VPN Network Design for SME

Verified

Added on  2023/04/21

|11
|765
|445
Presentation
AI Summary
This presentation provides an overview of VPN network design for SMEs. It covers the definition of VPN, how it works, critical functions, encryption techniques, protocols, implementation types, advantages, and disadvantages. The presentation aims to educate the audience about the benefits and considerations of implementing a VPN network for small and medium-sized enterprises.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
VPN Network Design for SME
network and VPN services
Name of the Student
Name of the University

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
What is VPN?
The virtual private network or VPN is the network that is
associated with the establishing its connection by making
use of internet and public communication. This is generally
used for the purpose of establishing a secure connection
between the remote employees and a network of an
particular organization.
Document Page
Working of VPN
Usage of the Protocols so as to create the VPN tunnel in the
network.
Configuring the firewalls so as to allow only the authorized
user to communicate with the organizational network via
the firewall
The usage of the datagrams consisting of the information
related to the destination as well as the source.
VPN is used for establishing Two connection whereas the
other connected with the internet.
Document Page
Critical functions
Data Integrity
Associated with checking so as to analyze any kind of changes taking place in
the data packets
Confidentiality
Encryption of the data before transmission is to be done by making use of the
commination channels so as to maintain the confidentiality
Access Control
Restricting the illegal access to the organizational resources by proper
configuration of the firewall.
Authentication
Verifying the data should by analysis of the source address.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Encryption
The application of the encryption before transmission of the
data in the internet is to be done along with usage of various
types of encryption techniques is to be done. Some of the
techniques include:
Digital Signature
Public key encryption
Document Page
VPN Protocols
Some of the most important VPN protocols includes the
following:
L2TP (Layer 2 Tunneling Protocol)
PPTP (Point to point tunneling Protocol)
IPSec (Internet Protocol Security)
SOCKS
Document Page
Implementation of VPN
VPN implementation can be done in three types of network
which includes the following:
Remote Access – For the remote users
Intranet – For within the organization
Extranet – For outside of the organization

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advantages
Reduction of the cost by elimination of the cost of the
leased lines
Reduction of the long distance telephone charges along
with enabling of the remote access
service providers are capable of providing support
Reduction of the operational cost
The Scalability of the VPN network is very high is capable of
growing without affecting the network.
Document Page
Disadvantage
The security issues of the public network should be
understood for using it in VPN network and taking
precautions
Controlling the network is not possible and besides this the
network performance is highly dependent upon the internet
service provider and the bandwidth of the leased line
The protocols are required to be accommodated and
integrated with the existing technology used in the
organizational network
Document Page
Bibliography
1. D. Choffnes, "A case for personal virtual networks." In Proceedings of the 15th ACM Workshop on Hot Topics in Networks, pp. 8-14.
ACM, 2016.
2. R. Moreno-Vozmediano, R. S. Montero, E. Huedo, and M. I. Llorente, "Cross-site virtual network in cloud and fog computing." IEEE
Cloud Computing 2 (2017): 46-53.
3. R. Munoz, R. Vilalta, R. Casellas, R. Martínez, T. Szyrkowiec, A. Autenrieth, V. López, and D. López, "SDN/NFV orchestration for
dynamic deployment of virtual SDN controllers as VNF for multi-tenant optical networks." In Optical Fiber Communications
Conference and Exhibition (OFC), 2015, pp. 1-3. IEEE, 2015.
4. Sadasivarao, D. Naik, C. Liou, S. Syed, and A. Sharma, "Demystifying SDN for optical transport networks: real-world deployments and
insights." In Global Communications Conference (GLOBECOM), 2016 IEEE, pp. 1-7. IEEE, 2016.
5. Vogel, D. Griebler, C. A. Maron, C. Schepke, and L. G. Fernandes, "Private IaaS clouds: a comparative analysis of OpenNebula,
CloudStack and OpenStack." In Parallel, Distributed, and Network-Based Processing (PDP), 2016 24th Euromicro International
Conference on, pp. 672-679. IEEE, 2016.
6. J. T. Harmening, "Virtual private networks." In Computer and Information Security Handbook (Third Edition), pp. 843-856. 2017.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]