Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
1
FACULTY INFORMATICS AND COMPUTING
FINAL YEAR PROJECT PROPOSAL
REPORT
CSF 35104 FINAL YEAR PROJECT I
SEMESTER 1 SESSION 2020/2021
NAME
FARHANA WAHIDA BINTI ISMAIL
MATRIC NUM
BTBL19056855
SEMESTER 3
TELEPHONE 0172034376
EMAIL [email protected]
SUPERVISOR’S
NAME
PROF. MADYA DR MOHD FADZIL BIN ABDUL KADIR
PROJECT
TITLE
IMPLEMENTING VIRTUAL PRIVATE DIAL-UP NETWORK
(VPDN) FOR DATA SAVING
2
Contents
INTRODUCTION ..................................................................................................................... 3
Background Study ................................................................................................................... 3
VPDN .................................................................................................................................. 4
Problem Statement ................................................................................................................... 5
Objective ................................................................................................................................. 6
Scope ....................................................................................................................................... 6
Limitation of Works ................................................................................................................ 7
Conclusion .............................................................................................................................. 7
LITERATURE REVIEW ......................................................................................................... 8
Introduction ............................................................................................................................. 8
OSI model ............................................................................................................................... 8
Virtual Private Dial-up Network .............................................................................................. 9
VPDN Tunneling Protocol (L2TP) ........................................................................................ 16
Related work ......................................................................................................................... 22
Conclusion ............................................................................................................................ 32
METHODOLOGY .................................................................................................................. 33
Introduction ........................................................................................................................... 33
Research of Methodology ...................................................................................................... 33
Framework ............................................................................................................................ 35
Flowchart .............................................................................................................................. 35
Simulation ............................................................................................................................. 37
Conclusion ............................................................................................................................ 38
REFERENCES ........................................................................................................................ 39
3
INTRODUCTION
1.1 BACKGROUND STUDY
These days, everything basically done by accessing things through our fingertip and all
that simply requires a device with a good internet connection. However, doing activities
online not only offers users to easily access things and get their job done quickly, it also has
several issues that keeping them wary and always seeking for solutions. One of the concern is
how to save data usage without affecting its use. While this has always concerned the internet
users, it become one of a great concern in this pandemic season especially for those from
B40 groups and residents that live at the residential area with a weak network connection. As
lots of sector has been closed or slowed down due to the pandemic, every daily routine has
drastically changed to online activities which lead users to spending more in buying
additional data plan from their telecommunication services.
Thus this project proposes to study how virtual private dial-up network (VPDN) can help
users to establish a long distance point-to-point connection without having to build a standard
remote connection. VPDN technology proposed that it can provide cost-effective method for
establishing a long distance point-to-point connection between remote dial-up user and
private network as well as allowing users to access private network remotely over a shared
infrastructure, the internet. VPDN is said to also provide a secured data transmission carried
from private data throughout the public network,
4
1.1.1 VPDN
Virtual Private Dial-up Network (VPDN) is an extend of private dial-in services
to remote users. VPDN uses a Layer 2 tunneling technologies to create a virtual point-to-
point connection between remote client’s nodes and a private network. VPDN technology
provides a cost-effective method for point-to-point connections between remote users and
a central network but still maintaining the same security and management policies as a
private network. VPDN uses any nearby access server which usually located at an
Internet Service Provider (ISP) local point of presence (POP) instead of directly
connecting to the remote private network. VPDN provide a cost-effective method of
communication between remote clients and private network by securely carrying data
from the access server to the private network over the internet.
A benefit of VPDN is that the way it assigns responsibilities to the network which
let user to only responsible for authenticating and maintaining their private network.
Users can outsource in dealing with the information infrastructure (IT) of an ISP that
maintain the modems to remote user’s dial in, accessing server and internetworking
expertise. VPDN works as a Point-to-Point Protocols (PPP) client dials in to an ISP
access server called Network Address Server (NAS). The NAS then will determine
whether it should forward the PPP session to the router or any access server that in
contact with the private network which is the tunnel server. The tunnel server
authenticates the user and initiates the PPP negotiation. Once the setup completed, all
frames that are sent between the client and the tunnel server is pass through the NAS to
5
continue the communication. These are the tunneling protocols that VPDN uses to
transmit or tunnel link-layer frames:
Layer 2 Tunneling Protocol (L2TP)
Layer 2 Tunneling Protocol Version 3 (L2TPv3)
Layer 2 Forwarding (L2F)
Point-to-Point Tunneling Protocol (PPTP)
By using one of these protocols, a tunnel is established between the NAS or client and the
tunnel server which provides a secure and cost-effective in transporting data over a shared
infrastructure such as the internet.
