Virtual Private Networks (VPN) paper.

User Generated

cncnl

Writing

Description

The file is attached below with all the instructors, Thank you.

Unformatted Attachment Preview

Project Topics: 1. Virtual Private Networks (VPN) Paper Overview: The purpose of this project is to have you research a cutting edge or future technology related to telecommunications and networks. You will be asked to write a report on a topic. The focus of this market brief report should not simply be a technical description of the topic. Possible issues that you might discuss in your report are the economic costs of the technology, or typical organizational motivations for selecting this technology, or technical factors that might limit where an organization could use this technology. For example, if the topic of your report was "Voice and Data Wiring Standards", your paper should not be an extended discussion of the technical characteristics of copper wire. While it's important to know that CAT-5 wiring can be used up to 100Mbps and has a given db loss over 100 meters, the focus should also be on business issues, such as how upgrading office wiring systems to Cat-5 cabling might permit voice-over-IP applications. Deliverable: An Organized Report with Bibliography • • Your report should be 5-7 double-spaced pages in length, excluding the cover sheet and bibliography. Your report must be typewritten, must use a 12-point font and 1" margins. Each page (other than the cover sheet) should include a footer with your first initial and last name(s) left justified (e.g.,M smit), and the page number (e.g., "Page 1") right justified.. Your report is required to reference at least four sources upon which you based your paper. Sources should not include marketing or advertising literature. Your sources must be organized in a bibliography, and all references must be cited in your paper. References in the bibliography must be prepared according to one of the standard style sheets (e.g., MLA, APA, IEEE, ACM). If you are unfamiliar with the format for standard bibliographic citations, please refer to the following reference for additional information. Be sure to use complete references for online sources. Simply referencing a website is *not* acceptable. http://www.lib.berkeley.edu/Help/guides.html 1
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: THE VIRTUAL PRIVATE NETWORK

Virtual Private Network.
Student’s Name:
Instructor’s Name:
Course Name and Number
Date:

1

Surname 2
Introduction
The virtual Private Network (VPN) is a technology that was developed as a way to
create a safe and encrypted connection for less secure networks, like the internet. It allows
users to securely access corporate applications hence ensuring the safety of data as it travels
through secure tunnels. Authentication methods such as the use of passwords and other
unique identification ways are crucial and must be applied by the VPN users. The VPN
through the VPN solution tends to serve the purpose of dial-in access service since the VPN
service provider has the ability to host services, the VPN customers present to it (Rosado,
2013).
A well-designed VPN is prone to use several methods so as to keep connection and
data secure. They include; data confidentiality, which is the most important service whereby
data is encrypted in that all the data that one computer had, is taken, when sending to another
encoding it to take a form that only that particular computer is able to decode. Data integrity
is very crucial as verification is an important aspect to be considered when encrypting to
ensure that data safety. Data origin authentication whereby the sources of all data sent is
identified, this safeguards against various attacks intending to spoof the identity of the sender.
Anti-replay is whereby a network is able to detect and reject replayed packages and being
able to prevent spoofing.
Data tunnelling is an activity that aids in cases where it is desirable to hide identity
device originating traffic as the process involves encapsulating an entire package within
another and sending it over a network. Data tunnelling requires three different protocols;
passenger protocol which is the original data that is carried, encapsulating protocol which
serves as the protocol that is wrapped around the origina...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags