This presentation analyzes the network requirements of AgriDigital and identifies the VPN services used. It discusses the scope, limitations, and requirements for setting up the network, as well as the security measures and network diagrams. The design and IP address allocation are also explained.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
A Presentation on VPN networks
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction ï‚´The following report analyses the network based requirements of the company AgriDigital and proceeds to identifies the VPN services used. ï‚´At first the scope of the project is given, followed by Limitations ï‚´The report also goes on to provide the summary of requirements related to the network and the VPN services being used.
Scope & Limitations ï‚´New networking equipment is to be acquired and implemented to implement the network of AgriDigital. ï‚´These equipment should then be installed, build as per requirements for configuring new networks through the edge router [4]. ï‚´The new networks are the networks of newly set up branches of the company ï‚´These branch networks are to be integrated with the main network through VPN tunnels. ï‚´Overall network is secured by VPN firewall, and WPA2 for encrypted keys in wireless connectivity. ï‚´IPsec VPNs make it difficult for even organizational members to access the company network from public Wi-Fi regions or other areas.
Requirement analysis ï‚´Two new branches of the organization AgriDigital is newly built. ï‚´Both these branches require their network to be integrated with that of the Headquartersto avail important server side functions. ï‚´The integration the headquarters needs to happen with comprehensive security measures in place.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Virtual Private Network (VPN) ï‚´Virtual Private Networks (VPNs) are essential in hiding the network from external threats like hackers [3]. ï‚´User account verification and authentication processes is also employed by VPN. ï‚´Firewalls are necessary in fool- proofing VPN based networks.
Firewalls ï‚´Firewalls are used to filter data packets, both inbound and outbound. ï‚´Firewalls can also be used to conduct authentication of users connected to the network. ï‚´The ports and rules used by firewalls ensure only trusted connections are allow.
Encryption in Wireless Connectivity ï‚´WPA2 or Wi-Fi Protected Access is the recommended encryption technique for generating keys for devices connected to wireless networks. ï‚´These are security protocols as also security certifications for securing wireless networks. ï‚´These protocols have been developed by Wi-Fi Alliance.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Logical Network Design
Physical Network Design
Network Design ï‚´In the logical network diagram it can be seen how VPN networks are configured between networks of headquarters to Branch 1, Headquarters and branch 2 and the network between HQ and ISP [1]. ï‚´Redundancies are ensured by having multiple firewall devices set up for safeguarding the endpoint devices. ï‚´Distribution and access layer switches also add to the existing redundancy in the network. ï‚´In physical diagram layout of numerous access points are given. Thus redundancy of wireless access points ensure signal issues get eliminated [2].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IP Addressing Office subnet work IPs requi red IPs alloc ated Networ k Address es CIDRSubnet Mask Range of IPs Broadca st Address es Headq uarters91126192.168. 3.0/25 255.255 .255.12 8 192.168. 3.1 - 192.168. 3.126 192.168. 3.127 Branch 16062192.168. 3.128/26 255.255 .255.19 2 192.168. 3.129 - 192.168. 3.190 192.168. 3.191 Branch 23162192.168. 3.192/26 255.255 .255.19 2 192.168. 3.193 - 192.168. 3.254 192.168. 3.255 ER-CS22192.168. 3.192 /30255.255 .255.25 2 192.168. 3.193 - 192.168. 3.194 192.168. 3.195
Conclusions ï‚´In conclusion the presentation successfully assesses the requirements and talks about the scope and limitations of the project. ï‚´The presentation then lists the requirements for setting up the network. ï‚´Thereafter the presentation talks about the security measures present in the network followed by the network diagrams. ï‚´After presenting the network, the design is explained and the IP address allocation is provided.
References ï‚´[1] B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, and K. Amidon,. The design and implementation of open vswitch. In12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15)(pp. 117-130). , 2015 ï‚´[2] E. Molina, E. Jacob, and A. Astarloa, Using OpenFlow to control redundant paths in wireless networks.Network Protocols & Algorithms,8(1), pp.90-103. , 2016. ï‚´[3] T. Hiraguri, and K. Nishimori, Survey of transmission methods and efficiency using MIMO technologies for wireless LAN systems.IEICE Transactions on Communications,98(7), pp.1250-1267. , 2015. ï‚´[4] X. Chang, J. Li, G. Wang, Z. Zhang, L. Li, and Y. Niu, June. Software defined backpressure mechanism for edge router. In2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)(pp. 171-176). IEEE. , 2015,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser