In this paper we compared the performance of VPN using



Similar documents
Implementation of Video Voice over IP in Local Area Network Campus Environment

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT

Contents. Specialty Answering Service. All rights reserved.

VPN. Date: 4/15/2004 By: Heena Patel

Course 4: IP Telephony and VoIP

2 Voice over IP Network

A Study of Network Security Systems

Network Services Internet VPN

Performance Evaluation for VOIP over IP and MPLS

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M.

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Influence of Load Balancing on Quality of Real Time Data Transmission*

Network performance in virtual infrastructures

Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous Environment

Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal. PDCAT'08 - Dunedin December 1-4, 2008

VOICE OVER IP AND NETWORK CONVERGENCE

Assessing the quality of VoIP transmission affected by playout buffer scheme and encoding scheme

IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.

Simulation of SIP-Based VoIP for Mosul University Communication Network

IP Telephony v1.0 Scope and Sequence. Cisco Networking Academy Program

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Performance Monitoring of VoIP with Multiple Codecs Using IPv4 and IPv6to4 Tunnelling Mechanism on Windows and Linux

Packetized Telephony Networks

An Introduction to VoIP Protocols

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems

Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

technology standards and protocol for ip telephony solutions

Security issues in Voice over IP: A Review

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Voice over IP Networks: Ensuring quality through proactive link management

Firewall and VPN Investigation on Cloud Computing Performance

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

How to Measure Network Performance by Using NGNs

Question: 3 When using Application Intelligence, Server Time may be defined as.

VoIP / SIP Planning and Disclosure

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

Lab Testing Summary Report

UMTS VoIP Codec QoS Evaluation

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Cisco Integrated Services Routers Performance Overview

CHARACTERISTICS AND FUNCTIONALITY OF EMULATION NETWORK ANALYZER AND HARDWARE NETWORK ANALYZER

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

Optimizing Converged Cisco Networks (ONT)

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Multimedia Communications Voice over IP

Quality of Service. PAN-OS Administrator s Guide. Version 6.0

Secure VoIP Transmission through VPN Utilization

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015

Cost Effective Deployment of VoIP Recording

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

Network Performance Evaluation of Latest Windows Operating Systems

Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V3 Page 1 of 15

Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis

VPN Lesson 2: VPN Implementation. Summary

How To Deliver High Quality Telephony Over A Network

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents

Voice over IP Basics for IT Technicians

WAN Traffic Management with PowerLink Pro100

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008

Optimizing Converged Cisco Networks (ONT)

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Combining Voice over IP with Policy-Based Quality of Service

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Steelcape Product Overview and Functional Description

Subtitle. VoIP Migration Strategy. Keys to a Successful Planning and Transition. VoIP Migration Strategy Compare Business Products

Introduction to Packet Voice Technologies and VoIP

Integrate VoIP with your existing network

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Getting Started with VoIP Reports

MyCloud Dedicated Unified Communications (UC) Transforming Business Communications

Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th Generation Servers

Requirements of Voice in an IP Internetwork

ETM System SIP Trunk Support Technical Discussion

FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications

Transcription:

Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance Mohd Nazri Ismail Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia mnazrii@miit.unikl.edu.my Abstract In this research, we propose an architectural solution to implement Virtual Private Network (VPN) test bed in campus environment. The objective of this evaluation is to measure the quality of the audio and video streaming on client server performance over different types of VPN technology. Virtual Private Network (VPN) technology has become a discussion issue for this time being. Therefore, this study is to analyze the VPN over open source application and hardware device performance areas related to quality of service delivered by audio and video streaming activities such as CPU and memory usage. In this study, network management system (NMS), ColaSoft Capsa is used to monitor and capture the performance of CPU and memory over VPN. In addition, the most apparent of implementing VPN in campus environment is to define the best solution between open source application and hardware device that can be used in operational environment. Based on the finding result, the VPN measurement through hardware device is able to contribute low percentage of CPU and memory usage compare to open source application. Key words VPN, CPU, NMS, Memory, Audio and Video Streaming I. INTRODUCTION In this paper we compared the performance of VPN using different type of operating system and hardware base to select which technology able to provide better services. In our experiments, we will conduct a test bed and examine on CPU and memory usage over VPN as follows: i) to minimize usage of CPU and memory percentage between campus branches; ii) comparison between two different platform of VPN based on hardware (Juniper Netscreen 25) and software (Microsoft and Linux). This study is extension from previous work that has been discussed on throughput and delay performance [1]. Packet transmission can introduce new impairments, including packet loss, extra sources of delay, and the use of compressed speech coding, all of which may affect audio and video quality delivered to the user [5]. QoS of the voice is affected by delay, jitter, and packet loss [6], [7]. There are several vulnerabilities occur during audio conversation such as [8], [9]: i) circuitswitched technology vulnerabilities; and ii) audio technology vulnerabilities. Therefore, this study is to provide and measure CPU and memory usage over VPN implementation using different types of technology. III. METHODOLOGY Figure 1 shows the overall framework of test bed VPN implementation in campus environment. There are five phases development of test bed process such as: i) planning; ii) design; iii) implementation; iv) testing, v) compare, vi) compile. Figure 2 shows the implementation of VPN test bed using operating system and hardware device. In the experiment, the analysis performance will focus on CPU and memory measurement during audio and video streaming. Network management system is used to analyze activities of streaming over VPN technology. Figure 3 shows the process and criteria selection of streaming evaluation. II. RELATED WORKS Virtual private networks (VPNs) provide a secure and reliable communication between customer sites over a shared network [2]. Nowadays, VPNs (Virtual Private Networks) is considered the strongest security solutions for communications over IP networks. Most VPN solutions are implemented to tunnel data traffic while the trend toward a converged data and voice network, however, places new demands on VPNs to support real time traffic [3], [4]. The main issues on audio and video are i) security; and ii) QoS. Fig. 1: Framework of VoIP over VPN Technology in Campus Environment ISSN: 2045-7057] www.ijmse.org 16

Table 1: Users Streaming Activities for One Movie User Movie (Audio & Video) Size 1 st User The Number 23 701MB 2 nd User Full Body Massage 699MB 3 rd User Full Body Massage 699MB Table 2: Users Streaming Activities for Multiple Movies Fig. 2: Implementation of VPN Test Bed using Different Types of Technology User Movie (Audio & Video) Size 1 st User 1. The Number 23 2. The Heart Break Kid 3. Perfume The Story of a Murdered 701MB 701MB 800MB 2 nd User 1. Perfume The Story of a Murdered 2. Ratatouille 3. Full Body Massage 3 rd User 1. Tom & Jerry 2. The Heart Break Kid 3. Ratatouille 800MB 702MB 699MB 1.07MB 701MB 702MB A. CPU Utilization: Fig. 3: Process and Criteria of Audio and Video Streaming Evaluation IV. ANALYSIS AND RESULTS Several experiments will conduct and to measure the performance of audio and video over VPN such as: i) CPU Utilization; and ii) Memory Performance. All the result is capture using Colasoft Capsa. This VQ manager is suitable application to work in audio and video packet environment. Table 1 and Table 2 show streaming activities and size of movie that played by clients from streaming server via VPN such as Microsoft Server 2003, Ubuntu and Juniper Netscreen25. In our experiments, we only select three clients and test based on: i) streaming one movie only; and ii) streaming multiple movies concurrently. In this section, it will discuss on system performance (CPU utilization) between hardware and operating system after successfully implementing VPN test bed. Figure 4.4 and Figure 4.5 show the CPU utilization results during streaming activities. Figure 4.4 shows that one client streaming with one movie has provided 66.6% for Microsoft and 83% for Linux for higher usage of CPU compare to hardware basis (8%). Figure 4.5 shows multiple streaming movies with single user, the results show that VPN implementation using hardware platform does not affect and degrade CPU utilization (6%) compare to VPN implementation via operating system. The next experiments, we conducted with two clients and following with three clients streaming into the server. The results show that VPN implementation using hardware platform also does not affect the performance of CPU utilization for second and third clients (refer to Figure 6, Figure 7, Figure 8 and Figure 9). VPN implementation using hardware platform has achieved 13% (single movie) and 16% (multiple movies) for two clients. Then, third clients have achieved 12% (single movie) and 17% (multiple movies) compare to VPN implementation using operating system. It can conclude that CPU utilization performance using hardware platform is not much affected with number of movies streaming and clients. ISSN: 2045-7057] www.ijmse.org 17

Fig. 4: Streaming Movie- Single Client with Single Movie Fig. 6: Streaming Movie- Two Clients with Single Movie Fig. 5: Streaming Movies Single Client with Multiple Movies Fig. 7: Streaming Movies Two Clients with Multiple Movies ISSN: 2045-7057] www.ijmse.org 18

