SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Virtual Private Networks Chen-Nee Chuah Network Reading Group, Spring 99
VPNs ,[object Object],[object Object],[object Object],[object Object]
Motivations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Can Internet Support VPNs? ,[object Object],[object Object],[object Object],[object Object],[object Object]
CPE Vs. Network Based VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Different VPN types ,[object Object],[object Object],[object Object],[object Object]
Type I: Virtual Leased Lines (VLLs) ,[object Object],[object Object],[object Object],[object Object]
VLLs: Tunneling Protocol Requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VLLs:Protocol Requirements (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VLLs:  Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Type II:Virtual Private Routed Networks ,[object Object],[object Object],[object Object],CPE ISP ISP ISP CPE ISP edge router IP tunnel Stub link Backup link Backdoor link CPE
VPRNs (continued) ,[object Object],[object Object],[object Object],[object Object]
VPRNs (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPRN Generic Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPRN Generic Requirements (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPRNs: Multicast support ,[object Object],[object Object],[object Object],[object Object],[object Object]
VPRNs: Recommendations ,[object Object],[object Object]
Type III:Virtual Private LAN Segment ,[object Object],[object Object],ISP ISP ISP CPE ISP edge router IP tunnel Backdoor link CPE CPE
VPLS: Requirements & Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Type IV: Virtual Private Dial Networks ,[object Object],[object Object],[object Object],[object Object]
VPDNs (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPDNs (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPDNs: Recommendation ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QoS Guarantees in VPNs ,[object Object],[object Object],[object Object],[object Object]
QoS Support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Wp ip-mpls-based-vpns
Wp ip-mpls-based-vpnsWp ip-mpls-based-vpns
Wp ip-mpls-based-vpnssubha_87
 
Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18daniel ayalew
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17daniel ayalew
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceJohn Loughney
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationNir Cohen
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qosShane Duffy
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocolsAbhishek Kesharwani
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 

Was ist angesagt? (19)

Wp ip-mpls-based-vpns
Wp ip-mpls-based-vpnsWp ip-mpls-based-vpns
Wp ip-mpls-based-vpns
 
Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18
 
Mpls Qos Jayk
Mpls Qos JaykMpls Qos Jayk
Mpls Qos Jayk
 
Unit 4
Unit 4Unit 4
Unit 4
 
Bbgbnhm
BbgbnhmBbgbnhm
Bbgbnhm
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Wan networks
Wan networksWan networks
Wan networks
 
Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task Force
 
Cisco MPLS
Cisco MPLSCisco MPLS
Cisco MPLS
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qos
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
Virtual local area networks
Virtual local area networksVirtual local area networks
Virtual local area networks
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 

Ähnlich wie Vpn1

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Quality of Servise
Quality of ServiseQuality of Servise
Quality of ServiseRaza_Abidi
 
MPLS-VPN-Technology.pdf
MPLS-VPN-Technology.pdfMPLS-VPN-Technology.pdf
MPLS-VPN-Technology.pdfHuynh MVT
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAuto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAllan Kweli
 
ODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptmarwan76
 
Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...Ashish Tanwer
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPNThomas Morin
 

Ähnlich wie Vpn1 (20)

Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Vp ns
Vp nsVp ns
Vp ns
 
Quality of Servise
Quality of ServiseQuality of Servise
Quality of Servise
 
Mpls
MplsMpls
Mpls
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
MPLS-VPN-Technology.pdf
MPLS-VPN-Technology.pdfMPLS-VPN-Technology.pdf
MPLS-VPN-Technology.pdf
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
SD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloudSD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloud
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAuto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
 
ODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).ppt
 
V P N
V P NV P N
V P N
 
Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...Cube2012 high capacity service provider design using gpmls for ip next genera...
Cube2012 high capacity service provider design using gpmls for ip next genera...
 
Flexible NFV WAN interconnections with Neutron BGP VPN
 Flexible NFV WAN interconnections with Neutron BGP VPN Flexible NFV WAN interconnections with Neutron BGP VPN
Flexible NFV WAN interconnections with Neutron BGP VPN
 

Mehr von Mayank Vora

TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)
TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)
TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)Mayank Vora
 
Tsunami Detector1 Ppt
Tsunami Detector1 PptTsunami Detector1 Ppt
Tsunami Detector1 PptMayank Vora
 
Sattellite Power Station1
Sattellite Power Station1Sattellite Power Station1
Sattellite Power Station1Mayank Vora
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Mobilecomputings07
Mobilecomputings07Mobilecomputings07
Mobilecomputings07Mayank Vora
 
Micro Power Stations
Micro Power StationsMicro Power Stations
Micro Power StationsMayank Vora
 
L I G H T E M I T T I N G P O L Y M E R S
L I G H T  E M I T T I N G  P O L Y M E R SL I G H T  E M I T T I N G  P O L Y M E R S
L I G H T E M I T T I N G P O L Y M E R SMayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
Tsunami Detector1 Ppt
Tsunami Detector1 PptTsunami Detector1 Ppt
Tsunami Detector1 PptMayank Vora
 

