Critical Considerations for LAN-to-LAN Virtual Private Networks

نویسنده

  • J. Blakely
چکیده

A pivotal paper by Atkinson and Haller in 1994[1] laid the groundwork for secure transmission over the Internet and Virtual Private Networks (VPNs) were born. Infonetics Research, Inc. projects the worldwide market for Virtual Private Networks to reach $32 billion by 2003.[2] There are two primary reasons for the growing interest in VPNs: the cost savings associated with replacing leased lines with packet-switched IP networks and the flexibility of adding geographically diverse sites to the corporate network.[3] As VPNs have gained in popularity, their definition has evolved. Traditionally, VPNs were simply defined as encrypted data connections over a public network.[4] Today, VPNs include all aspects of a network design strategy, including reliability, flexibility, and latency, as well as security.[5] Applications for VPNs fall into three broad categories: access for remote users; intranets, in which a VPN replaces a leased line; and extranets, allowing business partners access to internal applications and data.[6] Many corporations have already implemented VPNs for remote access, as this is the simplest solution, and are moving on to more sophisticated applications which may involve replacing an existing (Wide Area Network) WAN. Since most corporations already have a WAN in place, they have high expectations for reliability, latency, and throughput. These expectations combined with the need for security on the public Internet make VPN requirements very stringent and the design process very important.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Impact of Implementing VPN to Secure Wireless LAN

Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards ba...

متن کامل

Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides requirements for Layer 2 Provider-Provisioned Virtual Private Networks (L2VPNs). It first provides taxonomy and terminology and states generic and general service requirements. It covers point...

متن کامل

Extensions to the Virtual Private LAN Service (VPLS) Provider Edge (PE) Model for Provider Backbone Bridging

The IEEE 802.1 Provider Backbone Bridges (PBBs) specification defines an architecture and bridge protocols for interconnection of multiple Provider Bridged Networks (PBNs). Provider backbone bridging was defined by IEEE as a connectionless technology based on multipoint VLAN tunnels. PBB can be used to attain better scalability than Provider Bridges (PBs) in terms of the number of customer Medi...

متن کامل

Security in Virtual private network

Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to pri...

متن کامل

Virtual Private LAN Service (VPLS) Interoperability with Customer Edge (CE) Bridges

One of the main motivations behind Virtual Private LAN Service (VPLS) is its ability to provide connectivity not only among customer routers and servers/hosts but also among customer IEEE bridges. VPLS is expected to deliver the same level of service that current enterprise users are accustomed to from their own enterprise bridged networks or their Ethernet Service Providers. When customer edge...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999