VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

Similar documents

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

UNIVERSITI SAINS MALAYSIA. CMT322/CMM323 Web Engineering & Technologies [Kejuruteraan & Teknologi Web]

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN Minggu 11

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA


CLOUD COMPUTING ADOPTION IN BANKING SYSTEM (UTM) IN TERMS OF CUSTOMERS PERSPECTIVES SHAHLA ASADI

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

Pengguna akan diberikan Username dan Password oleh Administrator untuk login sebagai admin/conference Manager bagi conference yang akan diadakan.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

RESOURCE ALLOCATION SCHEME FOR FUTURE USER-CENTRIC WIRELESS NETWORK WAHEEDA JABBAR UNIVERSITI TEKNOLOGI MALAYSIA

Semasa buku ini ditulis XAMPP mengandungi empat versi:

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

Pengenalan Sistem Maklumat Dalam Pendidikan

FUZZY NEURAL NETWORKS WITH GENETIC ALGORITHM-BASED LEARNING METHOD M. REZA MASHINCHI UNIVERSITI TEKNOLOGI MALAYSIA

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

PANDUAN PENGGUNA (PENTADBIR SYSTEM/SYSTEM ADMINISTRATOR) (INFOTECH, BPPF DAN POLIS

TEKNOLOGI, GADJET & KEIBUBAPAAN

PANDUAN PENGGUNA (PENSYARAH)

UNSTEADY AERODYNAMIC WAKE OF HELICOPTER MAIN-ROTOR-HUB ASSEMBLY ISKANDAR SHAH BIN ISHAK UNIVERSITI TEKNOLOGI MALAYSIA

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions.

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

Panduan Menggunakan Autoresponder FreeAutobot.com

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF SPAKE S MAINTENANCE MODULE FOR MINISTRY OF DEFENCE MALAYSIA SYED ARDI BIN SYED YAHYA KAMAL UNIVERSITI TEKNOLOGI MALAYSIA

DATASET GENERATION AND NETWORK INTRUSION DETECTION BASED ON FLOW-LEVEL INFORMATION AHMED ABDALLA MOHAMEDALI ABDALLA

SISTEM KOMUNIKASI BERDASARKAN ALGORITMA PENYULITAN AES

IMPROVED IMPLEMENTATION OF DIGITAL WATERMARKING TECHNIQUES AHMED SABEEH YOUSIF UNIVERSITI TEKNOLOGI MALAYSIA

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

APLIKASI E-DAGANGAN PERALATAN KAMERA BERASASKAN WEB

1. Threats bermaksud ancaman, atau lebih dikenali sebagai malware (malicious

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

DYNAMIC MOBILE SERVER FOR LIVE CASTING APPLICATIONS MUHAMMAD SAZALI BIN HISHAM UNIVERSITI TEKNOLOGI MALAYSIA

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

B,8 PERKHIDMATAN KREDIT DAN PERBANKAN. Pemindahan Data PROSEDUR UNIT KOMPUTER. BPKP/KlOK-117 Bilangan Semakan : 0 Tarikh : PERUBAHAN.

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

SISTEM KESELAMATAN PENGHANTARAN FAIL MENGGUNAKAN TEKNIK KRIPTOGRAFI DAN STEGANOGRAFI SATHIAPRIYA A/P RAMIAH

VISUALISASI DATA SISTEM SOKONGAN EKSEKUTIF UNIVERSITI. Illi Nadia binti Mohd Khairuddin Prof. Madya Dr. Mohd Zakree bin Ahmad Nazri

AN INTEGRATED SERVICE ARCHITECTURE FRAMEWORK FOR INFORMATION TECHNOLOGY SERVICE MANAGEMENT AND ENTERPRISE ARCHITECTURE

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA RELIABILITY PERFORMANCE EVALUATION AND INTEGRATION OF ROUTING ALGORITHM IN SHUFFLE EXCHANGE WITH MINUS ONE STAGE

Panduan Guru Maker UNO/ Arduino

UNIVERSITI SAINS MALAYSIA. CST334 Network Monitoring & Security [Pengawasan & Keselamatan Rangkaian]

