IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 11, November 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



The Impact Of Using Security Protocols In Dedicated Private Network And Virtual Private Network

[Full Text]

 

AUTHOR(S)

Dr. Sabah Nassir Hussein FCMI, Abdul HadiQais Abdul Hadi

 

KEYWORDS

Keywords: VPN; Security protocols; dedicated private network.

 

ABSTRACT

Abstract: With the development of computer networks techniques and the increased use of private networks, the intrusion and attack on these networks also increased, so the use of the protection protocols became necessary, but using these protocols will reduce the quality of the performance of these networks. This research highlights the impact of using security protocols on two types of private networks. The OPNET version 14.0 has been used to simulate the two networks and to apply the different types of security protocols such as (L2TP,PPTP, and IPsec).

 

REFERENCES

[1]. Shah Deval and Helen Holzbaur, “Virtual Private Networks: Security With an Uncommon Touch,” Data Communications,Sept. 1998.

[2]. “VPN Technologies: Definitions and Requirements”, Paper, VPN Consortium, July 2008.

[3]. Muhammad Aamir1, Mustafa Zaidi and HusnainMansoor“the concept of Performance Analysis of Diff Serve based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET”, in 2007

[4]. H. Bourdoucen, A. Al Naamany and A. Al Kalbani “Impact of Implementing VPN to Secure Wireless LAN ” International Journal of Computer and Information Engineering 3:1 2009

[5]. N. Edde, Security Complete, Second Edition, 2002.

[6]. R. Malhotra, R. Narula, "Techno-Evaluation and Empirical Study of VirtualPrivate Networks Using Simulations," Journal of Computing, Volume 3, Issue 7, July 2011.

[7]. R. Fisli, “Secure Corporate Communications over VPN-Based WANs,” Master’s Thesis in Computer Science at the School of Computer Science and engineering, Royal Institute of Technology, Sweden, 2005..

[8]. R. Malhotra, R. Narula, "Techno-Evaluation and Empirical Study of Virtual Private Networks Using Simulations," Journal of Computing, Volume 3, Issue 7, July 2011.

[9]. M. Finlayson ,J. Harrison ,R. Sugarman, "VPN TECHNOLOGIES - A COMPARISON" February 2003, updated June 2004.

[10]. Security Architecture for the Internet Protocol (RFC 2401)

[11]. IP Security Document Roadmap (RFC 2411)

[12]. V. Manral, “Cryptographic Algorithm Implementation Requirements for (ESP) and (AH)” RFC 4835, April 2007.

[13]. S. Kent, “IP Authentication Header”, RFC4302, December 2005.