scholarly journals Analisis Jaringan VPN Menggunakan PPTP dan L2TP Berbasis Mikrotik pada Diskominfo Kabupaten Muko-muko

KOMTEKINFO ◽  
2021 ◽  
pp. 189-194
Author(s):  
Adji Putra Pamungkas ◽  
Muhammad Reza Putra ◽  
M. Hafizh
Keyword(s):  
Layer 2 ◽  

Dalam proses pertukaran data antara kantor pusat dan kantor cabang diperlukan teknologi agar data yang dikirim menjadi aman. VPN adalah sebuah teknologi yang membuat jaringan private (pribadi) dengan menggunakan jaringan publik agar proses pertukaran data menjadi aman, seperti yang diterapkan pada Dinkominfo Kabupaten Muko-muko. Data yang dipertukarkan oleh Dinkominfo berupa data text untuk layanan FTP, HTTP, dan data absensi. Data – data tersebut merupakan data penting yang perlu diamankan. Tujuan penelitian ini yaitu untuk menganalisis kerja jaringan dengan menggunakan parameter uji latency (delay), packet loss, dan throughput pada jaringan VPN pada Dinas Komunikasi dan Informatika Kabupaten Muko-Muko dengan menggunakan metode PPTP (Point to Point Tunneling Protocol) dan L2TP (Layer 2 Tunneling Protocol) merupakan pilihan protokol VPN yang dapat digunakan untuk melakukan pertukaran data antar jaringan yang berbeda. Pada penelitian ini dilakukan pengujian antar kedua protokol tersebut dengan mengamati parameter throughput, delay, dan packet loss untuk mengetahui protokol manakah yang memiliki performansi terbaik. Dapat dijadikan alternative bagi kantor pemerintah sebagai peningkatan kualitas keamanan jaringan dengan menggunakan metode PPTP dan L2TP.  

2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Dahnial Dahnial

<p align="center"><strong>ABSTRACT</strong></p><p><em>The internet as a data transmission backbone has security threats in sending data. To overcome the security problem of every data communication that is done through a public network (public network), then a connection is needed that requires a connection between workstations running privately, so that only workstations that have access can connect, by using a virtual private network or VPN. The advantage of a VPN is that data sent over an encrypted VPN is quite safe and the secret is maintained even through the internet network because the data sent will go through the tunnel. Tunneling itself is a method for transferring data from one network to another by using a veiled internet network. Two protocols can be chosen in a VPN, namely Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). However, the performance of each of these protocols is unknown yet. To find out the performance of the two protocols we need a test with a simulation method. Using a Mikrotik router and Wireshark application with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput on 2 clients connected to the mikrotik router and each client uses a different protocol. All clients will stream videos simultaneously to get a data packet capture. The test results will be grouped into four categories, namely bad, moderate, good and very good. It is expected that data will be able to show the quality of service of both protocols. so that it can be used as a reference in the selection of VPN protocol to be used.</em></p><p><strong><em>Keywords: </em></strong><em>Quality of Service, PPTP, L2TP</em></p><p align="center"><strong>ABSTRAK</strong></p><p><em>Internet sebagai backbone pengiriman data memiliki ancaman keamanan dalam pengiriman data. Untuk mengatasi masalah keamanan setiap komunikasi data yang dilakukan melalui jaringan publik (public network) maka diperlukan suatu mekanisme yang memungkinkan koneksi antar workstation berjalan secara private, sehingga hanya workstation yang memiliki akses yang dapat saling terhubung, dengan cara memanfaatkan virtual private network atau VPN.</em> <em>Keuntungan VPN adalah data yang dikirimkan melalui VPN terenkripsi sehingga cukup aman dan rahasianya tetap terjaga meskipun melalui jaringan internet, karena data yang dikirim akan melalui tunnel.</em> <em>Tunneling sendiri merupakan metode untuk transfer data dari suatu jaringan ke jaringan lain dengan memanfaatkan jaringan internet secara terselubung. Terdapat dua protokol yang dapat dipilih dalam VPN yaitu Point to Point Tunneling Protocol (PPTP) dan Layer 2 Tunneling Protocol (L2TP). Akan tetapi belum diketahui performa dari masing – masing protokol tersebut. Untuk mengetahui kinerja dari kedua protokol tersebut diperlukan sebuah pengujian dengan metode simulasi. Menggunakan router mikrotik dan aplikasi Wireshark dengan parameter Quality of Service (QoS) yang terdiri dari Packet Loss, Delay, dan Throughtput pada 2 client yang terhubung ke router mikrotik dan setiap client akan menggunakan protokol yang berbeda. Semua client akan melakukan video streaming secara bersamaan untuk mendapatkan capture paket data. Hasil pengujian akan dikelompokkan menjadi empat kategori, yaitu kategori buruk, sedang, bagus dan sangat bagus. Diharapkan akan dihasilkan sebuah data yang dapat menunjukkan kualitas dari layanan kedua protokol tersebut. sehingga dapat dijadikan acuan dalam pemilihan protokol vpn yang akan digunakan.</em></p><strong><em>Kata kunci:</em></strong><em> Quality of Service, PPTP, L2TP</em>


