Monday, December 23, 2019

Who Was Rosie the Riveter - 1298 Words

Even though Rosie the Riveter is an image frequently synonymous with the contemporary women’s movement, she was not designed to promote social change or improve the role of women in the workplace during World War II. In reality, she was promoted as the ideal female worker and was patriotic, confident, capable, and beautiful in a large propaganda campaign by the United States government. Since the war caused many men to answer the call to serve in the military, both at home and abroad, the United States was faced with the urgent challenge of recruiting women into the workforce. Rosie the Riveter was their solution to this problem. Who Was Rosie? The song, â€Å"Rosie the Riveter,† was released in 1943 and broadcast nationally on the radio. This is the first mention of Rosie that helped shape the image of the perfect female employee helping with the war effort for all the â€Å"right† reasons. Lyrics of the song include: â€Å"All the day long, Whether rain or shine, She’s a part of the assembly line. She’s making history, Working for victory, Rosie the Riveter. Keeps a sharp lookout for sabotage, Sitting up there on the fuselage. That little girl will do more than a male will do.† And jumping ahead: â€Å"There’s something true about, Red, white, and blue about, Rosie the Riveter.† The first visual image of Rosie was seen on the front of the May 29, 1943 edition of the Saturday Evening Post. Painted by Norman Rockwell, she was depicted as a larger woman and theShow MoreRelatedRosie The Riveter Was The Preeminent Icon For The Women s Rights Movement1654 Words   |  7 Pages Rosie the Riveter was the preeminent icon for the Women’s Rights Movement. Rosie represented the idea of women working during World War Two, and she was originally created as a government campaign. Previous to the 1940s, women were often identified as the housekeepers that would take care of the children while men would do the work that  ¨really mattered ¨9th. After the bombing of Pearl Harbor, men abandoned their jobs for the war effort and left a hole in the workforce that women were required toRead MoreAnalysis Of The Poem The Riveter 851 Words   |  4 PagesRosie the Riveter is a symbolic figure and has helped shape America into what it is today. The bright yellow back r ound, with bold words standing out in the navy speech bubble, â€Å"We can do it†. The focus of the poster is much more than the words written. This poster is of the women of the modern world Rosie. She is wearing a jean shirt with rolled sleeve as she flexes her arm to show her strength. She has a red bandana around her head holding up her hair. She gives a twist to what the traditionalRead MoreAmerican History: Rosie the Riveter Essay1225 Words   |  5 Pages‘Rosie the Riveter’ is the name of a fictional character which was created to represent and symbolize the millions of real women who were encouraged by the North American government to join the work force in factories, munition plants and shipyards during World War II, while most men were called to duty to serve in the army during the war. After the 1st World War, the United States enjoyed a time of cultural and economic prosperity through the 1920’s, which ended with the Great Depression in 1929Read MoreEssay On World War 2787 Words   |  4 Pagesall they had to contribute to the war in some way. Even if it was something as simple as making inspirational posters, it still helped tremendously. In many ways, women who played a part in the war affected it greatly and the bravery they showed set a huge example for us today. To begin with, Rosie the Riveter is somebody we all hear about, but few know her backstory and how she began as the inspiration she is today. Rosie the Riveter stood as a huge inspiration to women’s involvement in World WarRead MoreAmerican Women During World War II990 Words   |  4 PagesIt was the year 1940, during World War II, where Hitler is his allies controlled most of Europe and threaten to control the world. Since Japan had attacked Pearl Harbor, Hawaii, the United States congress finally agreed to enter the war against Germany and its allies after having remained neutral during the war. On October 16, 1940, President Franklin D. Roosevelt signs the Selective Service and Training Act, which required all male citizens between the ages of 26 and 35 to register for the militaryRead MoreWorld War Ii Brought Monumental Movements, Struggles, And998 Words   |  4 Pagesconstructive effects of the war, such as vast numbers of women joining the workforce, overshadowed pit iful mistakes like Japanese internment camps. For every negative result of the war effort, for example increased rations on everyday necessities, there was an optimistic outlook on life, often provided by radios. The United States transformed in many ways, but emerged stronger than ever at the war’s end. Within a few years, the role of women morphed from a simple housewife to a hardworking war industryRead MoreThe Industrial Revolution And The Effects On Women s Rights1569 Words   |  7 PagesThe Industrial Revolution and the Effects on Women s Rights The Industrial Revolution was one of the most important and productive periods of history. The Industrial Revolution has to do with the time