Advantages of vpns - point to point , Computer Networking

Assignment Help:

Advantages of VPNs

Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration.

a. Improved security : First  and foremost a VPN  provides  multiple  elements of security  to your  networks. However  a VPN  should  not be  implemented to defer good  and thorough approach to security because  a VPN  does not necessarily protect hosts  from  malicious users inside  the networks.

b. Consolidation of Scattered Resources : Having  multiple officers  and multiple office  networks  means  you probably have resources  scattered amongst them.  These scattered resources signify a few things increased administration. Multiple pieces of hardware and software duplication of effort and so on.  This all  equates to a higher  total  cost o f ownership.

A VPPN is an easy way to consolidate thee resource. Which in turn can reduce your total cost of  ownership. In addition the hardware and software that remain after consolidation can be applied to increase the availability of those  resources.

 c.Transparency to Users: One  of the major  advantages of VPN  is transparency of users applications and in most  cases even hosts  need not  that a VPN is in use. Thus adding  new software or hardware to  your  network  does not  require any more  configuration than  usual.

d. Reduced Cost : Because a VPN  is implemented using  a local  internet  connection the need for  dedicated lines and internal  dial up  infrastructure is removed. The cost of a dedicated circuit whether it s frame relay or ATM link can be  a significant   initial expense and recurring cost  for a  company. Maintaining  telephone  line and RAS equipment  can also  be cost  prohibitive. A VPN  can become  very  attractive  when  the options  are weighed.

e.Ease of Administration :Because the most  common  VPN  configuration the  network- network  topology is transparent to users applications and hosts relatively nothing  is added  to the administration or training  efforts  for  these  components of your  organization.


Related Discussions:- Advantages of vpns - point to point

Configure basic switch parameters- ccna, Configure basic switch parameters....

Configure basic switch parameters. Configure the S1, S2, and S3 switches according to the following guidelines: Configure the switch hostname. Disable DNS lookup.

Firewall architectures-screening router, Screening Router In this setu...

Screening Router In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the c

State the term - netbios and imap, State the term - NetBIOS and IMAP Ne...

State the term - NetBIOS and IMAP NetBIOS: Network Basic Input Output System is an API (applications programming interface) used with other programs to transmit messages betwee

Define unicast - multicast and reserved addresses, Q. Define Unicast - Mult...

Q. Define Unicast - Multicast and Reserved Addresses? Unicast, Multicast, and Reserved Addresses Unicast address - identifies a specific device Multicast address

Show example on hedge fund, Q. Show example on Hedge Fund? Hedge Fund ...

Q. Show example on Hedge Fund? Hedge Fund have been playing a no-lose game In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the

Explain process management and transaction management, TP Monitor does main...

TP Monitor does mainly two things extremely well. They are Process management and Transaction management? They were originally introduced to run classes of applications that co

Base 64 encoding, Base 64 Encoding The Simple Mail Transfer Protocol (...

Base 64 Encoding The Simple Mail Transfer Protocol (SMTP) is a protocol used on the Internet for sending email. When you send an email, your mail client establishes an SMTP co

What is the cladding, A layer of a glass surrounding the center fiber of gl...

A layer of a glass surrounding the center fiber of glass under a fiber-optic cable.

Host system in tcp-ip model, Q. Host System in TCP-IP model? - Standard...

Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the

What is a counter, What is a Counter A software code that indicates ...

What is a Counter A software code that indicates how many times a site has been visited. It gets automatically updated and is usually represented by a small rectangle with n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd