The VPN or the Virtual private network can be explained as the service that helps in establishing a secure connection between two remote locations using the public internet services. The virtual private network helps in the process of enhancing the security services with the use of the secure medium. The Use of the VPN is one of the most secured network transmitting protocol that can be used, but it also have some of the major limitations. Other than this one of the other major thing that the VPN helps in making a connection anonymous. Hence if there is something is to be done without getting traced the same can be done using the same. One of the other major benefit of using Virtual private networks is that, the organisational can control the incoming and outgoing traffic of the organisation. This enables to track all the nessecery transactions. The VPN also lets the management of the organisation to set up different IP addresses for all the machines that are present in the organisation and hence tracking the same also becomes very much easier.
This paper describes what virtual private network is and how these can be used for the process of secured transmissions. This paper also describes the security issues that are related to the VPN services. Further this paper describes the major differences between the extranet and intranet virtual private networks. The major different kind of the IP addresses techniques are also explained in the papers.
Although the VPN seems to be one of the most secured service that have been developed but yet there are some of the major limitations in using these. This paper explains the property that helps in the process of the ensuring and using the network security [1]. The network design can help to understand how the data flows through the system and using the VPN can help in the process of secured transmissions. VPN also helps in the process of encrypting information in between the computer systems and VPN servers. There are three types of the virtual private network services that are available in present time, namely
One of the major limitation of using the Virtual private network is that it makes the internet connection slower that the obtained speed.
In order to establish a proper connection in between the remote branch and the local office the most important need is the use of the firewall between the connections [2]. There is a need of the hardware like the servers and the work stations. The most important thing that is required is the internet connections. Further the VPN enabled routers and switches are required for the process.
The logical design shows the interconnection of the all the work stations and devices connected using the firewall [2]. This ensures that all the data in the local office as well as the head office are safe and are encrypted. In this system the connection from the main internet provider is comes passing through a firewall which is directly connected with the head offices.
The physical design shows the contention in between the headquarters hubs and the branch offices spokes through a secure tunnel connections. The virtual private networks hubs and spokes helps in the process of secured connections using a central VPN router. This helps the employees of the organization to access the main network directly.
The VPN has two kind of the topologies that are present, intranet VPN and the extranet VPN.
The intranet VPN and how the intranet VPN helps in the process of securing the connection between the service provider and the workstations.
In case of the intranet connection, the main office transfers information using the VPN routers through secure tunnels [3]. These signals are then received by the remote offices and using router and these are then used. The primary benefits of the using the intranet are, it helps in the reducing the bandwidth of the wireless area networks or the WAN. Further, the cost of the same is also very low. Connection of new sites becomes easier in case of the intranet connections. It also helps in increasing network uptime by enabling WAN link redundancy across service providers
The use of the extranet virtual private network connection between the main office and the business partner office. The extranet VPN can be called more secure that the intranet virtual private network [1]. In case of the extranet VPN for enabling the connections there are needs for the dial up connections in order to enhance the security. Unlike the intranet there is a middle dial up partner and hence the connections are most secured. This helps in the process to ensure that the connection always comes through the dial up section and hence the identity of the connection can be easily accessed.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
HQ |
100 |
126 |
192.168.8.0 |
/25 |
255.255.255.128 |
192.168.8.1 - 192.168.8.126 |
192.168.8.127 |
RB |
50 |
62 |
192.168.8.128 |
/26 |
255.255.255.192 |
192.168.8.129 - 192.168.8.190 |
192.168.8.191 |
RB |
50 |
62 |
192.168.8.192 |
/26 |
255.255.255.192 |
192.168.8.193 - 192.168.8.254 |
192.168.8.255 |
R1-ISP |
2 |
2 |
192.168.9.0 |
/30 |
255.255.255.252 |
192.168.9.1 - 192.168.9.2 |
192.168.9.3 |
R1-R2 |
2 |
2 |
192.168.9.4 |
/30 |
255.255.255.252 |
192.168.9.5 - 192.168.9.6 |
192.168.9.7 |
R1-R3 |
2 |
2 |
192.168.9.8 |
/30 |
255.255.255.252 |
192.168.9.9 - 192.168.9.10 |
192.168.9.11 |
The above table is showing the IP addressing schema for the organization. Total 5 subnet is Used in the above table. One is for the headquarter, and other two is for the two-remote office. One subnet is used for the HQ router to ISP and another two subnets are used in between the HQ and remote office router.
This is one of the major thin that is to be done [3]. The major point of IP addressing is that every device that is connected in the network is having a unique IP address. This makes sure that every device is uniquely identified. If there is any case of fraud then this makes sure that there is no problem in ensuring the correct device. There three types of IP addressing that can be done, namely as
The Virtual private network provides some of the major security features and policies. One of the most important security feature that the VPN provides is encrypting the messages in between the router and the servers. Other than this it is very easier to add or remove any user from the system. Further it helps in decreasing the costs f the telecommunications. There are three major components of the VPN, protocols, security and applications [4]. All these helps in the process of ensuring proper and safe interconnections. One of the other major security feature of the VPN is the scalability feature of the VPN. The services of the virtual private networks are flexible and are easily accessible thorough new infrastructures. IN terms of cost, a good VPN can cost very high but this is a one time investment and service goes on for long duration of time. Operating a virtual private network within an organization costs are significantly lower than other types of configurations.
The redundant VPN tunnel helps in the process to maintain a constant interconnection in between the HQ and the local offices. It also helps to minimize the effect of any hardware crashes or disruptions, which in turn increases the constancy and dependability of VPN tunnels over the Internet
In certain case if the service of the VPN fails then the first thing is to ensure that all the communication must be stopped. Further, use of the normal connections must be avoided in order to ensure security.
