Results 1 to 10 of about 1,966 (130)

Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima

open access: yesComputer Science, 2022
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server.
Farizal Triyansa, Irwan Agus Sobari
doaj   +2 more sources

Penerapan Firewall Dan Protokol IpSec/L2TP Sebagai Solusi Keamanan Akses Jaringan Publik

open access: yesComputer Science, 2021
Firewall is an algorithm that allows filtering activities to determine access restrictions on a komputer  that can use Publik  network access and which komputer s cannot pass through Publik  network access, this is commonly called filtering. As time goes
Muhammad Ayub   +2 more
doaj   +3 more sources

Protokol L2TP dan IPsec Sebagai Keamanan Jaringan Pada Dinas Kominfotik Sumatera Barat

open access: yesJurnal Sarjana Teknik Informatika, 2022
Beberapa masalah muncul pada beberapa perusahaan-perusahaan baik itu dalam skala besar maupun skala kecil. Adapun dari berbagai macam masalah yang terjadi, salah satunya adalah masalah keamanan jaringan komputer. Pada Kantor Dinas Komunikasi, Informatika
Ridho Laksamana   +2 more
doaj   +2 more sources

Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19

open access: yesJurnal Ilmu Komputer Dan Bisnis, 2022
COVID-19 merupakan sebuah virus yang telah berkembang menjadi pandemi global. Hal ini menyebabkan jutaan karyawan di seluruh dunia saat ini bekerja dari rumah. Virtual Private Network (VPN) dapat digunakan untuk memberikan karyawan akses data kantor dari rumah.
Haeruddin Haeruddin, Kelvin Kelvin
exaly   +2 more sources

Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik

open access: yesInfotek
Virtual Private Network (VPN) has become a critical solution for ensuring secure communication over public networks. This research conducts a comprehensive analysis of the performance and security of two major VPN protocols: Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol with Internet Protocol Security (L2TP/IPSec) implemented ...
null M. Khofikur R.A   +3 more
exaly   +2 more sources

Application of MPLS Tunnel Service L2TP-VPN Optimization Concept with Traffic Engineering Method for Looping-Protection Service Analysis [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
This research began when observations were made on any-to-any-connection services that require QoS (Quality of Service) and tunnel measurements. Tunnel is a technique to interconnect between local networks that are separated through a public network ...
Lukman Medriavin Silalahi   +6 more
doaj   +1 more source

Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink

open access: yesСистеми обробки інформації, 2023
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін   +3 more
doaj   +1 more source

Comparative analysis of VPN protocols

open access: yesJournal of Computer Sciences Institute, 2023
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec.
Jerzy Antoniuk   +1 more
doaj   +1 more source

Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol

open access: yesIEEE Access, 2023
Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly known as Internet Protocols (IP). In which, IP is currently widely used for mobile communication activities.
Setiyo Budiyanto, Dadang Gunawan
doaj   +1 more source

Network Security Analysis Simulation at the GCS in the UCAV to support the Indonesian Defense Area

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
An unmanned Combat Aerial Vehicle (UCAV) is an unmanned aircraft that has a serial control communication device that can be seen directly in real-time.
Bita Parga Zen   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy