3 long-distance dial-up connection 4 Figure 7-9 A WAN using frame relay.

Slides:



Advertisements
Presentasi serupa
Electronic Commerce Chapter 2 Communications Options.
Advertisements

Menjelaskan Persyaratan WAN
Chapter 12 Applying Cryptography
Keamanan Data dan Jaringan Komputer
Protokol Keamanan.
NURMIYATI TAMATJITA 08/275075/PPA/02633
 Encryption  Application layer interface for security protocols  Other risks and threats to data security and reliable network operations Listen.
Virtual Private Network
Pengenalan Jaringan Komputer
VPN (Virtual Private Network)
Oleh : Muhammad Risal, S.Kom, MT.
FIREWALL By.Kundang.K.Juman.
Virtual Private Network
R O U T I N G Oleh : Dahlan Abdullah.
D1A /5A CUCU SARASWATI. ASSALAMUALAIKUM WR.WB.
Pengantar Teknologi Informasi Fakultas Ekonomi UNPAR 10. Manajemen Jaringan.
VPN Virtual Private Network
INTERNET By APRI SISWANTO, S.KOM.
Virtual Private Network
Wide Area Network Wiwin Sulistyo, ST, M.Kom.
MPLS (Multiprotocol Label Switching)
Internet Layer Pertemuan 5.
Routing Protocol, ATM, Frame Relay, MPLS
VIRTUAL PRIVATE NETWORK (VPN)
B Logical Network Muhammad Anshari Designing Network Topology Designing Models for Addressing & Naming Selecting Switching & Routing Protocol Developing.
Internet Protocol : ROUTING
Keamanan lapis jaringan
PENGANTAR TELEKOMUNIKASI S. Indriani L, M.T
Virtual Private Network
Wired and Wireless Network
Pengantar Sistem Telekomunikasi
SUSSI AGUSTUS 2017 TOKONG NANAS
VIRTUAL PRIVATE NETWORK
Jaringan Komputer: Protokol dan Model Lapisan OSI
Point to Point Protocol (PPP)
Jaringan Komputer I Materi 9 Protokol WAN.
PROTOCOL MEDIUM ACCESS CONTROL
William Stallings Data and Computer Communications 7th Edition
Komunikasi Data MANAGEMENT INFORMATION SYSTEMS 8/E
Implementasi Wireless Networking
Ihsan Naskah, S.Kom., MT JARINGAN KOMPUTER Ihsan Naskah, S.Kom., MT
Routing & Internetworking
DATA LINK LAYER PERTEMUAN 5 Konsep Jaringan Komputer
Pertemuan 16 Layer Data Link - Lanjutan
Menuju High Speed Network
TRANSPORT LAYER PROTOKOL
Zaini, PhD Jurusan Teknik Elektro Universitas Andalas 2012
KELOMPOK 1 PEMODELAN LAYER (OSI, TCP/IP) Agung Ismail
Virtual Private Network
Komunikasi dan Jaringan Komputer
Khairil Fakultas Ilmu Komputer Universitas Dehasen
Title of Presentation A n z a r D1A Taryat D1A
VIRTUAL PRIVATE NETWORK (VPN)
VPN Virtual Private Network
Modul 1b Pengantar Telekomunikasi
WIDE AREA NETWORK (WAN)
Tugas Keamanan Komputer dan Jaringan
William Stallings Data and Computer Communications 7th Edition
VPN.
Model Referensi OSI 14-Sep-18 Jaringan Komputer.
IPv6.
JARKOMDAT (1) SUSSI JANUARI 2018 TEL-U.
1 © 2004, Cisco Systems, Inc. All rights reserved. Module 2 Single-Area OSPF.
BAB I                       Mata Kuliah  Sistem Terdistribusi _______________________ Komunikasi Oleh : Laseri, S.Kom.
Komputer Terapan Jaringan
William Stallings Data and Computer Communications 7th Edition
Routing Protocol, ATM, Frame Relay, MPLS
Jaringan Komputer.
Melakukan Instalasi Perangkat Jaringan Berbasis Luas ( Wide Area Network ) Menjelaskan Persyaratan WAN DEPAN.
Melakukan Instalasi Perangkat Jaringan Berbasis Luas ( Wide Area Network ) Menjelaskan Persyaratan WAN DEPAN.
Transcript presentasi:

3 long-distance dial-up connection

4 Figure 7-9 A WAN using frame relay

5 A BRI link A PRI link

6 T-carrier connecting to a LAN through a router point-to-point T-carrier connection CSU/DSU

7 DSL connection

8 SONET ring

 Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  Became popular as more employees worked in remote locations.

(From Gartner Consulting)

 Secure VPNs use cryptographic tunneling protocols. ◦ IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3, VPN- Q and MPVPN  Trusted VPNs rely on the security of a single provider’s network to protect the traffic. ◦ MPLS and L2F

A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] Two types of end points:  Remote Access  Site-to-Site

Figure 1

 Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered  Cryptography Technic  Encryption -- is a method of “scrambling” data before transmitting it onto the Internet.  Public Key Encryption Technique  Digital signature – for authentication

 VPN can be deployed in three ways :  Host to host  Site-to-Site  Host-to-Site

 Remote access VPN  Intranet VPN  Extranet VPN

 MPLS = Multi Protocol Label Switching  Suatu metode forwarding (meneruskan data/paket melalui suatu jaringan dengan menggunakan informasi label yang dilekatkan pada I  Memungkinkan router meneruskan paket dengan hanya melihat label yang melekat pada paket tersebut, sehinggap tidak perlu lagi melihat alamat IP tujuan)

Back

 Perpaduan mekanisme Label Swapping (Layer 2) dan Routing (Layer 3)  Terdiri atas LSR yang saling terhubung, membentuk suatu LSP Terdiri atas LSR yang saling terhubung, membentuk suatu LSP  LSR pertama disebut ingress LSR  LSR terakhir disebut egress  Bagian tepi dari jaringan LSR disebut LER Back

 LSR = Label Switched Router  LSP = Label Switched Path  LER = Label Edge Router  TTL = Time to Live Back

 Pembuatan label dan distribusi  Pembuatan label dalam tiap router  Pembuatan jalur label yang terhubung  Pemasukan label  Forwarding paket Back