In the projectís phase 1 was conducted a study with the table of content:


1 The objective of the project
   1.1 General Objectives  
   1.2 Objectives of Phase

2. Phase abstract

3 Study and analysis of developments in VPN
   3.1 Overview of VPN
         3.1.1 What is a VPN
         3.1.2 VPN philosophy
         3.1.3 The advantages of VPN
   3.2 The VPN structure
         3.2.1 Structure overview
         3.2.2 VPN architecture
         3.2.3 VPN topologies
         3.2.4 Types of VPN and ways to use them
         VPN remote access
         Intranet VPN
         Extranet VPN
         3.2.5 An alternative classification of VPN  
         VPN overlapped and point to point
         VPN connection oriented and connection not-oriented
         VPN reliable and secure
   3.3 VPN technologies and protocols
         3.3.1 General problems of the protocols used for VPNs
         Protocols used
         IPsec Protocol
         3.3.2 Technologies and network protocols to enable VPN site-to-site
         3.3.3 Technologies and protocols for enabling network VPN remote access
         3.3.4 Using tunnelling process
   3.4 Basic requirements imposed for VPN
4 Analysis of interconnection methods in a communication network under specific VPN conditions  
   4.1 Interconnection issues
   4.2 Tunnelling technologies  
   4.3 Methods of transmission through VPN
   4.4 Methods of implementing a VPN
         4.4.1 Solution based on routers
         4.4.2 Solution based on firewalls
         4.4.3 Solution for dedicated hardware and software
   4.5 Tunnelling protocols
   4.6 VPN security
         4.6.1 Basics of VPN security
         4.6.2 Firewall and security policy
         4.6.3 IP Security
        IPSec standard
        IPSec Protocol
        The IP Authentication Header  
        IPsec keys
   4.7 MPLS technique
         4.7.1 MPLS presentation
         4.7.2 Basics of a VPN network based on MPLS  
         MPLS-VPN terminology
         LSP tunnels
         4.7.3 Operating Mode
         Labels distribution  
         The connection model
         Transfer mechanism and stages of building MPLS VPN
         4.7.4 VPN Traffic Engineering  
         Identification of VPN pairs
         Multiplexing multiple VPN on a LSP  
         4.7.5 Testing MPLS VPNs
         4.7.6 MPLS VPN Security
         4.7.7 Virtual networks based on MPLS
         Types of networks  
         SSL-VPN  Networks
         OpenNetwork VPN
         VPN Networks "Hamachi"
   4.8 Interconnection in specific VPN conditions
        4.8.1 VPN at the provider  
        4.8.2 VPN Services provided by Romtelecom  
        4.8.3 VPN services provided by Orange
        4.8.4 VPN Services provided by the National Society of Radiocommunications  
        4.8.5 VPN network developed by user
5 Methodologies and software tools for creating and analyzing VPN quality of services
   5.1 Introduction
        5.1.1 Elements that determine the quality of service
        5.1.2 QoS architecture and service levels
   5.2 Strategies for QoS  
        5.2.1 Overview of strategies  
        5.2.2 Packages classification  
        5.2.3 Congestion and bandwidth management
        5.2.4 Traffic Modelling
        5.2.5 Congestion Avoidance
        5.2.6 Tunnel problems and QoS signalling 
        5.2.7 Using SLA and CMPmetrics  
  5.3 QoS for MPLS VPN
        5.3.1 Need for QoS in MPLS-VPN
        5.3.2 QoS in CE
        5.3.3 QoS in PE and tunnelling methods
        5.3.4 QoS in bus network
        Differentiated services bus network
        Classes of Services  
  5.4 Conclusions
6 Specifying system requirements  
   6.1 Configuring VPN
         6.1.1 Configuring VPN on Linux  
         6.1.2 PPP and SSH
         6.1.3 Configuring VPN on Windows
         6.1.4 Open VPN on Windows
   6.2 Installing and configuring PPTP protocol in Windows NT 4.0
   6.3 Specifying requirements on overall system architecture
         6.3.1 General architecture of the system
         6.3.2 Specification of requirements for CERVIT-PPTP-VPN
         Specification on CERVIT-PPTP-VPN-H
         Specification on CERVIT-VPN-PPTP-S
         6.3.3 Specification of requirements for CERVIT Open VPN
   6.4 Case Studies  
         6.4.1 RIDMOD  projectís VPN
         6.4.2 Experiment VPN open virtual network  
         6.4.3 Conclusions
7 The projectís web page 
   7.1 Public section of the project
   7.2 Private section of the project  
8 References
List of acronyms used in the study


Phase 2:


Phase abstract



Phase 3:


Phase abstract