Main Article Content
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VPN and MPLS VPN network delay has a very good delay value. For throughput on VPN networks have medium quality and MPLS VPN networks have good quality. And for the packet loss value for both types of networks is 0%. This shows that MPLS VPN network throughput has better QoS while for delay and packet loss on VPN and MPLS VPN networks have the same quality value.
ETSI. (1999). Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); General aspects of Quality of Service (QoS). Valbonne.
Forouzan, B. A. (2007). Data Communications and Networking, Fourth Edition. United States: McGraw-Hill Companies Inc.
Grewal, K., & Dangi, R. (2012). Comparative Analysis of QoS VPN Provisioning Algorithm on Traditional IP based VPN and MPLS VPN using NS-2. International Journal of Computer Applications, 48(1), 43â€“46. https://doi.org/10.5120/7316-9922
Kale, N. N., & Waichol, S. A. (2014). Performance Analysis of MPLS network with Traditional IP Network in Service Provider Environment. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 3(4), 1311â€“1316.
Sasmito, E. C. (2012). Produk & Layanan IPVPN MPLS. Retrieved November 4, 2014, from https://ekocandrasasmito.wordpress.com/2012/06/09/produk-layanan-ipvpn-mpls/
Sugeng, W., Istiyanto, J. E., Mustofa, K., & Ashari, A. (2015). The Impact of QoS Changes towards Network Performance. International Jurnal of Computer Networks and Communications Security, 3(2), 48â€“53.