Performance Investigation of IP Security Virtual Private Network in Ipv6 Environment using Quality of Service
DOI:
https://doi.org/10.25007/ajnu.v12n2a1155Abstract
Different types of data are transmitted through the internet, these data such as Email, HTTP, FTP and VoIP conversation might contain important and sensitive information which can be read or seen by other users. Many attacks such as man in the middle, packet sniffing and phishing are available and used by many attackers, as a way to access the protected information. Based on this fact, security and privacy become a necessity in the field of private network (intranet) and public network (extranet). IP sec VPN is considered to be the strongest technique for protecting packets from any kind of attack. In this paper, an analytical study is accomplished using opnet simulation software to design and analyze the proposed network. The proposed network represents four sites in different cities are communicating using the technique of IPsec VPN, different scenarios are created and studied to investigate the performance of network using IPsec VPN in IPV6 environment with QoS. The investigated metrics were packet end to end delay, jitter, packet delay variation, download and upload response time.
Downloads
References
Abdulazeez, A. Salim, B. Zeebaree, D. and Doghramachi, D. 2020 “Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol”. International journal of Interactive Mobile Technologies (iJIM) 14(18), November 2020.
Babu, M. & Ambedkar, B. 2012, “ Performance Analysis of IPSec VPN over VoIP Networks Using OPNET” International Journal of Advanced Research in Computer Science and Software Engineering , Volume 2, Issue 9, September 2012.
Bensalah, F. El Kamoun, N. and BAHNASSE, A. 2017. “Evaluation of tunnel layer impact on VOIP performances (IP – MPLS – MPLS VPN – MPLS VPN IPsec”. IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017.
Hafiz, A and Susianto, D. 2019. “Analysis of Internet Service Quality Using Internet Control
Message Protocol”. Journal of Physics Conference Series, October 2019.
Jabbar, S. and Ahmad, I. “Design and Deployment of IPSec VPN Using CISCO Network Infrastructure”. International Journal of Scientific Research in Computer Science, Engineering and Information Technology Volume 5 Issue 6, November-December 2019.
Nagy, Z. and Wali, M. 2020. “Virtual private network impacts on the computer network performance with different traffic generators” , IOP Conference Series: Materials Science and Engineering Volume 881 , 3rd International Conference on Sustainable Engineering Techniques (ICSET 2020) 15 April 2020.
Nassir, S. & HadiQais, A. 2013, “The Impact Of Using Security Protocols In Dedicated Private Network And Virtual Private Network” ,INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY Research Volume 2, Issue 11, November 2013.
Nura, M. & Mohammed, A. 2015," Investigating Space Overhead by IPSec on IPv4 and IPv6 Communication Protocols "Communications, Vol. 3, No.1, 2015, pp. 11-23.
Miraz, M. Ganie, M. , Molvi, S and Ali, M. 2017 “Simulation and Analysis of Quality of Service (QoS) Parameters of Voice over IP (VoIP) Traffic through Heterogeneous Networks). International Journal of Advanced Computer Science and Applications (IJACSA)), Vol. 8, No. 7, 2017.
OPNET PROJECTS TEAM. CUSTOMIZED OPNET SIMULATOR PROJECTS. “OPNET NETWORK SIMULATOR”2005-2019. {Online}.
Available from: http://opnetprojects.com/opnet-network-simulator/
Accessed on [18th June 2022].
Paresh, S. Mukhopadhyaya, U and Sathiamurthi, A. “Overview of QoS in Packet-based IP and MPLS Networks”. [online]
Avaliable From: https://archive.nanog.org/meetings/nanog36/presentations/sathiamurthi.pdf
Accessed on [18th June 2022].
Sharma, T and Shiwani, S. 2013. “Statistical Results of IPSec in IPv6 Networks”. International Journal of Computer Applications (0975 – 8887) Volume 79 – No.2, October 2013.
Simatimbe, C. and Lubobya, S. 2010. “Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network” . Journal of Computer and Communications . Vol 8, 100 – 108 September 2020.
Strzeciwilk, D. Ptaszek, K, Hoser, P and Antoniku, I . 2018. “A research on the impact of encryption algorithms on the quality of VPN tunnels' transmission” . ITM Web of Conferences 21, 00011 (2018).
Sugeng, W. Eko, J. Mustofa, K and Ashari, A. 2015, “The Impact of QoS Changes towards Network Performance” , International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48–53
Suliman, E. & Babiker, A. 2015, “The Impact of Security Overhead Traffic on Network‘s Resources Performance”,IOSR Journal of Computer Engineering (IOSR-JCE) Volume 17, Issue 1, Jan-Feb 2015.
Thiruvasagam, P and George, K. 2019 “IPSec: Performance Analysis in IPv4 and IPv6”.Journal of ICT Standardization. Issue 1, volume 7, Page: 61-80, January 2019.
Vee, A. 2012, “Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions”. M.sc dissertation, Texas A&M University-Corpus Christi, spring 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Academic Journal of Nawroz University

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.