Virtual vpn in the cloud



Download 2,76 Mb.
Pdf ko'rish
bet39/48
Sana14.07.2022
Hajmi2,76 Mb.
#795294
1   ...   35   36   37   38   39   40   41   42   ...   48
Bog'liq
vpn in cloud

6.2
 
Measuring metrics
Since dealing with VPNs introduces additional IP headers and complex processing of 
cryptographic operations, the overhead introduced during data transmission has been studied. 
Measuring the link throughput gives details on network performance, which can be further 
studied and analyzed with the number of packets lost during transmission and with the delay 
encountered.
Network throughput is defined as the rate at which data is transmitted over a 
communication channel. In addition to providing secure data over dedicated links, reliability 
of the established connection channel is also equally important for simulating a direct 
connection. The reliability of the network depends largely on the throughput of data in the 
connection. Hence to ensure secure and reliable transfer of data, throughput is taken as one 
for important parametric analyses. 
Jitter is defined as the inter-arrival time variation between packets to their destination. 
Good transmission network record jitter values between 1 to 5 milliseconds [46]. Low jitter 
values help in maintaining the inter-packet delay introduced by the source, which is of 
utmost importance when dealing with small sized packets.
Packet loss takes place when packets travelling across a channel fail to reach their 
destination network. To ensure good link quality, packet loss of the network is maintained 
below 1% in this research [45]. Higher the loss of packets in the network, greater will be the 
TCP segment retransmissions, ultimately affecting available network bandwidth [35]. 
VM resource allocation metrics involving VM start up time, VM service start up time 
and VM Failure Ratio are measured and evaluated to determine reliability and speed of 
orchestration management. 
6.2.1
 
Cryptographic Analysis 
Taking into account the different combinations of encryption and hashing algorithms, 
it is observed that AES128-MD5 outperforms in all the cases 

Download 2,76 Mb.

Do'stlaringiz bilan baham:
1   ...   35   36   37   38   39   40   41   42   ...   48




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish