Design And Simulation Of Secure Virtual Private Network (VPN) Over An Open Network (internet) Infrastructure

By

Author

Presented To

Department of Computer Science

Design And Simulation Of Secure Virtual Private Network (VPN) Over An Open Network (internet) Infrastructure

ABSTRACT

The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. Virtual Private Network (VPN) allows computer or network to connect to each other over the internet securely. In the old style of communication basically with telephone it does not allow free flow of message transfer, but with internet and VPN it’s free flow of data transfer and also makes it secure. How do i ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).

CHAPTER ONE INTRODUCTION

  • Background Of The Study

This is the information age where we no longer have to commute physically from one place to another to complete a set of tasks or to gather pieces of information. Nothing will work in the absence of communication. Communication provides a vehicle for conveying information and for expressing to others what has been perceived (Lewis, 2006). Everything can be done virtually with a mouse click on an online host. In a way, everything we do in our daily lives is related in one way or another to information access. This has made information sharing almost mandatory and indispensable. These days, a customer can retrieve and compare products or services information promptly online, anytime, anywhere. For competitive reasons, organizations that provide this information have to make the information readily available online.

In other words, the concept of a shared infrastructure is undisputedly important. A shared infrastructure is none other than a public network which provides connectivity to multiple autonomous computer systems in order to communicate and share resources. At present, the biggest public network is the Internet, which has over 100,000 routes and is still growing rapidly. As more and more companies link up their corporate network to the Internet, we are faced with an inevitable issue-information security. Sharing information on a public network also implies giving access and visibility to everyone who wants to retrieve these data. What if the person who has the accessibility and visibility to the information decides to create havoc? Some of the general threat types that are posed by malicious hackers include eavesdropping, denial of service, unauthorized access, data manipulation, masquerade, session replay, and session hijacking.

The Les Cours Sonou University Benin (LCS) is an Institution that does not have any secure and reliable communications infrastructure that connects their institutions. The Virtual Private Network (VPN) WANs connect the sites via dedicated point-to-point links. This means that multiple independent circuits have to terminate at the corporate network egress, making the deployment non-scalable and difficult to maintain.

VPNs extend the classic WAN by replacing the physical point-to-point links with logical point-to-point links sharing a common infrastructure, allowing all the traffic to be aggregated into a single physical connection. This scenario results in potential bandwidth and cost savings at the network egress. Because campuses no longer need to maintain a private network, and because a VPN itself is cheaper to own and offers significant cost savings over private WANs, operation costs are reduced.

VPNs provide an alternative WAN infrastructure that can replace or augment commercial private networks that use leased-line or frame relay/ATM networks. There are two ways business clients can implement and manage their VPNs. They can either roll out their own VPNs and manage them internally, or outsource the VPN management to their service providers for a total VPN package that is tailored to their particular business needs. Last but not the least, from the service providers’ perspective, VPNs are a fundamental building block in delivering new value-added services that benefit their business clients as well as themselves. In this instance, the service providers deploy the VPNs for their clients, and the clients need only subscribe to the service providers for the VPN services (Mason,2002)

 1.2Statement Of The Problem

The present network infrastructure in LES COURS SONOU UNIVERSITY, BENIN does not allow good student-lecturer interaction. It only allows processing and registration activities which isalso done manually. In addition to the fact that the services mentioned cannot be accessed when the staff and student leave the premises of the university campus.

1.3     Aim Of The Study

The aim of this project is to design and simulatea reliable and securevirtual privatenetwork (VPN) communication system for LES COURS SONOU UNIVERSITY, BENIN.

1.4     Objectives Of The Study

The objective of this secure virtual private network (VPN) over an open network is to include the following:

  1. To control access into a Private Network.
  2. To Secure information and Identity Management
  3. To Secure Intranet and information sharing
  4. To Allow Reliability of a secured network
  5. To Secure Desktop file Sharing

1.5     Scope Of The Study

This scope of the design and demonstration of a secure virtual private network should cover the following features in LCS.