between the late 18th century and mid-19th century where there were profound advances in production, manufacturing, and other fields of engineering. It began in Great Britain in the late 1700s which then spread to the United States and then to many other parts of the world. Societies were very ruralRead MoreWomen Can Do It Too !2037 Words   |  9 Pageswoman’s only job was to take care of kids, clean the house, and cook for her family. This lack of success and the ability to work outside the home started changing in the late 1930’s. During World War II, the US government started funding money in order to produce propaganda posters. These posters often depicted characters who motivated citizens to join the war or be part of the workforce. One of these characters, Rosie the Riveter, did just that. Designed by J. Howard Miller in 1 943, Rosie encouragedRead MoreRosie the Riveter1519 Words   |  7 PagesRosie the Riveter was a fictional character that was created to encourage women to join the work force during World War II. Men were sent off to war and they left production jobs, factory jobs, and many other positions that needed to be filled. Unprecedented numbers of women entered the world of work, marking the beginning of a major movement of women in industry. The United States on the Eve of World War II: In December 1941, the United States economy was still recovering from the hard-hittingRead MoreAmerican Minorities Have Had It Pretty Rough Thought The History Of America1139 Words   |  5 Pagestremendous shortage of labor. Not only was there great demand for labor to build up the war machines necessary to fight, but also the men were leaving employment for military service in huge numbers. As a result society asked women to fill the jobs, and they rushed to take them. †Women in 1944 made up more than one-third of the civilian labor force† (Foner). There was a new found image of women now know as â€Å"Rosie the Riveter† who was a strong welding worker who helped build machines for the war effort

Sunday, December 15, 2019

A Passing of the Torch; Europe from 1500-1800 Free Essays

A Passing of the Torch; Europe from 1500-1800 When you step back and observe history from afar you’re missing part of the story. Observing the rise of Europe, you cannot simply take into account it happened. To understand the past you need to look into past, in documents and first-hand accounts to observe the underlining issues. We will write a custom essay sample on A Passing of the Torch; Europe from 1500-1800 or any similar topic only for you Order Now To best explain the major shift in energy from the Indian Ocean Basin to the North Atlantic in 1500 to 1800 you have to observe the world and the people in context. Europe is an underdog to rise to the top. Having just experiencing the worst of the Black Death wiping out a majority of its populations, a tragedy in all senses, turned into a blessing. It sparked the scientific revolution; inspiring the Europeans to shift their views towards knowledge and discovery (Reilly, 434) . Sprinting ahead, Europe took the world by surprise. With their footing in a ‘new world’ the opportunities were endless. Exhausting their colonies at its full potential, with the cash crop, sugar they were able to revolutionize commerce into a representative model of modern trade. The Europeans weren’t the only ones making radical changes in the era. The Confucian Scholars were forcing Chinese to push inward and were eliminating commerce (Kristof, 551). Shifting of energy from the Indian Ocean to the Atlantic Ocean; Europe gained power in the era through two main triggers, the scientific revolution and the developments of the sugar plantations in the new world. To better understand what’s happening with Europe in the 1500’s and later you need to also look back at the past and see where they have been and the events leading up to the beginning of a new era in European success and discovery. When you examine Europe today they are one of the world’s leaders, less than a thousand years ago the now prominent country was spiraling down, on the brink of demise. In the mid-fourteenth century the Bubonic Plague, also known as the Black Death, originated somewhere in Asia and progressively spread though out Europe, the Near East and North Africa. Without doubt it became the greatest health disaster to date; mass graves were being dug to compensate for the dead. The Plague spread like wildfire wiping out an estimated one-fourth to one-third of the population (Reilly, 436). With no known source of treatment available or why the disease was spreading the Europeans turned to what they knew best, Religion. The Christian consensus was that God had bestowed the plague as a devastating judgment with the meaning of punishing the inflicted for his sins. People tried anything to avoid their seeming inevitable deaths, from walking around with incense to mask the wreaking stench of death, fleeing from their homes to find unaffiliated areas, or most commonly turning to God. The priest with the duty of serving the people, considered holy and without sin, were the main care takers of the stricken. Unsurprisingly, they too needed to be cared for, for they as well, contracted the disease joining their following to the death beds. We know today that