Virtual private network, Computer Networking

Virtual Private Network (VPN) adds the features of both public and private  networks. It is fixed to single organization and needs public network for connectivity.

These connections are sometimes known tunnels and connect sites. Every site sees tunnel as point-to-point link. There is no access for other clients of public networks.

GUARANTEEING ABSOLUTE PRIVACY:

In addition to restricting data packets, VPN machines use encryption to sure absolute privacy. Even if an outside does manage to retain a copy of the data packet the outside will be unable to interpret the message.

Posted Date: 7/31/2012 7:58:36 AM | Location : United States







Related Discussions:- Virtual private network, Assignment Help, Ask Question on Virtual private network, Get Answer, Expert's Help, Virtual private network Discussions

Write discussion on Virtual private network
Your posts are moderated
Related Questions


Arrays Pointers An array is a set of the same type of data. Arrays are very well-liked data structures in parallel programming due to their easiness of use and declaration. At

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd

Tree interconnection network:   In tree interconnection network, processors are organised in a complete binary tree pattern. Figure: Tree interconnection network

Question 1 What is bandwidth?                         >>What is the bandwidth of                            a) Telephone signal                            b) Commercial radio broa


Question: (a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metr

Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use