IS 311
Dr. Gray
Tuesday 7pm
November 19, 2002
By: Germaine Bacon
Lizzi Beduya
Jun Mitsuoka
Betty Huang Juliet Polintan
Table of Contents
I. Introduction ……………………………………………….. 1 - 2
II. VPN Topology……………………………………………... 2 - 3
III. Types of VPNs……………………………………………... 3 - 5
IV. Components of VPNs………………………………………. 5 - 7
V. Productivity and Cost Benefit…………………………….... 7 - 9
VI. Quality of Service………………………………………….. 9
VII. The Future of VPN……………………………………….... 9 - 11
VIII. Conclusion…………………………………………………. 11
IX. Bibliography………………………………………………...12 - 13
X. Questions……………………………………………………14
Introduction
Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there.
Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.
Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking. Before IP based networking corporations had expended considerable amounts of time and resources, to set up complex private networks, now commonly called Intranets. These networks were installed using costly leased line services, Frame Relay, and ATM to incorporate remote users. For the smaller sites and mobile workers on the
Bibliography: A primer for Implementing a Cisco Virtual Private Network. (1999). Cisco Systems. Retrieved October 5, 2002, from http://www.cisco.com/warp/public/cc/so/neso/vpn/vpne/vpn21_rg.htm A Technology Guide from ADTRAN Connolly, P.J., (2002, January 21). Taming the VPN. Computerworld. Retrieved September 18, 2002, from http://www.computerworld.com/networkingtopics/networking/story/0,10801,67396,00.html Dix, John Internetworking Technologies Handbook, Virtual Private Networks. Cisco Systems. Retrieved September 22, 2002, from http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ Introduction to VPN: VPNs utilize special-purpose network protocols Next-Generation Networking: The Future of Greater Performance and Flexibility. (2002, July). IDC Analyze the Future. Retrieved September 28, 2002, from http://www.business.att.com/content/whitepaper/next_generation.pdf Remote Access VPN Solutions Salamone, Salvatore. (1998, December). VPN Implementation Calls For A Tunnel Trip. Internet Week. Retrieved October 30, 2002, from http://www.internetwk.com/VPN/paper-5.htm Sandick, H., Nair, R., Rajagopalan, B., Crawley, E., (1998, August) Virtual Private Networks (VPNs). International Engineering Consortium. Retrieved October 19, 2002, from http://www.iec.org/online/tutorials/vpn/index.html VPN Technologies: Definitions and Requirements