StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Differences between a VPN Router and a VPN Server - Assignment Example

Cite this document
Summary
The author of the paper "Differences between a VPN Router and a VPN Server" will begin with the statement that certain differences are apparent between a VPN router and a VPN server. These differences are notable relating to the case of the Cisco VPN concentrator. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Differences between a VPN Router and a VPN Server
Read Text Preview

Extract of sample "Differences between a VPN Router and a VPN Server"

Network Management - Quiz 9 Differences between a VPN Router and a VPN Server Certain differences are apparent between a VPN router and a VPN server. These differences are notable relating to the case of Cisco VPN concentrator. In this regard, it is eminent that VPN router supports the devices like computers, smart phones, tablets and others to VPN service. Cisco VPN router requires to install VPN clients on each of the above stated devices. Although a VPN router provides security for business communication, it also supports in providing added security to multidimensional nodes along with networks. Specially mentioning, VPN server of Cisco provides added security and encrypted networks. This is supportive when devices are of distant locations possessing varied IP addresses. Furthermore, VPN server provides cost benefits to the organisations operating in the technology sector (Senft, Gallegos & Davis, 2012; Ray & Acharya, 2004). 2. Explanation of the Remote Access VPN Scenario 2.1 Contained in the Destination IP Field of the Packet’s Header It is to be affirmed that when the message leaves program X in the form of a packet, the Destination IP field of the packet’s header contained 14 IP fields. In this regard, 13 fields are required to be considered and the 14th field is optional (Senft et al., 2012; Ray & Acharya, 2004). 2.2 Contained in the Destination Port Field of the Packet’s Header When the message leaves program X in the form of a packet, it is worth mentioning that the Destination Port field of the packet’s header comprises destination IP address. It must be mentioned that the packet’s header does not contain any destination name (Senft et. al., 2012; Ray & Acharya, 2004). 2.3 Determination of the Payload of the Packet is Encrypted or Not Based on the provided scenario, it can be affirmed that when the message leaves program X in the form of a packet, the payload of the packet is not encrypted. This might be owing to the reason that the server program of Y executed on the application server is deemed to be a readable one (Senft et. al., 2012; Ray & Acharya, 2004). 2.4 Determination of the Program Z With regards to the provided scenario, the program Z could be reckoned as Message Transfer Agent. Message Transfer Agent is a type of software, which transfers electronic messages from one particular device to others (Senft et. al., 2012; Ray & Acharya, 2004). 2.5 Action of Program Z against the Packet After the Message Transfer Agent i.e. Z gets the packet, it will work upon the message transfer process for ensuring that the messages are transmitted from one specific user to others (Senft et. al., 2012; Ray & Acharya, 2004). 2.6 Explanation of Info W In the process of message transfer from X to Y, the Message Transfer Agent i.e. Z needs to let the VPN server TO authenticate Alice. In this regard, it is essential that Z must require sending information to Administrative Management Domain (ADMD). ADMD is denoted as Z in the current context. It must be mentioned that ADMD is a vast public telecommunication message carrier. The primary role of this tool is to authenticate sender’s message (Senft et. al., 2012; Ray & Acharya, 2004). 2.7 Description of the Name of Server T In the current scenario, after the VPN server receives info W, the VPN server will forward W to another server T. This T is known as Domain Name System (DNS). DNS is a form of naming system based on distributed hierarchy of computers, services or other form of resources connected with private network or internet (Senft et. al., 2012; Ray & Acharya, 2004). 2.8 Contained in the Destination IP Field of the Packet’s Header After the VPN server obtains a positive reply from server T, it will communicate to program Z about Alice to be a legitimate employee. It is important to note that the program Z sends the message to the VPN server. However, when the message leaves program Z, the Destination IP field of the packet’s header contains variable number of options with specifying headers’ size. It is worth mentioning that the minimum value for the current field is 5. This suggests of 160 bits equivalent to 20 bytes (Senft et. al., 2012; Ray & Acharya, 2004). 2.9 Contained in the Payload of the Packet When the message leaves program Z, the payload of the packet contains overhead, which requires getting the packet for its destination. This is necessary for the communications layers that require certain portion of overhead data for sending the message (Senft et. al., 2012; Ray & Acharya, 2004). 2.10 Handling of the Packet by the VPN Server There are certain steps through which VPN server can handle the packet. In this regard, the primary step is to initiate setup for VPN server. This server is required to get connected with every device. The subsequent step of the process is the installation of router and access remote service. The other step is remote authentication as well as forwarding different options. The next step in the process is the configuration of remote access of network policies. The last step is the enabling of NAT, which is optional (Senft et. al., 2012; Ray & Acharya, 2004). 2.11 Reason for Not Forwarding Message to Server T by the VPN Server The VPN server does not want to forward message to server T. This might be owing to the reason that it may lead towards the possibility of accessing protected information or resources of the organisations or the users. This eventually creates a significant loss to the users. Thus, VPN server does not want to forward message to T (Senft et. al., 2012; Ray & Acharya, 2004). 2.12 Contained in the Source IP Field of the Packet When the message leaves the VPN server, the Source IP field of the packet contains a specified IP address, which tends to carry the routing of the packet (Senft et. al., 2012; Ray & Acharya, 2004). 2.13 Number of Times of the Message Been Encrypted During the whole process of message transfer, there are only two times when the message has been encrypted. The reason behind such is the protection and security of the same (Senft et. al., 2012; Ray & Acharya, 2004). 2.14 Number of Times of the Message Been Decrypted In the course of message transfer, there are two times when the message has been decrypted. This is also because ensuring greater protection of the message from the senders to the receivers (Senft et. al., 2012; Ray & Acharya, 2004). References Ray, A. K., & Acharya, T. (2004). Information technology: Principles and applications. New Delhi: PHI Learning Pvt. Ltd. Senft, S., Gallegos, F., & Davis, A. (2012). Information technology control and audit, fourth edition. The United States: CRC Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Management - Quiz 9 Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Network Management - Quiz 9 Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1687308-network-management-quiz-9
(Network Management - Quiz 9 Assignment Example | Topics and Well Written Essays - 1000 Words)
Network Management - Quiz 9 Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1687308-network-management-quiz-9.
“Network Management - Quiz 9 Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1687308-network-management-quiz-9.
  • Cited: 0 times

