Home  /  Jurnal JTIK KITA  /  Vol: 3 Núm: 1 Par: 0 (2019)  /  Article
ARTICLE
TITLE

Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)

SUMMARY

The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching

 Articles related

Dwi Kresna Wijaya,Doan Perdana,Yoseph Gustommy Bisono    

Accidents are the third highest cause of death in the world. Through the collision avoidance system applied to smart car, it is expected that accidents on the car can be avoided and the number of accidents can be reduced. This system applies the concept ... see more


Muhammad Wali,Lukman Ahmad    

a b s t r a c tof reference codes on a programming language and software evaluation. Today, most Source code library for the purposes of learning software developers in the form of documentation of the use of a programming language that can be accessed t... see more

Revista: Jurnal JTIK KITA

Martin Reynaldi Unfeto,Yohanes Suban Belutowe    

Pada era digital saat ini, banyak usaha mikro, kecil, dan menengah (UMKM) menghadapi tantangan dalam mengelola dan mempertahankan pelayanan untuk pelanggan mereka. Depot Kalimantan merupakan UMKM di bidang kuliner, juga menghadapi masalah serupa. Sehingg... see more


Nurhuda Maulana,Radinal Setyadinsa,Musthofa Galih Pradana    

Botnet menjadi ancaman yang serius dalam keamanan jaringan. Botnet sering disalahgunakan untuk melancarkan serangan dan merusak serta mencuri informasi sensitif. Penelitian ini bertujuan untuk mengimplementasikan sebuah botnet sederhana menggunakan bahas... see more


Mailia Putri Utami    

Upaya untuk menjawab bagaimana cara komputasi memproses data teks dari konsultasi pasien menjadi sebuat inputan yang dapat dimengerti menjadi hasil akurat untuk dapat memeberikan rekomendasi dari konsultaasi yang dikeluhkan pasien membangun dan mengemban... see more

Revista: Techno.Com