Tuesday, April 30, 2019

Securing Data using IPSEC VPN over Satellite Communication Research Proposal

Securing Data using IPSEC VPN everywhere Satellite Communication - Research Proposal ExampleSpecial focus will be posture on Internet Protocol Security or IPSec protocol suite based VPN technology.A VPN is a kind of relatively secure network communion system. With the help of tunneling techniques (for example, HTTP tunnel), tunneling protocols (Layer 2 Tunneling Protocol or L2TP), IPSec technology, etc., a VPN is capable of operating as a secure and cost-effective network even inside the material of a public network infrastructure (Bentley Walker 2012). Providers are now establishing VPN compatible with satellite communication systems (Siris, Ververidis, and Polyzos 2013). However, according to Fereidooni, Taheri, and Mahramian (2012228)In essence, a VPN provides a secured tunnel between two end points across a public network. The protocols used over the Internet (TCP/IP) are designed for reliable end-to-end data voice communication over unreliable and congested networks Howeve r, satellite bears a high latency (delay) medium and TCP receipt to such latency is not in a determined way.In general, satellite modems are utilize for operating a VPN over satellite. These modems help to send TCP/IP data in the arrive at of radio frequency or RF. They also help in receiving TCP/IP data from the RF signals. This kind of network communication system is termed as the VPN over satellite (Bentley Walker 2012, paragraph 1 Ground Control 2014) technology, which has become a crucial necessity for remote users.While analyzing the security issues close to VPN, Zhu and Ma (2004) stated that public key infrastructure (PKI) can be especially helpful on with dedicated network level key exchange protocols to enhance data protection. Within a fewer years, Demirel, Alagoz, and Ufuk (2006) stated that flow identification methods too are crucial for IPSec VPN technology operated via satellites. Much later, Fereidooni et al (2009) highly-developed an enhanced

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.