Software Applications Wireless
Software Applications Wireless
Software Applications Wireless
Wireless LAN connectivity to the on-campus network is available only where wireless access
points are located. From one access point, you can communicate with multiple wireless LAN-
enabled PCs.
Since connectivity to wireless access points is affected by such factors as distance, physical
obstacles, and other radio waves on the same frequency as the wireless LAN, the range of
each wireless access is limited. Also, as distance increases between you and the access point,
the quality of radio waves deteriorates and so communication with the access point becomes
more difficult.
When you make a wireless LAN connection in a public place, you may be at risk of data
leakage or unauthorized access. Wireless LAN connectivity provided by Waseda University
uses VPN technology for encrypted communication to reduce such risks.
A mobile virtual private network (mobile VPN or mVPN) provides mobile devices with
access to network resources and software applications on their home network, when they
connect via other wireless or wired networks.
Mobile VPNs are used in environments where workers need to keep application sessions
open at all times, throughout the working day, as they connect via various wireless networks,
encounter gaps in coverage, or suspend-and-resume their devices to preserve battery life. A
conventional VPN cannot survive such events because the network tunnel is disrupted,
causing applications to disconnect, time out,[1] fail, or even the computing device itself to
crash.[2] Mobile VPNs are commonly used in public safety, home care, hospital settings, field
service management, utilities and other industries.[3] Increasingly, they are being adopted by
mobile professionals and white-collar workers
A VPN maintains an authenticated, encrypted tunnel for securely passing data traffic over
public networks (typically, the Internet.) Other VPN types are IPsec VPNs, which are useful
for point-to-point connections when the network endpoints are known and remain fixed; or
SSL VPNs, which provide for access through a Web browser and are commonly used by
remote workers (telecommuting workers or business travelers).[4]
Makers of mobile VPNs draw a distinction between remote access and mobile environments.
[4]
A remote-access user typically establishes a connection from a fixed endpoint, launches
applications that connect to corporate resources as needed, and then logs off. In a mobile
environment, the endpoint changes constantly (for instance, as users roam between different
cellular networks or Wi-Fi access points). A mobile VPN maintains a virtual connection to
the application at all times as the endpoint changes, handling the necessary network logins in
a manner transparent to the user.[5
A virtual private network (VPN) extends a private network across a public network, such as
the Internet. It enables a computer or network-enabled device to send and receive data across
shared or public networks as if it were directly connected to the private network, while
benefiting from the functionality, security and management policies of the private network. [1]
A VPN is created by establishing a virtual point-to-point connection through the use of
dedicated connections, virtual tunneling protocols, or traffic encryption. Major
implementations of VPNs include OpenVPN and IPsec.
A VPN connection across the Internet is similar to a wide area network (WAN) link between
websites. From a user perspective, the extended network resources are accessed in the same
way as resources available within the private network. [2] One major limitation of traditional
VPNs is that they are point-to-point, and do not tend to support or connect broadcast
domains. Therefore communication, software, and networking, which are based on layer 2
and broadcast packets, such as NetBIOS used in Windows networking, may not be fully
supported or work exactly as they would on a real LAN. Variants on VPN, such as Virtual
Private LAN Service (VPLS), and layer 2 tunneling protocols, are designed to overcome this
limitation.
VPNs allow employees to securely access their company's intranet while traveling outside the
office. Similarly, VPNs securely connect geographically separated offices of an organization,
creating one cohesive network. VPN technology is also used by individual Internet users to
secure their wireless transactions, to circumvent geo restrictions and censorship, and to
connect to proxy servers for the purpose of protecting personal identity and location. [citation
needed]
Type
Early data networks allowed VPN-style remote connectivity through dial-up modems or
through leased line connections utilizing Frame Relay and Asynchronous Transfer Mode
(ATM) virtual circuits, provisioned through a network owned and operated by
telecommunication carriers. These networks are not considered true VPNs because they
passively secure the data being transmitted by the creation of logical data streams. [3] They
have been replaced by VPNs based on IP and IP/Multiprotocol Label Switching (MPLS)
Networks, due to significant cost-reductions and increased bandwidth[4] provided by new
technologies such as Digital Subscriber Line (DSL)[5] and fiber-optic networks.
The tunnel's termination point location, e.g., on the customer edge or network-
provider edge
The OSI layer they present to the connecting network, such as Layer 2 circuits or
Layer 3 network connectivity
Security mechanisms
VPNs cannot make online connections completely anonymous, but they can usually increase
privacy and security.[7] To prevent disclosure of private information, VPNs typically allow
only authenticated remote access and make use of encryption techniques.
VPNs provide security by the use of tunneling protocols and often through procedures such
as encryption. The VPN security model provides:
Confidentiality such that even if the network traffic is sniffed at the packet level (see
network sniffer and Deep packet inspection), an attacker would only see encrypted
data
Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does
in the OpenVPN project and SoftEther VPN project[9]) or secure an individual
connection. A number of vendors provide remote-access VPN capabilities through
SSL. An SSL VPN can connect from locations where IPsec runs into trouble with
Network Address Translation and firewall rules.
Datagram Transport Layer Security (DTLS) - used in Cisco AnyConnect VPN and in
OpenConnect VPN[10] to solve the issues SSL/TLS has with tunneling over UDP.
Secure Shell (SSH) VPN - OpenSSH offers VPN tunneling (distinct from port
forwarding) to secure remote connections to a network or to inter-network links.
OpenSSH server provides a limited number of concurrent tunnels. The VPN feature
itself does not support personal authentication.[12][13][14]
Authentication
Tunnel endpoints must be authenticated before secure VPN tunnels can be established. User-
created remote-access VPNs may use passwords, biometrics, two-factor authentication or
other cryptographic methods. Network-to-network tunnels often use passwords or digital
certificates. They permanently store the key to allow the tunnel to establish automatically,
without intervention from the user.
Routing
Tunneling protocols can operate in a point-to-point network topology that would theoretically
not be considered a VPN, because a VPN by definition is expected to support arbitrary and
changing sets of network nodes. But since most router implementations support a software-
defined tunnel interface, customer-provisioned VPNs often are simply defined tunnels
running conventional routing protocols.
A device that is within a customer's network and not directly connected to the service
provider's network. C devices are not aware of the VPN.
A device at the edge of the customer's network which provides access to the PPVPN.
Sometimes it's just a demarcation point between provider and customer responsibility. Other
providers allow customers to configure it.
A PE is a device, or set of devices, at the edge of the provider network which connects to
customer networks through CE devices and presents the provider's view of the customer site.
PEs are aware of the VPNs that connect through them, and maintain VPN state.
A P device operates inside the provider's core network and does not directly interface to any
customer endpoint. It might, for example, provide routing for many provider-operated tunnels
that belong to different customers' PPVPNs. While the P device is a key part of implementing
PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is
allowing the service provider to scale its PPVPN offerings, for example, by acting as an
aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity
optical links between major locations of providers.
This section deals with the types of VPN considered in the IETF.
OSI Layer 2 services
Virtual LAN
A Layer 2 technique that allow for the coexistence of multiple LAN broadcast domains,
interconnected via trunks using the IEEE 802.1Q trunking protocol. Other trunking protocols
have been used but have become obsolete, including Inter-Switch Link (ISL), IEEE 802.10
(originally a security protocol but a subset was introduced for trunking), and ATM LAN
Emulation (LANE).
Developed by IEEE, VLANs allow multiple tagged LANs to share common trunking.
VLANs frequently comprise only customer-owned facilities. Whereas VPLS as described in
the above section (OSI Layer 1 services) supports emulation of both point-to-point and point-
to-multipoint topologies, the method discussed here extends Layer 2 technologies such as
802.1d and 802.1q LAN trunking to run over transports such as Metro Ethernet.
As used in this context, a VPLS is a Layer 2 PPVPN, rather than a private line, emulating the
full functionality of a traditional local area network (LAN). From a user standpoint, a VPLS
makes it possible to interconnect several LAN segments over a packet-switched, or optical,
provider core; a core transparent to the user, making the remote LAN segments behave as one
single LAN.[17]
In a VPLS, the provider network emulates a learning bridge, which optionally may include
VLAN service.
PW is similar to VPLS, but it can provide different L2 protocols at both ends. Typically, its
interface is a WAN protocol such as Asynchronous Transfer Mode or Frame Relay. In
contrast, when aiming to provide the appearance of a LAN contiguous between two or more
locations, the Virtual Private LAN service or IPLS would be appropriate.
A subset of VPLS, the CE devices must have L3 capabilities; the IPLS presents packets rather
than frames. It may support IPv4 or IPv6.
This section discusses the main architectures for PPVPNs, one where the PE disambiguates
duplicate addresses in a single routing instance, and the other, virtual router, in which the PE
contains a virtual router instance per VPN. The former approach, and its variants, have gained
the most attention.
One of the challenges of PPVPNs involves different customers using the same address space,
especially the IPv4 private address space.[20] The provider must be able to disambiguate
overlapping addresses in the multiple customers' PPVPNs.
BGP/MPLS PPVPN
In the method defined by RFC 2547, BGP extensions advertise routes in the IPv4 VPN
address family, which are of the form of 12-byte strings, beginning with an 8-byte Route
Distinguisher (RD) and ending with a 4-byte IPv4 address. RDs disambiguate otherwise
duplicate addresses in the same PE.
PEs understand the topology of each VPN, which are interconnected with MPLS tunnels,
either directly or via P routers. In MPLS terminology, the P routers are Label Switch Routers
without awareness of VPNs.
