Vpn replacement technologies

Assignment Help Computer Networking
Reference no: EM132097631

Learning Outcomes covered in this assessment

Students should be able to demonstrate their achievements in the following unit learning outcomes:
a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.
b.Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations

Part A description:

Topic - VPN Replacement Technologies

Legacy VPNshashad some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. List the limitations/problems existed in legacy VPNs and review alternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details as described in section 3.

Common Part- VPN Security Issues
Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of ‘VPN security' displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose.

Instructions:

Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. Another link for the template:

3. Read and familiarize yourself with the instructions carefully.

4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6).

5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.

• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (500 - 1000 words)
• Literature Review (500 - 1000 words)
• Main body (1000 - 1500 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)

6. The article must be a ‘Review' article including at least 5 references and not more than 25.

7. Strictly follow the IEEE reference format for in-body citations and the references section.

8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.

9. Contents must include:
• History and background of the topic
• What are the challenges and drawbacks, what solutions and workouts they found
• Possible options (solutions) and future research areas proposed
• Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable.
• Flowchart
• Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.
• Include a couple of tables to summarize the result of findings
• How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.

• What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper.
10. Remember to strictly follow the template and the instructions above to avoid penalties.

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- Assignment.rar

Verified Expert

The current study has analysed the usefulness of virtual private network. the application and benchmarks of the VPN has revealed that this technology is useful for multi sharing platforms. the security purposes of the VPN has been found to strong enough to maintain organisational data and network.

Reference no: EM132097631

Questions Cloud

What should be the next step be to improve the port : Develop a Port Improvement Plan (PIP) Presentation for a port of your choice. Do not include any secure, confidential or private information in your plan.
The multilateral free trade agreement : You are aware of NAFTA - the multilateral free trade agreement between the United States, Canada and Mexico.
Why do you want to pursue your dental education : Why do you want to pursue your dental education at New York University? What about the University of Washington School of Dentistry's predoctoral program.
Describe all the quality challenges facing tesla described : List and describe all the quality challenges facing Tesla described in the case study.
Vpn replacement technologies : MN610 - Virtual Private Networks - VPN Technologies and Security issues - Analyse and discuss the significance of VPN for contemporary organisations
Design and develop using android studio a rent a car app : HC2051 :You are required to design and develop using Android studio a Rent a Car App, that provides a listing of six Australian known car rental companies.
Analytical quality tools available to tesla : List all of the analytical quality tools available to Tesla. describe why your tool of choice would be the best tool to address each of your four challenges.
Number of bacteria per cubic foot : If a researcher wanted to determine if carpeted rooms contain more bacteria than uncarpeted rooms. The table below shows the results for the number
Effects of driving under the influence? : To illustrate the effects of driving under the influence? (DUI) of? alcohol, a police officer brought a DUI simulator to a local high school. Student reaction

Reviews

inf2097631

10/18/2018 12:08:37 AM

Thank you for your help. I will be back with some more assignments and questions as you work is up to the mark and accurately done. Thank you again to the whole team of Expertsmind and the tutors too who are so much dedicated.

len2097631

8/27/2018 11:02:22 PM

Criteria 5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Criteria 6 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2097631

8/27/2018 11:02:05 PM

Criteria 3 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately Criteria 4 All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.

len2097631

8/27/2018 11:01:51 PM

Example Marking Rubric for Assignment #: Total Marks 100 Note: The marking criteria varies for each assignment Marking Rubric Criteria/ Grades High Distinction (HD) [Excellent] >80% Distinction (D) [Very Good] 70%-80% Credits (C) [Good] 60%-70% Pass (P) [Satisfactory] 50%-60% Fail (N) [Unsatisfactory] <50% Criteria 1 Concise and specific to the project Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Criteria 2 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately

len2097631

8/27/2018 11:01:29 PM

Literature review Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review conclusion that should be included at the end of the section. Check word limit. 10 In body citation Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines 5 References section Check whether they follow the instruction. Otherwise, no marks will be provided 5 Presentation Presentation skills and materials quality 10 Total 100

len2097631

8/27/2018 11:01:22 PM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Detailed Description of the Criteria Marks Conforming to the template and format No marks will be given and severe penalties will apply for any breach of the format and template. Fonts, sizes, spacing, captions, headings etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instruction to avoid penalties. 10 Figures and tables created They should be created yourself and not copied from elsewhere. For full marks you should create at least 2 figures and 2 tables. 20 Main sections Main body structures and contents quality including word limit. 40

len2097631

8/27/2018 11:01:02 PM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively.

Write a Review

Computer Networking Questions & Answers

  Recognize hardware and software required to secure your

write a 3- to 5-page paper that includes the following based on your chosen virtual organization identify hardware and

  Implement the network topology using packet tracer

Draw a table such as the one show below and subdivide the network into subnets Use the smallest subnet where possible and routers use G0/0 to connect to the LAN. How many MAC does the 24 port Cisco switch used in the Packet Tracer has and what is the..

  Explain physical locations distributed across county

Corporation is expanding from single physical location to three physical locations distributed across county to better serve the requirements of their customers.

  Describe the different types of virtualization techniques

Assignment: Cloud Infrastructure- Describe the different types of virtualization techniques and the role hypervisors play in a visualized platform.

  Someone whose information comes from secondary sources

Someone whose information comes from secondary sources

  What tools you see yourself using in your future classroom

Share with the group 1) the tools you have used and how you have used them and 2) what tools you can see yourself using in your future classrooms.

  Determine the hop count for router-two to subnet b

A distance vector protocol typically uses what as the metric?

  Based on the kramer 2013 article what are the merits and

based on the kramer 2013 article what are the advantages and disadvantages of a content delivery network cdn? if you

  Software development methods comprise joint application

software development methods include joint application development jad rapid application development rad extreme

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

  Find how to use the nslookup utility in windows

Find how to use the nslookup utility in Window. Find all the option of the nslookup utility. Try the nslookup utility on some domain name you are familiar with.

  Find the total response time

Now suppose a cache is installed in the institutional LAN. And suppose the miss rate is 0.4. Find the total response time. Find the total average response time

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd