IARJSET
International Advanced Research Journal in Science, Engineering and Technology
ISO 3297:2007 Certified Impact Factor 7.105 Vol. 9, Issue 8, August 2022
DOI: 10.17148/IARJSET.2022.9809
© IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License 60
ISSN (O) 2393-8021, ISSN (P) 2394-1588
PPTP VPN and L2TP/IPsec VPN Performance as
Voice Data Security in VoIP
Martono Dwi Atmadja
1
, Farida Arinie Soelistianto
2
, Harrij Mukti Khristiana
3
Electrical Engineering Major Lecturer, Malang state Polytechnic, Malang, Indonesia
1,2,3
Abstract: VoIP technology is a technology that allows long-distance voice communication by utilizing internet media.
Communication between users through the internet requires a level of security that are confidential (private). However,
using an open internet network requires a communication data security method with the implementation of network
performance and security. This can be done with the application of the Virtual Private Network (VPN) method. VPN
applications on VoIP are affected by the security system by encrypting data from VoIP communications. VPN PPTP
computer network security technology in virtual private IP or as a tunnel as a secure data transmission medium. The PPTP
VPN and L2TP/IPsec VPN methods are a Layer 2 (Layer 2 Tunnel Protocol) – L2TP protocol, while the PPTP protocol
uses only IP addresses, usernames and passwords for authentication. L2TP uses an additional authentication system,
namely a Pre-shared key or secret. The purpose of this study is to compare security based on the protocol used with
sniffing techniques and to obtain the Quality of Service (QOS) parameter values that includes bandwidth and delay.
Performance test for bandwidth from the largest upload side, when using L2TP/IPsec VPN The average bandwidth value
when uploading the G.711 codec is 76kbit/sec. While the download is around 77kbit/sec.
Keywords: VoIP, VPN PPTP, VPN L2TP/IPsec, QoS
I. INTRODUCTION
The telecommunications technology industry is growing rapidly under customer service needs. The Telecommunications
Operator must be able to read the customer's needs against the user's interests, and if it is unable to handle this then the
Operator will only serve as a capacity provider. With the development of this service as well as optimization in financing
and speed of access, the use of computer networks has also become one of the telecommunications technologies that
develop in line with customer needs. IP-based communication technology that is embedded in the internet network is not
only for data packet services and for word wide web, HTTP and FTP applications. One of the telecommunications
technologies currently developing is voice communication via the internet. VoIP (Voice over Internet Protocol) telephone
call technology via the internet [1]. The received voice is converted into a digital code and then passed through the
network in the form of data packets [2]. The difference in telephone via VoIP lies in the security system compared to
analogue voice [3]. In real-time packet data usage, call encryption is made so that it is not vulnerable to eavesdropping
and the voice received by the recipient is clear. Disadvantages of VoIP need internet sender and receiver to be connected.
When the network is experiencing bottlenecks, there are more and more communication connections via VoIP, so they
are unable to access the server because of data overload. VoIP communication still needs a study on data security in voice
communication when it takes place. When voice communication occurs, the possibility of eavesdropping, data content
hijacking or not being able to access the server when the server is overloaded [4]. To handle this kind of condition, it is
possible to apply a data security method to VoIP services using the PTPP VPN protocol security. VPN (Virtual Private
Network) is a service that connects one network to another with a private system through the internet network [5]. Another
capability of a VPN is to provide secure access through a server connection by hiding traces of personal data. VPN works
by managing data encryption in the exchange of data before connecting to the public. Utilization of VPN as an alternative
to using the internet network traversed by voice encryption by using private keys, certificates, or unique usernames so
that they can authenticate in establishing connections. In network authentication with 80kbps (standard G.711) bandwidth
requirement. VoIP communication between buildings requires security on the network (private) [6]. This can be done by
using a VPN. Users can access information sources from outside that are in the local network. The importance of VPN
security and privacy of data on transmission from unauthorized users in the same transmission can be limited by
encryption and tunnelling of the VPN. The data that VPN receives and sends is guaranteed to be from a private source.
VPN tunnelling creates a private connection path using other network infrastructure. VPN began with Swipe in 1993 with
PPTP (Point to Point Tunnelling Protocol) then developed with IPsec until it was available in the form of Open VPN [7].
PPTP (Point to Point Tunnelling Protocol) is a network protocol that functions as a secure data transfer from a remote
client to a company's private server by creating a VPN via TCP/IP. While Internet Protocol Security (IPsec) is a tunnelling
protocol that works at layer 3. Provides the algorithm used in the service and places the cryptographic key according to
the required service. This study aims to analyse the characteristics of voice security on VoIP by using a protocol that