Performance Analysis of 4to6 and 6to4 Transition Mechanisms over Point to Point and IPSec VPN Protocols

被引:0
作者
Narayan, Shaneel [1 ]
Ishrar, Salman [1 ]
Kumar, Avinesh [1 ]
Gupta, Ruchinav [1 ]
Khan, Ziafil [1 ]
机构
[1] Unitec Inst Technol, Auckland, New Zealand
来源
2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN) | 2016年
关键词
Transition mechanism; IPv4; IPv6; 4to6; 6to4; PPTP; IPsec; VPN; performance evaluation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms we will be evaluating are 4to6 and 6to4. Both of these mechanism have certain advantages and disadvantages. VPN protocols, PPTP and IPsec were configured on the transition mechanism and compared with selected networking metrics. The key networking metrics that were captured in this research were throughput, delay, jitter, DNS throughput, DNS delay, DNS jitter, for both TCP and UDP protocols. VoIP throughput was also measured and discussed. The testbed consisted of two (IPv4/IPv6) capable Cisco routers, and two machines which were running Windows 7 and Windows Server 2012.
引用
收藏
页数:7
相关论文
共 16 条
  • [1] [Anonymous], 2009, 2009 IFIP INT C WIRE, DOI DOI 10.1109/WOCN.2009.5010548
  • [2] Avallone S, 2004, INT CONF QUANT EVAL, P316
  • [3] Bahaman N., 2012, 2012 International Conference on Innovation Management and Technology Research, P263, DOI 10.1109/ICIMTR.2012.6236400
  • [4] Chen JL, 2004, 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, P545
  • [5] Gilligan R., 1996, REQUEST COMMENTS 193
  • [6] Govil J, 2008, PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, P178
  • [7] Maula A., 2010, REV QUALITATIVE ANAL, P1
  • [8] Narayan S., 2010, P IEEE 2 INT C SIGN, pV2
  • [9] The influence of wireless 802.11g LAN encryption methods on throughput and round trip time for various Windows operating systems
    Narayan, Shaneel
    Kolahi, Samad S.
    Sunarto, Yonathan
    Nguyen, Du D. T.
    Mani, Paul
    [J]. CNSR 2008: PROCEEDINGS OF THE 6TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2008, : 171 - 175
  • [10] Network Performance Analysis of VPN Protocols: An empirical comparison on different operating systems
    Narayan, Shaneel
    Brooking, Kris
    de Vere, Simon
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 645 - 648