As explained the VPN service helps in the process of ensuing that the interconnection of two offices in a secured manner [5]. In order to properly implement the VPN service there are needs to ensure that the main connection between the two offices are connected through the firewall. This ensures that there is always a redundant connection in between the main office and the local offices. The use of the VPN enables the access of the internet using a secured channels. The use of hubs and spokes makes it easier to properly access these information.
Thus concluding the topic it can be said that the use of the virtual private network helps in the process of securing the servers of an organisation and helps in maintaining data security. The virtual private network helps in the process of enhancing the security services with the use of the secure medium. Further it can be said that the use of the VPN service helps in the process to ensure that the connections are always encrypted so that data cannot be overridden while using a VPN. The use of the extranet virtual private network can help in further making the services more secured. The dial up process of the extranet service makes the connections more secured and are more highly encrypted.
[1] Sinha, Sanjib. "Virtual Private Network or VPN." In Beginning Ethical Hacking with Python, pp. 185-189. Apress, Berkeley, CA, 2017.
[2] Raeespour, Akram Kargar, and Ahmed Moosajee Patel. "Design and Evaluation of a Virtual Private Network Architecture for Collaborating Specialist Users." Asia-Pacific Journal of Information Technology and Multimedia 5, no. 1 (2016).
[3] Jangid, Manoj, and Prakriti Trivedi. "Improve Performance of Successive Ratio for Virtual Private Network." In Computational Intelligence and Communication Networks (CICN), 2016 8th International Conference on, pp. 97-101. IEEE, 2016.
[4] Nurcahyaningsih, Shinta, Rendy Munadi, Sofia Naning Hertiana, and Taufik Hasan. "Transport Solution Based on Layer 3 MPLS-Virtual Private Network to Support IP Connectivity in Long Term Evolution Mobile Back-Haul." Advanced Science Letters 20, no. 2 (2014): 386-390.
[5] Lodi, Andrea, and Ahmad Moradi. "Experiments on virtual private network design with concave capacity costs." Optimization Letters 12, no. 5 (2018): 945-957.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Virtual Private Network For Transmitting Protocol. Retrieved from https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/redundant-connection.html.
"Virtual Private Network For Transmitting Protocol." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/redundant-connection.html.
My Assignment Help (2021) Virtual Private Network For Transmitting Protocol [Online]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/redundant-connection.html
[Accessed 17 April 2021].
My Assignment Help. 'Virtual Private Network For Transmitting Protocol' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/redundant-connection.html> accessed 17 April 2021.
My Assignment Help. Virtual Private Network For Transmitting Protocol [Internet]. My Assignment Help. 2021 [cited 17 April 2021]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-network/redundant-connection.html.
At MyAssignmenthelp.com, we understand that when students get stuck with tough assignments, they look for affordable services. To assist students with complex assignments, we have built a team of skilled cheap essay writers. MyAssignmenthelp.com has become one stop solution for all students who often look for answers related to their search similar to do my essay at the cheap rate or who can write my essay at affordable prices. Students prefer hiring us as we have the best provisions to render services related to do my essay online at a reasonable rate.
Answer Evaluating the financial management strategies of the top four Australian banks i.e. Commonwealth, Westpac, ANZ, and NAB Research Topic Evaluating the financial management strategies of the top four Australian banks i.e. Commonwealth, Westpac, ANZ, and NAB Introduction This report will discuss several components such as research objectives, research motivation, and conceptual information about the research concepts, and research di...
Read MoreAnswer Introduction: Tasmanian Mountain Waters is an Australian company, based in Tasmania. The company exclusively sells bottled mineral water across Australia and plans to extend its business globally to increase its international presence. The companyaims to retain the pureness and natural quality of the bottled water which is collected from remote springs of freshwater in Tasmania. Tasmania with its plentiful supply of freshwater that is ...
Read MoreAnswer: Souq is an e-commerce platform that is owned by Amazon. It is one of the largest e-commerce platforms in arab world. In this report, I have considered myself as a global manager of marketing department. The business of souq is localized in Saudi Arabia, united arab and Egypt. It was suggested that business need to widespread in other countries rather than just in gulf region. This report covers the strategies through which Souq c...
Read MoreAnswer Introduction The principles of Corporations Act put the obligation on the company directors to release their duties, responsibilities and powers with the aim to act for the business interest of the companies. The underlying fact is that the directors need to discharge their duties and powers for maximizing the organizational wealth for the best interest of their shareholders (Tricker and Tricker 2015). However, the occurrence of some r...
Read MoreAnswer Overview of Red Rooster Red Rooster was founded in 1972 is a chain of Australian fast food restaurant that specializes in serving roast chicken. The first Red Rooster store was opened in 1972, in Perth suburb of Kelmscott, Western Australia (Lasek, Cercone and Saunders, 2016). There possess a wide range of products including half roasts, whole roasts, burgers, wraps, salads, desserts, beverages, promotions formerly including Cheese and...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
It is a good source of help for any assignment. My order completed before the deadline, and rework have done for the assignment. It is quite expensive for the students. wishes for better deal regards roh
Australia
Great help and great service! I was concerned it wouldn't get to me on time, but sure enough, it was on time! This saved my rear. Thanks, you guys are awesome
Australia
Great paper. It was very detailed and everything was what was necessary for the paper.
Australia
seems ok to me, but once you forward the assignment it take 2 weeks for the feedback, then I will know if they are ok, so please do all the rest as well, if some answer are not ok they will ask to do it again
Australia