SlideShare una empresa de Scribd logo
1 de 9
Tugas Kelompok 5 :
-Ade Frihadi , NIM 55412120006
-Muhammad Ikhasan , NIM 55412120004
-Bambang Adi M , NIM 55412120023
http://www.mercubuana.ac.id
Rizalbroer@ieee.org
 Pada saat ini kebutuhan akan interkoneksi voip
server satu dengan voip server lainnya untuk
dapat saling berkomunikasi sangat diperlukan
 Media interkoneksi yang paling mudah digunakan
adalah media internet
 Bagaimana melakukan pengamanan voip sip
trunking pada jaringan publik atau internet?
 Bagaimana performance dari voip sip trunking
menggunakan vpn over internet dengan software
vtun?
COMPREHENSIVE
COMPARISON OF VOIP SIP
PROTOCOL PROBLEMS AND
CISCO VOIP SYSTEM
Dr TALAL AL-KHAROBI1 and
Mohmmed Abduallah Al-
Mehdhar, arab saudi (2012)
Threats In SIP Based VoIP
Systems
Darshak Dobariya,
Professor Jagdish Gajjar.
India (2012)
Perf orm ance Ana lysis of
VoIP Client with Integrated
Encryption Module.
Rizal Broer, Abdi Wahab, Mudrik
Alaydrus. Indonesia 2013
ANALISA PERFORMANCE
VOIP SIP TRUNKING PADA
JARINGAN VIRTUAL PRIVATE
NETWORK VTUN.
Penulis, 2013
No Methods/Techniques Devices Parameter Result
1 making vpn with encryption
scheme Blowfish, MD5 and
Compression LZO
Router Freebsd with vtun Lock, data
VPN Tunneling with
encryption blowfish, MD5
and Comppresion LZO
2
Making SIP Trunking with
code dial trunk
Two Asterisk Server
SIP trunking Integration
over VPN tunneling
3 Making Network Test Bed IP Phone/Softphone, IP
Perf, Wireshark Test bed Voip Network
4 Testing call with code dial
trunk over VPN Network
Test Bed Voip network,
ipphone/softphone,
wireshark
Data
Confidentiality,
integrity,
availability
Testing data, Security
service
5
Performance Measurement
voip sip trunking over vpn
IPPerf, Wireshark, testbed
voip network,
ipphone/softphone
Delay, Packet
loss,
throughput,
MOS
Performance
measurement data VOIP
SIP Trunking over vpn
 Security services
◦ Data Encryption
◦ Data compression
 Quality of Services (QOS)
◦ Packet Loss
◦ Delay
◦ Throughput
 [1] D. Dobariya and J. Gajjar, “Threats In SIP Based VoIP Systems,” vol. 2, no. 3,
pp. 2666–2675, 2013.
 [2] M. A. Al-mehdhar, “C OMPREHENSIVE C OMPARISON OF V O IP SIP,” vol. 4,
no. 4, pp. 137–153, 2012.
 [3] R. B. Bahaweres, M. Alaydrus, and A. Wahab, “ANALISIS KINERJA VOIP CLIENT
SIPDROID DENGAN MODUL ENKRIPSI,” vol. 2012, no. Snati, pp. 15–16, 2012.
 [4] T. Wang and A. Chen, “Two-Stage Forking for SIP-based VoIP Services
National University of Kaohsiung,” vol. 6, no. 2, pp. 85–91, 2012.
 [5] T. Edition, SIP : Understanding the. .
 [6] A. Ali, N. Ahmad, M. S. Akhtar, and A. Srivastava, “Session Initiation
Protocol,” vol. 4, no. 1, pp. 1–6, 2013.
 [7] H. G. Schulzrinne and J. D. Rosenberg, “ The Session Initiation Protocol :
Providing Advanced Telephony Services Across the Internet,” no. December,
pp. 144–160, 1998.
 [8] Y. Rebahi, N. T. Minh, and G. Zhang, “Performance Analysis of Identity
Management in the Session Initiation protocol ( SIP ),” pp. 1–17.
 [9] T. Y. Dn, T. Yyepg, T. Yyepg, and T. Yyepg, TeAm YYePG Wireless Internet.
2005.
 [10] P. Holland, “VUW.”
 [11] H. Olaf and R. Thomschutz, “Security in Packet-Switched Land Mobile Radio Backbone Networks Security in
Packet-Switched Land Mobile Radio Backbone Networks,” 2005.
 [12] P. Pandya and R. Frazin, “Information Security Management : A Research Project Project Definition – Learning
Objectives An Overview of Tunneling Software.”

