ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 09 May 2017 My Price 9.00

IT351 Computer Networks

  • IT351 Computer Networks

Chapter 11 Assignment: VPNs

Please use your own word on this assignment

Since the textbook covered VPNs in chapter 7, which we skipped, we'll use this assignment as an

opportunity to learn a little more about VPNs. Before doing this, you should read the descriptions

of site-to-site and client-to-site VPNs from page 340.

Probably the four most common protocols (or collections of protocols) used to create VPNs are

PPTP, SSTP, IPsec and OpenVPN. All four of these are mentioned in the textbook, with varying

levels of detail. To answer all of the following questions, you'll also have to do some research

online.

I believe that the each of these questions only has one correct answer. If you are questioning

whether your answer is correct, you should provide the links to two sources where you found

your answer. If it is incorrect, but those two sources support your answer, I will give you credit.

 

Question 1. Which of the four protocols provides the least security, and should really never be

used (but yet it still is!)?

Question 2. Which of the four protocols is open source?

Question 3. Which of the four protocols is the most complex to administer (for instance, it may

require opening certain ports on a firewall)?

Question 4. Which TWO of the four protocols use SSL, the same protocols used by HTTPS?

Question 5. Which ONE of the four protocols does not support site-to-site VPNs?

Question 6. In the spring of 2014, some encryption programs were found to have a vulnerability

that became known as Heartbleed.

 

An attacker exploiting this vulnerability could learn the encryption key being used by the program. Which of the four was vulnerable to Heartbleed? (it has since been patched – the answer to this question is not the same as the answer to question 1).

 

Chapter 11 Instructor CommentsUp until this week, we've dealt with technologies used within a LAN. But almost every LAN endsup connected to other networks, and that's the purpose of a WAN.You connect to other networks by First connecting to a network belonging to an internet serviceprovider (ISP). Through the ISP's network you can access the internet and you can connect toother LANs controlled by your organization – for instance, you can connect branch ofFices to amain ofFice.Connecting to the InternetWhen connecting to the internet, the technologies used by businesses are largely the same thatare available to residential users, though not all technologies are available in all locations. Whatmakes business service different is that businesses often purchase guaranteed bandwidth andmuch improved customer service.±or residential use, you internet services are unlikely to guarantee any minimum bandwidth.Advertised bandwidths are approximations at best and often represent the maximum available.You are almost always sharing bandwidth with your neighbors. And if something goes wrong, youaren't going to be a particularly high priority.But downtime for a business means lost productivity, lost sales, and lost customers. So they willoften pay signiFicantly more than residential users, but receive guaranteed service and responsivecustomer support.Note this is not true of all businesses. The business service that you see advertised withresidential service at a slight premium usually doesn't provide either of these beneFits, it may be arepackaging of residential service that provides additional email addresses and a domain name,for instance. The services I am referring to are usually sold completely separate from residentialservice.±or organizations that are serious about avoiding downtime, it is common to have two ISPs, sothat if one fails, the other can take over.Connecting two LANsThe other use for WAN connections is to connect two LANs, for instance, connecting a branchofFice to the main ofFice.Obviously, if both the branch ofFice and main ofFice are connected to the internet, they cancommunicate with each other across the internet. But the real goal of a connection between LANsis to make the two LANs function as if they are a single LAN.±or instance, IP addresses used in LANs are typically private IP addresses, such as 192.168.n.naddresses. ±or a device inside the branch ofFice LAN to communicate with a device inside themain ofFice LAN across the internet, Network Address Translation (NAT) is required on both ends

Attachments:

Answers

(11)
Status NEW Posted 09 May 2017 01:05 AM My Price 9.00

-----------

Attachments

file 1494292245-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)