Analysis of Ethernet Over Internet Protocol (EOIP) VPN Performance

Authors

  • Ahmad Purwana Universitas Putra Indonesia YPTK Padang

DOI:

https://doi.org/10.35134/jcsitech.v7i3.11

Keywords:

EOIP, VPN, Mikrotik, Communication, Network

Abstract

The need for interconnection between networks will be needed, especially in a company that has many branch offices, but companies usually demand a minimum use of resources in order to get maximum results. To overcome this problem, a Virtual Private Network (VPN) network is needed by utilizing the EOIP protocol, Ethernet Over IP (EOIP) is a protocol on Mikrotik RouterOS which functions to build a network tunnel between Mikrotik routers on a TCP / IP connection, namely by utilizing internet connection as a liaison. This study aims to analyze the performance of VPN by using the concept of Ethernet Over Internet Protocol (EOIP) on the existing network at PT. Energy Source Dempo. This analysis is needed to manage network access to connected data in each branch of the company. This is to anticipate access rights that enter the network owned by PT. Energy Source Dempo. The results of the analysis provide easy access rights and provide a sense of security from the data communication that occurs. In addition, the results of the analysis can also be used as network management control at PT. Dempo Sumber Energi so that the results of the analysis can maximize data communication performance.

References

Farly, K. A., Najoan, X. B. N., & Lumenta, A. S. M. (2017). Perancangan Dan Implementasi Vpn Server Dengan Menggunakan Protokol Sstp (Secure Socket Tunneling Protocol) Studi Kasus Kampus Universitas Sam Ratulangi. Jurnal Teknik Informatika, 11(1). https://doi.org/10.35793/jti.11.1.2017.16745.

Haryanto, M. D., & Riadi, I. (2014). Analisa Dan Optimalisasi Jaringan Menggunakan Teknik Load Balancing. Jurnal Sarjana Teknik Informatika, 2, 1370–1378. http://www.mendeley.com/ research/analisa-dan-optimalisasi-jaringan-menggunakan-teknik-load-balancing.

Hasibuan, M. S. (2016). Keylogger pada Aspek Keamanan Komputer. Teknovasi, 3(1), 8–15.

Kuswanto, H. (2017). Implementasi Jaringan Virtual Private Network (VPN) Menggunakan Protokol EOIP. Paradigma, 19(1), 46–51.

Lan, K. B. (2019). 729-Article Text-2577-1-10-20190628. 4(1).

Madcoms (2015), Membangun Sistem Jaringan Komputer Untuk Pemula. Yogyakarta .

Mutaqin, A. F. (2016). Rancang Bangun Sistem Monitoring Keamanan Jaringan Prodi Teknik Informatika Melalui SMS Alert dengan Snort. Jurnal Sistem Dan Teknologi Informasi, 1(1), 1–6.

Muzawi, R. (2018). Jurnal Edik Informatika Penelitian Bidang Komputer Sains dan Pendidikan Jurnal Edik Informatika Pengaturan Bandwidth dan QoS Pada PC Router Menggunakan Kernel Gnu / Linux dan FreeBSD. Pengaturan Bandwidth Dan QoS Pada PC Router Menggunakan Kernel Gnu/Linux Dan FreeBSD, 2(January), 80–82. https://doi.org/10.13140/ RG.2.2.10700.92809.

Oktivasari & Andri Budhi Utomo, P., & Andri Budhi Utomo, P. (2016). Analysis of Virtual Private Network Using Openvpn and Point to Point Tunneling Protocol - Analisa Virtual Private Network Menggunakan Openvpn Dan Point to Point Tunneling Protocol. Jurnal Penelitian Komunikasi Dan Opini Publik, 20(2), 123903.

Rifkie Primartha (2019), Manajemen Jaringan Komputer Bandung: Informatika.

Sahari, & Putra, O. A. (2015). Implementasi Point to Point Tunneling Protocol (Pptp) Pada Jaringan Virtual Private Network (VPN) Dan Bandwidth Manajement Dengan Routerboard Mikrotik. Prosiding Seminar Ilmiah Nasional Teknologi Komputer (SENATKOM), 1(Senatkom), 610–619.

Sirait, F., Studi, P., Elektro, T., Teknik, F., Buana, U. M., Studi, P., Elektro, T., Teknik, F., & Buana, U. M. (2018). Jurnal Teknologi Elektro, Universitas Mercu Buana ISSN: 2086 ‐ 9479 Implementasi Metode Vulnerability Dan Hardening Pada Sistem Keamanan Jaringan Fadli Sirait Program Studi Teknik Elektro, Fakultas Teknik ISSN: 2086 ‐ 9479. 9(1), 16–22.

Sutara, B. & sutrisno. (2018). Layanan Jaringan Internet Pada Virtual Private Network (Vpn) Menggunakan L2Tp Untuk Peningkatan Keamanan Jaringan. Jurnal ICT: Information Communication & Technology, 16(1), 1–6.

Suyuti Ma’sum, M., Azhar Irwansyah, M., & Priyanto, H. (2017). Analisis Perbandingan Sistem Keamanan Jaringan Menggunakan Snort dan Netfilter. Jurnal Sistem Dan Teknologi Informasi (JUSTIN), 5(1), 56–60.

Umam, C., & Roza, E. (2016). Perancangan Jaringan Keamanan Virtual Private Network (VPN) Siteto Site. Perancangan Jaringan Keamanan Virtual Private Network (VPN) Siteto Site Chairul, 23–30.

VARIANTO, E., & MOHAMMAD BADRUL. (2015). Implementasi Virtual Private Network Dan Proxy Server Menggunakan Clear Os Pada Pt.Valdo International. Jurnal Teknik Komputer Amik Bsi, 1(1), 55–56.

Warman, I., & Hanafi, A. (2019). Analisa Perbandingan Kinerja Generic Routing Encapsulation (GRE) Tunnel Dengan Point to Point Protocol over Ethernet (PPPoE) Tunnel Mikrotik Routeros. Teknoif, 7(1), 58–66.

Watrianthos, R., & Nasution, M. (2019). Analisa Kemampuan Transver Data Vpn Berbasis Open Source Pada Kondisi Encripsi-Dekscripsi Dan Komprensi-Dekomprensi. Jurnal Informatika, 6(1), 23–51. https://doi.org/10.36987/informatika. v6i1.740.

Wongkar, S., Sinsuw, A., Najoan, X., Studi, P., Informatika, T., Teknik, F., & Ratulangi, U. S. (2015). Analisa Implementasi Jaringan Internet Dengan Menggabungkan Jaringan Lan Dan Wlan Di Desa Kawangkoan Bawah Wilayah Amurang Ii. Jurnal Teknik Elektro Dan Komputer, 4(6), 62–68. https://doi.org/ 10.35793/jtek.4.6.2015.10400.

Downloads

Published

2021-07-31

How to Cite

Purwana, A. . (2021). Analysis of Ethernet Over Internet Protocol (EOIP) VPN Performance. Journal of Computer Scine and Information Technology, 7(3), 64–69. https://doi.org/10.35134/jcsitech.v7i3.11