Performance evaluation of virtual private network protocols in Windows 2003 environment
Loading...
Supplementary material
Other Title
Authors
Narayan, Shaneel
Kolahi, Samad
Brooking, Kris
de Vere, Simon
Kolahi, Samad
Brooking, Kris
de Vere, Simon
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2008-12-20
Supervisors
Type
Conference Contribution - Paper in Published Proceedings
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
virtual private network (VPN)
performance analysis
Windows Server 2003
Point-to-Point Tunneling Protocol (PPTP)
Internet Protocol Security (IPsec)
Layer 2 Tunneling Protocol (L2TP)
performance analysis
Windows Server 2003
Point-to-Point Tunneling Protocol (PPTP)
Internet Protocol Security (IPsec)
Layer 2 Tunneling Protocol (L2TP)
ANZSRC Field of Research Code (2020)
Citation
Narayan, S., Kolahi, S.S., Brooking, K., and de Vere, S. (2008). Performance Evaluation of Virtual Private Network Protocols in Windows 2003 Environment. 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE 2008). CD Rom : 69-73.
Abstract
Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses nowadays implement VPN tunnels using different protocols that guarantee data authenticity and security between multiple sites connected using public telecommunication
infrastructure. VPN provides a low-cost alternative to leasing a line to establish communication between sites. In this research we empirically evaluate performance difference between three commonly used VPN protocols, namely Internet Protocol Security (IPSec), Point-to-Point Tunneling Protocol (PPTP) and Secure Socket Layer (SSL).
We compare performance differences in these protocols by implementing each using different algorithms in a Windows Server 2003 environment. Results obtained indicate that throughput in a VPN tunnel can range from approximately 40 to 90Mbps depending on the choice of protocol, algorithm and window size. These three attributes also govern CPU utilization of VPN servers.
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Permanent link
Link to ePress publication
DOI
10.1109/ICACTE.2008.187
Copyright holder
Institute of Electrical and Electronics Engineers (IEEE)
Copyright notice
All rights reserved