2015 ◽  
Vol 2015 ◽  
pp. 1-14 ◽  
Author(s):  
Elias Molina ◽  
Eduardo Jacob ◽  
Jon Matias ◽  
Naiara Moreira ◽  
Armando Astarloa

The network robustness and reliability are strongly influenced by the implementation of redundancy and its ability of reacting to changes. In situations where packet loss or maximum latency requirements are critical, replication of resources and information may become the optimal technique. To this end, the IEC 62439-3 Parallel Redundancy Protocol (PRP) provides seamless recovery in layer 2 networks by delegating the redundancy management to the end-nodes. In this paper, we present a combination of the Software-Defined Networking (SDN) approach and PRP topologies to establish a higher level of redundancy and thereby, through several active paths provisioned via the OpenFlow protocol, the global reliability is increased, as well as data flows are managed efficiently. Hence, the experiments with multiple failure scenarios, which have been run over the Mininet network emulator, show the improvement in the availability and responsiveness over other traditional technologies based on a single active path.


2021 ◽  
Vol 17 (3) ◽  
Author(s):  
Rafiqmia Khairuddin Nur Hammam ◽  
Hidayat Nur Isnianto ◽  
Sri Lestari ◽  
Y. Wahyo Setiyono

Someone sometimes forgets to put their belongings so that they leave them somewhere, it will pose a risk of losing their belongings. To solve this problem, a reminder is needed so that it is expected to minimize the risk of loss. This device implements point-to-point communication from the Bluetooth Low Energy AT-09 transmitter module with Arduino Nano and the receiver module with an Android smartphone. This reminder device will activate an alarm on the Android smartphone application when the two modules are more than 5 meters away. The measured distance is converted from the Received Signal Strength Indicator (RSSI) value received by the smartphone which is affected by obstructions, packet loss, and delay. Based on the test results, at a distance of 5 meters, the system can be connected and work properly, in unobstructed conditions (Line of Sight) or obstructed conditions (Non-Line of Sight). In the blocked condition, it has a packet loss of 1.1% to 4.4%, the received signal strength (RSSI) has decreased the value to a difference of -8 dBm, and the delay time is 2 seconds.


2013 ◽  
Vol 9 (1) ◽  
Author(s):  
Robby Triadi Susanto ◽  
Gani Indriyanta ◽  
R. Gunawan Santosa

Virtual Private Network (VPN) is a technology implemented as a solution to connect head and branch offices through a network. VPN enables all offices connected to be treated as a single broadcast domain or a single network, providing a private connection. VPN can be implemented over several protocols: Point-To-Point Tunneling Protocol (PPTP) and Ethernet over Internet Protocol (EoIP). This research conducted through implementation of both protocols on a site-to site VPN and measuring each protocol’s performance using throughput, packet loss and delay parameters obtained from real topology. Overall result shows that EoIP performs better than PPTP. Within six days of observation, obtained data shows that EoIP has better throughput and less delay than PPTP, while PPTP has a smaller rate of packet loss than EoIP.


2017 ◽  
Vol 1 (2) ◽  
pp. 134-141 ◽  
Author(s):  
M. Ficky Duskarnaen ◽  
Febri Nurfalah

Tujuan dari penelitian ini adalah membangun jaringan wireless point to point antara Kampus A dan Kampus B Universitas Negeri Jakarta. Penelitian ini menggunakan metode research and development yang meliputi kegiatan analisis, perancangan, dan implementasi. Jalur komunikasi untuk menghubungkan Kampus A dan Kampus B Universitas Negeri Jakarta menggunakan jalur kabel Telkom, jalur tersebut digunakan sebagai backbone utama. Karena belum adanya penerapan fault tolerance pada jalur tersebut maka jaringan wireless point to point perlu dipersiapkan sebagai alternatif apabila terjadi kegagalan. Analisis kondisi lokasi pemasangan wireless yaitu ketinggian Gedung Sertifikasi 42 m dan Gedung Rusun Mahasiswa 17 m, dua lokasi berjarak 911 m dengan besar free space loss 99,24 dB – 99,49 dB, line of sight terbebas dari penghalang, dan radius fresnel zone 4,27 m – 4,33 m (BTS Telkom) dan 5,24 m – 5,32 m (Gedung Rabbani) dalam kondisi tidak terhalang. Perencanaan desain jaringan dalam mode bridge – station bridge, menggunakan perangkat keras Mikrotik Metal 2SHPn 30 dBm, Antena Grid 24 dBi, kabel pigtail LMR-400, dan tower triangle. Jaringan wireless point to point berhasil diimplementasikan dengan hasil pengujian yaitu terdapat banyak interferensi dari wireless access point lain, sambungan berhasil dilakukan dengan 0% packet loss, kekuatan sinyal -64,75 dBm, SNR 41,25 dB, CCQ 86,14%, dan throughput 11,15 Mbps.