CHECK THESE SAMPLES OF Differences between a VPN Router and a VPN Server

Anatomy of an Internet Routing Protocol

The WAN link that is joining the two networks needs a router in order to divide a subnet.... This research will begin with the statement that the specialized and trained networking professionals need to recognize subnetting.... The network performance can be enhanced by understanding TCP/IP subnetting and this can be achieved by splitting up collision and broadcast domains....
13 Pages (3250 words) Coursework

Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks

MANET is defined as 'Mobile Ad Hoc Network (MANET) refers to a type of mobile network in which each node has the ability to act as a router, permitting adaptable multi-hop communications' [3].... However, AODV does not maintain the database for routing information in the router.... Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router.... An automated system known as a mobile ad-hoc network (MANET) is integrated within the wireless networks to establish communication between wireless nodes or access points....
35 Pages (8750 words) Term Paper

Communication Process with X-Stream Server

This essay "Communication Process with X-Stream server" is about present-day networks that are so big and widespread that they cannot be owned by a single business entity rather multiple entities look after their part of the network to bridge the gap between various far of networks.... A remote user starts this process by accessing the X-Stream server through internet explorer.... This access request is interpreted at the Application Layer, by HyperText Transfer Protocol (HTTP) and it is destined for HTTP Port 80 at X-Stream server....
5 Pages (1250 words) Essay

Increasing Security with Limited User Accounts and Restricted Groups

For building a WAN we have to use a router in each underwriting company and DULL, since Ethernet connections cannot be used as they only support a distance of 100 meters and the all the four companies including DULL, are at a distance of 10 km so an individual router is to be installed at the four companies which give connectivity to their individual LAN with the other LANs.... (Wendell Odom, CCNA Intro, CCIE, Exam Certification Guide) Now the three underwriter companies and the DULL have to buy a Cisco router each....
9 Pages (2250 words) Research Paper

Networking Infrastructure

With the DHCP configured on the network, a client computer can simply indicate that it wants to use DHCP and the DHCP server can provide it's IP address, network mask, DNS server, router and other information needed to get up and running on the network.... These areas are physically separated and IP traffic between them is run over a router with enabled packet-filtering controlled by the LS (log in server).... The client will be connected to UNIX based server (i....
15 Pages (3750 words) Essay

Virtual Private Network

a vpn can send data e.... A well-designed VPN can greatly benefit a company by: Aside from a well-designed VPN, the advantages of implementing and deploying a vpn in an enterprise means 'cost savings because organizations no longer have to use expensive leased or frame relay lines and are able to connect remote users to their corporate networks via a local ISP instead of via expensive 800-number or long distance calls to resource-consuming modem banks.... Since they are now self-contained, this VPN hardware does not require an additional connection to a network and therefore cuts down on the use of a file server and LAN, which makes everything run a bit more smoothly....
5 Pages (1250 words) Essay

Critical evaluation of Intercontinental hotel network

All the computers will be connected to the main server.... The upgraded network will utilize cutting edge technologies such as Dynamic Host Configuration Protocol (DHCP), Virtual LAN (VLAN), Virtual Private Network (vpn) and Voice over IP (VoIP) over the network....
48 Pages (12000 words) Essay

IP-SEC Site to Site VPN Connectivity

Multiple sites can be connected using a vpn just like WAN (Wide Area Network) over a large distance, and they are usually used for extending intranets worldwide with the aim of disseminating news and information to a wider user base.... There are benefits provided by a vpn that is available from the public Internet or a wide area network.... This article "IP-SEC Site to Site vpn Connectivity" presents Site-to-site virtual private networks (vpn) tunnels that have been adopted for secure data, voice, and video transmission between two areas or sites, for example, branches or offices....
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us