Abstract : Internet Protocol version 6(Pv6) is the advanced version of the IPv4 protocol and both of these protocols are part of TCP/IP suite.TCP/IP is the only protocol for transmission of data over the internet As the internet is not secure place for transmission of secure and confidential information (packets) So to protect this information over the non secure channels(internet ) the IPSec was introduced .IPSec is the worldly know standard for the secure transmission over the internet . IPSec is mandatory for IPv6 and optional for IPv4 deployments .But as the IPsec provides authentication, confidentiality and integrity of the internet protocol (IP) packets but it slows down the transmission devices and where there is huge transmission of data like in Gbps at the backbone networks, the performance of the transmission devices is highly effected .
So to improve the transmission rate on high performance networks number of techniques have been used till now and these techniques are the valuable addition in the current technologies .Purpose of this paper is to high light , what types of techniques are available in the current time for improving the performance of the transmission devices both at the H/W and S/W level while applying the IPSec and what drawbacks in the already existing techniques .
Keywords: Internet Protocol Security (IPsec), IPv6 , Internet Security, Virtual Private Network(VPN) security ,IPsec for high performance networks.
Introduction :As in the current era the internet is widely used for sending and receiving information in a very fast way. As internet is not only used by the single user but huge companies (enterprises) use them for their business use . An enterprises may have their offices at different l...
... middle of paper ...
...yer of TCP/IP working like SSL and these all security protocols need security parameter for establishing a secure connection over the network and each security protocol is doing this by negotiation their own security parameter with the other party. That’s why each security protocol is negotiating its security parameter independently which is the wastage of network resources.[3]
The author proposes his solution that each security protocol will maintain its set of negotiating parameters which is called DoI (Domain of interpretation ).ISAKMP will store these agreed security parameters into a file which is called SA file and group of SA are stored in a database and other security protocol will use these security parameter instead of negotiating their own and thus avoiding the duplicity. [3].
Figure 6 :Relation of Security Protocol through ISAKMP negotiation[3]
With an IPv4 network, all the work consisting of network renumbering and assigning of new address schemes would had been done manually. Another useful feature of IPv6 is the multi-homing technique. It allows simultaneous connections which are established to two ISPs. Compared to IPv4, IPv6 has a much simpler packet header structure, which is designed to minimize the time and efforts that go in to header processing. IPv6 offers better end-to-end connectivity than its predecessor IPv4. The most exciting applications to emerge in todays world is peer-to-peer applications such as multi-player online games, video-conferencing (streaming), file sharing and
IPSec – Internet Protocol Security (IPsec) - is a protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.
The Internet, originally arising from the American military, has grown to a main source of communication for millions around the world and has helped in creating a global village. The Internet started gaining fast acceptance in the 1990's especially in North America. Countries such as China however, still have limited access and control over the contents on the internet allowed ...
My project mainly focuses on relatively new field of study in Information Technology known as cryptography. This topic will take an in-depth look at this technology by introducing various concepts of cryptography, a brief history of cryptography and a look at some of the cryptography techniques available today. This will have a close look at how we can use cryptography in an open-systems environment such as the Internet, as well as some of the tools and resources available to help us accomplish this.
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
Roger Dingledine, Nick Mathewson, Paul Syverson. Tor: The Second-Generation Onion Router. Washington DC: Naval Research Lab, 2004.
Network Address Translation (NAT) is a standard used to allow multiple PCs on a private network to share a single, globally routable IPv4 address. NAT enables a user to have a large set of addresses internally and usually one address externally. The main reason NAT is often deployed is because IPv4 addresses are getting scarce. NAT is an immediate, but temporary, solution to the IPv4 address exhaustion problem that will eventually be rendered unnecessary with the deployment of the IPv6. The Internet Engineering Task Force has been aware of the impending depletion of the current address space for almost a decade.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Although VPN is very popular in the market for networking technology, it may raise some concerns for IT managers. VPN requires an in-depth understanding of public network security issues and proper deployment precautions. The task of choosing and deploying a VPN solution is far from being simple and may require the training of workers in at least the basics...
Internet is a free platform where everyone can launch or release whatever they want to that market. With such characteristic of the Internet, the products, services or creations may, in a se...
capacity and performance. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats. To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today's networks.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Since the development of the Internet in late 1980s, communication has changed enormously. The Internet has altered the lives of people in the world in a way that was never imagined before. As little as a decade ago, if someone tried to explain the Internet and World Wide Web, it would have been difficult, if not impossible, to understand. Computers were just beginning to become popular and few individuals realized the capacity of one PC, let alone the power of a network of electronic technology. By linking together computers, users could remotely access others on the network, share information, and send electronic mail as easily as pushing a button. Millions of people with shared interests, exchange information and build communities through Web sites, email and instant-messaging software.
The Internet has become a key ingredient of strenuous and busy lifestyle. ‘Internet’ has become the central-hub for communication, explorations, connecting with people or for official purposes. Resultantly, Internet growth has led to a plethora of new developments, such as decreased margins for companies as consumers turn more and more to the internet to buy goods and demand the best prices.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...