Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol

نویسندگان

چکیده

Dynamic Multipoint Virtual Private Network (DMVPN) technology is one of Cisco's solutions to overcome the limitations VPN scalability. DMVPN has a combination components: Next hop resolution protocol (NHRP), Generic Routing Encapsulation (mGRE) and protocol. This research implements simple network consisting Hub, Spoke1, Spoke2, Lan1, Lan2 Lan3 using GNS3 simulator. study compares performance IPSec without IPsec on BGP parameters namely delay, throughput, jitter packet loss evaluate security impact network. The results this indicate that an effect sending UDP packets which have throughput value 5082.18 kbit/s while IPSec's 5034.40 kbit/s. 7.54% 4.79%. same value. delay 0.183s 0.410s. TCP delivery 1139.16 1105.20 0.185s 0.187s.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Border Gateway Protocol Routing

Posted April 24, 2014 3:11pm by cbloomf2 [1] Course and Section NumberProgram: TCOM Course Number: 610 Section Number: DL1 Instructor: Khan, T. SemesterSemester: Fall Year: 2014 Time and PlaceClass Time: Tuesday 7:20-10:00 Class Room: ENGR 1108 Notes: TCOM 610 DL1 is a distance education section. Students have the option of the attending the corresponding lecture section on campus but must be r...

متن کامل

Border Gateway Protocol (BGP) Routing

Thanks [4] 6 years 15 weeks ago Hi Amit, It is really great. [5] 6 years 15 weeks ago Vets [6] 6 years 38 weeks ago Thank you [7] 7 years 1 week ago Heartiest Congratulations to Amit [8] 7 years 4 weeks ago Thank you! [9] 7 years 6 weeks ago Thanks a lot. [10] 7 years 6 weeks ago Congrats!!! [11] 7 years 6 weeks ago Non Degree course [12] 8 years 6 days ago Have you taken Prof. [13] 8 years 1 w...

متن کامل

Securing the Border Gateway Routing Protocol

We analyze the security of the BGP routing protocol, and identify a number of vulnerabilities in its design and the corresponding threats. We then present a set of proposed modifications to the protocol which minimize or eliminate the most significant threats. The innovation we introduce is the protection of the second-to-last information contained in the AS PATH attributes by digital signature...

متن کامل

cient Security Mechanisms for The Border Gateway Routing Protocol 1

We analyze the security of the BGP routing protocol and identify a number of vulnerabilities in its design and the corresponding threats. We then present modi cations to the protocol that minimize or eliminate the most signi cant threats. The innovation we introduce is the protection of the second-to-last hop information contained in the AS PATH attributes by digital signatures, and the use of ...

متن کامل

Securing the Border Gateway Protocol

outing in the public Internet is based on a distributed system composed of many routers, grouped into management domains called Autonomous Systems (ASes). ASes are operated by Internet Service Providers (ISPs) and by multihomed subscribers. (Throughout the remainder of this article, for brevity, we will talk in terms of ISPs, usually omitting references to multihomed subscribers.) Routing infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Building of Informatics, Technology and Science (BITS)

سال: 2022

ISSN: ['2684-8910', '2685-3310']

DOI: https://doi.org/10.47065/bits.v4i2.1836