the Black Death was not a punishment from god, but at the time, they had only to believe what the church told them (Reilly, 460). As priest died alongside the commoners their belief system was shattered. It was common of the time to believe what the church had told them and take it as true. For instance the church stated that the earth was the center of the universe, and it was heresy to state otherwise. With the church being proven wrong, people began to look outward for new knowledge. â€Å"Without visiting a deep ravine, one cannot understand how deep the earth is†¦ ,† just like Emperor Taizong said Europe began looking at the world to discover the truths; what is now known as the Scientific Revolution and the beginning of their restoration. Today, it is impossible to think about Modern Times and the way we live without thinking about science. We have pushed the scientific front to our limits, and now reap the benefits, from cars, phones, to healthcare. The scientific revolution truly lives up to its name. It truly was revolutionary, the standard of knowledge in the Modern world. The revolution can be traced back to Europe in a dispirit search for new understanding. Looking outward for answers from other countries such as the Muslim world and China, who already had beginnings of scientific thought, a sense of discovery and development; inspired the Europeans. In the year 1492, sailing in search of new discovery, specifically a new trade route to China, Columbus had stumbled on a seemingly endless supply of natural resources, land, and opportunity. It was called America. Entirely changing the way the ancient Greeks had depicted the world, helping enlighten the people that common knowledge was wrong (Goldstone 715-716). The Scientific Revolution and the desire to reach for new understanding that came with it pushed the Europeans. Now doubting all they had been taught before tested the fabrics of their society, the discovery of America was the most significant aspect of the shift of energy into the Atlantic Ocean. This was exactly what Europe needed. Now having the mass amounts of resources, to utilize the discovery they required manpower. Slaves were the perfect tool for procuring the workforces they required. Where better to look than Africa? Packed with able bodied men, the African tribes lacking in the ability to retaliate, found their freedom relinquished; crammed into unsanitary, overcrowded slave ships (Mintz, 47). Martinique, a sugar plantation located on the island Lesser Antilles located in the Caribbean Sea, is an example of where they could have landed (Martinique, 628). In the drawing, Field Gang, you can see the sugar plantation, a large field being worked by a multitude of black workers and one controlling master watching over them, the multitude of slaves. To compensate for the disparity in the work force, the plantation owners had revolutionized the process in which they operated their plantations. Specialized tasks were given to each worker to increase efficiency. This specialization resembled the earliest forms of assembly line. However, instead of the machines we have today, they had an agro energy focus. This means that the plantations shifted toward the use of human energy over the use of machinery (In Class). Unknowingly the systems used on plantations translated directly to the factories which began to pop up in the urban cities. At the end of the Black Death, Europe was a country in chaotic state. They were looking for a change and this desire paved the way. With a lack of populous, the lords of the current system, serfdom collapsed with little to no one to work the fields. Unlike their competitors Europe moved into the cities in search of opportunity (In Class). Drawing from their experiences in the sugar plantation, and the slave trade the Europeans became the frontier in production. Springing up in the industrial cities, factories played a large part of the shifting of energy to Europe, with them, goods and services could be provided with a significantly lower cost and at more efficient rates. This without a doubt gave them an edge over the competition. With the coming times, Europe in the sense of the world scope began to break into the picture. The Transatlantic Trade, shipping of goods between Europe and its colonies, set the stage for the shift of energy to the Atlantic Ocean. Allowed access to the resources in the ‘New World’ causality benefited the colonizers with the cheapest production of desirables. It also set for a sense of manifest destiny for the country (In Class). In conclusion this marked the beginnings of modern society developing. The question of the era is why Europe? A country stricken by plague, the collapse of feudalism, and lacking in internal stability in the form of natural resources or people; happens to be the perfect candidate. The desire for knowledge and their desire to look outward fit the bill perfectly. To make the circumstances even more perfect China lost its edge in the commerce propelling Europe ahead. David Christian writes in his essay World History in Context â€Å"One of the aims of world history is to see the history of human beings as a single, coherent story, rather than as a collection of the particular stories of different communities. † When looking at the rise of Europe as a superpower in the world, you can’t focus on the singular efforts and happenings of Europe. The rest of the world had an influence on the future. The shift in energy wasn’t only accountable to the success of Europe, notably looking at China you can see the ties between the two. For Centuries China had been a leader in commerce and trade. They assembled the largest fleet known to date consisting of over 3500 ships which had the capabilities to sail across the Pacific enabling the most secure and cost efficient form of trade. The Merchants of this era were prospering but all good things have to come to an end. After the death of the Yongle Empire in 1424, a struggle for power out broke internally. Under suspicious circumstances the successor to the empire who was selected to rule the country died. The Confusion Scholars ceased control of the country introducing new policy and deep-rooted idealisms of their ancestors. Trying to turn the focus of the country inward by 1500 they dissembled the entire fleet, destroyed the records, and made it illegal for any ship to be constructed with more than two masts. By 1525 any ocean going ship had to be destroyed. Along with the disappearance of a great Chinese fleet the ports in India, it marked one of history’s biggest lost opportunities. Without the ability of merchants to export their goods, they fell from their former glory. To add burden to this the Scholars viewed them as â€Å"necessary evils at best† (Kristoff, 555-556). Also their country already vastly spread out over thousands of miles of land, contained almost all the necessary natural resources to self-sustain itself and found no need to search elsewhere for goods. Europe on the other hand, lacked in many natural resources, which cause the need for colonization and expansion of their limits. China’s unwillingness to become a global market, unlike Europe, hurt their chances of being at the top of the era (In Class). Instigating the shift in power during the era in question, the scientific revolution and developments made in the New World, lead to a drastic change in history. Imagine if Europe had not been affected by the Bubonic Plague. We might never have explored outwards to the Americas leaving the Native population to expand. It serves evidence to the fact that changing parts of the past would alter the future. If it wasn’t for the fact that Europe had rose to power. It is not irrational to assume many of the discoveries made in this time would differ. We live in the world we do today, because the shift in energy brought about from the scientific revolution and the developments with the sugar plantations, lead to the passing of the torch from China to Europe. How to cite A Passing of the Torch; Europe from 1500-1800, Papers

Saturday, December 7, 2019

Future Network Systems and Security †Free Samples to Students

Question: Discuss about the Future Network Systems and Security. Answer: Introduction Virtual Private Network or VPN is the type of private network, expanded over public network that allows users to receive and send information and data over public network just like the computing systems are directly associated to the private network. The main benefits of VPN that the application obtains are the management, security and the functionality of private network [1]. Virtual Private Networks even enable the staffs to access the office internet even when they are outside the office. Starnet is an organization with two distinct sites, situated in Sydney and Melbourne. These two sites require interfacing amongst each other and interchanging data safely. VPN is the solution for their problem. There are various ways or several types of VPN to link the two sites for example IPsec. The report outlines a brief description about the Virtual Private Network implemented in Starnet. A table showing all the interfaces at each site is given here. The interfaces include Internal private IP interface and External public IP interface [6]. The report also describes what type of VPN is recommended for Starnet and the differences between Site to Site and Remote Access VPN. The benefit or advantages of both the VPNs are mentioned here. The report further clarifies the security features provided by VPN to protect and secure the data and the advantages and disadvantages of Virtual Private Network. Internal Private IP Interface and External Public IP Interface Site A and Site B of Starnet needs to be connected using the virtual private network. The implementation plan ensures that the local area networks or LANs at the both the sites are accessible with one another. Internal Private IP Interface External Public IP Interface i) An internal IP interface is the address, which is allocated by the local network router and is utilized within a private network to discover the devices or systems linked with it [4]. i) An external IP interface is the address, which is also allocated by the local network router and is utilized over the complete Internet to discover computer systems and devices [2]. ii) A private IP interface is provided by several devices of network, for example the routers by utilizing Network Address Translation or NAT ii) Such feature is unavailable in external public IP interface. iii) These