Research Article

Article:Performance Analysis of IP Security VPN

by  Ritu Malik, Rupali Syal
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Issue 4
Published: October 2010
Authors: Ritu Malik, Rupali Syal
10.5120/1202-1393
PDF

Ritu Malik, Rupali Syal . Article:Performance Analysis of IP Security VPN. International Journal of Computer Applications. 8, 4 (October 2010), 5-9. DOI=10.5120/1202-1393

                        @article{ 10.5120/1202-1393,
                        author  = { Ritu Malik,Rupali Syal },
                        title   = { Article:Performance Analysis of IP Security VPN },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 8 },
                        number  = { 4 },
                        pages   = { 5-9 },
                        doi     = { 10.5120/1202-1393 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Ritu Malik
                        %A Rupali Syal
                        %T Article:Performance Analysis of IP Security VPN%T 
                        %J International Journal of Computer Applications
                        %V 8
                        %N 4
                        %P 5-9
                        %R 10.5120/1202-1393
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec has become the most common network layer security control and, a widely deployed mechanism for implementing Virtual Private Networks (VPNs). This paper presents analysis of IPSec VPN for videoconference in real time traffic over a secure communication links by implementing an IPSec-based VPN technology.

References
  • http://nislab.bu.edu/sc546/sc441Spring2003/ip_sec/Why%20it%20is%20important.htm.
  • Roland, J.F., and Newcomb, M.J., 2003, CSVPN Certification Guide, CISCO Press
  • Kent S, Atkinson R. Security architecture for the Internet protocol, RFC 2401 , 1998.
  • L.A. Sanchez, H. Orman. A Roadmap for IPSec Policy Management draft- ietf- ipsp- roadmap- 01.txt, November 16, 2000.
  • http://technet.microsoft.com/en-us/library/ bb726946.aspx
  • Doraswamy, N., and Harkins, D., 2003, ‘The New Standard for the Internet, Intranets, and Virtual Private Networks: Prentice-Hall’ ISBN: 013046189-X
  • Niemi, A., “End-to-end web security – protocol overview”, Department of Computer Science University of Helsinki, Finland, December 2003.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Authentication Header (AH) Encapsulating Security Payload (ESP) IP Security (IPSec) Tunnel Transport Virtual Private Networks (VPN) Quality of Service (QoS)

Powered by PhDFocusTM