Components of the vpn - point to point , Computer Networking

Assignment Help:

Components of the VPN

When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  necessary to  create a true  service. The  pieces include

a.VPN server: This  is a computer  that enables and accepts VPN  connection from  VPN  client. The  sever can provide a remote  access connection or a  router to router  connection. The main  essences is user to log on  establish  a VPN  connection and be flexible enough to satisfy the number  of simultaneous connections  that we  fell are necessary.

b.VPN  client : The  VPN  client is a computer  that initials the VPN connection.  Usually a piece of software  which  is used to  create the VPN and include necessary security procedures.

c.Tunnel: This  is the virtual  piece of the network  that  carries the data. Not all  tunnels carry  secure data but  they all try  to carry  data  on a private link. The data is  encapsulated inside  a new  envelope  so that the  information is invisible inside  the  tunnel.

d.Connection : This  is the  place  where the  data  gets scrambled and jumbled. Many  choices for the  encryption technique  are available  and selected on  user  preference.

e.Protocols: We saw  that OSI layer 2 is  a framing protocols  fro the link. The same  holds  true in this case, we  need  a data link  layer  protocols to carry  the information. When we dial  up into the  internet for example  we transmit our IP  datagram  we sue  layer2 protocols called  the point to point  protocols to frame the IP  datagram's  and carry them  across  the dial  connection. In a VPN we see protocols that include the point  to point  tunnelling protocols  and we now have  layer 2  tunnel protocols. In  a windows  environment  the use of PPP is  currently  more  prevalent  but the  movement  is toward L2TP.

f.Networks : The networks  connections either  a dial up connections the internet  or another  IP based network.


Related Discussions:- Components of the vpn - point to point

Determine 10base-fl- fiber link ethernet, 10Base-FL: Fiber Link Ethernet ...

10Base-FL: Fiber Link Ethernet Utilizes star topology to connect stations to a hub External transceiver entitle as a fiber-optic MAU connects processing device to fib

At which layer of the osi model repeaters work, At the Physical layer of ...

At the Physical layer of the OSI model Repeaters work by regenerating the signal to extend the distance it can travel.

Show the refraction and reflection in Fiber-optic cable , Q. Show the Refra...

Q. Show the Refraction and Reflection in Fiber-optic cable ? - Refraction often takes place when light bends as it passes from one medium to another less dense medium - Wh

Find out the amplitude of the voltage, Questions: A signal of amplitude...

Questions: A signal of amplitude 10 mV is fed to the amplifier in the figure. What is the amplitude of the voltage at the output from the amplifier?

Low-earth-orbiting leo satellites , LOW-Earth Orbiting have more advantageo...

LOW-Earth Orbiting have more advantageous in Mobile based communication devices like PDAs, Cell phones and automobile communications. The LOW-Earth Orbiting is a satellite of orbit

Tcp – numbering bytes, Q. TCP – numbering bytes? Numbering is utili...

Q. TCP – numbering bytes? Numbering is utilized for flow & error control Segments aren't numbered only bytes Full-duplex connection - numbering is independent in

Show about alternate mark inversion, Q. Show about Alternate mark inversion...

Q. Show about Alternate mark inversion? Bipolar AMI - Neutral, zero voltage represents binary 0 - Binary 1s symbolized by alternating positive and negative voltages

How can data to be exchanged between networks, Q. How can data to be exchan...

Q. How can data to be exchanged between Networks? Internetwork Links in an internetwork

What is kerberos in networking, What is Kerberos in Networking? It is a...

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

Set cookies 1178345 - application layer, Set Cookies 1178345 When  Hus...

Set Cookies 1178345 When  Hussan  browser receives  the HTTP response  message it sees the set cookies header. The  browser then appends  a line to the special cookie file  th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd