Nobody downloaded yet

Securing Data using IPSEC VPN over Satellite Communication - Research Proposal Example

Comments (0) Cite this document
Summary
Cyber attacks are becoming more common with the lapse of time and data protection has emerged as a major issue in today’s world of IT and telecommunications. That is why organizations now prefer to establish their own, private networks. Virtual private network or VPN…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Securing Data using IPSEC VPN over Satellite Communication
Read TextPreview

Extract of sample "Securing Data using IPSEC VPN over Satellite Communication"

Download file to see previous pages Special focus will be put on Internet Protocol Security or IPSec protocol suite based VPN technology.
A VPN is a kind of relatively secure network communication system. With the help of tunneling techniques (for example, HTTP tunnel), tunneling protocols (Layer 2 Tunneling Protocol or L2TP), IPSec technology, etc., a VPN is capable of operating as a secure and cost-effective network even inside the framework of a public network infrastructure (Bentley Walker 2012). Providers are now establishing VPN compatible with satellite communication systems (Siris, Ververidis, and Polyzos 2013). However, according to Fereidooni, Taheri, and Mahramian (2012:228):
“In essence, a VPN provides a secured tunnel between two end points across a public network. The protocols used over the Internet (TCP/IP) are designed for reliable end-to-end data delivery over unreliable and congested networks … However, satellite bears a high latency (delay) medium and TCP response to such latency is not in a determined way.”
In general, satellite modems are utilized for operating a VPN over satellite. These modems help to send TCP/IP data in the form of radio frequency or RF. They also help in receiving TCP/IP data from the RF signals. This kind of network communication system is termed as the “VPN over satellite” (Bentley Walker 2012, paragraph 1; Ground Control 2014) technology, which has become a crucial necessity for remote users.
While analyzing the security issues around VPN, Zhu and Ma (2004) stated that public key infrastructure (PKI) can be especially helpful along with dedicated network level key exchange protocols to enhance data protection. Within a few years, Demirel, Alagoz, and Ufuk (2006) stated that flow identification methods too are crucial for IPSec VPN technology operated via satellites. Much later, Fereidooni et al (2009) developed an enhanced ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Securing Data using IPSEC VPN over Satellite Communication Research Proposal”, n.d.)
Securing Data using IPSEC VPN over Satellite Communication Research Proposal. Retrieved from https://studentshare.org/information-technology/1657225-securing-data-using-ipsec-vpn-over-satellite-communication
(Securing Data Using IPSEC VPN over Satellite Communication Research Proposal)
Securing Data Using IPSEC VPN over Satellite Communication Research Proposal. https://studentshare.org/information-technology/1657225-securing-data-using-ipsec-vpn-over-satellite-communication.
“Securing Data Using IPSEC VPN over Satellite Communication Research Proposal”, n.d. https://studentshare.org/information-technology/1657225-securing-data-using-ipsec-vpn-over-satellite-communication.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Securing Data using IPSEC VPN over Satellite Communication

Data Communication assignment - 4G

...of entertaining multiple users at the same time and brings about more stability and reliability in the network. The use of Fast Fourier Transform (F.F.T) by the incumbent allows increased number of bits being transformed from one source to another (spectral efficiency) .802.16d made use of OFDM while the later version (802.16e) uses OFDMA which enables multiple accesses. The distribution of subcarriers enables all the users to send and receive data simultaneously. MIMO (Multiple Input Multiple Output): The MIMO features allows usage of relatively more number of antennas hence support for increased number of customers on the link as well as increased signal strength,...
4 Pages(1000 words)Essay

Satellite Technology

...is recognized as "line of sight data transfer and communication." If somebody in San Francisco attempts to beam a microwave data signal straightly to Hawaii, this will not be possible to send signals at such distance, in fact that the signal will disappear into space or dispel into the sea. Over small distance, we set microwave towers in each 25 miles or make use of "repeaters" to replicate and improve the quality of data or information signal (Gulf of Maine Research Institute; Maral and Bousquet). In addition, one of the most important functionalities of satellite technology is the GPS system. Additionally, the...
7 Pages(1750 words)Research Paper

IPSec and Cryptography

...?Running head: Research Paper, Computer Sciences and Information Technology Research Paper, Computer Sciences and Information Technology IPSec and Cryptography Introduction The major source of security for the IP network layer is the Internet protocol security (IP sec). This implies that the security of all the IP packets is granted, regardless of the superiority of the protocol being transported in the packet payloads. When using the internet security protocol, the applications do not require further reengineering. This is because; the security offered by the IPsec can be made transparent to final users....
5 Pages(1250 words)Research Paper

