Title :
Performance Evaluation of Virtual Private Network Protocols in Windows 2003 Environment
Author :
Narayan, Shaneel ; Kolahi, Samad S. ; Brooking, Kris ; de Vere, S.
Author_Institution :
UNITEC
Abstract :
Virtual private network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses nowadays implement VPN tunnels using different protocols that guarantee data authenticity and security between multiple sites connected using public telecommunication infrastructure. VPN provides a low-cost alternative to leasing a line to establish communication between sites. In this research we empirically evaluate performance difference between three commonly used VPN protocols, namely Internet Protocol Security (IPSec), Point-to-Point Tunneling Protocol (PPTP) and Secure Socket Layer (SSL). We compare performance differences in these protocols by implementing each using different algorithms in a Windows Server 2003 environment. Results obtained indicate that throughput in a VPN tunnel can range from approximately 40 to 90 Mbps depending on the choice of protocol, algorithm and window size. These three attributes also govern CPU utilization of VPN servers.
Keywords :
IP networks; message authentication; operating systems (computers); performance evaluation; protocols; telecommunication computing; telecommunication security; virtual private networks; IPSec; Internet protocol security; PPTP; SSL; Windows Server 2003 environment; data authenticity; data security; information technology infrastructure; performance evaluation; point-to-point tunneling protocol; public telecommunication infrastructure; secure data communication; secure socket layer; virtual private network protocol; Data security; Information security; Information technology; Internet; Protocols; Sockets; Throughput; Tunneling; Virtual private networks; Web server; IPSec; L2TP; PPTP; VPN; Windows 2003; performance evaluation; tunneling;
Conference_Titel :
Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
Conference_Location :
Phuket
Print_ISBN :
978-0-7695-3489-3
DOI :
10.1109/ICACTE.2008.187