Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "80fc95ed-7247-4294-9ef5-06d8f7273281"}, "_deposit": {"id": "4608", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4608"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4608", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, many companies have branchoffices and connect those offices to the main office overthe Internet using a site-to-site Virtual Private Networkconnection. Most of these connections have alwaysoperated at Layer 3 of the OSI network model. In recentyears, there has been a growing requirement to extendlinks at Layer 2, which allows broadcast traffic to beforwarded between sites. Depending on inter-siteconnection medium, different technologies are utilized.This paper compares and analyses site-to-site Layer 2VPN technologies, which include layer 2 tunnelingprotocol (L2TP), and point to point tunneling protocol(PPTP), OpenVPN, Ethernet over IP (EoIP), andMPLS/VPLS to choose the right VPN for theorganization. This is done by means of performancemeasurement and packet analysis. In order to providefair comparable results, all technologies are tested inthe same manner."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "PPTP"}, {"interim": "L2TP"}, {"interim": "OpenVPN"}, {"interim": "EoIP"}, {"interim": "VPLS"}, {"interim": "Virtual Private Network"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-03-18"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks.pdf", "filesize": [{"value": "482 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 482000.0, "url": {"url": "https://meral.edu.mm/record/4608/files/Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks.pdf"}, "version_id": "7abad1ed-7c4d-4d99-ba61-460323f99869"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Si Thu"}, {"subitem_authors_fullname": "Thein, Thandar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-7281-5925-6"}, "item_title": "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004608", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-18"}, "publish_date": "2020-03-18", "publish_status": "0", "recid": "4608", "relation": {}, "relation_version_is_last": true, "title": ["Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks

http://hdl.handle.net/20.500.12678/0000004608
http://hdl.handle.net/20.500.12678/0000004608
6f43697f-d252-4989-8bc5-67994c6978b8
80fc95ed-7247-4294-9ef5-06d8f7273281
None
Preview
Name / File License Actions
Comparative Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks.pdf (482 Kb)
Publication type
Article
Upload type
Publication
Title
Title Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks
Language en
Publication date 2020-02-28
Authors
Aung, Si Thu
Thein, Thandar
Description
Nowadays, many companies have branchoffices and connect those offices to the main office overthe Internet using a site-to-site Virtual Private Networkconnection. Most of these connections have alwaysoperated at Layer 3 of the OSI network model. In recentyears, there has been a growing requirement to extendlinks at Layer 2, which allows broadcast traffic to beforwarded between sites. Depending on inter-siteconnection medium, different technologies are utilized.This paper compares and analyses site-to-site Layer 2VPN technologies, which include layer 2 tunnelingprotocol (L2TP), and point to point tunneling protocol(PPTP), OpenVPN, Ethernet over IP (EoIP), andMPLS/VPLS to choose the right VPN for theorganization. This is done by means of performancemeasurement and packet analysis. In order to providefair comparable results, all technologies are tested inthe same manner.
Keywords
PPTP, L2TP, OpenVPN, EoIP, VPLS, Virtual Private Network
Identifier 978-1-7281-5925-6
Journal articles
Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:11:08.433008
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL