The Impact of Security Overhead Traffic on Network’s ResourcesPerformance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Security of transferred data is a big concern for data networks users .One of the best securitysolutions is the IPSec Virtual Private Networking (IPSec VPN).In this paper, The Impact of additional trafficgenerated by IPSec protocol on the network's resources performance is discussed. Network simulation is amajor part of this Paper. OPNET simulation software is used. Analyzing the impact of applying IPSec VPN tosecure a flow of traffic from a remote sites connected through IPSec Tunnels to one Server is the methodology ofthe study, using OPNET. Three scenarios have been simulated. The results are compared by measuring theutilization of the server in the three scenarios.
Authors and Affiliations
Esam Suliman Mustafa Ahmed , Dr. Amin Babiker A/Nabi Mustafa
Energy Consumption Using Network Stability And Multi-hop Protocol For Link Efficiency in Wireless Body Area Networks
Abstract: In this paper, we propose a minimum, power efficient and max throughput routing protocol for Wireless Body Area Networks (WBANs). We use multi-hop topology to achieve minimum energy consumption and longer...
An Efficient Face Tracker Using Active Shape Model
To perform tracking in an illumination insensitive feature space, called the gradient logarithm field (GLF) feature space. The GLF feature mainly depends on the intrinsic characteristics of a face and is only marginally...
Classification of Mammogram Images for Detection of BreastCancer
Abstract: Breast cancer is the most commonly observed cancer in women both in the developing and thedeveloped countries of the world. The survival rate in it has improved over the past few years with thedevelopment...
To Propose Improvement in Probability based object tracking technique for Multiple Object Tracking
Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...
Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techni...