ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Remote Access Solutions

Essay by   •  February 21, 2011  •  Research Paper  •  1,421 Words (6 Pages)  •  1,124 Views

Essay Preview: Remote Access Solutions

Report this essay
Page 1 of 6

Remote Access Solutions

Michael

Axia College of University of Phoenix

вЂÑ"

Remote access

Remote access is defined as the ability of a user to log onto a network from a distant location. This is accomplished with a remote computer connected to the distant network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer becomes a work station on the network. Communication between the network facility equipment and the remote computer is accomplished through a data link. The only difference between a remote user and workstations connected directly to the network is slower data transfer speeds. Remote Access is also useful when you want to connect local office computers with corporate networks. This allows the business to share resources as if all computers are connected to the same LAN. Two common methods of providing this type of remote access are dial-up and Virtual Private Network (VPN).

Dial-up remote access is when a client uses the telecommunications infrastructure to create a physical connection with a remote access server, which is attached to a Local Area Network (LAN). The physical or logical connection between the remote access server and the remote access client is made possible through dial-up equipment. Dial-up remote access is considered a private communication portal. The nature of the dial-up equipment and WAN infrastructure varies, depending on the type of connection. There are several telecommunications technologies can make up the WAN infrastructure used in dial-up remote access. These technologies include Plain Old Telephone Service (POTS), T-carriers, Integrated Services Digital Network (ISDN), Asynchronous Transfer Mode (ATM), and Digital Subscriber Line (DSL). The remote access software dials in directly to the network server. Dial-up access is still prevalent in many companies.

A virtual private network (VPN) is a communications network linked through another network. A VPN connection has a topology more complex than point-to-point. A VPN connection is an Internet connection that is made secure for the use of transmitting data across a WAN. The distinguishing characteristic of VPN is that they overlay other networks to provide connectivity that is useful to a user community. With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. One common application for a VPN is secure communications through a public network. VPN access has increased in recent years because connection costs between remote workforces and global enterprise locations continue to increase. Companies have begun taking advantage of the Internet as a remote access infrastructure by implementing VPNs.

Remote Access Solution - IP-based VPN

An IP-based VPN has been selected for this network. When choosing between dial-up and VPN for a remote access solution the following factors were considered:

• Cost

• Security

• Performance

VPNs are an increasingly popular option for interconnecting corporate locations over the Internet, including branch offices and telecommuters. Although Frame Relay and ATM continue to be used for VPNs, IP is the most popular type of VPN. A VPN is made possible via access to the Internet, but it is more than an Internet connection. A T1 connection to the Internet can be made into a VPN; however, the T1 alone is not a VPN.

Cost

When considering VPN versus other Wide Area Network designs the topic of cost is usually at the forefront. One of the best arguments for VPN is that you get more for less. VPN solutions can cost as much as 50% less than comparable T1 Frame Relay or Private Line services, while providing the same throughput and reliability. Because VPN, like most other Wide Area Network services, can be delivered on a T1 it provides many of the same advantages. T1 lines can be provisioned to provide both voice and data service, reducing the overall cost for the T1 line. Many carriers offer a managed VPN or network VPN solution. In this scenario, the tunneling and encryption is handled at the edge of the carrier's network, this reduces the company’s exposure to significant equipment or software costs. This includes customer premise equipment, software updates, equipment service and support, and management of the network.

Security

Security on networks is required due to increased remote access and also an increase in the type of hardware used to access the network. Companies that are concerned about their private information being accessed through the network connection are implementing VPNs. VPNs have gained favor as a security solution because they are standards based and relatively inexpensive. A major security issue is that network connection ports can be exploited by various threats, including viruses, hackers and spyware. On a VPN, before any function can be performed by an outside user, he/she must first connect via a VPN client. After proper authentication, they can connect to other network functions. This provides a secure network connection. VPNs have gained favor as a security solution because they are standards based and relatively inexpensive. VPNs need to be designed and operated with well-thought-out security policies. Organizations using them must have clear security rules supported by management.

Performance

AVPN can be deployed using a number of connection speeds including: Dialup, DS0, T1 and T3. T1 is the most common speed for VPN, and is the carrier speed selected for this network. Dedicated voice service or non VPN Internet access can be added to the T1 line. This is done using a fractional T1.Selected segments of the VPN can be securely opened to business partners, suppliers and clients. Companies can leverage their VPNs by running voice over the virtual circuits between their locations. IT specialists only need to plan and configure

...

...

Download as:   txt (9.5 Kb)   pdf (126.8 Kb)   docx (12.7 Kb)  
Continue for 5 more pages »
Only available on ReviewEssays.com