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

TINGKAP PINTAR DAN RESPONSIF UNTUK RUMAH NUR AMANINA HAZIQAH BINTI ABDUL HALIM KHAIRUL AKRAM ZAINOL ARIFFIN

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

M2U MANUAL PENGGUNA USER MANUAL M2UNHJ. 0 P a g e BAHAGIAN SIMPANAN DAN PENGELUARAN JABATAN KHIDMAT PENDEPOSIT DAN OPERASI LEMBAGA TABUNG HAJI

ENERGY-EFFICIENT DUAL-SINK ALGORITHMS FOR SINK MOBILITY IN EVENT-DRIVEN WIRELESS SENSOR NETWORKS

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

UNIVERSITI PUTRA MALAYSIA PERFORMANCE ENHANCEMENT OF AIMD ALGORITHM FOR CONGESTION AVOIDANCE AND CONTROL

Perkongsian Bijak Sumber Maklumat Antara Sekolah Melalui Portal Pendidikan Intranet. oleh ABSTRAK

Disediakan oleh: Mohammad Hazmin Bin Mohamed Azri

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI SAINS MALAYSIA. CST232 Operating Systems [Sistem Pengendalian]

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

BORANG PENGESAHAN STATUS TESIS*

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

APLIKASI MUDAH ALIH JOMDAFTAR

7 I I, BORANG PENGESAHAN STATUS TESIS* SESI PENGAnAN: 2012 I Saya MOHD FARID BIN MOHD YUSOF (B )

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

DETERMINING THE MULTI-CURRENT SOURCES OF MAGNETOENCEPHALOGRAPHY BY USING FUZZY TOPOGRAPHIC TOPOLOGICAL MAPPING

Prototaip Pembangunan Papan Mesej Elektronik Tanpa Wayar Menggunakan Raspberry PI

DARI KAUNTER KE SISTEM DALAM TALIAN

THESIS PROJECT ARCHIVE SYSTEM (T-PAS) SHAHRUL NAZMI BIN ISMAIL

SUPERVISOR VERIFICATION

UNIVERSITI PUTRA MALAYSIA IMPROVED WAVELET DENOISING OF HYPERSPECTRAL REFLECTANCE USING LEVEL-INDEPENDENT WAVELET THRESHOLDING

PEMINDAHAN DATA MENGGUNAKAN KOMUNIKASI CAHAYA BOLEH DILIHAT DAN APLIKASI MUDAH ALIH. Annisa Zakiah Binti Kamarudin Khairul Azmi Bin Abu Bakar

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

PROBLEMS ASSOCIATED WITH EVALUATION OF EXTENSION OF TIME (EOT) CLAIM IN GOVERNMENT PROJECTS

This item is protected by original copyright

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions.

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

KHAIRUL EDZUAN ADHA BIN KAMARUDIN

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

ISU DAN CABARAN PELAKSANAAN SISTEM PENGURUSAN KESELAMATAN MAKLUMAT (ISMS) 15 Jun 2016 Dewan Taklimat Serdang

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

Transcription:

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS A thesis submitted to the graduate school in partial fulfillment of the requirements for the degree Master of Science (Information Technology) Universiti Utara Malaysia by KHAIRUL NAJMY HAJI ABDUL RANI 0 Khairul Najmy Haji Abdul Rani, 2000. All rights reserved

