PERFORMANCE OF TOPOLOGY AWARE RELIABLE ROUTING PROTOCOL FOR LARGE SCALE VIRTUAL PRIVATE NETWORK
- 1 Sathyabama University, India
- 2 , India
Abstract
A network which merges the usage of the public and the private networks and uses security software for the purpose of compressing, encrypting and masking the digital packets that are being transmitted in the network is called as Virtual Private Network (VPN). In VPN, the communication between the user ends is maintained such that it appears as if the source end is directly linked to the destination end over a concealed leased line. The private network, VPN uses the public network such as internet to link the remote locations with the users. In this study, we propose a new reliable protocol called as Topology Aware Reliable Routing Protocol (TARRP) for large scale VPN and compare its performance with the traditional protocol, Boarder Gateway Protocol (BGP). In this protocol, the communication between the end to end nodes takes place in two phases: Routing phase and authentication phase. In the routing phase, the upstream and the downstream routing paths are determined by the source node using the topology learning protocol. Based on the dynamic failure information of links, the sender selects the failure-free path towards the destination. In the authentication phase, the VPN gateway authenticates the packet before it is transmitted through the core. Thus, this technique efficiently allows the packet to be transmitted with ensured security. By simulation results, we show that our proposed protocol is better than the traditional routing protocol of VPN.
DOI: https://doi.org/10.3844/jcssp.2014.1874.1880
Copyright: © 2014 Jayanthi Gokulakrishnan and V. Thulasi Bai. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,310 Views
- 2,255 Downloads
- 0 Citations
Download
Keywords
- Routing Protocol
- Authentication
- Encryption
- Throughput