Unencrypted tunnels
Some virtual networks may not use encryption to protect the privacy of data. While VPNs
often provide security, an unencrypted overlay network does not neatly fit within the secure
or trusted categorization. For example, a tunnel set up between two hosts that used Generic
Routing Encapsulation (GRE) would in fact be a virtual private network, but neither secure
nor trusted.
Native plaintext tunneling protocols include Layer 2 Tunneling Protocol (L2TP) when it is set
up without IPsec and Point-to-Point Tunneling Protocol (PPTP) or Microsoft Point-to-Point
Encryption (MPPE).
Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single
provider's network to protect the traffic.[23]
Multi-Protocol Label Switching (MPLS) often overlays VPNs, often with quality-of-
service control over a trusted delivery network.
From the security standpoint, VPNs either trust the underlying delivery network, or must
enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs
among physically secure sites only, both trusted and secure models need an authentication
mechanism for users to gain access to the VPN.
Mobile VPNs are used in a setting where an endpoint of the VPN is not fixed to a single IP
address, but instead roams across various networks such as data networks from cellular
carriers or between multiple Wi-Fi access points.[27] Mobile VPNs have been widely used in
public safety, where they give law enforcement officers access to mission-critical
applications, such as computer-assisted dispatch and criminal databases, while they travel
between different subnets of a mobile network.[28] They are also used in field service
management and by healthcare organizations,[29] among other industries.
Increasingly, mobile VPNs are being adopted by mobile professionals who need reliable
connections.[29] They are used for roaming seamlessly across networks and in and out of
wireless coverage areas without losing application sessions or dropping the secure VPN
session. A conventional VPN cannot survive such events because the network tunnel is
disrupted, causing applications to disconnect, time out,[27] or fail, or even cause the computing
device itself to crash.[29]
Instead of logically tying the endpoint of the network tunnel to the physical IP address, each
tunnel is bound to a permanently associated IP address at the device. The mobile VPN
software handles the necessary network authentication and maintains the network sessions in
a manner transparent to the application and the user.[27] The Host Identity Protocol (HIP),
under study by the Internet Engineering Task Force, is designed to support mobility of hosts
by separating the role of IP addresses for host identification from their locator functionality in
an IP network. With HIP a mobile host maintains its logical connections established via the
host identity identifier while associating with different IP addresses when roaming between
access networks.
VPN on Routers
With the increasing use of VPNs, many have started deploying VPN connectivity on routers
for additional security and encryption of data transmission by using various cryptographic
techniques. Setting up VPN services on a router will allow any connected device(s) to use the
VPN network while it is enabled. This also makes it easy to set up VPNs on devices that do
not have native VPN clients such as Smart-TVs, Gaming Consoles etc. Provisioning VPN on
the routers will also help in cost savings and network scalability.
Many router manufacturers like Cisco Linksys, Asus and Netgear supply their routers with
built-in VPN clients. Since these routers do not support all the major VPN protocols, such as
OpenVPN, many tend to flash their routers with alternative open source firmwares such as
DD-WRT, OpenWRT and Tomato which support multiple VPN protocols such as PPTP and
OpenVPN.
Limitations:
Not every router compatible with open source firmware which depends on the built-in flash
memory and processor. Firmwares like DD-WRT require a minimum of 2 MiB flash memory
and Broadcom chipsets. Setting up VPN services on a router requires a deeper knowledge of
network security and careful installation. Minor misconfiguration of VPN connections can
leave the network vulnerable. Performance will vary depending on the ISP and their
reliability.
[30]
Networking limitations
One major limitation of traditional VPNs is that they are point-to-point, and do not tend to
support or connect broadcast domains. Therefore communication, software, and networking,
which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows
networking, may not be fully supported or work exactly as they would on a real LAN.
Variants on VPN, such as Virtual Private LAN Service (VPLS), and layer 2 tunneling
protocols, are designed to overcome this limitation.
A mobile virtual private network (mobile VPN or mVPN) provides mobile devices with
access to network resources and software applications on their home network, when they
connect via other wireless or wired networks.
Mobile VPNs are used in environments where workers need to keep application sessions
open at all times, throughout the working day, as they connect via various wireless networks,
encounter gaps in coverage, or suspend-and-resume their devices to preserve battery life. A
conventional VPN cannot survive such events because the network tunnel is disrupted,
causing applications to disconnect, time out,[1] fail, or even the computing device itself to
crash.[2] Mobile VPNs are commonly used in public safety, home care, hospital settings, field
service management, utilities and other industries.[3] Increasingly, they are being adopted by
mobile professionals and white-collar workers.[2]
A VPN maintains an authenticated, encrypted tunnel for securely passing data traffic over
public networks (typically, the Internet.) Other VPN types are IPsec VPNs, which are useful
for point-to-point connections when the network endpoints are known and remain fixed; or
SSL VPNs, which provide for access through a Web browser and are commonly used by
remote workers (telecommuting workers or business travelers).[4]
Makers of mobile VPNs draw a distinction between remote access and mobile environments.
