Verified Document

Virtual Private Network VPN Now Term Paper

Overhead

VPN tunnels impose overhead for dial-in users: encryption algorithms may impact the performance of the user's system, there will be an increased protocol header overhead, authentication latency will increase, PPP and IP compression will perform poorly (compared to a direct link), and modem compression won't work at all.

Support issues

Replacing direct-dial links with VPN tunnels may produce some very painful faultfinding missions. Due to the complexity of VPN carrier networks, the opportunities for "hand-washing" are enormous.

Reconnection time

Using tunneling may increase the reconnection time for dial users. With the VPN carrier L2TP model, the client has to go through two authentication phases: one on contacting the VPN carrier POP, and another on contact with the enterprise Security Gateway.

Multimedia

Applications such as video conferencing only work acceptably over low latency links that can offer the required minimum throughput. Currently on the Internet, latency and throughput can vary alarmingly. Multi-channel data services, such as ISDN and XDSL solve this problem in the short-term, allowing the "data" channel to be used for VPN tunneling, and a separate "voice" channel to be used for business telephone calls or video conferencing.

Encryption

When using encryption to protect a tunnel, data compression is no longer achievable as encrypted data is not compressible. This means that hardware compression over a modem connection is not possible.

Impact of Virtual Private Networks

The impact of VPN goes beyond secure and cost-effective remote access. Currently emerging security technology and public key infrastructure...

As VPN technology matures, organizations will increasingly utilize public Internet services for LAN-to-LAN communications, intranets and other mission critical application service networks.
Service Impact

Reduces processing time

Requires less labor effort of people

Lowers the chance of applications being lost in the system

Allows for transfer of application between agencies

Conclusions

The success of VPN in the future depends mainly on industry dynamics. Most of the value in VPN lies in the potential for businesses to save money. Should the cost of long-distance telephone calls and leased lines continue to drop, fewer companies may feel the need to switch to VPN for remote access. Conversely, if VPN standards solidify and vendor products interoperate fully with other, the appeal of VPN should increase.

The success of VPN also depends on the ability of intranets and extranets to deliver on their promises. Companies have had difficulty measuring the cost savings of their private networks, but if it can be demonstrated that these provide significant value, the use of VPN technology internally may also increase.

References

Bird, T. (2001). Virtual Private Networks. Retrieved April 21, 2005, from Vpn.shmoo.com

Web site: http://vpn.shmoo.com/vpn/FAQ.html

Virtual Private Networks. (n.d). Retrieved April 20, 2005, from Cba.unomaha.edu

Web site: http://cba.unomaha.edu/faculty/garfathr/web/vpn_pros_cons.html

VPN FAQ. (2005). Retrieved April 21, 2005, from Pbcg.com

Web site: http://www.pbcg.net/pages/vpn_faq.htm

Sources used in this document:
References

Bird, T. (2001). Virtual Private Networks. Retrieved April 21, 2005, from Vpn.shmoo.com

Web site: http://vpn.shmoo.com/vpn/FAQ.html

Virtual Private Networks. (n.d). Retrieved April 20, 2005, from Cba.unomaha.edu

Web site: http://cba.unomaha.edu/faculty/garfathr/web/vpn_pros_cons.html
Web site: http://www.pbcg.net/pages/vpn_faq.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

IPV6 in Distributed Virtual Private
Words: 3653 Length: 10 Document Type: Term Paper

Very High - IPSec works at the protocol level, independent of applications, therefore scalability is best-in-class Comparing the technological and operational benefits specifically in the areas of client access options, access control, client-side security, installation, and client configuration highlights just how differentiated the IPv4-based IPSec vs. IPv6 -based SSL protocols are from each other. In analyzing these differences, Table 3: Comparing Technological and Operational benefits of IPv6-based SSL and IPv4-based IPSec

Network Performance for Davis Networks
Words: 5282 Length: 18 Document Type: Capstone Project

Network Implementation for Davis Networks Inc. In the proposal, effort is made to develop an affordable local LAN for Davis Networks Inc. The effort involves provision of wireless Internet connection to all individuals for their desktops and laptops from the current high speed connection they have at an affordable price (800 USD -- 1000 USD). Provision of the internet to the same location costs approximately 700 USD including all other expenses

Virtual Teams a Study of
Words: 6056 Length: 16 Document Type: Thesis

The U.S., Army Logistics Network has defined specific pricing and costing levels by rank, and strives to push accountability and responsibility as far down the chain of command as possible. As nearly every officer who acts as a buyer within the purchasing and procurement teams has been trained on the fundamentals of accrual-based costing, cost-based accounting, supplier management and supply chain planning, each is given a set of metrics

Virtual Team Communications Literature Review
Words: 4059 Length: 15 Document Type: Literature Review

When portals are designed to the specific requirements of Web 2.0 design objectives, companies with virtual teams are finding they can attain higher levels of shared task ownership as well. This is because there are significantly greater levels of trust overall throughout an organization based on the collective contributions of every member of a virtual and in-office team when they share their knowledge and information together (Mancini, 2010). Portals

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Creating a Secure Network
Words: 1917 Length: 5 Document Type: Term Paper

Network Security This report is the answer to a scenario that was provided as the basis for this assignment. The idea is that a security firm has been awarded a contract for a local government agency. As part of that contract, the author is being asked to provide a number of deliverables. These would include an information flow diagram, an equipment list that would be required so as to make up

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now