Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.4.141

IPSec Accelerator Performance Analysis Model for Gbps VPN  

윤연상 (충북대학교)
류광현 (충북대학)
박진섭 (충북대학)
김용대 (충북대학)
한선경 (충북대학)
유영갑 (충북대학교)
Abstract
This paper proposes an IPSec accelerator performance analysis model based a queue model. It assumes Poison distribution as its input traffic load. The decoding delay is employed as a performance analysis measure. Simulation results based on the proposed model show around 15% differences with respect to actual measurements on field traffic for the BCM5820 accelerator device. The performance analysis model provides with reasonable hardware structure of network servers, and can be used to span design spaces statistically.
Keywords
IPSec accelerator; M/M/I system; Poison distribution; Decoding delay;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A.V. Borshchev and Y.G. Karpov. 'System modeling. simulation and analysis using COVERS active objects.' IEEE Workshop on Engineering of Computer Based Systems (ECBS '97). pp. 220-227. Mar 1997
2 이호우, 대기행렬이론-확률과정론적 분석, 시그마프레스, 1998
3 V. Paxson and S. Floyd. 'The failure of Poisson modeling.' IEEE/ACM Trans on Networking. vol. 3. pp. 226-244. June 1995   DOI   ScienceOn
4 Broadcom Co.. BCM5820 Product Brief http://www.broadcom.com/collateral/pb/5820-PB04-R. pdf
5 한국전산원. 2002 국가정보화백서
6 XJ Technologies. Anylogic4.5 Product Overview. http://www.xjtek.com
7 M. McLoone and J.V. McCanny, 'A single-chip IPSec cryptographic processor.' IEEE Workshop on Signal Processing Systems. pp. 133-138. Oct. 2002
8 C. Fraleigh and S. Moon, 'Packetlevel traffic measurements from the SPRINT IP backbone,' IEEE Journal of Network. vol. 17. pp. 6-16. Nov. 2003
9 M. Merkow and J. Breithaupt. The Complete Guide to Internet Security, AMACOM. 2000
10 I. Cao and M. Anderson. 'Web server performance modeling using an M/G/1/$K^*$ PS queue.' 10th Int'l. Conf. on Telecommunications, vol. 2. pp. 1501-1506, Feb. 2003
11 윤문길. 인터넷 접속기술. http://mslab.hau.ac.kr/it_02/4. ppt
12 S. Miltchev and S. Ioannidis, 'A study of the relative costs of network security protocols,' In Proceedings of USENIX Annual Technical Conf.. Freenix Track. pp. 41-48, June 2002