types of IP interfaces cannot be contacted directly over the network. iii) Public IP interfaces can be contacted over the network [7]. iv) The main advantage of this interface is that it has the ability to switch servers quickly [13]. iv) The main advantage of external public IP interface is that it can be connected to the system from any machine anywhere. v) Another advantage of this IP interface is its security. It is extremely secured. v) External IP interface is not as safe as the internal IP interface [16]. vi) Private interfaces do not lose internet connectivity [18]. vi) External public interfaces has the tendency to lose internet connectivity very often. The above differences describe the differences between the Internal private IP interface and External public IP interface. For the case study of Starnet, two suitable IP addresses are assumed as A and B. the routers are R1 and R2. Type of VPN Implemented There are several types of Virtual Private Network or VPN. The basic types of VPN are as follows: i) Remote Access VPN: This connection enables an individual to link from an unlikely situation to a private organization network with the help of a desktop computer or laptop that are connected to the Internet [2]. ii) Site to Site VPN: This is the kind of Virtual Private Network, which is generated between the two different locations [7]. Site to site VPN helps to link two completely discrete geographical networks or locations. iii) Internet Protocol Security or IPSec: This is a set of protocols, which gives security to the internet protocol [19]. It normally utilizes cryptography to obtain security. iv) Layer 2 Tunneling Protocol or L2TP: It is a tunneling protocol, utilized to reinforce the Virtual Private Networks [11]. The main disadvantage of this protocol is that it does not give any security by itself. v) Point to Point Tunneling Protocol or PPTP: It is an obsolete method for the implantation of VPNs [10]. It utilizes a channel of control of TCP to encrypt the point-to-point packets. vi) Secure Sockets Layer or SSL: This is a type of VPN that is utilized with the help of a norm Web browser [1]. The main advantage of this secure sockets layer is that it never requires any kind of installation of the exclusive client software on the computer of the end user. vii) Transport Layer Security or TLS: The successor of SSL is known as the Transport Layer Security protocol or the TLS. viii) Open VPN: This is the open source software application, which executes the virtual private network techniques for generating the secured site-to-site or point-to-point connections in bridged configurations [20]. ix) Secure Shell or SSH: It is ciphered network protocol used for functioning the services of network safely over the unsafe network. The type of virtual private network implemented in Starnet is the Internet Protocol Security VPN. IPSec is a protocol suite of network, which validates and ciphers the data packets sent over the network [9]. It includes protocols for initiating mutual authentication within the agents at the starting of the session and negotiating the cryptographic keys to utilize within the session. Starnet would get the advantages of IPSec. The benefits of Internet Protocol Security are as follows: a) Origin of Data Authentication: This feature helps to identify who has sent the data to whom and thus hacking can be mitigated [8]. b) Encryption: This characteristic ensures that data is not read during the time of sending or within the route. c) Connectionless Integrity: This feature ensures that data is not altered during the time of sending or within the route [12]. d) Protection: IPSec helps to detect the packets and to protect them against the attacks of DoS or denial of service [19]. IPSec should be selected, as it is the most secured virtual private network. It is implemented in a router or firewall and it gives high security, whose application is to cross the perimeter. IPSec comes under the transport layer and the translucent applications [2]. The main advantage of this protocol is its high security. The applications of Starnet will be extremely secured with the help of this protocol. Site to Site and Remote Access VPN Difference Site to site and Remote Access Virtual Private Networks are the two best types of VPNs. However, they differ a lot in their applications and networking. A site-to-site virtual private network enables organizations located in various fixed locations to reinforce safe connections amongst each other over the public network [3]. An example of site-to-site VPN is the internet. It extends the network of the organization so that the employees get the network from other locations as well. There are mainly two types of site-to-site VPNS. They are as follows: a) Extranet: When a particular company is related to another company like the supplier, partner or customer, it builds an extranet VPN, which can connect to the LANs of those companies [13]. The advantage of this extranet is that it enables all the organizations to do the job in a shared and safe network by preventing any kind of utilization to the different intranets. b) Intranet: When an organization has more than one remote location that is needed to connect in one private network, the organization constructs an intranet VPN