Preview

Virtual Network

Powerful Essays
Open Document
Open Document
4865 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Virtual Network
Virtual Private Network

IS 311
Dr. Gray
Tuesday 7pm
November 19, 2002

By: Germaine Bacon
Lizzi Beduya
Jun Mitsuoka
Betty Huang Juliet Polintan

Table of Contents

I. Introduction ……………………………………………….. 1 - 2
II. VPN Topology……………………………………………... 2 - 3
III. Types of VPNs……………………………………………... 3 - 5
IV. Components of VPNs………………………………………. 5 - 7
V. Productivity and Cost Benefit…………………………….... 7 - 9
VI. Quality of Service………………………………………….. 9
VII. The Future of VPN……………………………………….... 9 - 11
VIII. Conclusion…………………………………………………. 11
IX. Bibliography………………………………………………...12 - 13
X. Questions……………………………………………………14

Introduction

Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there.
Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.
Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking. Before IP based networking corporations had expended considerable amounts of time and resources, to set up complex private networks, now commonly called Intranets. These networks were installed using costly leased line services, Frame Relay, and ATM to incorporate remote users. For the smaller sites and mobile workers on the



Bibliography: A primer for Implementing a Cisco Virtual Private Network. (1999). Cisco Systems. Retrieved October 5, 2002, from http://www.cisco.com/warp/public/cc/so/neso/vpn/vpne/vpn21_rg.htm A Technology Guide from ADTRAN Connolly, P.J., (2002, January 21). Taming the VPN. Computerworld. Retrieved September 18, 2002, from http://www.computerworld.com/networkingtopics/networking/story/0,10801,67396,00.html Dix, John Internetworking Technologies Handbook, Virtual Private Networks. Cisco Systems. Retrieved September 22, 2002, from http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ Introduction to VPN: VPNs utilize special-purpose network protocols Next-Generation Networking: The Future of Greater Performance and Flexibility. (2002, July). IDC Analyze the Future. Retrieved September 28, 2002, from http://www.business.att.com/content/whitepaper/next_generation.pdf Remote Access VPN Solutions Salamone, Salvatore. (1998, December). VPN Implementation Calls For A Tunnel Trip. Internet Week. Retrieved October 30, 2002, from http://www.internetwk.com/VPN/paper-5.htm Sandick, H., Nair, R., Rajagopalan, B., Crawley, E., (1998, August) Virtual Private Networks (VPNs). International Engineering Consortium. Retrieved October 19, 2002, from http://www.iec.org/online/tutorials/vpn/index.html VPN Technologies: Definitions and Requirements

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    10. Which domain is primarily affected by weak endpoint security on a VPN client? (Page 97-98)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 166 Words
    • 1 Page

    Deploying Internet Protocol Security, or IPSec, with allow the VPN to establish a secure connection. It is regularly used in VPN configurations because it is flexible and can be modified to fit the company’s specific security needs.…

    • 166 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    VPN (virtual private network): A VPN is a private network that uses a public network…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Jain, Samir. "Routing and Remote Access Blog." Blogs. June 26, 2006. Accessed September 10, 2014.http://blogs.technet.com/b/rrasblog/archive/2006/06/26/438823.aspx.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    5 Forces Model of Verizon

    • 1974 Words
    • 8 Pages

    “Verizon Communications Inc. (Verizon) is one of the world’s leading providers of communications services. Verizon’s wireline business, which includes the operations of the former MCI, provides telephone services, including voice, broadband data and video services, network access, nationwide long-distance and other communications products and services, and also owns and operates one of the most expansive end-to-end global Internet Protocol (IP) networks. Verizon’s domestic wireless business, operating as Verizon Wireless, provides wireless voice and data products and services across the United States using one of the most extensive and reliable wireless networks. Stressing diversity and commitment to the communities in which we operate, Verizon has a highly diverse workforce of approximately 242,000 employees.” (Verizon Communications 2006 Interactive Annual Report)…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from http://vpnhaus.ncp-e.com/2013/04/12/vpns-and-common-sense-policies-make-byod-safer/…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    631 research paper

    • 1926 Words
    • 7 Pages

    References: 3. Comparison of VPN Protocols . (n.d.). Comparison of VPN Protocols . Retrieved April 22, 2014, from http://teal.gmu.edu/courses/ECE543/project/reports_2001/arveal.pdf…

    • 1926 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    secondary source

    • 587 Words
    • 3 Pages

    An academic article or paper – what you will need to write for the Arbeidskrav II – is:…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    juniper

    • 185777 Words
    • 1143 Pages

    JNCIA Juniper™ Networks Certified Internet Associate Study Guide by Joseph M. Soricelli with John L. Hammond, Galina Diker Pildush, Thomas E. Van Meter, and Todd M. Warble This book was originally developed by Juniper Networks Inc. in conjunction with Sybex Inc. It is being offered in electronic format because the original book (ISBN: 0-7821-4071-8) is now out of print.…

    • 185777 Words
    • 1143 Pages
    Powerful Essays

Related Topics