ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Presentation on VPN Networks

Verified

Added on  2023/03/31

|14
|743
|173
Presentation
AI Summary
This presentation analyzes the network requirements of AgriDigital and identifies the VPN services used. It discusses the scope, limitations, and requirements for setting up the network, as well as the security measures and network diagrams. The design and IP address allocation are also explained.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
A Presentation on VPN
networks

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
The following report analyses the network based requirements of the
company AgriDigital and proceeds to identifies the VPN services used.
At first the scope of the project is given, followed by Limitations
The report also goes on to provide the summary of requirements related
to the network and the VPN services being used.
Document Page
Scope & Limitations
New networking equipment is to be acquired and implemented to implement
the network of AgriDigital.
These equipment should then be installed, build as per requirements for
configuring new networks through the edge router [4].
The new networks are the networks of newly set up branches of the company
These branch networks are to be integrated with the main network through
VPN tunnels.
Overall network is secured by VPN firewall, and WPA2 for encrypted keys in
wireless connectivity.
IPsec VPNs make it difficult for even organizational members to access the
company network from public Wi-Fi regions or other areas.
Document Page
Requirement analysis
Two new branches of the organization AgriDigital is newly built.
Both these branches require their network to be integrated with that of
the Headquarters to avail important server side functions.
The integration the headquarters needs to happen with comprehensive
security measures in place.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Virtual Private Network (VPN)
Virtual Private Networks (VPNs)
are essential in hiding the
network from external threats
like hackers [3].
User account verification and
authentication processes is also
employed by VPN.
Firewalls are necessary in fool-
proofing VPN based networks.
Document Page
Firewalls
Firewalls are used to filter data
packets, both inbound and
outbound.
Firewalls can also be used to
conduct authentication of users
connected to the network.
The ports and rules used by
firewalls ensure only trusted
connections are allow.
Document Page
Encryption in Wireless Connectivity
WPA2 or Wi-Fi Protected Access
is the recommended encryption
technique for generating keys
for devices connected to
wireless networks.
These are security protocols as
also security certifications for
securing wireless networks.
These protocols have been
developed by Wi-Fi Alliance.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Logical Network Design
Document Page
Physical Network Design
Document Page
Network Design
In the logical network diagram it can be seen how VPN networks are
configured between networks of headquarters to Branch 1,
Headquarters and branch 2 and the network between HQ and ISP [1].
Redundancies are ensured by having multiple firewall devices set up for
safeguarding the endpoint devices.
Distribution and access layer switches also add to the existing
redundancy in the network.
In physical diagram layout of numerous access points are given. Thus
redundancy of wireless access points ensure signal issues get eliminated
[2].

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IP Addressing
Office
subnet
work
IPs
requi
red
IPs
alloc
ated
Networ
k
Address
es
CIDR Subnet
Mask
Range
of IPs
Broadca
st
Address
es
Headq
uarters 91 126 192.168.
3.0 /25
255.255
.255.12
8
192.168.
3.1 -
192.168.
3.126
192.168.
3.127
Branch
1 60 62 192.168.
3.128 /26
255.255
.255.19
2
192.168.
3.129 -
192.168.
3.190
192.168.
3.191
Branch
2 31 62 192.168.
3.192 /26
255.255
.255.19
2
192.168.
3.193 -
192.168.
3.254
192.168.
3.255
ER-CS 2 2 192.168.
3.192
/30 255.255
.255.25
2
192.168.
3.193 -
192.168.
3.194
192.168.
3.195
Document Page
Conclusions
In conclusion the presentation successfully assesses the requirements
and talks about the scope and limitations of the project.
The presentation then lists the requirements for setting up the network.
Thereafter the presentation talks about the security measures present in
the network followed by the network diagrams.
After presenting the network, the design is explained and the IP address
allocation is provided.
Document Page
References
[1] B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A.
Wang, J. Stringer, P. Shelar, and K. Amidon,. The design and implementation of
open vswitch. In 12th {USENIX} Symposium on Networked Systems Design
and Implementation ({NSDI} 15) (pp. 117-130). , 2015
[2] E. Molina, E. Jacob, and A. Astarloa, Using OpenFlow to control redundant
paths in wireless networks. Network Protocols & Algorithms, 8(1), pp.90-103. ,
2016.
[3] T. Hiraguri, and K. Nishimori, Survey of transmission methods and efficiency
using MIMO technologies for wireless LAN systems. IEICE Transactions on
Communications, 98(7), pp.1250-1267. , 2015.
[4] X. Chang, J. Li, G. Wang, Z. Zhang, L. Li, and Y. Niu, June. Software defined
backpressure mechanism for edge router. In 2015 IEEE 23rd International
Symposium on Quality of Service (IWQoS) (pp. 171-176). IEEE. , 2015,

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 out of 14
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]