Comprehensive Analysis of Virtual Private Networks and Database Access

Verified

Added on  2022/10/11

|4
|803
|12
Report
AI Summary
This report provides a comprehensive overview of Virtual Private Networks (VPNs), focusing on their types, key characteristics, and applications in accessing back-end databases. The study differentiates between remote access VPNs, which enable secure connections for individual users, and site-to-site VPNs, designed for connecting entire networks of different office locations. The analysis highlights the functionalities, advantages, and use cases of each VPN type, including how they can be set up and utilized to access databases. The report also briefly touches upon the security aspects and bypass of regional limitations. The research references various academic sources to support the discussion on VPN technologies and their practical implementations. The report is made available on Desklib, a platform that provides students with essential AI-based study tools, including past papers and solved assignments.
Document Page
Running head: RESEARCH AND DISCUSSION ON VIRTUAL PRIVATE NETWORK
Research and discussion on virtual private network
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1RESEARCH AND DISCUSSION ON VIRTUAL PRIVATE NETWORK
Demonstrating various features of a virtual private network
Accessing to back-end databases are essential for designing interfaces. The following study
is made on researches and discussion on various possibilities for the VPN or the “Virtual Private
Network”. This is get access to the database present at the back-end. In this analysis, various kinds
of VPNs, key characteristics and the way they can be set up and utilized for accessing database are
investigated.
The VPN is primarily of two types. Firstly, there is a remote access VPN. It allows the users
for connecting to the private networks and accessing all the resources and services distantly. This
inter-connection taking place between the private network and user take place through online. Here
the connection is private and secured (Haug et al., 2018). They are helpful for business and home
users. For instance, as the staff of any organization goes out of the station, can utilize the VPN.
These are intended for making connection with the private network for the business. At this place,
they are able to remotely access different types of resources and files over various private networks.
Here, the users can mainly utilize VPN serves for bypassing the regional limitations over Online and
can access the sites that are blocked. Besides, the users who are aware of Internet security can also
utilize the services for developing their privacy and security of Internet (Ali, 2019).
Then, there is site to site VPN. It is also known as the router-to-router VPN. These are
commonly found to be utilized in large businesses. These organizations having branch offices at
distant location can utilize the technology of site-to-site VPN. Further, it is intended to connect to the
entire network of one office location. This must be done with the network of another. Here, the VPN
which is intranet-based can be utilized as various offices of similar organization are inter-connected
through the type of site-to-site VPN. On the other hand, it is witnessed that as the business makes
Document Page
2RESEARCH AND DISCUSSION ON VIRTUAL PRIVATE NETWORK
use of the site-to-site VPN type. This is for connecting to workplace of any another business, it is
known as The VPN which is extranet based (Boers, 2015). Primarily, the site-to-site VPN can
generate an imaginary kind of bridge put between the networks that are present at the geographically
distant places of offices. Moreover, technology can be connected through Online. Further, that can
sustain secured and private communication taking place between those networks. Under the
umbrella of site-to-site VPN a single router is able to stay active as the client of VPN with additional
router services and VPN servers (Bahnasse et al., 2018). This is because it is been based on router-
to-router communication. As the authentication gets validated between these couple of routers, then
the communication begins.
Here, the primary advantage of the remote access VPN involves simple set-us with efficient
hassle-free usage. Nevertheless, it is unsuitable for meeting the needs of different large-scale
businesses. On the other hand, the site-to-site VPNs are been common the high-scale business cases.
Here, the communications present between several departments throughout the world is seen to be
critical. Additionally, these type of technologies is developed with a cause and never provides the
flexibility seen under the services of commercial type of VPN.
Document Page
3RESEARCH AND DISCUSSION ON VIRTUAL PRIVATE NETWORK
References:
Ali, S. (2019, March). An Enhanced Virtual Private Network Authenticated Ad Hoc On-Demand
Distance Vector Routing. In International Conference on E-Business and
Telecommunications (pp. 190-197). Springer, Cham.
Bahnasse, A., Talea, M., Badri, A., & Louhab, F. E. (2018, April). New smart platform for
automating MPLS virtual private network simulation. In 2018 International Conference on
Advanced Communication Technologies and Networking (CommNet) (pp. 1-8). IEEE.
Boers, A. (2015). Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels.
Haug, R., Kolesnikov, R., Munn, K., & Taylor, G. (2018). Virtual Private Network Security.
Network Security, 4, 2.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]