You are on page 1of 2

CHAPTER I PREFACE

I.1 Background of Issues Internet has greatly reduced the distance and time limitation. Now, an employee who was away from the office no longer need to go back to the office to simply retrieve the data stored on the office database. By connecting the office database to the Internet, the employee who is also connected to the internet could download the data directly from their computer. If the employee is able to download data from the office database, then others can download it as well. Therefore was made a variety of ways and methods for unwanted persons so they cant download, modify, or delete the data, one of them is Virtual Private Network Virtual Private Network (VPN) itself is a communication technology that allows for connection to a public network and use it like using a local network and also joined the local network itself. By using this public network, the user can access the features available in its local network, get the right and the same settings as if physically located in a place where local network is located. The important thing to remember is a private network should be in a preferred condition and kept confidential. Data security and the closure of the transfer of data from illegal access and scalability of the network becomes the primary standard on this Virtual Network. On its own Virtual Private Network, there are several protocols that are used, among others PPTP, L2TP, IPSec, SOCKS, CIPE, and SCTP. Each protocol has its own function and in this occasion, I will take one of the discussion about the protocol contained in the Virtual Private Network that is SCTP (Stream Control Transport Protocol). Which is a "regulator" and "providers" for streaming service to access multimedia content with streaming method. These problems became the idea for the writer to pour into this final and took the title "SCTP PROTOCOL IMPLEMENTATION THROUGH VIRTUAL PRIVATE NETWORK"

I.2 Problem Identification Based on research result, wich have been conducted, the authors identify several issues which are as follow : 1. How to set the configuration for a Virtual Private Network that can be used optimally. 2. How to implement the SCTP Protocol through Virtual Private Network. 3. How do the SCTP Protocol work at Virtual Private Network.

I.3 Problem Limitation To focused the research, the scope of the problem will only include the following things : 1. Configuration of the Virtual Private Network. 2. Objectives and working principles of the Virtual Private Network. 3. SCTP Protocol implementation through Virtual Private Network

I.4 Research Obectives From the identification of the above problems, the author has the intent and purpose are as follows : 1. As a requirement of graduation at the undergraduate programs in STMIK LPKIA Bandung. 2. Implements the SCTP Protocol through Virtual Private Network. 3. Providing multimedia streaming of video through Virtual Private Network.

You might also like