Mehr von Mayank Vora (20)

TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)
TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)
TATA CRUCIBLE CORPORATE EDITION -2015(BHUBANESWAR PRELIMS & FINALS)
 
Mumbai prelims
Mumbai prelimsMumbai prelims
Mumbai prelims
 
New booklet
New bookletNew booklet
New booklet
 
Web
WebWeb
Web
 
Wi Max1
Wi Max1Wi Max1
Wi Max1
 
Vpn1
Vpn1Vpn1
Vpn1
 
Tsunami Detector1 Ppt
Tsunami Detector1 PptTsunami Detector1 Ppt
Tsunami Detector1 Ppt
 
Spintronics
SpintronicsSpintronics
Spintronics
 
Sattellite Power Station1
Sattellite Power Station1Sattellite Power Station1
Sattellite Power Station1
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Satellites
SatellitesSatellites
Satellites
 
Mobilecomputings07
Mobilecomputings07Mobilecomputings07
Mobilecomputings07
 
Micro Power Stations
Micro Power StationsMicro Power Stations
Micro Power Stations
 
L I G H T E M I T T I N G P O L Y M E R S
L I G H T  E M I T T I N G  P O L Y M E R SL I G H T  E M I T T I N G  P O L Y M E R S
L I G H T E M I T T I N G P O L Y M E R S
 
H T T1
H T T1H T T1
H T T1
 
C D M A Vs Gsm1
C D M A Vs  Gsm1C D M A Vs  Gsm1
C D M A Vs Gsm1
 
Wi Max1
Wi Max1Wi Max1
Wi Max1
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
Tsunami Detector1 Ppt
Tsunami Detector1 PptTsunami Detector1 Ppt
Tsunami Detector1 Ppt
 
Satellites
SatellitesSatellites
Satellites
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Vpn1

  • 1. Virtual Private Networks Chen-Nee Chuah Network Reading Group, Spring 99
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.

