Components of the vpn - point to point , Computer Networking

Components of the VPN

When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  necessary to  create a true  service. The  pieces include

a.VPN server: This  is a computer  that enables and accepts VPN  connection from  VPN  client. The  sever can provide a remote  access connection or a  router to router  connection. The main  essences is user to log on  establish  a VPN  connection and be flexible enough to satisfy the number  of simultaneous connections  that we  fell are necessary.

b.VPN  client : The  VPN  client is a computer  that initials the VPN connection.  Usually a piece of software  which  is used to  create the VPN and include necessary security procedures.

c.Tunnel: This  is the virtual  piece of the network  that  carries the data. Not all  tunnels carry  secure data but  they all try  to carry  data  on a private link. The data is  encapsulated inside  a new  envelope  so that the  information is invisible inside  the  tunnel.

d.Connection : This  is the  place  where the  data  gets scrambled and jumbled. Many  choices for the  encryption technique  are available  and selected on  user  preference.

e.Protocols: We saw  that OSI layer 2 is  a framing protocols  fro the link. The same  holds  true in this case, we  need  a data link  layer  protocols to carry  the information. When we dial  up into the  internet for example  we transmit our IP  datagram  we sue  layer2 protocols called  the point to point  protocols to frame the IP  datagram's  and carry them  across  the dial  connection. In a VPN we see protocols that include the point  to point  tunnelling protocols  and we now have  layer 2  tunnel protocols. In  a windows  environment  the use of PPP is  currently  more  prevalent  but the  movement  is toward L2TP.

f.Networks : The networks  connections either  a dial up connections the internet  or another  IP based network.

Posted Date: 3/18/2013 11:56:46 PM | Location : United States







Related Discussions:- Components of the vpn - point to point , Assignment Help, Ask Question on Components of the vpn - point to point , Get Answer, Expert's Help, Components of the vpn - point to point Discussions

Write discussion on Components of the vpn - point to point
Your posts are moderated
Related Questions
Q. Define transport layer of osi model? - The transport layer regulates information flow to makes sure end-to-end connectivity between host applications reliably and accurately

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

Q. Describe about Domain Name Space ? - Structure for systematize the name space in which names are defined in an inverted-tree structure with the root at the top - Every l

There are basically two functions for creating routing tables, which are as given: Manual entry Software Further there are two types for computing routing table inf

Determine the command mode necessary to enter the extended ping command Ans) Router#

Routing Principle The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one

5. Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frame are 25 bytes long. Calculate the efficiency of Stop-and-Wait ARQ in a system t

What is difference among routing and routed protocols? Ans) i) Routing use for top path selection ii) Routed protocol carries on source and destination information.

ACME Corp is located in Toledo, Ohio. They would like to create a network and divide it into 3 subnets, each subnet has 150 computers. The IT plan calls for connecting the LAN to t

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab