Documente Academic
Documente Profesional
Documente Cultură
In our topic area, VPNs, we will now have a The term virtual has been sometimes soundly
closer look on anything that may lead us to an used in computing and computer science,
innovation. This new idea could be an namely in expressions like “virtual circuit” and
invention related to any of the tunnelling “virtual memory”. Alternatively, the term
protocols used in VPNs, a new encryption logical is used pretty much in the same sense
method that could bring some advantage and with the same meaning, as in the
and/or new terminology along what we called expression “logical address”.
an acronym focused approach.
So maybe VPNs could be called, or named,
2
Logical Private Networks..., and despite that (RFC 2637) and SOCKS (RFC 1928).
seeming more ado, for a Shakespeare's thing,
Google's indeed retrieving some relevant In coming up with a new encryption method
results that relate that freshly made-up that brought some advantages we considered
expression with the former. the fact that L2TP uses UDP to transport the
PPP data and that this is often encapsulated in
A considerably more sober and well written IPSec for encryption instead of using Point-to-
explanation of all these VPNs subtleties and Point encryption as does PPTP, for instance.
their discrete nature can be found along the
paper: "What is a VPN?", by Geoff Huston and Both L2TP and PPTP work at the link layer
Paul Ferguson [4]. (layer 2), while IPsec at the network level
(layer 3) and SOCKS at the Application level
Another good reference that was very useful to (he SOCKS client is implemented between the
make sense of the different kinds of VPNs application and
along the different tunnelling protocols used transport layers).
was the article “Types of VPNs”, by Erik
Rodriguez [5] An important concept in L2TP is that of
Attribute Value Pair (AVP).
Among the tunnelling protocols used in VPNs We couldn't come up with new idas to
we have: IPIP (RFC 1241 , RFC 1853 , RFC implement but here follows one image
2003), GRE - Generic Routing Encapsulation representing the L2TP Header Format and one
(created by Cisco), IPSec (RFC 4301) , L2TP along how AVP is organized:
- Layer2 Tunnelling Protocol. (RFC 2661) ,
PPTP - Point-to-Point Tunnelling Protocol
As for the IPsec tunnelling protocol a salient feature is that it encompasses encryption and
3
because we were aware of a new trend in Einstein would get along it better than Walt
encryption aiming to surpass other methods, Disney. Who born first, basically.
like AES and others, called “Elliptic curve
cryptography” (ECC), we did seek for it along And don't forget – just as a remark – there is a
tunnelling to find out that someone has tool called “stud finder” that may avoid you
proposed this kind of encryption for a specific problems and accidents if you ever dare to drill
feature used in IPsec, the IKE (Internet Key a hole in a wall! Is always good to know.
Exchange) (SOLINAS 2007, RFC 4754) [6] Also considered for our new ideas and
innovations were the authentication methods.
From KOSIUR, 1998 [7] we get and And if you like acronyms – along what our
understand that “although IPSec is more of a approach – here you have other three, to add
site-to-site tunnelling protocol that doesn't up to our investigations, that you may find
require any ISP intervention both PPTP and quite worth having a look:
L2TP [on the other hand] provide ISP(s) with • Remote Authentication Dial In User
an opportunity to provide value-added Service (RADIUS)
services for a VPN.” • Online Certificate Status Protocol
He mentions for instance the case of providing (OCSP)
special access concentrators to initiate tunnels • Challenge Handshake Authentication
on behalf of remote callers. Protocol (CHAP)
4
New Idea – Ubiquitous ready machines
Our new idea is very simple and can be stated he has a service provider for that matter, that
very clearly: to use VPNs so that the end user can after all provide that product and services
will be able to have ready machines with with a pay-once and life-time guarantee.
different licensed operating systems and
software, of any kind and sort, provided that
Conclusion
The future of proprietary and open source issues and its costly implementation. With new
Operating Systems is still an unknown, but authentication methods and more reliability on
trends in server-side software, cloud privacy and more integration of QoS, there is
computing and all along buying/renting/hiring likely that digital cash may become a reality in
of licensed products and services is very likely our present space and time existence.
to keep loving the idea of Plug-and-Play The reasons why VPNs have been dismissed in
(PnP), and, maybe even more of pay-once. so many up-to-date books on the subject of
And finally, the future VPNs may foster the computer networks is a bit odd, meanwhile it
future of digital cash, that despite being in may be even more stranger to find out that
demand for a long time by many individuals as most LEDs are red and/or that blue LEDs
been made postponed because of security should be named BLEDs instead.
References
[2] COMER, Douglas 2007 Internet Book, The: Everything You Need to Know About Computer
Networking and How the Internet Works, 4/e
[3] BEZANOV, Goran 2007 , 'Computer Networks – An Overview Series Publication', pp. 166
5
[4] HUSTON, Geoff & FERGUSON, Paul , 1998, 'What is a VPN?', viewed October 2009
<http://www.potaroo.net/papers/1998-3-vpn/vpn.pdf>
[6] SOLINAS, Jerome , 2007, 'IKE and IKEv2 Authentication Using the Elliptic Curve Digital
Signature Algorithm (ECDSA)', viewed October 2009, <http://www.rfc-editor.org/rfc/rfc4754.txt>
[7] KOSIUR, Dave , 1998, 'Building and Managing Virtual Private Networks', JohnWiley & Sons,
Inc, England
References number [1] and [3] are of the same book and should be listed only one. The reason we
use two items for this reference is that the latter also has the page indication.
We consider it a very useful text and it helped us understand the topic area in context. Is also
reliable because the author is a professor and is one of our teachers.
Refrences number [2] and [4] also very useful and reliable because they are very specific books
related to our topic areas and can be found in many of the University libraries visited.
Refrence number [6] is a RFC, so it is a bit self-explanatory why it is relevant and can be reliable.
Finally, reference number [5] was one of the most useful websites visited.