StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Virtual Private Network - Case Study Example

Comments (0) Cite this document
Summary
This case study "Virtual Private Network" focuses on virtual private network which is a part of telecommunication engineering. The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the VPN and compare their strengths and weakness among others…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Virtual Private Network
Read Text Preview

Extract of sample "Virtual Private Network"

Download file to see previous pages It works through the use of the shared public platform as it maintains its privacy through some specific tunneling protocols and security procedures such as the Layer Two Tunneling protocol. In effect, the protocols send the data via tunnels which cannot be entered by any form of data that is not properly encrypted (Behringer & Morrow 25). The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the VPN and compare their strengths and weakness among others.
A virtual private network adopts the use of a public networks such as the internet in the connection of sites and remote users. The main advantages associated with the use of VPN are its low cost and scalability. It combines the entire processes of tunneling, encryption, authentication, access control technologies and other services that are being used in the carriage of the internet, a provider’s backbone or managed Internet protocol. The traffic usually reaches these the backbones through the application of a number of technologies which include frame relay, ISDN, T1Simple dial-up access or ATM. (Behringer & Morrow 17)
It is the extension of various private networks which encompasses various links which exist across various shared networks. It makes it possible in the sharing of data between computers in a way which copies various properties of point to point private network. The VPN connections make it possible for the users to connect in a secure fashion with another remote corporate server which applies the use of the routine platform provided by the public internetwork. It is also perceived as the point of connection between the user’s computer and the main corporate server. (Behringer & Morrow 91)
The technology of VPN also makes it possible for the corporate to connect to its branch offices or to other organizations as it also ensures the maintenance of secure communication. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 words, n.d.)
Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1864762-issues-in-the-field-of-engineering
(Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 Words)
Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1864762-issues-in-the-field-of-engineering.
“Virtual Private Network Case Study Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1864762-issues-in-the-field-of-engineering.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Virtual Private Network

Virtual Private Network Tools

...isadvantages……………………………………………………………...13 Project Summary...…………….…………………………………………………………………………14 Future Implications………………………………………………………………………………………15 References………………………………………………………………………………………………..16 Introduction A VPN, virtual private network, is a network connection that is built on top of already existing publicly accessible telecommunication infrastructure like the internet and is used to provide access to the central organizational network to travelling users and remote offices. Yuan & Strayer (2007) state that VPNs create a virtual tunnel over the publicly available internet through the use of symmetric encryption. Common encryption and decryption keys which are used to encrypt all traffic in both directions are shared by both...
18 Pages (4500 words) Term Paper

Virtual Private Network Architecture

...?VIRTUAL PRIVATE NETWORK ARCHITECTURE Virtual Private Network Architecture Affiliation This paper presents an overview of the virtual cloud environment. The basic purpose of this research is to analyze the process whereby virtual clouds (tangible machines) are used to link to virtual private networks (VPNs) that interacts with virtual enterprise architectures or enterprise resource planning systems architectures. This paper also evaluates the migration and real-time transmission processes of the networks. At the present, business organizations prefer to run and maintain their server applications in data centers, which provide them with a wide variety of storage and computational resources. Basically, the cloud computing platforms (virtual...
3 Pages (750 words) Essay

Impact of the Virtual Private Network on Businesses

... Impact of the Virtual Private Network on Businesses Contents Executive summary 2 Introduction 3 Growth of VPNs 3 Advantages of VPNs 6 Conclusion 6 Works Cited 8 Executive summary The objective of this essay is to look into the impact of Virtual Private Network to businesses, this in relation to the meaning of VPN, the stages of its development, and the advantages it has over others. A virtual private network (VPN) enables the developing or building of private networks across the internet, enabling security and tunneling of non-TCP/IP protocols; for instance, remote users uses VPNs to give connect over a public medium like the Internet instead of expensive permanent means. (Lammle, 2005).VPNs are categorized...
5 Pages (1250 words) Research Paper

