Tunneling Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2679 Experts worldwide ranked by ideXlab platform

Carlos Pignataro - One of the best experts on this subject based on the ideXlab platform.

Sharon Galtzur - One of the best experts on this subject based on the ideXlab platform.

Li Xue - One of the best experts on this subject based on the ideXlab platform.

  • VTC Fall - A Software Defined Semi Distributed Mobility Management System Based on Layer 2 Backhaul Network
    2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015
    Co-Authors: Jyotirmoy Banik, Yiding Luo, Jonathan Seawright, Marco Tacca, Andrea Fumagalli, Behcet Sarikaya, Li Xue
    Abstract:

    This paper presents a software defined networking (SDN) based semi-distributed mobility management system. By both using an SDN approach and leveraging layer 2 technology, i.e., carrier grade Ethernet and the 802.1ad standard, it is possible to simplify the network architecture by removing the need for the relatively complex GPRS Tunneling Protocol currently in use in the user plane. An analytical model is used to evaluate the control overhead of the proposed approach and a proof of concept testbed based on OpenFlow running the Floodlight controller is presented. Obtained results demonstrate that, as long as the SDN controller can quickly react to user mobility, frame loss can be mitigated and the proposed architecture is viable.

Meng Yang - One of the best experts on this subject based on the ideXlab platform.

  • Research on Implemention Techniques of L2TP Tunneling with IPSec
    Computer Science, 2004
    Co-Authors: Meng Yang
    Abstract:

    It is well known that tunnelling is a crucial technique for constructing Virtual Private Network(VPN). At present, tunnelling Protocol primarily has two categories: data layer Tunneling Protocol and network layer tunnelling Protocol. From the view of security, data layer tunnelling Protocol provides authentication based on user and connection; and network layer tunnelling Protocol provides data encryption. Since IPSec and L2TP are respectively representative security Protocols in data layer and network layer, research and implemention of L2TP tunnelling with IPSec are focused. In this paper, the principles of L2TP tunnelling with IPSec are researched at first,then a scheme of L2TP tunnel and IPSec tunnel is designed; at last, the future of VPN with L2TP and IPSec is proposed.

Sajeeb Saha - One of the best experts on this subject based on the ideXlab platform.

  • application specific Tunneling Protocol selection for virtual private networks
    International Conference Networking Systems and Security, 2017
    Co-Authors: Sohely Jahan, Md Saifur Rahman, Sajeeb Saha
    Abstract:

    The application scope of VPN is increasing day by day as the organizations are creating private networks through public Internet using VPN Tunneling instead of leased line. VPN Protocols are classified into site-to-site and remote access VPN which exhibits different set of characteristics in terms of security mechanism. But there is no VPN preferences based on the organizational application requirements. In this paper, different VPN Tunneling Protocols like GRE, IPSec, PPTP and L2TP with IPSec are analyzed to measure the performance in terms of throughput, RTT, Jitter and security parameters. The results exhibits that, GRE is preferable for delay and bandwidth sensitive application in context of site to site VPN and L2TP is more effective than PPTP for remote access VPN.

  • NSysS - Application specific Tunneling Protocol selection for Virtual Private Networks
    2017 International Conference on Networking Systems and Security (NSysS), 2017
    Co-Authors: Sohely Jahan, Saifur Rahman, Sajeeb Saha
    Abstract:

    The application scope of VPN is increasing day by day as the organizations are creating private networks through public Internet using VPN Tunneling instead of leased line. VPN Protocols are classified into site-to-site and remote access VPN which exhibits different set of characteristics in terms of security mechanism. But there is no VPN preferences based on the organizational application requirements. In this paper, different VPN Tunneling Protocols like GRE, IPSec, PPTP and L2TP with IPSec are analyzed to measure the performance in terms of throughput, RTT, Jitter and security parameters. The results exhibits that, GRE is preferable for delay and bandwidth sensitive application in context of site to site VPN and L2TP is more effective than PPTP for remote access VPN.