scholarly journals Implementation and Analysis of IP Tunnel in Virtual Private Networks

In Virtual Private Network tunneling is designed to examine the performance of Private network for transferring the data. It implements and analysis the IP tunnel in Virtual Private Network (VPN). Tunneling is a method that is used to transfer the data or packet of one protocol using different network communication mediums of another protocol. This research is emphasized to examine the performance of Private network using tunneling for the transfer of data. Basically tunneling is used to send a packet, data or traffic of one protocol using an intermediate structure of another protocol. It is called as the process of encapsulation, transmission, over different types of secured networks as encapsulation and security is one of the procedure within this network provides security .This paper gives overview of a Virtual Private Network with IP Tunnel. Virtual private Network generates a secure encryption and decryption of data with the help of IP tunneling at end points. Basically VPN routes through the internet from a private network to transferring the data from one end (source) to other end (destination). With the help of tunneling and VPN user can check the working of different parameters under various applications.

Author(s):  
Alok Vishwakarma

Virtual Private Network, Its ‘Virtual', Its ‘Private' and it's a ‘Network'. A virtual private network (VPN) provides a secure connection between a sender and a receiver over a public non-secure network such as the Internet. A secure connection is generally associated with private networks. (A private network is a network that is owned, or at least controlled via leased lines, by an organization.). We can define a VPN by the following relationship: VPN = Tunneling + Security + QoS Parameters. This Chapter deals with Advantages of VPNs, Types of VPNs, VPN Architectures, VPN Models, VPN Devices, Technologies and Protocols Used to Enable Remote Access VPNs.


2014 ◽  
Vol 984-985 ◽  
pp. 1269-1275
Author(s):  
D.S. Dayana

Users interested to use the Internet from anywhere and at any time. For this purpose, the Internet Engineering Task Force proposed the concept of network mobility. But the IETF’s mobile Virtual Private Network does not support for real time applications. In this paper, the user’s communication between public networks and the private networks can be secured by using Virtual Private Network gateway. This secured user’s communication is based on Session Initiation Protocol and AES algorithm. The security impact is computed analytically and the performance is simulated. The signaling cost can also be reduced in this approach. Cryptographic mechanism like encryption and decryption is applied through the AES algorithm, so that the data transmitted through the VPN gateway is quality and secured.


EDPACS ◽  
1999 ◽  
Vol 27 (2) ◽  
pp. 16-16 ◽  
Author(s):  
Charlie Scott ◽  
Paul Wolfe ◽  
Mike Erwin

2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


Author(s):  
Bongsik Shin ◽  
Daniel C. Kinsella Jr.

An Internet-based Virtual Private Network (IVPN) is a system and service that enables secure communication within a controlled user group across the Internet public infrastructure. For the last few years, the Internet-based VPN has been available, providing organizational use for meaningful applications. The paper empirically investigates the value of IVPNs in managing communications among distributed business entities. For this, we conducted two case studies based on the information gathered from two companies. Then, a general decision model of the IVPN is proposed, which could be used for the assessment of its strategic value as well as for the design of virtual telecommunication networks at other organizations.


2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


2005 ◽  
Vol 1 (3) ◽  
pp. 137-143
Author(s):  
Nikos Manouselis ◽  
Andreas M. Maras

This paper presents the development of an agent-based Virtual Private Network (VPN) system that supports multimedia service brokering. The VPN agents employ multi-attribute preference models in order to represent the end-user preferences, and a multi-criteria decision making model to evaluate available services from network providers. A prototype multi-agent system demonstrating the proposed approach has also been implemented.


Sign in / Sign up

Export Citation Format

Share Document