MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "80fc95ed-7247-4294-9ef5-06d8f7273281"}, "_deposit": {"id": "4608", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4608"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4608", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, many companies have branchoffices and connect those offices to the main office overthe Internet using a site-to-site Virtual Private Networkconnection. Most of these connections have alwaysoperated at Layer 3 of the OSI network model. In recentyears, there has been a growing requirement to extendlinks at Layer 2, which allows broadcast traffic to beforwarded between sites. Depending on inter-siteconnection medium, different technologies are utilized.This paper compares and analyses site-to-site Layer 2VPN technologies, which include layer 2 tunnelingprotocol (L2TP), and point to point tunneling protocol(PPTP), OpenVPN, Ethernet over IP (EoIP), andMPLS/VPLS to choose the right VPN for theorganization. This is done by means of performancemeasurement and packet analysis. In order to providefair comparable results, all technologies are tested inthe same manner."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "PPTP"}, {"interim": "L2TP"}, {"interim": "OpenVPN"}, {"interim": "EoIP"}, {"interim": "VPLS"}, {"interim": "Virtual Private Network"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-03-18"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks.pdf", "filesize": [{"value": "482 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 482000.0, "url": {"url": "https://meral.edu.mm/record/4608/files/Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks.pdf"}, "version_id": "7abad1ed-7c4d-4d99-ba61-460323f99869"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Si Thu"}, {"subitem_authors_fullname": "Thein, Thandar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-7281-5925-6"}, "item_title": "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004608", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-18"}, "publish_date": "2020-03-18", "publish_status": "0", "recid": "4608", "relation": {}, "relation_version_is_last": true, "title": ["Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks"], "weko_shared_id": -1}
Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks
http://hdl.handle.net/20.500.12678/0000004608
http://hdl.handle.net/20.500.12678/00000046086f43697f-d252-4989-8bc5-67994c6978b8
80fc95ed-7247-4294-9ef5-06d8f7273281
Name / File | License | Actions |
---|---|---|
Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks.pdf (482 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks | |||||
Language | en | |||||
Publication date | 2020-02-28 | |||||
Authors | ||||||
Aung, Si Thu | ||||||
Thein, Thandar | ||||||
Description | ||||||
Nowadays, many companies have branchoffices and connect those offices to the main office overthe Internet using a site-to-site Virtual Private Networkconnection. Most of these connections have alwaysoperated at Layer 3 of the OSI network model. In recentyears, there has been a growing requirement to extendlinks at Layer 2, which allows broadcast traffic to beforwarded between sites. Depending on inter-siteconnection medium, different technologies are utilized.This paper compares and analyses site-to-site Layer 2VPN technologies, which include layer 2 tunnelingprotocol (L2TP), and point to point tunneling protocol(PPTP), OpenVPN, Ethernet over IP (EoIP), andMPLS/VPLS to choose the right VPN for theorganization. This is done by means of performancemeasurement and packet analysis. In order to providefair comparable results, all technologies are tested inthe same manner. | ||||||
Keywords | ||||||
PPTP, L2TP, OpenVPN, EoIP, VPLS, Virtual Private Network | ||||||
Identifier | 978-1-7281-5925-6 | |||||
Journal articles | ||||||
Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |