1.2
Research Questions
The project will investigate the following research questions:
Research Questions
RQ1
What architectures are suitable for implementing virtual VPN?
RQ2
What are the various methods used for key distributions in enabling the
security of the network?
RQ3
How to design an IPSec based VPN solution in an virtualized
environment?
RQ4
What are the performance impacts on the operation of the VPN in cloud?
1.3
Research Contribution
The thesis focuses on establishing a Linux-based virtualized environment
facilitating communication between the VMs running in a cloud. An important part of this
project was the configuration and implementation of an open source IPSec VPN solution
using
strongSwan.
In addition, a detailed study was conducted on the various architectural
choices for building a VPN such as site-to-site, host-to-host and remote access VPNs,
Various key distribution mechanisms for enhanced security through are discussed with
emphasis on specific features. Performance metrics like throughput, jitter and packets loss
for TCP and UDP packets are analyzed and implications are briefed. There is an also an
investigation of the overheads related to tunneled as well as non-tunneled traffic.
Conclusions are drawn based on the results analyzed and scope for future study is also
mentioned.
1.4
Document Outline
Chapter 2 emphasizes on the background study undertaken to substantiate valid research in
this paper
.
Analyses of various VPN software packages for different operating systems such
as Windows and Fedora, IPSec VPN performance analyses relating to different metrics are
4
studied concisely.
Various overheads introduced due to specific encryption algorithms have
also been reviewed.
Chapter 3 deals with the functionalities and operation of IPSec VPNs enhancing IKE ESP
characteristics, various security enhancing key distribution techniques including Pre-shared
keys and comparative analysis on different VPN architectures.
Chapter 4 gives an overview of the experimental set-up and configuration details are
recorded. The requirements to offer VPN as a VNF have also been mentioned.
Chapter 5 concentrates on the measurements performed by analyzing different encryption
algorithms for tunneled and non-tunneled traffic graphically illustrating them. VM
provisioning time, VM Failure Ratio and VPN service start up time have also been measured
to gain insight into the speed and reliability of resource allocation.
Chapter 6 emphasizes on analysis of the recorded results. It explains in detail the reasons for
throughput and jitter performance among TCP and UDP packets across tunneled and non-
tunneled traffic.
Chapter 7 concludes with various scientific deductions, answers the research questions and
also provides scope for future work.
5
Do'stlaringiz bilan baham: |