40
FACULTY INFORMATICS AND COMPUTING FINAL YEAR PROJECT PROPOSAL REPORT CSF 35104 FINAL YEAR PROJECT I SEMESTER 1 SESSION 2020/2021 NAME FARHANA WAHIDA BINTI ISMAIL MATRIC NUM BTBL19056855 SEMESTER 3 TELEPHONE 0172034376 EMAIL [email protected] SUPERVISOR’S NAME PROF. MADYA DR MOHD FADZIL BIN ABDUL KADIR PROJECT TITLE IMPLEMENTING VIRTUAL PRIVATE DIAL-UP NETWORK (VPDN) FOR DATA SAVING

FINAL YEAR PROJECT PROPOSAL REPORT

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: FINAL YEAR PROJECT PROPOSAL REPORT

1

FACULTY INFORMATICS AND COMPUTING

FINAL YEAR PROJECT PROPOSAL

REPORT

CSF 35104 FINAL YEAR PROJECT I

SEMESTER 1 SESSION 2020/2021

NAME

FARHANA WAHIDA BINTI ISMAIL

MATRIC NUM

BTBL19056855

SEMESTER 3

TELEPHONE 0172034376

EMAIL [email protected]

SUPERVISOR’S

NAME

PROF. MADYA DR MOHD FADZIL BIN ABDUL KADIR

PROJECT

TITLE

IMPLEMENTING VIRTUAL PRIVATE DIAL-UP NETWORK

(VPDN) FOR DATA SAVING

Page 2: FINAL YEAR PROJECT PROPOSAL REPORT

2

Contents

INTRODUCTION ..................................................................................................................... 3

Background Study ................................................................................................................... 3

VPDN .................................................................................................................................. 4

Problem Statement ................................................................................................................... 5

Objective ................................................................................................................................. 6

Scope ....................................................................................................................................... 6

Limitation of Works ................................................................................................................ 7

Conclusion .............................................................................................................................. 7

LITERATURE REVIEW ......................................................................................................... 8

Introduction ............................................................................................................................. 8

OSI model ............................................................................................................................... 8

Virtual Private Dial-up Network .............................................................................................. 9

VPDN Tunneling Protocol (L2TP) ........................................................................................ 16

Related work ......................................................................................................................... 22

Conclusion ............................................................................................................................ 32

METHODOLOGY .................................................................................................................. 33

Introduction ........................................................................................................................... 33

Research of Methodology ...................................................................................................... 33

Framework ............................................................................................................................ 35

Flowchart .............................................................................................................................. 35

Simulation ............................................................................................................................. 37

Conclusion ............................................................................................................................ 38

REFERENCES ........................................................................................................................ 39

Page 3: FINAL YEAR PROJECT PROPOSAL REPORT

3

INTRODUCTION

1.1 BACKGROUND STUDY

These days, everything basically done by accessing things through our fingertip and all

that simply requires a device with a good internet connection. However, doing activities

online not only offers users to easily access things and get their job done quickly, it also has

several issues that keeping them wary and always seeking for solutions. One of the concern is

how to save data usage without affecting its use. While this has always concerned the internet

users, it become one of a great concern in this pandemic season especially for those from

B40 groups and residents that live at the residential area with a weak network connection. As

lots of sector has been closed or slowed down due to the pandemic, every daily routine has

drastically changed to online activities which lead users to spending more in buying

additional data plan from their telecommunication services.

Thus this project proposes to study how virtual private dial-up network (VPDN) can help

users to establish a long distance point-to-point connection without having to build a standard

remote connection. VPDN technology proposed that it can provide cost-effective method for

establishing a long distance point-to-point connection between remote dial-up user and

private network as well as allowing users to access private network remotely over a shared

infrastructure, the internet. VPDN is said to also provide a secured data transmission carried

from private data throughout the public network,

Page 4: FINAL YEAR PROJECT PROPOSAL REPORT

4

1.1.1 VPDN

Virtual Private Dial-up Network (VPDN) is an extend of private dial-in services

to remote users. VPDN uses a Layer 2 tunneling technologies to create a virtual point-to-

point connection between remote client’s nodes and a private network. VPDN technology

provides a cost-effective method for point-to-point connections between remote users and

a central network but still maintaining the same security and management policies as a

private network. VPDN uses any nearby access server which usually located at an

Internet Service Provider (ISP) local point of presence (POP) instead of directly

connecting to the remote private network. VPDN provide a cost-effective method of

communication between remote clients and private network by securely carrying data

from the access server to the private network over the internet.

A benefit of VPDN is that the way it assigns responsibilities to the network which

let user to only responsible for authenticating and maintaining their private network.

Users can outsource in dealing with the information infrastructure (IT) of an ISP that

maintain the modems to remote user’s dial in, accessing server and internetworking

expertise. VPDN works as a Point-to-Point Protocols (PPP) client dials in to an ISP

access server called Network Address Server (NAS). The NAS then will determine

whether it should forward the PPP session to the router or any access server that in

contact with the private network which is the tunnel server. The tunnel server

authenticates the user and initiates the PPP negotiation. Once the setup completed, all

frames that are sent between the client and the tunnel server is pass through the NAS to

Page 5: FINAL YEAR PROJECT PROPOSAL REPORT

5

continue the communication. These are the tunneling protocols that VPDN uses to

transmit or tunnel link-layer frames:

Layer 2 Tunneling Protocol (L2TP)

Layer 2 Tunneling Protocol Version 3 (L2TPv3)

Layer 2 Forwarding (L2F)

Point-to-Point Tunneling Protocol (PPTP)

By using one of these protocols, a tunnel is established between the NAS or client and the

tunnel server which provides a secure and cost-effective in transporting data over a shared

infrastructure such as the internet.

1.2 PROBLEM STATEMENT

This days, everything is basically done online whether it is to shopping, learning,

conducting a meeting or anything as long as there is a good internet connection connected to

the device. Users rapidly uses the online platform even more due to the pandemic that has

been spreading across the world. People are forced to practice the new norm in order to

prevent the virus from spreading more easily and rapidly. So, the main concern is to help user

in saving data usage when they are using the network to complete their job or learning

process. Users with financially problem are concerned when it comes to spending for

network connectivity. Lastly, using internet daily can cause of too much of data consuming.

Therefore, by conducting this project, it can help users resolving their concerns with more

beneficial in return that can fill users’ needs and favors.

Page 6: FINAL YEAR PROJECT PROPOSAL REPORT

6

1.3 OBJECTIVES

The general objective is to conduct a simulation in order to study about the Virtual

Private Dial-Up Network and how it can help with the problem statements. As for the main

objective of this project is as follows:

To study tunneling protocols and how VPDN model works with those protocols.

To configure a working VPDN in a network simulator using one of the tunneling

protocol.

To test the effectiveness of configured VPDNs and comparing the simulation result in

order to achieve the claim of the project.

1.4 SCOPE

The scope of the project is as follows:

Developing a simulation of VPDN using a network simulator.

Implementing the Virtual Private Dial-Up Network for point-to-point communication

in the simulator.

Testing the effectiveness of data saving using VPDN in a communication.

Page 7: FINAL YEAR PROJECT PROPOSAL REPORT

7

1.5 LIMITATION OF WORKS

The limitation for this project are:

User is required to have only a standard dialup system since tunneling provide the

connection between ISP and NAS transparently.

User also need to have a fair knowledge about VPDN basics before configuring it.

This connection type only provided for wired connection type.

1.6 CONCLUSION

In this chapter, the implementation of VPDN is roughly discussed based on the background

study, problem statement, objective, scope and limitation of work. At the end of this project, the

objectives of implementing Virtual Private Dial-up Network will be successfully developed and

tested.

Page 8: FINAL YEAR PROJECT PROPOSAL REPORT

8

LITERATURE REVIEW

2.1 INTRODUCTION

In this chapter, some research papers are reviewed and summarized. The researched

literature review is discussed in order to get a better knowledge about this project. As stated in

chapter 1, this project is practically based on the implementation of the VPDN on a PPP

connection.

2.2 OSI MODEL

Open System Interconnection (OSI) Reference Model is a logical and conceptual model

that defines network interconnection and communication with other system as well as to

implement protocols according to the seven layers. In the OSI model, each of the seven layers

relies to every next lower layer to perform the basic functions. As for this project focuses on the

layer 2, data link layer, where the tunneling protocols work. Basically, data link layer protocols

are responsible to simply manage the bits and bytes that are being transferred. It basically a set of

specification that are used for implementation of data link layer which is above of the physical

layer. There are various of protocols in data link layer such as Logical Link Control (LLC),

Synchronous Data Link Protocol (SDLC), High-Level Data Link Control (HDLC), Serial Line

Interface Protocol (SLIP), Link Control Protocol (LCP), Link Access Procedure (LAP), Network

Page 9: FINAL YEAR PROJECT PROPOSAL REPORT

9

Control Protocol (NCP) and Point-to-Point Protocol (PPP). The tunneling protocol is conducted

on the layer 2 data link layer where it creates a tunnel between two point on a network that can

securely transmit any kind of data between them.