1.2 PROBLEM STATEMENT
This days, everything is basically done online whether it is to shopping, learning,
conducting a meeting or anything as long as there is a good internet connection connected to
the device. Users rapidly uses the online platform even more due to the pandemic that has
been spreading across the world. People are forced to practice the new norm in order to
prevent the virus from spreading more easily and rapidly. So, the main concern is to help user
in saving data usage when they are using the network to complete their job or learning
process. Users with financially problem are concerned when it comes to spending for
network connectivity. Lastly, using internet daily can cause of too much of data consuming.
Therefore, by conducting this project, it can help users resolving their concerns with more
beneficial in return that can fill users’ needs and favors.
6
1.3 OBJECTIVES
The general objective is to conduct a simulation in order to study about the Virtual
Private Dial-Up Network and how it can help with the problem statements. As for the main
objective of this project is as follows:
To study tunneling protocols and how VPDN model works with those protocols.
To configure a working VPDN in a network simulator using one of the tunneling
protocol.
To test the effectiveness of configured VPDNs and comparing the simulation result in
order to achieve the claim of the project.
1.4 SCOPE
The scope of the project is as follows:
Developing a simulation of VPDN using a network simulator.
Implementing the Virtual Private Dial-Up Network for point-to-point communication
in the simulator.
Testing the effectiveness of data saving using VPDN in a communication.
7
1.5 LIMITATION OF WORKS
The limitation for this project are:
User is required to have only a standard dialup system since tunneling provide the
connection between ISP and NAS transparently.
User also need to have a fair knowledge about VPDN basics before configuring it.
This connection type only provided for wired connection type.
1.6 CONCLUSION
In this chapter, the implementation of VPDN is roughly discussed based on the background
study, problem statement, objective, scope and limitation of work. At the end of this project, the
objectives of implementing Virtual Private Dial-up Network will be successfully developed and
tested.
8
LITERATURE REVIEW
2.1 INTRODUCTION
In this chapter, some research papers are reviewed and summarized. The researched
literature review is discussed in order to get a better knowledge about this project. As stated in
chapter 1, this project is practically based on the implementation of the VPDN on a PPP
connection.
2.2 OSI MODEL
Open System Interconnection (OSI) Reference Model is a logical and conceptual model
that defines network interconnection and communication with other system as well as to
implement protocols according to the seven layers. In the OSI model, each of the seven layers
relies to every next lower layer to perform the basic functions. As for this project focuses on the
layer 2, data link layer, where the tunneling protocols work. Basically, data link layer protocols
are responsible to simply manage the bits and bytes that are being transferred. It basically a set of
specification that are used for implementation of data link layer which is above of the physical
layer. There are various of protocols in data link layer such as Logical Link Control (LLC),
Synchronous Data Link Protocol (SDLC), High-Level Data Link Control (HDLC), Serial Line
Interface Protocol (SLIP), Link Control Protocol (LCP), Link Access Procedure (LAP), Network
9
Control Protocol (NCP) and Point-to-Point Protocol (PPP). The tunneling protocol is conducted
on the layer 2 data link layer where it creates a tunnel between two point on a network that can
securely transmit any kind of data between them.
Figure 1: OSI Layer
2.3 VIRTUAL PRIVATE DIAL-UP NETWORK
Virtual Private Dial-up Network (VPDN) is an extend of private dial-in services
to remote users. The point-to-point connection established between remote clients and a
private network by using the VPDN uses a Layer 2 tunneling technologies. VPDN
technology provides a cost-effective method for point-to-point connections between
remote users and a central network but still maintaining the same security and
management policies as a private network. VPDN uses any nearby access server which
usually located at an Internet Service Provider (ISP) local point of presence (POP)
10
instead of directly connecting to the remote private network. VPDN provide a cost-
effective method of communication between remote clients and private network by
securely carrying data from the access server to the private network over the internet.
A benefit of VPDN is that the way it assigns responsibilities to the network which
let user to only responsible for authenticating and maintaining their private network.
Users can outsource in dealing with the information infrastructure (IT) of an ISP that
maintain the modems to remote user’s dial in, accessing server and internetworking
expertise. VPDN works as a Point-to-Point Protocols (PPP) client dials in to an ISP
access server called Network Address Server (NAS). The NAS then will determine
whether it should forward the PPP session to the router or any access server that in
contact with the private network which is the tunnel server. The tunnel server
authenticates the user and initiates the PPP negotiation. Once the PPP setup completed,
all user’s frames that are sent between client and the tunnel server will be passed through
the NAS. These are the tunneling protocols that VPDN uses to transmit or tunnel link-
layer frames:
Layer 2 Tunneling Protocol (L2TP)
Layer 2 Tunneling Protocol Version 3 (L2TPv3)
Layer 2 Forwarding (L2F)
Point-to-Point Tunneling Protocol (PPTP)
These protocols are to be used in order to establish a tunnel between the NAS or client
and the tunnel server over a shared infrastructure such as the internet.
11
Figure 2: Basic VPDN network deployment.
There are three components that are generally involved in VPDN tunneling; two of it
functions as tunnel endpoint, where one device will be initiating the VPDN tunnel and the other
terminates the VPDN tunnel. Any type of devices can act as the local endpoint depending on the
tunneling architecture. The general terminology referring VPDN devices:
Client – client device can be the PC of a dial-in user, or a router attached to a local
network which it acts as a tunnel endpoint.
NAS – Network Access Server (NAS) is a device usually maintained by the ISP that
provides VPDN service to its customer where it is a local point of contract for the client
device. By establishing a connection between the NAS and the client will be known as
‘receiving a call’ or ‘placing a call’ depending whether a dial-in or dial-out scenario is
being discussed. Following the tunneling protocol, NAS functions as describes below:
o For NAS-initiated VPDN tunneling session and dial-out VPDN tunneling session,
NAS function as a tunnel endpoint. The NAS initiates dial-in VPDN tunnel and
terminates dial-out VPDN tunnel.
o For client-initiated VPDN tunneling session scenarios, NAS does not function as
a tunnel endpoint but it only provides Internet connectivity.
12
Tunnel server –The tunnel terminates dial-in VPDN tunnel and initiates dial-out VPDN
tunnel.
Tunnel switch – a device which is configured to perform multihop VPDN tunneling. A
tunneling switch acts as both a NAS and a tunnel server. Tunnel switch terminates
incoming VPDN tunnel and initiates the outgoing VPDN tunnels to carry data to the next
hop.
Generic Term L2F Term L2TP Term PPTP Term
NAS NAS L2TP Access
Concentrator (LAC)
PPTP Access
Concentrator (PAC)
Tunnel Server Home Gateway L2TP Network
Server (LNS)
PPTP Network
Server (PNS)
Table 1: VPDN Hardware Terminology
A VPDN tunnel exists between two tunnel endpoints and it consists of a control
connection and zero or more Layer 2 sessions which it functions is to carry encapsulated PPP
datagram and control messages between both endpoints. A VPDN session is created at the tunnel
endpoints when an end-to-end PPP connection established between a client and a tunnel server.
There, a one-to-one relationship between an established session and the associated call and
datagram that are related to the PPP connection are sent over the tunnel. Multiple VPDN
sessions can use a same VPDN tunnel.
13
Client-initiated dial-in VPDN Tunneling is also known as voluntary tunneling where
the client’s device initiates a Layer 2 tunnel to the tunnel server and NAS does not participate in
tunnel negotiation or establishment instead it only provides Internet connectivity. The client’s
device must be configured to initiate the tunnel. Main advantage of client-initiated VPDN
tunneling is that it secures the connection between the client and the ISP NAS but it is not
scalable and more complex. It can only use L2TP protocol or L2TPv3 protocol if the client’s
device is a router and only PPTP protocol supported if the device is a client’s PC.
Figure 3: Client-Initiated Dial-In VPDN scenario
NAS-initiated dial-in VPDN tunneling or compulsory tunneling, where the client dials-
in to the NAS through a medium that support PPP such as digital subscriber line (DSL), ISDN,
or the public switched telephone network (PSTN). If the medium used is considered secure, then
client can choose not to provide additional security. Then the client’s PPP session tunneled from
14
NAS to the tunnel server. Any knowledge or interaction from the client is not required. NAS-
initiated VPDN tunneling can be configured with L2TP of L2F protocol.
Figure 4: NAS-Initiated Dial-In VPDN scenario
Multihop VPDN tunneling allows packets to pass through multiple tunnels. Normally,
packets are not allowed to pass through more than one tunnel, but VPDN tunnel supports
multiple packet transmission as it will terminate the tunnel after each hop and a new tunnel is
initiated for the next hop where a maximum of four hops is supported. It is required when the
private network uses Multichassis Multilink PPP (MMP) with multiple tunnel server in a stack
group. Configuring a stack group requires capability in establishing Layer 2 tunnels between the
participating hardware devices. When an incoming data is delivered to the stack group over the
VPDN tunnel, multihop VPDN is required. Mutlihop VPDN tunneling with MMP is configured
using L2TP or L2F protocol.
15
Figure 5: MMP using Multihop VPDN
Multihop VPDN also can configure a router as a tunnel switch where it acts as both NAS
and tunnel server. A tunnel switch can receive packets and send it out using incoming and
outgoing VPDN tunnel. Tunnel switch also can be used between ISP to provide a wide-ranging
of VPDN services. Multihop tunnel switching is configured with L2TP, L2F or PPTP protocol.
Figure 6: Tunnel switching using Multihop VPDN
16
2.4 VPDN TUNNELING PROTOCOL (L2TP)
Tunneling is a technique where it enables remote access users to connect to a variety of
network resources such as Corporate Home Gateway or ISP through a public data network.
VPDN uses Layer 2 protocol to tunnel the link layer of high level protocols; for example, PPP
frames or asynchronous High-Level Data Link Control (HDLC). ISP configure NAS to forward
received calls from user to the customer tunnel server. The ISP usually keeps customer’s tunnel
server information while customer will keep maintaining the user’s IP address, routing and other
user database functions. Administration between the ISP and the tunnel server is reduced for the
IP connectivity.
Layer 2 Tunneling Protocol (L2TP) is a combination of the best two previous version
features of tunneling protocol; Cisco L2F and Microsoft PPTP. L2TP offers the same L2F
features with some additional functions where the tunnel server is capable to work with an
existing L2F NAS and will support upgraded components running the L2TP simultaneously. The
tunnel server did not require any reconfiguration whenever an individual NAS is upgraded from
L2F to L2TP. Here is a table shows the L2F and L2TP features comparison:
Function L2F L2TP
Flow Control No Yes
Attribute-value (AV) Pair
Hiding
No Yes
Tunnel Server Load Sharing Yes Yes
17
Tunnel Server
Stacking/Multihop Support
Yes Yes
Tunnel Server Primary and
Secondary Backup
Yes Yes
Domain Name system (DNS)
Name Support
Yes Yes
Domain Name Flexibility Yes Yes
Idle and Absolute Timeout Yes Yes
Multilink PPP Support Yes Yes
Multichassis Multilink PPP
Support
Yes Yes
Security All security benefits
of PPP including
multiple per-user
authentication
options:
o Challenge
Handshake
Authentication
Protocol
(CHAP)
All security benefits
of PPP including
multiple per-user
authentication
options:
o CHAP
o MS-CHAP
o PAP
Tunnel authentication
optional
18
o Microsoft
CHAP (MS-
CHAP)
o Password
Authentication
Protocol
(PAP)
Tunnel authentication
mandatory
Table 2: L2F and L2TP Features Comparison
Main drawback in a traditional dialup networking service is it only supports registered IP
addresses which it limits the type of applications while L2TP technologies supports multiple
protocols, unregistered and privately administered IP addresses. This allows existing access
infrastructure like the Internet, modems, access servers, and ISDN terminal adapter (TA) to be
used. It reduces the overhead for hardware maintenance cost and 800 number fees, and allows
them to concentrate corporate gateway resources by allowing customers to outsource dial-out
support.
19
Figure 7: L2TP basic architecture in a typical dial-in environment
By using L2TP tunneling protocol, an ISP or any other access service can create a virtual
tunnel to link remote sites or remote users with corporate home networks. The NAS which is
located at the POP of the ISP exchanges PPP messages with remote users and communicate by
L2TP requests and responses with the private network tunnel server to set up the tunnels. L2TP
passes protocol-level packets through the virtual tunnel between endpoints of the point-to-point
communication. Frames from remote users are received by ISP NAS, removed from any linked
framing or transparency bytes, encapsulated in L2TP, and forwarded over the appropriate tunnel.
The private network tunnel server accepts the L2TP frames, eliminates the L2TP encapsulation,
and process the incoming frames for the appropriate interface.
20
Figure 8: L2TP Protocol Negotiation events
The following describes the sequence of events shown in the Figure 8 and is referred to the
figure:
1. Firstly, the remote user initiates a PPP connection to the ISP NAS using any medium that
supports PPP such as the analog telephone system. Then, NAS accepts the connection
and the PPP link is established. The Link Control Protocol (LCP) is negotiated.
2. After LCP done with negotiation, the NAS partially authenticates the end user with
CHAP or PAP. The username, domain name, or Dialed Number Information Service
(DNIS) is used to determine whether the user is a VPDN client or not. If the user is not a
VPDN client, the authentication continues, and the client will have access to the Internet
21
or other contacted service. However, if the user is a VPDN client, the mapping will name
a specific endpoint (the tunnel server).
3. The tunnel endpoints which is the NAS and the tunnel server, needs to authenticate each
other before any tunnel or session establishment attempted. Alternatively, the tunnel
server can accept tunnel creation without any NAS tunnel authentication. The negotiation
of tunnel establishment is done by exchanging control message between NAS and the
tunnel server.
4. An L2TP session is created for the end user as soon as the tunnel existed. The NAS and
the tunnel server exchange call messages once again to negotiate session establishment.
5. The NAS will reproduce the negotiated LCP options and the partially authenticated
CHAP or PAP information to the tunnel server. The tunnel server will manage the
negotiated options and authentication information directly to allow the authentication to
be completed. If the options configured mismatch the options negotiated, the connection
will fail and NAS will be notified.
6. Then the PPP packets exchanged between the dial-in client and the remote tunnel server
without any intermediary device involved.
The L2TP tunnel negotiation do not need to be redone for the next PPP incoming sessions,
because there is already an opened L2TP tunnel.
22
2.5 RELATED WORK
Authors / Year Title Objective Ps Method Result
Mooi
Choo
Chuah
Enrique J.
Hernande
z-Valencia
(2020)
Mobile
Virtual
Private Dial-
Up Services
To describe
and compare
different
solutions
that extend
the wired
VPDN service
model over
various
wireless
network.
Growth of
dial-up
service is
motivated in
by increasing
network
access
demand
from
professional
s and casual
users
wishing to
keep abreast
of an ever-
expending
global world
information.
Fueled with
competition
in the
market and
keen to keep
workforce
constantly in
touch with
corporate
resource
anywhere.
Expected to
support dial-
up users
with varying
degrees of
technical
ability and
Use five
alternatives :
i. Mobile IP
and IPSec
ii. Hierarchic
al
Registratio
n
iii. Voluntary
Tunneling
iv. Mobile
L2TP
v. Multiple-
Hop L2TP
PPP-based solution
Alternatives
compared in
terms of features,
cost, standards,
and time to
market. PPP-
based solutions
seem more
attractive. The
software
enhancement
needed to
support mobility
in these solutions
is minimal.
Currently, most of
these procedures
do not support
QoS
23
network
equipment.
Jian Shen
Shoulian
Tang
Yonggang
Wang
(2011)
Research on
the
Technology
of Virtual
Data Private
Network
Based on 3G
Network
Illustrated
two different
modes of
access and
provide a
new mode
access by
comparing
them which
expected can
enhance the
operating
efficiency
and security
of the virtual
data private
network.
The demand
for remote
data
transmission
and remote
login arise
during
recent years.
However
traditional
problems
fixing
network
mode such
as wiring
difficulties,
long
implementat
ion cycle and
high cost.
With 3G
service, it is
expected to
be in
wireless
method but
this
concerned
with low
security,
reliability
and speed.
VPDN based 3G
refers to process
3G user dialing
number to access
private network,
transmit private
data through
packet and
encryption of net
data, reaching
private network
security class, so
as to build a virtual
enterprise internal
data network
through fixed
network and
mobile network
Structure divided
into3 part; A, B
and C.
A- Core
transmissi
on zone
to provide
data
routing.
