Vpn Research Papers - Academia.edu (original) (raw)
- by
- •
- Philosophy, Humanities
The rapid development of technology in communications has transformed the operations of companies and institutions, paving the way for increased productivity, revenue growth, and enhanced customer service. Multimedia calls and other... more
The rapid development of technology in communications has transformed the operations of companies and institutions, paving the way for increased productivity, revenue growth, and enhanced customer service. Multimedia calls and other modern communication technologies boost mobile network, thus their utilization is critical to moving the business forward. However, these widely used networks are also vulnerable to security threats, leading network vendors and technicians to implement various techniques to ensure network safety. As the need to safeguard technologies grow and there has been a significant increase in growth the idea of a virtual private network (VPN) emerged as a key strategy for tackling the threat to network security. the authors suggested looking into this issue and presenting the findings of a study that contained insightful observations from the literature reviews that served as the primary source of research besides questionnaire responses as opinions from those who have experience in the network industry and its security. Through this research, it became evident that several technologies and approaches exist to safeguard networks, but the Transport Layer Security (TLS) architecture stood out as a superior solution, particularly for mobile networks.
Internet pada saat ini bagi sebagaian orang sudah menjadi kebutuhan primer. Kebanyakan pengguna internet mengunjungi situs yang sama secara berulang-ulang dan seringkali pengguna internet mengakses situs yang sama secara bersama-sama... more
Internet pada saat ini bagi sebagaian orang sudah menjadi kebutuhan primer. Kebanyakan pengguna internet mengunjungi situs yang sama secara berulang-ulang dan seringkali pengguna internet mengakses situs yang sama secara bersama-sama dalam jaringan lokal yang sama. Karena terbatasnya bandwidth dan banyaknya para pengguna maka koneksi internet akan menjadi sangat lambat. Squid adalah salah satu program cache proxy yang berfungsi untuk meningkatkan efisiensi penggunaan bandwidth dengan menyimpan objek-objek dari halaman web yang sering dikunjungi kedalam cache lokal. Sehingga apabila ada permintaan untuk membuka halaman web yang sama akan diambilkan dari cache proxy sehingga akan mengurangi waktu akses dan konsumsi bandwidth Pengembangan program Squid pada sistem operasi Windows ini bertujuan untuk membantu pengguna internet dalam melakukan penghematan bandwidth. Dengan adanya pengembangan program Squid pada sistem operasi Windows dapat membantu dalam melakukan efisiensi penggunaan ba...
El presente trabajo de investigación desarrollado en la Universidad Nacional de Piura denominado “PROTOTIPO DE SISTEMA EXPERTO PARA DIAGNOSTICAR Y PROPONER LA SOLUCIÓN DE FALLAS DE UNA RED DE ÁREA LOCAL DEL CENTRO DE INFORMÁTICA Y... more
El presente trabajo de investigación desarrollado en la Universidad Nacional de
Piura denominado “PROTOTIPO DE SISTEMA EXPERTO PARA DIAGNOSTICAR Y
PROPONER LA SOLUCIÓN DE FALLAS DE UNA RED DE ÁREA LOCAL DEL CENTRO
DE INFORMÁTICA Y TELECOMUNICACIONES EN LA U.N.P - AÑO 2016” ha permitido
desarrollar un prototipo de sistema experto que ayudará a proponer la solución
inmediata a las fallas a nivel de hardware de conectividad, hardware de interfaz,
software de comunicación y fallas de usuarios en la red LAN.
La información se obtuvo en las instalaciones del edificio del Centro de Informática
y Telecomunicaciones, ubicado en el campus universitario de la universidad donde
se encuentra distribuida la red LAN. En este trabajo de investigación, se realizaron
encuestas dirigidas al personal técnico en redes y usuarios con conocimientos
básicos de computación e informática que laboran en el edificio del C.I.T con la
finalidad de diagnosticar fallas de la red LAN y proponer un sistema experto.
Se consultó, preguntó y entrevistó a especialistas en redes y se obtuvo información
que luego permitió procesar los conocimientos en lenguaje natural, para luego
formular las reglas de producción y proceso de razonamiento utilizando el lenguaje
de programación java para el diseño del prototipo que finalmente fue sometido a
una simulación de pruebas en algunos equipos de cómputo del C.I.T - U.N.P, así
como la elaboración de un módulo explicativo, para que cualquier persona con
conocimientos básicos en redes y comunicaciones pueda utilizarlo.