Hinweis der Redaktion

  1. Paper also mention constructing VPNs using native mappings onto switched backbones - e.g. VPNs constructed using, for instance, the LAN emulation over ATM or Multiprotocol over ATM over ATM backbones. This draft doesn't cover that.
  2. Working from home, e.g. PPP connections More and more businesses have found then need for high speed Internet connections, in addition to previous private networks, there has been significant interest in the deployment of CPE based VPNs running across the Internet. Can leverage the existing IP backbone, packet switched network.
  3. Although the idea of using Internet for private communication is not new, it's only recently that many IP mechanisms needed to meet customer requirements for VPNs all come together. Traffic carried within VPN may have no relation to the traffic on IP backbone (multiprotocol, private IP addressing etc.) Recent VPNs implementations converge to the use of IPSec latency and bandwidth guarantees (like ATM & Frame Relay)
  4. 2nd solution motivated by users seeking to reduce costs and ISPs seeking new revenues Some techniques are only applicable to Network based solutions Some mechanisms leverage tools that are only applicable to ISPs like routing protocols etc. as opposed to customers
  5. I switched the order of the last two VPN types while I go over it, because VPRNs and VPLSs are very similar and both share some common issues that need to be addressed.
  6. VLLs can also be thought of the “basis” for the remaining three types of VPNs Of all these protocols, MPLS is different. It is a specific link layer for IP, so the MPLS specific mechanisms apply only within the scope of an MPLS network, whereas IP based mechanisms extend to the extent of IP reachability.
  7. Multiple VLLs may be needed between the same two IP endpoints. Traffic for different customers travels over separate VLLs between the same two physical devices. Have to distinguish which packets belong to which VLL. Actual tunnel establishment could be completed in two ways: management operation or signaling protocol that allows tunnels to be established dynamically. Using signaling protocol significantly reduce the management burden. It is used to negotiate tunneling attributes, not to specify how the tunnel is used (not to limit to specific link layer protocol). MPLS label distribution protocol. All the protocols except IPSec rely on the security of the underlying IP backbone at present only L2TP has such a sequencing field. IPSEC has a sequence number field, but is used by receiver to perform an anti-reply check, not to guarantee in-order delivery of packets
  8. VLL tunnel instance occurs as a result of signaling exchange. It needs to be maintained until terminated either (a) when VLL tunnel is deleted or (b) when tunnel instance is not being used/idle timeout => reallocate resources from inactive tunnel Traffic sent through a VLL may often be opaque to the underlying IP backbone. Fragmentation can be done within the tunnel using tunnel sequence number and an end of message marker to avoid IP fragmentation. Security mechanism impose their own overhead Flow and congestion control are needed to provide performance over lossy networks, to accommodate devices with very little buffering. The mechanism used in L2TP are largely specific to the use of PPP and devices that terminate low speed dial-up lines. Customers may require VLLS yield similar behavior to physical leased lines or dedicated connections with respects to parameters like loss rates, latency and bandwidth guarantees. So, all the capabilities currently developed for traffic management (link sharing, differentiated services, and fair scheduling ) could be applied to the VLL.
  9. IKE = Internet Key Exchange signaling protocol within IPSec that could be used to negotiate IP tunnel attributes, user authentication and specify security levels.
  10. Paper also mention constructing VPNs using native mappings onto switched backbones - e.g. VPNs constructed using, for instance, the LAN emulation over ATM or Multiprotocol over ATM over ATM backbones. This draft doesn't cover that.
  11. burden are pushed to ISP, and all forwarding are done at Layer 3. For multiprotocol support, a separate VPRN for each network layer protocol could be used, or one protocol could be tunneled over another, or alternatively, the ISP network could be used to provide layer 2 connectivity only such as with VPLS. Multiple VPRNs may be instantiated over the same set of physical devices, and they might use the same or overlapping address spaces.
  12. Since VPRN operates at the internetwork layer, the IP packets send over a tunnel will have their TTL field decrement in the normal manner, to prevent packets circulating indefinitely in the event of a routing loop within the VPRN.
  13. Network based VPRNs may potentially span multiple autonomous systems, and multiple management domains. Need a unique VPN identifier that is unique across multiple Ass. Each stub link must be configured with the identify of the particular VPRN to which it belongs. Dissemination of this information can be done in different ways: Directory lookup put all information into a directory that other edge routers could query e.g. LDAP Explicit management configuration: A VPRN management information base (MIB) could be defined to allow a central management system to configure each edge router. Piggybacking in routing protocols: VPRN membership information could be piggybacked into the routing protocols run by each edge router across the IP backbone. Include at the minimum set of VPN identifiers associated with each edge router. Benefit: efficient way of disseminating information. Disadvantage: security issues. Everyone can read the piggybacked information. ISP only needs to know set of VPRN addresses reachable at the customer side. CPE case is more complicated need to know VPRN default route v.s. normal default route (for Internet connection)
  14. Along with VPRN membership information, a central directory could maintain a listing of the address prefixes associated with each end point. Explicit configuration is a non-scalable solution. Because the address spaces associated with each edge router is explicitly configured into each other router. Each edge router runs a routing protocol per VPRN, running across VPRN tunnels to each peer edge router. Variation of MPLS LDP: send VPN ID and reachability information of each VPRN running across the tunnel between the two edge routers. Only good if it is a full mesh topology. Set of address prefixes associated with each stub interface is piggybacked into the routing advertisements from each edge router and propagated through the network. Tunneling: manual configuration is NOT scalable multipoint to point tunnels like MPLS.
  15. AS with CPE routers, multicast routing protocols could be run on each VPRN edge router to determine the distribution tree for multicast traffic and reduce unnecessary flood traffic. Can run standard multicast routing protocols like PIM (Protocol Independent Multicast), Distance Vector Multicast Routing Protocol (DVMRP). For example, VPRN router could prefix multicast group address within each VPRN with the VPN ID of that VPRN, and then redistribute these, essentially treating this VPNID/Intra-VPRN multicast address tuple as a normal multicast address, within the backbone multicast routing protocols. Then MPLS labeldistribution mechanisms could be used to set up the appropriate multicast LSPs to interconnect those sites within each VPRN supporting particular multicast group addresses.
  16. Paper also mention constructing VPNs using native mappings onto switched backbones - e.g. VPNs constructed using, for instance, the LAN emulation over ATM or Multiprotocol over ATM over ATM backbones. This draft doesn't cover that.
  17. Packet encapsulation CPE bridge: packets send to and from VPLS across stub links are link layer frames. CPE router: allow for alternative encapsulation Addressing and address resolution bridge CPE: packets forwarded based on link layer addresses (MAC addresses) Router CPE: same as previous case in VPRNs Edge node forwarding an reachability mechanisms bridge: link layer flooding and Mac address learning router: same as VPRNs
  18. Right now, such connections are made through PSTN. PPP sessions are authenticated using AAAA systems running such standard protocols as RADIUS.
  19. Call routing for compulsory tunnels requires that some aspect of initial PPP call set up can be used to allow the LAC to determine the identity of the LNS. Security: interaction between L2tP with AAAA systems L2TP support flow control. Multiple calls within a tunnel, identified by a call-id. LNS needs to support forwarding mechanisms to route traffic to and from the remote host. MTU of the VPDN tunnel is not necessarily less than or equal to that of the underlying IP route.
  20. resources associated within each individual VPN are managed locally, by the customer. Traffic that has a specific QoS needs to use a share of the resources for that VPN. Mark packets and schedule within the core (hierarchical scheduling). Network provides a single hose. Allow customer to control the scheduling of resources by cooperating with the network for serving the different QoS classes. And end point can mark packets with an identifier for the individual QoS. Whenever a scheduling decision for a QoS class within the VPN hose has to be made, the QoS identifier is employed to make the appropriate decision (which one to be transmitted/dropped).
  21. Full mesh connectivity in an MPLS environment can be provided by creating a sink tree (LSP tree) to each hose endpoint, from all other hose endpoints.