Non- Analisis Perbandingan VPN Tunnel antara ngrok Edge Cloud vs Public IP Address menggunakan Open VPN

Authors

  • Gautama Wijaya Universitas Internasional Batam
  • Tony Tan Universitas Internasional Batam
  • Stefanus Eko Prasetyo Universitas Internasional Batam
  • Sun Pho membership

Keywords:

openvpn, VPN, ngrok, QOS, VoIP

Abstract

Ngrok adalah sebuah platform yang menyediakan solusi yang memungkinkan aplikasi pada jaringan pribadi untuk diakses melalui internet. Layanan ini menggunakan teknologi reserve proxy, yang membuat IP publik tidak diperlukan. Memanfaatkan kelebihan dari platform ngrok dan mengombinasikan dengan OpenVPN menghasilkan solusi layanan VPN baru tanpa memerlukan IP Publik. Artikel ini akan membahas solusi VPN yang diusulkan yang menggabungkan ngrok dan OpenVPN. Solusi ini membuat layanan VPN tanpa IP Public Static, yang diperlukan ketika menyediakan Layanan VPN. Untuk memastikan kualitas solusi yang diusulkan, artikel ini mendemonstrasikan, menguji, dan menganalisis QoS parameter pada VoIP. Hasil penelitian mengungkapkan bahwa menggabungkan kedua teknologi ini tidak mempengaruhi kinerja layanan VPN dan ngrok dapat digunakan sebagai pengganti IP Publik pada penyediaan layanan VPN.

Downloads

Download data is not yet available.

References

Adjardjah, Winfred, Franklin Kumassah, Dawood Mohammed Abdallah, and John Awuah Addor. 2023. “Performance Evaluation of VoIP Analysis and Simulation.” Journal of Engineering Research and Reports 25(7): 176–91.

Angelo, Raymond. 2019. “Secure Protocols And Virtual Private Networks: An Evaluation.” Issues in Information Systems 20(3).

Balafif, Sabri, and Ikhda Qurrata Aini. 2022. “Analysis of Computer Network Performance on Communication and Informatics Office of West Sumbawa Regency Using Quality of Service Method.” Journal of Information Systems and Informatics 4(4): 992–1007.

Bendicho, Carlos, and Daniel Bendicho. 2023. “Techno-Economic Assessment in Communications: New Challenges.” In Intelligent Computing, Lecture Notes in Networks and Systems, ed. Kohei Arai. Cham: Springer Nature Switzerland, 134–50. https://link.springer.com/10.1007/978-3-031-37963-5_11 (October 14, 2023).

Brouwer, Marius, and Anand Groenewegen. “Cloud Access Security Brokers (CASBs) Characterization of the CASB Market and Its Alignment with Corporate Expectations Commissioned by KPMG Netherlands.”

Budiyanto, Setiyo, and Dadang Gunawan. 2023. “Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol.” IEEE Access 11: 60853–65.

Deshpande, Dr. Aniket. 2021. “Relevance of Zero Trust Network Architecture Amidts and It’s Rapid Adoption Amidts Work From Home Enforced by COVID-19.” Psychology and Education Journal 58(1): 5672–77.

Goethals, Tom, Dwight Kerkhove, Bruno Volckaert, and Filip De Turck. 2019. “Scalability Evaluation of VPN Technologies for Secure Container Networking.” In 2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada: IEEE, 1–7. https://ieeexplore.ieee.org/document/9012673/ (October 13, 2023).

H., Mahdi et al. 2017. “Simulation and Analysis of Quality of Service (QoS) Parameters of Voice over IP (VoIP) Traffic through Heterogeneous Networks.” International Journal of Advanced Computer Science and Applications 8(7). http://thesai.org/Publications/ViewPaper?Volume=8&Issue=7&Code=ijacsa&SerialNo=32 (October 20, 2023).

Hadinata, Frans, Stefanus Eko Prasetyo, and Haeruddin Haeruddin. 2022. “Analisa Penggunaan Jaringan ZeroTier di Masa Pandemi Covid-2019.” Jurnal Ilmu Komputer dan Bisnis 13(1): 85–93.