Más contenido relacionado

Similar a Analisa performance voip sip trunking pada vpn vtun

Similar a Analisa performance voip sip trunking pada vpn vtun (20)

Profile
ProfileProfile
Profile
 
2014 android ieee
2014 android ieee2014 android ieee
2014 android ieee
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTIONMESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
 
2014-15 Android IEEE Titles List
2014-15 Android IEEE Titles List2014-15 Android IEEE Titles List
2014-15 Android IEEE Titles List
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Study on Multi cloud Security
Study on Multi cloud SecurityStudy on Multi cloud Security
Study on Multi cloud Security
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
SaeedJavanmardi-CV_3
SaeedJavanmardi-CV_3SaeedJavanmardi-CV_3
SaeedJavanmardi-CV_3
 
Bg34369370
Bg34369370Bg34369370
Bg34369370
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Analisa performance voip sip trunking pada vpn vtun

  • 1. Tugas Kelompok 5 : -Ade Frihadi , NIM 55412120006 -Muhammad Ikhasan , NIM 55412120004 -Bambang Adi M , NIM 55412120023 http://www.mercubuana.ac.id Rizalbroer@ieee.org
  • 2.  Pada saat ini kebutuhan akan interkoneksi voip server satu dengan voip server lainnya untuk dapat saling berkomunikasi sangat diperlukan  Media interkoneksi yang paling mudah digunakan adalah media internet
  • 3.  Bagaimana melakukan pengamanan voip sip trunking pada jaringan publik atau internet?  Bagaimana performance dari voip sip trunking menggunakan vpn over internet dengan software vtun?
  • 4. COMPREHENSIVE COMPARISON OF VOIP SIP PROTOCOL PROBLEMS AND CISCO VOIP SYSTEM Dr TALAL AL-KHAROBI1 and Mohmmed Abduallah Al- Mehdhar, arab saudi (2012) Threats In SIP Based VoIP Systems Darshak Dobariya, Professor Jagdish Gajjar. India (2012) Perf orm ance Ana lysis of VoIP Client with Integrated Encryption Module. Rizal Broer, Abdi Wahab, Mudrik Alaydrus. Indonesia 2013 ANALISA PERFORMANCE VOIP SIP TRUNKING PADA JARINGAN VIRTUAL PRIVATE NETWORK VTUN. Penulis, 2013
  • 5.
  • 6. No Methods/Techniques Devices Parameter Result 1 making vpn with encryption scheme Blowfish, MD5 and Compression LZO Router Freebsd with vtun Lock, data VPN Tunneling with encryption blowfish, MD5 and Comppresion LZO 2 Making SIP Trunking with code dial trunk Two Asterisk Server SIP trunking Integration over VPN tunneling 3 Making Network Test Bed IP Phone/Softphone, IP Perf, Wireshark Test bed Voip Network 4 Testing call with code dial trunk over VPN Network Test Bed Voip network, ipphone/softphone, wireshark Data Confidentiality, integrity, availability Testing data, Security service 5 Performance Measurement voip sip trunking over vpn IPPerf, Wireshark, testbed voip network, ipphone/softphone Delay, Packet loss, throughput, MOS Performance measurement data VOIP SIP Trunking over vpn
  • 7.
  • 8.  Security services ◦ Data Encryption ◦ Data compression  Quality of Services (QOS) ◦ Packet Loss ◦ Delay ◦ Throughput
  • 9.  [1] D. Dobariya and J. Gajjar, “Threats In SIP Based VoIP Systems,” vol. 2, no. 3, pp. 2666–2675, 2013.  [2] M. A. Al-mehdhar, “C OMPREHENSIVE C OMPARISON OF V O IP SIP,” vol. 4, no. 4, pp. 137–153, 2012.  [3] R. B. Bahaweres, M. Alaydrus, and A. Wahab, “ANALISIS KINERJA VOIP CLIENT SIPDROID DENGAN MODUL ENKRIPSI,” vol. 2012, no. Snati, pp. 15–16, 2012.  [4] T. Wang and A. Chen, “Two-Stage Forking for SIP-based VoIP Services National University of Kaohsiung,” vol. 6, no. 2, pp. 85–91, 2012.  [5] T. Edition, SIP : Understanding the. .  [6] A. Ali, N. Ahmad, M. S. Akhtar, and A. Srivastava, “Session Initiation Protocol,” vol. 4, no. 1, pp. 1–6, 2013.  [7] H. G. Schulzrinne and J. D. Rosenberg, “ The Session Initiation Protocol : Providing Advanced Telephony Services Across the Internet,” no. December, pp. 144–160, 1998.  [8] Y. Rebahi, N. T. Minh, and G. Zhang, “Performance Analysis of Identity Management in the Session Initiation protocol ( SIP ),” pp. 1–17.  [9] T. Y. Dn, T. Yyepg, T. Yyepg, and T. Yyepg, TeAm YYePG Wireless Internet. 2005.  [10] P. Holland, “VUW.”  [11] H. Olaf and R. Thomschutz, “Security in Packet-Switched Land Mobile Radio Backbone Networks Security in Packet-Switched Land Mobile Radio Backbone Networks,” 2005.  [12] P. Pandya and R. Frazin, “Information Security Management : A Research Project Project Definition – Learning Objectives An Overview of Tunneling Software.”