A General Definition Of Virtual Private Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction :

VPN (Virtual Private Network), a communication network which may consist of many grouping of technologies for secured tunneled connection. "Virtual" connection is more secured network, while we compared to a common connection, such as leased line, a "virtual" connection connects between geographically isolated users and networks which can be a shared or public network, like the Internet. In the virtual private network the data transmits through tunneling process. Before transmitting a packet, the packet will wrap in a new packet which will have a new header. This header will contain routing information so that it may be send through a shared or public network, before the packet reaches its tunnel endpoint. This path will be called logical path and this path will send the encapsulated packets which are wrapped, during the transmission, will travel through a tunnel. When each of these packets reaches at the tunnel endpoint, the packet is "decapsulated" and then forwarded to its final destination. Both endpoints of tunnel will support the same tunneling protocol.

The most important issues related with the Virtual private network are as follows:

(1) SECURITY ISSUES:

In general Virtual private network uses encryption technique for providing data confidentiality, data reliability and data security. The data which is being transmitted is free from any kind of threat because the data is unreadable for any unauthorized user. It also provides the data integrity which ensures the data is not being interfered during the transmission and data is now secured.

(2) PROCEDURE PERFORMED ON VPN:

VPN mainly use in the organizations, in the following ways:

Remote access Virtual Private Network

Extranet Virtual Private Network

Intranet Virtual Private Network

Wide Area Networks

(3) VARIOUS CATEGORIES OF VPN:

VPNs can be categorized in following ways:

Hardware-based Virtual Private Network

A firewall-based Virtual Private Network

An Secure Sockets Layer (SSL) Virtual Private Network

A software-based Virtual Private Network

Review of Literature :

A General Definition of Virtual Private Networks:

VPN (Virtual Private Network) is a term which is used to describe a communication network that uses any combination of technologies for securing a connection tunneled through an otherwise unsecured or untrusted network. Instead of using a devoted connection, such as leased line, a "virtual" connection is made between geographically dispersed users and networks over a shared or public network, like the Internet [2]. VPN transmits data by the tunneling process. Before transmitting a packet, it is encapsulated in a new packet which has its new header. This header provides routing information so that it can traverse a shared or public network, before it reaches its tunnel endpoint. The logical path which enables encapsulated packets travelling through is called a tunnel. Tunneling protocols are activated at either the OSI (Open System Interconnection) layer two (data-link layer), or layer three (network layer). The most commonly used tunneling protocols are IPSec, L2TP, PPTP and SSL. A packet with a private non-routable IP address can be sent inside a packet with globally unique IP address; thereby extending a private network over the Internet [3].we can start the word "network". A network may consist of any number of devices which can be communicated through some arbitrary method. Devices of this nature include computers, printers, routers, and so forth, and may reside in geographically diverse locations. For the purposes of simplicity, so a "network" is a collection of devices that can communicate in some fashion, and can successfully transmit and receive data amongst themselves.

The term "private" is "virtualization" that means the communications between two (or more) devices and they are certainly unaware of the private relationship altogether. Accordingly, data privacy and data integrity (security) which is very important in aspects of a VPN or we can say the word "private" is through its antonym, "public." A "public" facility is one which is openly accessible, and is managed within the terms and constraints of a common public resource, often via a public administrative entity. By contrast, a "private" facility is one where access is restricted to a defined set of entities, and third parties cannot gain access. Typically, the private resource is managed by the entities that have exclusive right of access.

(4) Types of VPN Services:

There are three basic types of VPN services:

Local Area Network (LAN) Interconnect VPN services.

Dial-up VPN services.

3 Extranet VPN services.

(5) The main tunneling mechanisms are:

GRE (Generic Routing Encapsulation) tunneling between a source and destination router,

Router-to-router or host-to-host tunneling protocols such as L2TP (Layer 2 Tunneling Protocol)

PPTP (Point-to-Point Tunneling Protocol)

DVMRP (Distance Vector Multicast Routing Protocol) tunnels.

IP sec-IP security protocols.

MPLS-Multi Protocol Label Switching

Materials & Methods:

NS2 means network simulator, an open source event driven simulator which is specially designed for the research work in communication network in computer science. Since 1989, NS2 is continuously gaining remarkable interest from various sectors such as industries, academic circles, and government sectors. NS2 may contain many modules for several network components such as transport layer protocol, routing, application, etc. for research purpose and investigating network performance the researchers can use an easy and simple scripting language for configuring a network, and can take results for observation which are generated by NS2. Definitely, NS2 became broadly used open source network simulator. The version 2 of Network Simulator is known as NS2 which is useful in the study of communication network’s nature. By the NS2, the Simulation function of wireless and wired network functions and protocols can be performed for example: routing algorithms, UDP and TCP. NS2 also provides the facility of specifying network Protocols and simulating their parallel behaviors, to the users.

NS2 provides an executable command called ns that takes input argument and the Tcl simulation scripting file. When a Users feeds the Tcl simulation script that sets a simulation, as an input argument of command ns, an executable command. Network simulator 2 may consist of two key main languages that are object oriented language C++ and Object-oriented Tool Command Language (OTcl). In NS2 C++ classified as the backend of the simulation objects, means it describes the internal mechanism of the objects of the simulation. On the other hand Object-oriented Tool Command Language (OTcl) is the frontend and place simulation by assembling and configuring the scheduling events. Both the OTcl and C++ are associated by using TclCL. In OTcl domains variables are also called handles. Handle is nothing but a string which does not contain any functionality. Functionality can be defined as a receiving packet which is defined in the mapped C++ object as class connector. It is cleared that handle of OTcl works as the frontend and interacts with the users. It also defines its own variables and procedures for the interaction.

In the OTcl domain "instprocs" are referred to as member procedure and "instvars" are referred to as instance variable. Network simulator 2 has also a great number of built-in C++ objects and these objects can use for setting up simulation, with Tcl simulation script. The outputs of NS2 can be text based or animation based results.

Class of Tcl:

Tcl Class which is a class of C++, operates like an interface to the OTcl domain. Ëœtclcl/Tcl.cc file offers methods for the following operations:

(i) By using function instance Tcl instance can be achieved.

(ii) By using eval (...), evalc (...), and evalf (...)) functions the instances of OTcl procedures can invoke within the domain of C++.

(iii) By using result (...) and resultf (...)) functions, the results can predict.

(iv) By using error (...)) function, the errors of program can be interpreted.

(v) By using enter (...), delete (...), and lookup (...)) function, references can be get back to TclObjects.

Achieve a Reference to the Instance of Tcl:

Functions of class in C++ are being called through a class object such as "fn" function is called by object "object.fn"). It is cleared that for calling the above functions the eval (...) and result (...) functions of class Tcl are being used. For this purpose an object of class Tcl should be created. In Class Tcl function "instance ()" use for obtaining a static Tcl variable: Tcl& tcl = Tcl::instance ().this instance is static in the simulation.

Procedure of Binding Variables in the Compilation and Interpret the result Hierarchies:

It has been cleared that the interpreted objects and complied objects will have their own variables in one class but both have no permission of accessing the class variables of another class .Network simulator2 gives the permission or we can say such mechanism for binding variables of a both class in hierarchy type together. Once the binding process done, if there is any change in variables of a class in one hierarchy, the change in bounded class variable hierarchy will result automatically.

Observations, Result & Discussion:

Conclusions / Imp. Findings

Recommendations



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now