Evaluated Performance of Protocols

Dr.Vipul sharma, Ms. Shruti Singh, Mr. Lokesh Sharma


Maximum organizations attempt to set up their improvement facilities and department workplaces the world over. Personnel running from their houses also are turning into very popular and companies advantage financially by way of making use of less office area, and decreasing total expenses incurred by way of having office employees on website online. To satisfy such necessities agencies broaden a need to speak with these offices over surprisingly cozy, personal and dependable connections regardless of the area of the workplace. The VPN performs a vital function in setting up an allotted business model

Full Text:



Kent, S. and Atkinson, R., security architecture for the net Protocol”, RFC2401, November 1998.

Townsley, W. et al, “Layer two Tunneling Protocol - L2TP”, RFC 2661, August1999.

Gleeson, B. et al, “A Framework for IP based totally virtual private Networks”, RFC2764, February 2000.

Hamzeh, okay. et al, “point-to-factor Tunneling Protocol (PPTP)”, RFC 2637, July1999.

Oppliger, R., “protection technology for the world huge internet”, Artech residencelaptop Library, 2000.

Venkateswaran, R., “virtual personal Networks”, IEEE Potentials mag,February/March 2001.

Yuan, R. and Strayer, T., “virtual private Networks, Addison-Wesley, 2001.

Perlmutter, B. and Zarkover, J., “virtual non-public Networking: A View from the

Trenches”, Prentice hall PTR, 2000.


  • There are currently no refbacks.