scholarly journals Concept and functions of building a private network (VPN)

Author(s):  
Zebur Beridze ◽  
Jumber Shavadze

As companies and organizations began to actively use computers in various areas of their work,  these computers needed to be integrated into a common network for fast data transfer and efficient interaction. However, this connection must have been reliable and secure.

2018 ◽  
Vol 6 (2) ◽  
pp. 179-188
Author(s):  
Maryanto Maryanto ◽  
Maisyaroh Maisyaroh ◽  
Budi Santoso

Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security.   Keywords: Networking, Secur, Virtual Private Network.   Abstrak   Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data.   Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).


SISTEMASI ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 259
Author(s):  
Alpan Hikmat Muharram Permana ◽  
Nur Widiyasono ◽  
Alam Rahmatulloh

2019 ◽  
Vol 29 (3) ◽  
pp. 279-282
Author(s):  
Jeffrey Trageser ◽  
Judy E. Davidson

Because extensive data from medical records are gathered by organ procurement teams, the process of data transfer between sites created a data security risk. This includes the use of fax machines, courier services, and employees’ vehicles. Even health records transmitted over public Wi-Fi become at risk for a data breach. The Plan-Do-Study-Act method for performance improvement was used to address this time-consuming and labor-intensive process. A secured virtual private network from within the donor hospital site setting was developed to improve the transfer of images and data. The goal was to improve the process and increase data security. Once the new network was in place, the process steps decreased and eliminated data vulnerability. Average process time decreased by approximately 1 hour. Organs procured increased from pre (expected 3, observed 2) to post (expected 3, observed 5) implementation of the new process.


2020 ◽  
Vol 245 ◽  
pp. 07018
Author(s):  
Bruno Hoeft ◽  
Samuel Ambroj Pérez ◽  
Magnus Bergroth ◽  
Michael O’Connor ◽  
Richard Cziva

This paper explores the methods and results confirming the baseline assumption that LHCONE[1] (Large Hadron Collider Open Network Environment) traffic is science traffic. The LHCONE is a network conceived to support globally distributed collaborative science. LHCONE connects thousands of researchers to Large Hadron Collider (LHC) datasets at hundreds of universities and labs performing analysis within the global collaboration on high-energy physics. It is “Open” to all levels of the LHC as well as a short list of approved non-LHC science collaborations. LHCONE satisfies the need for a high performance global data transfer network of supporting scientific analysis. Even though LHCONE is a closed virtual private network, packets from non-LHCONE sites were found within the network on multiple occasions. This paper describes the findings, discusses the reasons and proposes some ideas on how to prevent “unroutable LHCONE packets” in order to maintain trust and integrity within the network.


2021 ◽  
Vol 5 (2) ◽  
pp. 504
Author(s):  
Michelle Claudia ◽  
Muhammad Rifqi

The use of internet connections to develop Virtual Private Network (VPN) lines in companies has been massively applied. An example is the use of Dynamic Multipoint VPN (DMVPN) technology from Cisco, which can connect Spoke or branch offices through HUB or data centers. Besides requiring a secure network, companies also need high network availability. One of them is by using the redundancy method in order to minimize downtime when device damage occurs. In this research, the spoke router will apply two redundancy methods by Cisco, which are Hot Standby Router Protocol (HSRP) and Gateway Load Balancing (GLBP). This research aims to compare the QoS performances and downtime between the two protocols in order to discover the suitable method for DMVPN networks at branch offices. The test scenario is conducted on the GNS-3 simulator using the File Trasnfer Protocol (FTP) service. The obtained test result shows that the HSRP throughput value is smaller from the GLBP with a difference of 0.20%, the increase in the average delay of the HSRP is smaller from the GLBP with a difference of 1.07%. The HSRP data transfer time is faster than GLBP with a difference of 1.49%, and HSRP downtime is 4.13% faster than GLBP. The conclusion is that a suitable redundancy solution for spoke router using the HSRP method


Respati ◽  
2020 ◽  
Vol 15 (2) ◽  
pp. 16
Author(s):  
Lukman Lukman ◽  
Aiman Mukhlishah

INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang  digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec.  SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode  tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service


2009 ◽  
pp. 1261-1271 ◽  
Author(s):  
Eric T.T. Wong ◽  
Carrison K.S. Tong

Teleradiology is the technology of remote medical consultation using X-ray, Computed Tomographic or Magnetic Resonance images. It was commonly accepted by clinicians for its effectiveness of making diagnosis for patients at critical situations. Since the huge size of data volume involved in teleradiology [American College of Radiology et al., 2003], clinicians are not satisfied with the relatively slow data transfer rate. It limits the technology to fixed-line communication between the doctor’s home and his office. In this project, a mobile high speed wireless medical image viewing system using 3G Wireless Network [Collins et al., 2001], Virtual Private Network and One-Time Two-Factor Authentication (OTTFA) technologies is presented. Using this system, teleradiology can be achieved by using a 3G PDA phone to query, retrieve and review the patient’s record at anytime and anywhere in a secure environment. Using this technology, the patient-data availability can be improved significantly, which is crucial to timely diagnosis of patients at critical situations.


The Winners ◽  
2007 ◽  
Vol 8 (2) ◽  
pp. 155
Author(s):  
Ariefah Rachmawati

Data communication network, part of the information technology, becomes so important in communicating information and transferring data. Most companies in the world, including companies operating in Indonesia, have used data communication networking technology for their day-to-day operation. However, transferring data through network has some security problems. Therefore, accountants should be familiar with and have knowledge about it in order to ensure high quality work that they provide. Based on IETF – Internet Engineering Task Force a (RFC (Request for Comment)-3031), it is stailea that information technology used to communicate and transfer information as well as data should be efficient and safe.  Multiprotocols Label Switching (MPLS) is a new technology used in virtual private network is one of the solutions in making data transfer efficient and safe.


As a cost effective measure to attain security and confidentiality of data, Virtual Private Network (VPN) is used to interconnect two networks. The research shows that the protocols and algorithms of VPNs adds the overhead and in turn affect the network performance. The two end point hardware appliances are configured with standard configuration to establish site to site VPN. There are different data formats transferred via these tunnels. A research was conducted in a simulation environment of open source technology to identify the various factors impacting the performance of data transfer via VPN tunnels. Empirical measurement shows that performance depends critically on nature of data and compressibility in different internet bandwidth conditions. This was also noticed that nested VPN architecture adds complexity in security at the cost of multifold transmission delays. VPN provide security at the cost of performance; hence application specific cost benefit analysis is essential to choose the optimal architecture.


Author(s):  
M.F. Schmid ◽  
R. Dargahi ◽  
M. W. Tam

Electron crystallography is an emerging field for structure determination as evidenced by a number of membrane proteins that have been solved to near-atomic resolution. Advances in specimen preparation and in data acquisition with a 400kV microscope by computer controlled spot scanning mean that our ability to record electron image data will outstrip our capacity to analyze it. The computed fourier transform of these images must be processed in order to provide a direct measurement of amplitudes and phases needed for 3-D reconstruction.In anticipation of this processing bottleneck, we have written a program that incorporates a menu-and mouse-driven procedure for auto-indexing and refining the reciprocal lattice parameters in the computed transform from an image of a crystal. It is linked to subsequent steps of image processing by a system of data bases and spawned child processes; data transfer between different program modules no longer requires manual data entry. The progress of the reciprocal lattice refinement is monitored visually and quantitatively. If desired, the processing is carried through the lattice distortion correction (unbending) steps automatically.


Sign in / Sign up

Export Citation Format

Share Document