scholarly journals Off-campus Access to Licensed Online Resources through Shibboleth

2021 ◽  
Vol 40 (2) ◽  
Author(s):  
Francis Jayakanth ◽  
Anand Byrappa ◽  
Raja Visvanathan

Institutions of advanced education and research, through their libraries, invest substantially in licensed online resources. Only authorized users of an institution are entitled to access licensed online resources. Seamless on-campus access to licensed resources happens mostly through Internet Protocol (IP) address authentication. Increasingly, licensed online resources are accessed by authorized users from off-campus locations as well. Libraries will, therefore, need to ensure seamless off-campus access to authorized users. Libraries have been using various technologies, including proxy server or virtual private network (VPN) server or single sign-on, to facilitate seamless off-campus access to licensed resources. In this paper, authors share their experience in setting up a Shibboleth-based single sign-on (SSO) access management system at the JRD Tata Memorial Library, Indian Institute of Science, to enable authorized users of the institute to seamlessly access licensed online resources from off-campus locations.

Author(s):  
I Wayan Eka Putra Darmawan

VoIP (Voice over Internet) dikenal juga dengan sebutan IP (Internet Protocol) Telephony saat ini semakin banyak digunakan karena memiliki beberapa keunggulan, salah satu diantaranya yaitu tarif yang jauh lebih murah daripada tarif telepon tradisional sehinggapengguna telepon dapat memilih layanan tersebut sesuai dengan kebutuhannya. VoIP dapat mereduksi biaya percakapan sampai 70%. Selain memiliki beberapa keunggulan di atas,VoIP juga memiliki kelemahan yang sangat vital yaitu dari segi keamanan transfer suarakarena berbasis IP, sehingga siapapun bisa melakukan penyadapan dan perekaman terhadap data VoIP. Ganguan yang terjadi pada sistem VoIP ada berbagai macam diantaranya, transferdata yang lewat pada suatu jaringan seperti misalnya dapat disalahgunakan (abuse), dapatdibajak isi data tersebut (sniffing), dan tidak dapat mengakses server dikarenakan server yang kelebihan muatan (Denial of Services).Ada beberapa cara untuk mengamankan komunikasi data VoIP, antara lain, dengan mengamankan jalur yang digunakan pengguna untuk melakukan komunikasi VoIP denganmenggunakan metode VPN (Virtual Private Network) dan juga dapat dilakukan suatu metode kriptografi pada aplikasi VoIP tersebut sehingga data yang dikirimkan dapat dilindungidengan baik. VPN adalah teknik pengaman jaringan yang bekerja dengan cara membuat suatu tunnel sehingga jaringan yang dipercaya dapat menghubungkan jaringan yang ada diluar melalui internet. Titik akhir dari VPN adalah tersambungnya Virtual Channels (VCs)dengan cara pemisahan. Kenyataannya koneksi sebuah end-to-end VPN tergantung dari sebuah nilai dari hubungan daripada titik-titiknya. VPN mempunyai dua metode dalampengamanan yakni IPSec dan Crypto IP Encapsulation (CIPE). Selain itu dapat dipergunakan teknik Kriptografi (cryptography) yang merupakan ilmu dan seni penyimpanan pesan, data,atau informasi secara aman.Sistem VoIP menggunakan VPN ini diharapkan dapat memberikan keamanan transfer data pada jaringan internet maupun intranet.


Techno Com ◽  
2020 ◽  
Vol 19 (1) ◽  
pp. 1-11
Author(s):  
Agus Heriyanto ◽  
Lailis Syafaah ◽  
Amrul Faruq

Di dalam komunikasi Voice over Internet Protocol (VoIP) mengenal beberapa macam protocol tambahan selain protocol standar internet Transfer Control Protocol/Internet Protocol (TCP/IP), beberapa diantaranya adalah protocol Session Initation Protocol (SIP), Inter-Asterisk eXchange (IAX) dan H.323. Performansi perlu dijaga mengingat VoIP mempunyai kemungkinan melakukan berbagai cara kompresi untuk menciptakan efisiensi saluran dan pemilihan protocol yang tepat. Teknologi VoIP pada dasarnya tidak memiliki jaminan keamanan pada setiap komunikasi. Keamanan ketika melakukan komunikasi suara merupakan sesuatu yang sangat penting karena menyangkut privasi penggunanya. Penggunaan Virtual Private Network (VPN) merupakan salah satu solusi untuk menutup celah keamanan pada kasus di atas. Analisis yang dilakukan pada artikel ini adalah performa yang dihasilkan VoIP yang menggunakan protocol IAX dan SIP. Penelitian ini mengahasilkan kesimpulan bahwa performansi yang paling baik digunakan untuk membangun sistem komunikasi VoIP adalah protocol IAX dengan menggunakan sistem keamanan VPN Point to Point Protocol (PPTP) dikarenakan nilai Quality of Service (QoS)  lebih tinggi daripada protocol SIP dan juga terbukti lebih aman saat diterapkan sistem keamanan Virtual Private Network Point to Point Protocol (VPN PPTP).


2014 ◽  
Vol 11 (1) ◽  
Author(s):  
I Wayan Eka Putra Darmawan

VoIP (Voice over Internet) dikenal juga dengan sebutan IP (Internet Protocol) Telephony saat ini semakin banyak digunakan karena memiliki beberapa keunggulan, salah satu diantaranya yaitu tarif yang jauh lebih murah daripada tarif telepon tradisional sehinggapengguna telepon dapat memilih layanan tersebut sesuai dengan kebutuhannya. VoIP dapat mereduksi biaya percakapan sampai 70%. Selain memiliki beberapa keunggulan di atas,VoIP juga memiliki kelemahan yang sangat vital yaitu dari segi keamanan transfer suarakarena berbasis IP, sehingga siapapun bisa melakukan penyadapan dan perekaman terhadap data VoIP. Ganguan yang terjadi pada sistem VoIP ada berbagai macam diantaranya, transferdata yang lewat pada suatu jaringan seperti misalnya dapat disalahgunakan (abuse), dapatdibajak isi data tersebut (sniffing), dan tidak dapat mengakses server dikarenakan server yang kelebihan muatan (Denial of Services).Ada beberapa cara untuk mengamankan komunikasi data VoIP, antara lain, dengan mengamankan jalur yang digunakan pengguna untuk melakukan komunikasi VoIP denganmenggunakan metode VPN (Virtual Private Network) dan juga dapat dilakukan suatu metode kriptografi pada aplikasi VoIP tersebut sehingga data yang dikirimkan dapat dilindungidengan baik. VPN adalah teknik pengaman jaringan yang bekerja dengan cara membuat suatu tunnel sehingga jaringan yang dipercaya dapat menghubungkan jaringan yang ada diluar melalui internet. Titik akhir dari VPN adalah tersambungnya Virtual Channels (VCs)dengan cara pemisahan. Kenyataannya koneksi sebuah end-to-end VPN tergantung dari sebuah nilai dari hubungan daripada titik-titiknya. VPN mempunyai dua metode dalampengamanan yakni IPSec dan Crypto IP Encapsulation (CIPE). Selain itu dapat dipergunakan teknik Kriptografi (cryptography) yang merupakan ilmu dan seni penyimpanan pesan, data,atau informasi secara aman.Sistem VoIP menggunakan VPN ini diharapkan dapat memberikan keamanan transfer data pada jaringan internet maupun intranet.


Author(s):  
I Putu Hariyadi

STMIK Bumigora is the first computer college in the province of West Nusa Tenggara (NTB). There are 11 hotspots spread across the campus to provide Internet services through a wireless connection for the academic community. The increasing number of hotspots that must be managed with locations scattered in various Mikrotik routers hence make the process of management and monitoring hotspots become complex, ineffective and efficient. Centralized campus hotspot management using a transparent bridge EoIP over SSTP can help solve the problems at hand. Ethernet over IP (EoIP) Tunneling is a Mikrotik RouterOS protocol that creates an Ethernet tunnel between routers over IP connections. EoIP tunnel built on SSTP tunnel (EoIP over SSTP) with Site-to-Site type. SSTP is a new form of Virtual Private Network (VPN) tunnel that provides a mechanism for encapsulating Point-to-Point Protocol (PPP) traffic through the SSL path of the HTTPS protocol. The IP address of the SSTP interface is used as the local reference and remote address of the EoIP over SSTP tunnel. The application of bridging on EoIP interfaces and interfaces connected to Access Point devices forms a logical network so that the management and monitoring of hotspot services can be performed centrally on one router.


2018 ◽  
Vol 6 (2) ◽  
pp. 179-188
Author(s):  
Maryanto Maryanto ◽  
Maisyaroh Maisyaroh ◽  
Budi Santoso

Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security.   Keywords: Networking, Secur, Virtual Private Network.   Abstrak   Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data.   Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).


2018 ◽  
Vol 5 (2) ◽  
pp. 1-12
Author(s):  
Hadria Octavia

VoIP ( Voice over Internet Protocol ) is a technology used for communication in the form of IP based voice media over long distances. The concept of a VPN (Virtual Private Network) in this paper makes a client that is on the public network can be connected to a LAN network. To use the VoIP server in the Linux operating system Trixbox,  whereas for the VPN server using ClearOS and X-lite is used as a softphone to make calls to the client. Of testing at 64kbps bandwidth using the G711 codec produces value performance (delay, jitter, and packet loss ) is not good, so that voice data delivered is less clear. Thus the choice of bandwidth for the G.711 codec 512kbps up is the best solution to get the value of the performance (delay, jitter, and packet loss) better . And a choice of 3 Greed (low, medium, high) on setting bandwidth, high is the best option. Because it can produce the best performance for VoIP VPN technology.


Author(s):  
Jan Schankin ◽  
Eduardo Correia

Multiprotocol Label Switching (MPLS) was originally designed with the intention of improving the speed with which routers could forward packets in Internet Protocol (IP) networks. Due to significant improvements in packet forwarding, this is no longer an advantage, but the technology has found large-scale industry-wide acceptance because of its greatly widened scope and application. Multiple extensions and enhancements to the protocol make it capable of solving an array of current service provider and customer network requirements for a converged network in an IP dominated world. The chapter considers the use of MPLS for the provisioning of a virtual private network over a shared physical infrastructure, and discusses the logic and functionality of key protocols associated with MPLS. It then goes on to explore the problems, protocols, and possibilities of these technologies in current environments.


2013 ◽  
Vol 9 (1) ◽  
Author(s):  
Robby Triadi Susanto ◽  
Gani Indriyanta ◽  
R. Gunawan Santosa

Virtual Private Network (VPN) is a technology implemented as a solution to connect head and branch offices through a network. VPN enables all offices connected to be treated as a single broadcast domain or a single network, providing a private connection. VPN can be implemented over several protocols: Point-To-Point Tunneling Protocol (PPTP) and Ethernet over Internet Protocol (EoIP). This research conducted through implementation of both protocols on a site-to site VPN and measuring each protocol’s performance using throughput, packet loss and delay parameters obtained from real topology. Overall result shows that EoIP performs better than PPTP. Within six days of observation, obtained data shows that EoIP has better throughput and less delay than PPTP, while PPTP has a smaller rate of packet loss than EoIP.


2019 ◽  
Vol 8 (3) ◽  
pp. 8715-8720

Exchanging the data packets seems as very challenging task due to exponential growth in network interface. Meanwhile, this increased interface makes use of next generation of internet protocol (IPv6) which will eventually replace the IPv4. Major issues in this replacement is the compatibility, both requires different set of routing protocols. Multi-Protocol Label Switching, a rapidly growing telecommunication infrastructure technology which works on special protocol suitable for both versions of Internet Protocol. MPLS uses the third OSI layer addressing coupled to second layer speed in switching and this paves the way for greater transfer of information, voice and video traffic. Virtual Private Network is the fastest growing technology for connecting the dispersed sites of same customer using the public network without any interference with other networks. This is an attractive technology to service providers because it enhances the flexibility for using variety of classes of services. This paper deals with the implementation of IPv6 networks for internet services using MPLS background which offers increased transfer in data, voice and video traffic. It also deals with, implementing MPLS based Virtual Private Network in IPv6 infrastructure using GNS3 simulator. This is done on behalf of the Border Gateway Protocol (BGP) which isolates the dispersed site in an Autonomous System (AS), connected to a public network


2012 ◽  
Vol 1 (1) ◽  
Author(s):  
Domiko Fahdi Jaya Patih

Abstrack Voice over Internet Protocol (VoIP) is a technology that utilizes the Internet Protocol to provide real-time voice communication. VoIP technology is a today telecommunication technology, where the costs of the technology infrastructure is much cheaper than the telecommunications technology that is commonly used today. Forming elements are VoIP User Agent, Proxy, Protocol and Coder-Decoder (CODEC). Asterisk is a softswicth to operate a proxy, which is based on session initiation protocol (SIP). 10.10 Ubuntu operating system as a VoIP server is flexible to support a package of performance Asterisk. The goal of this research is to build Asterisk-based VoIP server, that can be developed in further research as needed. The methodology of research conducted, is devided by two, the study of literature and experimental. The research was conducted at the installation that has been built before the Internet network. VoIP so here functioned as maximizing existing internet network is to reduce expenses communication needs. Services provided in this study form with voice and video call services client to server, client to client call, video call conferencing, video conferencingKey Word : Voice over Internet Protocol (VoIP), Asterisk, Session Initiaton Protocol (SIP), VPN


Sign in / Sign up

Export Citation Format

Share Document