Internet Protocol Security (Ip Sec) For Backbones

1245 words - 5 pages

Abstract : Internet Protocol version 6(Pv6) is the advanced version of the IPv4 protocol and both of these protocols are part of TCP/IP suite.TCP/IP is the only protocol for transmission of data over the internet As the internet is not secure place for transmission of secure and confidential information (packets) So to protect this information over the non secure channels(internet ) the IPSec was introduced .IPSec is the worldly know standard for the secure transmission over the internet . IPSec is mandatory for IPv6 and optional for IPv4 deployments .But as the IPsec provides authentication, confidentiality and integrity of the internet protocol (IP) packets but it slows down the transmission devices and where there is huge transmission of data like in Gbps at the backbone networks, the performance of the transmission devices is highly effected .
So to improve the transmission rate on high performance networks number of techniques have been used till now and these techniques are the valuable addition in the current technologies .Purpose of this paper is to high light , what types of techniques are available in the current time for improving the performance of the transmission devices both at the H/W and S/W level while applying the IPSec and what drawbacks in the already existing techniques .
Keywords: Internet Protocol Security (IPsec), IPv6 , Internet Security, Virtual Private Network(VPN) security ,IPsec for high performance networks.
Introduction :As in the current era the internet is widely used for sending and receiving information in a very fast way. As internet is not only used by the single user but huge companies (enterprises) use them for their business use . An enterprises may have their offices at different location within the same country or over the world. That’s why Enterprises uses the internet to send and receive information and share confidential documents over the internet .As it is very difficult and highly expensive to connect the remote locations of an enterprise through a dedicated transmission links. That’s why the enterprises use the internet for sending receiving Information to the remote offices, this network is called the Virtual Private Network(VPN).So the VPN is the encrypted solution of costly leased lines or private lines.[2]
Currently two architecture are used in the world of networks, OSI model and TCP/IP model. But TCP/IP model is more famous than the OSI model due its practical implementation .TCP/IP model use uses TCP/IP protocol .As TCP/IP is the only transmission protocol for the transmission of data/information over the internet .TCP/IP model which consist of four layers.ie Application Layer, Transmission Layer, network Layer and Physical Layer . There are different protocols working at different layers of the model .As our study only concerns with the IPSec which is working at the layer 2 (network layer ) that’s why our focus is only network layer and Transmission unit at the network layer...

Find Another Essay On Internet Protocol Security (IPSec) for Backbones

How a Switch Has an Advantage ove a Bridge in a Network

1996 words - 8 pages .” (Pintello, 2013). The security options offered by IPSec work on the Internet layer of the TCP/IP Model. According to (Hallberg, 2013), IPSec is probably the most secure tunnelling protocol and popular for LAN-to-LAN VPNs and UNIX-oriented VPNs, due to its reliance on IP. This protocol is in connection with the IP protocol, creates a connection-oriented service between two entities in which they can exchange IP packets. Advantages of this

Networking: Network Security Essay

2472 words - 10 pages Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. 2014). In basic terms TLS is a more suited protocol to online banking as it was designed to be used for these services within websites on the internet, whereas SSH is designed for a different purpose – remote access. SSH Example A scenario where SSH is preferable to TLS would be when remote server administration is taken into account or the transferring of a large quantity of

The Current Version of the Internet Protocol IPv4

887 words - 4 pages is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate over IPv6. Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification of the base IPv6 protocol suite, but has since been made optional Multicasting is the transmission of a packet to multiple

Multi-Protocol Label Switching - MPLS

2374 words - 9 pages provider eavesdropping or a hacker getting in through one of the internet gateways on the MPLS backbone. Accidents are also possible by a service provider incorrectly configuring an edge router, permitting one company accessing another company’s VPN. Simply deploying MPLS does not ensure a company’s security. For extra security and at a cost company’s can implement IPSec tunnels to encrypt data and further protect packets. Conclusion: MPLS seems

How Does a Switch Have an Advantage over a Bridge on a Network

1570 words - 7 pages technologies, there are some limitations as well as discussed below.  IPSec IPSec which stands for Internet Protocol Security is a set of protocols to support secure exchange of packets at the IP layer. It is widely implemented in VPNs. IPSec works in two modes namely transport mode and tunnel mode. In transport mode, only the data in a packet is encrypted, however in tunnel mode the entire packet is encrypted and the surrounded by a new IP

