T3 2018 - MIT BN305: Virtual Private Network Report Analysis

Verified

Added on  2023/06/04

|12
|590
|259
Report
AI Summary
This report provides a comprehensive overview of Virtual Private Networks (VPNs), covering various aspects of the technology. The report begins with an introduction to VPNs, highlighting their purpose of creating secure and private networks. It then delves into the need for VPNs, discussing the limitations of earlier networking methods and the advantages of using VPNs. The report explores the concept of hybrid networks, which combine the benefits of both public and private networks. It then discusses authentication methods, firewall configurations, and tunneling techniques used in VPNs. Different types of VPN implementations, including intranet, extranet, and remote access, are also examined. The report concludes by summarizing the advantages of VPNs, such as flexibility, efficiency, and cost savings. The report includes references to relevant research papers, providing a solid foundation for understanding the topic. This assignment solution is designed to help students understand the concepts of VPNs and their practical applications.
Document Page
Virtual Private Network
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
AUTHOR NOTE :
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Content
Introduction
Need of VPN
Hybrid network
Authentication
Firewall configuration
Tunneling
Types of VPN implementation
Advantages
Conclusion
References
Document Page
Introduction
It is technology that aims to create network
which is present on physical and private
network.
VPN needs remote user for the network which
is authenticate and often requires data for
encryption.
It is mainly needed for disclosure of private
information to large number of authorized
parties.
Document Page
Need of VPN
The earlier comes up with large number of
disadvantages like
VPN aims to create own TCP/IP internet
Leased lines
Complete isolated network is needed to be
created
Costlier
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid network
Making use of advantage of both
global and private networks
Privatization is mainly done by the
help of leased lines
It is cost inefficient in nature.
Document Page
Authentication
It is a method of checking whether of data is
authorized person and if the data has been
corrupted in nature.
There are mainly two kind of authentication
Computer level authentication
User level Authentication
Document Page
Firewall configuration
It tends to provide security to network and
continuity of the business
It can easily prevent various kind of attack
and secure the data.
VPN server is need for in front of the given
firewall.
VPN server can be easily behind the given
firewall.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Tunneling
It is a virtual point to point based connection
which is done through a public based network.
It is mainly needed for transport of the given
encapsulated based datagrams.
It comes up with two end points that is remote
access and site to site.
Document Page
Type of VPN implementation
There are three types VPN
implementation that are
Intranet
Extranet
Remote access
Document Page
Advantages
Flexibility for growth
Efficiency along with broadband based
technology
Reduces long distance telephone
charges
Cost of operation
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Conclusion
VPN products are considered to be much different from vendors as it is not
compatible due to problem. Any kind of attempting of mix and match comes up
with large number of technological problems. The equipment may not give a
great amount of cost saving.
Document Page
References
[1] Völp, M., Asmussen, N., Härtig, H., Nöthen, B. and Fettweis, G., 2015,
September. Towards dependable CPS infrastructures: Architectural and operating-
system challenges. In Emerging Technologies & Factory Automation (ETFA),
2015 IEEE 20th Conference on (pp. 1-8). IEEE.
[2] Bugeja, J., Jacobsson, A. and Davidsson, P., 2016, August. On privacy and
security challenges in smart connected homes. In Intelligence and Security
Informatics Conference (EISIC), 2016 European (pp. 172-175). IEEE.
[3] Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing:
Opportunities and challenges. Information sciences, 305, pp.357-383.
[4] Dorri, A., Steger, M., Kanhere, S.S. and Jurdak, R., 2017. Blockchain: A
distributed solution to automotive security and privacy. IEEE Communications
Magazine, 55(12), pp.119-125.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]