Advanced Networking Technologies, communications homework help

User Generated

ZH83

Business Finance

Description

Part-A

Students are advised to carefully study the given scenario and complete three tasks based on this

scenario.

A network administrator is provided a solution for a small company that has setup Internet

connectivity using two Linksys WRVS4400N business class routers. One is located at the Central site

and the other at the Branch site. They would like to access resources between sites but are

concerned that the Internet traffic would not be secure. To address their concern, it has beensuggested that they implement a site-to-site VPN between the two sites. A VPN would enable the

Branch site office to connect to the Central site office securely by creating a VPN tunnel, which would

encrypt and decrypt data.

Solve these tasks

Task 1- Define VPN technology and its benefits

Task 2- Components of VPN

Task 3- Characteristics of secure VPN

Part B

You are working with AOL ISP which is a USA based ISP and provides Frame Relay based WAN

connections. For attracting different type of customer AOL design a summery document of Frame

relay technology. Task to design that specific document is assigned to you. Following points must be

considered during design phase.

1. Definition of Frame Relay.

2. Benefits of Frame Relay

3. Virtual Circuit and DLCI no.

4. Frame Relay topologies

5. Frame relay address mapping

6. Configuration of Frame Relay.

7. Select one or more than one published paper (preferably from the ACM DL or IEEE CSDL)

that/those is/are discussing one aspect of Frame Relay. Summarize this paper in one page.

The summary should include the main ideas presented in the paper. The paper you select

MUST NOT BE DISCUSSED BY ANOTHER STUDENT.

Plagiarism policy:

Clarification on Plagiarism Policy As per college policy, any form of violation of academic integrity will invite severe penalty.

Plagiarised documents, in part or in whole, submitted by the students will be subject to this policy. A. First offence of plagiarism

a. A student will be allowed to re-submit the assignment once, within a maximum period of one week. However, a penalty of deduction of 25% of the marks obtained for the resubmitted work will be imposed.

b. Mark deduction: When the work is resubmitted, the marking will be undertaken according to the marking criteria. In compliance with this policy, the 25% deduction is then made on the marks obtained. For example, in an assessment that carries a maximum of 50 marks, suppose a student were to obtain 30 marks for the resubmitted work, the final marks for that assessment will be 22.5 (after deducting 25% of the marks actually obtained for the resubmitted work).

c. Period of resubmission: The student will have to resubmit the work one week from the date he or she is advised to resubmit. For example, if the formal advice to resubmit was communicated to the student on a Sunday (latest by 5 pm), the student will have to resubmit the work latest by next Sunday 5 pm.

d. If the re-submitted work is also detected to be plagiarized, then the work will be awarded a zero.

e. Resubmission of the work beyond the maximum period of one week will not be accepted and the work will be awarded a zero. B. Any further offence of plagiarism a. If any student is again caught in an act of plagiarism during his/her program of study (either in the same module, same semester or in any other semester), the student will directly be awarded zero for the work in which plagiarism is detected. In such cases, the student will not be allowed to re-submit the work. 2

C. Guidelines a. Type 1: In case plagiarism is detected in any component or part submission (submitted at different times) of one assessment (assignment), the deduction in marks will be applicable for the whole assessment (assignment), even if only the component or part submission alone needs to be resubmitted.

b. Type 2: In case plagiarism is detected in a group assessment, all students of the group will be considered as having committed an act of plagiarism irrespective of whether plagiarism is on account of the act of all or a few or only one member. The policy will then be applied to all students.

c. Type 3: Combination of Type 1 and Type 2: In case plagiarism is detected in any component or part submission (submitted at different times) of a group assessment (assignment), the deduction in marks will be applicable for the whole assessment (assignment), even if only the component or part submission alone needs to be resubmitted. All students of the group would be considered as having

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi there!I have finished your assignment. You can give it a check and let me know if that is what you were expecting.Regards

Advance Networking Technologies

PART: A
Definition of VPN technology and its benefits
Definition of VPN technology
Technology is being developed and has developed so fast in the past few years that almost every
month we hear news about new devices, applications, and systems being released and developed.
One area of technology that can’t stay behind is security; as the internet moves forward and is
accessed by more and more people every day, virtual security firms and companies need to move
forward to prevent security breaches and virtual attacks from hackers and criminals. Several
methods have been implemented over time to prevent any sort of attack from a hacker; one of
those methods are Virtual Private Networks commonly known as VPNs.
Virtual Private networks allow users to connect to private networks over public networks.
Sounds confusing? It really isn´t; VPNs are basically a secure way of accessing a private
network. Let´s say that you work in the marketing department and I have to move around the city
or even the country pretty often to deal with meetings with clients, what if I have to access the
company´s private network to work with sensitive information? It is really not advisable to
access company´s sensitive files over a public network, mostly because nowadays it is very
common certain attacks like Wi-Fi spoofing, “Firesheep” and honeypots. A VPN basically
creates a virtual network (masquerade) over a public network to simulate and provide security
over public networks (the internet) that way we have secure access to company´s files and we
can connect to other users inside the company securely.
When we talk about the main benefits of a VPN, we may notice that its main focus is around
security and privacy, even though there are other ones, let’s list a few of them and describe what
exactly the benefit is:
-

-

-

Reduced risk of security breaches or cyber spoofing: We may only hear that cyberattacks happen to big corporations and big enterprises’ employees, but those are the only
ones that make the headlines, cyber-attacks may target anyone that owns a credit card or
has sensitive information in his laptop or PC and a VPN reduces in a big way this risk
Secured connections between branches and remote users: We know that direct
meetings and sessions are always necessary when working as a remote user and
sometimes even those connections may be targeted.
More productivity: There is now no ex...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags