Sunday 18 March 2012

P2P protocol vpn

N2N is an encrypted layer two private network using a P2P protocol. Each N2N node has a name and a common encryption key pre-shared among the users that have been invited to join the network (community). Encryption is performed at edge nodes using open ciphers with user-defined encryption keys. This differs from popular applications like Skype and Hamachi where the traffic is encrypted by the application with no control by the application user. Skype developers can decode Skype traffic [13], which gives users a false sense of security. This does not happen with N2N where only users holding the private keys can decrypt the traffic. Each N2N user can simultaneously belong to multiple communities. Users will have an encryption key, MAC and IP address for each N2N community. Like most P2P protocols, N2N has one or more supernodes and several edge nodes. Supernodes are used  to introduce edge nodes and to cross symmetric NAT. N2N packets are encrypted/decrypted only by edge nodes and supernodes forward packets based on a clear-text packet header without inspecting the packet payload. This is a core differentiator of N2N. N2N can cross NAT and firewalls in the reverse traffic direction (i.e. from outside to inside) so N2N nodes become directly reachable from the community even if running on a private network. N2N communities are meant to be self-contained, but it is possible to route

0 Comments:

Post a Comment

Note: only a member of this blog may post a comment.

Subscribe to Post Comments [Atom]

<< Home

cheap vpn at www.vpntraffic.com only start from $1.99: P2P protocol vpn

Sunday 18 March 2012

P2P protocol vpn

N2N is an encrypted layer two private network using a P2P protocol. Each N2N node has a name and a common encryption key pre-shared among the users that have been invited to join the network (community). Encryption is performed at edge nodes using open ciphers with user-defined encryption keys. This differs from popular applications like Skype and Hamachi where the traffic is encrypted by the application with no control by the application user. Skype developers can decode Skype traffic [13], which gives users a false sense of security. This does not happen with N2N where only users holding the private keys can decrypt the traffic. Each N2N user can simultaneously belong to multiple communities. Users will have an encryption key, MAC and IP address for each N2N community. Like most P2P protocols, N2N has one or more supernodes and several edge nodes. Supernodes are used  to introduce edge nodes and to cross symmetric NAT. N2N packets are encrypted/decrypted only by edge nodes and supernodes forward packets based on a clear-text packet header without inspecting the packet payload. This is a core differentiator of N2N. N2N can cross NAT and firewalls in the reverse traffic direction (i.e. from outside to inside) so N2N nodes become directly reachable from the community even if running on a private network. N2N communities are meant to be self-contained, but it is possible to route

0 Comments:

Post a Comment

Note: only a member of this blog may post a comment.

Subscribe to Post Comments [Atom]

<< Home