You are on page 1of 6

VIRTUAL NETWORKS

Surbhi Singhal#1, Vandana Singh#2


Deptt. Of Computer Science,
Indraprastha College for Women,
New Delhi, India
1ss989435@gmail.com
2fidatovandana@gmail.com

Dr. Shikha (Mentor)


Indraprastha College for Women
New Delhi, India
shikha_8june@rediffmail.com

ABSTRACT
1. INTRODUCTION
Virtual Network is computer networks
In today’s scenario, there is a growing
which consist of links of network
Usage of computer networks in all
maintained virtually .It is implemented
organizations whether it is corporate world
using virtualization of networks. Next virtual
or our daily lives. Basically, Virtual Network
private network uses Internet that is the
Computer is the network consisting of
transmission is done through a public
Virtual Network links. Such Virtual Network
mode.
link is implemented using method of
network virtualization. Network
This paper discusses how VN (Virtual
Virtualization is the process of combining
Network) can be advantageous for
hardware and software network
computer communication. It shows our
Resources and network functionality into a
detailed study of IPV6 i.e., 6Bone along
single, software- based administrative
with its implementations by providing VPN
entity, a virtual network. These networks
services, protocols, headers, lifetime
aim to provide users access to a single
address and contribution.
resource from any platform or device it be.
In such systems, machines supply users
Keywords not just with data but also with application
that can be easily accessed over Internet.
Virtual network; virtual private network;
Virtualization; Fragmentation The two most common forms of network
virtualization are virtual networks based on
protocol such as VLANs, VPNs, VPLSs
1
and virtual networks that are based on
virtual devices such as the networks
connecting virtual machines inside a
hypervisor. The "virtual networks" allow
user to test networking capabilities of
operating systems and applications
software, without actually having to
purchase. Even, there exists virtual
machine program that helps to create
virtual network like “VMware Player”, or
“Oracle VM VirtualBox”.

The central focus of this paper is to study


in depth on how organizations can benefit
by using VN (Virtual Network) services and
protocol to securing their computer network It is created by connecting offices & single
systems. This issue is discussed in a bit users (including mobile users) to the
more extent by even procuring over the nearest service provider’s POP (Point of
fact how virtual private networks can be Presence) & using that service provider’s
advantageous and also lifetime contribution backbone network, or the Internet, as the
of various VPNs. We tried to do a detailed tunnel between offices. Traffic that flows
study over the fact that among different through the backbone is encrypted to
VPNs like 6-Bone-IPV6 which network is prevent intruders from spying or
more beneficial by drawing a proper outline intercepting the data.
between different networks. There are
many advantages by implementing secure A private network supports a closed
connections through these networks to community of authorized users, allowing
suppliers, customers, partners, and branch them to access various network related
offices, organizations which can build services and resources. The traffic
customer loyalty, improve supplier originating and terminating within a private
customer relationship. network traverses only those nodes that
belong to the private network. Further,
2. VPN TECHNOLOGIES there is traffic isolation. That is, the traffic
corresponding to this private network does
A Virtual Private Network (VPN) is a not affect nor is it affected by other traffic
network that uses public means of extraneous to the private network.
transmission (Internet) as its WAN link.A
VPN is an effective means of exchanging
A final feature of a VPN is that it virtual.
information for employees working in
A virtual topology is built on an existing,
organizations or any other place they be.
shared physical network infrastructure.
This information is securely exchanged
However, different administrative bodies
between vendors, suppliers, stakeholders.
usually administrate the virtual topology
2
and the physical network. increases cost exponentially, which is why
VPN’s offer even greater cost savings
3. VPN PROTOCOLS when scalability is an issue. An Integrated
VPN platform offers a number of important
Three main Protocols that power the vast benefits:
majority of VPN’s: PPTP, L2TP, IPSec. A
VPN can be created by connecting offices Reliability: Early VPN implementations
and single users (including mobile users) were assembled from many separate
to the nearest service providers POP internetworking devices, including routers,
(Point of Presence) and using that service bandwidth managers, gateways and
provider’s backbone network, or even the firewalls.
Internet, as the tunnel between offices.
Traffic that flows through the backbone is Scalability: Close integration of security,
encrypted to prevent intruders from spying routing, and QoS functions allows the
or intercepting the data These protocols network to scale to larger sizes than would
emphasize encryption & authentication; be possible if separate components were
preserving data integrity that may be required.
sensitive and allowing clients/servers to Cost Savings: Combining multiple devices
establish an identity on the network..It is onto a single platform also reduces the
the encapsulation of a message packet total hardware and software cost.
within an IP packet for transmission across
the Internet with the encapsulated packet
is stripped from the IP packet at the
receiving network to get the original
message packet.

