Leveraging an open VPN technology to end user / Md Ikhwan Hamdan

The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the lat...

Full description

Bibliographic Details
Main Author: Hamdan, Md Ikhwan
Format: Thesis
Language:English
Published: 2010
Subjects:
Online Access:http://ir.uitm.edu.my/id/eprint/27719/
http://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf
id uitm-27719
recordtype eprints
spelling uitm-277192020-02-05T07:51:58Z http://ir.uitm.edu.my/id/eprint/27719/ Leveraging an open VPN technology to end user / Md Ikhwan Hamdan Hamdan, Md Ikhwan Electronic computers. Computer science Programming. Rule-based programming. Backtrack programming The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the latest P2P technology involves "many to one" model which predominantly exists in BitTorrent and its clones. This has been a very innovative approach. Meanwhile in 2001 Streamyx began to bring broadband to Malaysia. This quickly attracted many waiting users which gradually boost up its one millionth subscribers around 2007. However sometimes in 2006 Streamyx began to impose packet filtering without notice in trend with most world ISPs. During that time most users began to express their grouse. The issue has been also vigorously highlighted by a couple of local press. Meanwhile the ISP alleges that the international lines are at fault which coincidentally coincides with the Taiwan earthquake in 2006 and another incident of cable fault in Middle East in 2008. However according to Cisco Systems the issue of slow internet connection to end user which deprived its user to enjoy its prescribed capacity as promised is not an issue unless ISP has abide to the procedure of good network infrastructure. Apparently for ISP to impose packet filtering there are various methods available. Currently the Deep Packet Inspection (DPI) method is the most advanced option up-to date to prevent rampant P2P activities. Realizing the method used many P2P authors began to include an encrypted technology in their products. However it has not given much effect to counter DPI. Hence with the issue of limited capacity to broadband service for end user this paper is undertaking a task to address it. After much thought one of the most promising technology in focus is Virtual Private Network (VPN). This technology has been mainly adopted by most corporate users and has the capability of a powerful encrypted traffic and secured network environment. Thus this paper is basically to show that by leveraging on the strength of VPN the end user has now an option to circumvent and address the stated issue indefinitely. In this context there are two VPN options available. They are the Propriety and an Open Source VPN. However to keep the cost Iowan Open Source VPN plus a couple of other software are implemented. The result is shown in this paper with success to benefit the end users in general. 2010 Thesis NonPeerReviewed text en http://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf Hamdan, Md Ikhwan (2010) Leveraging an open VPN technology to end user / Md Ikhwan Hamdan. Masters thesis, Universiti Teknologi MARA.
repository_type Digital Repository
institution_category Local University
institution Universiti Teknologi MARA
building UiTM Institutional Repository
collection Online Access
language English
topic Electronic computers. Computer science
Programming. Rule-based programming. Backtrack programming
spellingShingle Electronic computers. Computer science
Programming. Rule-based programming. Backtrack programming
Hamdan, Md Ikhwan
Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
description The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the latest P2P technology involves "many to one" model which predominantly exists in BitTorrent and its clones. This has been a very innovative approach. Meanwhile in 2001 Streamyx began to bring broadband to Malaysia. This quickly attracted many waiting users which gradually boost up its one millionth subscribers around 2007. However sometimes in 2006 Streamyx began to impose packet filtering without notice in trend with most world ISPs. During that time most users began to express their grouse. The issue has been also vigorously highlighted by a couple of local press. Meanwhile the ISP alleges that the international lines are at fault which coincidentally coincides with the Taiwan earthquake in 2006 and another incident of cable fault in Middle East in 2008. However according to Cisco Systems the issue of slow internet connection to end user which deprived its user to enjoy its prescribed capacity as promised is not an issue unless ISP has abide to the procedure of good network infrastructure. Apparently for ISP to impose packet filtering there are various methods available. Currently the Deep Packet Inspection (DPI) method is the most advanced option up-to date to prevent rampant P2P activities. Realizing the method used many P2P authors began to include an encrypted technology in their products. However it has not given much effect to counter DPI. Hence with the issue of limited capacity to broadband service for end user this paper is undertaking a task to address it. After much thought one of the most promising technology in focus is Virtual Private Network (VPN). This technology has been mainly adopted by most corporate users and has the capability of a powerful encrypted traffic and secured network environment. Thus this paper is basically to show that by leveraging on the strength of VPN the end user has now an option to circumvent and address the stated issue indefinitely. In this context there are two VPN options available. They are the Propriety and an Open Source VPN. However to keep the cost Iowan Open Source VPN plus a couple of other software are implemented. The result is shown in this paper with success to benefit the end users in general.
format Thesis
author Hamdan, Md Ikhwan
author_facet Hamdan, Md Ikhwan
author_sort Hamdan, Md Ikhwan
title Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_short Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_full Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_fullStr Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_full_unstemmed Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_sort leveraging an open vpn technology to end user / md ikhwan hamdan
publishDate 2010
url http://ir.uitm.edu.my/id/eprint/27719/
http://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf
first_indexed 2023-09-18T23:18:53Z
last_indexed 2023-09-18T23:18:53Z
_version_ 1777419297975435264