scholarly journals USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS

Author(s):  
M.A. Khizirova ◽  
Katipa Chezhimbayeva ◽  
Almira Mukhamejanova ◽  
Zhanat Manbetova ◽  
Bulbul Ongar

This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for organizing a VPN. Also, the work analyzes the specifics of the work of corporate information systems and networks intended for their maintenance, showed that for building a corporate network it is advisable to use virtual private network (VPN) technology, which makes it possible to ensure the fulfillment of the basic requirements for the security and quality of customer service and applications and the current state and direction of development of VPN technology when creating new generation corporate networks, while highlighting the main tasks that need to be addressed when creating a network. Some features of setting up an IPSec VPN server for corporate networks are considered.

Author(s):  
Ganesh Chandra Deka ◽  
Prashanta Kumar Das

With Open source virtualization software like VMware Player and Virtualbox, it is easy to install and run Virtual machines (VMs) in a home desktop computer. Endian Firewall provides a service called VPN (Virtual Private Network); it offers a secure communication between two different networks by using internet connection. In this chapter, we will install an Endian Firewall Community OS in one of the virtual machines (VM) and network it with the other VM for creating a firewall/router/proxy/VPN.


2021 ◽  
Vol 251 ◽  
pp. 02032
Author(s):  
Benjamin Tovar ◽  
Brian Bockelman ◽  
Michael Hildreth ◽  
Kevin Lannon ◽  
Douglas Thain

The processing needs for the High Luminosity (HL) upgrade for the LHC require the CMS collaboration to harness the computational power available on non-CMS resources, such as High-Performance Computing centers (HPCs). These sites often limit the external network connectivity of their computational nodes. In this paper we describe a strategy in which all network connections of CMS jobs inside a facility are routed to a single point of external network connectivity using a Virtual Private Network (VPN) server by creating virtual network interfaces in the computational nodes. We show that when the computational nodes and the host running the VPN server have the namespaces capability enabled, the setup can run entirely on user space with no other root permissions required. The VPN server host may be a privileged node inside the facility configured for outside network access, or an external service that the nodes are allowed to contact. When namespaces are not enabled at the client side, then the setup falls back to using a SOCKS server instead of virtual network interfaces. We demonstrate the strategy by executing CMS Monte Carlo production requests on opportunistic non-CMS resources at the University of Notre Dame. For these jobs, cvmfs support is tested via fusermount (cvmfsexec), and the native fuse module.


2013 ◽  
Vol 475-476 ◽  
pp. 699-702
Author(s):  
Liang Dong Qu ◽  
Xin Yu Cui ◽  
Xiao Nan Liu

Vehicle information system is the data center of vehicle communication networks, and the vehicle gateway is the core of the vehicle information system, in order to support the vehicle information system both WLAN and CDMA interfaces, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack called driver middleware. The VND can establish a virtual private network between the vehicle information device and agent server. The virtual network interface is designed to catch the packets both input and output processing for the sake of checking the route before the packets transmission. Both the terminal and the agent have the driver middleware to ensure smooth flow routing.


2019 ◽  
Vol 22 (4) ◽  
pp. 283-293
Author(s):  
Subhi Aswad Mohammed

This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON   simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response


2020 ◽  
Vol 26 (2) ◽  
pp. 77-84
Author(s):  
Srecko Krile ◽  
Martin Medvecky

In the paper, a new construction technique for virtual network (e.g., Virtual Private Network (VPN)) based on flow permutation algorithm is proposed. In existing methods for creating virtual networks, whereby virtual networks are constructed one by one in time and the new virtual network can use only the remaining resources, it could be non-optimal. Our approach treats all traffic flows simultaneously and is capable of balancing the network much better than other existing techniques. As we show, the proposed new construction technique work well, even in the condition of hard loaded networks operating on the edge of capacity, i.e., in situations when traditional techniques could cause unbalanced network and significant congestion problems. For huge number of traffic flows, heuristic algorithm, whose complexity rises linearly, is evaluated.


Author(s):  
Madhusanka Liyanage ◽  
Mika Ylianttila ◽  
Andrei Gurtov

Virtual Private Network (VPN) services are widely used in the present corporate world to securely interconnect geographically distributed private network segments through unsecure public networks. Among various VPN techniques, Internet Protocol (IP)-based VPN services are dominating due to the ubiquitous use of IP-based provider networks and the Internet. Over last few decades, the usage of cellular/mobile networks has increased enormously due to the rapid increment of the number of mobile subscribers and the evolvement of telecommunication technologies. Furthermore, cellular network-based broadband services are able to provide the same set of network services as wired Internet services. Thus, mobile broadband services are also becoming popular among corporate customers. Hence, the usage of mobile broadband services in corporate networks demands to implement various broadband services on top of mobile networks, including VPN services. On the other hand, the all- IP-based mobile network architecture, which is proposed for beyond-LTE (Long Term Evolution) networks, is fuel to adapt IP-based VPN services in to cellular networks. This chapter is focused on identifying high-level use cases and scenarios where IP-based VPN services can be implemented on top of cellular networks. Furthermore, the authors predict the future involvement of IP-based VPNs in beyond-LTE cellular networks.


Author(s):  
Mirjana D. Stojanovic ◽  
Vladanka S. Acimovic-Raspopovic

A virtual private network (VPN) can be broadly defined as a “restricted communication between a set of sites, making use of a backbone that is shared with other traffic not belonging to that communication” (Carugi & De Clercq, 2004, p.116). Since the late nineties, with pervasive deployment of the Internet protocol (IP) technology in corporate networks, IP-based VPNs, in several forms and based on different network technologies, have become a promising solution for a wide range of corporate network services.


Author(s):  
Mirjana D. Stojanovic ◽  
Vladanka S. Acimovic-Raspopovic

A virtual private network (VPN) can be broadly defined as a “restricted communication between a set of sites, making use of a backbone that is shared with other traffic not belonging to that communication” (Carugi & De Clercq, 2004, p.116). Since the late nineties, with pervasive deployment of the Internet protocol (IP) technology in corporate networks, IP-based VPNs, in several forms and based on different network technologies, have become a promising solution for a wide range of corporate network services.


Sign in / Sign up

Export Citation Format

Share Document