Open Access Open Access  Restricted Access Subscription or Fee Access

An Optimized and Secured VPN with Web Service

A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan


A Virtual Private Network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure such as the internet or service provider backbone. VPNs are provisioned using technologies such as Frame Relay and Asynchronous Transfer Mode (ATM) and virtual circuits have been available for a long time, but over the past few years IP and Multi Protocol Label Switching (MPLS) based VPNs have become more and more popular. A VPN is a cheap source of tunneling, encryption, authentication, and access control technologies and services used to carry traffic over the internet or a managed IP network, or a providers backbone. In VPN technologies, a tunnel allows streams of data and associated user information to be transmitted over a shared network within a virtual pipe model. This pipe model makes the routed network totally transparent to users. In the pipe model it is necessary to calculate traffic matrix.

An another model called hose model, in which there is no need for a complete traffic matrix. But only the total amount of traffic which a node exerts into the network and the total amount of traffic which it receives from the network need to be specified in the model.

The main contribution of this paper is that blocking probability is compared for different over provisioning factors. Blocking probability is a measure of network performance. Apart from these, security and web services are indispensable factors involved in this work.



Full Text:



Andrew S. Tanenbaum, “Computer Networks”, 4th Edition, Prentice Hall, 2003.

Carmouche, ”IPSec Virtual Private Network Fundamentals”, Cisco Press, 2007.

Easttom, “Computer Security Fundamentals”, Prentice Hall, Copyright: 2005.

Erwin, Scott, and Wolfe, “Virtual Private Networks”, 2nd Edition, O’ Reilly and Associates Inc, 1999.

Andrew Do-sung Jun and Alberto Leon-Garcia, “Virtual Network Resources management: A divide-and-conquer approach for the control of future networks”, IEEE Global Telecommunications Conference (GLOBECOM 98), Sydney, Australia, 1998.

Aoyama, Tokizawa and K. Sato, “VP-based VPN services”, 1993.

Bruce, “Critical VPN security analysis and new approach for securing Voice over Internet Protocol communications over VPN networks”, Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling Pages 92-96, 2005.

Carpenter, J.Crowcroft and Y. Rekhter, “IPv4 Address Behaviour Today”, Network Working Group, 1997.

Chan, H. Hadama and R. Stadler, “An architecture for broadband virtual networks under customer control”, Network Operations and Management Symposium, IEEE: 15-19 Apr 1996 Page(s): 135 - 144 vol.1, 1996.

Checkpoint software technologies Ltd, “IP Sec Versus Clientless VPNs for Remote Access”, Sep. 2002.

Chen, “An Analysis of the Driving Forces for the Adoption of Web Service”, e-biz Web-workshop, pp. 173-184, 2003.

D. Kosiur, “Building and Managing Virtual Private Networks” John wiley and Sons Inc, ISBN 0-471-29526-4, 1998.

Davie and Y. Rekhter, “Encapsulating MPLS in IP or Generic Routing Encapsulation (GRE)”, Cisco Systems, Inc. March 2005.

Duffield and Goyal, “A flexible model for resource management in virtual private networks”, SIGCOMM '99 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication Pages 95-108 ACM New York, NY, USA, 1999.

E. Newcomer, “Understanding web services: XML, WSDL, SOAP and UDDI”, Addison Wesley Professional”, ISBN 0201-075081-3, 2002.

Erik Christensen, “W3C Standard Web Services Definition Language (WSDL)”, IBM Research, Microsoft, 2001.

Ford, “A Shortest Path Processor for Traffic Engineering of VPN Services”, PERIODICA POLITECHNICA, Transactions on AUTOMATIC CONTROL and COMPUTER SCIENCE Vol.49 (63), 2004, ISSN 1224-600X, 2004.

Fotedar, M. Gerla, P. Crocetti and L. Fratta, ”ATM virtual private networks”, Communications of the Volume 38 Issue 2, Pages 101 – 109, Feb. 1995.

Giuseppe F. Italiano, “Restoration algorithms for virtual private networks in the hose model”, INFOCOM 2002. IEEE Volume: 1 Page(s): 131 - 139 vol.1, 2002.

Gupta, A. Kumar, “Provisioning a virtual private network: a network design problem for multicommodity flow”, Published in: Proceeding STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing Pages 389 – 398, 2001.

J. Barrett, “ A Response to the Feature on IPv6 vs SSL”, Root Prompt Organization, 2000.

Jacobson and S. McCanne, “The BSD packet filter: A new architecture for user-level packet capture”, in Proc. Winter '93 USENIX Conference January 1993.

Khuller and R. Thurimella, “Dynamic SLA-based management of virtual private networks”, 1993.

Kosiur, “Method for blocking denial of service and address spoofing attacks on a private network”, Cisco technology inc., March 1998.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.