Impact of Different Topology on the Performance of IPSec VPN Multimedia Using CLSA

  • Linna Oktaviana Sari Universitas Riau
  • Aldi Kurniawan Batubara Universitas Riau
Abstract viewed: 75 times
PDF downloaded: 34 times
Keywords: Multimedia, VPN, Topology


Due to multimedia application, network communication are expected to support multimedia traffic such as voice, video streaming and real time chat with a variety of Quality of Service (QoS) requirements. To support multimedia communications, it is desirable to use a network that meets QoS Parameter requirements. To deal with these challenges. In this study, VPN was designed with IPSec Tunneling. In designing VPN, the CLSA method is used. The network is composed of different topologies and uses OSPF as the routing protocol. Then multimedia traffic is passed on VPN networks to see the impact of different topologies on performance.The result show that theQuality of Service (QOS)in VPNobtained areaccording to ITU-T G.107 10 06/2015. The comparison of the average delay between the mesh and the star topology shows that the average delay in the mesh topology is 23% less than the starfor multimedia traffic. The comparison of the through put between the mesh topology and the star shows that the average throughputin the mesh topology is 68.8% betterthan the star for multimedia traffic. The comparison of the jitterbetween the mesh topology and the star shows that the average jitter in the star topology is 6%shorterthan the mesh for multimedia traffic.



[1] Association of internet service provider indonesia, "Indonesia internet usage profile, Center for Communication Studies University of Indonesia, 2014.

[2] Kartika Rianafirin, Mochamad Teguh Kurnaiwan, “Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC27000 series in yayasan kesehatan (Yakes) Telkom Bandung”, Proceeding of IEEE 4th International Conf CAIPT, Bali, pp. 1-6, August 8-10, 2017.

[3] Lin Shaofeng, Guo Chaoping, Sun Weifeng. A, “Design and Implementation of an Enhanced VPN Isolation Gateway”, Proceeding IEEE of International Conference on Robots & Intelligent System (ICRIS), China, pp. 82-85, oct 15-16, 2017.

[4] M. N. Ogbu, G. N. Onoh, K. C. Okafor. A, “Cloud based virtual private networks using IP tunneling for remote site interfaces”, Proceeding of IEEE 3rd International Conference on Electro - Technology for National Development (NIGERCON), pp. 30-41, 2017.

[5] Jose Roberto Patino Sanchez. “Analysis of the security ipv6 and comparative study between routing protocols oriented to ipv6”, Proceeding of IEEE Asia-Pacific Conference on Computer-Aided System Engineering (APCASE), Equador, pp. 374-379, July 14-16, 2015.

[6] Baris Yamansavascilar, M. Amac Guvenson, A. Gokhan Yavuz, M. E.Karsligil, “Application identification via network traffic classification”, Proceeding IEEE of International Conference on Computing, Networking and Communications (ICNC), USA, pp. 843-848, Jan 26-29, 2017.

[7] S. Moemen Bellah, H. Khanjari, “A fair model for autonomic bandwidth management in virutal private network”, Proceeding of IEEE 2015 International Conference on Communication, Networks and Satellite (COMNESTAT), Bandung, pp. 37-42, Dec 10-12, 2015.

[8] Shaneel Narayan, Cameron J. Williams, Daniel K.Hart, Max W.Qualtrough, “Network performance comparison of vpn protocols on wired and wireless networks”, Proceeding of IEEE 2015 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, pp. 1-7, Jan 8-10, 2015.

[9] Djedja Benzid, Michel Kadoch ing, “Virtual Private Network over wireless mesh networks”, Proceeding of IEEE 2014 International Conference on Future Internet of Things and Cloud, Spain, pp. 340-345, August 27-29, 2014.

[10] Pham Ngoc Thanh, Keeheon Kim, “Implementation of open two-factor authentication service applied to virtual private network”, Proceeding of IEEE The International Conference on Information Networking (ICOIN), Bangkok, pp. 135-140, Jan 28-30, 2013.

[11] Daiki Imahama, Yukinobu Fukushima, Tokumi Yokohira, “A reroute method using multiple routing configurations for fast in network recovery”, Proceeding of IEEE 19th Asia-Pacific Conference on Communications (APCC), Bali, pp. 433-438, August 29-31, 2013.

[12] Richard Froom, Balaji Sivasubramanian, Erum Frahim, “Implementing cisco ip switched networks (switch)”, Foundation Learning Guide, Cisco Press, United States of America, 2010.

[13] James E. Goldman, Philip T. Rawles, “Applied data communications: a business-oriented approach”, Purdue University, Indiana, 2001.

[14] Jason C. Neumann, “The Book of GNS3”, Build Virtual Network Labs Using Cisco, Juniper, and More, San Francisco, 2015.

[15] Laura, Chappell, " Wireshark network analysis”, Second Edition, The Official Wireshark Certified Network Analysis Study Guide, Chappell University, 2012.

How to Cite
L. O. Sari and A. K. Batubara, “Impact of Different Topology on the Performance of IPSec VPN Multimedia Using CLSA”, IJEEPSE, vol. 1, no. 2, pp. 20-25, Nov. 2018.