Virtual private network vpns, Computer Networking

Virtual Private Network  ( VPNs)

When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for travelling and  remote users to send or receive their information with less concern. This  means that  someone out there must create a VPN.

By definition a VPN is a virtual private  network. Let  take the pieces of a VPN and describe them one  at a time.

Virtual means almost  not quite or not real. Real circuits are physical  we can see them  touch  them  and kick the tires  virtual circuits look they  are there and act like  they are there. They  do everything as though they are there but they  really  are not  there.

Private  means that it its  dedicated to a specific  organization or individual  and not  available to the public.

Network  a network is the grouping  of circuits that connect the  various  locations between  to the public.

For  security  point so view  organization  can use  types of strategies:

a.Private networks

b.Hybrid networks

c.Virtual private networks

Posted Date: 3/18/2013 11:36:24 PM | Location : United States







Related Discussions:- Virtual private network vpns, Assignment Help, Ask Question on Virtual private network vpns, Get Answer, Expert's Help, Virtual private network vpns Discussions

Write discussion on Virtual private network vpns
Your posts are moderated
Related Questions
Explain IBM's SNA Architecture SNA is a computer networking architecture that was formed by IBM to give a network structure for IBM mainframe, midrange, and personal computer s

Receipt of Acknowledgment In our GBN  protocols  an acknowledgment for  packet with sequence number will be taken to be accumulative acknowledgment  indicating that all  packe

explain the appropriateness of economic and behavioral feasibility

Network Allocation Vector Timer which shows how much time must pass before a station is allowed to check the channel

study on FTP

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Most networks give dynamic connections, which last for a relatively short period. To operate this, ATM can dynamically join a switched virtual circuit (SVC), allow it last as long

Name the layer responsible for putting 1s and 0s into a logical group? Ans) Frames are broken down into 1s and 0s and placed onto the physical medium by the Data Lin layer.

Describe the concept of successor and feasible successor?

discuss communication isolation and privatization in network topologies