Nt1310 Final Project

Improved Essays
VPN
Final Project Report

Mentor,
Pantea Nayebi

Team Members,
Gouri, Jayaprakash (C0700450)
Mintu, Varghese (C0696945)
Uthaya Nidhi, Kesarimangakam S Vanaja (C0694699)
Varun, Joseph (C0693430)
Table of Contents
1. Introduction……………………………………………………………………………..3
2. Virtual Private Network (VPN)………………………………………………………....3
3. Classification…………………………………………………………………………....4
3.1. Secure VPN……………………………………………………………………….4
3.2. Trusted VPN………………………………………………………………………5
4. Architecture of VPN……………………………………………………………………5
4.1. Intranet VPN………………………………………………………………………5
4.2. Extranet VPN……………………………………………………………………..6
4.3. Remote Access VPN……………………………………………………………...7
5. Typical elements of VPN…………………………………………………………….…7
6. Advantages of VPN………………………………………………………………….….8
7. OSI Model…………………………………………………………………………….…9
8. Security Protocols……………………………………………………………………..10
9. VPN Topology………………………………………………………………………...11
10. Productivity and Cost Benefit…………………………………………………………12
11. The Future of VPN…………………………………………………………………….14
12. Conclusion …………………………………………………………………………….15
13. Bibliography…………………………………………………………………………...16

1.Introduction
Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the
…show more content…
When properly chosen,implemented, and used, such techniques can provide secure communicationsover unsecured networks. Because such choice, implementation, and use arenot trivial, there are many insecure VPN schemes on the market. SecureVPN technologies may also be used to enhance security as a 'securityoverlay' within dedicated networking infrastructures.Secure VPN protocols include the

Related Documents

  • Decent Essays

    ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…

    • 403 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 693 Words
    • 3 Pages

    1. The advantage of using a very large memory cell size is that the computer can store larger values in its memory cells. The disadvantage is that there would be fewer cells available. 2. This question asks how many bits are needed in the MAR with the following numbers a. 1 million bytes = 20 bits b. 10 million bytes = 24 bits c. 100 million bytes = 27 bits d. 1 billion bytes = 30 bits 3.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The essential requirements of the organization is voice correspondence on which the whole business depends. In this way, the administration needs to pick the alternative which can improve the execution of the voice correspondence alongside the system versatility, cost adequacy and adaptability. As indicated by the given situation, the organization is offering for two alternatives, an exchanged Ethernet 100-Base – T network or Wi-Fi network. Both of these choices have their advantages and disadvantages and should be picked by the necessity. The organization can likewise concentrate on introducing voice only lines which may have better reliability and high performance for voice transfer.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Installing a custom recovery replaces the stock recovery on your Samsung smartphone. If you are not an advanced Android user, it doesn't matter which recovery you have on your device. However, people who want to install custom ROMs must replace the stock recovery for a custom recovery. Installing a new custom recovery on a Samsung device is usually easy thanks to the Odin flashing tool. You can just install the file as you would any other official software update for upgrading or downgrading the operating system.…

    • 432 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1320 Unit 2

    • 866 Words
    • 4 Pages

    2. D H C I J E K A B F G 4. SQL-92 was a major revision and was structured into three levels: Entry, Intermediate, and Full.…

    • 866 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Final Exam

    • 205 Words
    • 1 Pages

    1. A provider is assessing a 35-year-old patient woman who complains of having tremors in bilateral hands and has been having difficulty writing. She states, “it is like I can’t get my hands to do what I want”. She states her mother had Parkinson disease and is worried she may have as well.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The first challenge that comes to mind for small offices or home offices is the IT department’s responsibility of keeping the data secure. Especially when an employee is logging into the network from home. The company would have to have a firm work-from-home policy in order to protect the company’s data. Another challenge would be where to place the access points in a small building. The configuration of the AP would be an important factor in placement for a small building or home to make sure there are no dead spots.…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Allowing kids under the age of fourteen to play tackle football can have severe consequences to their young minds. I personally do not like football but I’m sure there are other ways that younger kids can play football without tackling each other and getting hurt. “ Goldstein and his colleagues advocate for no tackle football before 14 because children’s bodies, particularly their necks and upper bodies, aren’t strong enough to counteract the bobbling of the head and shaking of the brain that occurs during tackles” (Kounang 1). Not only does that sound painful but why would a parent want that for their child.…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    One of the promises the government promised to Americans is that the affordable care act would reduce health care costs. Has the affordable act care kept its promises? According to Laural Lorenzetti, drug prices and rising medical costs are still ongoing issues in America in the 21st century. To show the ongoing problems to her viewers, Lorenzetti, Fortune.com the writer uses the artwork that is created by Zerbo-Getty. The computer generated photography median is that the rising health care costs are still is a big problem in today’s society.…

    • 777 Words
    • 4 Pages
    Improved Essays

Related Topics