Analysis of Applications Through IP VPN

ENSC427: Communications Networks
Spring 2014

Project Group 12
Lee, Tony - leetonyl at sfu.ca
Nguyen, Anthony - anthonyn at sfu.ca
Truong, Henson - hensont at sfu.ca

Presentation Slides Final Report
Abstract
Virtual Private Network (VPN) technology connect computer clients from a private network, across a public network, such as the Internet, to another private network, while still guaranteeing the security, user experience, and integrity of a private network. The use of a VPN connection can cause a non-desirable effect on the performance of applications. We plan to analyze the performance of various applications typically used by corporations using OPNET.


References
[1] (12 March 2014) F. Parkar and K. Wong, "Analysis of IP VPN Performance." [Online]. Available: http://www2.ensc.sfu.ca/~ljilja/ENSC427/Spring12/Projects/team12/ENSC427_Group12_FinalReport_Spring2012.pdf.
[2] (22 March 2014) "Firewalls and VPN Networks," [Online]. Available: http://www.eng.tau.ac.il/~netlab/resources/booklet/lab11.pdf.
[3] (22 March 2014) "How much does VPN slow my Internet down?," Cactus VPN, [Online]. Available: www.cactusvpn.com/vpn/vpn-slow-internet-connection.
[4] (4 April 2014) P. Ferguson, Cisco Systems and G. Huston, Telstra, "What Is a VPN?," Cisco, [Online]. Available: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/what_is_a_vpn.html.
[5] (12 February 2014) S. Hussein and A. Hadi, "The Impact of Using Security Protocols in Dedicated Private Network and Virtual Private Network," International Journal of Scientific and Technology Research, [Online]. 11(2), pp. 170-175. Available: http://www.ijstr.org/final-print/nov2013/The-Impact-Of-Using-Security-Protocols-In-Dedicated-Private-Network-And-Virtual-Private-Network.pdf.
[6] (9 April 2014) B. Marcel "Secure Data Access for Home Users", Tom's Hardware, [Online]. Available: http://www.tomshardware.com/reviews/secure-remote-access,1803-2.html.
[7] (2 April 2014) "What is VPN?," [Online]. Available: technet.microsoft.com/en-us/library/cc731954(v=ws.10).aspx
[8] (2 April 2014) X. Bau and F. Zhang, "The Application of VPN Technology in the University's Library," 2011 IEEE 3rd Conference on Communication Software and Networks (ICCSN) , pp. 563-566, May 2011.
[9] (3 April 2014) "How Virtual Private Networks Work," (13 October 2008), Cisco, [Online]. Available: http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106-how-vpn-works.html.