ABSTRAKSI: PSTN merupakan salah satu media komunikasi analog yang masih eksis hingga kini, bahkan jumlah penggunanya semakin meningkat tiap tahun. Dilihat dari segi tingkat pengamanan informasi, PSTN merupakan media paling rawan akan... more
ABSTRAKSI: PSTN merupakan salah satu media komunikasi analog yang masih eksis hingga kini, bahkan jumlah penggunanya semakin meningkat tiap tahun. Dilihat dari segi tingkat pengamanan informasi, PSTN merupakan media paling rawan akan tindak penyadapan. Untuk itu dibutuhkannya teknik pengamanan/security suara yang cukup untuk pengamanan informasi yang dilewatkan di dalamnya. Dengan memanfaatkan perkembangan pengacakan data, fasilitas keamanan informasi akan semakin terjamin. Namun itu semua perlu adanya suatu perangkat pendukung dimana kehandalan dan ekonomis sistem pengaman sangat dibutuhkan dalam implementasi terhadap algoritma tersebut. Pemanfaatan mikrokontroller sebagai perangkat pendukung untuk mengimplementasikan algoritma pengamanan data sangat mungkin dilakukan, hal ini disebabkan semakin lengkapnya fitur mikrokontroller yang memungkinkan untuk diimplementasikan ke dalam berbagai jenis media, hal ini memberikan beberapa keuntungan diantaranya kepraktisan dan reabilitas alat ...
- by Ages Handriyanto
- •
- by Yusuf S Nugroho
- •
- Engineering, Squid
- by Yusuf S Nugroho
- •
- Engineering, Squid
The Virtual Private Wire Service (VPWS), detailed in RFC 4664, provides point-to-point connections between pairs of Customer Edge (CE) devices. It does so by binding two Attachment Circuits (each connecting a CE device with a Provider... more
The Virtual Private Wire Service (VPWS), detailed in RFC 4664, provides point-to-point connections between pairs of Customer Edge (CE) devices. It does so by binding two Attachment Circuits (each connecting a CE device with a Provider Edge (PE) device) to a pseudowire (connecting the two PEs). In general, the Attachment Circuits must be of the same technology (e.g., both Ethernet or both ATM), and the pseudowire must carry the frames of that technology. However, if it is known that the frames ’ payload consists solely of IP datagrams, it is possible to provide a point-to-point connection in which the pseudowire connects Attachment Circuits of different technologies. This requires the PEs to perform a function known as "Address Resolution Protocol (ARP) Mediation". ARP Mediation refers to the process of resolving Layer 2 addresses when different resolution protocols are used on either Attachment Circuit. The methods described in this document are applicable even when the CE...
- by Giles Heron
- •
- Category
- by widia marlina
- •
- by Reta Degefa
- •
- Computer Science, Security, Vpn, Tunnel
In the last years, Spanish firms have attempted to create value for their shareholders.The market value added (MVA) has been proposed by the Stern Stewart Consulting Group asa measure of value creation, and the economic value added (EVA)... more
In the last years, Spanish firms have attempted to create value for their shareholders.The market value added (MVA) has been proposed by the Stern Stewart Consulting Group asa measure of value creation, and the economic value added (EVA) as an operating measure toimplement this new management philosophy. In this paper, an empirical analysis about therelationship between MVA and several performance
Diskless computer merupakan penggunaan PC secara bersama oleh dua user/client atau lebih, tetapi tidak menggunakan harddisk hanya membutuhkan floppy drive atau bootroom untuk mengaktifkan LTSP (Linux Terminal Server Project) di PC user.... more
Diskless computer merupakan penggunaan PC secara bersama oleh dua user/client atau lebih, tetapi tidak menggunakan harddisk hanya membutuhkan floppy drive atau bootroom untuk mengaktifkan LTSP (Linux Terminal Server Project) di PC user. Sistem tersebut, server harus mempunyai spesifikasi yang tunggi dan menjalankan beberapa service-service seperti DHCP (Dynamic host Configuration Protocol), paket LTSP. Pada penelitian ini, LTSP (Linux Terminal Server Project) menggunakan ubuntu 14.04 LTS dan memanfaatkan komputer yang tidak terpakai dengan spesifikasi Pentium 4 tanpa adanya media penyimpan yaitu harddisk untuk dijadikan sebagai PC user. Tujuan pembuatan LTSP (Linux Terminal Server Project) untuk dimanfaatkan pada laboratorium komputer SMP Negeri 1 Bulakamba sebagai sarana pembelajaran yang efektif karena sistem pembelajarannya masih menggunakan peer to peer. Alat yang digunakan dalam penelitian yaitu komputer dengan spesifikasi processor core i3, RAM 4 gigabyte, harddisk 250 gigabyt...
