StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Virtual Private Network - Case Study Example

Cite this document
Summary
This case study "Virtual Private Network" focuses on virtual private network which is a part of telecommunication engineering. The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the VPN and compare their strengths and weakness among others…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Virtual Private Network
Read Text Preview

Extract of sample "Virtual Private Network"

Paper Virtual private network Introduction The discussion in this paper will focus virtual private network which is part of telecommunication engineering. I have the interest of knowing how the virtual private network works and the existing typologies. Virtual private network is delineated as networking which applies the use of public telecommunication infrastructure like internet to provide individuals or remote offices with secure access to their individual or organizations network. The main aim of virtual private network is to help in providing organizations with similar capabilities but at lower costs. It works through the use of the shared public platform as it maintains its privacy through some specific tunneling protocols and security procedures such as the Layer Two Tunneling protocol. In effect the protocols send the data via tunnels which cannot be entered by any form of data which is not properly encrypted (Behringer & Morrow 25). The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the VPN and compare their strengths and weakness among others. Discussion A virtual private network adopts the use of public network such as internet in the connection of sites and remote users. The main advantages associated with the use of VPN are its low cost and scalability. It combines the entire processes of tunneling, encryption, authentication, access control technologies and other services which are being used in the carriage of internet, a provider’s backbone or managed Internet protocol. The traffic usually reaches these the backbones through application of a number of technologies which includes frame relay, ISDN, T1Simple dial up access or ATM. (Behringer & Morrow 17) It is the extension of various private networks which encompasses various links which exists across various shared networks. It makes it possible in the sharing of data between computers in a way which copies various properties of point to point private network. The VPN connections make it possible for the users to connect in a secure fashion with another remote corporate server which applies the use of routine platform provided by the public internet work. It is also perceived as the point of connection between user’s computer and the main corporate server. (Behringer & Morrow 91) The technology of VPN also makes it possible for the corporate to connect to its branch offices or to other organizations as it also ensures the maintenance of secure communication. The communication which occurs across the internet often works or operates as a wide area network (WAN) existing between sites. VPN technology is often designed to assist in addressing various issues affecting current trends in business towards distributed global operation and upsurge in telecommunicating where requiring workers to be in a position to connect to central resources. It makes it possible for various employees to connect to the firm’s computing resources irrespective of their location. (Behringer & Morrow 81) VPN TYPOLOGY Topology is defined as the shape of a given network or a specific network layout. It explains how various different nodes in a particular network are connected, procedures and methods of communication. Three most common typologies are; Hub and Spoke In this type of typology, all the existing remote sites connect to the head office sites. The remotes are similar to the spokes which are in a bicycle wheel. In the cases of multi site VPN, this kind of typology is the most common. The central hub will make it possible for connectivity from the remote to the hub and vice versa. It also acts as a particular gateway for the available remote sites which are necessary when communicating with one another through the hub. Meshed VPN Topology This topology requires a lot of work though the most reliable kind of topology. In this topology all the existing sites are in one way connected to one another. There is no existing hub. In the first one, if the hub disappears or there arises any connection problem with the hub, all sites will have no connectivity. In this case there is no hub and therefore if there is any hardware failure on the site then it is only that particular site that will be down and all other sites will still be in a position to communicate with one another. In each of the site, it is important to specify all the existing sites and then ensure the creation of the required phases. In more sites though there are a number of connections and this can rapidly multiply making it possible to manage. (Behringer & Morrow 103) Point to Point VPN Topologies Here the existing devices communicate with ease and directly. It is not necessary to have the option of IPsec fall over as in other topologies. To establish it, one needs to ensure there is the specification of two main end points as peer devices. Since there is no level of initiation which can be done by either of the two devices, the assigned IPsec technology type can only be GRE. Key issues that may arise from the use of a VPN in conjunction with a Firewall VPNs and firewalls work hand in hand. Most of the products of the firewall ensure the provision of encrypted firewalls to the various firewall tunnels. To be precise, various application gateways provide the IP address as it hides through encapsulating one of the Internet Protocol packet in another. (Behringer & Morrow 19) The main role of the firewalls is to control access to their resources and then to establish a trust between the user and the network. VPNs are often created to help in the provision of required privacy between two sites. Often, there is lack of trust in any of the two sites. Therefore the combination of the two helps in the establishment of the required trust. When the two are used together, the server will be detached to the internet resulting into disconnection. In some scenarios when the VPN is placed behind the firewall, there is a possibility of detachment from the internet when not checked. (Behringer & Morrow 92) Benefits of using VPN By enterprises There are a number of ways by which businesses will benefit from the adoption of VPN technology. The first instance is that the adoption of VPN will provide a reduced operational costs when it is compared to any other level of tradition WAN. There will be the lower connection costs which are accorded to the remote users. Besides, the VPN fixed communication costs can assist in giving the business better understanding of various operational expenses. The required global networking opportunities also become easier with the adoption of VPN. It is unarguable that technology has brought the world to one village. What it means that every business venture intends to sell its products to millions of clients across the board. Communicating with these customers might appear expensive if relevant technology is not adopted. Operational will reduce when VPN technology is adopted and it will also see an upsurge in the number of the clients being recorded by the company in an annual basis. When the operational costs decreases then it means that the revenue will go up and profit will also increase. It is therefore advisable that every enterprise intending to excel must adopt the use of VPN. (Behringer & Morrow 51) VPN technology helps in the provision of security through the application of an advanced encryption and other authentication protocols which aids in the safeguarding of data from thieves, snoops and other ill minded persons. Most businesses keep very important information within their systems. Some of them are personal information of the client which should only be known by the business. Other competitors are in need of such information. When the business looses such kind of information, it will mean that it is exists from the business. VPN provides a clear opportunity to ensure that enough security is provided to all kind of information within the company and any other communication which is being carried out by the employees. When the data of the customer is safe then it will mean that there will be an enhanced confidence from the side of the client. (Behringer & Morrow 109) Conclusion Technology is very important despite the challenges that are associated with it. With globalization any firm that intends to increase its sales must ensure that it adopts technology. Technology results into reduced operational costs within the companies. Since the inception of VPN with other security inventions, most organizations are often in a position to communicate and transfer data without any fear of losing data. The users must always ensure that necessary security updates and adjustments are done to stop any person from stealing the data and information. VPN for the past many years has changed the way business is done and eases various operations within the business and governments across the world. Its importance and contribution cannot be denied. Any risk that is posed by instances of security is very dangerous to the business. Adoption of any instances of technology must never be accidental. Proposal Analysis of the performance of the VPN between different devices It is axiomatic to argue that network has become inevitable to the daily existence of humanity. Security is an important element in networking and when any security feature added on a device costs a lot of resources. The discussion on the paper will focus on the measurement and testing of VPN on the network and how its efficiency can be enhanced when used. Internet has immensely contributed in our daily lives and its use has been appreciated amongst different quotas across the globe. With its continued appreciation, hackers have continuously attempted to steal private information from internet the users. Therefore, security of the networks is very important and the adopted platforms to share information must always remain protected and secure. The question that is often faced by internet users is how to carry out data in a secure platform as opposed to the public internet. Virtual private network has been appreciated by a myriad of organizations across the world to secure the data being carried. The preliminary discussion indicates that VPN is a superb solution to the modern security of the networks. It offers a cost effective security which is easy to maintain and implement. It is also recommended that ASA 5505 firewall should always be used when choosing the VPN hardware. This paper finds the research important given that there are growing concerns on incidences of internet security across the world. Reviewing some of the existing literature will help in coming up with recommendations to individuals and organizations when using internet. Works Cited Behringer, Hor, & Morrow, M. (2005). MPLS VPN security. Indianapolis, Ind.: Cisco ;. 2013 Print Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 words, n.d.)
Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1864762-issues-in-the-field-of-engineering
(Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 Words)
Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1864762-issues-in-the-field-of-engineering.
“Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1864762-issues-in-the-field-of-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Virtual Private Network

