To see the other types of publications on this topic, follow the link: VPN connections.

Journal articles on the topic 'VPN connections'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'VPN connections.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Full text
Abstract:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
APA, Harvard, Vancouver, ISO, and other styles
2

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO, and other styles
3

Harika Rama Tulasi Karatapu and Vishal Gudhka. "Secure hybrid connectivity with private service connects and zero trust on-premises integration." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 4272–90. https://doi.org/10.30574/wjarr.2025.26.2.2108.

Full text
Abstract:
Managing secure connections between cloud servers and internal equipment has become a main concern when companies move parts of their operations to hybrid cloud models. Modern network systems based on perimeter protection do not work against current cyber risks. This document presents a secure hybrid connection plan that combines Private Service Connect and Zero Trust On-Premises [10] Integration with IPSec VPN tunnels to enhance network security. Private Service Connect [4] creates safe private links between local networks and cloud services which protect data as it moves away from open internet connections to reduce exposure to unauthorized access. Zero Trust security confirms network traffic security both from within and outside the organization by constantly checking and encrypting every packet. Our new security procedures require authorization checks for every connection despite existing interpersonal relationships. We will focus on IPSec VPN tunnels because they protect hybrid connectivity from harm. Network connections using IPSec technology guard the communication link from cloud servers to on-premises equipment. The study explains how VPN tunnels make different cloud environments connect better and discusses why this helps hybrid cloud systems run more securely. This paper presents an all-inclusive security framework that safeguards data properly while facing security threats and meeting national and international compliance standards. We achieve this by integrating Private Service Connect with Zero Trust protocol and IPSec VPN tunnelling methods. The research evaluates best security methods and shares practical examples to show working hybrid cloud implementation techniques. This research offers IT executives and cybersecurity teams practical guidelines to create a hybrid connectivity system that provides safe and fast service at scale for modern business security requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Hidayat, Sahrul, and Yuma Akbar. "IMPLEMENTASI FAILOVER VPN KANTOR PUSAT DAN CABANG MENGGUNAKAN TEKNOLOGI SDWAN DENGAN STRATEGI BEST QUALITY." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 3 (2023): 1598–608. http://dx.doi.org/10.35870/jimik.v4i3.386.

Full text
Abstract:
Head office and branch VPN networks are used to connect the head office with branches spread across geographically separated areas. However, network security and availability can be affected by various factors, such as internet connection failures, excessive bandwidth usage, and other disturbances. To overcome this, researchers provide a solution for implementing Failover VPN at the head office and branches using SDWAN technology. With SDWAN, companies can choose a connection path that is more reliable and has a higher speed, thereby optimizing bandwidth usage and improving network availability. In this study, researchers tried to simulate Headquarters and Branch Office VPN Failover Using SDWAN Technology with the Best Quality Strategy at PNETLab. This study uses 2 connections, namely internet connection and MPLS. MPLS is Primary and the internet as Backup. The test is carried out using three schemes, scheme 1 when in normal conditions, scheme 2 when the packet loss on the MPLS link increases then traffic is taken over by the internet connection, and scheme 3 when the packet loss on the MPLS link returns to normal.
APA, Harvard, Vancouver, ISO, and other styles
5

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Full text
Abstract:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from intercepting it. Without a VPN, all your internet traffic is potentially exposed to your internet service provider (ISP), the government, advertisers, or other people on your network. That’s why VPN connections boost your privacy and security online. VPN is virtual because it’s created digitally there isn’t a physical cable that reaches from your device directly to the VPN server.
APA, Harvard, Vancouver, ISO, and other styles
6

Domakonda, Dileep. "Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN." Eastasouth Journal of Information System and Computer Science 1, no. 02 (2023): 126–31. https://doi.org/10.58812/esiscs.v1i02.513.

Full text
Abstract:
This paper presents the design and deployment of a remote access VPN function in CloudStack, an open-source platform for virtualized cloud management. The Remote Access VPN offers secure connectivity for remote users to communicate with virtual machines (VMs) within guest networks. Users can safely connect to cloud-based systems from external networks by using a VPN that uses L2TP-over-IPsec as the underlying protocol. With certain routing mechanisms that guarantee that only guest network traffic is routed through the VPN, the feature supports both "Road Warrior" (dynamic IP clients) and "Site-to-Site" (pre-configured IP clients) VPN connections. In addition to discussing upcoming scalability and usability improvements, this paper covers the technical design, implementation, and testing strategies for the Remote Access VPN feature.
APA, Harvard, Vancouver, ISO, and other styles
7

Harsapranata, Agni Isador. "IMPLEMENTASI FAILOVER MENGGUNAKAN JARINGAN VPN DAN METRONET PADA ASTRIDOGROUP INDONESIA." CCIT Journal 8, no. 2 (2015): 66–77. http://dx.doi.org/10.33050/ccit.v8i2.321.

Full text
Abstract:
The purpose of this research is to build a network that connects the head office and branch offices Astridogroup Indonesia, with the hope of the entire performance can be improved connections to support business objectives. To meet these needs and the failures of communication technology that was used, in which the technology is to use a connection that can always be online in the hope of quality of service close to 100%. The technology used is to use two connection lines, the first is to use optical fiber Metronet, and the second VPN using wifi internet, so that if one connection dies , the another connection would be a backup, to set both the connection failover using mikrotik router.
APA, Harvard, Vancouver, ISO, and other styles
8

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Full text
Abstract:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden and external connections prohibited. The influence of a virtual private network (VPN) on a standard network's performance is studied by producing and assessing CBR, HTTP, and FTP payloads. The evaluation used throughput and time delay as performance measures after analysis of the finding, deep learning (DL) can predict attacks. Because that learns attack patterns during training to effectively forecast attacks. To detect attacks, deep learning-based attack prevention model was created This method uses Nave Bayes and FFNN to enhace network performance. The results show that VPNs affect packet latency and performance differently depending on the data type. The FFNN algorithm detects intrusions with 98% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
9

Alqahtany, Saad Said, and Toqeer Ali Syed. "Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework." Applied Sciences 14, no. 11 (2024): 4421. http://dx.doi.org/10.3390/app14114421.

Full text
Abstract:
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an innovative approach utilizing Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs) for classifying VPN traffic, aiding forensic investigators in precisely identifying applications or websites accessed via VPN connections. By leveraging the combined strengths of CNNs and GNNs, our method provides an effective solution for discerning user activities during VPN sessions. Further extending this framework, we incorporate blockchain technology to meticulously record all mobile VPN transactions, ensuring a tamper-proof and transparent ledger that significantly bolsters the integrity and admissibility of forensic evidence in legal scenarios. A specific use-case demonstrates this methodology in mobile forensics, where our integrated approach not only accurately classifies data traffic but also securely logs transactional details on the blockchain, offering an unprecedented level of detail and reliability in forensic investigations. Extensive real-world VPN dataset experiments validate our approach, highlighting its potential to achieve high accuracy and offering invaluable insights for both technological and legal domains in the context of mobile VPN usage.
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, Rashmi, Mrudula Nimbarte, and Sachin Jain. "Cloud Based Remote Service Provider for Village Empowerment." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, no. 01 SPL (2022): 20–24. http://dx.doi.org/10.18090/samriddhi.v14spli01.4.

Full text
Abstract:
Remote Service Provider (RSP) is a device which will provide intranet or networking facilities in remote or village area. With the use of Virtual Private Network (VPN) connections with the company’s distant node can be established, so that the work could be done right from the remote area or village area. Services based on cloud can also be used once network connection is established. The device) will act as a bridge between village or remote area and city making village or remote area socially powerful as city is.
APA, Harvard, Vancouver, ISO, and other styles
11

Zakaria, Mohd Idzaney, Mohd Natashah Norizan, Muammar Mohamad Isa, Mohd Faizal Jamlos, and Muslim Mustapa. "Comparative analysis on virtual private network in the internet of things gateways." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 488–97. https://doi.org/10.11591/ijeecs.v28.i1.pp488-497.

