StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Virtual Private Network Architecture - Essay Example

Cite this document
Summary
VIRTUAL PRIVATE NETWORK ARCHITECTURE Virtual Private Network Architecture Author Author Affiliation Date This paper presents an overview of the virtual cloud environment. The basic purpose of this research is to analyze the process whereby virtual clouds (tangible machines) are used to link to virtual private networks (VPNs) that interacts with virtual enterprise architectures or enterprise resource planning systems architectures…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Virtual Private Network Architecture
Read Text Preview

Extract of sample "Virtual Private Network Architecture"

Download file to see previous pages

Basically, the cloud computing platforms (virtual clouds), both private and public, offer an excellent framework for both all the organizations (small, medium and large) to host their applications (e.g. enterprise resource planning systems) by hiring resources on rent, on-demand and paying charging depending on actual usage. In this scenario, an organization’s IT services can be distributed all through the corporation’s data centers and systematically assigned resources in cloud data centers (Wood, Shenoy, Ramakrishnan, & Merwe, 2011; Tchifilionova, 2011).

Cloud computing allows enterprises to obtain as much computation and storage resources as they require, while only paying for the precise amount that they use. In this scenario, a VPN (virtual private network) is established by creating a secure communications link between two nodes by following the characteristics of a point-to-point private link. Additionally, a VPN can be employed by the organizations to smooth the process of secure remote access in the cloud, establish and maintain a secure data channel within a network or securely connect two networks together (Researcher's Blog, 2011; Wood, Shenoy, Gerber, Ramakrishnan, & Merwe, 2009; Rittinghouse & Ransome, 2009). . advantageous that cloud resources be flawlessly incorporated or combined with an organization’s existing architecture without the need to deal with management, handle substantial configuration, or security concerns.

On the other hand, present cloud service providers provide virtual cloud servers as remote units with their own IP address space that is beyond the reach and control of the customer. In addition, this isolation of enterprise resources and clouds augments software and configuration challenges and complexity while putting into practice the services that must communicate with an enterprise’s private network. There emerge various problems when moving an organization’s information system such as enterprise resource planning systems to a virtual cloud.

In this scenario, poor communication and lack of coordination between virtual cloud and network resources make the customer once more accountable for autonomously managing for bandwidth guarantees and traffic separation with a separate network service provider. Thus, in order to deal with these challenges, there is a need to improve the cloud computing architecture to flawlessly put together virtual private networks (VPNs) (Wood, Shenoy, Gerber, Ramakrishnan, & Merwe, 2009; Rittinghouse & Ransome, 2009).

In addition, the majority of business organizations are adopting incremental approach for the migration of their enterprise resource planning systems to virtual cloud. However, organizations that are planning to move their resources to virtual clouds must keep in mind that any migration, no matter it is associated with the cloud or not, engages one-time expenditures and a lot of opposition to migration for instance some of the staff members can be against the migration. In addition, there can be some cultural

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Virtual Private Network Architecture Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Virtual Private Network Architecture Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1452364-virtual-private-network-architecture
(Virtual Private Network Architecture Essay Example | Topics and Well Written Essays - 750 Words)
Virtual Private Network Architecture Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1452364-virtual-private-network-architecture.
“Virtual Private Network Architecture Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1452364-virtual-private-network-architecture.
  • Cited: 1 times

CHECK THESE SAMPLES OF Virtual Private Network Architecture

Network Security: a Vital Element in Todays Booming Commerce

hellip; A virtual private network is an innovative concept since it allows clients to securely communicate over an insecure medium.... This report "Network Security: a Vital Element in Today's Booming Commerce" discusses some important aspects regarding maintaining a secured network connection via virtual private networks.... The History of network security seems to very vague as security was kept in low profile for most corporations.... A standard VPN might have a main LAN at the head headquarters of an organization while the others LANs can be located at remote offices A VPN uses a public network, which is internet in most cases, and is necessary in order to connect to distant sites instead of using “leased lines....
12 Pages (3000 words) Report

Virtual Private Network Tools

For a smooth establishment and maintenance of a virtual private network, one is required to have appropriate networking software and hardware installed in their computers and the local network.... In order to completely set up a virtual private network, certain software and hardware tools known as the VPN tools are necessary.... OpenVPN is an open source software application for virtual private network implementation, meaning it can be downloaded and used for free....
18 Pages (4500 words) Term Paper

Evaluation of Cloud Networking Design, Security, and Architecture Infrastructure

The paper "Evaluation of Cloud Networking Design, Security, and architecture Infrastructure" explains the challenges, solutions, and needs associated with cloud networking.... Cloud Networking decreases latency or network load.... The cloud network now includes a layer of web applications, which is additional in comparison to traditional OSI systems [15]....
12 Pages (3000 words) Coursework

Virtual Private Network

At the same time the data needs to be secure and protected from any threat or hacks so the security becomes a prime concern. A virtual private network (VPN) is a private data network which makes use of the public communication infrastructure, and at the same time maintains privacy through the use of a tunnelling protocol and security procedures.... Medical practitioners across the country are increasingly turning to virtual private networks to link multiple sites, eliminate redundancies in record-keeping and at the same time keep patient information secure....
4 Pages (1000 words) Essay

Patient Medical Record System

Location Of Data :A Centralized Server with network access clients, which will the use standard Windows 2003 Server or a Linux Distribution, is used to hold the PMR Server software suite.... It is mandatory that the server uses a resilient and high bandwidth network backbone such as ISDN, and the server system must be specifically used for Medical Database Hosting and management....
3 Pages (750 words) Assignment

Wireless Security Mechanisms

nbsp;… A virtual private network (VPN) is the addition of a private network that includes links across common or public networks as the Internet.... The act of setting up and creating a virtual private network is known as virtual private networking.... This essay "Wireless Security Mechanisms" focuses on the information being communicated with the help of a network is absolute without any physical constraints.... Like this, an attacker may get passwords that would permit illegal access to a network, credit card information, and possibly even proprietary information....
6 Pages (1500 words) Essay

New Generation Internet Capable of Intelligent Adaptation: Possibilities to Enhance Network Capacity

From the paper "New Generation Internet Capable of Intelligent Adaptation: Possibilities to Enhance network Capacity" it is clear that every stakeholder in the telecommunication industry must leverage its resources, innovation and potential towards marking the critical steps.... hellip; Due to the evolution in the telecommunication industry, the service providers are working on the transformation of their businesses to suitably address the core challenges: rolling out of new services, supporting new business models, increasing revenues, reducing network costs, enhancing capacity and improving the eco-sustainability....
60 Pages (15000 words) Thesis

IP-SEC Site to Site VPN Connectivity

… IntroductionA virtual private network (VPN) refers to a network technology developed for creating a network connection that is secure over a public network such as service provider owned private networks and the internet.... This technology is widely IntroductionA virtual private network (VPN) refers to a network technology developed for creating a network connection that is secure over a public network such as service provider owned private networks and the internet....
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us