Research Article Open Access

PERFORMANCE OF TOPOLOGY AWARE RELIABLE ROUTING PROTOCOL FOR LARGE SCALE VIRTUAL PRIVATE NETWORK

Jayanthi Gokulakrishnan1 and V. Thulasi Bai2
  • 1 Sathyabama University, India
  • 2 , India

Abstract

A network which merges the usage of the public and the private networks and uses security software for the purpose of compressing, encrypting and masking the digital packets that are being transmitted in the network is called as Virtual Private Network (VPN). In VPN, the communication between the user ends is maintained such that it appears as if the source end is directly linked to the destination end over a concealed leased line. The private network, VPN uses the public network such as internet to link the remote locations with the users. In this study, we propose a new reliable protocol called as Topology Aware Reliable Routing Protocol (TARRP) for large scale VPN and compare its performance with the traditional protocol, Boarder Gateway Protocol (BGP). In this protocol, the communication between the end to end nodes takes place in two phases: Routing phase and authentication phase. In the routing phase, the upstream and the downstream routing paths are determined by the source node using the topology learning protocol. Based on the dynamic failure information of links, the sender selects the failure-free path towards the destination. In the authentication phase, the VPN gateway authenticates the packet before it is transmitted through the core. Thus, this technique efficiently allows the packet to be transmitted with ensured security. By simulation results, we show that our proposed protocol is better than the traditional routing protocol of VPN.

Journal of Computer Science
Volume 10 No. 9, 2014, 1874-1880

DOI: https://doi.org/10.3844/jcssp.2014.1874.1880

Submitted On: 20 February 2014 Published On: 23 June 2014

How to Cite: Gokulakrishnan, J. & Bai, V. T. (2014). PERFORMANCE OF TOPOLOGY AWARE RELIABLE ROUTING PROTOCOL FOR LARGE SCALE VIRTUAL PRIVATE NETWORK. Journal of Computer Science, 10(9), 1874-1880. https://doi.org/10.3844/jcssp.2014.1874.1880

  • 2,514 Views
  • 1,793 Downloads
  • 0 Citations

Download

Keywords

  • Routing Protocol
  • Authentication
  • Encryption
  • Throughput