Full text
Abstract:
A virtual private network (VPN) connects a private network to the internet, primarily the public network, through a secure tunnel. Using a local area network (LAN) segment, users can send and receive data from their colleagues in different locations on the network. The development of VPN allows users to gain access to company applications and databases. Therefore, data can be transmitted through a secure tunnel without the need to configure port forwarding for the internet of things (IoT) gateway, allowing users to access it from any location in the world. A method such as dataplicity and pitunnel was examined to compare with the conventional setting. This research paper examines the current deployment of VPN connections in IoT gateways, discussing their characteristics, benefits, and drawbacks, as well as comparing them. The advantage of this method is that the IoT gateway is always accessible and has internet connectivity, which is a significant benefit. Dataplicity is a more trustworthy option because they offer excellent assistance for both the backend and frontend environments.
APA, Harvard, Vancouver, ISO, and other styles
12

C. Deepika. "Systematic Literature Review on VPN Security: Adaptive Multi-Tunnelling as a Mitigation Strategy." Journal of Information Systems Engineering and Management 10, no. 39s (2025): 760–77. https://doi.org/10.52783/jisem.v10i39s.7296.

Full text
Abstract:
In recent years, virtual private network provides a private and secure network architecture for individuals and organizations by using with the support from Internet. VPN helps in safe data transmissions without the need for dedicated physical connections, allowing to creation of a secure communicational channel between remote users, sites, and corporate offices. The proposed research focused on exploring a systematic literature review on VPN security concerning adaptive multi-tunnelling as a mitigation strategy. The systematic review adopted PRISMA framework to minimizing bias and ensuring the transparency of the survey. The survey used various databases such as Google Scholar, Research Gate, and Scopus were used to collect the research articles published from 2018 to 2025. The keywords used "corporate cybersecurity”, "adaptive security mechanisms,” "multi-tunneling VPN,” and “VPN security”.11 articles were included for final inclusion of the research. The major themes identified in the research are multi-tunnel architecture and deployment models, traffic splitting and load balancing mechanisms encryption and key management strategies and network adaptation and dynamic routing. The implementation of traditional VPN security was enhanced with adaptive multi-tunneling. The major issues associated with VPN, such as mitigation, scalability, and resilience, were addressed by the adaptive multi-tunneling technique. The adoption of adaptive multi-tunneling in VPN security gained a significant advantage in mitigating vulnerabilities and optimizing performance in mobile networks. Potency, latency, and computational overhead were considered major disadvantages in implementing adaptive multi-tunneling in VPN security.
APA, Harvard, Vancouver, ISO, and other styles
13

Afifi Al-Atsari, Hilmi, and Imam Suharjo. "Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi." Jurnal Syntax Admiration 4, no. 11 (2023): 1977–96. http://dx.doi.org/10.46799/jsa.v4i11.757.

Full text
Abstract:
In the ever-evolving digital era, integration of onpremise server infrastructure with cloud servers has become an important focus for many companies. The problem faced is regarding connections that use public IP addresses directly, which are often vulnerable to various security risks and cyber threats. Therefore, this research aims to identify and overcome the main problems that arise in this integration. With a better understanding of these challenges, developers and organizations can improve the security of their hybrid server infrastructure. The research methodology uses Mikrotik IPsec and VPN Tunnel IKEv2 on Google Cloud services. This approach is utilized to increase connection security between onpremise servers and cloud servers. First, the author configures Mikrotik IPsec on the onpremise server and sets up the IKEv2 VPN Tunnel on Google Cloud services. Next, the author carried out practical tests by sending data between the two infrastructures and monitoring the security and stability of the connection. With these steps, we can evaluate the effectiveness of security solutions implemented in a hybrid server environment. The research results show that this approach is successful in securing the connection between the two infrastructures, reducing potential risks such as sniffing, port scanning attacks, brute force, DDOS, and other cyber threats. Moreover, during practical trials, the connection remained stable and performed optimally, demonstrating the effectiveness of the proposed solution in improving the security of hybrid server infrastructure. These results can provide concrete evidence that using Mikrotik IPsec and VPN Tunnel IKEv2 on Google Cloud services can be an effective step in securing communications between onpremise servers and cloud servers. Thus, this research provides valuable guidance for developers and organizations looking to implement similar solutions.
APA, Harvard, Vancouver, ISO, and other styles
14

Gentile, Antonio Francesco, Peppino Fazio, and Giuseppe Miceli. "A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios." Telecom 2, no. 4 (2021): 430–45. http://dx.doi.org/10.3390/telecom2040025.

Full text
Abstract:
Nowadays, the demand for connection between the remote offices of a company, or between research locations, and constantly increasing work mobility (partly due to the current pandemic emergency) have grown hand in hand with the quality and speed of broadband connections. The logical consequence of this scenario is the increasingly widespread use of Virtual Private Network (VPN) connections. They allow one to securely connect the two ends of a connection via a dedicated network, typically using the Internet and reducing the costs of Content Delivery Network (CDN) lines (dedicated connections). At the same time, Virtual Local Area Networks (VLANs) are able to decrease the impact of some scalability issues of large networks. Given the background above, this paper is focused on overviewing and surveying the main progresses related to VPNs and VLANs in wireless networks, by collecting the most important contributions in this area and describing how they can be implemented. We state that security issues in VLANs can be effectively mitigated through the combination of good network-management practices, effective network design and the application of advanced security products. However, obviously, the implementation of VPNs and VLANs poses specific issues regarding information and network security; thus some good solutions are also surveyed.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhu, Ling Li, and Qing Tan. "Research on Remote Fault Diagnosis System with Design of the Mine Enterprise Equipment Based on VPN." Advanced Materials Research 1046 (October 2014): 331–34. http://dx.doi.org/10.4028/www.scientific.net/amr.1046.331.

Full text
Abstract:
Remote fault diagnosis in order to realize the mining enterprise equipment requirement, reduce the cost of fault diagnosis system based on VPN remote fault diagnosis system scheme is put forward. VPN technology to establish the enterprise network system, it is reasonable to implement remote connections between corporate headquarters to the mines. It can always track the running status of equipment working in the field of improving customer service response speed. Users can use it to avoid safe hidden trouble, as far as possible to shorten downtime, increase productivity. Field operation shows that our designed system can quickly diagnose the cause of the problem in time to provide a good reference.
APA, Harvard, Vancouver, ISO, and other styles
16

Zakaria, Mohd Idzaney, Mohd Natashah Norizan, Muammar Mohamad Isa, Mohd Faizal Jamlos, and Muslim Mustapa. "Comparative analysis on virtual private network in the internet of things gateways." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 488. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp488-497.

Full text
Abstract:
A virtual private network (VPN) connects a private network to the internet, primarily the public network, through a secure tunnel. Using a local area network (LAN) segment, users can send and receive data from their colleagues in different locations on the network. The development of VPN allows users to gain access to company applications and databases. Therefore, data can be transmitted through a secure tunnel without the need to configure port forwarding for the internet of things (IoT) gateway, allowing users to access it from any location in the world. A method such as dataplicity and pitunnel was examined to compare with the conventional setting. This research paper examines the current deployment of VPN connections in IoT gateways, discussing their characteristics, benefits, and drawbacks, as well as comparing them. The advantage of this method is that the IoT gateway is always accessible and has internet connectivity, w
APA, Harvard, Vancouver, ISO, and other styles
17

Zaenchkovski, Artur, and Alexey Lazarev. "Development of an intelligent decision-making system to support scientific and industrial formations VPN connections." E3S Web of Conferences 431 (2023): 05034. http://dx.doi.org/10.1051/e3sconf/202343105034.

Full text
Abstract:
The development of information systems to ensure the safe coordination of information flows in scientific and industrial clusters makes it possible to automate a number of tasks aimed at increasing the cooperative interaction productivity. The use of existing traffic encapsulation solutions or the new client-server algorithms development for network interaction affects the decision-making component for managing the TCP/IP structure, authorization of subjects, and support for correct load distribution. At the moment, most VPN servers do not have the specified functionality, which does not allow integrating solutions into existing scientific and industrial clusters. As the main solution, a flexible decision support system is proposed that takes into account all aspects of the virtual tunnel software component. The proposed solution is based on the use of complex methods for assessing the software modules state to make decisions on changing the operation of functional modules. The development result of the proposed system and the conducted functional testing made it possible to automate the operation of VPN tunnels when working with a complex network interaction structure.
APA, Harvard, Vancouver, ISO, and other styles
18

Tyshyk, Ivan. "CHOICE OF REMOTE ACCESS TECHNOLOGY FOR EFFECTIVE ORGANIZATION OF PROTECTION OF NETWORK CONNECTIONS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 34–45. http://dx.doi.org/10.28925/2663-4023.2023.19.3445.

