Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment - VPN Technologies and Issues

Purpose of the assessment - The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write an article.  The article must be specific to the given topics, use appropriate examples and detail of the topic given to develop a review paper. After the assignment, students are expected to learn not only the knowledge and current technical aspects of VPN but also research, data collection, analysis and writing skills, which are very important and help them for study.

Assignment Description -

Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if it ends in an 'odd' number or Topic 2 if it ends in an 'even' number.

B. Presentation

Part A description:

1. Topic 1 - VPN Replacement Technologies

VPN has some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. Review alternative options to resolve and overcome the problems of legacy VPN.

  • Congestion, latency, fragmentation, and packet loss
  • Difficulties with compliance and troubleshooting
  • Encrypted traffic does not compress
  • Lacks repeating patterns
  • More bandwidth-intensive than clear-text transmission
  • Connectivity requires high availability

2. Topic 2 - VPN Security Issues

Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of 'VPN security' displays 2.8 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose.

Instructions: Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. Read and familiarize yourself with the instructions carefully.

3. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6).

4. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.

  • Title
  • Abstract
  • Introduction
  • Literature Review
  • Main body
  • Conclusion
  • Future Works
  • References

5. The article must be a 'Review'  article including at least 15 references and not more than 25.

6. Strictly follow the IEEE reference format for in-body citations and the references section.

7. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.

8. Contents must include:

  • History and background of the topic
  • What are the challenges and drawbacks, what solutions and workouts they found
  • Possible options (solutions) and future research areas proposed
  • Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable.
  • Flowchart
  • Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.
  • Include a couple of tables to summarize the result of findings
  • How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.
  • What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper.

9. Remember to strictly follow the template and the instructions above to avoid penalties.

Attachment:- Assignment File.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92415690

Have any Question?


Related Questions in Computer Network & Security

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Short answers1 the discussion question to debate is how

Short Answers: 1. The discussion question to debate is how have companies like Apple, Microsoft and the big providers (ATT, Verizon, Sprint, etc) impacted communication today? 2. Technology wise what do you imagine for t ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As