KOMTEKINFO ◽  
2019 ◽  
Vol 6 (2) ◽  
pp. 107-116
Author(s):  
Andika Agus Slameto ◽  
Rahmat Hidayat

Tunneling is the process of packaging data sent by other protocols in a network. Point to point over Ethernet (PPPOE) andSecure Socket Tunneling Protocol (SSTP) are protocols that function or are designed to carry out tunneling processes. Datasecurity in this case is a top priority, with the encapsulation and authentication process making tunnels one of the many waysto secure data in a network. Besides security, network performance is something that must be considered in providing goodservices. In the process of testing the performance of PPPOE and SSTP using the Quality of Service method, it can beconcluded that SSTP is better in the parameters of Througput, Delay, and Jitter while PPPOE is better in Packet Loss. In thesecurity testing phase, both protocols have encapsulated data packets sent over an http-based web.


2014 ◽  
Vol 543-547 ◽  
pp. 2585-2588 ◽  
Author(s):  
Wei Dong ◽  
Zhen Ya Zhang

Virtual Private LAN Service (VPLS), as a new layer-2 Virtual Private Network (VPN) technology has attracted enormous interest in the filed during the last few years. Unlike traditional layer 2 VPN, which provides only point-to-point connectivity, VPLS is built for multi-point connectivity and has a broadcast capability like a common LAN.A series of RFCs and drafts related to VPLS have been proposed by IETF. To enable VPLS in a real network, signaling setup is the first step. In this paper, we first conduct some research on LDP-based signaling protocol and demonstrate how to set up control-plane communication in VPLS network. Then, based on the research, we implement the signaling protocol in an embedded router system. In combination with existing data plane software, VPLS is deployed in a real network and some experiments are conducted to test the validity of signaling protocol. All the test results show that the implementation of signaling protocol works quite well. With VPLS deploying more widely in the world, service providers and customers will benefit greatly from this technology.


2017 ◽  
Vol 7 (3) ◽  
pp. 315
Author(s):  
Mohammad Fazrie

Jumlah penggunaan video conference di dunia semakin berkembang, dengan tingginya penggunaan video conference semakin tinggi pula aspek-aspek yang diperhatikan, diantaranya aspek kenyamanan dan keamanan. Berbicara tentang aspek kenyamanan pada video conference tidak lepas dari kompresi yang digunakan, baik kompresi audio dan video. Dewasa ini teknologi kompersi untuk video sudah sampai pada codec H.264 dan H.264-High Profile, dengan menggunakan teknologi H.264-High Profile dapat mengkonsumsi bandwidth setengah dari H.264 (tanpa enkripsi). Berbicara aspek keamanan tidak lepas dari enkripsi lalu lintas data termasuk audio dan video yang dapat di enkripsi. Untuk itulah agar dapat mendekati aspek keamanan dan kenyamanan yang seimbang perlu di analisa dan di teliti mengenai performa H.264 dan H.264-High Profile yang telah di enkripsi. Untuk meneliti tingkat aspek performa dan keamanan video conference perlu adanya teknik dan metode yang di gunakan. Dengan memanfaatkan parameter jitter , packet loss , dan PSNR kita dapat menarik kesimpulan baik atau tidaknya performa video conference. Namun untuk aspek keamanan, percakapan dua arah atau lebih harus dipastikan agar tidak dapat dilihat dan kompatibel dengan perangkat video conference yang ada. Dengan memanfaatkan teknik enkripsi pada layer 2 atau 3 hal ini memungkinkan dapat dilakukan.


Author(s):  
D. Cherns

The use of high resolution electron microscopy (HREM) to determine the atomic structure of grain boundaries and interfaces is a topic of great current interest. Grain boundary structure has been considered for many years as central to an understanding of the mechanical and transport properties of materials. Some more recent attention has focussed on the atomic structures of metalsemiconductor interfaces which are believed to control electrical properties of contacts. The atomic structures of interfaces in semiconductor or metal multilayers is an area of growing interest for understanding the unusual electrical or mechanical properties which these new materials possess. However, although the point-to-point resolutions of currently available HREMs, ∼2-3Å, appear sufficient to solve many of these problems, few atomic models of grain boundaries and interfaces have been derived. Moreover, with a new generation of 300-400kV instruments promising resolutions in the 1.6-2.0 Å range, and resolutions better than 1.5Å expected from specialist instruments, it is an appropriate time to consider the usefulness of HREM for interface studies.


Author(s):  
D. A. Carpenter ◽  
M. A. Taylor

The development of intense sources of x rays has led to renewed interest in the use of microbeams of x rays in x-ray fluorescence analysis. Sparks pointed out that the use of x rays as a probe offered the advantages of high sensitivity, low detection limits, low beam damage, and large penetration depths with minimal specimen preparation or perturbation. In addition, the option of air operation provided special advantages for examination of hydrated systems or for nondestructive microanalysis of large specimens.The disadvantages of synchrotron sources prompted the development of laboratory-based instrumentation with various schemes to maximize the beam flux while maintaining small point-to-point resolution. Nichols and Ryon developed a microprobe using a rotating anode source and a modified microdiffractometer. Cross and Wherry showed that by close-coupling the x-ray source, specimen, and detector, good intensities could be obtained for beam sizes between 30 and 100μm. More importantly, both groups combined specimen scanning with modern imaging techniques for rapid element mapping.


Sign in / Sign up

Export Citation Format

Share Document