A virtual private network is designed for a small and medium enterprise after the analysis of the service requirement and the protocols used for the development of a VPN network solution. An analysis is made on the architecture that should be used for the development of the network and a road map of the process is interpreted in the report for following it and support the administrator for the management of the development process of the project. The technologies that can be applied for increasing the efficiency and scalability of the network framework is analyzed such that it can be implemented for meeting the long term goals of the organization. The scope and limitation of the project is analyzed and a solution design is created before starting the project development process such that the design is evaluated by aligning it with the requirement of the organization.
The scope of designing the VPN network design are as follows:
The limitation for designing the VPN network are as follows:
There are different component that are needed for the development of the network solution and there are different elements that are needed for the management of the components. A client VPN software is needed for establishment of secure connection with the remote branch. The routers should be selected such that it have support of VPN and firewalls should be deployed such that legitimate VPN traffic are allowed to access the internal network of the organization. A VPN server is needed to be installed in the network for management of the session and management of the incoming data traffic for maintaining access of the network resources. The channels used for communication should be encrypted and the physical access of the VPN server should be restricted for the management of high level security.
The network topology of the VPN network infrastructure is developed with the use of public telecommunication network and the WAN is extended from the core site to reach the branches of the network. Proper encryption technique is applied and security procedure is applied for keeping the data private. The implementation of VPN helps in enabling the company to share distributed data and application without much expense [12]. Dedicated leased lines are not needed for transmitting the data packets and internet can be used for serving the needs of the users and improve the performance of the organization. There are different network monitoring tools that can be applied for the identification of flow of data packet and the selection of the topology.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Admin network |
50 |
62 |
193.177.30.128 |
/26 |
255.255.255.192 |
193.177.30.129 – 193.177.30.190 |
193.177.30.191 |
Finance Network |
100 |
126 |
193.177.30.0 |
/25 |
255.255.255.128 |
193.177.30.1 – 193.177.30.126 |
193.177.30.127 |
Sales Network |
200 |
254 |
193.177.28.0 |
/24 |
255.255.255.0 |
193.177.28.1 – 193.177.28.254 |
193.177.28.255 |
Dispatch Network |
150 |
254 |
193.177.29.0 |
/24 |
255.255.255.0 |
193.177.29.1 – 193.177.29.254 |
193.177.29.255 |
The following are the security implication that can be applied for increasing the security of the VPN network.
The network policy should be developed for the deployment of the network framework and provide guidelines to the user for the appropriate usage of the VPN and distribute it to the responsible people for controlling and governing the usage of VPN. The user access policy should be developed for the management of the access rights for the user and providing them to access the necessary resources.
The servers should be connected via redundant link for the management of the network loads and reduce the risk of unavailability due to failure of link. The data traffic in the network is needed to be managed and the servers should have support for virtualization such that it can be used for serving more number of users [2]. A regular backup of the network should be performed and stored in remote location such that it can be used for restoring the network in case of disaster and no data is lost. A power backup plan should also be created such that the situation of power outrages can be handled and the uptime of the network is increased.
For the implementation of the VPN service a research is done on the business needs and it is found that VPN can be deployed for getting various service such as:
Remote access VPN – This is used for connecting a remote user using mobile or home network to connect with the private network of the organization. The VPN is used for permitting secured, encrypted connectivity between the private network and remote users.
Intranet VPN – This type of VPN is created for establishing connection between two fixed location and it can be branch to branch, head office to branch, etc [5]. This protocol is used for joining multiple remote location and work as a single private network.
Extranet VPN – It is used for connecting the business partner of the organization for example customer, supplier and allow the user to work with other parties and securely share data in the shared environment.
WAN replacement – VPN can be used as an alternative to WAN because the maintenance cost of WAN is much higher specially in case of network dispersed over a larger geographical area. A less cost is required for VPN because the overhead cost for management of WAN is higher and the scalability is higher [10]. The reliability and performance of the network can be improved with the implementation of VPN and creating a tunnel for communication via the internet.
Conclusion
It can be concluded that it is essential to identify the scope and limitation of the project for identification of errors and resolving it before deployment of the network framework. The requirement of the organization is needed to be analyzed such that it helps in analyzing the VPN parts and service essential for the development of the project. The network topology that should be followed for the development of the network is needed to be identified and an IP addressing plan is created for the configuration of the network interface of the hardware device essential for the development of the network framework. AN analysis is made on the security requirement of the organization and a security feature and policy is applied to the network for increasing the security of the network. A redundancy and failover plan is created for increasing the availability of the network and provide service to the users.
Aguado, Alejandro, et al. “VPN Service Provisioning via Virtual Router Deployment and Quantum Key Distribution.” 2018 Optical Fiber Communications Conference and Exposition (OFC). IEEE, 2018.
Aznar, José, et al. “CNSMO: A Network Services Manager/Orchestrator tool for cloud federated environments.” Ad Hoc Networking Workshop (Med-Hoc-Net), 2016 Mediterranean. IEEE, 2016.
Baranda, Jorge, et al. “Orchestration of end-to-end network services in the 5G-Crosshaul multi-domain multi-technology transport network.” IEEE Communications Magazine7 (2018): 184-191.
Baucke, Stephan, et al. “Cloud API support for self-service Virtual Network Function (VNF) deployment.” Network Function Virtualization and Software Defined Network (NFV-SDN), 2015 IEEE Conference on. IEEE, 2015.
Brown, Gabriel. “Mobile edge computing use cases and deployment options.” Juniper White Paper(2016): 1-10.
DeLong, Mark R., et al. “Protecting sensitive research data and meeting researchers needs: Duke University’s Protected Network.” arXiv preprint arXiv:1710.03317(2017).
Hong, Tae Chul, et al. “Network architecture for control and non-payload communication of UAV.” Information and Communication Technology Convergence (ICTC), 2016 International Conference on. IEEE, 2016.
Khan, Ateeq, et al. “Variability management in Infrastructure as a Service: Scenarios in cloud deployment models.” Computing, Networking and Communications (ICNC), 2017 International Conference on. IEEE, 2017.
Liang, Chengchao, and F. Richard Yu. “Wireless network virtualization: A survey, some research issues and challenges.” IEEE Communications Surveys & Tutorials1 (2015): 358-380.
Liu, Guojun, et al. “Evolution Models of Power Communication Network Management Based on IPv6 Network.” 2015 International Conference on Industrial Technology and Management Science. Atlantis Press, 2015.
Perrig, Adrian, et al. “Deployment and Operation.” SCION: A Secure Internet Architecture. Springer, Cham, 2017. 191-239.
Shankar, R., and S. Duraisamy. “Different Service Models and Deployment Models of Cloud Computing: Challenges.” (2018).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download