Software Applications Wireless

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 20

Wireless LAN (VPN) connectivity allows wireless access to the on-campus network without

using a LAN cable.

Wireless LAN connectivity to the on-campus network is available only where wireless access
points are located. From one access point, you can communicate with multiple wireless LAN-
enabled PCs.

Since connectivity to wireless access points is affected by such factors as distance, physical
obstacles, and other radio waves on the same frequency as the wireless LAN, the range of
each wireless access is limited. Also, as distance increases between you and the access point,
the quality of radio waves deteriorates and so communication with the access point becomes
more difficult.

When you make a wireless LAN connection in a public place, you may be at risk of data
leakage or unauthorized access. Wireless LAN connectivity provided by Waseda University
uses VPN technology for encrypted communication to reduce such risks.

A mobile virtual private network (mobile VPN or mVPN) provides mobile devices with
access to network resources and software applications on their home network, when they
connect via other wireless or wired networks.

Mobile VPNs are used in environments where workers need to keep application sessions
open at all times, throughout the working day, as they connect via various wireless networks,
encounter gaps in coverage, or suspend-and-resume their devices to preserve battery life. A
conventional VPN cannot survive such events because the network tunnel is disrupted,
causing applications to disconnect, time out,[1] fail, or even the computing device itself to
crash.[2] Mobile VPNs are commonly used in public safety, home care, hospital settings, field
service management, utilities and other industries.[3] Increasingly, they are being adopted by
mobile professionals and white-collar workers

Comparison with other VPN types

A VPN maintains an authenticated, encrypted tunnel for securely passing data traffic over
public networks (typically, the Internet.) Other VPN types are IPsec VPNs, which are useful
for point-to-point connections when the network endpoints are known and remain fixed; or
SSL VPNs, which provide for access through a Web browser and are commonly used by
remote workers (telecommuting workers or business travelers).[4]

Makers of mobile VPNs draw a distinction between remote access and mobile environments.
[4]
A remote-access user typically establishes a connection from a fixed endpoint, launches
applications that connect to corporate resources as needed, and then logs off. In a mobile
environment, the endpoint changes constantly (for instance, as users roam between different
cellular networks or Wi-Fi access points). A mobile VPN maintains a virtual connection to
the application at all times as the endpoint changes, handling the necessary network logins in
a manner transparent to the user.[5

A virtual private network (VPN) extends a private network across a public network, such as
the Internet. It enables a computer or network-enabled device to send and receive data across
shared or public networks as if it were directly connected to the private network, while
benefiting from the functionality, security and management policies of the private network. [1]
A VPN is created by establishing a virtual point-to-point connection through the use of
dedicated connections, virtual tunneling protocols, or traffic encryption. Major
implementations of VPNs include OpenVPN and IPsec.

A VPN connection across the Internet is similar to a wide area network (WAN) link between
websites. From a user perspective, the extended network resources are accessed in the same
way as resources available within the private network. [2] One major limitation of traditional
VPNs is that they are point-to-point, and do not tend to support or connect broadcast
domains. Therefore communication, software, and networking, which are based on layer 2
and broadcast packets, such as NetBIOS used in Windows networking, may not be fully
supported or work exactly as they would on a real LAN. Variants on VPN, such as Virtual
Private LAN Service (VPLS), and layer 2 tunneling protocols, are designed to overcome this
limitation.

VPNs allow employees to securely access their company's intranet while traveling outside the
office. Similarly, VPNs securely connect geographically separated offices of an organization,
creating one cohesive network. VPN technology is also used by individual Internet users to
secure their wireless transactions, to circumvent geo restrictions and censorship, and to
connect to proxy servers for the purpose of protecting personal identity and location. [citation
needed]
Type

Early data networks allowed VPN-style remote connectivity through dial-up modems or
through leased line connections utilizing Frame Relay and Asynchronous Transfer Mode
(ATM) virtual circuits, provisioned through a network owned and operated by
telecommunication carriers. These networks are not considered true VPNs because they
passively secure the data being transmitted by the creation of logical data streams. [3] They
have been replaced by VPNs based on IP and IP/Multiprotocol Label Switching (MPLS)
Networks, due to significant cost-reductions and increased bandwidth[4] provided by new
technologies such as Digital Subscriber Line (DSL)[5] and fiber-optic networks.

VPNs can be either remote-access (connecting a computer to a network) or site-to-site


(connecting two networks). In a corporate setting, remote-access VPNs allow employees to
access their company's intranet from home or while traveling outside the office, and site-to-
site VPNs allow employees in geographically disparate offices to share one cohesive virtual
network. A VPN can also be used to interconnect two similar networks over a dissimilar
middle network; for example, two IPv6 networks over an IPv4 network.[6]

VPN systems may be classified by:

The protocols used to tunnel the traffic

The tunnel's termination point location, e.g., on the customer edge or network-
provider edge

Whether they offer site-to-site or network-to-network connectivity

The levels of security provided

The OSI layer they present to the connecting network, such as Layer 2 circuits or
Layer 3 network connectivity

Security mechanisms

VPNs cannot make online connections completely anonymous, but they can usually increase
privacy and security.[7] To prevent disclosure of private information, VPNs typically allow
only authenticated remote access and make use of encryption techniques.
VPNs provide security by the use of tunneling protocols and often through procedures such
as encryption. The VPN security model provides:

Confidentiality such that even if the network traffic is sniffed at the packet level (see
network sniffer and Deep packet inspection), an attacker would only see encrypted
data

Sender authentication to prevent unauthorized users from accessing the VPN

Message integrity to detect any instances of tampering with transmitted messages

Secure VPN protocols include the following:

Internet Protocol Security (IPsec) as initially developed by the Internet Engineering


Task Force (IETF) for IPv6, which was required in all standards-compliant
implementations of IPv6 before RFC 6434 made it only a recommendation.[8] This
standards-based security protocol is also widely used with IPv4 and the Layer 2
Tunneling Protocol. Its design meets most security goals: authentication, integrity, and
confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec
packet. De-encapsulation happens at the end of the tunnel, where the original IP
packet is decrypted and forwarded to its intended destination.

Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does
in the OpenVPN project and SoftEther VPN project[9]) or secure an individual
connection. A number of vendors provide remote-access VPN capabilities through
SSL. An SSL VPN can connect from locations where IPsec runs into trouble with
Network Address Translation and firewall rules.

Datagram Transport Layer Security (DTLS) - used in Cisco AnyConnect VPN and in
OpenConnect VPN[10] to solve the issues SSL/TLS has with tunneling over UDP.

Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling


Protocol and in several compatible implementations on other platforms.
Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol
(PPP) or Layer 2 Tunneling Protocol traffic through an SSL 3.0 channel. (SSTP was
introduced in Windows Server 2008 and in Windows Vista Service Pack 1.)

Multi Path Virtual Private Network (MPVPN). Ragula Systems Development


Company owns the registered trademark "MPVPN".[11]

Secure Shell (SSH) VPN - OpenSSH offers VPN tunneling (distinct from port
forwarding) to secure remote connections to a network or to inter-network links.
OpenSSH server provides a limited number of concurrent tunnels. The VPN feature
itself does not support personal authentication.[12][13][14]

Authentication

Tunnel endpoints must be authenticated before secure VPN tunnels can be established. User-
created remote-access VPNs may use passwords, biometrics, two-factor authentication or
other cryptographic methods. Network-to-network tunnels often use passwords or digital
certificates. They permanently store the key to allow the tunnel to establish automatically,
without intervention from the user.

Routing

Tunneling protocols can operate in a point-to-point network topology that would theoretically
not be considered a VPN, because a VPN by definition is expected to support arbitrary and
changing sets of network nodes. But since most router implementations support a software-
defined tunnel interface, customer-provisioned VPNs often are simply defined tunnels
running conventional routing protocols.

Provider-provisioned VPN building-blocks

Depending on whether a provider-provisioned VPN (PPVPN)[clarification needed] operates in layer 2


or layer 3, the building blocks described below may be L2 only, L3 only, or combine them
both. Multiprotocol label switching (MPLS) functionality blurs the L2-L3 identity.[citation needed]
[original research?]
RFC 4026 generalized the following terms to cover L2 and L3 VPNs, but they were
introduced in RFC 2547.[15] More information on the devices below can also be found in
Lewis, Cisco Press.[16]

Customer (C) devices

A device that is within a customer's network and not directly connected to the service
provider's network. C devices are not aware of the VPN.

Customer Edge device (CE)

A device at the edge of the customer's network which provides access to the PPVPN.
Sometimes it's just a demarcation point between provider and customer responsibility. Other
providers allow customers to configure it.

