The task 2


Overviews of the VPN technologies

A VPN is a service that provides a secure, reliable connection to the shared public network infrastructure such as the Internet.

VPNs to maintain the same security and policies as the private network. They are the most cost-effective manufacturing company setting up remote users and your network virtual point-to-point connection. Three types of main, VPNs.

  • Use VPNs - add a remote access client for a company intranet or extranet shared infrastructure. Use VPNs use analog, ISDN, modem, digital subscriber line (DSL), mobile IP and cable technologies to connect to a secure mobile users, telecommuters and affiliates.
  • Intranet VPN-networks - a link to the company's offices in the customer's place of business, (908519) and affiliates via the internal network infrastructure, which is dedicated to links. Intranet extranet VPN networks differ from VPNs in such a way that they allow access to only the employees of the company's customer.
  • Extranet VPN-networks - link to outside customers, suppliers, partners and communities of interest via a company network, shared infrastructure that is dedicated to links. Extranet VPN-networks differ from intranet VPN-networks in such a way that they allow access to external users.


Hardware Requirements

Lady using a tablet
Lady using a tablet


Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

Regardless of which model is chosen, the VPN hardware there is to be managed. In addition to, the PC hardware must be CPE devices stop DSL, cable, ISDN, or other broadband Internet connection. In some cases, this is simply a modem that connects to the broadband service; tele-working on a computer, while in other cases, it may be a combination of including router, hub, wireless access point, firewall or VPN device. Most of the large scale introduction of technology, such as standardization is critical to maintaining adequate levels of aid. Directions to the standardization difficult to challenge, as a general rule, each a different "last mail providers" has its own CPE requirements, which may or may not match the other. The world DSL or vendor for each service (Verizon, BellSouth, Cox, Roadrunner, et al) have their own broadband networking devices, and CPE, compatible with them. Support for all the different perspective of the management of the CPE devices and their configuration utilities filters, specifies the use of firewalls, understanding from the lists and provide updates can be a challenging proposition. In addition, if the VPN devices, wireless access point or from multiple computers into hubs is enabled, you can quickly amass a stack of tele-working equipment contains patch cords power supplies, which could lead to the unsafe, unreliable or overheated environment.



Detailed planning of operational and technical is critical to the success of any programme of telecommuting. Poor planning not only can result in users frustrated, but could also compromise business computing resources. The "package" that telecommuters technology uses to work remotely includes hardware, such as computers, phones, modems, printers, as well as software such as operating systems, applications, firewalls and security keys, backup software, and diagnostic tools. The heart of telecommuting "package" technology is the VPN or virtual private network. The VPN is composed of all hardware and software needed to gain authorized access to the corporate network. It may include security tokens, phonebk/Dialer encryption software, hardware or software-based data, shared authentication keys and pre-configured "tunnel" authorization server paths. Careful consideration should be given to security architecting, create access methods, which provides hardware and software standards and planning for ongoing upgrades/patches/fixes. Companies can search outsourcers and technology partners to help with the planning, deployment and operation of the project. Select a partner that has a history of implementing a programme of successful telecommuting and outlined procedures recommended practices to help navigate the myriad of challenges.

Telecommuting technologies are largely transparent to the user, so the final satisfaction of each bitolya telecommuting is the user experience. Plan for a single, integrated VPN and dial graphical user interface (GUI) that lets you establish a secure connection. Keep the same front-end if telecommuting is using dial-up, broadband, the office LAN, etc. Make sure that the front-end is smart enough to display the same appearance, regardless of access method. It must also include all the digital certificate, firewall, virus protection and other software embedded in the background, so telecommuting does not have to manually start or configure each one individually.

Lady using a tablet
Lady using a tablet


Writing Services

Lady Using Tablet

Always on Time

Marked to Standard

Order Now

The challenge of balancing the supportability and standardization with the economics of using existing equipment is difficult. Some sample considerations are:

  • New issue pre-configured PCs for Standardization maximum and minimum support costs versus existing reload with new computers and software applications VPN to minimize capital expenditures
  • VPN distribution and install the application software on CDs or via email to telecommuters for self-install on their computers vs. having the help desk staff all übergeht or considerationsexisting

Successful planning will provisions to accommodate all these situations and work to find an appropriate balance between "standards & control" and "user satisfaction and budget.


