Sunteți pe pagina 1din 6

Introduction

conceptual model helps us understand the


VPN usually stands for Virtual Private complex pieces that make up an internetwork
Network, although the expression Virtual and for that matter to understand the Internet:
Private Networking is also found, namely on the network of all those resulting large
our fellow tutor's book, “Computer Networks” computer networks.
[1]. So we see that internetworking is a wide
Maybe the designation VPN(s), using the concept as it encompasses the concept of
plural, makes it more clear that we are talking computer network – a group of interconnected
about a plurality of things but that do not computers – and can be connecting more than
encompass separate physical structures. two of those.
This disambiguation are a bit relevant and the The term private network has been used in
more so because of the plethora of different the past to designate different computer
names and concepts that are used when we talk networks, like LANs, WANs, SANs or MANs
about the internet, also called, the Internet, (Local, Wide, Storage and Metropolitan Area
using upper-case, or simply, the net. Networks). These are computer devices that
Basically we ought to distinguish in the first are connected with each other and made
place between the concept of internetworking, private using a dedicated connection, usually a
which involves connecting two or more leased line – made private upon agreement -
computer networks that functions as a single from the public telephone infrastructure. There
large network, and the more generalized are emerging terms such as SOHO (Small
concept of the Internet: a network of networks Office/Home office), H/PAN (Home or Private
unified by an internetworking protocol Area Network) to designate private networks
standard, a set of protocols generally named in a home or office place, but they are
the Internet Protocol Suite (TCP/IP), that basically LANs.
involves these two fundamental protocols – the
TCP and the IP – among others. The two main aspects of VPNs will lead us to
the idea of virtual, the illusion of a direct
connection and separate physical structure, and
The OSI (Open System Interconnection) that of private, that can be kept secret:
model represents the building blocks for tunnelling and encryption.
internetworks. Understanding this widely used The concept of encapsulation will be used in
the context of tunnelling and despite being
also a main aspect of our topic area it is used COMER, 2007 [2] gives us a very good
in quite different contexts along the computer explanation of what a VPN is doing with his
networks study, namely in the network analogy of letters addressed inside another
delivery protocols. letter's envelope, with a different address. The
same way, VPNs use tunnelling to encase data
A tunnelling protocol encapsulates packets at a and the messages to be exchanged – the
peer level. It can be used to transport multiple payload protocol – and creates a peer-to-peer
protocols over a common network or provide that uses the public network delivery protocol
the vehicle for a point-to-point link that using and will need for that matter some form of
encryption makes up a Virtual Private encryption to secure such communication.
Network. The idea of "tunnel" is that of
creating a way for packets of different types to As Dr Goran Bezanov states in his text:
share the same peer-to-peer mechanism. A “Many protocols encapsulate the data;
tunnelling protocol should not be confused however tunnelling refers to those protocols
with an “encapsulation protocol” because that carry a protocol from another networking
many network protocols encapsulate. It is for system within an IP packet; such as for
that matter more correct to see it a "port example, transmitting NetWare IPX packets
forwarding" protocol that allows reaching a within IP”. [3]
destination bypassing the routing “port
forwarding” mechanisms.

Topic Area Context – The pay-once/plug-and-play desirability

In our topic area, VPNs, we will now have a The term virtual has been sometimes soundly
closer look on anything that may lead us to an used in computing and computer science,
innovation. This new idea could be an namely in expressions like “virtual circuit” and
invention related to any of the tunnelling “virtual memory”. Alternatively, the term
protocols used in VPNs, a new encryption logical is used pretty much in the same sense
method that could bring some advantage and with the same meaning, as in the
and/or new terminology along what we called expression “logical address”.
an acronym focused approach.
So maybe VPNs could be called, or named,

2
Logical Private Networks..., and despite that (RFC 2637) and SOCKS (RFC 1928).
seeming more ado, for a Shakespeare's thing,
Google's indeed retrieving some relevant In coming up with a new encryption method
results that relate that freshly made-up that brought some advantages we considered
expression with the former. the fact that L2TP uses UDP to transport the
PPP data and that this is often encapsulated in
A considerably more sober and well written IPSec for encryption instead of using Point-to-
explanation of all these VPNs subtleties and Point encryption as does PPTP, for instance.
their discrete nature can be found along the
paper: "What is a VPN?", by Geoff Huston and Both L2TP and PPTP work at the link layer
Paul Ferguson [4]. (layer 2), while IPsec at the network level
(layer 3) and SOCKS at the Application level
Another good reference that was very useful to (he SOCKS client is implemented between the
make sense of the different kinds of VPNs application and
along the different tunnelling protocols used transport layers).
was the article “Types of VPNs”, by Erik
Rodriguez [5] An important concept in L2TP is that of
Attribute Value Pair (AVP).
Among the tunnelling protocols used in VPNs We couldn't come up with new idas to
we have: IPIP (RFC 1241 , RFC 1853 , RFC implement but here follows one image
2003), GRE - Generic Routing Encapsulation representing the L2TP Header Format and one
(created by Cisco), IPSec (RFC 4301) , L2TP along how AVP is organized:
- Layer2 Tunnelling Protocol. (RFC 2661) ,
PPTP - Point-to-Point Tunnelling Protocol

As for the IPsec tunnelling protocol a salient feature is that it encompasses encryption and

3
because we were aware of a new trend in Einstein would get along it better than Walt
encryption aiming to surpass other methods, Disney. Who born first, basically.
like AES and others, called “Elliptic curve
cryptography” (ECC), we did seek for it along And don't forget – just as a remark – there is a
tunnelling to find out that someone has tool called “stud finder” that may avoid you
proposed this kind of encryption for a specific problems and accidents if you ever dare to drill
feature used in IPsec, the IKE (Internet Key a hole in a wall! Is always good to know.
Exchange) (SOLINAS 2007, RFC 4754) [6] Also considered for our new ideas and
innovations were the authentication methods.

From KOSIUR, 1998 [7] we get and And if you like acronyms – along what our
understand that “although IPSec is more of a approach – here you have other three, to add
site-to-site tunnelling protocol that doesn't up to our investigations, that you may find
require any ISP intervention both PPTP and quite worth having a look:
L2TP [on the other hand] provide ISP(s) with • Remote Authentication Dial In User
an opportunity to provide value-added Service (RADIUS)
services for a VPN.” • Online Certificate Status Protocol
He mentions for instance the case of providing (OCSP)
special access concentrators to initiate tunnels • Challenge Handshake Authentication
on behalf of remote callers. Protocol (CHAP)

Another important trend is that of Along the "Virtual Private Networks


“Multiprotocol Label Switching” (MPLS) and Identifier" methodology (RFC 2685), there are
for that matter a salient feature in MPLS two salient features in VPNs, and because
VPNs' future is that of monitoring LSP RFCs are of inherent public nature I will freely
availability in MPLS networks [8]. quote from it : “(1) Because a VPN is private,
it may use a private address space which may
One important protocol sometimes mentioned overlap with the address space of another VPN
along the subject of communications is also or the Public Internet.
that of a HTP (Human Telephonic Protocol), (2) A VPN may span multiple IP Autonomous
that basically establishes common-senses like Systems (AS) or Service Providers.”
for instance “Hi!” or “Hello” to start a
conversation. “Wer geboren zuerst?” (WBF)
is a little more complicated, but is likely that

4
New Idea – Ubiquitous ready machines

Our new idea is very simple and can be stated he has a service provider for that matter, that
very clearly: to use VPNs so that the end user can after all provide that product and services
will be able to have ready machines with with a pay-once and life-time guarantee.
different licensed operating systems and
software, of any kind and sort, provided that

Conclusion

The future of proprietary and open source issues and its costly implementation. With new
Operating Systems is still an unknown, but authentication methods and more reliability on
trends in server-side software, cloud privacy and more integration of QoS, there is
computing and all along buying/renting/hiring likely that digital cash may become a reality in
of licensed products and services is very likely our present space and time existence.
to keep loving the idea of Plug-and-Play The reasons why VPNs have been dismissed in
(PnP), and, maybe even more of pay-once. so many up-to-date books on the subject of
And finally, the future VPNs may foster the computer networks is a bit odd, meanwhile it
future of digital cash, that despite being in may be even more stranger to find out that
demand for a long time by many individuals as most LEDs are red and/or that blue LEDs
been made postponed because of security should be named BLEDs instead.

References

[1] BEZANOV, Goran 2007 , 'Computer Networks – An Overview Series Publication'

[2] COMER, Douglas 2007 Internet Book, The: Everything You Need to Know About Computer
Networking and How the Internet Works, 4/e

[3] BEZANOV, Goran 2007 , 'Computer Networks – An Overview Series Publication', pp. 166

5
[4] HUSTON, Geoff & FERGUSON, Paul , 1998, 'What is a VPN?', viewed October 2009
<http://www.potaroo.net/papers/1998-3-vpn/vpn.pdf>

[5] RODRIGUEZ, Erik , 2008, 'Types of VPNs', viewed October 2009


<http://www.skullbox.net/vpn.php>

[6] SOLINAS, Jerome , 2007, 'IKE and IKEv2 Authentication Using the Elliptic Curve Digital
Signature Algorithm (ECDSA)', viewed October 2009, <http://www.rfc-editor.org/rfc/rfc4754.txt>

[7] KOSIUR, Dave , 1998, 'Building and Managing Virtual Private Networks', JohnWiley & Sons,
Inc, England

Appendix 1– Relevance and reliability of sources

References number [1] and [3] are of the same book and should be listed only one. The reason we
use two items for this reference is that the latter also has the page indication.
We consider it a very useful text and it helped us understand the topic area in context. Is also
reliable because the author is a professor and is one of our teachers.
Refrences number [2] and [4] also very useful and reliable because they are very specific books
related to our topic areas and can be found in many of the University libraries visited.
Refrence number [6] is a RFC, so it is a bit self-explanatory why it is relevant and can be reliable.
Finally, reference number [5] was one of the most useful websites visited.

S-ar putea să vă placă și