Full text
Abstract:
Modern methods and means of building a service of virtual private networks are considered, the ways of their realization with the help of hardware and software on the example of a private virtual network based on CISCO FlexVPN are analyzed. To implement this task, the key exchange protocol was used to ensure the security of interaction in IKEv2 virtual networks. It is noteworthy that FlexVPN in IOS by default requires minimal action from the system administrator to quickly configure the VPN. The so-called smart-defaults are intended for this (standard ikev2 proposal / policy / profile, ipsec profile and others are configured in advance). In such a configuration, the following are configured by default: IKEv2 proposal, IKEv2 policy, IPSec transform-set, and IPSec profile. Moreover, they are configured so that the most serious algorithms have the highest priority, which, as a rule, suits the system administrator. Naturally, the greatest predictability of VPN operation will be provided by manual setting of all parameters. In view of the above, it can be stated that the FlexVPN technology is the most progressive for building VPN channels, as it has a wide scale, flexibility, does not impose any restrictions on the configuration, and also has a set of default commands called Smart-defaults, which can greatly facilitate the task regarding the configuration of the relevant communication equipment at certain stages. The main feature of this technology is the combination of two main types of construction of virtual private networks: Site-to-site and Client-to-site. The model, which is created on the basis of the GNS3 software, allows you to consider in more detail the main steps and the general principle of settings on the devices of the network being created. In general, the relevance of the technology used in the context of rapidly growing competition on the market and the need to provide remote users with secure access to remote corporate resources is demonstrated. As a result of the simulation, a virtual private network was created for the corporation, which provides both secure communication channels between departments, as well as organized remote access for employees using Cisco AnyConnect technology.
APA, Harvard, Vancouver, ISO, and other styles
19

Minaev, Osman M., and Kheda Y. Aliyeva. "THE ORGANIZATIONAL STRUCTURE OF THE TECHNICAL PROTECTION OF CORPORATE INFORMATION AT THE NETWORK LEVEL USING VPN TECHNOLOGY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 10/12, no. 151 (2024): 58–68. https://doi.org/10.36871/ek.up.p.r.2024.10.12.007.

Full text
Abstract:
Recently, it has become widespread among small and medium-sized compa-nies to connect employees to the company's internal network remotely through publicly available resources. In this case, the issue of information protection has become acute, since a certain proportion of information can circulate over an unsecured network. Currently, VPN technology is widely used, which has many options for implementing networks for various purposes of use. Among the variety of implementations, the construction of a VPN network based on Cisco equip-ment was chosen as the object of this study. This approach was chosen due to the prevalence and availability of equipment, as well as the availability of a simulator for network design, con-figuration and testing. The organizational structure was described, within which employees can work both inside and outside the corporate network. At the same time, it is assumed that each of the employees should have equal opportunities to securely connect to servers and work with data related to the organization's activities. Accordingly, for those employees who work remotely, the issue of information security is particularly acute. Therefore, the authors propose a network model that consists of three zones: the main office, the workplace of a remote employee and a segment with servers located in the demilitarized zone (DMZ). The demilitarized zone provides an additional level of local network security, which minimizes damage in the event of an attack on one of the public services: an external attacker has direct access only to equipment in the demil-itarized zone. VPN technology will be used as a means of protecting the connection of employees to the servers with the organization's data. To combine all segments into one network, a Cisco 2811 router has been selected, which is used to meet the needs of small organizations (up to 36 workplaces). The practical implementation of VPN technology settings in the presented distrib-uted network of the organization has been carried out. The computer network is modeled in the Cisco Packet Tracer environment. As a result of the tasks set, security policies based on the use of Cisco VPN technology were implemented on the network. This tool allows you to organize a secure VPN channel for connections within the organization's network, which, in turn, allows a remote employee to access the organization's servers and data. The results of this work can be used by companies or individual users who plan to integrate a VPN architecture based on Cisco hardware into their network infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
20

Anuntachai Machim, Murray John Lawn, and Ikuo Yamamoto. "Robotic Control by Teleoperation and Delay Time Issues Using the Internet." Proceedings of Engineering and Technology Innovation 14 (January 1, 2020): 01–08. http://dx.doi.org/10.46604/peti.2020.3931.

Full text
Abstract:
Internet usage has become an essential part of our daily lives, it has become universal. The aim of this research is to consider existing Internet-based networks with regard to their support for the remote operation of robotic technology, in particular, looking at transmission speed and delay time as it relates to teleoperation. Currently dedicated connections are typically used when a high Quality of Service (QoS) is required for mission critical services or safety-critical systems (SCS), however such connections are very expensive to set up and maintain. Therefore, this study focuses on modifying existing internet networks in a manner to provide a better QoS with little additional cost. Using a number of microcontrollers, computers, and routers, two different protocols were used to control a robotic device remotely. Use of the Point-to-Point Tunnelling Protocol (PPTP) used for implementing a Virtual Private Network (VPN) was found to provide higher average transmission speeds compared to the using a Uniform Resource Locator (URL) which is a regular internet connection.
APA, Harvard, Vancouver, ISO, and other styles
21

HASANI, Anri, and Malvina NIKLEKAJ. "Security of VPNs in High-Surveillance Environments - A Comparative Study of VPN Alternatives." INGENIOUS 5, no. 1 (2025): 108–16. https://doi.org/10.58944/cwql3216.

Full text
Abstract:
Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. They are widely used for protecting online privacy, circumventing censorship, and enabling secure remote access to networks. However, despite their increasing adoption, VPNs face significant security vulnerabilities, misconfigurations, and performance-related challenges, particularly in high-surveillance environments. The growing sophistication of surveillance technologies, such as deep packet inspection (DPI) and metadata analysis has made it increasingly difficult for VPNs to provide true anonymity and confidentiality. This paper provides a comprehensive analysis of VPN security, examining traditional protocols such as IPSec and SSL/TLS, alongside newer alternatives like WireGuard and QUIC. While traditional VPNs offer robust encryption and authentication mechanisms, they are often susceptible to traffic fingerprinting and blocking by state-controlled ISPs or corporate firewalls. More modern VPN protocols, such as WireGuard, aim to address some of these issues by providing faster performance and improved cryptographic security, yet they too remain vulnerable to sophisticated detection techniques. Additionally, this study presents a comparative assessment of VPN alternatives, including OpenSSH tunneling and Radmin VPN, evaluating their security, performance, and practical usability. OpenSSH tunneling, for instance, leverages SSH protocols to create encrypted tunnels that are more difficult to detect compared to conventional VPNs. Radmin VPN, a peer-to-peer VPN solution, provides encrypted network connections without requiring a centralized VPN provider, making it an attractive option for users seeking an alternative networking solution. However, these approaches come with their own set of limitations, including usability challenges and reliance on specific network configurations. Our experimental analysis evaluates the effectiveness of these alternatives in mitigating surveillance threats and their resilience against DPI and traffic fingerprinting technologies. The findings emphasize the need for robust and adaptive tunneling solutions to enhance privacy and security in modern networks, ensuring reliable protection against sophisticated surveillance mechanisms. This research underscores the importance of combining multiple privacy-enhancing technologies and adapting networking strategies based on the evolving landscape of digital surveillance.
APA, Harvard, Vancouver, ISO, and other styles
22

Onyshchuk, Oksana. "CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 294–303. https://doi.org/10.28925/2663-4023.2025.27.727.

Full text
Abstract:
With the development of the Internet of Things (IoT), the issue of data protection and the secure operation of IoT systems has become increasingly important. One of the major threats is unprotected MQTT connections, which are vulnerable to traffic interception (MitM attacks), command spoofing, unauthorized access, and DDoS attacks.This paper explores MQTT security methods using the example of an automated gate control system. It presents an analysis of recent research in IoT cybersecurity, identifies the main vulnerabilities of MQTT brokers and clients, and proposes measures to secure IoT infrastructure.Special attention is given to TLS/SSL encryption for traffic protection, MQTT client authentication, access restrictions using ACL (Access Control List), and the isolation of IoT devices in separate networks (VPN/VLAN).The research findings confirm that a comprehensive implementation of security measures significantly reduces attack risks and ensures the reliable and secure operation of IoT projects.
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Wei, and Chang Shi Li. "Software Implementation of Kompella-Based L2VPN." Applied Mechanics and Materials 511-512 (February 2014): 1230–34. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1230.