. - - _, ^. - - -_ I - -. ABSTRAK Revolusi ekonomi berasaskan rangkaian telah mengubahkan cara manusia menjalankan aktivitiaktiviti pemiagaan Di dalam ha1 ini, keperluan-keperluan komunikasi terkini diperlukan untuk menjadikan pemiagaan lebih berdaya saing. Sebagai contoh, sesetengah staf kini mungkin bekerja di dalam bangunan yang berlainan atau malahan negeri yang berlainan dengan pengurus mereka. Jadi satu jaringan meliputi kawasan luas diperlukan bagi memudahkan kedua-dua pihak pengurus dan staf-staf tersebut untuk berkomunikasi walaupun pada jarak yang berjauhan. Contoh seterusnya, menjalankan kerjasama atau perkongsian pintar di antara syarikat-syarikat adalah merupakan satu strategi perniagaan yang sangat penting, terutamanya dalam menghadapi tekanan saingan pemiagaan. Oleh yang demikian, satu rangkaian komunikasi yang selamat diperlukan bagi menghubungkan syarikat-syarikat yang terlibat di dalam proses kerjasama atau perkongsian pintar pemiagaan itu. Salah satu penyelesai untuk Rangkaian Kawasan Luas (WAN) yang digunakan bagi memenuhi keperluan-keperluan komunikasi yang kompleks tertera di atas, dikenali sebagai Virtual Private Network (VPN). VPN adalah satu teknologi terkini yang menggunakan Internet sebagai tulang belakang rangkaian yang utama. Secara amnya, VPN telah dikatakan lebih fleksibel, efektif, dan efisien dalam menjanakan pemiagaan berbanding dengan teknologi-teknologi WAN yang lain. Terdapat dua fungsi utama yang membuatkan VPN menjadi salah satu penyelesai altematif WAN pada masa kini: Penekanan privacy di dalam melakukan pertukaran data yang sensitif melalui cara yang lebih murah berbanding dengan penyelesai-penyelesai WAN tradisional, dan juga perlindungan keselamatan yang sangat baik terhadap aset-aset maklumat yang dihantar melalui infrastruktur Internet. Adalah menjadi satu kebaikan untuk memahami teknologi VPN secara terperinci sebelum ianya digunakan. Di dalam projek ini, terdapat kajian mengenai VPN dari segi latarbelakang pembangunan, konfigurasi, jenis-jenis aplikasi, ciri-ciri penyelesai (keselamatan), kerangka rekabentuk, kebaikan dan keburukan jika dibandingkan dengan teknologi-teknologi saingan, Quality of Service (QoS) dan Service I,evel of Agreements (SLAs), IO-langkah berguna untuk membina infrustruktur VPN, dan penggunaan VPN di dunia nyata. Diharapkan, laporan projek ini dapat menjadi sebagai satu rujukan atau petunjuk yang berguna terutamanya kepada mereka yang berminat di dalam merekabentuk, membangun, dan mengimplementasikan teknologi VPN. ii

Pada kenyataannya, VPN adalah merupakan satu teknoiogi baru dan boleh diperkemaskan lagi. Terdapat beberapa kelemahan di dalam senibinanya dan ciri-ciri penyelesainya, di mana ianya perlu dikembangkan lagi. Projek ini memfokuskan teknologi VPN berbanding dengan teknologiteknologi saingannnya di dalam menyediakan penyelesaian terbaik di dalam rangkaian Enterprise sesebuah organisasi.... 111

ABSTRACT The revolution of the networked-centric economy has transformed the way of people carrying out business activities. ln this case, the business needs new kind of communication requirements in order to be more competitive. For instance, some corporate staffs are no longer work in the same building or even in the same country with their managers. Therefore a wide area link is needed to communicate with these staffs working in the remote branches or in the fields. Another example, alliances and partnerships among enterprises have become as crucial strategies that need to be regulated by many industries to cater the pressures from business competitors. Therefore, a secure communication solution is needed to link all the joined enterprises. One of the latest emerged Wide Area Network (WAN) solutions used to fulfill all the complex communication requirements is known as Virtual Private Network (VPN), which use the Internet as the main backbone. In general, VPN has been claimed to be more flexible, effective and efficient compared to other WAN technologies. Two essential functions that make VPN as one of the best alternative WAN solutions currently: Privacy for interchange of sensitive data in a cheaper way compared to traditional WAN solutions, and Remarkable security protection of information assets transmitted over the Internet infrastructure. It is good to understand the VPN technology in details before starting to implement it. In this thesis, there will be a study on VPN in terms of its progression backgrounds? configurations, application types, solution (security) features, design framework, pros and cons with respect to other competitor technologies, Quality of Service (QoS) and Service Level Agreements (SLAs), useful lo-point plan infrastructure building, real world implementation. Hopefully this thesis can be as a useful reference or guidance for those who are really interested in designing, developing, and implementing the VPN technology. In reality. VPN is an immature and upgradable technology. There are certain loopholes in its architectures and solution features that can be enhanced. This project will focus on VPN s technology compared to other WAN solutions in providing the best solution for the organization s enterprise network. iv

The contents of the thesis is for internal user only