Support and maintenance of a group of telecommuters, even with the best planning, training and can be difficult. Issues that normally would in the Office and probably would be handled by asking a contributor now are the sole responsibility of the technical support. Since typically they are physically isolated from other itinerant workers, your workflow is very dependent on the proper functioning of your "technology" and responsive technical support. Studies show that telecommuters tend to work longer hours, generally well in the evening when most traditional office workers went home. CIOs have the challenge of deciding the window to technical support (i.e. limit the hours or extend the hours). Telecommuters majority prefer a single centralized point of support contact template. Telecommuters then articulate the problem once for a single contact, then resolve the problem or retrieves additional resources. A hardware failure can cause a telecommuting become completely inoperable until a repair can be accommodated. For the speed repair, consider establishing a data backup policy required and if possible, install the automated backup software, the computer unattended of telecommuting. Consider the possibility of maintaining a minimum level of "hot spares" (including computers, cable/DSL modems, routers, VPN appliances, etc.) configured and maintained by hand, the help desk for fast shipment for telecommuting or choose a service provider that provides this type of maintenance SPC. The volume of calls and occasional need to do a "local" visit help a telecommuting inspired many companies to outsource this function when your telecommuting services provider or a technical support organization has remote domain agents. If you choose to insource or outsource support role, it is important to implement appropriate tools for troubleshooting and processes to maintain productive repair telecommuters. Technical support specialists must be maintained in the following categories: hardware, application software support, telecom & provisioning and network support - uninstall/install. In addition, a well-defined escalation path within the internal it Department and outsource partners must be provided for a seamless customer service. In addition to "reactive" ' support for dealing with requests for telecommuting assistance, many CIOs are adopting a proactive management and monitoring of philosophy to the VPN network (similar to the way they are managed corporate LAN and WAN networks). To minimize problems of telecommuting and outages, plan to extend the WAN management tools to monitor the endpoints of broadband connections of telecommuting and measure uptime and performance. Some VPN services providers offer portals into their management systems so VPN endpoints (and corresponding SLAs) may be monitored. Deploying VPN service to the community of telecommuting is only part of the process. Depending on the complexity of VPN, there are many hardware, software and firmware components provided by suppliers that continuously release upgrades, patches, fixes and enhancements. Each upgrade/patch version of discrete vendor must be assessed on its own merits and then evaluated within the context of interoperability of "technology" package. This is the only way to ensure that the telecommuting will connect successfully the features that he or she requires. VPN services providers that offer CPE management will keep records of hardware, firmware, and each user configuration. They provide these patches/upgrades automatically transparent to the end user.


To implement successful VPN in this undertaking, the role, responsibility and level of services is necessary from the ISP. The ISP, the internet service provider is important because all systems online are addicted to the Internet service provider. They provide internet services to the entire country. Our company is configured as an Apex Development Bank with a mandate to facilitate the flow of credit to the promotion and development of agriculture, small-scale industries and cottage industries and village, rural handcrafts and other crafts. It also has the mandate to support all other allied economic activities in rural areas, to promote the sustainable and integrated rural development and secure prosperity in rural areas. These types of demand for the company, implement effective network installation. Between them to protect our network, we implemented the VPN Bank.

Lady using a tablet
Lady using a tablet

This Essay is

a Student's Work

Lady Using Tablet

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Examples of our work

For more secure VPN our company, we need help from the ISP. The internet service provider (ISP) plays an important role in this process. If you do not have any help Internet service provider, you cannot execute and implement the online bank and VPN. For the operation of the online bank with VPN, internet services are essential to our company requirements. Therefore, the connection of Internet service provider is not, we run the convenience system successfully. For our country, the ISP of Myanmar is all services such as (Internet, telephone and other electrical communications). This online database is for the development of rural areas, so the ISP conentrated services includes more future of rural areas.