Font Size: a A A

Analysis,Design And Implementation Of The Dynamic P2P VPN System

Posted on:2011-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:D WangFull Text:PDF
GTID:2178360308462528Subject:Cryptography
Abstract/Summary:PDF Full Text Request
VPN technology has developed rapidly and is implemented in many application scenarios, e.g., branch offices of organization, remote employees, partners or suppliers who want to access the resources in the private network of the organization. There are several popular types of VPNs, such as IPSec VPN, SSL VPN and MPLS VPN. They have different elements but the same purpose, and every technology has its advantages and disadvantages.P2P technology inherits the ideas of the decentralization and it emphasizes that the two entities of the communication is equivalent. The communication through Internet is becoming more and more directly, rapidly and satisfied by using P2P technology. The structure of the P2P network has better performance and scalability than the traditional network. It solved the problems of single point of failure in the traditional network and made use of the resources of network terminals effectively. It can be used in many fields of the computer network, such as distributed scientific computing, files sharing, stream media live and in demand, voice communication and online gaming platform, etc.P2P VPN technology is developed from the VPN technology and the structure of the P2P network. It can connect users of the same virtual private network and the packets sent through the security tunnels between the two uses are just like in the LAN.The main stream VPN technologies are analyzed and compared in this document. And through the research of the structure of P2P network, the analysis of the P2P VPN project, N2N open source project, there is a dynamic and functional P2P VPN system designed. The main contents described in this document are as follows: a) Research of the VPN related technologies, tunneling technology and virtual network interface card technology.b) Analysis of SSL VPN and IPSec VPN technology, the procedure of the message interaction of the SSL VPN system implemented through TUN/TAP device driver. Summary of the scenarios of these two technologies and their merits and shortcomings.c) Analysis of the structure of the P2P network and the main applications of the P2P technology. Understand the principle of the NAT traversal methods.d) Analysis of the system architecture of the N2N project and the procedure of the message processing. Design of the dynamic P2P VPN system based on N2N v1 system.e) Implementation of the user management module, the functions of which including handling user register, user login and deregister, and setting user access control, virtual network management module, the functions of which including handling new virtual network establishing, withdrawing and member updating, etc., database management module, through which P2P VPN server can store the static information of the system and provide information sharing.
Keywords/Search Tags:Internet Protocol Security Virtual Private Network (IPSec VPN), Security Socket Layer Virtual Private Network (SSL VPN), Virtual network interface card, Peer to Peer Virtual Private Network (P2P VPN)
PDF Full Text Request
Related items