Premium Essay

Virtual Private Network

In:

Submitted By Nivas123
Words 4870
Pages 20
Virtual Private Network

IS 311
Dr. Gray
Tuesday 7pm
November 19, 2002

By: Germaine Bacon
Lizzi Beduya
Jun Mitsuoka
Betty Huang Juliet Polintan

Table of Contents

I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14

Introduction

Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there.
Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.
Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently. The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking. Before IP based networking corporations had expended considerable amounts of time and resources, to set up complex private networks, now commonly called Intranets. These

Similar Documents

Premium Essay

Virtual Private Network

...VPN Concepts A virtual private network (VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services:  Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption.  Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations...

Words: 6523 - Pages: 27

Premium Essay

Virtual Private Network

...Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently...

Words: 4870 - Pages: 20

Premium Essay

Virtual Private Networks

...Virtual Private Networks Table of Contents 1. AJAX Executive Summary 3 2. VPN Summary 4 3. VPN–The Technology 5 4. AJAX Network 6 5. Technical Specifications 8 6. Feasibility and Operational rollout 10 7. Conclusion 11 8. Bibliography 12 AJAX Executive Summary AJAX was founded in 1996 by a group of professional traders who wanted to perform their own clearing functions. Those traders were, for the most part, located in the Chicago area and traded primarily on the Chicago derivative exchanges. The company quickly flourished by providing clearing services to colleagues on the exchanges. This expansion was the result of simple word-of-mouth relationships. AJAX Clearing Corporation (AJAX), a division of Johnston Trial’s Professional Clearing Corp, is a registered clearing firm that provides order routing, execution, and clearing for equities, futures and options. They also provide their customers with analytics, risk management, position management, and compliance support. In addition, they offer extensive standard and specialized reporting support that includes derivatives, pricing and valuation reports and haircut reports. Attracted by AJAX’s reputation for cutting edge technology and superior trade execution, Johnston Trial acquired AJAX in April 2005. AJAX offers dynamic capabilities, like real-time trade clearing, compared to other Johnston clearing solutions. AJAX...

Words: 1935 - Pages: 8

Free Essay

Benefits of Using Ipv6 in Distributed Virtual Private Networks (Vpns)

...Benefits of using IPv6 in Distributed Virtual Private Networks (VPNs) Introduction The many advantages of improving and corporation's network, particularly its Virtual personal Networks (VPNs) from IPv4 to IPv6 create the expenses related to the move recoverable from increased network steadiness, auto-configuration, security, mobility, increase and quality-of-service and multicast capability (Cisco 2007). First, in phrases of quantitative, address varies for an IPv6-based network is 128-bits, providing the company lots higher security, likewise (Fink, 1999). Secondly, the safety concerns with regards to utilizing DHCP to assign information science addresses victimization IPv4 these days will be mitigated with the homeless reconfiguration capability of IPv6 (Lehtovirta, J 2006). With several of the systems throughout the company administered remotely exploitation IPsec-based VPNs, the opportunity to maneuver to more secure VPNs attributable to IPsec-mandated end-to-end security exploitation IPv6 also adds in greater levels of security moreover. The increasing use of wireless connections by members among the IT employees to observe and maintain IT systems also can currently be potential exploitation Mobile IP with Direct Routing (Cisco 2007). The redoubled support for protocols specifically for multicast routing are also supported in IPv6, that may build marketing’s’ several webinars and on-line initiatives additional expeditiously delivered, moreover. Most vital concerning...

Words: 3876 - Pages: 16

Premium Essay

Virtual Private Networks

...Department of Technology Management and Innovation MG 7953 Global Innovation Fall 2014 Professor: Tom Helling Saturday @ 1:30-6:00 pm (see dates of class per session dates below) Contact Details: th930@nyu.edu 917-593-0946 (mobile) Course Description: This course focuses on the global dimension of technology-enabled innovation. Topics covered include: motivation for a global business outlook, how to proactively access global sources of innovation, coordination and organization of innovation-oriented activities around the world, new product development on a global basis, the role of revitalized global R&D, the growing of prominence of IT, virtual organizations and e-Business, and the increasing role of alliances and linkages with customers, suppliers, and other third parties. Course Structure: This course introduces the latest and most relevant thinking, research and best practices, with an emphasis on learning based on the experiences of actual firms around the world. Individual and team-based project work is an important part of this course. We will be discussing a number of research papers, case studies and relevant reading material during this course. Class interaction is vital to understanding many of the central themes and issues in the area of global innovation. Textbooks: Reverse Innovation, Govindarajan and Trimble, 2012 ISBN-10: 1422157644 ISBN-13: 978-1422157640 The Innovator’s Dilemma, Christensen, 2011 ISBN-10: 0062060244...