Figure 1: OSI Layer

2.3 VIRTUAL PRIVATE DIAL-UP NETWORK

Virtual Private Dial-up Network (VPDN) is an extend of private dial-in services

to remote users. The point-to-point connection established between remote clients and a

private network by using the VPDN uses a Layer 2 tunneling technologies. VPDN

technology provides a cost-effective method for point-to-point connections between

remote users and a central network but still maintaining the same security and

management policies as a private network. VPDN uses any nearby access server which

usually located at an Internet Service Provider (ISP) local point of presence (POP)

Page 10: FINAL YEAR PROJECT PROPOSAL REPORT

10

instead of directly connecting to the remote private network. VPDN provide a cost-

effective method of communication between remote clients and private network by

securely carrying data from the access server to the private network over the internet.

A benefit of VPDN is that the way it assigns responsibilities to the network which

let user to only responsible for authenticating and maintaining their private network.

Users can outsource in dealing with the information infrastructure (IT) of an ISP that

maintain the modems to remote user’s dial in, accessing server and internetworking

expertise. VPDN works as a Point-to-Point Protocols (PPP) client dials in to an ISP

access server called Network Address Server (NAS). The NAS then will determine

whether it should forward the PPP session to the router or any access server that in

contact with the private network which is the tunnel server. The tunnel server

authenticates the user and initiates the PPP negotiation. Once the PPP setup completed,

all user’s frames that are sent between client and the tunnel server will be passed through

the NAS. These are the tunneling protocols that VPDN uses to transmit or tunnel link-

layer frames:

Layer 2 Tunneling Protocol (L2TP)

Layer 2 Tunneling Protocol Version 3 (L2TPv3)

Layer 2 Forwarding (L2F)

Point-to-Point Tunneling Protocol (PPTP)

These protocols are to be used in order to establish a tunnel between the NAS or client

and the tunnel server over a shared infrastructure such as the internet.

Page 11: FINAL YEAR PROJECT PROPOSAL REPORT

11

Figure 2: Basic VPDN network deployment.

There are three components that are generally involved in VPDN tunneling; two of it

functions as tunnel endpoint, where one device will be initiating the VPDN tunnel and the other

terminates the VPDN tunnel. Any type of devices can act as the local endpoint depending on the

tunneling architecture. The general terminology referring VPDN devices:

Client – client device can be the PC of a dial-in user, or a router attached to a local

network which it acts as a tunnel endpoint.

NAS – Network Access Server (NAS) is a device usually maintained by the ISP that

provides VPDN service to its customer where it is a local point of contract for the client

device. By establishing a connection between the NAS and the client will be known as

‘receiving a call’ or ‘placing a call’ depending whether a dial-in or dial-out scenario is

being discussed. Following the tunneling protocol, NAS functions as describes below:

o For NAS-initiated VPDN tunneling session and dial-out VPDN tunneling session,

NAS function as a tunnel endpoint. The NAS initiates dial-in VPDN tunnel and

terminates dial-out VPDN tunnel.

o For client-initiated VPDN tunneling session scenarios, NAS does not function as

a tunnel endpoint but it only provides Internet connectivity.

Page 12: FINAL YEAR PROJECT PROPOSAL REPORT

12

Tunnel server –The tunnel terminates dial-in VPDN tunnel and initiates dial-out VPDN

tunnel.

Tunnel switch – a device which is configured to perform multihop VPDN tunneling. A

tunneling switch acts as both a NAS and a tunnel server. Tunnel switch terminates

incoming VPDN tunnel and initiates the outgoing VPDN tunnels to carry data to the next

hop.

Generic Term L2F Term L2TP Term PPTP Term

NAS NAS L2TP Access

Concentrator (LAC)

PPTP Access

Concentrator (PAC)

Tunnel Server Home Gateway L2TP Network

Server (LNS)

PPTP Network

Server (PNS)

Table 1: VPDN Hardware Terminology

A VPDN tunnel exists between two tunnel endpoints and it consists of a control

connection and zero or more Layer 2 sessions which it functions is to carry encapsulated PPP

datagram and control messages between both endpoints. A VPDN session is created at the tunnel

endpoints when an end-to-end PPP connection established between a client and a tunnel server.

There, a one-to-one relationship between an established session and the associated call and

datagram that are related to the PPP connection are sent over the tunnel. Multiple VPDN

sessions can use a same VPDN tunnel.

Page 13: FINAL YEAR PROJECT PROPOSAL REPORT

13

Client-initiated dial-in VPDN Tunneling is also known as voluntary tunneling where

the client’s device initiates a Layer 2 tunnel to the tunnel server and NAS does not participate in

tunnel negotiation or establishment instead it only provides Internet connectivity. The client’s

device must be configured to initiate the tunnel. Main advantage of client-initiated VPDN

tunneling is that it secures the connection between the client and the ISP NAS but it is not

scalable and more complex. It can only use L2TP protocol or L2TPv3 protocol if the client’s

device is a router and only PPTP protocol supported if the device is a client’s PC.

