Leveraging an open VPN technology to end user / Md Ikhwan Hamdan

The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the lat...

Full description

Saved in:
Bibliographic Details
Main Author: Hamdan, Md Ikhwan
Format: Thesis
Language:English
Published: 2010
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.27719
record_format uketd_dc
spelling my-uitm-ir.277192022-06-14T04:05:03Z Leveraging an open VPN technology to end user / Md Ikhwan Hamdan 2010 Hamdan, Md Ikhwan Electronic Computers. Computer Science Programming. Rule-based programming. Backtrack programming The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the latest P2P technology involves "many to one" model which predominantly exists in BitTorrent and its clones. This has been a very innovative approach. Meanwhile in 2001 Streamyx began to bring broadband to Malaysia. This quickly attracted many waiting users which gradually boost up its one millionth subscribers around 2007. However sometimes in 2006 Streamyx began to impose packet filtering without notice in trend with most world ISPs. During that time most users began to express their grouse. The issue has been also vigorously highlighted by a couple of local press. Meanwhile the ISP alleges that the international lines are at fault which coincidentally coincides with the Taiwan earthquake in 2006 and another incident of cable fault in Middle East in 2008. However according to Cisco Systems the issue of slow internet connection to end user which deprived its user to enjoy its prescribed capacity as promised is not an issue unless ISP has abide to the procedure of good network infrastructure. Apparently for ISP to impose packet filtering there are various methods available. Currently the Deep Packet Inspection (DPI) method is the most advanced option up-to date to prevent rampant P2P activities. Realizing the method used many P2P authors began to include an encrypted technology in their products. However it has not given much effect to counter DPI. Hence with the issue of limited capacity to broadband service for end user this paper is undertaking a task to address it. After much thought one of the most promising technology in focus is Virtual Private Network (VPN). This technology has been mainly adopted by most corporate users and has the capability of a powerful encrypted traffic and secured network environment. Thus this paper is basically to show that by leveraging on the strength of VPN the end user has now an option to circumvent and address the stated issue indefinitely. In this context there are two VPN options available. They are the Propriety and an Open Source VPN. However to keep the cost Iowan Open Source VPN plus a couple of other software are implemented. The result is shown in this paper with success to benefit the end users in general. 2010 Thesis https://ir.uitm.edu.my/id/eprint/27719/ https://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf text en public masters Universiti Teknologi MARA Faculty of Computer and Mathematical Sciences
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
topic Electronic Computers
Computer Science
Electronic Computers
Computer Science
spellingShingle Electronic Computers
Computer Science
Electronic Computers
Computer Science
Hamdan, Md Ikhwan
Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
description The vital part of internet to end user is file-sharing. This activity has been active ever since the beginning of the evolution of internet. Significantly during 1999 to 2003 era many P2P authors began to enhance the technology which has attained four generations in that period. Incidentally the latest P2P technology involves "many to one" model which predominantly exists in BitTorrent and its clones. This has been a very innovative approach. Meanwhile in 2001 Streamyx began to bring broadband to Malaysia. This quickly attracted many waiting users which gradually boost up its one millionth subscribers around 2007. However sometimes in 2006 Streamyx began to impose packet filtering without notice in trend with most world ISPs. During that time most users began to express their grouse. The issue has been also vigorously highlighted by a couple of local press. Meanwhile the ISP alleges that the international lines are at fault which coincidentally coincides with the Taiwan earthquake in 2006 and another incident of cable fault in Middle East in 2008. However according to Cisco Systems the issue of slow internet connection to end user which deprived its user to enjoy its prescribed capacity as promised is not an issue unless ISP has abide to the procedure of good network infrastructure. Apparently for ISP to impose packet filtering there are various methods available. Currently the Deep Packet Inspection (DPI) method is the most advanced option up-to date to prevent rampant P2P activities. Realizing the method used many P2P authors began to include an encrypted technology in their products. However it has not given much effect to counter DPI. Hence with the issue of limited capacity to broadband service for end user this paper is undertaking a task to address it. After much thought one of the most promising technology in focus is Virtual Private Network (VPN). This technology has been mainly adopted by most corporate users and has the capability of a powerful encrypted traffic and secured network environment. Thus this paper is basically to show that by leveraging on the strength of VPN the end user has now an option to circumvent and address the stated issue indefinitely. In this context there are two VPN options available. They are the Propriety and an Open Source VPN. However to keep the cost Iowan Open Source VPN plus a couple of other software are implemented. The result is shown in this paper with success to benefit the end users in general.
format Thesis
qualification_level Master's degree
author Hamdan, Md Ikhwan
author_facet Hamdan, Md Ikhwan
author_sort Hamdan, Md Ikhwan
title Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_short Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_full Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_fullStr Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_full_unstemmed Leveraging an open VPN technology to end user / Md Ikhwan Hamdan
title_sort leveraging an open vpn technology to end user / md ikhwan hamdan
granting_institution Universiti Teknologi MARA
granting_department Faculty of Computer and Mathematical Sciences
publishDate 2010
url https://ir.uitm.edu.my/id/eprint/27719/1/TM_MD%20IKHWAN%20HAMDAN%20CS%2010_5.pdf
_version_ 1783734000521576448