B- Enterprise
access
zone,
provide
dedicated
access
C- Access
managem
ent
platform.
Provide
trusteeshi
p
authentic
ation
service
and
managem
ent
service.
Active firewall for
security.
Americas
Headquar
ters
Cisco
System
(2018)
VPDN
Configuratio
n Guide
Understandi
ng VPDN
concept,
implementati
on,
configuration
,
24
components,
structure and
expected
result
Chetan S.
More
Aman
Anand
Kushagra
Razaada
Manuj
Srivastava
(2018)
Client Server
Synergy
using VPN
Introducing
VPN and
visualizing
the
structure,
protocols,
and
technologies
for easier
way to
decide the
best solution
for different
parts of the
enterprise
infrastructur
e which best
meets the
requirement.
VPN allows
users to
send and
receive data
across
shared
public
network as if
they were
directly
connected
to the
private
network.
The VPN
services is
fully
dedicated to
the small
and medium
size
companies.
It can be
categorized
as Secure or
Trusted
VPNs, Client-
based or
Web-based
VPNs,
Customer
Edge-based
or Provider
Edge-based
VPNs, or
Outsourced
or In-house
Protocols used in
VPN :
PPTP
L2TP
IPSec
SOCKS
VPN Technologies:
Tunneling
(encapsula
tion)
Authentica
tion
Access
Control
Data
Security
Advantage :
Cost
saving
and
scalability
Eliminate
the
expensive
need of
long-
distance
leased
lines
Public
network
tunneling
into a
private
connectio
n.
Encrypted
Low cost
to
implemen
t
Disadvantages:
Slow and
bad
hardware
Require
good
knowledg
e of
network
security
issues
25
VPNs. These
categories
often
overlap each
other.
Stability
depend
on
internet
scalability
Differing
technolog
y may not
work
together
Wanghui
Li
Ganghua
Bai
(2018)
Internet of
Things
System
Based on
Mobile
Communicat
ion Network
To study of
ways in
successfully
establish a
standard and
unified IOT
system based
on a specific
scheme
(bandwidth,
QoS and
congestion
control
based layer is
proposed).
Internet
technology
has
developed
and
penetrated
into all
aspects of
social life
and
production.
However,
people's
understandi
ng of the IoT
is not
enough, and
the market
has not fully
accepted. A
variety of
IoT
applications
developed
but most of
these
applications
have died
soon after
the launch
because of
The application
model of the IoT is
studied, including
video monitoring,
data collection and
transmission,
intelligent
identification, and
urgent monitoring.
Connectivity, QoS,
and bandwidth are
discussed and
analyzed. VPDN
data special
network platform
is constructed,
tunnel technology
is applied in actual
operation process,
appropriate access
methods are
chosen in
combination with
reality, and a
reasonable plan is
proposed to
ensure the security
of the
implementation
scheme.
With VPDN, the
IoT system is
constructed and a
reasonable
planning scheme
is proposed. The
actual application
situation of the
system is studied,
the characteristics
of the system are
clearly defined,
and the
congestion
control algorithm
is chosen in the
actual operation
process. However,
the algorithm is
only implemented
in the application
layer and in terms
of theory, the
bandwidth
resources can be
saved by 50%.
26
the lack of
system
standards,
lack of unity,
poor
compatibility
and low
scalability at
the present
stage
27
Authors /
Year Title Objective Ps Method Result
Seyed
Rashidaldin
Hassani
(2010)
QoS
managemen
t in DSL
services of
an ISP in Iran
Focus on
implementi
ng QoS for
DSL
subscribers
for Pardis
Online
(private ISP
in Iran).
Aims to
increase
customer
satisfaction
and
facilitate
network
maintenanc
e and
provisioning
by applying
QoS on the
network
The internet
bandwidth in the
region that ISP
operates is very
expensive and
the users suffer
from the lack of
bandwidth so
the limited
internet links are
usually
congested in the
network.
i. Where
should
traffic
initially
be
marked,
or
classified
, and
which
devices
would do
the
marking?
ii. Different
network
devices
have
different
traffic
manage
ment
capabiliti
es; a way
was
required
1. QoS for
manage
ment
traffic in
backbon
e
2. Qos for
manage
ment
traffic in
province
networks
3. QoS to
home
The test
scenarios was
able to
demonstrate
the efficiency of
the chosen QoS
mechanisms in
POL backbone
and access
networks.
28
to
impleme
nt a
common
packet
marking
strategy
to
overcom
e these
differenc
es.
iii. It must
be
decided
about
how to
map
markings
between
OSI Layer
2 (Data
Link) and
Layer 3
(Networ
k) levels,
when
traffic is
handed
off
between
the LAN
and the
WAN.
Sun Fei
Song
Jun-
yuan
CDMA
VPDN-based
Wireless
Data
Communicat
ion System
for Mobile
To prove the
system
establishes
safe and
reliable real-
time
communicat
Based on the
characteristics
such as varied
topography; the
region it extends,
long distance
between
Compare VPDN
L2TP and VPN
IPSec
The pipeline
patrol system
based on the
private network
of CDMA VPDN
has complete
functions with
29
Xu Jun-
xia
(2013)
Pipeline
Patrol
ion and
achieves
desired
effects and
smooth
high-
efficient
upstream &
downstream
data
transmission
. It is of
significance
to improve
patrol
efficiency
and quality
and to
guarantee
oil
transportati
on security
of the
pipeline.
stations, large
volume of data
transmitted and
high
requirement for
security and
relying on the
private network
of Telecom
CDMA VPDN
convenient, safe
and reliable
operation and
smooth high-
efficient
upstream and
downstream
information
transmission. It
can improve the
working
efficiency of the
pipeline
patrollers and
the patrol
quality and
guarantees
reliable
operation of the
pipeline system.
Dwi Ely
Kurniaw
an
Hamdan
i Arif
N
Nelmia
wati
Ahmad
Hamim
Tohari
Implementat
ion and
analysis
ipsec-vpn on
cisco asa
firewall
using gns3
network
simulator
Builds a
private
network
that
provides
quality and
security in
accessing
the Internet.
The entire
set of
systems
were built in
a virtual and
simulated
manner.
Internet lacks of
security
guarantee in
terms of
information
exchange. Due to
security reasons,
data
confidentiality,
integrity and
availability are
important factor
that needs to be
considered.
Topology design
used in two
types; general
topology and
network
topology in
GNS3.
Tracero
ute test:
connect
ion
through
the first
hop
before
heading
to the
gateway
Delay
test:
VPN
provide
better
network
30
Maidel
Fani
(2019)
quality
than
non-
VPN
network
Round
trip
time
(RTT):
non-
VPN
network
is better
Packet
lost:
both
VPN
and
non-
VPN
have
good
connect
ivity
Bandwi
dth:
non-
VPN
amount
s is
larger
but VPN
is
faster.
(factors
of
firewall)
Denial
os
service
(DoS):
31
still
vulnera
ble to
attack
Man in
the
middle
(MITM):
VPN
cannot
be
taped
by
attacker
32
2.6 CONCLUSION
As for the conclusion, this chapter discuss about the research of past studied project of
the implementation of VPDN. This study focuses on the data saving for transmission using a
Virtual Private Dial-up Network. Thus this project has been chosen to implement VPDN for data
saving.
33
METHODOLOGY
3.1 INTRODUCTION
In this chapter, methodology, framework and flowchart will be discussed to get a better
view and understanding of this project. This chapter is important in developing a project as it is
crucial to be used as the guidelines for the implementation part which is the next chapter.
3.2 RESEARCH OF METHODOLOGY
Using research methodology for the method of developing this project, the early
preparation of planning and scheduling of the project is a very important phase. Based on the
figure below, there are phases mentioned that needed to be followed in order to develop this
project. The first phase is to identifying the problems regarding the research. For this project, the
problem identified is in term of saving data usage when establishing a point-to-point
communication as mention in the problem statement stated in the Chapter 1. The second phase is
designing and developing. The main purpose of this phase is to find a suitable method to be
implemented in this project. As for this project, L2TP tunneling protocol is used to implement
the VPDN Point-to-Point communication. The next phase is the simulation of the project where
the Cisco Packet Tracer as simulation tools that will be used to conduct the simulation of this
34
project. For the last phase is performance metrics where the outcome of the simulation is
analyzed and evaluated.
Figure 9: Research Methodology
35
3.3 FRAMEWORK
Figure 10: Framework of VPDN in Cisco
3.4 FLOWCHART
Configuring a VPDN in a Cisco Packet Tracer using L2TP Tunneling protocol have 3
types of method of establishing a VPDN tunneling which is:
NAS-initiated Dial-in VPDN tunneling
Client-initiated Dial-in VPDN tunneling
Multihop VPDN tunneling
In this project, NAS-initiated and Client-initiated will be implemented and compared the result
for both types.
36
Figure 11: Flowchart of VPDN L2TP Tunneling Protocol
37
3.5 SIMULATION
Figure 12: Cisco Packet Tracer
The simulation tool for this project is Cisco Packet Tracer. In order to properly configure
and test it on the real-time environment, it might consume a lot of time and practices. Instead,
with Cisco Packet Tracer allows to simulate the L2TP tunneling protocol in configuring the
VPDN for this project which it also provide a user guide in order to help user understand every
step taken during conducting this simulation. Cisco Packet Tracer provides multiple
opportunities in demonstrating network concepts. Although Packet Tracer is not a substitute for
the real equipment, it lets users especially students to practice using a command-line interface,
learning the fundamental component of how to configure routers and switches. Packet Tracer
also help simplifying the learning process by providing tables, diagrams, and other visual
representations of internal functions such as dynamic data transfers and packet content
expansion.
38
3.6 CONCLUSION
This chapter focused about the methodology used in order to conduct this project. The
flow of the project is visualize using the flowchart and framework which it provides better
understanding for the implementation using the simulator chosen for this project.
39
REFERENCES
Chuah, M. C., & Hernandez-Valencia, E. J. (2002). Mobile virtual private dial-up
services. Bell Labs Technical Journal, 4(3), 51–72. https://doi.org/10.1002/bltj.2179
Headquarters, A. (n.d.). VPDN Configuration Guide. Retrieved January 27, 2021, from
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/vpdn/configuration/xe-16/vpd-xe-16-
book.pdf
VPDN(L2TP,PPTP,PPPoE) Configuration. (n.d.). Retrieved January 27, 2021, from
https://www.energitel.com/wp-content/uploads/2019/04/10-VPDNL2TPPPTPPPPOE-
Configuration.pdf
Understanding VPDN. (2017, May). Cisco.
https://www.cisco.com/c/en/us/support/docs/dial-access/virtual-private-dialup-network-
vpdn/20980-vpdn-20980.html
Shen, J., Tang, S., & Wang, Y. (2011). Research on the Technology of Virtual Data
Private Network Based on 3G Network. Communications in Computer and Information
Science, 275–281. https://doi.org/10.1007/978-3-642-23223-7_35
Sun, F., Song, J., & Xu, J. (2013). CDMA VPDN-based Wireless Data Communication
System for Mobile Pipeline Patrol. Proceedings of the 2nd International Symposium on
Computer, Communication, Control and Automation.
https://doi.org/10.2991/isccca.2013.62
Ely Kurniawan, D., Arif, H., Nelmiawati, N., Hamim Tohari, A., & Fani, M. (2019).
Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network
simulator. Journal of Physics: Conference Series, 1175, 012031.
https://doi.org/10.1088/1742-6596/1175/1/012031
Administrator. (2021, January 28). Configuring PPTP (VPDN) Server On A Cisco
Router. Firewall.cx. http://www.firewall.cx/cisco-technical-knowledgebase/cisco-
routers/329-cisco-router-pptp-server.html
40
Administrator. (2021, January 28). How To Configure Windows VPDN (PPTP) Dialup
Connection. Firewall.cx. http://www.firewall.cx/cisco-technical-knowledgebase/cisco-
routers/330-cisco-router-win-pptp.html
HASSANI, SEYED RASHIDALDIN. (2021). QoS management in DSL services of an
ISP in Iran. DIVA. http://www.diva-
portal.org/smash/record.jsf?pid=diva2%3A349542&dswid=-8961
Li, W., & Ganghua Bai. (2018, November 10). Internet of Things System Based on
Mobile Communication Network. ResearchGate; Kassel University Press.
https://www.researchgate.net/publication/328859696_Internet_of_Things_System_Based
_on_Mobile_Communication_Network
Kushagra Raizada, Aman Anand, & Manuj Srivastava. (2021). Client Server Synergy
using VPN. International Journal for Scientific Research and Development, 5(11), 166–
169. http://ijsrd.com/Article.php?manuscript=IJSRDV5I110127