Full text
Abstract:
MPLS L2VPN is used to transparently pass users’ L2 data through MPLS network, with the common implementation model of Martini L2VPN by using LDP as the signaling. In spite of its wide application, the configuration of its capacity expansion is cumbersome and the cross-domain problem is insolvable. Therefore, based on the label swapping technology of MPLS, this paper adopts kompella-based approach for L2VPN implementation and mainly focuses on packet forwarding and controlling. Firstly, it does not make direct CE connections, but partitions different VPN in the whole SP (Service Provider) and gives serial numbers of CE within the VPN. Moreover, it also establishes the VC (virtual circuit) channel between the two PE and uses label distribution and calculation for mutual information. In this respect, it can not only provide effective supports for capacity expansion, but also solves the cross-domain problem.
APA, Harvard, Vancouver, ISO, and other styles
24

Reva, Ivan L., Igor A. Ognev, Alexandr A. Yakimenko, and Olga K. Alsova. "Technologies and methods for creating systems of secure information exchange." Digital technology security, no. 3 (September 29, 2022): 81–97. http://dx.doi.org/10.17212/2782-2230-2022-3-81-97.

Full text
Abstract:
This article presents a description of existing technologies and methods for creating secure information exchange systems. To date, secure information exchange systems are built in accordance with two technologies – VPN technology and cryptographic protocols SSL and TSL, as well as in accordance with combinations of these technologies. The necessity of creating network security systems is considered. The rapid development of network technologies leads to an equally rapid increase in information security risks for companies in both the public and private sectors. The requirements of the legislation of the Russian Federation in the field of ensuring the security of networks are presented. The principles of network security design are described. The analysis of existing projects and implementations of network security was carried out. A description of the existing and methods for constructing secure information exchange systems is given. The technologies for building secure information exchange systems based on VPN technology, as well as the algorithms for building VPN connections – PPTP, IPSec, L2TP, SSTP, OpenVPN, GOST VPN are considered. The most common technical and software information security tools that use VPN to build a secure information exchange are described – the products of the companies InfoTeKS, Security Code, S-Terra. The technology of constructing secure information exchange systems based on SSL and TLS cryptographic protocols is considered. This article identifies the most common problems in building secure information exchange systems – the presence of a large number of manufacturers of information security tools with their own ecosystem, as well as high labor, financial and time costs for ensuring the information exchange of systems of different levels of security, the security of which built on solutions from different vendors.
APA, Harvard, Vancouver, ISO, and other styles
25

Talib, Hasanien Ali, Raya Basil Alothman, and Mazin S. Mohammed. "Malicious attacks modelling: a prevention approach for ad hoc network security." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (2023): 1856. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.

Full text
Abstract:
As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artificial intelligence attack predictors and virtual private networks have been implemented with the purpose of preventing harmful activity within such connections. Using a wide variety of machine learning methods like Random Forests and Nave Bays, malicious assaults of any kind can be identified and thwarted in their tracks. Another technique for anticipating attacks is the use of an artificial neural network, which is a type of system that engages in deep learning and learns the behaviors of attacks while it is being trained so that it can then predict attacks. The results of this study demonstrate that the use of machine learning and artificial intelligence techniques can significantly improve the security and performance of virtual private networks and can effectively identify and prevent malicious attacks on networks.
APA, Harvard, Vancouver, ISO, and other styles
26

Hasanien, Ali Talib, Basil Alothman Raya, and S. Mohammed Mazin. "Malicious attacks modelling: a prevention approach for ad hoc network security." Malicious attacks modelling: a prevention approach for ad hoc network security 30, no. 3 (2023): 1856–65. https://doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.

Full text
Abstract:
As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artificial intelligence attack predictors and virtual private networks have been implemented with the purpose of preventing harmful activity within such connections. Using a wide variety of machine learning methods like Random Forests and Nave Bays, malicious assaults of any kind can be identified and thwarted in their tracks. Another technique for anticipating attacks is the use of an artificial neural network, which is a type of system that engages in deep learning and learns the behaviors of attacks while it is being trained so that it can then predict attacks. The results of this study demonstrate that the use of machine learning and artificial intelligence techniques can significantly improve the security and performance of virtual private networks and can effectively identify and prevent malicious attacks on networks.
APA, Harvard, Vancouver, ISO, and other styles
27

Damanik, Hillman Akhyar. "Securing Data Network For Growing Business VPN architectures Cellular Network Connectivity." RSF Conference Series: Engineering and Technology 1, no. 2 (2021): 14–20. http://dx.doi.org/10.31098/cset.v1i2.470.

Full text
Abstract:
Private networks allow organizations to leverage, customize and dedicate LTE network capabilities to their own service needs. These networks are controlled and managed locally and can be optimized for specific network services and applications. Often they are used because there may be gaps in coverage where there is no cellular connectivity. Enterprises and businesses running on light application systems, using small bandwidth and requiring fast deployment such as ATMs, vending machines, digital signage kiosks and small store branches We propose a method and concept and implementation, in the form of a Data Network Security Configuration For Business Growth VPN architecture Mobile Network Connectivity for various businesses. By implementing products and services by developing the configuration and model of VPN Tunneling Protocol rules, using the EOIP Protocol and SSTP Protocol methods and virtualization schemes using the VLAN Bridging method on Wide Area Network (WAN) network connectivity. This method takes advantage of the LTE features found on the RB751U-2hnd and then integrates Huawei Mobile Broadband LTE. We also present a general Service Level Agreement (SLA) and an open source tools-based SLA network system Zabbix. Then configure the VPN Tunneling Protocol and its features on the RB751U-2hnd using Paramiko Network Automation. The focus of the results of this research is that by utilizing the available tools we will build a VPN with system monitoring facilities with the results achieved are network performance and availability and show that the design we build can be used for private connections for growing businesses. the results obtained from testing for 1 month for the 3 providers used, for the average throughput value with VPN tunneling applied TSEL 14.2 Mbps, ISAT 13.9 Mbps and XL 13.5 Mbps. The SLA value obtained is based on acceptable criteria, TSEL 91.5%, ISAT 91.8% and XL 90.6%.
APA, Harvard, Vancouver, ISO, and other styles
28

Damanik, Hillman Akhyar. "SECURING DATA NETWORK FOR GROWING BUSINESS VPN ARCHITECTURES CELLULAR NETWORK CONNECTIVITY." Acta Informatica Malaysia 6, no. 1 (2022): 01–06. http://dx.doi.org/10.26480/aim.01.2022.01.06.

Full text
Abstract:
Private networks allow organizations to leverage, customize and dedicate LTE network capabilities to their own service needs. These networks are controlled and managed locally and can be optimized for specific network services and applications. Often they are used because there may be gaps in coverage where there is no cellular connectivity. Enterprises and businesses running on light application systems, using small bandwidth and requiring fast deployment such as ATMs, vending machines, digital signage kiosks and small store branches We propose a method and concept and implementation, in the form of a Data Network Security Configuration For Business Growth VPN architecture Mobile Network Connectivity for various businesses. By implementing products and services by developing the configuration and model of VPN Tunneling Protocol rules, using the EOIP Protocol and SSTP Protocol methods and virtualization schemes using the VLAN Bridging method on Wide Area Network (WAN) network connectivity. This method takes advantage of the LTE features found on the RB751U-2hnd and then integrates Huawei Mobile Broadband LTE. We also present a general Service Level Agreement (SLA) and an open source tools-based SLA network system Zabbix. Then configure the VPN Tunneling Protocol and its features on the RB751U-2hnd using Paramiko Network Automation. The focus of the results of this research is that by utilizing the available tools we will build a VPN with system monitoring facilities with the results achieved are network performance and availability and show that the design we build can be used for private connections for growing businesses. the results obtained from testing for 1 month for the 3 providers used, for the average throughput value with VPN tunneling applied TSEL 14.2 Mbps, ISAT 13.9 Mbps and XL 13.5 Mbps. The SLA value obtained is based on acceptable criteria, TSEL 91.5%, ISAT 91.8% and XL 90.6%.
APA, Harvard, Vancouver, ISO, and other styles
29

Tovar, Benjamin, Brian Bockelman, Michael Hildreth, Kevin Lannon, and Douglas Thain. "Harnessing HPC resources for CMS jobs using a Virtual Private Network." EPJ Web of Conferences 251 (2021): 02032. http://dx.doi.org/10.1051/epjconf/202125102032.

