Evaluation of the Performance of an IPv6 network using IPSec in Tunneling Mode
DOI:
https://doi.org/10.33936/isrtic.v7i2.5710Keywords:
IPv6, IPSec, bandwidth, latency, JitterAbstract
IPv4 address space is about to reach its limit and could collapse. To correct this event, many propose that existing networks should make the definitive migration to IPv6, taking as a reference that this protocol will allow a larger IP address space, providing new opportunities and correcting the existing problems in the protocol of the previous version. However, due to the increased overhead in IPv6 and its interaction with edge routers and operating systems that host this communication protocol, network performance problems can obviously occur. This article is based on a quantitative research using a method that allows analyzing the performance of networks based on IPv6 with IPSec using simulation with GNS3, with this tool compares results with three typical scenarios of implementation in relation to the original topology of this work, Its evaluation determines the difference in performance between scenarios when traffic is generated from one network to another and a scenario with better stability and performance is obtained from among them using an experimental methodology, with which we will be able to verify that its counterpart scenario with the use of tunnels is more optimal in relation to the one proposed in this research, taking into consideration that the metrics analyzed are bandwidth, latency and jitter.
Downloads
References
Adeyinka, O. (2018, julio 1). IPSec Mechanism for Implementing VPN.
Basso, C. (2015). Implementação de IPSEC integrado com o IPv6. Recuperado de http://repositorio.roca.utfpr.edu.br:8080/jspui/handle/1/198
Castro, R. de A. e. (2014). Uma analise de soluções VPN em redes corporativas de alta capilaridade.
Falconi, A. P., & Guedes, U. T. V. (2015). Proposta de Uso Dinâmico do IPSec no IPv6. 3.
Fiuczynski, M. E., Lam, V. K., & Bershad, B. N. (2018). The Design and Implementation of an IPv6/IPv4 Network Address. USENIX Annual Technical Conference, 11.
Godinho, M. E. M. (2017). Uma arquitetura de implementação de redes virtuais privadas sobre a estrutura da Universidade do Contestado—UnC. 79.
Golden, B. (2011). Virtualization For Dummies. John Wiley & Sons.
Hogg, S., & Vyncke, E. (2009). IPv6 security (1.a ed.). Indianapolis, IN: Cisco Press. Recuperado de ciscopress.com
Nogueira, E., & Abreu, O. (2017). Introdução ao IPv6 e Desempenho do IPSec com IPv4 e IPv6. Recuperado de https://fdocumentos.tips/document/introducao-ao-ipv6-e-desempenho-do-ipsec-com-ipv4-e-ipv6.html
Pinheiro, A. (2020, octubre). Estudo comparativo e análise de desempenho entre os protocolos de comunicaçao IPv4 e IPv6. https://doi.org/10.13140/RG.2.2.24026.57280/1
Santos, C. R. (2014). Integração de ipv6 em um ambiente cooperativo seguro (Tesis). Universidade Estadual de Campinas, Instituto de Computação.
Shah, J. L., & Parvez, J. (2015). Security Issues in Next Generation IP and Migration Networks. Journal of Computer Engineering, 17, 6. https://doi.org/10.9790/0661-17131318
Thiruvasagam, P., & George, K. J. (2019). IPSec: Performance Analysis in IPv4 and IPv6. Journal of ICT Standardization, 7(1), 59-76. https://doi.org/10.13052/jicts2245-800X.714
Wazlawick, R. (2017). Metodologia de Pesquisa para Ciência da Computação (2o edição). GEN LTC.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Yumber Alejandro Ponce Loor, Jorge Sergio Herrera Tapia

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles submitted to this journal for publication will be released for open access under a Creative Commons Attribution Non-Commercial No Derivative Works licence (http://creativecommons.org/licenses/by-nc-nd/4.0).
The authors retain copyright, and are therefore free to share, copy, distribute, perform and publicly communicate the work under the following conditions: Acknowledge credit for the work specified by the author and indicate if changes were made (you may do so in any reasonable way, but not in a way that suggests that the author endorses your use of his or her work. Do not use the work for commercial purposes. In case of remixing, transformation or development, the modified material may not be distributed.