Words: 1966 - Pages: 8

Premium Essay

Vpn Securtiy

...Virtual Private Networks Their Past, Present and Future Jodi Hodges AMU ISSC461 B001 August 24th, 2014 Table of Contents Abstract...........................................................................................Page 3 Introduction..................................................................................Page 4 Overview of the VPN …................................................................Page 4 1 A Brief History of Virtual Private Networks...............................................Page 4 2 Components of a Virtual Private Network..................................................Page 5 Current Uses for VPNs..................................................................Page 6 1 Why Virtual Private Networks are Advantageous..................................................Page 6 2 Virtual Private Networks Within Businesses...........................................................Page 6 3 Virtual Private Network Bypass Methods...............................................................Page 7 4 Privacy Concerns Addressed by Virtual Private Networks....................................Page 8 The Future of VPNs.......................................................................Page 9 5 Growing Concerns of Virtual Private Network Use..............................................Page...

Words: 2871 - Pages: 12

Premium Essay

Nt1330 Unit 3 Case Analysis Paper

...Question 1(a) VPN is called Virtual Private Network. The objective of VPN is to provide a secure private connection between networks over the public network. It is commonly used in business due to the factors stated below: • When data is transferring on the private network, the data will be secured to prevent hackers to try and extract the data due to encryption. • • Employees are allowed to remote into the company network effortlessly There are two types of connections that are being used for VPN. They are remote access VPN connection and site-to-site VPN connection. • Remote access VPN A remote access VPN connection allows the user to set up a private connection to the company networks. The user is able to access private data in the company server remotely, even if they are not physically in the company itself. The user will need to have VPN client software to be installed on the computer. The software will enable you to establish a connection to the VPN server. The...

Words: 1487 - Pages: 6

Premium Essay

Acme Manufacturing Network Plan

...Acme Manufacturing Network Plan Ann Johnson IT/242 October 23, 2011 David Edwards Acme Manufacturing Network Plan Acme Manufacturing needs a new network plan implemented for corporate, three distribution centers in Chicago, Phoenix, and New York, and is expecting to expand with a new facility in China. A successful network design provides future growth within the organization. Meetings are scheduled weekly in the main Atlanta Headquarters conference room with the facilities from Phoenix, New York, Chicago, and China attending via telecommunications. The network plan will include the type of cabling needed for each facility, the equipment used to connect the different facilities, and the installation of Voice over IP (VoIP) and Virtual Local Area Networks (VLANs). Security measures are needed including firewalls and a backup plan. The lines required to carry the traffic on the network are leased T1 lines and a satellite connected overseas. T1 leased lines are used for the Atlanta, Phoenix, New York, and Chicago offices. China connects through a satellite service. A Virtual Private Network (VPN) connects wireless users to their designated department through mobile devices. Routers are used to direct communication between LANs and are needed at each department. Voice over IP (VoIP) has opened possibilities for more interactive communication across WAN networks. VoIP bypasses the need of conventional telephone hardware by transmitting voice over the existing data line...

Words: 1193 - Pages: 5

Free Essay

Firewall Security Project

...……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing systems and the systems were freely accessible because security was not a major concern. As the company began to grow and the closed network was connected to multiple local and remote networks via the internet; network intrusions from both internal and external users have become increasingly frequency an on more than a few occasion has limited or halt the business ability to function...

Words: 1848 - Pages: 8

Premium Essay

Networking Architecture

...Network technology has come forward as an important component of IT infrastructure. Within the healthcare industry, the value of an efficient and stable network is immeasurable. The challenge in most industries, especially healthcare, is address security concerns and the rights of the patience. Patton-Fuller Community Hospital, located in the City of Kelsey, is a fully function hospital servicing the local area since 1975. Recently, The Chief Executive Officer (CEO) of Patton-Fuller Community Hospital expressed the desire to design an upgrade to the current network architecture. This design will include upgrades to hardware components and software components. This proposal will discuss and summarize the current network structure, propose an upgrade design to meet future challenges while addressing network security and compliance; more specifically, the transfer and confidentiality of patient records information. Patton Fuller Community Hospital – Current Network The current networking architecture of the Patton-Fuller Community Hospital can be broken down into two major sections. Today the two major backbones of the network include a 1000 Base T using CAT6 cable which provides network access to many administrative and operational areas of the facility. Executive management, Human Resources, Operations, Facilities, Finance, as well as the IT data center are all connected directly to this side of the network backbone. The hospital side is connected via 1000 Base F which...