Figure 3: Client-Initiated Dial-In VPDN scenario

NAS-initiated dial-in VPDN tunneling or compulsory tunneling, where the client dials-

in to the NAS through a medium that support PPP such as digital subscriber line (DSL), ISDN,

or the public switched telephone network (PSTN). If the medium used is considered secure, then

client can choose not to provide additional security. Then the client’s PPP session tunneled from

Page 14: FINAL YEAR PROJECT PROPOSAL REPORT

14

NAS to the tunnel server. Any knowledge or interaction from the client is not required. NAS-

initiated VPDN tunneling can be configured with L2TP of L2F protocol.

Figure 4: NAS-Initiated Dial-In VPDN scenario

Multihop VPDN tunneling allows packets to pass through multiple tunnels. Normally,

packets are not allowed to pass through more than one tunnel, but VPDN tunnel supports

multiple packet transmission as it will terminate the tunnel after each hop and a new tunnel is

initiated for the next hop where a maximum of four hops is supported. It is required when the

private network uses Multichassis Multilink PPP (MMP) with multiple tunnel server in a stack

group. Configuring a stack group requires capability in establishing Layer 2 tunnels between the

participating hardware devices. When an incoming data is delivered to the stack group over the

VPDN tunnel, multihop VPDN is required. Mutlihop VPDN tunneling with MMP is configured

using L2TP or L2F protocol.

Page 15: FINAL YEAR PROJECT PROPOSAL REPORT

15

Figure 5: MMP using Multihop VPDN

Multihop VPDN also can configure a router as a tunnel switch where it acts as both NAS

and tunnel server. A tunnel switch can receive packets and send it out using incoming and

outgoing VPDN tunnel. Tunnel switch also can be used between ISP to provide a wide-ranging

of VPDN services. Multihop tunnel switching is configured with L2TP, L2F or PPTP protocol.

Figure 6: Tunnel switching using Multihop VPDN

Page 16: FINAL YEAR PROJECT PROPOSAL REPORT

16

2.4 VPDN TUNNELING PROTOCOL (L2TP)

Tunneling is a technique where it enables remote access users to connect to a variety of

network resources such as Corporate Home Gateway or ISP through a public data network.

VPDN uses Layer 2 protocol to tunnel the link layer of high level protocols; for example, PPP

frames or asynchronous High-Level Data Link Control (HDLC). ISP configure NAS to forward

received calls from user to the customer tunnel server. The ISP usually keeps customer’s tunnel

server information while customer will keep maintaining the user’s IP address, routing and other

user database functions. Administration between the ISP and the tunnel server is reduced for the

IP connectivity.

Layer 2 Tunneling Protocol (L2TP) is a combination of the best two previous version

features of tunneling protocol; Cisco L2F and Microsoft PPTP. L2TP offers the same L2F

features with some additional functions where the tunnel server is capable to work with an

existing L2F NAS and will support upgraded components running the L2TP simultaneously. The

tunnel server did not require any reconfiguration whenever an individual NAS is upgraded from

L2F to L2TP. Here is a table shows the L2F and L2TP features comparison:

Function L2F L2TP

Flow Control No Yes

Attribute-value (AV) Pair

Hiding

No Yes

Tunnel Server Load Sharing Yes Yes

Page 17: FINAL YEAR PROJECT PROPOSAL REPORT

17

Tunnel Server

Stacking/Multihop Support

Yes Yes

Tunnel Server Primary and

Secondary Backup

Yes Yes

Domain Name system (DNS)

Name Support

Yes Yes

Domain Name Flexibility Yes Yes

Idle and Absolute Timeout Yes Yes

Multilink PPP Support Yes Yes

Multichassis Multilink PPP

Support

Yes Yes

Security All security benefits

of PPP including

multiple per-user

authentication

options:

o Challenge

Handshake

Authentication

Protocol

(CHAP)

All security benefits

of PPP including

multiple per-user

authentication

options:

o CHAP

o MS-CHAP

o PAP

Tunnel authentication

optional

Page 18: FINAL YEAR PROJECT PROPOSAL REPORT

18

o Microsoft

CHAP (MS-

CHAP)

o Password

Authentication

Protocol

(PAP)

Tunnel authentication

mandatory

Table 2: L2F and L2TP Features Comparison

Main drawback in a traditional dialup networking service is it only supports registered IP

addresses which it limits the type of applications while L2TP technologies supports multiple

protocols, unregistered and privately administered IP addresses. This allows existing access

infrastructure like the Internet, modems, access servers, and ISDN terminal adapter (TA) to be

used. It reduces the overhead for hardware maintenance cost and 800 number fees, and allows

them to concentrate corporate gateway resources by allowing customers to outsource dial-out

support.

