• Login
    View Item 
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Performance evaluation of virtual private network protocols in Windows 2003 environment

    Narayan, Shaneel; Kolahi, Samad; Brooking, Kris; de Vere, Simon

    Thumbnail
    Share
    View fulltext online
    Performance Evaluation of Virtual Private Network Protocols in Windows 2003 Environment.pdf (342.2Kb)
    Date
    2008-12-20
    Citation:
    Narayan, S., Kolahi, S.S., Brooking, K., and de Vere, S. (2008). Performance Evaluation of Virtual Private Network Protocols in Windows 2003 Environment. 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE 2008). CD Rom : 69-73.
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3386
    Abstract
    Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses nowadays implement VPN tunnels using different protocols that guarantee data authenticity and security between multiple sites connected using public telecommunication infrastructure. VPN provides a low-cost alternative to leasing a line to establish communication between sites. In this research we empirically evaluate performance difference between three commonly used VPN protocols, namely Internet Protocol Security (IPSec), Point-to-Point Tunneling Protocol (PPTP) and Secure Socket Layer (SSL). We compare performance differences in these protocols by implementing each using different algorithms in a Windows Server 2003 environment. Results obtained indicate that throughput in a VPN tunnel can range from approximately 40 to 90Mbps depending on the choice of protocol, algorithm and window size. These three attributes also govern CPU utilization of VPN servers.
    Keywords:
    virtual private network (VPN), performance analysis, Windows Server 2003, Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPsec), Layer 2 Tunneling Protocol (L2TP)
    ANZSRC Field of Research:
    080503 Networking and Communications, 080303 Computer System Security
    Copyright Holder:
    Institute of Electrical and Electronics Engineers (IEEE)
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: Any use you make of these documents or images must be for research or private study purposes only, and you may not make them available to any other person. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [147]

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142
     

     

    Usage

    Downloads, last 12 months
    60
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankResearch at UnitecContact us

    Help for authors  

    How to add researchOpen Access GuideVersions Toolkit

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereAcademic study areasAuthorDateSubjectTitleType of researchSupervisorThis CollectionAuthorDateSubjectTitleType of researchSupervisor

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142