PERANCANGAN VOICE OVER INTERNET PROTOCOL (VoIP) MENGGUNAKAN VIRTUAL PRIVATE NETWORK (VPN) PADA PT CARE TECHNOLOGIES

  • Rusdiansyah Rusdiansyah (1) Teknik Informatika STMIK Nusa Mandiri
  • Herlawati Herlawati (2*) Teknik Informatika STMIK Nusa Mandiri
  • Eka Puspita Sari (3) Manajemen Informatika AMIK BSI Jakarta

  • (*) Corresponding Author
Keywords: VPN, VoIP, Layer 2 Tunneling Protocol

Abstract

Current technological developments to make a change from several sides. As in telecommunications are now developed with incoming. One of them is VoIP. VoIP is a technology capable of passing voice in packet form. With this VoIP technology, one can make telephone communication via the internet. To use this VoIP one can use the handphones are connected tolapop or PC. However, the use of VoIP has a disadvantage that can be done tapping at the time the conversation is being conducted. VPN (Virtual Private Network) is a way of creating a private network are using a public network / Internet. With a VPN network, a user as if connected by point to point that they are not. Consists of VPN-management protocols that can perform encryption and tunneling as PPTP (Point to Point Protocol), L2TP (Layer 2 Tunneling Protocol) and IPSec(Internet Protocol Security). With the capabilities of the VPN is expected that the wiretapping of conversations being conducted by the user can be prevented.

References

Agoes, Suhartati dan Adi Putranto. 2007. Simulasi Kualitas Layanan VoIP Menggunakan Metode Antrian Paket CBQ Dengan Mekanisme Link Sharing. Jakarta: JETri. Vol. 7, No1 :41-64.

Jiwa P.,Agus Aan. Membangun Jaringan Komputer Berbasis Multipoint dengan Memanfaatkan Switch (studi kasus: laboratorium komputer SMK TI Bali Global). Diambil dari : http://ilmukomputer.org/2011/03/04/membangun-jaringan-komputer-berbasismultipoint-dengan-memanfaatkan-switch/(28mei2012).

Kurniawan, Davit. 2007. Metode IP Address Lanjutan VLSM. Diambil dari : http://www.ilmukomputer.org/wpcontent/uploads/2007/12/metode-ipaddress-lanjutan-vlsm.pdf(5Juni2012).

Nurhaetati,Sitti. 2008. Fungsi Hash. Makasar : Makalah keamanan komputer. Munadi, Rendy. 2011. Teknik Switching. Bandung : Informatika Bandung.

Pungkasanti, Prind Triajeng. 2010. Jaringan VPN Untuk Sistem Informasi Koleksi Buku pada Perpustakaan Anggota Jasapusperti Jawa Tengah. Semarang : Jurnal Transformatika. Vol. 7, No2 :59-67.

Prastyo, Heri Bayu. 2008. IPSec VPN Pada Cisco Router. Diambil dari : http://ilmukomputer.org/wpcontent/uploads/2008/05/herry-bayuvpncisco1.pdf(5Juni2012)

Rachman, Oscar dan Gin gin Yugianto. 2008. TCP/IP Dalam Dunia Informatika dan Telekomunikasi. Bandung: Infromatika Bandung.

Sakiawan. 2010. Kajian Virtual Private Network (VPN) LAPAN dan Pemanfaatannya Dalam Mendukung Pengembang E-Government. Berita Dirgantara. Jakarta : Berita Dirgantara. Vol 2, No. 4 :145-152

Setiawan, Deris dan Dian Palupi Dini. 2009. Optimalisasi Interkoneksi Virtual Private Network (VPN) Dengan Menggunakan Hardware Based dan lix (Indonesia Exchange) sebagai Alternatif Jaringan Skala luas (WAN). Palembang : Jurnal Ilmiah generic. Vol 4, No 1:57-68

Sugeng, Winarno. 2008. Membangun Telepon Berbasis VOIP. Bandung : Informatika Bandung.

Suryani, Erma dan Nur Roy Honey. 2007. Implementasi Virtual Private Network – WAN Dalam Dunia Bisnis. Surabaya : JUTI. Vol 6, No. 1: 31-38

Tutang. 2002. Membangun Jaringan Sendiri LAN Local Area Network. Jakarta : Datakom.

Wijaya, Hendra. 2003. Belajar Sendiri Cisco Switch. Jakarta : PT Elex Media Komputindo.

Yuhefizar,2003. Tutorial Komputer dan Jaringan. Diambil dari : http://ilmukomputer.com (31 juli 2012).

Zimbra Indonesia. 2010. Instalasi Dan Konfigurasi DNS. Diambil dari : http://buaya.klas.or.id/zimbra/docs/InstalasiKonfigurasiDNS.pdf (1 Juni 2012).
Published
2013-03-15
How to Cite
Rusdiansyah, R., Herlawati, H., & Sari, E. (2013). PERANCANGAN VOICE OVER INTERNET PROTOCOL (VoIP) MENGGUNAKAN VIRTUAL PRIVATE NETWORK (VPN) PADA PT CARE TECHNOLOGIES. Jurnal Techno Nusa Mandiri, 10(1), 57-64. Retrieved from https://ejournal.nusamandiri.ac.id/index.php/techno/article/view/560
Article Metrics

Abstract viewed = 277 times
PDF downloaded = 1331 times