Skip to main content
Log in

A network-based VPN architecture using virtual routing

  • Security of Network and Communication
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A network-based Virtual Private Network (VPN) architecture by using fundamental routing mechanism is proposed. This network is a virtual overlay network based on the relay of IP-in-IP tunneling of virtual routing modules. The packet format employs the encapsulation of IPSec ESP (Encapsulating Security Payload), an impact path code and an extended DS (Differentiated Services) code to support multi-path routing and QoS. Comparing with other models of VPN, this network system can be deployed in the current network with little investment, and it is easy to implement. The simulation result shows its performance is better than the traditional VPN system of black box mode.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Dierks T, Allen C. The TLS Protocol Version 1. 0, IETF REFC2246.http://www.ietf.org, Jan 1999.

  2. Kent S, Atkinson S. IP Encapsulation Security Payload (ESP), IETF RFC2406.http://www.ietf.org, Nov 1998.

  3. Duan Hai-xin, Wu Jian-ping. An Entity Security Architecture for Computer Networks.Chinese Journal of Computer, 2001,24(8):853–859 (Ch).

    Google Scholar 

  4. Boswell A. Specification and Validation of A Security Policy Model.IEEE Transactions on Software Engineering, 1995,21(2):63–68.

    Article  Google Scholar 

  5. Rosen E, Rekhter Y. BGP/MPLS VPNs, IETF RFC2547.http://www.ietf.org, March 1999.

  6. Rao N S V, Radhakrishnan S, Cheol B Y. NetLets: Measurement-Based Routing Daemons for Low End-to-End Delays over Networks.Computer Communications, 2003,26(8): 834–844.

    Article  Google Scholar 

  7. Touch J. Dynamic Internet Overlay Deployment and Management Using the X-Bone.Computer Networks, 2001,36 (2–3):117–135.

    Article  Google Scholar 

  8. Kalyanaraman H T. BANANAS: An Evolutionary Framework for Explicit and Multi-Path Routing in the Internet.Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture. New York: ACM Press, 2003, 277.

    Google Scholar 

  9. Eppstein D. Finding thek Shortest Paths.SIAM J Computing, 1998,28(2): 652–673.

    Article  MATH  MathSciNet  Google Scholar 

  10. Stoica I, Zhang H. LIRA: An Approach for Service Differentiation in the Internet.Proceedings of NOSSDAV' 98 Cambridge, London: IEEE Computer Society Press, 1998. 115.

    Google Scholar 

  11. Pippas J B, Venieris I S. Applying Delay Random Early Detection to IP Gateways.Computer Communications, 2001,24 (14):1370–1379.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Han-ping.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90104029)

Biography: ZHANG Bao-liang (1969-), male, Ph. D candldate, research direction: network security, processing of intelligent information, network architecture.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bao-liang, Z., Han-ping, H., Xiao-gang, W. et al. A network-based VPN architecture using virtual routing. Wuhan Univ. J. Nat. Sci. 10, 161–164 (2005). https://doi.org/10.1007/BF02828640

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828640

Key words

CLC number

Navigation