Florida Department of Management Service

hellip; The security mechanisms include IP security and Virtual Private Network.... The Virtual Private Network makes use of special protocols.... This brings about a similarity in the manner in which access to information on the extended network and the way there is access on the private network.... The IP security on the other hand acts as a filter for traffic going through the administrator of the network.... It therefore protects the flow of data between security gates pair, host pair or network to host....
4 Pages (1000 words) Case Study

Network Remote Access

The most ideal way of connecting to the office network would to use a Virtual Private Network (VPN) when you are away from the office.... VPN tunneling involves first establishing a connection and then maintaining a logical network connection from the client to the VPN server.... The network device that comes into picture for compulsory tunneling is some times called FEP (front end processors), network access servers (NAS) or point of presence (POS)....
5 Pages (1250 words) Essay

Building on prior success

network would be through utilizing mobile Virtual Private Network.... Within office settings, however, the Virtual Private Network could be accessed through the conventional connection.... The mobile Virtual Private Network proposed, could be utilized on different mobile computing devices, including laptops, and mobile phones among other devices.... This network operating system presents users with numerous capabilities, essential for performing various daily company functions....
2 Pages (500 words) Assignment

Remote Access Risks

A Virtual Private Network… The communication from a client is carried out virtually using the IP.... A Virtual Private Network (VPN) is a complex internet connection whose communication is linked through another network.... The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area network (LAN).... Even though it is secure way of communication, it is public unlike the dial-up (Lewis, 2006). Some of the most Remote Access Risks Affiliation: Research the different types of VPNs and other relevant remote access applications The dial-up remote access is used when a client is in use of telecommunication infrastructure in a bid to create physical connection with a remote server which is connected to any Local Area network (LAN)....
1 Pages (250 words) Coursework

CIS204 U4 Discussion

For the… The most recommended technology would be the Virtual Private Network, since it fits the organizational needs and the budget as well. VPNs are Establishing a Wide Area Network (WAN) for a Resort al Affiliation Establishing a Wide Area Network (WAN) for a Resort IntroductionWide Area Networks (WAN) are computer networks used to develop connections between several areas.... The most recommended technology would be the Virtual Private Network, since it fits the organizational needs and the budget as well....
1 Pages (250 words) Coursework

Home Network Issues

As such, when creating the home network, I have to consider having a router capable of handling a Virtual Private Network, VPN (Crabtree, Mortier, & Rodden, 2012).... There are many computers in the house and other digital devices for the purpose of instant messaging, online shopping, and… The family, therefore, needs to establish a home network that will enable for the members of the household to accomplish all these tasks at the same time.... As such, when creating the home Home network al Affiliation Home network As a type of local area network, a home network has the function of enabling the connection of computers and other digital gadgets within the house....
1 Pages (250 words) Essay

Internet Tools for Dirt Bikes

Other internet tools I would recommend for the company are Virtual Private Network (VPN) and Voice over Internet Protocol (VoIP).... Since Dirt Bikes already offers Internet access to every employee who uses a desktop computer, it would be prudent to develop private network by utilizing the present network connections.... hellip; The table below summarizes the benefits of the recommended internet tools Internet Tools for Dirt Bikes Since Dirt Bikes already offers Internet access to every employee who uses a desktop computer, it would be prudent to develop private network by utilizing the present network connections....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us