2nd International Conference on Broadband Networks, 2005. 2005
DOI: 10.1109/icbn.2005.1589696
|View full text |Cite
|
Sign up to set email alerts
|

Tunneling techniques for end-to-end VPNs: generic deployment in an optical testbed environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…To address that, an end‐to‐end secure VPN connection must be established with each ISP and LEA. However, with so many endpoints and the constant flow of huge data through a central node, providing accessibility at all times would be challenging (Saad et al., ). While expensive and liable to creating more security concerns, setting up data centers in a few different places by cloning the global database and utilizing cloud computing more effectively could be a reasonable option to handle the enormous data load.…”
Section: Discussionmentioning
confidence: 99%
“…To address that, an end‐to‐end secure VPN connection must be established with each ISP and LEA. However, with so many endpoints and the constant flow of huge data through a central node, providing accessibility at all times would be challenging (Saad et al., ). While expensive and liable to creating more security concerns, setting up data centers in a few different places by cloning the global database and utilizing cloud computing more effectively could be a reasonable option to handle the enormous data load.…”
Section: Discussionmentioning
confidence: 99%
“…Another study by Saad et al [16] has discussed the effect of MPLS-based tunnels on end-to-end virtual connection service and security. The study shows that applying IPSec in MPLS-based tunnels reduces overall throughput of Transmission Control Protocol flow and adds more overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Tunneling techniques such as L2TP, GRE or MPLS take advantage of encapsulation, which prepends an additional network header to the same or different OSI layer of the packet [27]. Tunnels can be built as stand-alone point-to-point links, or organized to form a topology, such as a mesh or structured P2P, that can be used for scalable overlay routing [34,11,12].…”
Section: Network Virtualizationmentioning
confidence: 99%