Virtual private network vpns, Computer Networking

Virtual Private Network  ( VPNs)

When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for travelling and  remote users to send or receive their information with less concern. This  means that  someone out there must create a VPN.

By definition a VPN is a virtual private  network. Let  take the pieces of a VPN and describe them one  at a time.

Virtual means almost  not quite or not real. Real circuits are physical  we can see them  touch  them  and kick the tires  virtual circuits look they  are there and act like  they are there. They  do everything as though they are there but they  really  are not  there.

Private  means that it its  dedicated to a specific  organization or individual  and not  available to the public.

Network  a network is the grouping  of circuits that connect the  various  locations between  to the public.

For  security  point so view  organization  can use  types of strategies:

a.Private networks

b.Hybrid networks

c.Virtual private networks

Posted Date: 3/18/2013 11:36:24 PM | Location : United States







Related Discussions:- Virtual private network vpns, Assignment Help, Ask Question on Virtual private network vpns, Get Answer, Expert's Help, Virtual private network vpns Discussions

Write discussion on Virtual private network vpns
Your posts are moderated
Related Questions
Repeaters - Operate only in physical layer - Connects two segments of the same LAN - Both segments must be of the same protocol - Only forwards frames; does not filter

Q. What is Parabolic Dish Antenna? - Incoming signals means that the Signal bounces off of dish and is directed to focus - Outgoing signals signifies transmission is broadca


INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

Define the term - Graphics Interchange Format A type of graphics file found frequently on the .net. A picture of a vice-president, for example, may appear on the Intranet as

Acknowledgment number This 32 bit  field  defines  the byte  number that the  from the  segment is expecting to  receive the segment is expecting to receive from the other par

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the proces

Qustion: Convert the binary number 10111100 to hexadecimal.

Static and Dynamic Interconnection Network In a static network, the connection amid input and output nodes is permanent and can't be changed. Static interconnection network can