Fig. 8: Streaming Movie- Three Clients with Single Movie Fig. 10: Streaming Movie- Single Client with Single Movie (memory) Fig. 9: Streaming Movies Three Clients with Multiple Movies B. Memory Performance: In this section, it will discuss on memory performance between hardware and operating system. Figure 10 and Figure 11 show the memory utilization results during streaming activities. Figure 4 show that one client streaming with one movie has achieved approximately the same memory usage between Microsoft (43%), Linux (53%) and hardware platform (41%). Figure 4.5 shows multiple streaming movies with single user, the results show that VPN implementation using hardware platform has affected memory usage (43%) compare to VPN implementation via operating system (40%). Fig. 11: Streaming Movies Single Client with Multiple Movies (memory) The next experiments, we conducted with two clients and following with three clients streaming into the server. The results show that VPN implementation using hardware platform has approximately the same performance of memory usage for second and third clients (refer to Figure 12, Figure 13, Figure 14 and Figure 15). VPN implementation using hardware platform has achieved 44% (single movie) and 43% (multiple movies) for two clients. Then, third clients have achieved 43% (single movie) and 45% (multiple movies). The results show it is slightly higher compare to VPN implementation using operating system. ISSN: 2045-7057] www.ijmse.org 19

Fig. 12: Streaming Movie- Two Clients with Single Movie (memory) Fig. 14: Streaming Movie- Three Clients with Single Movie (memory) Fig. 13: Streaming Movie- Two Clients with Multiple Movie (memory) V. CONCLUSION This paper discussed which VPN technology implementation is able to reduce system resources between software and hardware device in campus environment. This research was to investigate and define the performance of audio and video streaming over VPN technology. In this article, we have shown the performance of: i) CPU utilization; Fig. 15: Streaming Movie- Three Clients with Multiple Movie (memory) and ii) memory usage. We conclude that base on our findings, streaming movie over VPN using software base contribute higher CPU utilization compare to VPN hardware device (refer to Table 3). The experiment also show that memory usage achieved approximately the same result for software and hardware over VPN (refer to Table 3). ISSN: 2045-7057] www.ijmse.org 20

CPU performance (%) Memory usage (%) Table 3: CPU and Memory Performance Window Server 2003 Ubuntu 8.01 Juniper Netscreen 25 medium high Low medium medium medium Low = 0 40; Medium = 41 70; High = 71 100 It is recommended to implement streaming movie over VPN using hardware platform in order that to achieve a good quality service. It is also suggested to have a high CPU and memory performance in order to support VPN using software and hardware platform. In future work, it should consider implementing techniques to improve quality of streaming movie over VPN using mesh wireless network. REFERENCES [1]. Mohd Nazri Ismail and Mohd Taha Ismail. Analyzing of Virtual Private Network over Open Source Application and Hardware Device Performance. European Journal of Scientific Research (EJSR), Vol. 28 No.2, pp. 215-226, EuroJournals Publishing, Inc. 2009. [2]. Monia G., Sudhakar G., & Gholamali C. S., Resource optimization algorithms for virtual private networks using the hose model Source, Computer Networks: The International Journal of Computer and Telecommunications Networking, pp. 3130-3147, Vol.52 (16), 2008. [3]. Wafaa B.D., Samir T. & Carole B., VPN Analysis and New Perspective for Securing Voice over VPN Networks Full text Proceedings of the Fourth International Conference on Networking and Services, pp. 73-78, 2008. [4]. Sang-Jo Y., Seung-Sun Y., Chang-Yong L. & Geuk L., Development of Internet Phone (VoIP) for Voice Security on VPN Environment Full text, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, pp. 293-300, 2008. [5]. G. Hunt & P. Arden, QoS requirements for a voice-over-ip PSTN Source, BT Technology Journal, Vol. 23 (2), pp. 37 47, 2005. [6]. Kumudu S. Munasinghe, Seyed A. Shahrestani. Wireless VPNs: An Evaluation of QoS Metrics and Measures. International Conference on Mobile Business (ICMB'05), pp. 616-622. [7]. Thanasis G Papaioannou and George D Stamoulis. Design of a charging and accounting architecture for QoS-differentiated VPN services to mobile users. Computer Communications, Quality of Future Internet Service (2002 Workshop), Vol. 27(4), pp. 364-373. [8]. Ahmad Ghafarian, Randolph Draughorne, Shelley, et. al., Securing Voice over Internet Protocol, Journal of Information Assurance and Security, Vol. 2, pp. 200-204, 2007. [9]. J. Arturo Perez, V?ctor Zarate, Angel Montes, Carlos Garcia, "Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic,", Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), pp. 43, 2006 ISSN: 2045-7057] www.ijmse.org 21