Page 19: FINAL YEAR PROJECT PROPOSAL REPORT

19

Figure 7: L2TP basic architecture in a typical dial-in environment

By using L2TP tunneling protocol, an ISP or any other access service can create a virtual

tunnel to link remote sites or remote users with corporate home networks. The NAS which is

located at the POP of the ISP exchanges PPP messages with remote users and communicate by

L2TP requests and responses with the private network tunnel server to set up the tunnels. L2TP

passes protocol-level packets through the virtual tunnel between endpoints of the point-to-point

communication. Frames from remote users are received by ISP NAS, removed from any linked

framing or transparency bytes, encapsulated in L2TP, and forwarded over the appropriate tunnel.

The private network tunnel server accepts the L2TP frames, eliminates the L2TP encapsulation,

and process the incoming frames for the appropriate interface.

Page 20: FINAL YEAR PROJECT PROPOSAL REPORT

20

Figure 8: L2TP Protocol Negotiation events

The following describes the sequence of events shown in the Figure 8 and is referred to the

figure:

1. Firstly, the remote user initiates a PPP connection to the ISP NAS using any medium that

supports PPP such as the analog telephone system. Then, NAS accepts the connection

and the PPP link is established. The Link Control Protocol (LCP) is negotiated.

2. After LCP done with negotiation, the NAS partially authenticates the end user with

CHAP or PAP. The username, domain name, or Dialed Number Information Service

(DNIS) is used to determine whether the user is a VPDN client or not. If the user is not a

VPDN client, the authentication continues, and the client will have access to the Internet

Page 21: FINAL YEAR PROJECT PROPOSAL REPORT

21

or other contacted service. However, if the user is a VPDN client, the mapping will name

a specific endpoint (the tunnel server).

3. The tunnel endpoints which is the NAS and the tunnel server, needs to authenticate each

other before any tunnel or session establishment attempted. Alternatively, the tunnel

server can accept tunnel creation without any NAS tunnel authentication. The negotiation

of tunnel establishment is done by exchanging control message between NAS and the

tunnel server.

4. An L2TP session is created for the end user as soon as the tunnel existed. The NAS and

the tunnel server exchange call messages once again to negotiate session establishment.

5. The NAS will reproduce the negotiated LCP options and the partially authenticated

CHAP or PAP information to the tunnel server. The tunnel server will manage the

negotiated options and authentication information directly to allow the authentication to

be completed. If the options configured mismatch the options negotiated, the connection

will fail and NAS will be notified.

6. Then the PPP packets exchanged between the dial-in client and the remote tunnel server

without any intermediary device involved.

The L2TP tunnel negotiation do not need to be redone for the next PPP incoming sessions,

because there is already an opened L2TP tunnel.

Page 22: FINAL YEAR PROJECT PROPOSAL REPORT

22

2.5 RELATED WORK

Authors / Year Title Objective Ps Method Result

Mooi

Choo

Chuah

Enrique J.

Hernande

z-Valencia

(2020)

Mobile

Virtual

Private Dial-

Up Services

To describe

and compare

different

solutions

that extend

the wired

VPDN service

model over

various

wireless

network.

Growth of

dial-up

service is

motivated in

by increasing

network

access

demand

from

professional

s and casual

users

wishing to

keep abreast

of an ever-

expending

global world

information.

Fueled with

competition

in the

market and

keen to keep

workforce

constantly in

touch with

corporate

resource

anywhere.

Expected to

support dial-

up users

with varying

degrees of

technical

ability and

Use five

alternatives :

i. Mobile IP

and IPSec

ii. Hierarchic

al

Registratio

n

iii. Voluntary

Tunneling

iv. Mobile

L2TP

v. Multiple-

Hop L2TP

PPP-based solution

Alternatives

compared in

terms of features,

cost, standards,

and time to

market. PPP-

based solutions

seem more

attractive. The

software

enhancement

needed to

support mobility

in these solutions

is minimal.

Currently, most of

these procedures

do not support

QoS

Page 23: FINAL YEAR PROJECT PROPOSAL REPORT

23

network

equipment.

Jian Shen

Shoulian

Tang

Yonggang

Wang

(2011)

Research on

the

Technology

of Virtual

Data Private

Network

Based on 3G

Network

Illustrated

two different

modes of

access and

provide a

new mode

access by

comparing

them which

expected can

enhance the

operating

efficiency

and security

of the virtual

data private

network.

The demand

for remote

data

transmission

and remote

login arise

during

recent years.

However

traditional

problems

fixing

network

mode such

as wiring

difficulties,

long

implementat

ion cycle and

high cost.

With 3G

service, it is

expected to

be in

wireless

method but

this

concerned

with low

security,

reliability

and speed.

VPDN based 3G

refers to process

3G user dialing

number to access

private network,

transmit private

data through

packet and

encryption of net

data, reaching

private network

security class, so

as to build a virtual

enterprise internal

data network

through fixed

network and

mobile network

Structure divided

into3 part; A, B

and C.

A- Core

transmissi

on zone

to provide

data

routing.

B- Enterprise

access

zone,

provide

dedicated

access

C- Access

managem

ent

platform.

Provide

trusteeshi

p

authentic

ation

service

and

managem

ent

service.

Active firewall for

security.

Americas

Headquar

ters

Cisco

System

(2018)

VPDN

Configuratio

n Guide

Understandi

ng VPDN

concept,

implementati

on,

configuration

,

Page 24: FINAL YEAR PROJECT PROPOSAL REPORT

24

components,

structure and

expected

result

Chetan S.

More

Aman

Anand

Kushagra

Razaada

Manuj

Srivastava

(2018)

Client Server

Synergy

using VPN

Introducing

VPN and

visualizing

the

structure,

protocols,

and

technologies

for easier

way to

decide the

best solution

for different

parts of the

enterprise

infrastructur

e which best

meets the

requirement.

VPN allows

users to

send and

receive data

across

shared

public

network as if

they were

directly

connected

to the

private

network.

The VPN

services is

fully

dedicated to

the small

and medium

size

companies.

It can be

categorized

as Secure or

Trusted

VPNs, Client-

based or

Web-based

VPNs,

Customer

Edge-based

or Provider

Edge-based

VPNs, or

Outsourced

or In-house

Protocols used in

VPN :

PPTP

L2TP

IPSec

SOCKS

VPN Technologies:

Tunneling

(encapsula

tion)

Authentica

tion

Access

Control

Data

Security

Advantage :

Cost

saving

and

scalability

Eliminate

the

expensive

need of

long-

distance

leased

lines

Public

network

tunneling

into a

private

connectio

n.

Encrypted

Low cost

to

implemen

t

Disadvantages:

Slow and

bad

hardware

Require

good

knowledg

e of

network

security

issues

Page 25: FINAL YEAR PROJECT PROPOSAL REPORT

25

VPNs. These

categories

often

overlap each

other.

Stability

depend

on

internet

scalability

Differing

technolog

y may not

work

together

Wanghui

Li

Ganghua

Bai

(2018)

Internet of

Things

System

Based on

Mobile

Communicat

ion Network

To study of

ways in

successfully

establish a

standard and

unified IOT

system based

on a specific

scheme

(bandwidth,

QoS and

congestion

control

based layer is

proposed).

Internet

technology

has

developed

and

penetrated

into all

aspects of

social life

and

production.

However,

people's

understandi

ng of the IoT

is not

enough, and

the market

has not fully

accepted. A

variety of

IoT

applications

developed

but most of

these

applications

have died

soon after

the launch

because of

The application

model of the IoT is

studied, including

video monitoring,

data collection and

transmission,

intelligent

identification, and

urgent monitoring.

Connectivity, QoS,

and bandwidth are

discussed and

analyzed. VPDN

data special

network platform

is constructed,

tunnel technology

is applied in actual

operation process,

appropriate access

methods are

chosen in

combination with

reality, and a

reasonable plan is

proposed to

ensure the security

of the

implementation

scheme.

With VPDN, the

IoT system is

constructed and a

reasonable

planning scheme

is proposed. The

actual application

situation of the

system is studied,

the characteristics

of the system are

clearly defined,

and the

congestion

control algorithm

is chosen in the

actual operation

process. However,

the algorithm is

only implemented

in the application

layer and in terms

of theory, the

bandwidth

resources can be

saved by 50%.

Page 26: FINAL YEAR PROJECT PROPOSAL REPORT

26

the lack of

system

standards,

lack of unity,

poor

compatibility

and low

scalability at

the present

stage

Page 27: FINAL YEAR PROJECT PROPOSAL REPORT

27

Authors /

Year Title Objective Ps Method Result

Seyed

Rashidaldin

Hassani

(2010)

QoS

managemen

t in DSL

services of

an ISP in Iran

Focus on

implementi

ng QoS for

DSL

subscribers

for Pardis

Online

(private ISP

in Iran).

Aims to

increase

customer

satisfaction

and

facilitate

network

maintenanc

e and

provisioning

by applying

QoS on the

network

The internet

bandwidth in the

region that ISP

operates is very

expensive and

the users suffer

from the lack of

bandwidth so

the limited

internet links are

usually

congested in the

network.

i. Where

should

traffic

initially

be

marked,

or

classified

, and

which

devices

would do

the

marking?

ii. Different

network

devices

have

different

traffic

manage

ment

capabiliti

es; a way

was

required

1. QoS for

manage

ment

traffic in

backbon

e

2. Qos for

manage

ment

traffic in

province

networks

3. QoS to

home

The test

scenarios was

able to

demonstrate

the efficiency of

the chosen QoS

mechanisms in

POL backbone

and access

networks.

