We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Resilient Internet access using tunnel-based solution for malicious ISP blocking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Abu-Amara, M. ; Comput. Eng. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia ; Asif, M.A.K. ; Sqalli, M.H. ; Mahmoud, A.
more authors

A tunnel-based solution is presented in this paper to provide a resilient Internet access in face of a malicious act of denial of Internet access by higher-tier Internet service providers (ISPs). The proposed solution describes the different types of tunneling protocols that can be used, and the needed configurations to establish the tunnels. The validity of the proposed solution is demonstrated by means of network simulations using OPNET. Furthermore, the proposed solution is evaluated using different types of traffic generated by well known applications such as file transfer protocol (FTP) and video conferencing. We also considered different tunneling protocols such as IP-in-IP, generic routing encapsulation (GRE), and GRE with checksum under high traffic load. Based on the simulation results, the IP-in-IP tunneling protocol performs the best among all protocols considered in this work.

Published in:

Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on

Date of Conference:

27-29 May 2011