Virtual private network, Computer Networking

Virtual Private Network (VPN) adds the features of both public and private  networks. It is fixed to single organization and needs public network for connectivity.

These connections are sometimes known tunnels and connect sites. Every site sees tunnel as point-to-point link. There is no access for other clients of public networks.

GUARANTEEING ABSOLUTE PRIVACY:

In addition to restricting data packets, VPN machines use encryption to sure absolute privacy. Even if an outside does manage to retain a copy of the data packet the outside will be unable to interpret the message.

Posted Date: 7/31/2012 7:58:36 AM | Location : United States







Related Discussions:- Virtual private network, Assignment Help, Ask Question on Virtual private network, Get Answer, Expert's Help, Virtual private network Discussions

Write discussion on Virtual private network
Your posts are moderated
Related Questions
TA is the standard ISDN term for a native ISDN modem


BRIDGES:  A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all tr

Design, develop and build network systems

Q. Explain about Star Backbone network? - Collapsed or switched backbone - Backbone is just one switch that connects LANs - Utilized as distribution backbone inside a bui

IEEE 8021.d Spanning Tree Protocol (STP) was developed to stop routing loops in a network. If a router, switch, or hub has more than one path to the similar destination, a routing

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

The distance over which data moves within a computer may differ from a few thousandths of an inch, as is the case within a one IC chip, to as much as lot of feet along the backplan

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which use

Categories of address forms: STATIC:  In this type the hardware manufacturer gives permanent physical address to every network manufacturer and interface must ensure th