Research of Typical VPN Network Management Mechanisms

Article Preview

Abstract:

VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2510-2514

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. H. Cheung, J. Misic. On Virtual Private Networks Security Design Issues [J]. Computer Networks, 2005 38(2) 165-179.

DOI: 10.1016/s1389-1286(01)00256-0

Google Scholar

[2] C. Y. Chun, Y. Liu, Y. F. Yan. Asymmetric tunnel model-based mobile VPN scheme [J]. Computer Engineering and Applications, 2010 46(17) 15-18. (in Chinese).

Google Scholar

[3] Z. B. Zhou, J. Q. Tang, H. Deng. High-throughput VPN System Based on Load balancing [J]. Computer Engineering and Applications, 2012 48(36) 85-89. (in Chinese).

Google Scholar

[4] J. Liang, R. H. Nie. Research on VPN Technology Based on IPsec [J]. Computer and Modernization, 2009 (11) 57-59. (in Chinese).

Google Scholar

[5] H. H. Li. Recovery Scheme for Multicast Link of BGP/MPLS VPN [J]. Computer Engineering, 2012 38(17) 73-76. (in Chinese).

Google Scholar

[6] J. Y. Chen. Applied Study on End-to-End Qos Solutions for MPLS VPN [J]. Computer Science, 2011 38(10) 389-391. (in Chinese).

Google Scholar

[7] Internet Engineering Task Force. RFC 2401 Security Architecture for the Internet Protocol, (1998).

Google Scholar

[8] Internet Engineering Task Force. RFC 2409 The Internet Key Exchange (IKE), (1998).

Google Scholar

[9] Internet Engineering Task Force. RFC 3469 Framework for Multi-Protocol Label Switching (MPLS)-based Recovery, (1998).

Google Scholar

[10] H. Y. Liang, S. M. Li, D. Li. Algorithm of dynamically managing MPLS VPN Path [J]. Application Research of Computers, 2009 26(6) 2224-2228. (in Chinese).

Google Scholar

[11] J. X. Xu. Application of MPLS VPN Technology in Digital Libraries in Colleges and Universities [J]. Research and Exploration in Laboratory, 2012 31(4) 72-75. (in Chinese).

Google Scholar

[12] Internet Engineering Task Force. RFC 2402 IP Authentication header, (1998).

Google Scholar

[13] R. Cohen. On the Establishment of an Access VPN in Broadband Access Networks [J]. IEEE Communications Magazine, 2003 41(2) 156-163.

DOI: 10.1109/mcom.2003.1179565

Google Scholar

[14] K. Gilly, C. Juiz, R. Puigjaner. An up-to-date Survey in Web Load Balancing [J]. World Wide Web, 2011 14(2) 105-131.

DOI: 10.1007/s11280-010-0101-5

Google Scholar