Abstract

The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Internet. The paper follows and sets standards for different types of protocols and techniques, the VPN (Virtual Private Network) architectural feature is made to deliver dependable and safe network that is not in line with regular networks that provide a higher trust and a higher secure channel between user and organization. The current study took place to summaries the usage of existing VPNs protocol and to show the strength of every VPN. Through different studies that have been made by other researchers as well as an extra focus on the state of art protocol, Wire guard. It is also worthy to mention that wire guard compared with other protocols such as IPsec and GRE. The studies show the WireGuard being a better choice in terms of other well-known procedures to inaugurate a secure and trusted VPN.

Highlights

  • Nowadays, Internet communication becomes a major part of infrastructure

  • What was provided in this paper, a review of the most recent and relevant selective researches done on Virtual Private Network (VPN) protocols such as IPsec, Generic Routing Encapsulation (GRE), Wire guard

  • The speed analysis display again the Wire guard has a reusable high speed in a wide diversity of device; likewise, some researchers suggest the speed of the protocol to the number of lines of code that do not exceed more than 4000 lines, which facilitates the installation process and its speed compared to Internet Protocol (IP) Sec, which has a number of code lines that are close to 70,000 lines

Read more

Summary

Introduction

Internet communication becomes a major part of infrastructure. Based on the Internet most of the applications of infrastructure systems can be operated [1, 2]. The second important advantage of VPNs is the ability to change from whatever scalability needed, which aids in saving time in making a new link between the headquarter and new branch buildings by using Internet Service look Providers (ISPs) infrastructure. This process helps make it simpler when adding and modifying the number of connected users so that companies can add important capacity without needing to add infrastructure [10].

Literature Review and Problem Statement
The Aim of the Paper
Design
The VPN Tunneling Solutions
Discussion of Experimental Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call