Virtual private network vpns, Computer Networking

Virtual Private Network  ( VPNs)

When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for travelling and  remote users to send or receive their information with less concern. This  means that  someone out there must create a VPN.

By definition a VPN is a virtual private  network. Let  take the pieces of a VPN and describe them one  at a time.

Virtual means almost  not quite or not real. Real circuits are physical  we can see them  touch  them  and kick the tires  virtual circuits look they  are there and act like  they are there. They  do everything as though they are there but they  really  are not  there.

Private  means that it its  dedicated to a specific  organization or individual  and not  available to the public.

Network  a network is the grouping  of circuits that connect the  various  locations between  to the public.

For  security  point so view  organization  can use  types of strategies:

a.Private networks

b.Hybrid networks

c.Virtual private networks

Posted Date: 3/18/2013 11:36:24 PM | Location : United States







Related Discussions:- Virtual private network vpns, Assignment Help, Ask Question on Virtual private network vpns, Get Answer, Expert's Help, Virtual private network vpns Discussions

Write discussion on Virtual private network vpns
Your posts are moderated
Related Questions
A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80

Enumerate about the server modules WebDAV is one of the best-used server modules and many companies developing Intranet software or groupware as well as various publishing and

i want an assignment with 2500 words on this topic with Harvard referencing on 22th of dec can i get it ?


Advantages of VPNs Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration. a. Improved secur

Q. Explain about Flow Control? - Signifies to ask the transmitter to stop/resume sending in data - Required when DTE to DCE speed > DCE to DCE speed - (Exampl

What is Applets Little programs that can make the Web pages more aesthetically beautiful by means of animations, text, and graphics moving across the screen.

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

CAM- Content Address Memory.  Its another name of MAC address table.

Firewall is a device or a component that restricts access between a protected or an internal network from an external or untrustworthy network .A firewall basically limits unautho