Words: 1760 - Pages: 8

Free Essay

Computer Science

... A common carrier is a private company that sells or leases communication services and facilities to the public. Common carriers are profit-oriented, and their primary products are services for voice and data transmissions, both over traditional wired circuits as well as cellular services. Common carriers often supply a broad range of computer-based services, such as the manufacturing and marketing of specialized communication hardware and software. A common carrier that provides local telephone services (e.g., BellSouth) is commonly called a local exchange carrier (LEC), while one that provides long distance services (e.g., MCI) is commonly called an interexchange carrier (IXC). As the LECs move into the long distance market and IXCs move into the local telephone market, this distinction may disappear. 3. Explain how cloud architecture works. Cloud architecture is represented as a cloud with connection points. Users of circuit switched services lease the connection points (e.g., telephone lines) into the common carrier’s network, which is called the cloud. This architecture is very flexible and hides its internal details. Circuits can be established as needed between any computers attached to the cloud at any point. However, data can only be transmitted while a circuit is established, and only to the one location it connects to. These designs are simpler for the organization because they hide the common carrier’s burner of network design and management inside...

Words: 1686 - Pages: 7

Premium Essay

Components of It

...Unit 2: Components of IT Kaplan University IT331 –01 Contents Questions 3 References 7 Questions 1) Describe at least three different networks (computer or data communications) which you access or interact with on an average day. I use a variety of networks on a daily basis during the work week. To start, I work from home and I must first connect to my home LAN which has an internet connection. My home LAN consists of a router that shares my internet connection wirelessly. Next, I connect to my work’s LAN by using a Virtual Private Network (VPN). My work’s LAN consists of a router and several switches. On the network, there are several workstations, servers, printers, and various resources that I access to perform my job tasks. The VPN connection is also handled by a specific router for VPN access. In addition to my home network, work network, and VPN, I also have a cloud-based music service where I access my music that gets me through the day. The cloud based network is not local, but it is accessible over the internet at Google. 2) Binary data codes like EBCDIC, ASCII, or Unicode are often presented using hexadecimal notation rather than a long list of 0’s and 1’s. Likewise other items requiring long sequences of 0’s and 1’s like IP addresses to identify network location are generally presented in non-binary formats as well. Describe the relationship between a hexadecimal character and its associated binary. Describe the relationship between one octet...

Words: 803 - Pages: 4

Premium Essay

Remote Access Control Policy Definition

...is the ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly to the network server. The only difference between a remote host and workstations connected directly to the network is slower data transfer speeds. The purpose of a remote access policy is to define the standard connection to the company’s network from any remote host, untrusted host and remote network, including untrusted hosts on the company’s intranet. These standards are designed to minimize the potential exposure to the company’s from damages, which may result from unauthorized use of the company’s resources. At the main location, a set switches and routers are interconnected to from a Wide Area Network. The switches can be connected in different topologies. All remote users must follow the security requirements set forth in the standard for the company’s remote host accessing Information Technology Resources prior to such access, as well as any guidelines, procedures or other requirements issued by the Information Technology Department. Within the virtual private network multiple Virtual Private Network routers communicate securely with a central Virtual Private Network router. A separate, secured tunnel...

Words: 660 - Pages: 3

Free Essay

Network Infrastructure Security

...Network Infrastructure Security Robert Collazo Rasmussen College Network Infrastructure Security The first thing that I will be covering is the virtual private network in windows 7. A virtual private network (VPN) extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. The VPN connection across the Internet is technically a wide area network (WAN) link between the sites but appears to the user as a private network link—hence the name "virtual private network”. The following authentication protocols are supported for logon security for VPN connections in Windows 7: * PAP Stands for Password Authentication Protocol; uses plaintext (unencrypted) passwords. * CHAP Stands for Challenge Handshake Authentication Protocol; uses one-way MD5 hashing with challenge-response authentication. * MSCHAPv2 Stands for Microsoft Challenge Handshake Authentication Protocol version 2; an extension by Microsoft of the CHAP authentication protocol that provides mutual authentication of Windows-based computers and stronger data encryption. MSCHAPv2 is an enhancement of the earlier MS-CHAP...

Words: 683 - Pages: 3

Free Essay

Building on Prior Success

...access Ocper Inc. network would be through utilizing mobile virtual private network. Mobile VPN setting functions efficiently in situations where the endpoint VPN contains multiple access points. The mobile network can also be accessed using cellular devices carrying data between several Wi-Fi access points. These individuals could utilize modern I-phones, with capability to access VPN connections, as the network connection enables seamless roaming between networks through utilizing wireless connections. The advantage of utilizing this connection remains the ability for the network to connect between different IP addresses without losing information contained in other applications. The mobile VPN allows users to maintain several applications continuously open. While performing this function, the network also allows passing of data, securely over public networks. This capability would immensely assist employees Ocper Inc to access the network continually from several remote locations. Within office settings, however, the Virtual Private Network could be accessed through the conventional connection. This connection presents numerous limitations, making connections insecure when establishing remote connections. When the network becomes interrupted, information could be lost or computing devices could crash (Hallberg, 2009). This network connection, therefore, becomes limited to desktop computers and immobile computing devices. The mobile Virtual Private Network proposed, could be...

Words: 281 - Pages: 2