Preview

Virtual Network

Powerful Essays
Open Document
Open Document
4865 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Virtual Network
Virtual Private Network

IS 311
Dr. Gray
Tuesday 7pm
November 19, 2002

By: Germaine Bacon
Lizzi Beduya
Jun Mitsuoka
Betty Huang Juliet Polintan

Table of Contents

I. Introduction ……………………………………………….. 1 - 2
II. VPN Topology……………………………………………... 2 - 3
III. Types of VPNs……………………………………………... 3 - 5
IV. Components of VPNs………………………………………. 5 - 7
V. Productivity and Cost Benefit…………………………….... 7 - 9
VI. Quality of Service………………………………………….. 9
VII. The Future of VPN……………………………………….... 9 - 11
VIII. Conclusion…………………………………………………. 11
IX. Bibliography………………………………………………...12 - 13
X. Questions……………………………………………………14

Introduction

Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there.
Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.
Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking. Before IP based networking corporations had expended considerable amounts of time and resources, to set up complex private networks, now commonly called Intranets. These networks were installed using costly leased line services, Frame Relay, and ATM to incorporate remote users. For the smaller sites and mobile workers on the



Bibliography: A primer for Implementing a Cisco Virtual Private Network. (1999). Cisco Systems. Retrieved October 5, 2002, from http://www.cisco.com/warp/public/cc/so/neso/vpn/vpne/vpn21_rg.htm A Technology Guide from ADTRAN Connolly, P.J., (2002, January 21). Taming the VPN. Computerworld. Retrieved September 18, 2002, from http://www.computerworld.com/networkingtopics/networking/story/0,10801,67396,00.html Dix, John Internetworking Technologies Handbook, Virtual Private Networks. Cisco Systems. Retrieved September 22, 2002, from http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ Introduction to VPN: VPNs utilize special-purpose network protocols Next-Generation Networking: The Future of Greater Performance and Flexibility. (2002, July). IDC Analyze the Future. Retrieved September 28, 2002, from http://www.business.att.com/content/whitepaper/next_generation.pdf Remote Access VPN Solutions Salamone, Salvatore. (1998, December). VPN Implementation Calls For A Tunnel Trip. Internet Week. Retrieved October 30, 2002, from http://www.internetwk.com/VPN/paper-5.htm Sandick, H., Nair, R., Rajagopalan, B., Crawley, E., (1998, August) Virtual Private Networks (VPNs). International Engineering Consortium. Retrieved October 19, 2002, from http://www.iec.org/online/tutorials/vpn/index.html VPN Technologies: Definitions and Requirements

You May Also Find These Documents Helpful

  • Better Essays

    A viable solution for a situation with several remote offices is a VPN (virtual private network). VPN software enables private information to be shared over the public network while being encrypted. Aircraft Solutions has many groups and users that need different levels of access to the internal network. Clients need access to the company website, employees need to be granted different levels of access to certain facets of the internal network. With all of these parties accessing the business, the VPN gives security to those whom feel that the information they are viewing not be available to others.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from http://vpnhaus.ncp-e.com/2013/04/12/vpns-and-common-sense-policies-make-byod-safer/…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    5 Forces Model of Verizon

    • 1974 Words
    • 8 Pages

    “Verizon Communications Inc. (Verizon) is one of the world’s leading providers of communications services. Verizon’s wireline business, which includes the operations of the former MCI, provides telephone services, including voice, broadband data and video services, network access, nationwide long-distance and other communications products and services, and also owns and operates one of the most expansive end-to-end global Internet Protocol (IP) networks. Verizon’s domestic wireless business, operating as Verizon Wireless, provides wireless voice and data products and services across the United States using one of the most extensive and reliable wireless networks. Stressing diversity and commitment to the communities in which we operate, Verizon has a highly diverse workforce of approximately 242,000 employees.” (Verizon Communications 2006 Interactive Annual Report)…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. While supporting IP-SEC VPNs provides a secure, remote-access solution for mobile employees, it does not scale and requires stringent security operations and management procedures. What alternatives would you recommend for a scalable remote-access VPN solution for your design?…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A Virtual Private Network or VPN enables a computer or network-enabled device to send and receive data through shared or public networks as if it were directly connected to the private network, while it’s benefiting from the functionality, security and management policies of the private network. It was created to establish a virtual pint-to-point connection through the using of dedicated connections, virtual tunneling protocols or traffic encryptions.…

    • 601 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Riordan has four locations spanning the globe. With three locations in the United States and one major location in China the VPN would be able to keep all four locations connected at a speed that would enable them to stay productive, accurate and up to date in many aspects of their business. There are also many options that can include mixing and matching systems to best suite Riordan’s complicated and far stretched needs. This is what makes the VPN best suited for Riordan and their needs. VPN is expandable and can be used from anywhere. Cost is in issue with any change and Riordan has also made it clear that cost, and keeping it down, is important to them. Many different companies that offer VPNS and WIFI cards; it is a matter of finding the one that is compatible with all of Riordan’s needs. It is important that we research what each company is capable of giving…

    • 2267 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    “Virtual private Network” transfer info by encapsulating traffic in IP packs and sending the packets over the internet. Companies that use a VPN from an ISP have outsourced their networks to save money on wide area network equipment and personnel…

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Vpn Solutions

    • 571 Words
    • 3 Pages

    Van der Horst, Jasper. " VPN Implementation: Questions to Ask and Points to Consider - Safe Passage | Roundup | PCMag.com." Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. N.p., 25 Sept. 2001. Web. 20 Apr. 2013. <http://www.pcmag.com/article2/0,2817,5442,00.asp>.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    secondary source

    • 587 Words
    • 3 Pages

    An academic article or paper – what you will need to write for the Arbeidskrav II – is:…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    631 research paper

    • 1926 Words
    • 7 Pages

    References: 3. Comparison of VPN Protocols . (n.d.). Comparison of VPN Protocols . Retrieved April 22, 2014, from http://teal.gmu.edu/courses/ECE543/project/reports_2001/arveal.pdf…

    • 1926 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    juniper

    • 185777 Words
    • 1143 Pages

    JNCIA Juniper™ Networks Certified Internet Associate Study Guide by Joseph M. Soricelli with John L. Hammond, Galina Diker Pildush, Thomas E. Van Meter, and Todd M. Warble This book was originally developed by Juniper Networks Inc. in conjunction with Sybex Inc. It is being offered in electronic format because the original book (ISBN: 0-7821-4071-8) is now out of print.…

    • 185777 Words
    • 1143 Pages
    Powerful Essays

Related Topics