Virtual Network Design: DHCP Server

...Virtual Private Network... Virtual Private Network... Network Design: DHCP Server Introduction Virtual network is a system that composed of virtual machines that are usually configured to manage or process external or internal network resources. This system is often configured to function with a network adapter especially when using a physical computer or work without adapter when using virtual machines (Lowe, 2011). Different networks often respond to different machines in a specific manner (Simpson, and Novak, 2010). Connecting a network adapter to a physical computer requires a virtual machine to be connected or linked to a virtual network to which the physical adapter is connected. When the adapter is not used, the virtual machine connected t...
4 Pages (1000 words) Term Paper

Virtual Private Network

...Answer Development and innovation in the field of Information and technology have revolutionized every sphere of life. Computers and their networks have made headways into all areas ranging from education to weather prediction. Amongst all these advancements, the contribution of IT in the field of healthcare and medicine has been panoramic. The healthcare and allied data requires quick access and retrieval as the cost of one second is a life in the field of heath care, so quick data flow achieved via computer networks has come as a boon to the field of medicine. At the same time the data needs to be secure and protected from any threat or hacks so the security becomes a prime concern. A virtual private network (VPN) is a private data...
4 Pages (1000 words) Essay

VPN Virtual Private Network

...VPN – Virtual Private Network Security threats to information systems are becoming more and more sophisticated as technology continually evolves and improves. No longer are the firewall, anti-virus, intrusion protection and a host of other security measures and countermeasures enough to protect the confidentiality, integrity and availability of information systems assets and resources. Some of the threats or attacks faced by a network environment include: denial-of-service attacks, address spoofing, session hijacking, sniffers, compromise key attacks, data modifications, man-in-the-middle, replay attacks, brute force, password guessers and dictionary attacks, and social attacks (Fortenberry, 2001).” Thus, more effective ways of combating...
6 Pages (1500 words) Essay

Network virtual servers

...Virtual Private Network... Virtual Private Network... Task: Network Virtual Servers Introduction Various hypervisors are available in the market with each system presenting unique features. As such, selecting an appropriate hypervisor for the desired purpose is a strenuous task. Of late two hypervisors, the Microsoft Hyper-V and VMware have outshined others in the market. However, the contemporary concern seeks to understand which software provides a better package. This scrip, hence, addresses this challenge by providing a comparative examination of the Hyper-V and VMware. An Overview In the earlier years, Microsoft has unveiled various host-staged virtualization systems; the company ventured into the hypervisor market in 2010 with the release ...
5 Pages (1250 words) Research Paper

Private Network Extranet

...a secure digital communication mechanism, Cisco VLAN compatible switches for implementing VLAN replace hubs. VLAN is considered as an expandable configuration option. Future Considerations and Attack Analysis Virtual Private network are the most cost effective solution. VPN provides connectivity for users, to connect the organization’s internal network from remote locations. This saves significant cost, as previously organizations have to acquire expensive long distance leased lines. Moreover, VPN makes the network scalable and accessing from almost anywhere, by an Internet connection. The University can connect its remote offices in future by VPN. The...
8 Pages (2000 words) Thesis

Private Network and Cyber Security

...as a way of maintaining ethics on the net. Companies are also keen to release any of the important information regarded as business security and such information are normally protected with passwords and cookies which prevent hackers from obtaining them[Mas07]. 3. Due to rapid development in technology companies are forced to change swiftly with the changes. Virtual Private Network is useful in extending private network across to the public which helps in sharing of data across public and private networks. Through proxy servers most companies have adopted the use of Wide Area Network as a means of faster...
1 Pages (250 words) Assignment

Virtual Machine Forensics and Network Forensics

...Virtual Private Network... Virtual Private Network... Machine Forensics A virtual machine (VM) is a software program for creating different environments with each of the environment simulating its components (both hardware and software). Each of the environments (virtual machine) mimics a real computer system with its operating system and hardware. In digital forensics the user controls each of the virtual machines independently. Network forensics refers to the capture, storage, and analysis of network traffic. It can be used interchangeably with terms such as packet mining, packet forensics, or digital forensics. Regardless, the concept remains the same i.e. recording packet traffic of emails, database queries, Web browsing to a single searcha...
2 Pages (500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Virtual Private Network for FREE!

Contact Us