Provider edge device (PE)

A PE is a device, or set of devices, at the edge of the provider network which connects to
customer networks through CE devices and presents the provider's view of the customer site.
PEs are aware of the VPNs that connect through them, and maintain VPN state.

Provider device (P)

A P device operates inside the provider's core network and does not directly interface to any
customer endpoint. It might, for example, provide routing for many provider-operated tunnels
that belong to different customers' PPVPNs. While the P device is a key part of implementing
PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is
allowing the service provider to scale its PPVPN offerings, for example, by acting as an
aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity
optical links between major locations of providers.

User-visible PPVPN service

This section deals with the types of VPN considered in the IETF.
OSI Layer 2 services

Virtual LAN

A Layer 2 technique that allow for the coexistence of multiple LAN broadcast domains,
interconnected via trunks using the IEEE 802.1Q trunking protocol. Other trunking protocols
have been used but have become obsolete, including Inter-Switch Link (ISL), IEEE 802.10
(originally a security protocol but a subset was introduced for trunking), and ATM LAN
Emulation (LANE).

Virtual private LAN service (VPLS)

Developed by IEEE, VLANs allow multiple tagged LANs to share common trunking.
VLANs frequently comprise only customer-owned facilities. Whereas VPLS as described in
the above section (OSI Layer 1 services) supports emulation of both point-to-point and point-
to-multipoint topologies, the method discussed here extends Layer 2 technologies such as
802.1d and 802.1q LAN trunking to run over transports such as Metro Ethernet.

As used in this context, a VPLS is a Layer 2 PPVPN, rather than a private line, emulating the
full functionality of a traditional local area network (LAN). From a user standpoint, a VPLS
makes it possible to interconnect several LAN segments over a packet-switched, or optical,
provider core; a core transparent to the user, making the remote LAN segments behave as one
single LAN.[17]

In a VPLS, the provider network emulates a learning bridge, which optionally may include
VLAN service.

Pseudo wire (PW)

PW is similar to VPLS, but it can provide different L2 protocols at both ends. Typically, its
interface is a WAN protocol such as Asynchronous Transfer Mode or Frame Relay. In
contrast, when aiming to provide the appearance of a LAN contiguous between two or more
locations, the Virtual Private LAN service or IPLS would be appropriate.

Ethernet over IP tunneling


EtherIP (RFC 3378) is an Ethernet over IP tunneling protocol specification. EtherIP has only
packet encapsulation mechanism. It has no confidentiality nor message integrity protection.
[18]
EtherIP was introduced in the FreeBSD network stack and the SoftEther VPN[19] server
program.

IP-only LAN-like service (IPLS)

A subset of VPLS, the CE devices must have L3 capabilities; the IPLS presents packets rather
than frames. It may support IPv4 or IPv6.

OSI Layer 3 PPVPN architectures

This section discusses the main architectures for PPVPNs, one where the PE disambiguates
duplicate addresses in a single routing instance, and the other, virtual router, in which the PE
contains a virtual router instance per VPN. The former approach, and its variants, have gained
the most attention.

One of the challenges of PPVPNs involves different customers using the same address space,
especially the IPv4 private address space.[20] The provider must be able to disambiguate
overlapping addresses in the multiple customers' PPVPNs.

BGP/MPLS PPVPN

In the method defined by RFC 2547, BGP extensions advertise routes in the IPv4 VPN
address family, which are of the form of 12-byte strings, beginning with an 8-byte Route
Distinguisher (RD) and ending with a 4-byte IPv4 address. RDs disambiguate otherwise
duplicate addresses in the same PE.

PEs understand the topology of each VPN, which are interconnected with MPLS tunnels,
either directly or via P routers. In MPLS terminology, the P routers are Label Switch Routers
without awareness of VPNs.

Virtual router PPVPN

The Virtual Router architecture,[21][22] as opposed to BGP/MPLS techniques, requires no


modification to existing routing protocols such as BGP. By the provisioning of logically
independent routing domains, the customer operating a VPN is completely responsible for the
address space. In the various MPLS tunnels, the different PPVPNs are disambiguated by their
label, but do not need routing distinguishers.

Unencrypted tunnels

Main article: Tunneling protocol

Some virtual networks may not use encryption to protect the privacy of data. While VPNs
often provide security, an unencrypted overlay network does not neatly fit within the secure
or trusted categorization. For example, a tunnel set up between two hosts that used Generic
Routing Encapsulation (GRE) would in fact be a virtual private network, but neither secure
nor trusted.