to attach every different LAN to one WAN. A remote access VPN enables all users to reinforce safe connections with the help of a network of remote computer. These users usually access the network to obtain secured resources just like the networks are directly connected to the servers of the network. There are two elements requires for a remote access VPN [14]. The first component is a network access server or NAS. This is also known as the media gateway or a remote access server or RAS. A NAS is a committed server and it can be claimed as one of the multiple software applications that are running on the shared server. A NAS is something that links the Internet with a user to give authenticated credentials to register in to the virtual private network. To validate the credentials of the user, the network access server utilizes its own process of authentication or a different server of authentication running on the network [17]. The other element of VPN is the client software. The staffs, who wish to utilize the virtual privat e network from their own systems need software on the systems, which can reinforce and maintain a link with the VPN. Most of the operating systems have software automatically installed in them which links to remote access VPNs, since some of the VPNs may need users to establish a distinct application. This second element sets a tunneled linkage to the NAS that the end user demonstrates by the internet address [5]. This client software further controls the encryption to secure the connection. The main difference between site-to-site and remote access VPNs is that site to site VPN is server-to-server connection, whereas remote access VPN is a client to server. The site-to-site VPN is an ASA to ASA connection but remote access VPN example is PC to ASA [11]. Another difference is that in site-to-site the keys and networks should match for the link to reinforce. However, in remote access VPN, the server validates the client and informs the client which is the route towards tunnels and wh ich one are not. The advantages of site-to-site VPN are as follows: a) High Security: It permits high security b) Managed Service: It can be installed by a particular enterprise or can be offered as the managed service. c) Enables network in Multi locations: It enables network in multiple locations at a single time even after locating outside the internet premises [12]. The main advantages of remote access VPN are as follows: a) The moment a firewall is acquired, it involves many licenses for the remote access VPN connections [4]. b) It is extremely cost effective. c) An established and recognized technology and at the same time is extremely simple. Security Features of VPN A virtual private network is a private network that is utilized to access the network virtually over the public network [14]. It has several features. The characteristics of VPN are as follows: i) VPN filters the traffic in network and it helps to understand which traffic should be allowed. ii) VPN configures the traffic filters. Configuration is extremely important for any network. iii) VPN keeps the systems connected [20]. iv) VPN helps in strong encryption. v) VPN helps to forward the secrecy. vi) VPN helps to secure the protocols strongly. The above mentioned statements clearly describe the security features of virtual private network. IPSec is a protocol suite of network, which validates and ciphers the data packets sent over the network. It includes protocols for initiating mutual authentication within the agents at the starting of the session and negotiating the cryptographic keys to utilize within the session [13]. IPSec protects the flow of data within the pair of hosts that means the host-to-host between the host and the security gateway that means the network to host. It utilizes various cryptographic security services to secure the communications over the networks of Internet Protocols. IPSec reinforces the replay protection, data integrity. It also helps in data origin authentication, network level peer authentication, and data confidentiality (encryption). It is an end-to-end scheme of security that is operating in theInternet Layer of theInternet Protocol Suite, whereas some of the other security systems of internet are also in use, such as the Secure Shell or SSH andTransport Layer Security(TLS) [7]. Th ese function in thetop layersat the Application Layer or SSH and the Transport Layer or TLS. IPSec can secure the applications in the Internet Protocol layer automatically. The three protocols used in the case of IPSec are as follows: a) Authentication Header: The Authentication Header or AH is a component of the protocol suite of Internet Protocol Security [5]. This Authentication Header guarantees the data origin authentication and connectionless integrity of all the IP packets. b) Encapsulating Security: The Encapsulation Security Payload or ESP gives confidentiality, integrity and authentication that protect against the data tampering and provide protection to the content of the message [16]. It even gives a framework for the implementation of standard algorithms like the SHA and MD5. c) Internet Key Exchange: the Internet Key Exchange is a protocol in the IPSec protocol suite that is utilized to put up a SA or security