Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

VPN DEFINITIONS

VPN is a computer network where connections between devices (nodes) use a public
network, so that each website only requires an internet connection. In a VPN implementation,
a node-to-node connection has a dedicated virtual path through an independent public
network. This method is usually used to establish secure communications, such as an online
ticketing system with a centralized database server. According to (Sofana, 2012), VPN
(virtual private network) is a computer network technology that connects several local
networks using public communication facilities such as the Internet. Data traverses the public
network from virtual private network (VPN) nodes. Thus, advancing information is safe and
difficult for others to read. According to (Putra, Indriyani, & Angraini, 2018), a virtual
private network (VPN) is a communication technology that is used to join a local network
after first being connected to a public network. By using this public network, users can
connect to a kind of local network (LAN). VPN itself can be used on various platforms, one
of which is an Android phone. Virtual Private Network or VPN was originally a device
created with the aim of connecting networks between office buildings comfortably and being
able to use office networks from home or other places. The VPN server is a VPN network
that is directly connected to the existing gadgets. One of the most commonly used services
for building VPN networks is the Point-to-Point Tunnel Protocol (PPTP). A PPTP connection
consists of a server and a client. Mikrotik RouterOS can act as both server and client, or even
run both on one machine. This feature is included in the PPP package, so you can check from
the system package menu whether the package is already on the router or not. The PPTP
client function is also present in almost all operating systems, so laptops can be used as PPTP
clients. Generally, PPTP is used in networks that have passed through a multihop router
(Routed Network). If you want to use PPTP, make sure your router doesn't have TCP 1723
blocking rule and IP 7/GRE protocol, because PPTP service uses this protocol. In addition
there is Wireshark, Wireshark is a network analysis program that is very popular today,
although this program is better known not because of its main function, but because it is often
used for hacking beginners. In other words, Wireshark is a complete network protocol
analyzer program. The program can record all packets passing through and selecting and
displays this information in as much detail as possible, such as posting comments on blogs or
even usernames and passwords. Then there is hacking, hacking is infiltrating a computer
system or network with the aim of abusing or damaging the existing system. The term
"misuse" is very broad and can be defined as the theft of confidential information or the
inappropriate use of e-mail, such as sending spam or finding web holes to allow access.

The majority of these VPN servers are located abroad and certainly require an internet
connection to connect to each other. It comes from the country of origin of the VPN server
which is displayed on your IP address. Having this VPN server will make the process of
browsing the internet more secure. In corporate settings, VPN remote access allows
employees to access the company intranet from outside the office. VPN sites allow shared
users from geographically different offices to use the same virtual network. VPNs can also be
used to connect two similar networks through different intermediary networks, such as two
IPv6 networks connected via an IPv4 network.

The brief history of VPN started in 1996. According to Andi (2014), the history of
microotics began in 1996 with the characters Jhon and Arnis. Jhon and Arnis started with
Linux and MS DOS operating systems connected to Aeronet Wireless LAN (W-LAN)
technology at 2Mbps in Moldova. At that time they were able to serve five of their customers
in Latvia, the origin of the proxy. The goal of John and Arnis is to make software or hardware
routers that are reliable and widespread throughout the world. The basic principle of a
reliable proxy server that can be used anywhere in the world.

WAY OF WORK

VPN is a package of telecommunications solutions (whether in the form of voice data,


video or other digital files) that provide IP-based services to end users. VPN services can
transfer data between two computers across a public network such as the Internet, seemingly
connected point to point. VPN evolved into a network tunnel. Tunneling connects two
computer network groups that are separated by one computer network group from another
computer network group in such a way that the two computer network groups are not
isolated. This can be done by encapsulating the network packets that are sent. This tunneling
is transparent to network users on both sides of the network group. Routers on both sides
perform an encapsulation process to determine if a tunnel exists, through either the tunnel
process or the Maximum Transmission Unit (MTU). Due to the encapsulation of the
transmitted packets, extra space is required to add the IP header , each transmitted packet
becomes smaller. A smaller MTU can result in a lower transfer rate between the two hosts it's
communicating with. One of the tunneling applications is mobile IP. By using mobile IP,
users can always use their own IP address , no matter where the user is. Another application
is adding compression processes to data sent through created tunnels . (Putranto, 2009).

BENEFIT

There are several advantages of deploying a WAN using a VPN (Onnopurbo, 2009). First,
the expansion of the company's local network coverage area, so that the company can
develop its business in other areas as well. The time needed to connect a local network to
another location is also faster because the network infrastructure installation process is
carried out from the new company/branch to the nearest regional ISP. However, using a fixed
line as a WAN takes a long time before a dedicated connecting cable is built from the new
subsidiary to the parent company. Thus, using a VPN indirectly increases work efficiency
and effectiveness. Using a VPN can also reduce operational costs compared to using a fixed
connection as the traditional way of WAN. A VPN can reduce network setup costs because it
doesn't require long fixed telephone lines. The use of long cables requires very high
production costs. The more they want, the higher the cost of production. VPN uses the
Internet as a medium. Businesses only need a relatively small amount of cables to connect the
business to the nearest internet provider. Online media has spread throughout the world
because the internet is used as an open public communication tool. This means that anyone
connected to the Internet can access, control and even manipulate any data packets sent over
the Internet at any time. Second, using a VPN increases scalability. A rapidly growing
company needs new branches in multiple locations connected to the head office's LAN.
Third, VPN facilitates access from anywhere because VPN is connected to the Internet. This
makes it easier for mobile users to access the company's special network anywhere as long as
they are connected to the Internet network.

REFERENCE

Amarudin, S. D. (2019). ANALISIS DAN DESAINJALUR TRANSMISI JARINGAN ALTERNATIF


MENGGUNAKANVIRTUAL PRIVATE NETWORK(VPN). Jurnal TEKNOINFO , 101.
Rully Mujiastuti, I. P. (2021). Membangun Sistem Keamanan Jaringan Berbasis VPN. Seminar
Nasional Sains dan Teknologi 2021 , 2.
Sakiwan. (2010). KAJIAN VIRTUAL PRIVATE NETWORK (VPN) LAPAN DAN PEMANFAATANNYA
DALAM MENDUKUNG PENGEMBANGAN E-GOVERNMENT. Peneliti Pusat Analisis dan
Informasi Kedirgantaraan , 146-147.

You might also like