Full text
Abstract:
The processing needs for the High Luminosity (HL) upgrade for the LHC require the CMS collaboration to harness the computational power available on non-CMS resources, such as High-Performance Computing centers (HPCs). These sites often limit the external network connectivity of their computational nodes. In this paper we describe a strategy in which all network connections of CMS jobs inside a facility are routed to a single point of external network connectivity using a Virtual Private Network (VPN) server by creating virtual network interfaces in the computational nodes. We show that when the computational nodes and the host running the VPN server have the namespaces capability enabled, the setup can run entirely on user space with no other root permissions required. The VPN server host may be a privileged node inside the facility configured for outside network access, or an external service that the nodes are allowed to contact. When namespaces are not enabled at the client side, then the setup falls back to using a SOCKS server instead of virtual network interfaces. We demonstrate the strategy by executing CMS Monte Carlo production requests on opportunistic non-CMS resources at the University of Notre Dame. For these jobs, cvmfs support is tested via fusermount (cvmfsexec), and the native fuse module.
APA, Harvard, Vancouver, ISO, and other styles
30

Masroni, Masroni, Atit Pertiwi, and Amat Suroso. "MERANCANG DAN IMPLEMENTASI VPN PPTP UNTUK KONEKSI CLIENT SERVER APLIKASI KEUANGAN IFAS (Studi Kasus Pada Yayasan Teratai Putih Global)." Jurnal Informatika: Jurnal Pengembangan IT 6, no. 3 (2021): 168–74. http://dx.doi.org/10.30591/jpit.v6i3.2786.

Full text
Abstract:
The Teratai Putih Global Foundation is an institution engaged in the field of education which has 9 (nine) school units from Islamic preschool, Islamic Elementary School, Islamic Junior High School, Islamic High School and Vocational Schools spread across Bekasi and Jakarta. The data collection process is mainly related to the administrative and financial processes of students and the recording of school financial cash flows. The foundation and the nine units have school administration system software IFAS (Integrated Finance and Accounting System) in their respective school units, this condition makes it difficult for the foundation to consolidate data and daily reports in real time because they are not connected to each other. VPN (Virtual Private Network) technology allows anyone to be able to access the local network from outside using the internet. The purpose of using a VPN is so that users can access the resources on the server, connect to the database server in real time and get the same rights and settings as physically in the place where the local network is located. With the NDLC (Network Development Life Cycle) method, a method for designing and building networks, VPN connections are designed for a client-server topology and successfully implemented for the IFAS program to run well and smoothly.
APA, Harvard, Vancouver, ISO, and other styles
31

Hafid, Afdhil, Harun Mukhtar, and Dani Harlian. "PENERAPAN FAILOVER NETWORK MENGGUNAKAN JARINGAN VPN DAN JARINGAN WIRELESS POINT-TO-POINT PADA DISTANCE BUILDING DI PT. TITIPAN KILAT RIAU." JTT (Jurnal Teknologi Terapan) 9, no. 1 (2023): 35. http://dx.doi.org/10.31884/jtt.v9i1.467.

Full text
Abstract:
This research is intended to build a network that that can connect branch offices with main office buildings in a company. This is done in order to create all performance connected to a company network that can improve and run well, so as to be able to support the company's business processes. At the stage of meeting company needs and in an effort to overcome problems in the network used technology that can always be online with the expectation of quality of services (QoS) approaching 100%.. The technology applied uses two communication lines, the first connection line is point-to-point wireless and the second connection line applies a Virtual Private Network (VPN) with the use of the internet. Handles failover on both network communication connections used by the mikrotik router. This allows if one connection is lost, the other connection line will automatically become a backup line. In this failed network simulation, it shows satisfactory results, as can be seen from the communication performance that runs without feeling tired of traffic. The application of this method can also operate without involving humans. In addition, the results of the measurement of the time lag required for switching connection lines have an average delay value of not more than 4.97 seconds.
APA, Harvard, Vancouver, ISO, and other styles
32

Kozlovskis, Dāvis. "A COMPARATIVE STUDY OF THE SPEED AND SECURITY OF INTERNET BROWSERS: GOOGLE CHROME, MOZILLA FIREFOX, MICROSOFT EDGE, BRAVE AND OPERA." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 28 (September 10, 2024): 59–63. http://dx.doi.org/10.17770/het2024.28.8260.

Full text
Abstract:
This study investigates the speed and security of five internet browsers: Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, and Opera. Evaluating startup time, search speed, webpage loading, and security features including VPN and AdBlocker, it identifies variations in data collection and privacy practices. Notably, Opera demonstrates the highest security with minimal third-party connections. However, concerns arise with Microsoft Edge's data aggregation practices. This research underscores the importance of considering both speed and security when selecting a browser, contributing to informed decision-making in internet usage.
APA, Harvard, Vancouver, ISO, and other styles
33

Dr.Vipul, sharma, Shruti Singh Ms., and Lokesh Sharma Mr. "Evaluated Performance of Protocols." Journal of Optical Communication Electronics 4, no. 3 (2018): 1–4. https://doi.org/10.5281/zenodo.1465590.

Full text
Abstract:
<em>Maximum organizations attempt to set up their improvement facilities and department workplaces the world over. Personnel running from their houses also are turning into very popular and companies advantage financially by way of making use of less office area, and decreasing total expenses incurred by way of having office employees on website online. To satisfy such necessities agencies broaden a need to speak with these offices over surprisingly cozy, personal and dependable connections regardless of the area of the workplace. The VPN performs a vital function in setting up an allotted business model.</em>
APA, Harvard, Vancouver, ISO, and other styles
34

Wu, Nancy, Anne-Sophie Brazeau, Meranda Nakhla, et al. "Type 1 Diabetes Mellitus Virtual Patient Network as a Peer Support Community: Protocol for Social Network Analysis and Content Analysis." JMIR Research Protocols 9, no. 8 (2020): e18714. http://dx.doi.org/10.2196/18714.

Full text
Abstract:
Background Type 1 Diabetes Mellitus Virtual Patient Network (T1DM-VPN) is a private Facebook group for youths with type 1 diabetes mellitus (T1DM) in Canada intended to facilitate peer-to-peer support. It was built on the finding that stigma is prevalent among youth with T1DM and impedes self-management. Objective We aim to determine if T1DM-VPN provides support as intended and to ascertain what type of members provide support. Specifically, we will (1) identify text consistent with any one of 5 social support categories, (2) describe the network by visualizing its structure and reporting basic engagement statistics, and (3) determine whether being a designated peer leader is related to a member’s centrality (ie, importance in the network) and how frequently they offer social support. Methods We will manually extract interaction data from the Facebook group (posts, comments, likes/reactions, seen) generated from June 21, 2017 (addition of first member), to March 1, 2020. Two researchers will independently code posts and comments according to an existing framework of 5 social support categories—informational, emotional, esteem, network, and tangible—with an additional framework for nonsocial support categories. We will calculate how frequently each code is used. We will also report basic engagement statistics (eg, number of posts made per person-month) and generate a visualization of the network. We will identify stable time intervals in the history of T1DM-VPN by modeling monthly membership growth as a Poisson process. Within each interval, each member’s centrality will be calculated and standardized to that of the most central member. We will use a centrality formula that considers both breadth and depth of connections (centrality = 0.8 × total No. of connections + 0.2 × total No. of interactions). Finally, we will construct multivariate linear regression models to assess whether peer leader status predicts member centrality and the frequency of offering social support. Other variables considered for inclusion in the models are gender and age at diagnosis. Results T1DM-VPN was launched in June 2017. As of March 1, 2020, it has 196 patient-members. This research protocol received ethics approval from the McGill University Health Centre Research Ethics Board on May 20, 2020. Baseline information about each group member was collected upon addition into the group, and collection of interaction data is ongoing as of May 2020. Conclusions This content analysis and social network analysis study of a virtual patient network applies epidemiological methods to account for dynamic growth and activity. The results will allow for an understanding of the topics of importance to youth with T1DM and how a virtual patient network evolves over time. This work is intended to serve as a foundation for future action to help youth improve their experience of living with diabetes. International Registered Report Identifier (IRRID) PRR1-10.2196/18714
APA, Harvard, Vancouver, ISO, and other styles
35

Arfind, Reza, Hendra Supendar, and Riza Fahlapi. "Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik." Jurnal Komputer Antartika 1, no. 3 (2023): 108–16. https://doi.org/10.70052/jka.v1i3.28.

