Академический Документы
Профессиональный Документы
Культура Документы
net/publication/304287577
CITATIONS READS
6 312
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Irfaan Coonjah on 28 August 2018.
Fig. 2. Latency comparison between UDP and TCP inside a UDP tunnel
Fig. 1. Latency comparison between UDP and TCP inside a TCP tunnel
Fig. 3. Latency comparison between UDP and TCP inside a TCP tunnel in
Figure 1 demonstrates the latency comparison between UDP WAN environment
and TCP inside a TCP tunnel in a LAN environment, measured
in seconds and packet size in megabyte. The UDP tunnel gives
increased transfer speed compared to TCP tunnel when the tunnel. The TCP stacking starts when the message size reaches
packet size increases. The latency gap in UDP tunnel becomes 2 MB, since the difference in latency before 2MB is very small
wider when the packet size increases from 4Mb to 10Mb. This when compared to the latency gap after 2MB. On the other
can be explained with the fact that when the VPN uses TCP hand, figure 2 shows the latency comparison between UDP
tunnel, TCP connections will use IP packets sent through the and TCP when using a UDP tunnel in a LAN environment.
VPN, therefore creating the TCP overhead twice. The UDP When using UDP tunnel, we do not have the double stacking
tunnel base VPN thus has the potential for slightly better problem. Compared to figure 1, the latency is smaller for
performance. TCP provides a bidirectional tunnel for data, both TCP and UDP traffic. It was said that encryption, slow
but relies on packets, so there will be some ”administrative” down UDP traffic since when bits of data is missing the
packets, e.g. acknowledges: this is the TCP overhead. For entire message may need to be re-sent again, causing latency.
instance, if the server A sends 10 MB to the client B, client During the tests, it is shown that, UDP message is not affected
B will also send some packets to A confirming reception. by encryption mechanism when the size is between 1MB to
When doing VPN over TCP, the VPN has its own TCP-based 10MB. Sending TCP traffic inside a TCP tunnel does not
overhead, and transports the administrative packets for any create the double TCP stacking problem, this is proved in
connection within the VPN. The graph therefore confirm the figure 2. When we compare the two graphs for example, the
TCP stacking problem when transmitting TCP traffic over TCP time taken to transmit a TCP message size of 2MB is twice
[2] P. Rawat, J. Bonnin, and L. Toutain, “Designing a tunneling header
compression (tucp) for tunneling over ip,” in Wireless Communication
Systems. 2008. ISWCS ’08. IEEE International Symposium on, pp. 273–
278, Oct 2008.
[3] R. Bush and T. Griffin, “Integrity for virtual private routed networks,” in
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE
Computer and Communications. IEEE Societies, vol. 2, pp. 1467–1476
vol.2, March 2003.
[4] Y. Li, W. Cui, D. Li, and R. Zhang, “Research based on osi model,”
in Communication Software and Networks (ICCSN), 2011 IEEE 3rd
International Conference on, pp. 554–557, May 2011.
[5] A. Mayer, B. Collini-Nocker, F. Vieira, J. Lei, and M. Castro, “Analytical
and experimental ip encapsulation efficiency comparison of gse, mpe,
and ule over dvb-s2,” in Satellite and Space Communications, 2007.
IWSSC ’07. International Workshop on, pp. 114–118, Sept 2007.
[6] M. Mimura and H. Tanaka, “Behavior shaver: An application based
layer 3 vpn that conceals traffic patterns using sctp,” in Broadband,
Wireless Computing, Communication and Applications (BWCCA), 2010
International Conference on, pp. 666–671, Nov 2010.
[7] D. Sarkar and H. Narayan, “Transport layer protocols for cognitive net-
works,” in INFOCOM IEEE Conference on Computer Communications
Workshops , 2010, pp. 1–6, March 2010.
[8] I.-S. Yoon, S.-H. Chung, and J.-S. Kim, “Implementation of lightweight
tcp/ip for small, wireless embedded systems,” in Advanced Information
Fig. 4. Latency comparison between UDP and TCP inside a UDP tunnel in Networking and Applications, 2009. AINA ’09. International Conference
WAN environment on, pp. 965–970, May 2009.
[9] N. Morita, I. Inoue, M. Mito, and T. Akaike, “Service specific connection
oriented protocol for the atm adaptation layer,” in Network Protocols,
when using TCP tunnel; the latency in TCP tunnel is around 1993. Proceedings., 1993 International Conference on, pp. 128–135, Oct
1993.
10 seconds whereas in UDP tunnel, the latency is around 5 [10] Y.-T. Li, D. Leith, and R. Shorten, “Experimental evaluation of tcp pro-
seconds. Figure 3 is a replication of the test perform in figure tocols for high-speed networks,” Networking, IEEE/ACM Transactions
1, that is, latency comparison between UDP and TCP inside a on, vol. 15, pp. 1109–1122, Oct 2007.
[11] M.-Y. Park and S.-H. Chung, “Distinguishing the cause of tcp retrans-
TCP tunnel in a WAN environment. The latency gap increases mission timeouts in multi-hop wireless networks,” in High Performance
proportionally when the message size increases. The pattern is Computing and Communications (HPCC), 2010 12th IEEE International
similar to figure 1, except that the latency is higher. The test Conference on, pp. 329–336, Sept 2010.
[12] T. Le, G. Kuthethoor, C. Hansupichon, P. Sesha, J. Strohm, G. Hadynski,
in figure 4 has been performed in a WAN environment, that D. Kiwior, and D. Parker, “Reliable user datagram protocol for airborne
is latency comparison between UDP and TCP inside a UDP network,” in Military Communications Conference, 2009. MILCOM
tunnel in a WAN environment. In a WAN environment, the 2009. IEEE, pp. 1–6, Oct 2009.
[13] E. Bethel and J. Shalf, “Grid-distributed visualizations using connec-
latency graphs for both TCP and UDP are two straight lines tionless protocols,” Computer Graphics and Applications, IEEE, vol. 23,
and the difference in latency is constant. pp. 51–59, Mar 2003.
[14] S. Jung, S. Hong, and K. Kim, “On achieving high performance
wireless mesh networks with data fusion,” in World of Wireless, Mobile
IX. C ONCLUSION and Multimedia Networks, 2007. WoWMoM 2007. IEEE International
Symposium on a, pp. 1–8, June 2007.
This paper addresses performance comparison between TCP [15] Y.-L. Chang and C.-C. Hsu, “Connection-oriented routing in ad hoc
and UDP tunnel connections. Two distinct scenarios were networks based on dynamic group infrastructure,” in Computers and
Communications, 2000. Proceedings. ISCC 2000. Fifth IEEE Symposium
used to test the two VPN tunneling mechanisms. The results on, pp. 587–592, 2000.
disclose that UDP tunnel utilizes the link better and thus [16] D. Lu, Y. Qiao, P. Dinda, and F. Bustamante, “Modeling and taming
provides radically improved transfer times and speed when parallel tcp on the wide area network,” in Parallel and Distributed
Processing Symposium, 2005. Proceedings. 19th IEEE International,
compared with TCP tunnel. The results also demonstrates that pp. 68b–68b, April 2005.
indeed TCP in UDP tunnel provides better latency. [17] K.-C. Leung, V. Li, and D. Yang, “An overview of packet reorder-
As future work it would be good to expand this study by ing in transmission control protocol (tcp): Problems, solutions, and
challenges,” Parallel and Distributed Systems, IEEE Transactions on,
investigating the performance of the tunnels on Mobile net- vol. 18, pp. 522–535, April 2007.
work. OpenVPN can be installed on mobile devices, therefore
another direction is to test the VPN on mobile device, and
detect how much energy is required for this sort of secure
connections, as mobile devices cannot afford batteries with
unlimited capacity.
R EFERENCES
[1] S. Zhou and J. Luo, “A novel ip over udp tunneling based firewall traver-
sal for peer-to-peer networks,” in Service Operations and Logistics, and
Informatics (SOLI), 2013 IEEE International Conference on, pp. 382–
386, July 2013.