Demand for Internet services such as private network, secure network and data transfer speed has raised challenges within the network. To cope with the demand of speed access in the network, in the last decade MPLS technology has emerged.... more
Demand for Internet services such as private network, secure network and data transfer speed has raised challenges within the network. To cope with the demand of speed access in the network, in the last decade MPLS technology has emerged. The MPLS is developed one of which to support VPN and MPLS-Traffic engginering. MPLS-VPN is a VPN who utilize MPLS technology to improve VPN capabilities in terms of quality QoS.Traffic Engineering in MPLS is process of selecting a data channel traffic to balance the traffic load on the various lines and points on the network as well as managing traffic better network using alternate pathways. In this research, we will compare the performance characteristics of the MPLS-TE and MPLS-VPN. The research is divided into four steps. Step one is MPLS-VPN network configuration and MPLS-TE network configuration. Step two is downloading data from the server to the PC 1 and PC2. Step 3 is capturing data traffic using wireshark software, and Step four is testi...
1 University of Bonab, Bonab, Iran Abstract. Modularity is a critical issue in large-scale software systems. To reach maximum quality of modularity, some principles and guidelines have been provided such as object oriented principles and... more
1 University of Bonab, Bonab, Iran Abstract. Modularity is a critical issue in large-scale software systems. To reach maximum quality of modularity, some principles and guidelines have been provided such as object oriented principles and heuristics. Everything can be an object. So we can consider a module as an object and apply object oriented heuristics on modules. In this paper, five modular principles as MEDA-Principles have been provided by analysis of object oriented principles and different aspect of modularity. To evaluate MEDA-Principles, some disadvantages of existing approaches have been investigated and categorized. Finally, a new architecture based on MEDA-Principles has suggested and show that MEDAPrinciples can capture disadvantages of existing approaches.
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve... more
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also because being a consolidated technology, it is possible to apply appropriate patches to remedy any security holes. In this paper we analyze the performances of open source firmware OpenWrt 21.x compared with a server-side operating system (Debian 11 x64) and Mikrotik 7.x, also virtualized, and different types of clients (Windows 10/11, iOS 15, Android 11, OpenWrt 21.x, Debian 11 x64 and Mikrotik 7.x), observing the performance of the network according to the current implementation of the various protocols and algorithms of VPN tunnel examined on what are the most recent HW and SW for deployment in outdoor locations with poor network connectivity. Specifically, operating systems provide different performance metric values for various c...
This research aims to Implement control and safe use of the internet at an agency with a utilization fee seminal may use the Linux operating system Ubuntu 14:04. Bandwidth division according to the time of busy servers and Internet... more
This research aims to Implement control and safe use of the internet at an agency with a utilization fee seminal may use the Linux operating system Ubuntu 14:04. Bandwidth division according to the time of busy servers and Internet client. To quick opening for the second time and so on. Blocking sites - porn site that tends to contain spyware. Accelerate video audio streaming. This study uses experimental research. In this study conducted experiments on the performance of the proxy server that runs on the Linux operating system ubuntu 14:04 server. The results of subsequent experiments documented for analysis to produce appropriate recommendations for the creation of a proxy server. From the results of this analysis will be to get conclusions about the benefits and functionality in more detail from the proxy server, especially in the caching and filtering functions on the proxy server. The results of this study it appears that the proxy server is already running in accordance with t...
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to provide confidentiality and anonymity to communication. Despite this enormous and ubiquitous usage, VPNs come with various security,... more
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to provide confidentiality and anonymity to communication. Despite this enormous and ubiquitous usage, VPNs come with various security, misconfiguration, and performance related issues thereby hindering the users to take maximum advantage of this revolutionary technology. To address this concern, VPN users must choose the most secure and perfect VPN solution for the smooth functioning of daily life activities. Generally, no clear set of directions is available for assisting a common VPN user thereby accentuating the need to develop an elucidated and coherent checklist that thoroughly helps in evaluating any VPN based on its security, performance, auditing, and management function. This research comprehensively surveys VPN technologies, its features, working principles, and compliance principles that evolved over the last two decades. Based on it, this research presents a new methodology in the f...
