ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

VPN Network Design for SME

Verified

Added on  2023/06/04

|13
|608
|442
AI Summary
This presentation discusses the design of a VPN network for SMEs, including its parts, types of tunneling, security features, and implementation. The ultimate scope is to understand the development of the project, implement new devices and equipment, and reduce the overall cost of the network. The need for VPN is explained, and the types of tunneling protocols are discussed. The presentation also covers the implementation of VPN service and its benefits.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
VPN Network Design for SME
network and VPN services
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
AUTHOR’S NOTE

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction
Scope and limitation
Requirements
Need of VPN
Parts of VPN
Types of Tunneling
Hub and scope
Security features and policies
VPN service implementation
Conclusion
Reference
Document Page
Introduction
The presentation deals with establishing a
connection with all the departments of SME.
Redundant link is needed for understanding
the response of network failover
Document Page
Scope and requirements
The ultimate scope is understanding the developing
the project
To implement new device and equipment in the
current organization and so that overall cost of
network can be easily reduced.
Proper configuration of network services and
routing devices which is according to the
requirement of the given organization.
WAP (Wireless access point) should be there
which is needed for various devices from the
client request

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Requirements
The need of development of network solution can
be differentiated into various factors like service,
network requirement and lastly security.
The network solution should be created for
understanding quality of standard for each and
every device in the network.
The server needs to be kept in a separate room
under the lock so that it can be restricted from
any kind of physical access.
Document Page
Need of VPN
With the help of VPN a
complete isolated network is
established
It builds up own TCP/IP
internet
Leased Lines.
It is much costlier
It is isolated from the outside
world
Document Page
Parts of VPN
Requirement of virtual private
network
Tunneling
Encryption
Encapsulation
Authentication
Firewall

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Types of Tunneling
There are mainly two types of tunneling
protocol that is
Voluntary
Compulsory
Document Page
VPN tunneling protocol
VPN tunneling protocol comes up with layer
protocol that is
Point to point Tunneling protocol (PPTP)
Layer two tunneling protocol (L2TP)
Internet protocol security (Ipsec)
Document Page
Hub and scope
This topology is the most simple way which
allow the employees to remote sites for accessing
the main network
It is suitable for large number of traffic which is
needed by remote site and there is minimum
traffic between the sites

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VPN service implementation
A VPN can be easily implemented for
establishing secure connection between VPN
tunnel and organization network.
Reducing the overall cost
Reducing the time for transmission of
remote user
Improving the productivity
Document Page
Conclusion
From the above presentation it can be stated that proper network solution can be
generated by the checking the requirements of medium size organization. A list of
equipment has been provided which is needed for design of this network.
Document Page
References
Introduction to Information Security", Network Security, vol. 2013, no. 12, p. 4,
2013.
"The Practice of Network Security Monitoring", Network Security, vol. 2014, no.
10, p. 4, 2014.
J. Wang, "The Design of Improved Elman Network Intrusion Detection Algorithm
in Digital Campus Network", Advanced Materials Research, vol. 1049-1050, pp.
2096-2099, 2014.
S. Kermanshahi, Y. Shafahi and M. Bagherian, "Application of a new rapid transit
network design model to bus rapid transit network design: case study Isfahan
metropolitan area", Transport, vol. 30, no. 1, pp. 93-102, 2013.
1 out of 13
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]