Analisa dan Perancangan Jaringan Berbasis VPN Pada PT. Finroll

Authors

  • Johan Muliadi Kerta Bina Nusantara University
  • David Wennoris Bina Nusantara University
  • Tonny Gunawan Bina Nusantara University
  • Erny Erny Bina Nusantara University

DOI:

https://doi.org/10.21512/comtech.v1i2.2576

Keywords:

public network, data security, VPN

Abstract

Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future.

 

Dimensions

Plum Analytics

References

Sukmawan, B. (2000). Metoda Enkripsi Blowfish. http://www.bimacipta.com/blowfish.htm

Davis, C. R. (2001). IPSec: Securing VPNS. USA: McGraw-Hill.

Downs, K., Spanier, S., Ford, M. Stevenson, T., Lew, H.K. (1998). Internetworking Technologies Handbook, 2nd edition. Indianapolis: Macmillan Technical Publishing..

Gupta, M.. (2003). Building a Virtual Private Network. USA: Premier Press.

Lammle, T. (2004). CCNATM Cisco Certified Network Associate STUDY GUIDE. Jakarta: PT. Elex Media Komputindo.

Lukas, J. (2006). Jaringan Komputer. Yogyakarta: Graha Ilmu.

Mikrotik Indonesia (2007), Mikrotik RouterOS V2.9 Reference Manual http://www.mikrotik.com/testdocs/ros/2.9/

Paessler Bandwidth Management Software (2007). Monitor and Manage bandwidth with PRTG. http://www.paessler.com/prtg

Perlmutter, B., & Zarkower, J. (1999). Virtual Private Networking: A View From The Trenches. New Jersey: Prentice Hall.

Stallings, W. (2003). Cryptography and Network Security: Principles and Practice, 3rd edition. New Jersey: Prentice Hall.

Downloads

Published

2010-12-01

Issue

Section

Articles
Abstract 387  .
PDF downloaded 802  .