期刊文献+

虚拟专用网中语音电话的应用及网络性能

Application of voice-over-IP in virtual private network and network performance
下载PDF
导出
摘要 为研究虚拟专用网(VPN)基于Internet协议安全性(IPSec)进行语音电话(Vo IP)数据的输送及网络性能的影响,在分析IPSec技术、隧道封装技术和VPN技术原理的基础上,设计了一个企业的VPN网络拓扑,对语音路由器、语音交换机和外网服务器的配置及其作用进行了说明,利用OPNET平台对网络性能进行了仿真和分析.结果表明,VPN的隧道封装技术以及数据机密性、数据完整性、起源认证等加密措施使得网络配置变得复杂,语音数据在VPN隧道的传输过程中,丢包率不高,但传输速率变得缓慢,网络延迟加大,IPSec采用的安全策略导致网络抖动明显,收敛速度慢,语音质量也随之减低. To study the voice-over- internet protocol (VoIP) data transmission through virtual private network (VPN) based on internet protocol security (IPSec) and the influence on network performance, an enterprise's VPN network topology was designed based on the analysis of IPSec technology , tunnel encapsulation technology and VPN technology. The configuration and the function were explained on the voice router and the voice switch and the outgoing server, the network performance was simulated and analyzed based on OPNET performance. The results show that VPN can further complicate the configuration because of its tunnel encapsulation technology and encryption measures, such as data confidentiality, data integrity and authentication, etc. ;in the process of the VPN tunnel transmission, VoIP voice data has low packet lost rate, but the transfer rate becomes slow and the network delay increases;the obvious network jitter, slow convergence speed, low VoIP quality are caused by IPSec security policy.
作者 李清平
出处 《武汉工程大学学报》 CAS 2015年第6期73-78,共6页 Journal of Wuhan Institute of Technology
关键词 协议安全性 虚拟专用网 语音电话 网络性能 网络延迟 internet protocol security virtual private network voice -over-IP Network Performance Network Delay
  • 相关文献

参考文献8

二级参考文献43

  • 1江涛.VPN技术及应用[J].晋图学刊,2006(4):24-27. 被引量:6
  • 2黄玉春.如何从IPv4过渡到IPv6[J].计算机时代,2004(8):11-13. 被引量:12
  • 3朱浩,吕明.用UDP协议实现网络语音广播[J].电信工程技术与标准化,2005,18(8):53-56. 被引量:3
  • 4SrinivasVegesna.IP服务质量[M].北京:人民邮电出版社,2001.54-99.
  • 5Robert Doverspike and Jennifer Yates. AT&T Labs, Challenges for MPLS in Optical Network Restoration [ J ]. IEEE Communications Magazine, 2001,2 : 89 - 90.
  • 6R Younglove. Virtual private networks--how they work[J]. Computing & Control Engineering Journal, 2000,11 (6).
  • 7I Verbauwhede,. F Hoomaert, J Vandewalle. Security and performance optimization of a new DES data encryption chip[ J]. Solid - State Circuits, 1988,23(3).
  • 8Victor Firoiu, et al. Theories and Models for Internet Quality of Service[ C]. Proceedings of the IEEE, 2002,5.
  • 9胡建伟.网络安全与保密[M].西安:西安电子科技大学出版社,2006:233-241.
  • 10[1]RFC 2637.Point to Point Tunneling Protocol (PPTP)[S].

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部