Native plaintext tunneling protocols include Layer 2 Tunneling Protocol (L2TP) when it is set
up without IPsec and Point-to-Point Tunneling Protocol (PPTP) or Microsoft Point-to-Point
Encryption (MPPE).

Trusted delivery networks

Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single
provider's network to protect the traffic.[23]

Multi-Protocol Label Switching (MPLS) often overlays VPNs, often with quality-of-
service control over a trusted delivery network.

Layer 2 Tunneling Protocol (L2TP)[24] which is a standards-based replacement, and a


compromise taking the good features from each, for two proprietary VPN protocols:
Cisco's Layer 2 Forwarding (L2F)[25] (obsolete as of 2009) and Microsoft's Point-to-
Point Tunneling Protocol (PPTP).[26]

From the security standpoint, VPNs either trust the underlying delivery network, or must
enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs
among physically secure sites only, both trusted and secure models need an authentication
mechanism for users to gain access to the VPN.

VPNs in mobile environments


Main article: Mobile virtual private network

Mobile VPNs are used in a setting where an endpoint of the VPN is not fixed to a single IP
address, but instead roams across various networks such as data networks from cellular
carriers or between multiple Wi-Fi access points.[27] Mobile VPNs have been widely used in
public safety, where they give law enforcement officers access to mission-critical
applications, such as computer-assisted dispatch and criminal databases, while they travel
between different subnets of a mobile network.[28] They are also used in field service
management and by healthcare organizations,[29] among other industries.

Increasingly, mobile VPNs are being adopted by mobile professionals who need reliable
connections.[29] They are used for roaming seamlessly across networks and in and out of
wireless coverage areas without losing application sessions or dropping the secure VPN
session. A conventional VPN cannot survive such events because the network tunnel is
disrupted, causing applications to disconnect, time out,[27] or fail, or even cause the computing
device itself to crash.[29]

Instead of logically tying the endpoint of the network tunnel to the physical IP address, each
tunnel is bound to a permanently associated IP address at the device. The mobile VPN
software handles the necessary network authentication and maintains the network sessions in
a manner transparent to the application and the user.[27] The Host Identity Protocol (HIP),
under study by the Internet Engineering Task Force, is designed to support mobility of hosts
by separating the role of IP addresses for host identification from their locator functionality in
an IP network. With HIP a mobile host maintains its logical connections established via the
host identity identifier while associating with different IP addresses when roaming between
access networks.

VPN on Routers

With the increasing use of VPNs, many have started deploying VPN connectivity on routers
for additional security and encryption of data transmission by using various cryptographic
techniques. Setting up VPN services on a router will allow any connected device(s) to use the
VPN network while it is enabled. This also makes it easy to set up VPNs on devices that do
not have native VPN clients such as Smart-TVs, Gaming Consoles etc. Provisioning VPN on
the routers will also help in cost savings and network scalability.
Many router manufacturers like Cisco Linksys, Asus and Netgear supply their routers with
built-in VPN clients. Since these routers do not support all the major VPN protocols, such as
OpenVPN, many tend to flash their routers with alternative open source firmwares such as
DD-WRT, OpenWRT and Tomato which support multiple VPN protocols such as PPTP and
OpenVPN.

Limitations:

Not every router compatible with open source firmware which depends on the built-in flash
memory and processor. Firmwares like DD-WRT require a minimum of 2 MiB flash memory
and Broadcom chipsets. Setting up VPN services on a router requires a deeper knowledge of
network security and careful installation. Minor misconfiguration of VPN connections can
leave the network vulnerable. Performance will vary depending on the ISP and their
reliability.

[30]

Networking limitations

One major limitation of traditional VPNs is that they are point-to-point, and do not tend to
support or connect broadcast domains. Therefore communication, software, and networking,
which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows
networking, may not be fully supported or work exactly as they would on a real LAN.
Variants on VPN, such as Virtual Private LAN Service (VPLS), and layer 2 tunneling
protocols, are designed to overcome this limitation.

