ABSTRACT
The development of internet networks requires a network administrator to implement various topology schemes on the location of the different network. It is intended to make each other enables to communicate in one area and monitor the use of traffic. This research aim is to create private network connection by ensuring its security and distributing public address through routing static algorithm. Network Development Life Cycle (NDLC) is utilized as the research method. Based on the implementation of EoIP tunnel network over IPSec, the researcher analysed the Quality of Service (QoS) for EoIP tunnel non-IPsec with EoIP tunnel over IPSec to find out the comparison. The Result revealed that EoIP tunnel over IPsec has throughput 93.04%, delay 1.43 ms, jitter 1.41 ms, and packet loss 0.43%. The data is fewer than the data of EoIP non-IPsec with throughput 94.85%, delay 1.39 ms, jitter 1.37 ms, and packet loss 0.52%. The differentiation caused by the encryption negotiation process during the network connected. Hopefully, this research has a contribution to make user is more accessible to communicate in the local area and monitor the traffic use centrally.
- I. A. Saputra, R. R. M., and S. N. Hertiana, "Uji Performansi Algoritma Floyd-Warshall Pada Jaringan Software Defined Network (SDN)," J. Elektron. dan Telekomun., vol. 16, no. 2, p. 52, 2016.Google ScholarCross Ref
- K. Ramli, "Industri Data Center Indonesia," 2016.Google Scholar
- R. Kaur, S. Kumar, and V. K. Patle, "Analysis of Tunneling Transition Mechanism in IPv6," vol. 5, no. 3, pp. 313--318, 2013.Google Scholar
- O. Hermoni, N. Gilboa, E. Felstaine, and S. Dolev, "Rendezvous tunnel for anonymous publishing," Peer-to-Peer Netw. Appl., vol. 8, no. 3, pp. 352--366, 2015.Google ScholarCross Ref
- M. Niemiec and P. Machnik, "Authentication in virtual private networks based on quantum key distribution methods," Multimed. Tools Appl., vol. 75, no. 17, pp. 10691--10707, 2016. Google ScholarDigital Library
- I. P. Hariyadi, "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge EoIP Over SSTP," 2016.Google Scholar
- I. Nugroho, B. Widada, and Kustanto, "Perbandingan Performansi Jaringan Virtual Private Network Metode Point To Point Tunneling Protocol (PPTP) Dengan Metode Internet Protocol Security," TIKomSiN, pp. 1--9, 2015.Google Scholar
- P. Ferguson and G. Huston, Quality of Service on the Internet: Fact, Fiction, or Compromise?, no. January. 1998.Google Scholar
- Y. A. Pranata, I. Fibriani, and S. B. Utomo, "Analisis Optimasi Kinerja Quality Of Service Pada Layanan Komunikasi Data Menggunakan NS - 2 di PT. PLN (PERSERO) Jember," Sinergi, vol. 20, no. 2, pp. 149--156, 2016.Google ScholarCross Ref
- R. Joshi, M. Mandava, and G. Saraph, "End-to-end Quality of Service (QoS) Over Internet," IETE Tech. Rev., vol. 25, no. 4, p. 216, 2008.Google ScholarCross Ref
- R. Towidjojo, Mikrotik Kungfu Kitab 2. Jakarta: Jasakom, 2013.Google Scholar
- Mikrotik, "Mikrotik Documentation Manual TOC Mikrotik." {Online}. Available: https://wiki.mikrotik.com/wiki/Manual:Interface/EoIP.Google Scholar
- P.-C. Cheng, J. A. Garay, A. Herzberg, and H. Krawczyk, "A Security Architecture for the Internet Protocol," IBM Syst. J., vol. 37, no. 1, pp. 42--60, 1998. Google ScholarDigital Library
- J. Case and J. Davin, "A Simple Network Management Protocol," pp. 1--36, 1990.Google Scholar
- R. Pradikta, A. Affandi, and E. Setijadi, "Rancang Bangun Aplikasi Monitoring Jaringan dengan Menggunakan Simple Network Management Protocol," J. Tek. ITS, vol. 2, no. 1, pp. A154--A159, 2013.Google Scholar
- S. Sukaridhoto, Jaringan Komputer. Surabaya: Politeknik Elektronika Negeri Surabaya, 2005.Google Scholar
- B. Lin et al., "Advanced algorithms for local routing strategy on complex networks," PLoS One, vol. 11, no. 7, pp. 1--18, 2016.Google ScholarCross Ref
- M. Dahshan, H., "Network Protocols and Algorithms Chapter 5 - Network Layer 5.2 Routing Algorithms." {Online}. Available: https://fac.ksu.edu.sa/sites/default/files/5.2-routing-algorithms.pdf.Google Scholar
- P. Network, D. Life, H. Kurniawan, S. Kosasi, and K. Barat, "Penerapan Network Development Life Cycle Dalam Perancangan Intranet," Penerapan Netw. Dev. Life Cycle Dalam Peranc. Intranet Untuk Mendukung Proses Pembelajaran, vol. 5, no. 2, pp. 178--188, 2015.Google Scholar
- U. Computing, C. Journal, S. P. Gochhayat, P. Venkataram, and C. Engineering, "Perormance Analysis of a Node Monitoring," Ubiquitous Comput. Commun. J., vol. 8, no. 1, pp. 1347--1358, 2013.Google Scholar
- M. Debashi and P. Vickers, Sonification of network traffic flow for monitoring and situational awareness, vol. 13, no. 4. 2018.Google Scholar
- B. Pamungkas, S. Rohajawati, D. Fitrianah, and I. Nurhaida, "IT Convergence and Security 2017," vol. 450, no. January, 2018.Google Scholar
- I. Nurhaida, "Digital Signature & Encryption Implementation for Increasing Authentication, Integrity, Security and Data Non-Repudiation," vol. 4, no. 11, pp. 4--14, 2017.Google Scholar
- F. A. Mustika, Simulasi Skema Otentikasi dan Tanda Tangan Digital Schnorr Berbasis Web. 2012.Google Scholar
- G. M. Pérez, F. J. G. Clemente, and A. F. G. Skarmeta, "Managing semantic-aware policies in a distributed firewall scenario," Internet Res., vol. 17, no. 4, pp. 362--377, 2007.Google ScholarCross Ref
- A. Khavasi, "Design a security firewall policy to filter incoming traffic in packet switched networks using classification methods Shirin Bateni and Ali Asghar Khavasi," pp. 821--830, 2016.Google Scholar
- M. Fajri, "Simulasi Antrian Paket Data Jaringan dengan Mekanisme Drop Tail Misbahul Fajri Fakultas Ilmu Komputer Universitas Mercu Buana," J. Ilm. FIFO, vol. Vol VIII, no. 2, pp. 32--38, 2016.Google Scholar
Index Terms
- Quality of Service for Traffic Monitoring System based on Static Routing using EoIP Tunnel over IPSec
Recommendations
Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic
AICT-ICIW '06: Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and ServicesThis paper presents a quantitative analysis of the Quality of Service (QoS) offered by Virtual Private Networks (VPNs) based on the suite of protocols IPSec (IP Security) in a Computer Supported Collaborative Learning environment. Testing was done with ...
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN
MUE '09: Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous EngineeringIPSec VPN is commonly used to implement secure communications between different branch intranets over public networks. Multi-link aggregate IPSec VPN can make better use of multiple physical links of corporation. On the basis of analysis on the ...
Comments