Page 28: FINAL YEAR PROJECT PROPOSAL REPORT

28

to

impleme

nt a

common

packet

marking

strategy

to

overcom

e these

differenc

es.

iii. It must

be

decided

about

how to

map

markings

between

OSI Layer

2 (Data

Link) and

Layer 3

(Networ

k) levels,

when

traffic is

handed

off

between

the LAN

and the

WAN.

Sun Fei

Song

Jun-

yuan

CDMA

VPDN-based

Wireless

Data

Communicat

ion System

for Mobile

To prove the

system

establishes

safe and

reliable real-

time

communicat

Based on the

characteristics

such as varied

topography; the

region it extends,

long distance

between

Compare VPDN

L2TP and VPN

IPSec

The pipeline

patrol system

based on the

private network

of CDMA VPDN

has complete

functions with

Page 29: FINAL YEAR PROJECT PROPOSAL REPORT

29

Xu Jun-

xia

(2013)

Pipeline

Patrol

ion and

achieves

desired

effects and

smooth

high-

efficient

upstream &

downstream

data

transmission

. It is of

significance

to improve

patrol

efficiency

and quality

and to

guarantee

oil

transportati

on security

of the

pipeline.

stations, large

volume of data

transmitted and

high

requirement for

security and

relying on the

private network

of Telecom

CDMA VPDN

convenient, safe

and reliable

operation and

smooth high-

efficient

upstream and

downstream

information

transmission. It

can improve the

working

efficiency of the

pipeline

patrollers and

the patrol

quality and

guarantees

reliable

operation of the

pipeline system.

Dwi Ely

Kurniaw

an

Hamdan

i Arif

N

Nelmia

wati

Ahmad

Hamim

Tohari

Implementat

ion and

analysis

ipsec-vpn on

cisco asa

firewall

using gns3

network

simulator

Builds a

private

network

that

provides

quality and

security in

accessing

the Internet.

The entire

set of

systems

were built in

a virtual and

simulated

manner.

Internet lacks of

security

guarantee in

terms of

information

exchange. Due to

security reasons,

data

confidentiality,

integrity and

availability are

important factor

that needs to be

considered.

Topology design

used in two

types; general

topology and

network

topology in

GNS3.

Tracero

ute test:

connect

ion

through

the first

hop

before

heading

to the

gateway

Delay

test:

VPN

provide

better

network

Page 30: FINAL YEAR PROJECT PROPOSAL REPORT

30

Maidel

Fani

(2019)

quality

than

non-

VPN

network

Round

trip

time

(RTT):

non-

VPN

network

is better

Packet

lost:

both

VPN

and

non-

VPN

have

good

connect

ivity

Bandwi

dth:

non-

VPN

amount

s is

larger

but VPN

is

faster.

(factors

of

firewall)

Denial

os

service

(DoS):

Page 31: FINAL YEAR PROJECT PROPOSAL REPORT

31

still

vulnera

ble to

attack

Man in

the

middle

(MITM):

VPN

cannot

be

taped

by

attacker

Page 32: FINAL YEAR PROJECT PROPOSAL REPORT

32

2.6 CONCLUSION

As for the conclusion, this chapter discuss about the research of past studied project of

the implementation of VPDN. This study focuses on the data saving for transmission using a

Virtual Private Dial-up Network. Thus this project has been chosen to implement VPDN for data

saving.

Page 33: FINAL YEAR PROJECT PROPOSAL REPORT

33

METHODOLOGY

3.1 INTRODUCTION

In this chapter, methodology, framework and flowchart will be discussed to get a better

view and understanding of this project. This chapter is important in developing a project as it is

crucial to be used as the guidelines for the implementation part which is the next chapter.

3.2 RESEARCH OF METHODOLOGY

Using research methodology for the method of developing this project, the early

preparation of planning and scheduling of the project is a very important phase. Based on the

figure below, there are phases mentioned that needed to be followed in order to develop this

project. The first phase is to identifying the problems regarding the research. For this project, the

problem identified is in term of saving data usage when establishing a point-to-point

communication as mention in the problem statement stated in the Chapter 1. The second phase is

designing and developing. The main purpose of this phase is to find a suitable method to be

implemented in this project. As for this project, L2TP tunneling protocol is used to implement

the VPDN Point-to-Point communication. The next phase is the simulation of the project where

the Cisco Packet Tracer as simulation tools that will be used to conduct the simulation of this

Page 34: FINAL YEAR PROJECT PROPOSAL REPORT

34

project. For the last phase is performance metrics where the outcome of the simulation is

analyzed and evaluated.