Windows Advance server 2003

552 words - 2 pages . Advanced Server can act as a remote access server providing access and secure logon services for remote usersSecurity Services* Encrypting File System (EFS) technology - to store encrypted files on NTFS volumes* Internet Authentication Service (IAS) - supports the ability to separate the authentication and authorization of connection requests* Internet Connection Firewall (ICF) - provides a firewall for better Internet security* Internet Protocol Security (IPSec) - to secure communications within an intranet and to create secure virtual private network (VPN) solutions across the Internet

Understand the latest internet speaking language as IPv6

3071 words - 12 pages the IP layer we can provide this security services to other higher layer protocols as TCP, UDP, ICMP, etc.We can sue the Network layer security for protecting Internet traffic that is implemented in two forms:·Security Gateways: this are the gateways which stand on the edge of the networks and use IPsec to enforce access control, protect the confidentiality and authenticity of network traffic entering and leaving the network. This

Virtual Private Network

4581 words - 18 pages tunneling and encapsulation (Fowler, D. 1999). According to Mairs, J. (2002), tunneling is a technique of transferring data across two similar networks over an intermediate network. The process of encapsulation refers to the process of enclosing one type of data packet into a packet of another protocol before being sent through the Internet. For example, in an Internet-based VPN, packets in a VPN protocol are encapsulated within an IP packet before

A Survey on NEMO Security: Threats and Solutions

1235 words - 5 pages the sequence number and the same is applicable if the home agent reboots. So, in order to prevent such attacks its better to use dynamic keying, IPSec anti-replay protection and sequence numbers together. A non volatile memory can be used for home agent, so that the state can’t be lost. Generally IPSec associations are bound to the used address. When we use a single pair of manually keyed security, it conflicts with new home address creation

Transport Layer Security and Secure Shell

1420 words - 6 pages large variety of security protocols are implemented on the internet nowadays. Therefore it is very difficult to recommend such a protocol that could be the solution in helping to secure the credentials of millions of people across the world. Critically, there are two reasons for this. Firstly, network security protocols manage security using different methods. Secondly, they all have advantages and disadvantages. Certainly, the features of

Design a Network Infrastructure Because Networks are Configured in Many Ways, Network Systems and Data Communications Analysts are Needed to Design, Test, and Evaluate Systems Such as Local Area...

8965 words - 36 pages protocols, the most commonly used are described below:*<Tab/>Point to Point Tunneling Protocol (PPTP)*<Tab/>Layer Two Tunneling Protocol (L2TP)*<Tab/>Internet Protocol Security (IPsec)Point to Point Tunneling Protocol (PPTP):The Point to Point Tunneling Protocol (PPTP) is a popular choice for VPN tunneling. It is freely available on all versions of Microsoft Windows. The PPTP tunneling protocol provides remote

Similar Essays

Ip Security Essay

1417 words - 6 pages IP SECURITY IP SECURITY Internet Protocol Security (IPSec) is a framework of open standards for ensuring secure private communications over IP networks. Based on standards developed by the Internet Engineering Task Force (IETF), IPSec ensures confidentiality, integrity, and authenticity of data communications across a public IP network. IPSec provides a necessary component for a standards-based, flexible solution for deploying

Firewall Essay

1737 words - 7 pages . The more secure Tunnel mode encrypts both the header and the data. On the receiving side, an IPSEC-compliant device decrypts each packet. For IPSEC to work, the sending and receiving devices must share a public key. This is done by a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticates the sender using digital certificates. Noting that

Virtual Private Networks Essay

4352 words - 18 pages several widely used VPN tunneling protocols, the most commonly used are described below:Point to Point Tunneling Protocol (PPTP)Layer Two Tunneling Protocol (L2TP)Internet Protocol Security (IPsec)Point to Point Tunneling Protocol (PPTP):The Point to Point Tunneling Protocol (PPTP) is a popular choice for VPN tunneling. It is freely available on all versions of Microsoft Windows. The PPTP tunneling protocol provides remote users encrypted, multi

Remote Access Solutions Essay

1415 words - 6 pages the virtual circuits between their locations. IT specialists only need to plan and configure the authentication and connection. Network Protocols Two popular VPN protocols were considered. Internet Protocol Security (IPsec) and Secure Socket Layer (SSL). IPsec is the most common protocol for secure VPNs. IPsec protocols operate at the network layer, or layer three of the OSI model. SSL protocols operate from the transport layer up, OSI