Virtual private network, Computer Networking

Virtual Private Network (VPN) adds the features of both public and private  networks. It is fixed to single organization and needs public network for connectivity.

These connections are sometimes known tunnels and connect sites. Every site sees tunnel as point-to-point link. There is no access for other clients of public networks.

GUARANTEEING ABSOLUTE PRIVACY:

In addition to restricting data packets, VPN machines use encryption to sure absolute privacy. Even if an outside does manage to retain a copy of the data packet the outside will be unable to interpret the message.

Posted Date: 7/31/2012 7:58:36 AM | Location : United States







Related Discussions:- Virtual private network, Assignment Help, Ask Question on Virtual private network, Get Answer, Expert's Help, Virtual private network Discussions

Write discussion on Virtual private network
Your posts are moderated
Related Questions
Determine the task which should intranet require Intranet to work smoothly, the following tasks should be properly synchronised: All computers connected together in a n

Hi, i am a college student doing a report on wireless broadband. I needed to know user requirements of user groups ie: Home user Small Medium Large Businesses Things like w

A UDP header does not have Sequence number and Acknowledgement number fields. Is it an advantage or a disadvantage? Explain your answer in detail. User Datagram Protocol Th

What are the key functions of data link layer? Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer is utilized by

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o

Quetion: A 22 nF capacitor is initially charged to 10V. It is then discharged by connecting a 100kW resistor across it. Approximately how long does it take for the voltage on t

Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stac

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments

VLAN - Virtual Local Area Network Vlan is a logical grouping or segmenting a network linked to administratively described ports on a switch, they give Broadcast control, Securit