Performance of Topology Aware Reliable Routing Protocol for Large Scale Virtual Private Network

نویسندگان

  • Jayanthi Gokulakrishnan
  • V. Thulasi Bai
چکیده

A network which merges the usage of the public and the private networks and uses security software for the purpose of compressing, encrypting and masking the digital packets that are being transmitted in the network is called as Virtual Private Network (VPN). In VPN, the communication between the user ends is maintained such that it appears as if the source end is directly linked to the destination end over a concealed leased line. The private network, VPN uses the public network such as internet to link the remote locations with the users. In this study, we propose a new reliable protocol called as Topology Aware Reliable Routing Protocol (TARRP) for large scale VPN and compare its performance with the traditional protocol, Boarder Gateway Protocol (BGP). In this protocol, the communication between the end to end nodes takes place in two phases: Routing phase and authentication phase. In the routing phase, the upstream and the downstream routing paths are determined by the source node using the topology learning protocol. Based on the dynamic failure information of links, the sender selects the failure-free path towards the destination. In the authentication phase, the VPN gateway authenticates the packet before it is transmitted through the core. Thus, this technique efficiently allows the packet to be transmitted with ensured security. By simulation results, we show that our proposed protocol is better than the traditional routing protocol of VPN.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network

Most of the Virtual Private Network (VPN) suffers from security related and overhead problems. During the inter domain routing, the conventional protocols require each gateway to resend its routing table periodically to all its neighbors thus increasing the delay. Since VPNs carry sensitive information over an insecure network, the traffic in this network has to be transmitted reliably and secu...

متن کامل

A new virtual leader-following consensus protocol to internal and string stability analysis of longitudinal platoon of vehicles with generic network topology under communication and parasitic delays

In this paper, a new virtual leader following consensus protocol is introduced to perform the internal and string stability analysis of longitudinal platoon of vehicles under generic network topology. In all previous studies on multi-agent systems with generic network topology, the control parameters are strictly dependent on eigenvalues of network matrices (adjacency or Laplacian). Since some ...

متن کامل

استفاده از خوشه بندی در پروتکل مسیریابی AODV برای شبکه های بین خودرویی بر روی سناریوی بزرگراه

Vehicular Ad hoc networks are a subset of mobile Ad hoc networks in which vehicles are considered as network nodes. Their major difference is rapid mobility of nodes which causes the quick change of topology in this network. Quick changes in the topology of the network are considered as a big challenge For routing in these networks, routing protocols must be robust and reliable. AODV Routing pr...

متن کامل

Performance of the PNNI Protocol in Large Networks

Supporting guaranteed services in a large network requires solutions to many diicult problems. In this paper, we focus on the problem of on-demand routing of virtual circuits with quality of service guarantees. Speciically, we investigate the performance of the ATM Private Network-Network Interface (PNNI) protocol in a large topology with structure reeecting the hierarchy and locality present i...

متن کامل

TAC: A Topology-Aware Chord-based Peer-to-Peer Network

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCS

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2014