4. ADVANTAGES OF VPN

The two major advantages of VPN are


cost savings and scalability. VPN’s lower
5. DISADVANTAGES OF VPN
costs by eliminating the need for expensive
long-distance leased lines. A local leased
VPNs can be really disadvantageous
line or even a broadband connection is all
because the connection travels over public
that’s needed to connect to the Internet
lines, a strong understanding of network
and utilize the public network to securely
security issues and proper precautions
tunnel a private connection. As the
before VPN deployment are necessary.
number of company branches grows,
VPN connection stability is mainly in
purchasing additional leased-lines
3
control of the Internet stability, factors 6.2. FEATURES
outside an organizations control. Differing
VPN technologies may not work together One of the most prominent features of
due to immature standards. VPN need to IPV6 are:
accommodate protocols other than IP and  Larger Address Space
existing (legacy) internal network  Aggregation-based address
technology hierarchy Efficient backbone routing
 Efficient and Extensible IP datagram
6. 6- BONE  Stateless Address Auto
configuration
The 6-Bone is an IPV6 testbed that is the  Security (IPSec mandatory)
outgrowth of the IETF IPng project that  Mobility
created the IPv6 protocols intended to
eventually replace the current Internet
Network layer protocol known as IPV4.
The 6-bone started as a virtual network 6.3. 128 BIT IPv6 ADDRESS
(using IPv6 over IPv4
tunnelling/encapsulation) operating over
the IPv4-based Internet to support IPv6
transport, and is slowly migrating to native
links for IPv6 transport.

6.1. LIFETIME CONTRIBUTION

6 Bone has played an immense important


role in previous years whether it be any
field like:
 a place for early standard
developers and implementers to test
out the IPv6 protocols and their
implementations
 a place for early experimentation
with routing and operational
procedures
 a place to evolve practices useful
for production IPv6 prefix allocation
 a place to provide bootstrap
qualification for production IPv6
address prefix allocation
 a place to develop IPv6 applications
 a place for early users to try using
IPv6 in their hosts and networks.
4
6.4. HEADER COMPARISION options that require hop-by-hop
processing
 Destination Options – Optional
information to be examined by the
destination node

7. CONCLUSION

IPv6 is NEW …
– built on the experiences learned
from IPv4
– new features
– large address space
– new efficient header
– auto configuration
… and OLD
– still IP
– build on a solid base
– started in 1995, a lot of
6.5. MAJOR IMPROVEMENTS IN
implementations and tests done
IPv6 HEADER

 No option field: Replaced by REFERENCES


extension header. Result in a fixed
length, 40-byte IP header. [1] Anderton, S. (1993) “Issues for VPN
 No header checksum: Result in fast users”. Virtual Networking, IEEE
processing. Colloquium, London, UK, 3/ 1-3/6.
 No fragmentation at intermediate
nodes: Result in fast IP forwarding. [2] Baukari, N. and Aljane, A. (1996)
“Security and auditing of VPN”.
Services in Distributed and
6.6. EXTENSION HEADERS Networked Environments
Proceedings of Third International
 Routing – Extended routing, like Workshop, Macau, 132-138.
IPv4 loose list of routers to visit
 Fragmentation – Fragmentation and [3] Halpern, J. (2001) “SAFE VPN IPSec:
reassembly Virtual Private Networks in Depth”.
 Authentication – Integrity and Accessed August 2, 2002.
authentication, security http://www.cisco.com/ w a r p / p u b l
 Encapsulation – Confidentiality ic/cc/so/cuso/epso/sqfr/
 Hop-by-Hop Option – Special
5
safev_wp.htm

[4] M. Andrews and L. Zhang. The access


network design problem. In IEEE
Symposium on Foundations of Computer
Science (FOCS), pages 40.49, 1998.

[5] Kyte, S. (1993) “Global virtual private


networks”. Virtual Networking, IEEE
Colloquium, London, UK, 5/1-5/5.

[6] Liang, H., Kabranov, O., Makrakis, D.,


and Orozco-Barbosa, L. (2002)
“Minimal Cost Design of Virtual
Private Networks”. Proceedings of the
2002 IEEE Canadian Conference on
Electrical & Computer Engineering, 3,
1610- 1615.

[7] Ortiz (1997) “Virtual Private


Netoworks: leveraging the Internet”.
Computer, Vol. 30, 18-20.

[8] Microsoft (n.d.) “Virtual private network


(VPN) connections overview”.
Accessed July 15, 2002.
<http://www.microsoft.com/windowsx
p/home/
using/productdoc/en/default.asp?url=/
WINDOWSXP/home/using/productdo
c/en/ Conn_VPN.asp?fram

You might also like