  1. Intranet-based Site to Site VPN that connects the various institutions (LCS).
  2. Three Site WAN location which implies the HQ and two branches of the institution (LCS).
  3. Access Control List Implementation, IPsec and Encryption to provide secure Access to network resources
  4. Network Reliability

 1.6     Significance Of The Study

This project enlightens readers and would serve as bedrock for computer network and information control in a computer Network environment. As for a well-designed VPN, the project has the following significance:

  • Extends geographic Network connectivity
  • Improve security in Private Network
  • Reduce operational costs versus traditional WAN
  • Improve productivity
  • Simplify network topology
  • Provide broadband networking compatibility
  • Provide faster ROI (return on investment) than traditional WAN
  • The study would also be helpful to the students who are carrying out research on this topic or any related topic

And the following features are incorporate:

  • Security
  • Reliability

1.7     Limitations Of The Study

The design of Secure VPN is an enterprise network Project that leverages the use of enterprise facilities and network infrastructures available to the institution. In this project most of these facilities are not present. This research ought to cover a wide area but unable to do so due to the following limitations (Bradley Mitchell, 1988).

Finance: The cost of acquiring network equipment is high, and as students, we were unable to afford all the financial requirements of the research study.

Time: The period of time allowed for this project was small. A project of this nature need more time for complete investigation and research to be conducted. More so, studies and examinations are being combined which does not allow complete dedication to the project. Therefore the following may not be achieved in this academic project.

  • Scalability
  • Network management
  • Policy management
  • Remote Access VPN

 1.8     Definition Of The Study

LEASED LINES: These are usually referred to as a point-to-point or dedicated connection.

ROUTER: A Network layer mechanism, either software or hardware, using one or more metrics to decide on the best path to use for transmission of network traffic.

SWITCH: Is a computer network device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device…

ATM: Asynchronous Transfer Mode: The international standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the hardware.

ATM is designed to maximize the benefits of high-speed transmission media, such as SONET, E3, and T3

BANDWIDTH: The rate of data transfer, bit rate or throughput, measured in bits per second (bit/s).

Class A Network: Part of the Internet Protocol hierarchical addressing scheme. Class A networks have only 8 bits for defining networks and 24 bits for defining hosts and subnets on each network.

Class B Network: Part of the Internet Protocol hierarchical addressing scheme. Class B networks have 16 bits for defining networks and 16 bits for defining hosts and subnets on each network.

Class C Network: Part of the Internet Protocol hierarchical addressing scheme. Class C networks have 24 bits for defining networks and only 8 bits for defining hosts and subnets on each network.

COLLISION DOMAIN: The network area in Ethernet over which frames that have collided will be detected. Collisions are propagated by hubs and repeaters, but not by LAN switches, routers, or bridges.

DHCP:(Dynamic Host Configuration Protocol): DHCP is a network protocol that enables a server to automatically assign an IP address t o a computer from a defined range of numbers configured for a given network.

IP address: Often called an Internet address; this is an address uniquely identifying any device (host) on the Internet (or any TCP/IP network). Each address consists of four octets (32 bits), represented as decimal numbers separated by periods (a format known as “dotted-decimal”). Every address is made up of a network number, an optional sub network number, and a host number.

LAN:(local area network): Broadly, any network linking two or more computers and related devices within a limited geographical area (up to a few kilometers). LANs are typically high-speed, low-error networks within a company. Cabling and signaling at the Physical and Data Link layers of the OSI are dictated by LAN standards. Ethernet, FDDI, and Token Ring are among the most popular LAN technologies

NIC:(Network Interface Card): An electronic circuit board placed in a computer. The NIC provides network communication to a LAN.

