• Title/Summary/Keyword: IP-VPN

Search Result 119, Processing Time 0.034 seconds

Design and Performance Evaluation of IP VPNs based MPLS (MPLS 망 기반 IP VPN의 설계 및 성능 평가)

  • 박석천
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.148-156
    • /
    • 2000
  • This paper proposed that an MPLS-based VPN using next-generation If switches and appropriate set of traffic engineering algorithms is the best way to implement QoS-capable IP VPNs. While ATM-based solution would not rely scalable the number of connections becomes too large, MPLS-based VPNs’ efficiency could be confirmed network delay time through performance evaluation. And we evaluated the performance about the If VPN based on proposed MPLS, at the result of evaluation. We figured out that delay increased more slowly in case of VPN based on MPLS comparing with the VPN based on ATM which has rapid delay increasement. Therefore we confirm that the VPN based on MPLS has high speed of packet processing and high degree of network efficiency through the performance evaluation.

  • PDF

IP VPN

  • 이계상;장상수
    • TTA Journal
    • /
    • s.77
    • /
    • pp.72-80
    • /
    • 2001
  • 본 고는 IP 기반 VPN의 핵심 요소기술인 대표적 터널 프로토콜과 이들의 표준화동향을 살펴본다. IPSEC의 최근 표준화동향, IPSEC을 이용한 L2TP 터널 보안, 그리고 네트워크 기반 VPN의 유력한 터널 프로토콜로 부상하는 MPLS가 논의된다. 아울러 말미에 VPN 표준 기술의 향후 전망이 간략히 기술된다.

  • PDF

QoS Support Mechanisms in Mobile MPLS VPN (이동 MPLS VPN에서의 QoS 지원 방안)

  • Lee Young-seok;Yang Hae-kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-73
    • /
    • 2006
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology, called PE(Provider Edge router) based MPLS VPN, is regarded as a good solution for intranets or ext3nets because of the low cost and the flexibility of the service provision. In this paper, we describe a mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We desisted VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol and support the QoS mechanism. The pilot implementation and performance measurement were carried out on a simulation using COVERS tool.

Network based MPLS VPN using BGP-E for Mobility Support (이동서비스를 지원하는 BGP-E 방식 MPLS VPN의 설계 및 구현)

  • Lee, Young-Seok;Lim, Hyoung-Taek;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.927-937
    • /
    • 2003
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology is regarded as a good solution for intranets or extranets because of the low cost and the flexibility of the service provision. In this paper, we describea mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for and implemented on PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We designed VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol. The pilot implementation and performance measurement were carried out on a testbed.

A VPN controlled by CE Routers on MPLS Networks (CE 라우터 기반의 MPLS VPN)

  • Lee, Young-Seok;Han, Min-Ho;Chun, Woo-Jik;Choi, Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.31-39
    • /
    • 2002
  • The VPN(Virtual Private Network) is a private network constructed logically on a public network infrastructure. There have been numerous studies to support the VPN services by using different technologies such as IP in IP, GRE, L2TP, MPLS and so on. Among these technologies, MPLS has shown many merits in aspects of QoS, security, and management, compared with other technologies. As an enhancement of the VPN that is controlled by MPLS PE(Provider Edge) routers, this paper presents the VPN controlled by MPLS CE(Customer Edge) routers. The functional architecture of the CE based VPN and operations of the CE routers are described along with the performance comparison of CE based MPLS VPN. It has been shown that the CE based VPN has more advantages than PE based VPN with respect to independency, scalability, security, and complexity.

IPSec VPNs vs. SSL VPNs

  • 윤재호;권태경;천동현;임선간
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.24-30
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있다. 그러나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹보안프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 IPSec VPN과 SSL VPN의 차이점의 분석하여 정리하고자 한다.

A Study on Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment (IPv6 전이 환경에서 IP VPN 모델 분석과 평가에 대한 연구)

  • Kim, Hyung-J.;Yang, Jin-S.;Lee, Eun-S.;Kim, Hee-S.;Kim, Tae-K.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.633-644
    • /
    • 2004
  • For a smooth transition from IPv4 to IPv6 network, the research of transition mechanisms have been processing according to the various network situations. Therefore, we calculate the cost based on the VPN applicable model. Also, we present that conformance between the end point of VPN, the If encapsulation tunneling, applying position of translation mechanism and VPN applicable model are the factors which affect Costs.

Technology Trend of IP VPN Using MPLS (MPLS를 이용한 IP VPN의 기술 동향)

  • Kim, S.Y.;Yang, S.H.;Lee, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.15 no.5 s.65
    • /
    • pp.41-48
    • /
    • 2000
  • MPLS(Multiprotocol Label Switching)를 이용한 IP 기반의 VPN은 고수익을 원하는 서비스제공자들과 저비용을 원하는 기업들에게 인트라넷(intranet)과 익스트라넷(extranet)의 해결책으로서 많은 관심을 끌고 있다. MPLS VPN에 대한 표준화는 IETF에서 추진되고 있는데, BGP multiprotocol extension(BGP-E)이라는 프로토콜을 이용하는 구조와 Virtual Router(VR)라는 개념을 이용하는 구조가 제안되었다. BGP-E 방식은 시스코에 의해 제안되어 RFC2547로 채택되었다. 이 방식에서는 BGP-E를 이용하여 도달성과 멤버쉽 정보를 PE간에 교환한다. VR 방식은 노텔과 루슨트를 중심으로 여러 기업들이 지지하고 있고 드래프트 형태로 작업중이다. 이 방식에서는 PE들에 VPN별로 VR들을 배치하고 같은 VPN에 속하는 VR들끼리 기존의 라우팅 프로토콜을 이용하여 라우팅 정보를 교환한다. 두 방식의 근본적 차이는 도달성과 멤버쉽 메커니즘의 분리 여부이다. 세계적으로 이름 있는 통신 회사들이 경쟁적으로 MPLS 시스템을 개발하고 있는 상황에서 MPLS VPN 기술도 빠르게 시장에 확산될 것으로 전망된다. 그러나 서로 다른 기술적 접근을 하고 있는 서비스제공자들간의 MPLS VPN에 대한 호환성은 시급히 풀어야 할 숙제로 남아 있다.

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

Configuration of an IPSec VPN Testbed and Development of an Encryption Verification Tool (IOSec VPN 테스트 베드의 구성 및 암호화 식별 도구 개발)

  • 김윤희;이계상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.659-667
    • /
    • 2003
  • IPsec refers to a standardized set of security protocols and algorithms which can provide the integrity, the authentication and the confidentiality services for IP packets in the Internet. Between two security gateways, IPsec provides the access control, the connectionless Integrity, data origin authentication, the anti-replay, and the confidentiality services, not only to the IP layer but also to the upper layers. In this paper, we describe a VPN (Virtual Private Network) testbed configuration using the FreeS/WAN and analyze the ISAKMP messages exchanged between the linux security gateway during the IKE SA setup. Also, we describe our development of an IPSEC encryption verification tool which can be used conveniently by VPN administrators.