Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the lat...
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://ir.uitm.edu.my/id/eprint/27719/ http://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf |
Summary: | The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the latest P2P technology involves "many to one" model which predominantly exists in BitTorrent and its clones. This has been a very innovative approach. Meanwhile in 2001 Streamyx began to bring broadband to Malaysia. This quickly attracted many waiting users which gradually boost up its one millionth subscribers around 2007. However sometimes in 2006 Streamyx began to impose packet filtering without notice in trend with most world ISPs. During that time most users began to express their grouse. The issue has been also vigorously highlighted by a couple of local press. Meanwhile the ISP alleges that the international lines are at fault which coincidentally coincides with the Taiwan earthquake in 2006 and another incident of cable fault in Middle East in 2008. However according to Cisco Systems the issue of slow internet connection to end user which deprived its user to enjoy its prescribed capacity as promised is not an issue unless ISP has abide to the procedure of good network infrastructure. Apparently for ISP to impose packet filtering there are various methods available. Currently the Deep Packet Inspection (DPI) method is the most advanced option up-to date to prevent rampant P2P activities. Realizing the method used many P2P authors began to include an encrypted technology in their products. However it has not given much effect to counter DPI. Hence with the issue of limited capacity to broadband service for end user this paper is undertaking a task to address it. After much thought one of the most promising technology in focus is Virtual Private Network (VPN). This technology has been mainly adopted by most corporate users and has the capability of a powerful encrypted traffic and secured network environment. Thus this paper is basically to show that by leveraging on the strength of VPN the end user has now an option to circumvent and address the stated issue indefinitely. In this context there are two VPN options available. They are the Propriety and an Open Source VPN. However to keep the cost Iowan Open Source VPN plus a couple of other software are implemented. The result is shown in this paper with success to benefit the end users in general. |
---|