Figure 9: Research Methodology

Page 35: FINAL YEAR PROJECT PROPOSAL REPORT

35

3.3 FRAMEWORK

Figure 10: Framework of VPDN in Cisco

3.4 FLOWCHART

Configuring a VPDN in a Cisco Packet Tracer using L2TP Tunneling protocol have 3

types of method of establishing a VPDN tunneling which is:

NAS-initiated Dial-in VPDN tunneling

Client-initiated Dial-in VPDN tunneling

Multihop VPDN tunneling

In this project, NAS-initiated and Client-initiated will be implemented and compared the result

for both types.

Page 36: FINAL YEAR PROJECT PROPOSAL REPORT

36

Figure 11: Flowchart of VPDN L2TP Tunneling Protocol

Page 37: FINAL YEAR PROJECT PROPOSAL REPORT

37

3.5 SIMULATION

Figure 12: Cisco Packet Tracer

The simulation tool for this project is Cisco Packet Tracer. In order to properly configure

and test it on the real-time environment, it might consume a lot of time and practices. Instead,

with Cisco Packet Tracer allows to simulate the L2TP tunneling protocol in configuring the

VPDN for this project which it also provide a user guide in order to help user understand every

step taken during conducting this simulation. Cisco Packet Tracer provides multiple

opportunities in demonstrating network concepts. Although Packet Tracer is not a substitute for

the real equipment, it lets users especially students to practice using a command-line interface,

learning the fundamental component of how to configure routers and switches. Packet Tracer

also help simplifying the learning process by providing tables, diagrams, and other visual

representations of internal functions such as dynamic data transfers and packet content

expansion.

Page 38: FINAL YEAR PROJECT PROPOSAL REPORT

38

3.6 CONCLUSION

This chapter focused about the methodology used in order to conduct this project. The

flow of the project is visualize using the flowchart and framework which it provides better

understanding for the implementation using the simulator chosen for this project.

Page 39: FINAL YEAR PROJECT PROPOSAL REPORT

39

REFERENCES

Chuah, M. C., & Hernandez-Valencia, E. J. (2002). Mobile virtual private dial-up

services. Bell Labs Technical Journal, 4(3), 51–72. https://doi.org/10.1002/bltj.2179

Headquarters, A. (n.d.). VPDN Configuration Guide. Retrieved January 27, 2021, from

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/vpdn/configuration/xe-16/vpd-xe-16-

book.pdf

VPDN(L2TP,PPTP,PPPoE) Configuration. (n.d.). Retrieved January 27, 2021, from

https://www.energitel.com/wp-content/uploads/2019/04/10-VPDNL2TPPPTPPPPOE-

Configuration.pdf

Understanding VPDN. (2017, May). Cisco.

https://www.cisco.com/c/en/us/support/docs/dial-access/virtual-private-dialup-network-

vpdn/20980-vpdn-20980.html

Shen, J., Tang, S., & Wang, Y. (2011). Research on the Technology of Virtual Data

Private Network Based on 3G Network. Communications in Computer and Information

Science, 275–281. https://doi.org/10.1007/978-3-642-23223-7_35

Sun, F., Song, J., & Xu, J. (2013). CDMA VPDN-based Wireless Data Communication

System for Mobile Pipeline Patrol. Proceedings of the 2nd International Symposium on

Computer, Communication, Control and Automation.

https://doi.org/10.2991/isccca.2013.62

Ely Kurniawan, D., Arif, H., Nelmiawati, N., Hamim Tohari, A., & Fani, M. (2019).

Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network

simulator. Journal of Physics: Conference Series, 1175, 012031.

https://doi.org/10.1088/1742-6596/1175/1/012031

Administrator. (2021, January 28). Configuring PPTP (VPDN) Server On A Cisco

Router. Firewall.cx. http://www.firewall.cx/cisco-technical-knowledgebase/cisco-

routers/329-cisco-router-pptp-server.html

Page 40: FINAL YEAR PROJECT PROPOSAL REPORT

40

Administrator. (2021, January 28). How To Configure Windows VPDN (PPTP) Dialup

Connection. Firewall.cx. http://www.firewall.cx/cisco-technical-knowledgebase/cisco-

routers/330-cisco-router-win-pptp.html

HASSANI, SEYED RASHIDALDIN. (2021). QoS management in DSL services of an

ISP in Iran. DIVA. http://www.diva-

portal.org/smash/record.jsf?pid=diva2%3A349542&dswid=-8961

Li, W., & Ganghua Bai. (2018, November 10). Internet of Things System Based on

Mobile Communication Network. ResearchGate; Kassel University Press.

https://www.researchgate.net/publication/328859696_Internet_of_Things_System_Based

_on_Mobile_Communication_Network

Kushagra Raizada, Aman Anand, & Manuj Srivastava. (2021). Client Server Synergy

using VPN. International Journal for Scientific Research and Development, 5(11), 166–

169. http://ijsrd.com/Article.php?manuscript=IJSRDV5I110127