Mobile virtual private network

From Wikipedia, the free encyclopedia

A mobile virtual private network (mobile VPN or mVPN) provides mobile devices with
access to network resources and software applications on their home network, when they
connect via other wireless or wired networks.
Mobile VPNs are used in environments where workers need to keep application sessions
open at all times, throughout the working day, as they connect via various wireless networks,
encounter gaps in coverage, or suspend-and-resume their devices to preserve battery life. A
conventional VPN cannot survive such events because the network tunnel is disrupted,
causing applications to disconnect, time out,[1] fail, or even the computing device itself to
crash.[2] Mobile VPNs are commonly used in public safety, home care, hospital settings, field
service management, utilities and other industries.[3] Increasingly, they are being adopted by
mobile professionals and white-collar workers.[2]

Comparison with other VPN types

A VPN maintains an authenticated, encrypted tunnel for securely passing data traffic over
public networks (typically, the Internet.) Other VPN types are IPsec VPNs, which are useful
for point-to-point connections when the network endpoints are known and remain fixed; or
SSL VPNs, which provide for access through a Web browser and are commonly used by
remote workers (telecommuting workers or business travelers).[4]

Makers of mobile VPNs draw a distinction between remote access and mobile environments.
[4]
A remote-access user typically establishes a connection from a fixed endpoint, launches
applications that connect to corporate resources as needed, and then logs off. In a mobile
environment, the endpoint changes constantly (for instance, as users roam between different
cellular networks or Wi-Fi access points). A mobile VPN maintains a virtual connection to
the application at all times as the endpoint changes, handling the necessary network logins in
a manner transparent to the user.[5]

Functions

The following are functions common to mobile VPNs.[6]

Function Description

Open applications remain active, open and available when the wireless
Persistence connection changes or is interrupted, a laptop goes into hibernation, or a
handheld user suspends and resumes the device
Underlying virtual connection remains intact when the device switches to a
Roaming
different network; the mobile VPN handles the logins automatically

Application Software applications that run in an "always-connected" wired LAN


compatibility environment run over the mobile VPN without modification

Enforces authentication of the user, the device, or both; as well as


Security encryption of the data traffic in compliance with security standards such as
FIPS 140-2

Link optimization and data compression improve performance over


Acceleration wireless networks, especially on cellular networks where bandwidth may
be constrained.

Enforces two-factor authentication or multi-factor authentication using


Strong some combination of a password, smart card, public key certificate or
authentication biometric device; required by some regulations, notably for access to CJIS
systems in law enforcement

Management

Some mobile VPNs offer additional "mobile-aware" management and security functions,
giving information technology departments visibility and control over devices that may not
be on the corporate premises or that connect through networks outside IT's direct control.[7]

Function Description

Management Displays status of devices and users, and offers the ability to quarantine a
console device if there is possibility that it may have been lost or stolen

Policy Enforces access policies based on the network in use, bandwidth of the
Management connection, on layer-3 and layer-4 attributes (IP address, TCP and UDP
port, etc.), time of day, and in some VPNs, the ability to control access by
individual application software

Specifies the priority that different applications or services should receive


when contending for available wireless bandwidth; this is useful for
Quality of
ensuring delivery of the essential "mission-critical" applications (such as
service
computer-assisted dispatch for public safety) or giving priority to streaming
media or voice-over-IP

Evaluates the patch status, anti-virus and anti-spyware protection status,


Network Access and other aspects of the "health" of the device before allowing a
Control (NAC) connection; and optionally may integrate with policies to remediate the
device automatically

Gives administrators a view into how wireless networks and devices are
Mobile Analytics
used

Alerts administrators of security concerns or connection problems that


Notifications
impact users, delivered via SMTP, SNMP or syslog

Industries and applications

Mobile VPNs have found uses in a variety of industries, where they give mobile workers
access to software applications.[8]

Industry Workers Applications

Computer-aided dispatch, automatic vehicle location,


Police officers,
state driver's license and vehicle registration plate
Public firefighters, emergency
databases, criminal databases like the FBI Criminal
Safety services personnel, first
Justice Information System (CJIS), dashcam software,
responders
departmental intranet

Home Care Visiting nurses, in-home Electronic health records, electronic medical records,
physical therapists and
occupational therapists,
scheduling and billing applications
home care aides and
hospice workers

Electronic health records, Electronic medical records,


Picture archiving and communications systems,
Hospitals Physicians, nurses and
Computerized physician order entry, pharmacy,
and Clinics other staff
patient registration, scheduling, housekeeping, billing,
accounting