[4]
A remote-access user typically establishes a connection from a fixed endpoint, launches
applications that connect to corporate resources as needed, and then logs off. In a mobile
environment, the endpoint changes constantly (for instance, as users roam between different
cellular networks or Wi-Fi access points). A mobile VPN maintains a virtual connection to
the application at all times as the endpoint changes, handling the necessary network logins in
a manner transparent to the user.[5]
Functions
Function Description
Open applications remain active, open and available when the wireless
Persistence connection changes or is interrupted, a laptop goes into hibernation, or a
handheld user suspends and resumes the device
Underlying virtual connection remains intact when the device switches to a
Roaming
different network; the mobile VPN handles the logins automatically
Management
Some mobile VPNs offer additional "mobile-aware" management and security functions,
giving information technology departments visibility and control over devices that may not
be on the corporate premises or that connect through networks outside IT's direct control.[7]
Function Description
Management Displays status of devices and users, and offers the ability to quarantine a
console device if there is possibility that it may have been lost or stolen
Policy Enforces access policies based on the network in use, bandwidth of the
Management connection, on layer-3 and layer-4 attributes (IP address, TCP and UDP
port, etc.), time of day, and in some VPNs, the ability to control access by
individual application software
Gives administrators a view into how wireless networks and devices are
Mobile Analytics
used
Mobile VPNs have found uses in a variety of industries, where they give mobile workers
access to software applications.[8]
Home Care Visiting nurses, in-home Electronic health records, electronic medical records,
physical therapists and
occupational therapists,
scheduling and billing applications
home care aides and
hospice workers
Devices
Some mobile environments call for devices built to handle physical shock, weather extremes
or other conditions encountered outdoors or in the field. Some manufacturers create
ruggedized computers, such as the Panasonic Toughbook or the Itronix GoBook, in laptop or
Tablet PC configurations.[9] Various handhelds and smartphones may also be used. Operating
systems are typically Microsoft Windows-based, including special mobile-capable versions
such as Windows CE and Windows Mobile.[10] Mobile VPN is available for all Symbian OS
based smartphones by Nokia.[11]
In telecommunications
In telecommunication, a mobile VPN is a solution that integrates all offices and employees in
a common network that includes all mobile and desk phones. Simultaneously mVPN makes
internal communication more efficient, by providing additional services and guarantees high
quality for best value. Through a connection between a leased line (E1/T1) and an enterprise
PABX (Private Automatic Branch Exchange) system, it connects remote and mobile users
with the company.[12]
Corporate Business Group all offices and employees are part of one common group,
that includes all mobile and desk phones
Short dialling a short number to access each employee, no meter on his mobile or
desk phone
Groups and subgroups Several sub-groups could be defined within the group with
different changing as well as with separate numbering plan
Calls control certain destinations could be allowed or barred both on mobile and
desk phones.
What's a Mobile VPN?
The foundation of a successful mobile deployment is a Mobile VPN (virtual private network)
software that provides mobile workers with secure, reliable, remote access to network
resources and information from virtually anywhere. Only a Mobile VPN is designed to deal
with the unique challenges associated with mobile computing such as wireless security,
performance and roaming.
One of the weaknesses of the original Internet protocol (TCP/IP) is that it does not include a
native means for ensuring the authenticity and privacy of data as it passes over a public
network. To address this weakness, VPN technologies were developed that would validate the
identity of and encrypt the data sent between two or more systems on the Internet.
These conventional VPN technologies, including PPTP, IPsec and SSL work great for users
who connect from stationary devices (a home PC over residential broadband, a laptop over a
hotel LAN, or even a PDA at a wi-fi hot spot), as they use the IP address to identify the
device at the far end of the tunnel. But once that device is in motion, physical connectivity,
point of network attachment, and IP address are all likely to change. A conventional VPN
simply cannot adapt to these changes.
The network tunnel is disrupted, causing application sessions to disconnect, time out, fail, or
even the computing device itself to crash. This often forces the user to restart the
communication from scratch, possibly having lost work or data transmission that was in
process at the time of the disruption.
Add these drops up, factor in the time and productivity lost, and you start to see how
challenging a mobile technology deployment can become without the right tools.
As with any software, there are multiple options on the market to choose from. When
choosing a mobile VPN, the following key features should be considered:
http://www.netmotionwireless.com/whats-a-mobile-vpn.aspx
https://en.wikipedia.org/wiki/Virtual_private_network
https://en.wikipedia.org/wiki/Mobile_virtual_private_network
https://www.waseda.jp/navi/e/network/wireless.html