Chapter 3 Network Design and VPN Technologies
Chapter 3 Network Design and VPN Technologies
Chapter 3 Network Design and VPN Technologies
___________________________________________________
A virtual private network (VPN) extends a private network across a public network
and enables users to send and obtain information across pooled or public networks
as if their computing man oeuvres were directly associated to the cloistered system.
Applications running across the VPN may therefore benefit from the functionality,
.security, and management of the private network
The virtual private network (VPN) is the excellent method for distributed services
provides on public network structure. VPN offers low cost, efficient use of
bandwidth, scalable and flexible functionality, secure and private connections. VPN
provides a virtual private line between two network sites that network traffic pass
through. VPN network is affected by several points such as operating system,
.hardware devices being used, interoperability and algorithm being implemented
VPN can be classified according to the tunneling security issue, location of endpoints,
connectivity types, security mechanisms robustness, and the types of tunneling
.protocols
VPN provide connectivity through a tunnel which is a virtual link between two nodes
may separate by a number of networks. Figure 1.1 above shows VPN tunneling
structure. The tunnel is established within the router and provided with the IP
Chapter 3 Network Design and VPN Technologies
___________________________________________________
address of the router at the second end. Every packet is encapsulated inside the IP
datagram using IP address of the router at the far end of tunnel as a destination
.address
The two endpoints must use the same tunneling protocol. These logical tunnels that
carry the IP packet are independent of the payload, and have different headers due
.to the protocol implemented
VPN provides secure and encrypted virtual connections over IP network by encrypts
and encapsulates each packet before passing it through a tunnel. VPN uses
authentication to ensure data integrity and confidentiality. VPN uses dynamic tunnel
for efficient bandwidth usage and flexibility matter for creating and removing tunnels
.at any time
VPNs tunneling add an overhead to IP packets size, that effect bandwidth utilization
in network specifically if the packet size is short. This effect lays on the end router to
.decapsulate the packet, performs decryption for the packet
:History of VPN
The technology for implementing VPNs has been in existence for some
time. Their origins can be found in the Virtual Circuit. Virtual circuits are
easy to implement in highly connected networks as well as being cost
effective. We will see that these benefits also apply to VPNs. The virtual
circuit was originally produced in the late seventies and early eighties. The
basic structure of the virtual circuit is to create a logical path from the
source port to the destination port. This path may incorporate many hops
between routers for the formation of the circuit. The final, logical path or
virtual circuit acts in the same way as a direct connection between the two
ports. In this way, two applications could communicate over ashared
network. Virtual circuit technology progressed with the
addition of encryption equipment to router systems. This new
equipment enciphered information between the ports of the virtual circuit.
This meant that attackers would not be able to access information in
transit between the communicating entities. Later, other security
technologies were added such as token authentication. The
communication lines were, unfortunately, still open to attack and this lead
Chapter 3 Network Design and VPN Technologies
___________________________________________________
to the development of secure communication over a public network, a
.VPN
Intranet based VPN: When several offices of the same company are connected •
.using Site-to-Site VPN type, it is called as Intranet based VPN
Extranet based VPN: When companies use Site-to-site VPN type to connect to the •
.office of another company, it is called as Extranet based VPN
Transport mode • (ii) Tunneling mode The work of transport mode is to )i( • .2
encrypt the message in the data packet and the tunneling mode encrypts the whole
data packet. IPSec can also be used with other security protocols to improve the
.security system
SSL and TLS: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) .5
generate a VPN connection where the web browser acts as the client and user access
is prohibited to specific applications instead of entire network. Online shopping
websites commonly uses SSL and TLS protocol. It is easy to switch to SSL by web
browsers and with almost no action required from the user as web browsers come
integrated with SSL and TLS. SSL connections have “https” in the initial of the URL
.”instead of “http
Features in VPN [6]
Provide extended connections across multiple geographic locations without using a •
.leased line
Provides flexibility for remote offices and employees to use the business intranet •
over an existing Internet connection as if they're directly connected to the network
Chapter 3 Network Design and VPN Technologies
___________________________________________________
Saves time and expense for employees who commute from virtual workplaces •
VPN is preferred over leased line since leases are expensive, and as the distance •
. between offices increases, the cost of leased line increase
IPSec VPN and SSL VPN are two solutions of VPN which are widely used in WLAN •
.VPN’s lower costs by eliminating the need for expensive long-distance leased lines •
A local leased lines or even broadband connection is all that’s needed to connect •
.the internet and utilize the public network to surely tunnel a private connection
Data transfers are encrypted •
.Cost is low to implement •
Disadvantages of VPN [7]
.VPN connection is slow •
Because the connection travels over public lines, a strong understanding of •
network security issues and proper precautions before VPN deployment are
.necessary
VPN connection stability is mainly in control of the internet scalability, factors •
.outside an organization control
Chapter 3 Network Design and VPN Technologies
___________________________________________________