Alfalfa hay yield prediction using yield monitor data and satellite imagery

...., 1990. Operational satellite environmental monitoring for food security by FAO, The ARTEMIS System, FAO Remote Sensing Centre, Rome, Italy Jackson, R. D. and A. R. Huete (1991), “Interpreting vegetation index”, Preventive Veterinary Medicine, vol.11: 185-200. Kalubarme, M. H., M. B. Potdar, K. R. Manjunath, R. K. Mahey and S. S. Siddhu (2003), “Growth profile based crop yield models: a case study of large area wheat yield modelling and its extendibility using atmospheric corrected NOAA AVHRR data”, International Journal of Remote Sensing, vol 24, N0. 10, pp. 2037 – 2054. Kumar, M., Monteith, J.L., 1982. Remote Sensing of Crop Growth, in Plants and the Daylight Spectrum....
8 Pages(2000 words)Research Paper

Data Communication & the Cloud

... Lecturer: Topic: Data communication is a term used to refer to the exchange of data between two devices that happens via some form of transmission medium, could be a wire cable or internet medium, which are part of a system of the communicating devices made up of a combination of hardware – physical equipment – and software – programs installed on these devices that enable the effectiveness of data communication systems which depend on the characteristics such as delivery, accuracy, timeliness and jitter,1. Delivery system must deliver data to the correct destination and data must be received by the intended device or user and only by that device or user and the accuracy aspect determines the delivery of the data in such a way... in...
6 Pages(1500 words)Research Paper

VPN Virtual Private Network

.... every 30 minutes – for as long as the communication is open. This “ensures the encryption keys used rotate before enough data has been transferred to enable any possibility of the VPN being hacked. (Café Networks, 2007)” Secure VPNs follow a number of protocols namely (Wikipedia, 2007): IPsec (IP security) - commonly used over IPv4, and an obligatory part of IPv6. SSL/TLS used either for tunneling the entire network stack, as in the OpenVPN project, or for securing what is, essentially, a web proxy. SSL is a framework more often...
6 Pages(1500 words)Essay

Satellite Centers

...Center personnel are expected to be a regular presence in the school. Their task is to build the capacity of the members of the school community to engage in the accelerated process. The Challenges Our Satellite Centers have experienced some of the same problems documented in the literature. They have encountered school and university cultures which do not facilitate collaboration. They have encountered teacher concerns about the costs versus the benefits of such radical change in their institutions. They have had to work with a crippling teacher strike and address the issue of rebuilding teacher morale and cohesiveness before continuing on with the project. They have met with instances of administrator...
3 Pages(750 words)Essay

Data Structure Using C++

...); (b) cout<data. Efficiency of an algorithm is usually characterized by its order. (Daintith 2004). Big-O notation is used to express an ordering property among functions. The functions are the amount of resources consumed by an algorithm during the execution and are usually represented by T(N). In other words, we can define T(N) as the amount of resource (such as time or the count of some specific operation) consumed by the algorithm... when an input is of size N. In the context of the above brief discussion, Big O notation can be defined as a description of the growth rate of the order of a function T(N) as N becomes very large (Ellard 1997). iv. Can we declare pointers to other data types like classes and structures? What is the difference between class and structure? Solution: Yes, in C++ we can declare pointers to other data types such as classes and structure. In C++, the only difference between classes and structures is that all the members and base classes in structure are public by default, whereas, classes have private members and base classes by default. Question 2: i. Define Dynamic Objects? How to create and...
8 Pages(2000 words)Essay

Data Communication Using the Top-Down Approach

...Data Communication Using the Top-Down Approach Abstract This paper takes a look at Equity which is a mortgage broker company and their data communication using computer networks. This design also known as a step wise design is particularly common in the modern world which starts with an overview of the entire system before specifying any details the subsystems. Lately the business has adopted a top down approach which has proved to be more efficient and hugely less costly. This paper seeks to explain its advantages as well as disadvantages and in conclusion recommends whether they should continue with this approach or adopt a new one....
2 Pages(500 words)Essay

Data Communication and Networking

... Data Communication and networking 1a) VLAN Hopping VLAN hopping is a method of gaining entry to a network by sending packets to a port that cannot be accessed from an end system. The process occurs through utilization of the autotrunking feature in DTP or through frames that are embedded with double 802.1Q tags in switches. 1b) ARP Poisoning This attack takes place by poisoning/feeding the address resolution protocol by the attackers MAC address. When the attack is successful, the victim devices send all their information to the attacker as they communicate to other devices. 1c) MAC spoofing MAC spoofing entails the process of changing the MAC address of a network card on a certain computer through various techniques. Using... is an...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Proposal on topic Securing Data using IPSEC VPN over Satellite Communication for FREE!

Contact Us