Virtual private network vpns, Computer Networking

Virtual Private Network  ( VPNs)

When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for travelling and  remote users to send or receive their information with less concern. This  means that  someone out there must create a VPN.

By definition a VPN is a virtual private  network. Let  take the pieces of a VPN and describe them one  at a time.

Virtual means almost  not quite or not real. Real circuits are physical  we can see them  touch  them  and kick the tires  virtual circuits look they  are there and act like  they are there. They  do everything as though they are there but they  really  are not  there.

Private  means that it its  dedicated to a specific  organization or individual  and not  available to the public.

Network  a network is the grouping  of circuits that connect the  various  locations between  to the public.

For  security  point so view  organization  can use  types of strategies:

a.Private networks

b.Hybrid networks

c.Virtual private networks

Posted Date: 3/18/2013 11:36:24 PM | Location : United States







Related Discussions:- Virtual private network vpns, Assignment Help, Ask Question on Virtual private network vpns, Get Answer, Expert's Help, Virtual private network vpns Discussions

Write discussion on Virtual private network vpns
Your posts are moderated
Related Questions
Q. Describe Network security and Internetworking security? Network Security - Layers 5-7 - Securing the localized private domain. Network Administration, File Permissions

Frequency Division Multiplexing Frequency  division  multiplexing (FDM) is an analogy technique that can be applied when the bandwidth of a link is greater than the combined b

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Q. Calculate Utilization percentage of the link? - System: Stop and wait ARQ - Bandwidth: 1Mbps - Round trip for one bit: 20ms - Frame length: 1000 bits Utilizatio

802.11 FHSS Frequency-hopping spread spectrum in a 2.4 GHz band Carrier sends on one frequency for short duration then hops to another frequency for same duration, hops agai

Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co

Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

CSE4344 Computer Network Organization Project 1 Simple Web Server & Client Instructor: Sajib Datta Spring 2017 "What I cannot create, I do not understand." Richard P Feynman Object

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec