PERANCANGAN VOICE OVER INTERNET PROTOCOL (VoIP) MENGGUNAKAN VIRTUAL PRIVATE NETWORK (VPN) PADA PT CARE TECHNOLOGIES
Abstract
Current technological developments to make a change from several sides. As in telecommunications are now developed with incoming. One of them is VoIP. VoIP is a technology capable of passing voice in packet form. With this VoIP technology, one can make telephone communication via the internet. To use this VoIP one can use the handphones are connected tolapop or PC. However, the use of VoIP has a disadvantage that can be done tapping at the time the conversation is being conducted. VPN (Virtual Private Network) is a way of creating a private network are using a public network / Internet. With a VPN network, a user as if connected by point to point that they are not. Consists of VPN-management protocols that can perform encryption and tunneling as PPTP (Point to Point Protocol), L2TP (Layer 2 Tunneling Protocol) and IPSec(Internet Protocol Security). With the capabilities of the VPN is expected that the wiretapping of conversations being conducted by the user can be prevented.
References
Jiwa P.,Agus Aan. Membangun Jaringan Komputer Berbasis Multipoint dengan Memanfaatkan Switch (studi kasus: laboratorium komputer SMK TI Bali Global). Diambil dari : http://ilmukomputer.org/2011/03/04/membangun-jaringan-komputer-berbasismultipoint-dengan-memanfaatkan-switch/(28mei2012).
Kurniawan, Davit. 2007. Metode IP Address Lanjutan VLSM. Diambil dari : http://www.ilmukomputer.org/wpcontent/uploads/2007/12/metode-ipaddress-lanjutan-vlsm.pdf(5Juni2012).
Nurhaetati,Sitti. 2008. Fungsi Hash. Makasar : Makalah keamanan komputer. Munadi, Rendy. 2011. Teknik Switching. Bandung : Informatika Bandung.
Pungkasanti, Prind Triajeng. 2010. Jaringan VPN Untuk Sistem Informasi Koleksi Buku pada Perpustakaan Anggota Jasapusperti Jawa Tengah. Semarang : Jurnal Transformatika. Vol. 7, No2 :59-67.
Prastyo, Heri Bayu. 2008. IPSec VPN Pada Cisco Router. Diambil dari : http://ilmukomputer.org/wpcontent/uploads/2008/05/herry-bayuvpncisco1.pdf(5Juni2012)
Rachman, Oscar dan Gin gin Yugianto. 2008. TCP/IP Dalam Dunia Informatika dan Telekomunikasi. Bandung: Infromatika Bandung.
Sakiawan. 2010. Kajian Virtual Private Network (VPN) LAPAN dan Pemanfaatannya Dalam Mendukung Pengembang E-Government. Berita Dirgantara. Jakarta : Berita Dirgantara. Vol 2, No. 4 :145-152
Setiawan, Deris dan Dian Palupi Dini. 2009. Optimalisasi Interkoneksi Virtual Private Network (VPN) Dengan Menggunakan Hardware Based dan lix (Indonesia Exchange) sebagai Alternatif Jaringan Skala luas (WAN). Palembang : Jurnal Ilmiah generic. Vol 4, No 1:57-68
Sugeng, Winarno. 2008. Membangun Telepon Berbasis VOIP. Bandung : Informatika Bandung.
Suryani, Erma dan Nur Roy Honey. 2007. Implementasi Virtual Private Network – WAN Dalam Dunia Bisnis. Surabaya : JUTI. Vol 6, No. 1: 31-38
Tutang. 2002. Membangun Jaringan Sendiri LAN Local Area Network. Jakarta : Datakom.
Wijaya, Hendra. 2003. Belajar Sendiri Cisco Switch. Jakarta : PT Elex Media Komputindo.
Yuhefizar,2003. Tutorial Komputer dan Jaringan. Diambil dari : http://ilmukomputer.com (31 juli 2012).
Zimbra Indonesia. 2010. Instalasi Dan Konfigurasi DNS. Diambil dari : http://buaya.klas.or.id/zimbra/docs/InstalasiKonfigurasiDNS.pdf (1 Juni 2012).
The copyright of any article in the TECHNO Nusa Mandiri Journal is fully held by the author under the Creative Commons CC BY-NC license.
- The copyright in each article belongs to the author.
- Authors retain all their rights to published works, not limited to the rights set out on this page.
- The author acknowledges that Techno Nusa Mandiri: Journal of Computing and Information Technology (TECHNO Nusa Mandiri) is the first to publish with a Creative Commons Attribution 4.0 International license (CC BY-NC).
- Authors can enter articles separately, manage non-exclusive distribution, from manuscripts that have been published in this journal into another version (for example: sent to author affiliation respository, publication into books, etc.), by acknowledging that the manuscript was published for the first time in Techno Nusa Mandiri: Journal of Computing and Information Technology (TECHNO Nusa Mandiri);
- The author guarantees that the original article, written by the stated author, has never been published before, does not contain any statements that violate the law, does not violate the rights of others, is subject to the copyright which is exclusively held by the author.
- If an article was prepared jointly by more than one author, each author submitting the manuscript warrants that he has been authorized by all co-authors to agree to copyright and license notices (agreements) on their behalf, and agrees to notify the co-authors of the terms of this policy. Techno Nusa Mandiri: Journal of Computing and Information Technology (TECHNO Nusa Mandiri) will not be held responsible for anything that may have occurred due to the author's internal disputes.