Full text
Abstract:
Perkembangan usaha tekstil sudah semakin meluas, sehingga dalam menopang efektifitas dalam pelaksanaannya membutuhkan koneksi agar saling terhubung antar satu tempat dengan cabang perusahaan lainnya, namun dalam pelaksanaannya perusahaan perlu adanya jaringan yang lebih cepat dan aman untuk saling bertukar data, untuk terciptanya jaringan yang cepat dan aman maka diusulan perancangan Virtual Private Network (VPN) dengan Metode Point to Point Tunnel Protocol (PPTP) menggunakan Mikrotik. Adapun alat yang digunakan yaitu Mikrotik CHR. Dalam pengaplikasiannya Mikrotik CHR akan di jadikan server yang menghubungkan antara kantor pusat dengan cabang dimana Mikrotik yang ada di kantor pusat dan kantor cabang akan terhubung dengan IP address yang di distribusikan oleh Mikrotik CHR sehingga jaringan tersebut akan terhubung seperti jaringan lokal. Hasil akhir dari konfigurasi ini, terbentuknya jaringan VPN menggunakan metode PPTP pengujian akhir ditutup dengan di lakukannya uji coba PING dari komputer client ke Mikrotik CHR menghasilkan kecepatan sangat stabil yang terlihat dari waktu respon server dengan komputer. The development of the textile business has become increasingly widespread, so that in supporting effectiveness in its implementation it requires connections so that they are connected to each other between one place and other company branches, but in practice the company needs a faster and safer network to exchange data, to create a fast and secure network then it is proposed to design a Virtual Private Network (VPN) with the Point to Point Tunnel Protocol (PPTP) method using Mikrotik. The tool used is Mikrotik CHR. In its application, Mikrotik CHR will be used as a server that connects the central office with branches where the Mikrotik at the head office and branch offices will be connected to the IP addresses distributed by Mikrotik CHR so that the network will be connected like a local network. The end result of this configuration, the formation of a VPN network using the PPTP method, the final test was closed by carrying out a PING test from the client computer to Mikrotik CHR resulting in a very stable speed as seen from the server's response time with the computer.
APA, Harvard, Vancouver, ISO, and other styles
36

Hadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.

Full text
Abstract:
Abstract: This paper focuses on the implementation of a site-to-site IPsec tunnel to establish a secure connected link over a public network between two sites. To do so, an IP addressing plan was created and a topology was drawn to replicate a local area network between different sites, i.e., LIBYA and TUNIS. After this, an IP tunnel was set up, secure communication was established in the replicating LAN, and all packets were transferred over an encrypted form between the two different sites correctly. The area of this study lies in the domains of network security and VPN. When discussing the technicalities, for this research, we will establish an IP tunneling over an encryption layer. For this task, we will implement the Internet Protocol Security (IPsec) suite to authenticate and encrypt the traffic before encapsulating the actual payloads for the connected link on the OSI model Layer 3. After setting the required authentication and encryption methods over the connections, a secure link can be established to share the data neighborly in a public environment. A secure VPN site-to-site link will provide high-quality dedicated bandwidth WAN links to the users, which are considered significant for the network architecture of internetworking. As a result, secure communication features utilizing VPN site-to-site IPsec encryption play a vital role in disaster recovery between the different sites or the replication of services and data for business operations and communications. This paper recommends that it is essential for a growing organization to make their respective communication secure and implement alternative ways to manage, maintain, and control the secure communication environments.
APA, Harvard, Vancouver, ISO, and other styles
37

Ahmad, Abdul Halim. "CHALLENGES AND EFFECTIVENESS OF USING CISCO PACKET TRACER SIMULATOR IN LEARNING VPN CONNECTION (VIRTUAL PRIVATE NETWORK)." International Journal of Modern Education 4, no. 14 (2022): 21–30. http://dx.doi.org/10.35631/ijmoe.414003.

Full text
Abstract:
The simulation method is the use of computer applications that contain processes or models similar to real physical ones for learning purposes or other uses. The effectiveness of learning using simulation techniques does not only depend on the development of the simulation design, but must also understand how the simulation can be implemented. The study conducted is descriptive in order to identify the challenges and effectiveness of using the Cisco Packet Tracer simulator in learning VPN (Virtual Private Network) connections. The sample for this study consisted of 30 students who took a network security course at Kuala Terengganu Polytechnic. The instrument for this study consists of 2 sets of questions. The first set is a questionnaire used to identify the challenges of using the Cisco Packet Tracer simulator and the second is a practical test question to evaluate the effectiveness of using the Cisco Packet Tracer simulator. An experimental group that went through learning using Cisco Packet Tracer and a control group that went through conventional learning was formed to evaluate the effectiveness of using the Cisco Packet Tracer simulator. Data analysis was done using the Statistical Package for Social Sciences (SPSS) software version 27.0. The findings of the study show that there are three main challenges faced by students in the use of Cisco Packet Tracer. First, from a concentration point of view because written instructions need to be remembered and understood. Second, the use of Cisco Packet Tracer requires high skills in simulating a complex network and third, if there is a mistake in designing the network, it will cause errors that are difficult to find and this will have an impact on student learning. The results of the study also found that there was an increase in the academic achievement of students after they followed the learning method using the Cisco Packet Tracer simulator. Continuous improvement needs to be implemented in order to help students overcome the challenges faced when using Cisco Packet Tracer and its use in learning is expected to produce competent students in the field of networking.
APA, Harvard, Vancouver, ISO, and other styles
38

Simion, Georgian, Adrian Filipescu, Dan Ionescu, and Adriana Filipescu. "Cloud/VPN-Based Remote Control of a Modular Production System Assisted by a Mobile Cyber–Physical Robotic System—Digital Twin Approach." Sensors 25, no. 2 (2025): 591. https://doi.org/10.3390/s25020591.

Full text
Abstract:
This paper deals with a “digital twin” (DT) approach for processing, reprocessing, and scrapping (P/R/S) technology running on a modular production system (MPS) assisted by a mobile cyber–physical robotic system (MCPRS). The main hardware architecture consists of four line-shaped workstations (WSs), a wheeled mobile robot (WMR) equipped with a robotic manipulator (RM) and a mobile visual servoing system (MVSS) mounted on the end effector. The system architecture integrates a hierarchical control system where each of the four WSs, in the MPS, is controlled by a Programable Logic Controller (PLC), all connected via Profibus DP to a central PLC. In addition to the connection via Profibus of the four PLCs, related to the WSs, to the main PLC, there are also the connections of other devices to the local networks, LAN Profinet and LAN Ethernet. There are the connections to the Internet, Cloud and Virtual Private Network (VPN) via WAN Ethernet by open platform communication unified architecture (OPC-UA). The overall system follows a DT approach that enables task planning through augmented reality (AR) and uses virtual reality (VR) for visualization through Synchronized Hybrid Petri Net (SHPN) simulation. Timed Petri Nets (TPNs) are used to control the processes within the MPS’s workstations. Continuous Petri Nets (CPNs) handle the movement of the MCPRS. Task planning in AR enables users to interact with the system in real time using AR technology to visualize and plan tasks. SHPN in VR is a combination of TPNs and CPNs used in the virtual representation of the system to synchronize tasks between the MPS and MCPRS. The workpiece (WP) visits stations successively as it is moved along the line for processing. If the processed WP does not pass the quality test, it is taken from the last WS and is transported, by MCPRS, to the first WS where it will be considered for reprocessing or scrapping.
APA, Harvard, Vancouver, ISO, and other styles
39

Claudia, Michelle, and Muhammad Rifqi. "Analisa Perbandingan Performansi Hot Standby Router Protocol (HSRP) dengan Gateway Load Balancing Protocol (GLBP) Pada Router Spoke DMVPN." JURNAL MEDIA INFORMATIKA BUDIDARMA 5, no. 2 (2021): 504. http://dx.doi.org/10.30865/mib.v5i2.2846.

Full text
Abstract:
The use of internet connections to develop Virtual Private Network (VPN) lines in companies has been massively applied. An example is the use of Dynamic Multipoint VPN (DMVPN) technology from Cisco, which can connect Spoke or branch offices through HUB or data centers. Besides requiring a secure network, companies also need high network availability. One of them is by using the redundancy method in order to minimize downtime when device damage occurs. In this research, the spoke router will apply two redundancy methods by Cisco, which are Hot Standby Router Protocol (HSRP) and Gateway Load Balancing (GLBP). This research aims to compare the QoS performances and downtime between the two protocols in order to discover the suitable method for DMVPN networks at branch offices. The test scenario is conducted on the GNS-3 simulator using the File Trasnfer Protocol (FTP) service. The obtained test result shows that the HSRP throughput value is smaller from the GLBP with a difference of 0.20%, the increase in the average delay of the HSRP is smaller from the GLBP with a difference of 1.07%. The HSRP data transfer time is faster than GLBP with a difference of 1.49%, and HSRP downtime is 4.13% faster than GLBP. The conclusion is that a suitable redundancy solution for spoke router using the HSRP method
APA, Harvard, Vancouver, ISO, and other styles
40

Affan, Usman Ibnu, Khairan Marzuki, and Lalu Zazuli Azhar Mardedi. "Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency." International Journal of Engineering and Computer Science Applications (IJECSA) 1, no. 2 (2022): 65–76. http://dx.doi.org/10.30812/ijecsa.v1i2.2379.

Full text
Abstract:
VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
APA, Harvard, Vancouver, ISO, and other styles
41

Hariyadi, I. Putu. "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge Tunnel EoIP over SSTP." Jurnal Matrik 16, no. 2 (2017): 86. http://dx.doi.org/10.30812/matrik.v16i2.8.

Full text
Abstract:
STMIK Bumigora is the first computer college in the province of West Nusa Tenggara (NTB). There are 11 hotspots spread across the campus to provide Internet services through a wireless connection for the academic community. The increasing number of hotspots that must be managed with locations scattered in various Mikrotik routers hence make the process of management and monitoring hotspots become complex, ineffective and efficient. Centralized campus hotspot management using a transparent bridge EoIP over SSTP can help solve the problems at hand. Ethernet over IP (EoIP) Tunneling is a Mikrotik RouterOS protocol that creates an Ethernet tunnel between routers over IP connections. EoIP tunnel built on SSTP tunnel (EoIP over SSTP) with Site-to-Site type. SSTP is a new form of Virtual Private Network (VPN) tunnel that provides a mechanism for encapsulating Point-to-Point Protocol (PPP) traffic through the SSL path of the HTTPS protocol. The IP address of the SSTP interface is used as the local reference and remote address of the EoIP over SSTP tunnel. The application of bridging on EoIP interfaces and interfaces connected to Access Point devices forms a logical network so that the management and monitoring of hotspot services can be performed centrally on one router.
APA, Harvard, Vancouver, ISO, and other styles
42

Agustyaningrum, Cucu Ika, Haryani Haryani, Choirunisa Iqbar Qurotaaini, Artika Surniandari, and Dedi Saputra. "Queue System Implementation at PT. Mulia Persada Indonesia Call Center Services." Paradigma - Jurnal Komputer dan Informatika 25, no. 2 (2023): 103–9. http://dx.doi.org/10.31294/p.v25i2.2310.

Full text
Abstract:
In this modern era, call centers have become an important element in providing efficient and responsive customer service. One of the main challenges faced by call centers is how to efficiently manage customer call queues. This study aims to implement a queuing system at PT Mulia Persada Indonesia's call center service by utilizing a computer network, with the aim of increasing the efficiency and effectiveness of customer service. This research also includes an analysis of network security using a Virtual Private Network (VPN) and point-to-Point Tunneling Protocol (PPTP) as a security method for call center network connections. The results of the study show that the use of PPTP in PT Mulia Persada Indonesia's network security provides significant benefits. Call center employees can connect to the corporate network through a secure connection, even from an external location such as home. This access allows them to access the queuing system and perform call center tasks effectively without having to be in a physical office. Meanwhile, the implementation of a queue system at PT Mulia Persada Indonesia's call center service has had a positive impact, namely increasing customer satisfaction. With an effective queuing system, customer waiting time can be minimized and calls can be handled quickly.
APA, Harvard, Vancouver, ISO, and other styles
43

Liu, Ziao, Yuanyuan Xie, Yanyan Luo, Yuxin Wang, and Xiangmin Ji. "TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification." Applied Sciences 15, no. 6 (2025): 2977. https://doi.org/10.3390/app15062977.

Full text
Abstract:
Encrypted network traffic classification remains a critical component in network security monitoring. However, existing approaches face two fundamental limitations: (1) conventional methods rely on manual feature engineering and are inadequate in handling high-dimensional features; and (2) they lack the capability to capture dynamic temporal patterns. This paper introduces TransECA-Net, a novel hybrid deep learning architecture that addresses these limitations through two key innovations. First, we integrate ECA-Net modules with CNN architecture to enable automated feature extraction and efficient dimension reduction via channel selection. Second, we incorporate a Transformer encoder to model global temporal dependencies through multi-head self-attention, supplemented by residual connections for optimal gradient flow. Extensive experiments on the ISCX VPN-nonVPN dataset demonstrate the superiority of our approach. TransECA-Net achieved an average accuracy of 98.25% in classifying 12 types of encrypted traffic, outperforming classical baseline models such as 1D-CNN, CNN + LSTM, and TFE-GNN by 6.2–14.8%. Additionally, it demonstrated a 37.44–48.84% improvement in convergence speed during the training process. Our proposed framework presents a new paradigm for encrypted traffic feature disentanglement and representation learning. This paradigm enables cybersecurity systems to achieve fine-grained service identification of encrypted traffic (e.g., 98.9% accuracy in VPN traffic detection) and real-time responsiveness (48.8% faster than conventional methods), providing technical support for combating emerging cybercrimes such as monitoring illegal transactions on darknet networks and contributing significantly to adaptive network security monitoring systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Fikri, Muhammad, and Muhammad Rifqi. "Implementasi VPN Antar Cabang Menggunakan Teknologi SDWAN dengan Metode Load Balance (Studi Kasus: PT. Mitra Solusi Infokom)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 1 (2023): 105–14. https://doi.org/10.25126/jtiik.2023105236.

Full text
Abstract:
Perkembangan komunikasi jaringan yang cepat, proses mengelola dan monitoring jaringan akan lebih kompleks. Pada perusahaan yang memiliki kantor cabang yang letaknya terpisah secara geografis maka diperlukan Wide Area Network (WAN) sebagai media komunikasi, pada kasus ini mulai terdapat banyak masalah mulai dari speed, bandwidth, delay, dan koneksi jalur komunikasi (redundansi). PT Mitra Solusi Infokom memiliki kantor cabang yang memiliki perbedaan area secara geografis. Permasalahan yang dihadapi adalah komunikasi antara kantor cabang dan kantor pusat hanya memiliki satu jalur yaitu MPLS (Multiprotocol Label Switching) dimana tidak adanya redundansi jalur komunikasi antar kantor pusat dan Kantor cabang, yang mengakibatkan komunikasi antara kantor cabang dan kantor pusat akan putus apabila jalur MPLS sedang mengalami gangguan. Melihat permasalahan ini, peneliti akan mencoba melakukan desain ulang terhadap topologi yang sedang berjalan. Desain ulang ini menggunakan 2 jalur komunikasi antar site, salah satunya menggunakan jaringan internet yang dilapisi IPSec VPN dan pada jaringan utama MPLS juga dilapisi dengan IPSec VPN. Kemudian 2 jalur tersebut akan di handle dengan adanya teknologi SD-WAN. Peneliti mendesain ulang sistem jaringan, dengan mempunyai backup jalur meggunakan 2 dengan sistem redundansi dan load balance. Hasil yang diharapkan adalah 2 jalur tersebut dapat menghandle traffic secara bersamaan, dan mampu membackup apabila salah satu jalur down. Hasil dari penelitian ini, traffic antar site dapat terbagi antara jalur MPLS jalur internet, jalur internet mampu menghandle traffic yang telah di load balance dan membackup apabila koneksi MPLS down, sistem failover menggunakan teknologi SDWAN mampu mengurangi downtime sebesar 95%, Sehingga mengurangi tingkat kegagalan jaringan.AbstractThe rapid development of network communication, the process of managing and monitoring the network will be more complex. In companies that have branch offices that are geographically separated, a Wide Area Network (WAN) is needed as a communication, in this case there are problems ranging from speed, bandwidth, delay, and communication line connections (redundancy). PT Mitra Solusi Infokom has branch offices that have different geographical areas. The problem faced is that communication between branch offices and head office only has one path, namely MPLS (Multiprotocol Label Switching) where there is no redundancy of links communication between the head office and branch offices, which causes the communication to break if the link MPLS issues. Seeing this problem, researchers will try to develop an ongoing topology using the PPDIOO development research method (Prepare, Plan, Design, Implement, Operate, and Optimize) to assist and provide stages of network installation, monitoring, and development. This development uses 2 links communication between sites, one of which uses the internet using IPSec VPN and the main MPLS network is also using IPSec VPN. Then the 2 links will be handled with the SD-WAN technology. Researchers develop a network system to have backup paths as a redundancy and load balance system. The expected result is that the 2 links can handle traffic simultaneously, and be able to backup if one link down. The results of this study, link the internet is able to handle traffic that has been load balanced and backed up if the MPLS connection is down, system failover using SD WAN technology is able to reduce downtime by 95%, thereby reducing network failure rates.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhang, Rong Hua. "Management System of Computer Laboratory in Liberal College." Applied Mechanics and Materials 411-414 (September 2013): 712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.712.

Full text
Abstract:
The university network is very popular, the use of computer networks for laboratory management has become a necessity. We proposed the construction of the building room memorandum ideas and some strategies that can be implemented, the better solution normative room management issues. According to the actual use of university computer room design possible combination of VLAN and VPN solutions. We used a more mature support for multiple operating systems and supports SNMP network devices Mrtg tools to help us achieve traffic monitoring, reducing the need for repeat open, traffic monitoring can be a good solution to the problem. Use of virtual LANs, the use of wireless network technology, the use of remote monitoring technology, the use of Web sites and remote access, have made these physical room on the formation of a relatively independent logical connections to facilitate the reunification of management and maintenance.
APA, Harvard, Vancouver, ISO, and other styles
46

Kiriri, Peter N. "Service Delivery: The Perceptions of Users’ of Library Services in a Private University in Africa." European Journal of Multidisciplinary Studies 3, no. 4 (2018): 221. http://dx.doi.org/10.26417/275kuj79q.

Full text
Abstract:
The success of a library in achieving its target in terms of vision and mission is closely linked to how its users perceive the services offered as well as their attitudes towards the same. The researcher investigates the impact the Library has on students learning through analyzing their perception and attitudes towards the services offered at the library as well as the availability of resources and the relationship of the library users with the library staff. The researcher obtained data from 254 library users, who were issued with a structured questionnaire. The findings of this study showed that postgraduate students used the library more often than their undergraduate counterparts. The study also showed that to a great extent, the library was viewed positively, and this directly affected how the library was used. Based on the findings, this paper recommended that employees undergo customer relation training to improve their relations with users, improve internet speed, and VPN connections, regularly update resources and enforce a noise control mechanism.
APA, Harvard, Vancouver, ISO, and other styles
47

Kist, Alexander, Ananda Maiti, Andrew Maxwell, et al. "Hosting and Sharing Your Own Remote Experiments with RALfie – an Open Ended Experiment Design Experience." International Journal of Online Engineering (iJOE) 12, no. 04 (2016): 40. http://dx.doi.org/10.3991/ijoe.v12i04.5101.

Full text
Abstract:
Remote Access Laboratories (RAL) are online platforms for performing experiments from remote locations usually following a centralised service oriented paradigm. This short article presents RALfie - Remote Access Laboratories for Fun, Innovation and Education using a peer-to-peer RAL architecture where some participants or makers can create, host and share experiments for other users. The system is built upon a VPN service that establishes end-to-end connections between learner and makers’ experiential rigs. A graphical programming platform - SNAP is the basis of programming and designing the interface with the experimental rig. The experiments are then shard using an activity-based learning strategy that presents the experiments as a set of hierarchical groups of activities or activities. This distributed design of RAL allows more hands-on experience to build experimental setup and provides opportunities to collaborate with fellow peers. The environment is suitable foe STEM Education. This approach requires the makers among the users to create and host the experiments, which demand certain responsibilities and offers new learning opportunities.
APA, Harvard, Vancouver, ISO, and other styles
48

Putra, Deva, and Melissa Indah Fianty. "Capability Level Measurement of Information Systems Using COBIT 5 Framework in Garment Company." Journal of Information Systems and Informatics 5, no. 1 (2023): 333–46. http://dx.doi.org/10.51519/journalisi.v5i1.454.

Full text
Abstract:
The industrial company specializing in garment products uses information technology called ERP System to support daily activities. The information technology used is close to unavoidable problems. The problems in this company are internet and VPN connections being interrupted/disconnected, computer hardware damage, and user understanding of applicable information technology SOPs. To solve these problems, COBIT 5 was chosen to overcome existing problems by evaluating existing IT governance to produce and measure the level of capability and solution to problems. This research uses three processes, namely APO01, APO12, DSS03, which are obtained from the results of mapping the vision, mission, and problems faced by the company. Data were collected by interviewing resource persons: IT Managers, Accounting and Tax Managers, and the staff concerned. Moreover, they conducted a literature study on COBIT 5 to obtain the value of gap results and capability levels as recommendation guidelines. The result obtained is that the capability level is at level 1. The level gap is 1 level, comparing current conditions with the company's expected conditions. Ten recommendations are given to the company from the results of discussions to improve and develop information technology governance.
APA, Harvard, Vancouver, ISO, and other styles
49

Priyanka, Gowda Ashwath Narayana Gowda. "Importance of Cybersecurity in the Expansion of Remote Work." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 70–74. https://doi.org/10.5281/zenodo.13353661.

Full text
Abstract:
The recent emergence of the segregated workplace has clearly shown that it is crucial to have reliable pro-tection from cyber threats. This paper also aims to identify the various risks of remote work which are risks to cy-bersecurity such as phishing attacks, malware, weak passwords, and unsecured networks. It is critical to mention that the present study is based on an extensive literature review that reveals important research data and over-drafts. Techniques used here refer to data collection and analysis of cybersecurity measures concerning remote work. General findings reveal high levels of cyber risks in distant working spaces together with significant effects on organizational security. It is important to know about common measures, for example, the usage of multi-factor authentication, VPN connections, timely update of the software, and employee awareness to minimize the hazards. Recommendations stress the need for constant innovation in cybersecurity measures to secure the emerging frameworks of remote work and work-related information. The implications for further research and real-life appli-cations for improving cybersecurity in the context of the growing trend of remote work are outlined.
APA, Harvard, Vancouver, ISO, and other styles
50

Tomi Defisa, Thomas Budiman, and Anton Zulkarnain Sianipar. "Model of Sharing Public IP Address Using Tunneling Protocol." Journal of Advances in Information and Industrial Technology 7, no. 1 (2025): 95–104. https://doi.org/10.52435/jaiit.v7i1.691.

Full text
Abstract:
Digital Transformation cannot be separated from the support of Internet connections. The Global Internet Network only recognizes Public IP Address. The Internet Service Provider (ISP) will provide a Public IP Address to customers who subscribe to a business or Enterprise service. Companies with branch offices that subscribe to broadband internet services typically receive private IP addresses, which limits the availability of public IP addresses for systems or other purposes. This paper aims to utilize the Point-to-Point Tunneling Protocol (PPTP) and Ethernet over IP (EoIP) tunnel protocol features on MikroTik Routers for sharing a Public IP address, with a special focus on public IP Address version 4 (IPv4). Point-to-Point Tunneling Protocol (PPTP) is used to establish a Virtual Private Network (VPN) between the Head Office and Branch Office. Then, Ethernet over Internet Protocol (EoIP) is utilized to create a bridge network. Based on the test results, the Public IP Address was successfully detected on the internet network during bandwidth testing, and the route to the internet network was seen passing through the gateway from the Public IP address prefix of the Head Office. To demonstrate that Public IP Addresses can be used in Branch Offices. This model can be a solution for companies to share Public IP addresses between the head office and the Branch Office.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography