Advantages of vpns - point to point , Computer Networking

Advantages of VPNs

Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration.

a. Improved security : First  and foremost a VPN  provides  multiple  elements of security  to your  networks. However  a VPN  should  not be  implemented to defer good  and thorough approach to security because  a VPN  does not necessarily protect hosts  from  malicious users inside  the networks.

b. Consolidation of Scattered Resources : Having  multiple officers  and multiple office  networks  means  you probably have resources  scattered amongst them.  These scattered resources signify a few things increased administration. Multiple pieces of hardware and software duplication of effort and so on.  This all  equates to a higher  total  cost o f ownership.

A VPPN is an easy way to consolidate thee resource. Which in turn can reduce your total cost of  ownership. In addition the hardware and software that remain after consolidation can be applied to increase the availability of those  resources.

 c.Transparency to Users: One  of the major  advantages of VPN  is transparency of users applications and in most  cases even hosts  need not  that a VPN is in use. Thus adding  new software or hardware to  your  network  does not  require any more  configuration than  usual.

d. Reduced Cost : Because a VPN  is implemented using  a local  internet  connection the need for  dedicated lines and internal  dial up  infrastructure is removed. The cost of a dedicated circuit whether it s frame relay or ATM link can be  a significant   initial expense and recurring cost  for a  company. Maintaining  telephone  line and RAS equipment  can also  be cost  prohibitive. A VPN  can become  very  attractive  when  the options  are weighed.

e.Ease of Administration :Because the most  common  VPN  configuration the  network- network  topology is transparent to users applications and hosts relatively nothing  is added  to the administration or training  efforts  for  these  components of your  organization.

Posted Date: 3/19/2013 12:25:39 AM | Location : United States







Related Discussions:- Advantages of vpns - point to point , Assignment Help, Ask Question on Advantages of vpns - point to point , Get Answer, Expert's Help, Advantages of vpns - point to point Discussions

Write discussion on Advantages of vpns - point to point
Your posts are moderated
Related Questions
What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

Selective Repeat (SR) Selective repeats is a connection oriented protocols  in which  transmitter and receiver have a window  of sequence numbers. SR scheme  avoids  the  unne

FDDI Media Class B or SAS (single-attachment stations) attach to one ring Class A or DAS (dual attachment stations) attach to both rings. SASs is attached to the primary rin

In collective message passing, all the processes of a set participate in communication. MPI gives a number of functions to execute the collective message passing. Some of them are

In this project, you will implement a Transport Layer protocol to transmit data with Reliable Data Transfer from a client to a server in the presence of channel errors and loss. Th

Session layer examples  are Netbios Names, SQL, NFS, X Windows, and RPC.

What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,

State the benefits of Infrared light Infrared light does not penetrate walls or other opaque objects. This has two benefits: First, infrared communications can be more simply

IPv6 The  internet  engineering task force begin  the effort to develop a successor  protocols  to IPv4 in the early  1990 is an internet  layer protocols  for packet  switched

QUESTION a) Security is a very crucial component in a Distributed System. Describe three properties of a secure channel. b) During packet transmission, messages are subdivid