logo

Computer and Network Security | CN6107

14 Pages4340 Words48 Views
   

university of east london

   

Computer and Network Security (CN6107)

   

Added on  2020-03-04

About This Document

CN6107 - In this paper, we will look at issues related to virtual private networks and replacement technologies for providing alternatives to VPNs. The paper also discusses the VPN security model and explains some topics such as congestion, latency, fragmentation, packet loss, handling of missing packets, and their advantages and disadvantages.

Computer and Network Security | CN6107

   

university of east london

   

Computer and Network Security (CN6107)

   Added on 2020-03-04

ShareRelated Documents
2017Computer and network securityComputer and network security
Computer and Network Security | CN6107_1
ContentsVPN replacement technologies..................................................................................................2Abstract:.....................................................................................................................................2Introduction:...............................................................................................................................2History and background:............................................................................................................2Literature Review:......................................................................................................................2VPN security model:..................................................................................................................3Explanation:...............................................................................................................................3Congestion, latency, fragmentation, and packet loss:............................................................3Handling of the missing packet:.............................................................................................4Difficulties with compliance and troubleshooting:................................................................5Lacks in Repeating patterns:..................................................................................................6More bandwidth-intensive than clear text transmission.........................................................7Connectivity requires high availability:.................................................................................7Challenges and drawbacks:........................................................................................................7Future work:...............................................................................................................................7Conclusion..................................................................................................................................7References:.................................................................................................................................7
Computer and Network Security | CN6107_2
VPN replacement technologiesAbstract:In this paper, we are looking on the issues related on the virtual private network and the replacement technologies for providing alternative solution to the VPN. The virtual tunnelling protocol are used for deploying virtual point to point connection in creating traffic encryption in creating virtual private network. The problem of latency and packet loss can be resolved with the multiple accessing. The MPLS VPN network helps in reducing the cost and increasing the productivity of the system because it does not require any additional security system for securing thepremises. The application can be developed by using the SSL VPN on any web browser. The communication cost canbe reduced by deploying the concept of VPN. The VPN solution provides the security for managing encrypted connection to permit security.I.Introduction:The virtual private network is the extension of the private network up to the deployment of public network. It is used ofsending, receiving, and sharing data on thepublic network which are directly connected to the private network. It is capable of providing functionality, management, and security to the application running on the private network.The corporate intranet is securely access by the employees with the help of VPN. “The geographically separated offices can be securely connected with the use of cohesive network”[1]. The proxy server is used for putting geo-restriction for securing the wireless transaction which helps in protecting the identity of the location and the person. The virtual tunnelling protocol are used for deploying virtual point to point connection in creating traffic encryption in creating virtual private network. “The classificationof the virtual private network are depends on protocols used for tunnelling the traffic,location of the termination point in the tunnel, topologies used for connection, security level protection, layer 2 and layer 3 are used for providing network connectivity” [6]. VPN is the complete solution which is capable of providing security to the internet connection, securing the connection of the Wi-Fi hotspots, protection from the data sniffers, avoiding surveillance to the third party, inspection of the ISP packet, protecting theidentity of the person, preventing geo-
Computer and Network Security | CN6107_3
targeting, easy internet surfing, providing the services of the VoIP, overcoming the throttling ISP speed, experiencing the fast and ultra-streaming. II.History and background:The virtual private network is the standard solution which is capable of providing access control of the network. The encryption methodologies and security mechanisms are used for ensuring the authorisation of the user for accessing the network. “The encryption tunnel is used for transferring the information between two location which helps in preventing the confidentiality of the data” [4]. Encryptionand decryption methodologies are used for sending and receiving information securelyover the network. The protocols which are used for deploying the virtual private network are IPSec, PPTP, and L2TP. “IPSec protocol is the set of protocols which are used for securing the packet exchange in the IP layer”[2]. The transportand the tunnel mode are the encryption mode which is used for deploying the virtual private network. The Point to point tunnelling protocol is used for deploying the virtual private network across remote accessible vendor companies.”L2TP standsfor Layer2 tunnelling protocol which is used for carrying over operation between ISP and the VPN”[16]. III.Literature Review:The virtual private network is used for providing secure connection for the management of multi-office location. “Thesecure connection can be managed between remote employees and internal system”[3]. The cloud computing technologies are used for managing the encrypted connection with the remote devices. The communication issues are themajor concern area for managing the connection of the client with the contact centre. The VPN solution provides the security for managing encrypted connection to permit security. “The cloud based solution can be leveraged with the remote accessing and site to site VPN connection”[7]. It helps in lowering the cost and providing robust functionality to provide cloud based communication. The secure connection can be managed between multiple users, transfer of data between remote offices, flexibility, and scalability. The characteristics of the VPN are categorised as data confidentiality, integrity of data, non-repudiation of the sender, and authentication of the messages.The restriction of un-authorization of data helps in managing the confidentiality of the data. The VPN tunnels are used for sending the data packets over the network. The high amount of bandwidth is wasted in the transmission of data. The encapsulation of the packet helps in
Computer and Network Security | CN6107_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Security Issues - CSC332 - Case Study
|8
|3117
|62

Difference between DSL and Cable Home Service, VPN and T1 vs Frame Relay
|6
|1023
|370

VPN Applications and Significance
|8
|1128
|307

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Virtual Private Network: History, Challenges, Scope, and Future Research
|14
|701
|165

Assignment on Virtual Private Network
|9
|2285
|38