In the projectís phase 1 was conducted a study with the table of content:

 

1 The objective of the project
   1.1 General Objectives  
   1.2 Objectives of Phase

2. Phase abstract

3 Study and analysis of developments in VPN
   3.1 Overview of VPN
         3.1.1 What is a VPN
         3.1.2 VPN philosophy
         3.1.3 The advantages of VPN
   3.2 The VPN structure
         3.2.1 Structure overview
         3.2.2 VPN architecture
         3.2.3 VPN topologies
         3.2.4 Types of VPN and ways to use them
                  3.2.4.1 VPN remote access
                  3.2.4.2 Intranet VPN
                  3.2.4.3 Extranet VPN
         3.2.5 An alternative classification of VPN  
                  3.2.5.1 VPN overlapped and point to point
                  3.2.5.2 VPN connection oriented and connection not-oriented
                  3.2.5.3 VPN reliable and secure
   3.3 VPN technologies and protocols
         3.3.1 General problems of the protocols used for VPNs
                  3.3.1.1 Protocols used
                  3.3.1.2 IPsec Protocol
         3.3.2 Technologies and network protocols to enable VPN site-to-site
         3.3.3 Technologies and protocols for enabling network VPN remote access
         3.3.4 Using tunnelling process
   3.4 Basic requirements imposed for VPN
4 Analysis of interconnection methods in a communication network under specific VPN conditions  
   4.1 Interconnection issues
   4.2 Tunnelling technologies  
   4.3 Methods of transmission through VPN
   4.4 Methods of implementing a VPN
         4.4.1 Solution based on routers
         4.4.2 Solution based on firewalls
         4.4.3 Solution for dedicated hardware and software
   4.5 Tunnelling protocols
   4.6 VPN security
         4.6.1 Basics of VPN security
         4.6.2 Firewall and security policy
         4.6.3 IP Security
                 4.6.3.1 IPSec standard
                 4.6.3.2 IPSec Protocol
                 4.6.3.3 The IP Authentication Header  
                 4.6.3.4 IPsec keys
   4.7 MPLS technique
         4.7.1 MPLS presentation
         4.7.2 Basics of a VPN network based on MPLS  
                  4.7.2.1 MPLS-VPN terminology
                  4.7.2.2 LSP tunnels
         4.7.3 Operating Mode
                  4.7.3.1 Labels distribution  
                  4.7.3.2 The connection model
                  4.7.3.3 Transfer mechanism and stages of building MPLS VPN
         4.7.4 VPN Traffic Engineering  
                  4.7.4.1 Identification of VPN pairs
                  4.7.4.2 Multiplexing multiple VPN on a LSP  
         4.7.5 Testing MPLS VPNs
         4.7.6 MPLS VPN Security
         4.7.7 Virtual networks based on MPLS
                  4.7.7.1 Types of networks  
                  4.7.7.2 SSL-VPN  Networks
                  4.7.7.3 OpenNetwork VPN
                  4.7.7.4 TincPN  
                  4.7.7.5 VPN Networks "Hamachi"
   4.8 Interconnection in specific VPN conditions
        4.8.1 VPN at the provider  
        4.8.2 VPN Services provided by Romtelecom  
        4.8.3 VPN services provided by Orange
        4.8.4 VPN Services provided by the National Society of Radiocommunications  
        4.8.5 VPN network developed by user
5 Methodologies and software tools for creating and analyzing VPN quality of services
   5.1 Introduction
        5.1.1 Elements that determine the quality of service
        5.1.2 QoS architecture and service levels
   5.2 Strategies for QoS  
        5.2.1 Overview of strategies  
        5.2.2 Packages classification  
        5.2.3 Congestion and bandwidth management
        5.2.4 Traffic Modelling
        5.2.5 Congestion Avoidance
        5.2.6 Tunnel problems and QoS signalling 
        5.2.7 Using SLA and CMPmetrics  
  5.3 QoS for MPLS VPN
        5.3.1 Need for QoS in MPLS-VPN
        5.3.2 QoS in CE
        5.3.3 QoS in PE and tunnelling methods
        5.3.4 QoS in bus network
                 5.3.4.1 Differentiated services bus network
                 5.3.4.2 Classes of Services  
  5.4 Conclusions
6 Specifying system requirements  
   6.1 Configuring VPN
         6.1.1 Configuring VPN on Linux  
         6.1.2 PPP and SSH
         6.1.3 Configuring VPN on Windows
         6.1.4 Open VPN on Windows
   6.2 Installing and configuring PPTP protocol in Windows NT 4.0
   6.3 Specifying requirements on overall system architecture
         6.3.1 General architecture of the system
         6.3.2 Specification of requirements for CERVIT-PPTP-VPN
                  6.3.2.1 Specification on CERVIT-PPTP-VPN-H
                  6.3.2.2 Specification on CERVIT-VPN-PPTP-S
         6.3.3 Specification of requirements for CERVIT Open VPN
   6.4 Case Studies  
         6.4.1 RIDMOD  projectís VPN
         6.4.2 Experiment VPN open virtual network  
         6.4.3 Conclusions
7 The projectís web page 
   7.1 Public section of the project
   7.2 Private section of the project  
8 References
List of acronyms used in the study


 

Phase 2:

 

Phase abstract

 

 

Phase 3:

 

Phase abstract