Field Service Management which can include


customer relationship management, work order
management, Computer-aided dispatch, and historical
Field Field-service engineers,
customer service data as well as databases of
Service repair technicians
customer-premises equipment, access requirements,
and parts inventory; asset tracking, parts ordering,
documentation access

Customer relationship management, inventory, order


Field Sales Sales representatives
fulfillment

Computer-aided dispatch, scheduling, work-order


Linemen, installation and
management, geographic information systems,
Utilities repair technicians, field-
maintenance tracking, parts ordering, customer-
service engineers
service, testing and training applications

Insurance Claims adjusters Claims systems, estimating applications

Devices

Some mobile environments call for devices built to handle physical shock, weather extremes
or other conditions encountered outdoors or in the field. Some manufacturers create
ruggedized computers, such as the Panasonic Toughbook or the Itronix GoBook, in laptop or
Tablet PC configurations.[9] Various handhelds and smartphones may also be used. Operating
systems are typically Microsoft Windows-based, including special mobile-capable versions
such as Windows CE and Windows Mobile.[10] Mobile VPN is available for all Symbian OS
based smartphones by Nokia.[11]

In telecommunications

In telecommunication, a mobile VPN is a solution that integrates all offices and employees in
a common network that includes all mobile and desk phones. Simultaneously mVPN makes
internal communication more efficient, by providing additional services and guarantees high
quality for best value. Through a connection between a leased line (E1/T1) and an enterprise
PABX (Private Automatic Branch Exchange) system, it connects remote and mobile users
with the company.[12]

Using mVPNs the company has the following advantages:[13][14]

Direct connectivity the corporate network becomes part of mobile operator's


network through direct connection

Private numbering plan the communication is tailored to company organisation

Corporate Business Group all offices and employees are part of one common group,
that includes all mobile and desk phones

Short dialling a short number to access each employee, no meter on his mobile or
desk phone

Smart Divert easy divert within company group

Groups and subgroups Several sub-groups could be defined within the group with
different changing as well as with separate numbering plan

Calls control certain destinations could be allowed or barred both on mobile and
desk phones.
What's a Mobile VPN?

The Key to a Successful Mobile Deployment

The foundation of a successful mobile deployment is a Mobile VPN (virtual private network)
software that provides mobile workers with secure, reliable, remote access to network
resources and information from virtually anywhere. Only a Mobile VPN is designed to deal
with the unique challenges associated with mobile computing such as wireless security,
performance and roaming.

Traditional VPNs are not Built for the Mobile Environment

One of the weaknesses of the original Internet protocol (TCP/IP) is that it does not include a
native means for ensuring the authenticity and privacy of data as it passes over a public
network. To address this weakness, VPN technologies were developed that would validate the
identity of and encrypt the data sent between two or more systems on the Internet.

These conventional VPN technologies, including PPTP, IPsec and SSL work great for users
who connect from stationary devices (a home PC over residential broadband, a laptop over a
hotel LAN, or even a PDA at a wi-fi hot spot), as they use the IP address to identify the
device at the far end of the tunnel. But once that device is in motion, physical connectivity,
point of network attachment, and IP address are all likely to change. A conventional VPN
simply cannot adapt to these changes.

The network tunnel is disrupted, causing application sessions to disconnect, time out, fail, or
even the computing device itself to crash. This often forces the user to restart the
communication from scratch, possibly having lost work or data transmission that was in
process at the time of the disruption.
Add these drops up, factor in the time and productivity lost, and you start to see how
challenging a mobile technology deployment can become without the right tools.

Choosing a Mobile VPN

As with any software, there are multiple options on the market to choose from. When
choosing a mobile VPN, the following key features should be considered:

True Application Persistence: The ability to sustain application sessions, even


through suspend-and-resume cycles and loss of connectivity

Standards-Based Security: Supports two-factor authentication, device


authentication, FIPS 140-2 AES encryption, NSA Suite B encryption and the ability to
quarantine remote devices

Centralized Management Console: Browser-based console that generates views into


connected devices and detailed reporting

Wireless Performance Optimization:provide the ability to automatically reduce


network consumption and improve throughput and application responsiveness,
particularly over these cellular networks

http://www.netmotionwireless.com/whats-a-mobile-vpn.aspx

https://en.wikipedia.org/wiki/Virtual_private_network

https://en.wikipedia.org/wiki/Mobile_virtual_private_network
https://www.waseda.jp/navi/e/network/wireless.html

You might also like