Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Analisa performance voip sip trunking pada vpn vtun
1. Tugas Kelompok 5 :
-Ade Frihadi , NIM 55412120006
-Muhammad Ikhasan , NIM 55412120004
-Bambang Adi M , NIM 55412120023
http://www.mercubuana.ac.id
Rizalbroer@ieee.org
2. Pada saat ini kebutuhan akan interkoneksi voip
server satu dengan voip server lainnya untuk
dapat saling berkomunikasi sangat diperlukan
Media interkoneksi yang paling mudah digunakan
adalah media internet
3. Bagaimana melakukan pengamanan voip sip
trunking pada jaringan publik atau internet?
Bagaimana performance dari voip sip trunking
menggunakan vpn over internet dengan software
vtun?
4. COMPREHENSIVE
COMPARISON OF VOIP SIP
PROTOCOL PROBLEMS AND
CISCO VOIP SYSTEM
Dr TALAL AL-KHAROBI1 and
Mohmmed Abduallah Al-
Mehdhar, arab saudi (2012)
Threats In SIP Based VoIP
Systems
Darshak Dobariya,
Professor Jagdish Gajjar.
India (2012)
Perf orm ance Ana lysis of
VoIP Client with Integrated
Encryption Module.
Rizal Broer, Abdi Wahab, Mudrik
Alaydrus. Indonesia 2013
ANALISA PERFORMANCE
VOIP SIP TRUNKING PADA
JARINGAN VIRTUAL PRIVATE
NETWORK VTUN.
Penulis, 2013
5.
6. No Methods/Techniques Devices Parameter Result
1 making vpn with encryption
scheme Blowfish, MD5 and
Compression LZO
Router Freebsd with vtun Lock, data
VPN Tunneling with
encryption blowfish, MD5
and Comppresion LZO
2
Making SIP Trunking with
code dial trunk
Two Asterisk Server
SIP trunking Integration
over VPN tunneling
3 Making Network Test Bed IP Phone/Softphone, IP
Perf, Wireshark Test bed Voip Network
4 Testing call with code dial
trunk over VPN Network
Test Bed Voip network,
ipphone/softphone,
wireshark
Data
Confidentiality,
integrity,
availability
Testing data, Security
service
5
Performance Measurement
voip sip trunking over vpn
IPPerf, Wireshark, testbed
voip network,
ipphone/softphone
Delay, Packet
loss,
throughput,
MOS
Performance
measurement data VOIP
SIP Trunking over vpn
7.
8. Security services
◦ Data Encryption
◦ Data compression
Quality of Services (QOS)
◦ Packet Loss
◦ Delay
◦ Throughput
9. [1] D. Dobariya and J. Gajjar, “Threats In SIP Based VoIP Systems,” vol. 2, no. 3,
pp. 2666–2675, 2013.
[2] M. A. Al-mehdhar, “C OMPREHENSIVE C OMPARISON OF V O IP SIP,” vol. 4,
no. 4, pp. 137–153, 2012.
[3] R. B. Bahaweres, M. Alaydrus, and A. Wahab, “ANALISIS KINERJA VOIP CLIENT
SIPDROID DENGAN MODUL ENKRIPSI,” vol. 2012, no. Snati, pp. 15–16, 2012.
[4] T. Wang and A. Chen, “Two-Stage Forking for SIP-based VoIP Services
National University of Kaohsiung,” vol. 6, no. 2, pp. 85–91, 2012.
[5] T. Edition, SIP : Understanding the. .
[6] A. Ali, N. Ahmad, M. S. Akhtar, and A. Srivastava, “Session Initiation
Protocol,” vol. 4, no. 1, pp. 1–6, 2013.
[7] H. G. Schulzrinne and J. D. Rosenberg, “ The Session Initiation Protocol :
Providing Advanced Telephony Services Across the Internet,” no. December,
pp. 144–160, 1998.
[8] Y. Rebahi, N. T. Minh, and G. Zhang, “Performance Analysis of Identity
Management in the Session Initiation protocol ( SIP ),” pp. 1–17.
[9] T. Y. Dn, T. Yyepg, T. Yyepg, and T. Yyepg, TeAm YYePG Wireless Internet.
2005.
[10] P. Holland, “VUW.”
[11] H. Olaf and R. Thomschutz, “Security in Packet-Switched Land Mobile Radio Backbone Networks Security in
Packet-Switched Land Mobile Radio Backbone Networks,” 2005.
[12] P. Pandya and R. Frazin, “Information Security Management : A Research Project Project Definition – Learning
Objectives An Overview of Tunneling Software.”