitor and take actions in the process. To this end, a case study, bibliographic research of articles, dissertations, and theses involving the theme, and documentary research (forms, records, etc.) with the sectors involved were used. The descriptive statistics method was applied, quality tools were used, aimed at identifying and solving problems such as PDCA, Pareto, Ishikawa Diagram, flow chart, and 5W2H. A study of the activities related to the control of the Stencil was carried out, of the documentation used in the process, as well as of the factors and causes related to the effective Stencil control. Among the results, 24 causes affect the performance of the Stencil control, concluding that the main failures were human, due to the prioritization of production goals by the employees, leaving the other activities in the background, which is why the 24 guidelines proposed for the computerization of this process become relevant, some of which are: defining means to identify each Stencil using a bar code or QR code; do not allow the use of the Stencil if one of the activities unfinished in the process; stop production when an activity is not performed; digitize the documents used in this process; create an automatic notification to those responsible, when an action is necessary, etc.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 203
Author(s):  
Arushi Agarwal ◽  
Ayushi Pandey

Border Gateway Protocol (BGP) is an exterior gateway routing protocol used between various autonomous systems across the internet. BGP helps in selecting the best route for the transmission of data among the users. The transmission policy followed by BGP should be such that it should increase BGP routing performances. This work aims to reduce the convergence time of the network with the improvement of QOS (Quality of Service) in the routing of Border Gateway Protocol. Our results show that we can obtain a reduced framework environment which has a best routing path with better energy and quality, along with reduction in convergence time. 


Author(s):  
Nur Kukuh Wicaksono ◽  
Bambang Sugiantoro

PGRI University of Yogyakarta is an educational institution that uses the internet as one of the supporting facilities and infrastructures to manage and organize the data and information used by the student to find references about the lecture. PGRI University Yogyakarta has three buildings on the main campus building A building B and C buildings, where each building using wireless LAN as a means for students to use the internet network, the weakness of the wireless LAN network where poor internet network in the wireless LAN network. Thus the researchers wanted to analyze the Quality of Service wireless LAN networks in building A, building B, and C buildings, in each floor.With the existence of quality of the network at PGRI University of Yogyakarta will be done by interviews and observation methods, problems that occur in wireless LAN networks in each building have been prepared in advance, after which it will do an analysis of wireless LAN networks using quality of service parameters, namely delay, packet loss, bandwidth, throughput and factors that influence the wireless network at the University of PGRI Yogyakarta.The results of the measurement and monitoring of Quality of Service wireless LAN at PGRI University of Yogyakarta in building A, building B, C on each floor of the building can be classified in the category of poor with the average delay for each building to around 150 ms and packet loss = 28%, bandwidth = 173523 bits / s and throughput = 22%, and the factors that occurred in the signal range cannot cover every room in every building. From these results it can be concluded that the quality of the wireless LAN at the University PGRI Yogyakarta according to the TIPHON standards categorized as poor.


Author(s):  
Ronny Israel Cabrera-Tituana ◽  
Andrea Katherine Carrión-Herrera

Internet access is necessary to ensure respect for the right to education, however, worldwide about 75% of school-age children in rural areas do not have access to the Internet at home, which makes it imperative the need for actions to reduce the digital gap to improve the quality of education in rural communities in Ecuador. This article describes the rehabilitation of an Internet network of 40 schools in the Nabón community, Ecuador. An earlier initiative implemented the Internet network, but lack of maintenance left it non-functional. With the support of the Municipality of Nabón, Motorola Foundation and IEEE SIGHT, a group of volunteers from IEEE Ecuador evaluated the state of the network to identify opportunities using the existing infrastructure. The commitment to the community, as well as the development of capacities, are at the center of the intervention to guarantee the sustainable development of the project. This document reports on the design, implementation, achievements and lessons learned from the rehabilitation of the Internet network.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3330
Author(s):  
DooHo Keum ◽  
Jihun Lim ◽  
Young-Bae Ko

In tactical ad-hoc networks, the importance of various tactical sensors and mission-critical data is increasing owing to their role in determining a tactical situation and ensuring the viability of soldiers. In particular, the reliability of mission-critical data has to be ensured for accurate situation determination and decision making. However, managing the network and trustworthiness in an environment where malicious nodes exist and a large amount of mission-critical data occur is a challenging issue. To solve these issues, a routing protocol is needed that can effectively detect malicious nodes and ensure the reliability and quality of service (QoS) of mission-critical data. In this paper, we propose a trust-based multipath QoS routing protocol (called MC_TQR) for tactical ad-hoc networks that can detect malicious nodes and satisfy the requirements of mission-critical data. The proposed scheme is verified using an OPNET simulator, and the results confirm the improved network performance when compared with existing schemes.


2021 ◽  
Vol 2 (1) ◽  
pp. 38-52
Author(s):  
Mustajib Mustajib ◽  
Lia Roikhanatus Sa’adah

When the covid-19 pandemic comes, conventional learning methods must change with online learning methods or commonly called online learning which utilizes media platforms connected to the internet network to distribute materials and communicate between teachers and learners. Even in the event of a covid-19 pandemic learning must still be carried out and cannot be abandoned. Because this kind of learning has never been practiced before, then there are difficulties or problems very potentially arise. To solve this kind of thing, a strategy is needed to solve the problem. The media used must also be considered and adjusted to the conditions of the learners. This activity aims to maintain the quality of learning during the covid-19 pandemic. Even if the learning runs in the network, the quality of learning must still be considered so that the learning runs well and is effectively accepted by learners. This research aims to find out how online learning is done by SD Plus Al Hikmah and how the methods and strategies applied to maintain the quality of online learning so that the learning carried out can run effectively.


2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.


Sign in / Sign up

Export Citation Format

Share Document