Harchay, Ahlem, Abdelwahed Berguiga, and Ayman Massaoudi. 2022. “An Enhanced Traffic Split Routing Heuristic for Layer 2 and Layer 1 Services.” International Journal of Advanced Computer Science and Applications 13(1). http://thesai.org/Publications/ViewPaper?Volume=13&Issue=1&Code=IJACSA&SerialNo=90 (October 12, 2023).

Kapoor, Maya et al. 2023. “Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning.” Proceedings of the AAAI Conference on Artificial Intelligence 37(13): 15519–27.

Kuroda, Toshikazu. 2017. “A Combination of Raspberry Pi and SoftEther VPN for Controlling Research Devices via the Internet.” Journal of the Experimental Analysis of Behavior 108(3): 468–84.

Manishankar, Karthik, Patricia Saito, and Ben Reed. “Bridging Web Authentication to OpenVPN.”

Mohammed, Hussein A, and Adnan Hussein Ali. 2013. “Effect of Some Security Mechanisms on the Qos VoIP Application Using OPNET.” International Journal of Current Engineering and Technology.

Narvios, Wilen Melsedec O. et al. 2022. “Utilizing Web Page for Electrical Load Control and Power Monitoring.” In Manila, Philippines, 050005. https://pubs.aip.org/aip/acp/article/2827140 (October 20, 2023).

“Ngrok textbar Unified Application Delivery Platform for Developers.” https://ngrok.com/ (December 13, 2023).

Nguyen, Van-Linh et al. 2021. “Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges.” IEEE Communications Surveys & Tutorials 23(4): 2384–2428.

Pohl, Frederic, and Hans Dieter Schotten. 2017. “Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance.” In Service-Oriented and Cloud Computing, Lecture Notes in Computer Science, eds. Flavio De Paoli, Stefan Schulte, and Einar Broch Johnsen. Cham: Springer International Publishing, 83–90. https://link.springer.com/10.1007/978-3-319-67262-5_7 (September 4, 2023).

Ramadhan, Eko, Ahmad Firdausi, and Setiyo Budiyanto. 2017. “Design and Analysis QoS VoIP Using Routing Border Gateway Protocol (BGP).” In 2017 International Conference on Broadband Communication, Wireless Sensors and Powering (BCWSP), , 1–4.

Risdianto, Aris Cahyadi, and R. Rumani. 2011. “IPv6 Tunnel Broker Implementation and Analysis for IPv6 and IPv4 Interconnection.” In 2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA), , 139–44.

Sarah, Annisa et al. 2020. “Learning IoT: Basic Experiments of Home Automation Using ESP8266, Arduino and XBee.” In 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), Beijing, China: IEEE, 290–94. https://ieeexplore.ieee.org/document/9192394/ (October 20, 2023).

Shuai, Yang, Zhang Qianli, and Li Xing. 2016. “A Tunnel Broker Based IPv6 Access System for a Small Scale Network with IPv4 Upstream.” In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference, , 206–10.

Tomás, Livia, and Ophélie Bidet. 2023. “Conducting Qualitative Interviews via VoIP Technologies: Reflections on Rapport, Technology, Digital Exclusion, and Ethics.” International Journal of Social Research Methodology: 1–13.

Tschorsch, Florian. “OpenVPN TLS-Crypt-V2 Key Wrapping with Hardware Security Modules.”

Ubedilah, Setiyo Budiyanto, and Lukman Medriavin Silalahi. 2022. “Analysis QoS VoIP Using GRE + IPSec Tunnel and IPIP Based on Session Initiation Protocol.” In 2022 5th International Conference of Computer and Informatics Engineering (IC2IE), , 47–54.

Wahanani, Henni Endah, Mohammad Idhom, and Eka Prakarsa Mandyartha. 2021. “Analysis of Streaming Video on VPN Networks Between OpenVPN and L2TP/IPSec.” In 2021 IEEE 7th Information Technology International Seminar (ITIS), , 1–5.

Wang, Yutan, Chi Wei, Haowei Sun, and Aili Qu. 2022. “Design of Intelligent Detection Platform for Wine Grape Pests and Diseases in Ningxia.” Plants 12(1): 106.

Yan, Xiaodan. 2023. “Deep Learning-Based Efficient Analysis for Encrypted Traffic.” Applied Sciences 13(21): 11776.

Downloads

Published

2024-04-04