N2N: A Layer Two Peer-to-Peer VPN

The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users' reachability are almost entirely managed and limited by access providers. From the user's perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to-peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems.

[1]  Glen Zorn,et al.  Securing L2TP using IPsec , 2001, RFC.

[2]  Anjali Gupta,et al.  One Hop Lookups for Peer-to-Peer Overlays , 2003, HotOS.

[3]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[4]  T. Dierks,et al.  The TLS protocol , 1999 .

[5]  Yakov Rekhter,et al.  BGP/MPLS IP Virtual Private Networks (VPNs) , 2006, RFC.

[6]  Danny McPherson,et al.  VLAN Aggregation for Efficient IP Address Allocation , 2001, RFC.

[7]  Glen Zorn,et al.  Point-to-Point Tunneling Protocol , 1999 .

[8]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[9]  - 1-Peer-to-Peer Overlay Networks : A Survey , 2003 .

[10]  Adam Wierzbicki,et al.  Guest editors' introduction: Foundation of peer-to-peer computing , 2008, Comput. Commun..

[11]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[12]  Joseph D. Touch Those Pesky NATs , 2002, IEEE Internet Comput..

[13]  Dino Farinacci,et al.  Generic Routing Encapsulation (GRE) , 2000, RFC.

[14]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[15]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[16]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[17]  Andrew G. Malis,et al.  A Framework for IP Based Virtual Private Networks , 2000, RFC.

[18]  Glen Zorn,et al.  Point-to-Point Tunneling Protocol (PPTP) , 1999, RFC.

[19]  Peter Druschel,et al.  Exploiting network proximity in peer-to-peer overlay networks , 2002 .

[20]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[21]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[22]  Daniel H. Steinberg,et al.  Zero Configuration Networking: The Definitive Guide , 2005 .

[23]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[24]  Xiaozhou Li,et al.  On name resolution in peer-to-peer networks , 2002, POMC '02.