Design, Implementation and Performance Evaluation of IP-VPN
نویسندگان
چکیده
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a network; rather, the question to ask is if security has been implemented properly and the interoperability with today’s network architecture. Although there are various ways to perform a secure network environment, but the most popular and the most progressive network security mechanism is Security Architecture for IP (IPSec), offered by IETF (Internet Engineering Task Force). In this paper, we will discuss the problems when combine IPSec into current TCP/IP module by porting an IPSec shareware (FreeS/WAN) into a router. Finally, in order to understand the impact on router’s performance when using various services and hash/encryption algorithms provided by IPSec, we testing the throughput of the router before and after applying IPSec.
منابع مشابه
A Policy-based Network Management System for IP VPN
Even though IP VPN has practically proven itself to be a cost-effective solution, the lack of centralized network management capabilities of current IP VPN deployment makes the management of growing VPN networks an extremely tedious procedure. This paper proposes to use policy-based network management method to address this challenge. Firstly, a policy-based IP VPN management architecture is pr...
متن کاملSIP over IP VPN: Performance Analysis
With rapid growth in use of multimedia applications, including IP Telephony (also known as Voice over IP), the demand for security and privacy of communications has significantly increased. Given the fact that IP Telephony utilizes public IP infrastructure, deployment of IP VPN is one approach to protect traffic of interest. However, VPN is presumed to have a negative impact on VOIP performance...
متن کاملDesign of a VPN Software Solution Integrating TCP and UDP Services
Virtual Private Network (VPN) solutions mainly focus on security aspects. Their main aims are to isolate a distributed network from outsiders and to protect the confidentiality and integrity of sensitive information traversing a non-trusted network such as the Internet. But when security is considered the unique problem, some collateral ones arise. VPN users suffer from restrictions in their ac...
متن کاملDesign and implementation of the performance evaluation system for Units (Saeb system)
This article has no abstract.
متن کاملImplementation of Multi Protocol Label Switching – Virtual Private Network for Corporate Networks
Recently MPLS is used for building up VPNs in IP backbone, called MPLS VPN. To provide people with voice, data and all categories of multimedia services, distinguishing between data flows is a requirement. To address these router performance, Quality of Service and traffic engineering issues, Multi Protocol Label Switching (MPLS) was proposed for IP based internetworks. To achieve the security ...
متن کامل