Computer & IT

IT Research Proposal – Comparative Technology Analysis

You can download the solution to the following question for free. For further assistance in Information Technology assignments please check our offerings in Accounting assignment solutions. Our subject-matter experts provide online assignment help to Accounting students from across the world and deliver plagiarism free solution with free Grammarly report with every solution.

(ExpertAssignmentHelp does not recommend anyone to use this sample as their own work.)

Word Count

3000 words

Subject

Information Technology

Deadline

6 Days

Assignment Criteria

Write a research proposal on comparative technology analysis?

Why Choose Us?

Assignment Understanding Brief

Review your requirements with our FREE Assignment Understanding Brief and avoid last minute chaos.

Global PhD Experts

We provide you services from PhD experts from well known universities across the globe.

Free Grammarly Report

No more plagiarism worries. We give you a FREE Grammarly report with every assignment.

Delivery Before Deadline

Our experts work round the clock to provide you with solutions before the scheduled deadline.

Assignment Solution

Executive Summary

CloudReach being a growing enterprise is experiencing the need for more flexibility, reliability and diversification. For the purpose of enhancing the connectivity and productivity of remote workers and to reduce the communication expenses, the company would need to shift to SSL VPN instead of IPsec based VPN connectivity. The report elaborates on the crucial decisions, recommendations and change management plan to attain this transformation. Similarly, Goldman Sachs with its rising expenses on dedicated MPLS based WAN resources, can also switch to a low cost option of hybrid WAN. The idea would be to effectively segregate the applications based on business criticality and need for reliability and support. This report recommendations the considerations and approach which needs to be adopted by Goldman Sachs to achieve the desired changes.

Cloud Reach

Current setup and changing needs

Traditionally the company has been making use of VPN to allow the branch offices to have secure access to the company resources. This set up of VPN is currently serving as a cost-effective and feasible solution in a number of ways(Ferrigni, 2003).

  • Firstly, It is helping the company to allow for secured access to a number of users, based on a system which can effectively control the access rights
  • It is helping to enhance the productivity of the remote workers
  • It is allowing for reduction in communication costs and promoting more flexibility.

The current arrangement occurring within the company to facilitate the VPN is in the form of IPsec VPN as shown in Figure 1 given below. This method of VPN requires that an end user should have a VPN client software installed in his system. The user makes use of the internet to reach the company firewall and starts the process of key Exchange(Phifer, 2012). After the authentication has been done, the VPN tunnel or pipe is created and either of the two options, tunnel and transport are run. In the transport mode only the transport layer part of the packet undergoes encryption, whereas in the tunnel mode the entire packet undergoes encryption. The strength of this method is that it provides a significant level of reliability with regard to confidentiality and integrity. By making use of universal cryptographic standards like MD5 SHA, or 3DES it allows a robust encryption. Figure 1 below illustrates the current method of IPsec VPN(Phifer, 2012).

Download This Assignment Sample For Free

This form collects your email so that we can correspond with you through our newsletters. Checkout our Privacy policy for more information.
Yes, i consent to this conditions.