Mobile virtual private network
   HOME

TheInfoList



OR:

A mobile virtual private network (mobile VPN or mVPN) is a
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
which is capable of persisting during sessions across changes in physical connectivity, point of network attachment, and IP address.Phifer, Lisa
"Mobile VPN: Closing the Gap"
''SearchMobileComputing.com'', July 16, 2006. Accessed July 25, 2009
The "mobile" in the name refers to the fact that the VPN can change points of network attachment, not necessarily that the mVPN client is a mobile phone or that it is running on a wireless network.Introduction to MVPN
/ref> Mobile VPNs are used in environments where workers need to keep application sessions open at all times, throughout the working day, as they connect via various wireless networks, encounter gaps in coverage, or suspend-and-resume their devices to preserve battery life. A conventional
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
cannot survive such events because the network tunnel is disrupted, causing applications to disconnect, time out, fail, or even the computing device itself to
crash Crash or CRASH may refer to: Common meanings * Collision, an impact between two or more objects * Crash (computing), a condition where a program ceases to respond * Cardiac arrest, a medical condition in which the heart stops beating * Couch su ...
.Cheng, Roger
"Lost Connections"
''
The Wall Street Journal ''The Wall Street Journal'' is an American business-focused, international daily newspaper based in New York City, with international editions also available in Chinese and Japanese. The ''Journal'', along with its Asian editions, is published ...
'', December 11, 2007. Accessed July 25, 2009
Mobile VPNs are commonly used in
public safety Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensur ...
, home care, hospital settings, field service management,
utilities A public utility company (usually just utility) is an organization that maintains the infrastructure for a public service (often also providing a service using that infrastructure). Public utilities are subject to forms of public control and ...
and other industries. Increasingly, they are being adopted by mobile professionals and
white-collar worker A white-collar worker is a person who performs professional, desk, managerial, or administrative work. White-collar work may be performed in an office or other administrative setting. White-collar workers include job paths related to government, ...
s.


Comparison with other VPN types

A
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
maintains an authenticated, encrypted tunnel for securely passing data traffic over public networks (typically, the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
.) Other VPN types are
IPsec In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in ...
VPNs, which are useful for point-to-point connections when the network endpoints are known and remain fixed; or SSL VPNs, which provide for access through a
Web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used o ...
and are commonly used by remote workers. Makers of mobile VPNs draw a distinction between remote access and mobile environments. A remote-access user typically establishes a connection from a fixed endpoint, launches applications that connect to corporate resources as needed, and then logs off. In a mobile environment, the endpoint changes constantly (for instance, as users roam between different cellular networks or
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wav ...
access points). A mobile VPN maintains a virtual connection to the application at all times as the endpoint changes, handling the necessary network logins in a manner transparent to the user.


Functions

The following are functions common to mobile VPNs.


Management

Some mobile VPNs offer additional "mobile-aware" management and security functions, giving
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of Data (computing), data . and information. IT forms part of information and communications technology (ICT). An information te ...
departments visibility and control over devices that may not be on the corporate premises or that connect through networks outside IT's direct control.


Industries and applications

Mobile VPNs have found uses in a variety of industries, where they give mobile workers access to software applications.


In telecommunications

In
telecommunication Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that fe ...
, a mobile VPN is a solution that provides data user mobility and ensures secure network access with predictable performance. Data user mobility is defined as uninterrupted connectivity or the ability to stay connected and communicate to a possibly remote data network while changing the network access medium or points of attachment. In 2001,
Huawei Huawei Technologies Co., Ltd. ( ; ) is a Chinese multinational technology corporation headquartered in Shenzhen, Guangdong, China. It designs, develops, produces and sells telecommunications equipment, consumer electronics and various smar ...
launched a product named "MVPN". In this case "MVPN" had a different meaning from the way that later industry sources would use the term. The Huawei product was focused on delivering a seamless corporate phone system to users whether they were on desktop phones or mobile devices. Although the web page is no longer available, the company advertised that their MVPN had the following advantages over a standard phone system: * Direct connectivity – the corporate network becomes part of
mobile operator A mobile network operator (MNO), also known as a wireless service provider, wireless carrier, cellular company, or mobile network carrier, is a provider of wireless communications services that owns or controls all the elements necessary to sel ...
's network through direct connection * Private numbering plan – the communication is tailored to company organization * Corporate Business Group – all offices and employees are part of one common group, that includes all mobile and desk phones * Short dialing – a short
number A number is a mathematical object used to count, measure, and label. The original examples are the natural numbers 1, 2, 3, 4, and so forth. Numbers can be represented in language with number words. More universally, individual numbers c ...
to access each employee, no meter on his mobile or desk phone * Smart Divert – easy divert within company group * Groups and subgroups – Several sub-groups could be defined within the group with different changing as well as with separate
numbering plan A telephone numbering plan is a type of numbering scheme used in telecommunication to assign telephone numbers to subscriber telephones or other telephony endpoints. Telephone numbers are the addresses of participants in a telephone network, reac ...
* Calls control – certain destinations could be allowed or barred both on mobile and desk phones.


Vendors

* Bittium * Columbitech *
Connectify Connectify () is an American software company that develops networking software for consumers, professionals and companies. Connectify Hotspot is a virtual router software for Microsoft Windows, and Speedify is a mobile VPN service with channel ...
*
Ericsson (lit. "Telephone Stock Company of LM Ericsson"), commonly known as Ericsson, is a Swedish multinational networking and telecommunications company headquartered in Stockholm. The company sells infrastructure, software, and services in informa ...
*
NeoAccel NeoAccel is a multinational company that sells computer network security products direct to the end-user and through OEM relationships. The company is best known for its SSL VPN-Plus product and related ICAA & TSSL technology. In Jan 2011 NeoA ...
*
NetMotion Wireless NetMotion Software, formerly NetMotion Wireless, is a privately held software company specializing in network security. History NetMotion Wireless was formed in 2001 as a spin-off for wireless software from WRQ (based in Seattle, Seattle, Washing ...
* Radio IP Software *
Smith Micro Software Smith Micro Software, Inc., founded in 1982 by William W. Smith, Jr., is a developer and marketer of both enterprise and consumer-level software and services. Headquartered in Pittsburgh, Pennsylvania, Smith Micro maintains multiple domestic and ...
*Tmharay


References


External links


VPN Consortium

"An Introduction to IPsec VPNs on Mobile Phones"
by Ramon Arja, '' MSDN Magazine'', September 2009
The Different VPN Networks And Their Funcationality




by Tom Johnaton, ''
Network World International Data Group (IDG, Inc.) is a market intelligence and demand generation company focused on the technology industry. IDG, Inc.’s mission is centered around supporting the technology industry through research, data, marketing technol ...
'' (24 November 2006) {{DEFAULTSORT:Mobile Virtual Private Network GSM standard Internet privacy Mobile technology Network architecture Virtual private networks