association. Internet Key Exchange constructs on the ISAKMP and the protocol of Oakley [6]. Advantages and Disadvantages of VPN A VPN or Virtual Private Network is a private network over the public network and allows the users to receive and send data over the public and shared networks as if their systems are directly linked to the private network [14]. The main benefits that the applications get from VPN are the security, management and functionality of the private network. VPN even enables the staffs of an organization to access the intranet safely even when they are present outside the office [1]. There are various advantages and disadvantages of VPN. The advantages of VPN are as follows: i) With the help of a VPN, the users are able to access a network or a computer system from any place, which has any type of internet connection. ii) VPN is extremely secured and it provides high security to the network [18]. iii) VPN is extremely cost effective and it makes it very popular for all organizations. iv) VPN has the advantage to work within the public network such as a private network or a WiFi hotspot. v) VPN is extremely flexible and scalable. vi) It can open the blocked sites and can encapsulate the IP address with the replacement of public IP VPN [12]. vii) It uses cryptography and thus can be claimed as secured. In spite of having so many advantages, VPN do have various disadvantages. The disadvantages of VPN are as follows: i) Data sometimes get lost during the journey. ii) VPN needs extra attention to set up the security system completely to mitigate the cyber crime acts [3]. iii) Public access is prohibited in virtual private network. iv) Most of the connections are long distanced in VPN. v) Sharing of files sometimes creates problem for VPN [6]. These are the advantages and the disadvantages of Virtual Private Network. Conclusion Therefore, from the above discussion it can be concluded that, Virtual Private Network is a secured network that provides a highly secured virtual network. The above report clearly describes the difference between the interfaces and what type of virtual private network should be implemented for the case study of Starnet. The report also explains the differences between the Site to Site VPN and the Remote Access VPN and also the advantages of both of them. The security features of VPN are also explained in this report. The report also covers the three important protocols of IPSec and also the advantages and disadvantages of VPN to the network. References [1]L. Qu, X. Cui and X. Liu, "IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System",Applied Mechanics and Materials, vol. 321-324, pp. 2910-2913, 2013. [2]F. Gharehchopogh, R. Aliverdiloo and V. Banayi, "A New Communication Platform for Data Transmission in Virtual Private Network",International Journal of Mobile Network Communications Telematics, vol. 3, no. 2, pp. 1-9, 2013. [3]M. Liyanage and A. Gurtov, "Securing virtual private LAN service by efficient key management",Security and Communication Networks, vol. 7, no. 1, pp. 1-13, 2013. [4]M. Sathyan.K, "Security Enhancement of Firewall Policies in Virtual Private Network",IOSR Journal of Engineering, vol. 02, no. 02, pp. 197-202, 2012. [5]H. Lian and A. Farag, "Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method",ISRN Communications and Networking, vol. 2012, pp. 1-9, 2012. [6]F. Ibikunle, S. Oloja and E. Philip O., "Campus Network Virtualization using Multiprotocol Label Switching Virtual Private Networks (MPLS-VPNs)",International Journal of Applied Information Systems, vol. 5, no. 8, pp. 1-9, 2013. [7]J. Guichard,MPLS and VPN architectures. Cisco Press, 2012. [8]H. Hooper,CCNP security VPN 642-647 official cert guide. Indianapolis, Ind.: Cisco Press, 2012. [9]K. Grewal and R. Dangi, "Comparative Analysis of QoS VPN Provisioning Algorithm on Traditional IP based VPN and MPLS VPN using NS-2",International Journal of Computer Applications, vol. 48, no. 1, pp. 43-46, 2012. [10]V. Perta, M. Barbera, G. Tyson, H. Haddadi and A. Mei, "A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients",Proceedings on Privacy Enhancing Technologies, vol. 2015, no. 1, 2015. [11]B. B?NU, "Security Technologies Implemented in MPLS VPN Networks",International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012. [12]W. Stallings,Cryptography and network security. Boston: Pearson, 2017. [13]"Cyber-security",Network Security, vol. 2014, no. 1, p. 4, 2014. [14]"Introduction to Computer and Network Security",Network Security, vol. 2013, no. 11, p. 4, 2013. [15]A. Patel, "Network performance without compromising security",Network Security, vol. 2015, no. 1, pp. 9-12, 2015. [16]"DNS Security",Network Security, vol. 2016, no. 11, p. 4, 2016. [17]S. Foresti and G. Persiano,Cryptology and Network Security. Cham: Springer International Publishing, 2016. [18]R. Doss, S. Piramuthu and W. ZHOU,Future Network Systems and Security. Cham: Springer International Publishing, 2015. [19]S. Saraswathi, "Mitigating Strategy to Shield the VPN Service from DoS Attack",International Journal on Cryptography and Information Security, vol. 2, no. 2, pp. 53-63, 2012. [20]J. Chu, "Designing and Implementation of High Concurrent SSL VPN Server",Applied Mechanics and Materials, vol. 241-244, pp. 2424-2429, 2012.