skip to main content
10.1145/3314527.3314543acmotherconferencesArticle/Chapter ViewAbstractPublication PagesapitConference Proceedingsconference-collections
research-article

Quality of Service for Traffic Monitoring System based on Static Routing using EoIP Tunnel over IPSec

Published:25 January 2019Publication History

ABSTRACT

The development of internet networks requires a network administrator to implement various topology schemes on the location of the different network. It is intended to make each other enables to communicate in one area and monitor the use of traffic. This research aim is to create private network connection by ensuring its security and distributing public address through routing static algorithm. Network Development Life Cycle (NDLC) is utilized as the research method. Based on the implementation of EoIP tunnel network over IPSec, the researcher analysed the Quality of Service (QoS) for EoIP tunnel non-IPsec with EoIP tunnel over IPSec to find out the comparison. The Result revealed that EoIP tunnel over IPsec has throughput 93.04%, delay 1.43 ms, jitter 1.41 ms, and packet loss 0.43%. The data is fewer than the data of EoIP non-IPsec with throughput 94.85%, delay 1.39 ms, jitter 1.37 ms, and packet loss 0.52%. The differentiation caused by the encryption negotiation process during the network connected. Hopefully, this research has a contribution to make user is more accessible to communicate in the local area and monitor the traffic use centrally.

References

  1. I. A. Saputra, R. R. M., and S. N. Hertiana, "Uji Performansi Algoritma Floyd-Warshall Pada Jaringan Software Defined Network (SDN)," J. Elektron. dan Telekomun., vol. 16, no. 2, p. 52, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  2. K. Ramli, "Industri Data Center Indonesia," 2016.Google ScholarGoogle Scholar
  3. R. Kaur, S. Kumar, and V. K. Patle, "Analysis of Tunneling Transition Mechanism in IPv6," vol. 5, no. 3, pp. 313--318, 2013.Google ScholarGoogle Scholar
  4. O. Hermoni, N. Gilboa, E. Felstaine, and S. Dolev, "Rendezvous tunnel for anonymous publishing," Peer-to-Peer Netw. Appl., vol. 8, no. 3, pp. 352--366, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Niemiec and P. Machnik, "Authentication in virtual private networks based on quantum key distribution methods," Multimed. Tools Appl., vol. 75, no. 17, pp. 10691--10707, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. I. P. Hariyadi, "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge EoIP Over SSTP," 2016.Google ScholarGoogle Scholar
  7. I. Nugroho, B. Widada, and Kustanto, "Perbandingan Performansi Jaringan Virtual Private Network Metode Point To Point Tunneling Protocol (PPTP) Dengan Metode Internet Protocol Security," TIKomSiN, pp. 1--9, 2015.Google ScholarGoogle Scholar
  8. P. Ferguson and G. Huston, Quality of Service on the Internet: Fact, Fiction, or Compromise?, no. January. 1998.Google ScholarGoogle Scholar
  9. Y. A. Pranata, I. Fibriani, and S. B. Utomo, "Analisis Optimasi Kinerja Quality Of Service Pada Layanan Komunikasi Data Menggunakan NS - 2 di PT. PLN (PERSERO) Jember," Sinergi, vol. 20, no. 2, pp. 149--156, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. Joshi, M. Mandava, and G. Saraph, "End-to-end Quality of Service (QoS) Over Internet," IETE Tech. Rev., vol. 25, no. 4, p. 216, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  11. R. Towidjojo, Mikrotik Kungfu Kitab 2. Jakarta: Jasakom, 2013.Google ScholarGoogle Scholar
  12. Mikrotik, "Mikrotik Documentation Manual TOC Mikrotik." {Online}. Available: https://wiki.mikrotik.com/wiki/Manual:Interface/EoIP.Google ScholarGoogle Scholar
  13. P.-C. Cheng, J. A. Garay, A. Herzberg, and H. Krawczyk, "A Security Architecture for the Internet Protocol," IBM Syst. J., vol. 37, no. 1, pp. 42--60, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Case and J. Davin, "A Simple Network Management Protocol," pp. 1--36, 1990.Google ScholarGoogle Scholar
  15. R. Pradikta, A. Affandi, and E. Setijadi, "Rancang Bangun Aplikasi Monitoring Jaringan dengan Menggunakan Simple Network Management Protocol," J. Tek. ITS, vol. 2, no. 1, pp. A154--A159, 2013.Google ScholarGoogle Scholar
  16. S. Sukaridhoto, Jaringan Komputer. Surabaya: Politeknik Elektronika Negeri Surabaya, 2005.Google ScholarGoogle Scholar
  17. B. Lin et al., "Advanced algorithms for local routing strategy on complex networks," PLoS One, vol. 11, no. 7, pp. 1--18, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Dahshan, H., "Network Protocols and Algorithms Chapter 5 - Network Layer 5.2 Routing Algorithms." {Online}. Available: https://fac.ksu.edu.sa/sites/default/files/5.2-routing-algorithms.pdf.Google ScholarGoogle Scholar
  19. P. Network, D. Life, H. Kurniawan, S. Kosasi, and K. Barat, "Penerapan Network Development Life Cycle Dalam Perancangan Intranet," Penerapan Netw. Dev. Life Cycle Dalam Peranc. Intranet Untuk Mendukung Proses Pembelajaran, vol. 5, no. 2, pp. 178--188, 2015.Google ScholarGoogle Scholar
  20. U. Computing, C. Journal, S. P. Gochhayat, P. Venkataram, and C. Engineering, "Perormance Analysis of a Node Monitoring," Ubiquitous Comput. Commun. J., vol. 8, no. 1, pp. 1347--1358, 2013.Google ScholarGoogle Scholar
  21. M. Debashi and P. Vickers, Sonification of network traffic flow for monitoring and situational awareness, vol. 13, no. 4. 2018.Google ScholarGoogle Scholar
  22. B. Pamungkas, S. Rohajawati, D. Fitrianah, and I. Nurhaida, "IT Convergence and Security 2017," vol. 450, no. January, 2018.Google ScholarGoogle Scholar
  23. I. Nurhaida, "Digital Signature & Encryption Implementation for Increasing Authentication, Integrity, Security and Data Non-Repudiation," vol. 4, no. 11, pp. 4--14, 2017.Google ScholarGoogle Scholar
  24. F. A. Mustika, Simulasi Skema Otentikasi dan Tanda Tangan Digital Schnorr Berbasis Web. 2012.Google ScholarGoogle Scholar
  25. G. M. Pérez, F. J. G. Clemente, and A. F. G. Skarmeta, "Managing semantic-aware policies in a distributed firewall scenario," Internet Res., vol. 17, no. 4, pp. 362--377, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  26. A. Khavasi, "Design a security firewall policy to filter incoming traffic in packet switched networks using classification methods Shirin Bateni and Ali Asghar Khavasi," pp. 821--830, 2016.Google ScholarGoogle Scholar
  27. M. Fajri, "Simulasi Antrian Paket Data Jaringan dengan Mekanisme Drop Tail Misbahul Fajri Fakultas Ilmu Komputer Universitas Mercu Buana," J. Ilm. FIFO, vol. Vol VIII, no. 2, pp. 32--38, 2016.Google ScholarGoogle Scholar

Index Terms

  1. Quality of Service for Traffic Monitoring System based on Static Routing using EoIP Tunnel over IPSec

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      APIT '19: Proceedings of the 2019 Asia Pacific Information Technology Conference
      January 2019
      107 pages
      ISBN:9781450366212
      DOI:10.1145/3314527

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 January 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader