Volume no :
9 |
Issue no :
2
Article Type :
Scholarly Article
Author :
Mr. P. T. Talole Sir, Vinesh Chavhan, Rushikesh Kanfade, Vaibhav Wanere
Published Date :
June, 2025
Publisher :
Journal of Artificial Intelligence and Cyber Security (JAICS)
Page No: 1 - 5
Abstract : This study aimed to identify the differences between state of the art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase performance for the users and save costs for organizations who wish to deploy VPNs. With the remote workforce increasing issues of network reliability also increases, due to wireless connections and networks beyond the control of companies. This emands an answer to the question how do VPN solutions differ in performance with stable and unstable networks? This work attempted to answer this question. This study is generally concerning VPN performance but mainly how the specific solutions perform under unreliable network conditions. It was achieved by researching past comparisons of VPN solutions to identify what metrics to analyse and which VPN solutions have been recommended. Then a test bed was created in a lab network to control the network when testing, so the different VPN implementations and operating systems have the same premise. To establish baseline results, performance testing was done on the network without VPNs, then the VPNs were tested under reliable network conditions and then with unreliable network conditions. The results of that were compared and analysed
Keyword Virtual Private Network, VPN, Wire-Guard, IPSec, OpenVPN, Performance, Unreliability, Packet Loss, Delay.
Reference:

[1] Charlie Scott, Paul Wolfe and Mike Erwin,” Virtual Private Networks”,  Second Edition January 1999.

[2] Martin W. Murhammer, Orcun Atakan, Zikrun Badri, Beomjun Cho Hyun Jeong Lee,  Alexander Schmid, “A Comprehensive Guide to Virtual Private Networks, Volume III:  CrossPlatform Key and Policy Management”, November1999.

[3] Shashank Khanvilkar and Ashfaq Khokhar, ―Virtual Private Networks: An Overview  with Performance Evaluation‖, University of Illinois at Chicago, IEEE Communications  Magazine, October 2004.

[4]Virtual Private Networks by Shamod Lacoul  http://www.slidefinder.net/V/Virtual_Private_Networks_ Shamod_Lacoul/32104518

[5] Yurcik and W. Doss, ―A planning framework for implementing VPNs‖, Volume: 3  Issue: 3, May-June 2001.

[6] Reuven Cohen and Gideon Kaempfer, ―On the Cost of Virtual Private Networks‖,  IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 200