Font Size: a A A

Study And Deployment On Communication Security And Optimizations For VPN Networks

Posted on:2012-09-11Degree:MasterType:Thesis
Country:ChinaCandidate:H D XuFull Text:PDF
GTID:2268330425491675Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Virtual Private Network (VPN) is known as the technology of network connection which is used widely in every network engineering projects recently. Its main feature is establishing a virtual link over an insecure public network that link can ensure the secure transportation of data over a public network. The appearance of VPN not only due to high costs of establishment of traditional private network, but the traditional private network cannot meet the basic needs of modern information network technology construction. Therefore, VPN is outstanding private network technology which is becoming mainstream network connection technology in the current IT field from its security, convenience, high efficiency and controlled.Based on the actual projects, the value of VPN technology on the data communications is proved by analysis of network packets and statistics of related data. Through the discussion on the application of VPN projects including the implement of VPN, building a VPN video server and the VPN service in libraries, this paper completes the related theory statement and the overall ideas of realization on VPN technology, and then analyzes and gives some improving solutions to the lack of VPN technology in the current fixed and mobile network environment.In current network environment, VPN technology plays a role to protect the security of data transportation from multiple network communications and will be more widely applied in many fields. Based on the deeply understanding of customer requirements and analysis of existing VPN technologies in actual projects, this paper reasonably uses the appropriate techniques to solve problems in the actual deployment. For example, domain network environment is used to achieve the unified deployment of user resources and user authorities. A VPN load-array technology enhances service performance and stability improvement, and IKEv2protocol solves the VPN tunnel automatic connection problem in the unstable situation of network environment. On account of projects, there are deficiencies found in the implementation process of VPN technology, such as the problem of the same configuration information from different private networks and the communication between IPv4network and IPv6network. In response to these issues this paper proposes corresponding solutions. At the same time, in current background of network development, the concept of VPN in mobile network is introduced. However, the mobile networks have a problem of relatively narrow bandwidth when VPN connecting and a hidden security danger of user authentication. Thus, this paper gives a temporary solution of generating random numbers to do with the problem above. At last, the principle of the VTP in switch route and the Spanning Tree Protocol is introduced to optimize the VPN network in theory, so that the stability of performance and the rationality of resources allocation in VPN networks are further improved in theory both within the enterprise network or part of the public network tunnel connection.
Keywords/Search Tags:VPN Network, Network Security, Network Communication, PKI, IKEv2
PDF Full Text Request
Related items