PING:(Packet Internet Groper): A Unix-based Internet diagnostic tool, consisting of a message sent to test the accessibility of a particular device on the IP network. The term’s acronym reflects the underlying metaphor of submarine sonar. Just as the sonar operator sends out a signal and waits to hear it echo (“ping”) back from a submerged object, the network user can ping another node on the network and wait to see if it responds

PPP:(Point-to-Point Protocol): The protocol most commonly used for dial-up Internet access, superseding the earlier SLIP. Its features include address notification, authentication via CHAP or PAP, support for multiple protocols, and link monitoring.

Routed Protocol: Routed protocols (such as IP and IPX) are used to transmit user data through an internet work. By contrast, routing protocols (such as RIP, IGRP, and OSPF) are used to update routing tables between routers.

Routing: The process of forwarding logically addressed packets from their local sub network towards their ultimate destination.

Subnet Address: The portion of an IP address that is specifically identified by the subnet mask as the sub network. See also: IP address, sub network, and subnet mask

Subnet Mask: Also simply known as mask, a 32-bit address mask used in IP to identify the bits of an IP address that are used for the subnet address. Using a mask, the router does not need to examine all 32 bits, only those indicated by the mask

OSI reference model: (Open Systems Interconnection reference model): A conceptual model defined by the International Organization for Standardization (ISO), describing how any combination of devices can be connected for the purpose of communication. The OSI model divides the task into seven functional layers, forming a hierarchy with the applications at the top and the physical medium at the bottom, and it defines the functions each layer must provide.

WAN (Wide Area Network): Is a designation used to connect LANs together across a DCE (data communication equipment) network. Typically, a WAN is a leased line or Dial-up connection across a PSTN network. Examples of WAN protocols includes Frame Relay, PPP, ISDN, and HDLC

Intranet: computer network within organization: A network of computers, especially one using World Wide Web conventions, accessible only to authorized users such as those within a company.

Internet: The Global “network of Networks” a network that links computer networks all over the world by satellite and telephone, connecting users with service networks such as e-mail and the World Wide Web

Encryption: The conversion of information into scrambled form that effectively disguises it to prevent unauthorized access.

Firewall: A barrier purposefully erected between any connected public networks and private network, made up of a router or access server or several routers or access servers that uses access lists and other methods to ensure the security of the private network.

VPN: (virtual private network): A method of encrypting point-to-point logical connections across a public network, such as the Internet. This allows secure communications across a public network

Learn and Obtain Diploma in Web development, Software development, Business, Technology and Creative Skills taught by industry experts. Explore a wide range of skills with our professional tutorials.

About E-Project Material Centre


E-Project Material Centre is a web service aimed at successfully assisting final year students with quality, well researched, reliable and ready made project work. Our materials are recent, complete (chapter 1 to Minimum of Chapter 5, with references) and well written.INSTANT ACCESS! INSTANT DOWNLOAD. Simply select your department, choose from our list of topics available and explore your data

Why Students Love to Use E-Project Material ?


Guaranteed Delivery Getting your project delivered on time is essential. You cannot afford to turn in your project past the deadline. That is why you must get your project online from a company that guarantees to meet your deadline. e-Project Topics Material Centre is happy to offer instant delivery of projects listed on our website. We can handle just about any deadline you send our way. Satisfaction Guaranteed We always do whatever is necessary to ensure every customer's satisfaction

Disclaimer


E-Project Topics Material Centre will only provide projects as a reference for your research. The projects ordered and produced should be used as a guide or framework for your own project. The contents of the projects should be able to help you in generating new ideas and thoughts for your own project. It is the aim of e-Project Topics Centre to only provide guidance by which the projects should be pursued. We are neither encouraging any form of plagiarism nor are we advocating the use of the projects produced herein for cheating.

Terms and Condition


Using our service is LEGAL and IS NOT prohibited by any university/college policies You are allowed to use the original model papers you will receive in the following ways:
  • As a source for additional understanding of the subject
  • As a source for ideas for you own research (if properly referenced)
  • For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase) Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright