scholarly journals EVALUASI KINERJA JARINGAN DMVPN MENGGUNAKAN ROUTING PROTOCOL RIPv2, OSPF, EIGRP DENGAN BGP

2018 ◽  
Vol 2 (3) ◽  
pp. 143
Author(s):  
Arini Arini

Data communication has become a major requirement for companies and governmental institutions. Communication is not only limited to one particular local area but covers other areas so as to form a wide network (WAN). By using 3-phase DMVPN (Dynamic Multipoint Virtual Private Network) technology, government companies and institutions can communicate securely through the Internet network at lower cost and easier in configuration than similar solutions such as X.25, Frame Relay and ATM. In maximizing the performance of DMVPN required good network management, one of them by using a combination of internal and external routing protocol. In this study the routing protocol used RIPv2, OSPF, EIGRP and BGP with different algorithms, to compare them used QoS criteria (throughput, jitter, packet loss, network covergence). Methods of data collection with literature study and literature study, simulation done with 8 stages (problem formulation, conceptual model, input & output data, modeling, simulation, verification & validation, experimentation, and output analysis). The results of this study provide the best QoS value in phase 1 is EIGRP-BGP, phase 2 is EIGRP-BGP, and phase 3 is RIPv2-BGP. And EIGRP-BGP is the best combination of routing protocols for DMVPN.

2019 ◽  
Vol 2 (1) ◽  
pp. 43-51
Author(s):  
Ahmad Akmaluddin ◽  
Arini Arini ◽  
Siti Ummi Masruroh

Realtime (streaming) data communication has become a major requirement for companies and government institutions. Communication that occurs is not only limited to one particular local area but covers other areas so as to form a broad network (WAN). In building network infrastructure, one of the most important things is how networks can deal with failure (failure) on a computer network consists of failure of devices (devices) that affect Quality of Services (QoS). In every internet network design process, a redundant line is always added to complete the main line. So that if the main line is disrupted, data traffic can be transferred to the backup path, this process is called network redundancy. So that if one gateway dies, another gateway will immediately replace the dead gateway. There are two protocols included in the FHRP, namely Hot Standby Routing Protocol (HSRP), and Gateway Load Balancing Protocol (GLBP), these two protocols that can overcome this problem. So from that this study will discuss which protocol between the two protocols has the best performance in overcoming the problem. Methods of data collection with literature studies and literature studies, simulations carried out with 8 stages (problem formulation, conceptual models, input & output data, modeling, simulation, verification & validation, experimentation, and output analysis). The results of this study provide the best QoS value for the delay value is the HSRP ROUTER protocol, and for the value of packet loss is HSRP, and for throughput value is HSRP and the routing protocol that is appropriate for the network for video streaming services is HSRP


Author(s):  
Johan Muliadi Kerta ◽  
David Wennoris ◽  
Tonny Gunawan ◽  
Erny Erny

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 


Author(s):  
Mohammad Subekti ◽  
Anthoni Tandiono ◽  
Fenky Tania ◽  
Hendro Wibowo A.

The purpose of this study is to develop an e-commerce that can distribute any information about the products of PD Cross Tech. The e-commerce is supported by dynamic DBMS and can be connected via database reseller server so that it can do information sharing. The distribution is performed using the Distributed Relational Database Management System (DRDBMS), supported by the File Transfer Protocol and Virtual Private Network. In other words the e-Commerce supports multiplatform database. Research methodologies used are analytical methods, design methods, and literature study. Results showed that PD Cross Tech needs a new e-Commerce that supports multiplatform database. With this e-Commerce, it is expected that similar computer equipment needs for many organization in Indonesia can be designed in the same way.


2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


2011 ◽  
Vol 8 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Marius Roşu ◽  
George Drăgoi

In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).


2018 ◽  
Vol 6 (2) ◽  
pp. 179-188
Author(s):  
Maryanto Maryanto ◽  
Maisyaroh Maisyaroh ◽  
Budi Santoso

Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security.   Keywords: Networking, Secur, Virtual Private Network.   Abstrak   Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data.   Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).


2011 ◽  
Vol 474-476 ◽  
pp. 79-82 ◽  
Author(s):  
Kun Zhang ◽  
Hai Feng Wang ◽  
Yu Chun Ma ◽  
Zhuang Li

Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on computer communications with the same security.


Sign in / Sign up

Export Citation Format

Share Document