The purpose of this project is to have you research a cutting edge or future technology
Virtual Private Networks (VPN)
The purpose of this project is to have you research a cutting edge or future technology related to telecommunications and networks.
You will be asked to write a report on a topic. The focus of this market brief report should not simply be a technical description of the topic. Possible issues that you might discuss in your report are the economic costs of the technology, or typical organizational motivations for selecting this technology, or technical factors that might limit where an organization could use this technology. For example, if the topic of your report was “Voice and Data Wiring Standards”, your paper should not be an extended discussion of the technical characteristics of copper wire. While it’s important to know that CAT-5 wiring can be used up to 100Mbps and has a given db loss over 100 meters, the focus should also be on business issues, such as how upgrading office wiring systems to Cat-5 cabling might permit voice-over-IP applications.
Deliverable: An Organized Report with Bibliography
Your report should be 5-7 double-spaced pages in length, excluding the cover sheet and bibliography. Your report must be typewritten, must use a 12-point font and 1″ margins. Each page (other than the cover sheet) should include a footer with your first initial and last name(s) left justified (e.g.,M smit), and the page number (e.g., “Page 1”) right justified..
Your report is required to reference at least four sources upon which you based your paper. Sources should not include marketing or advertising literature. Your sources must be organized in a bibliography, and all references must be cited in your paper. References in the bibliography must be prepared according to one of the standard style sheets (e.g., MLA, APA, IEEE, ACM).
http://www.lib.berkeley.edu/Help/guides.hml
…………………Answer preview………………………
The virtual Private Network (VPN) is a technology that was developed as a way to create a safe and encrypted connection for less secure networks, like the internet. It allows users to securely access corporate applications hence ensuring the safety of data as it travels through secure tunnels. Authentication methods such as the use of passwords and other unique identification ways are crucial and must be applied…………….
APA
1559 words
Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below