Abstrak Penelitian ini membahas tentang optimalisasi Local Area Network (LAN) dalam mendukung proses pembelajaran berbasis E-Learning pada Jurusan Teknik Elektro Polnep. Penelitian ini diharapkan mampu memberikan gambaran dan informasi... more
Abstrak Penelitian ini membahas tentang optimalisasi Local Area Network (LAN) dalam mendukung proses pembelajaran berbasis E-Learning pada Jurusan Teknik Elektro Polnep. Penelitian ini diharapkan mampu memberikan gambaran dan informasi tentang langkah-langkah yang dapat dilakukan untuk mewujudkan pembelajaran berbasis E-Learning yang didukung infrastruktur jaringan komputer bagi pengguna/users baik staf/dosen maupun mahasiswa dalam mendukung proses belajar mengajar di Jurusan Teknik Elektro Polnep. Tujuan yang ingin dicapai dalam penelitian ini adalah terwujudnya prototype jaringan internet dan intranet untuk mendukung proses pembelajaran E-learning pada Jurusan Teknik Elektro Polnep. Metode yang dilakukan dalam penelitian ini terdiri dari beberapa tahap yaitu metode perancangan, aplikasi dan uji konektifitas. Berdasarkan hasil rancangan dan pengujiannya maka dapat disimpulkan bahwa media jaringan LAN yang dirancang dapat melayani pengguna jaringan dan berfungsi dengan baik. Luaran ...
- by suheva bunny
- •
- by suheva bunny
- •
- by suheva bunny
- •
- by suheva bunny
- •
Suatu jaringan dikatakan kongesti dari perspektif pengguna jika jumlah pengiriman data melebihi kapasitas router. Diffserv merupakan skema dari Quality of Service (QoS) untuk mengatasi kongesti pada jaringan. Pada tugas akhir ini akan... more
Suatu jaringan dikatakan kongesti dari perspektif pengguna jika jumlah pengiriman data melebihi kapasitas router. Diffserv merupakan skema dari Quality of Service (QoS) untuk mengatasi kongesti pada jaringan. Pada tugas akhir ini akan merancang Congestion Avoidance Weighted Red Early Detection (WRED) yang merupakan bagian dari DiffServ. WRED mempunyai kinerja apabila antrian rata-rata lebih kecil dari minimal threshold, maka WRED akan melewatkan paket. jika antrian rata-rata lebih besar dari batas maksimum thereshold, maka WRED akan membuang paket dan jika antrian rata-rata berada diantara batas minimum dan maksimum Thereshold maka WRED akan membuang paket berdasarkan probabilitas droping max = 0.1. Pengerjaan hanya sampai pada tahap plan dan design dari model PDIOO (Plan-Design-Implementation-operate dan Optimize) yang dikembangkan oleh Cisco. Rancangan topologi jaringan menggunakan software GNS3 menggunakan router IOS Cisco 7200. Hasil simulasi menunjukan bahwa jumlah antrian rata...
Linux Terminal Server Project (LTSP) adalah terminal server yang bebas dan open source untuk Linux yang memungkinkan banyak orang untuk secara bersamaan menggunakan komputer yang sama. Peniltian ini bertujuan untuk memberdayakan... more
Linux Terminal Server Project (LTSP) adalah terminal server yang bebas dan open source untuk Linux yang memungkinkan banyak orang untuk secara bersamaan menggunakan komputer yang sama. Peniltian ini bertujuan untuk memberdayakan computer-komputer dengan spesifikasi rendah agar dapat menjalankan berbagai macam applikasi grafis. Hasil pengujian menunjukkan bahwa kinerja memory server saat menjalankan satu client relative rendah namun ketika client nya ditambah maka penggunaan memory server juga ikut bertambah namun dalam pengunaan CPU cenderung tidak ada perubahan. Kata Kunci : LTSP, Diskless, K12Linux
Plants are ideal for the production of protein-based nanomaterials because they synthesize and assemble complex multimeric proteins that cannot be expressed efficiently using other platforms. Plant viruses can be thought of as... more
Plants are ideal for the production of protein-based nanomaterials because they synthesize and assemble complex multimeric proteins that cannot be expressed efficiently using other platforms. Plant viruses can be thought of as self-replicating proteinaceous nanomaterials generally stable and easily produced in high titers. We used Potato virus X (PVX), chimeric virus particles, and Cowpea mosaic virus, empty virus-like particles to display a linear peptide (lipo) derived from human lipocalin, which is immunodominant in Sjögren's syndrome (SjS) and is thus recognized by autoantibodies in SjS patient serum. These virus-derived nanoparticles were thus used to develop a diagnostic assay for SjS based on a direct enzyme linked immunosorbent assay format. We found that PVX-lipo formulations were more sensitive than the chemically synthesized immunodominant peptide and equally specific when used to distinguish between healthy individuals and SjS patients. Our novel assay therefore allo...