
76
Open
Admin User
Mallika Sharma, Jenith Shrestha, Jeetendra Manandhar (Supervisor)
Kathmandu: St. Xavier's College
October 2013
Thesis or project
Computer science
BscCSIT, CSC-404: Project work
Bachelor
2009
This report is about the project of final year. It includes details about the designing
and the implementation of VPN. Since the last projects were to show the overall
knowledge that we have gained during the course period. This project will provide an
introduction, research, theory, analysis, solutions & real time implementation and
idy of Virtual Private Network for Nepal Electricity Authority. It also will provide
tructure of content of this document. It consists, of various concepts, theories and
main terminology to understand and implement a Virtual Private Network.
Virtual private network (VPN) is a private data network that makes use of the
lie telecommunication infrastructure, maintaining privacy through die use of a
leling protocol and security procedures. A virtual private network can be
contrasted with a system of owned or leased lines that can only be used by one
company. The main purpose of a VPN is to give the company the same capabilities
as private leased lines at much lower cost by using the shared public Infrastructure.
Phone companies have provided private shared resources for voice messages for over
a decade. A virtual private network makes it possible to have the same protected
sharing of public resources for data.
The aim is to explain the problems, to identify standardization gaps and to provide
solutions whenever possible. It provides a description and proposes solutions related
to the following items:
• Identification and authentication of the VPN components;
• Identification and authentication of remote (e.g. mobile) users;
• Public Key infrastructure for VPN components;
• Security and key distribution of multicast within VPN;
• Inter-working of IPSec with tunneling protocols.
The Virtual Private Network (VPN) has emerged as one of most promising services
for network providers. However the widespread deployment of IP VPNs has been
delayed by the lack of interoperable implementations and confusion over the high
number of solutions that are described by the term VPN.