Advantages of vpns - point to point , Computer Networking

Assignment Help:

Advantages of VPNs

Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration.

a. Improved security : First  and foremost a VPN  provides  multiple  elements of security  to your  networks. However  a VPN  should  not be  implemented to defer good  and thorough approach to security because  a VPN  does not necessarily protect hosts  from  malicious users inside  the networks.

b. Consolidation of Scattered Resources : Having  multiple officers  and multiple office  networks  means  you probably have resources  scattered amongst them.  These scattered resources signify a few things increased administration. Multiple pieces of hardware and software duplication of effort and so on.  This all  equates to a higher  total  cost o f ownership.

A VPPN is an easy way to consolidate thee resource. Which in turn can reduce your total cost of  ownership. In addition the hardware and software that remain after consolidation can be applied to increase the availability of those  resources.

 c.Transparency to Users: One  of the major  advantages of VPN  is transparency of users applications and in most  cases even hosts  need not  that a VPN is in use. Thus adding  new software or hardware to  your  network  does not  require any more  configuration than  usual.

d. Reduced Cost : Because a VPN  is implemented using  a local  internet  connection the need for  dedicated lines and internal  dial up  infrastructure is removed. The cost of a dedicated circuit whether it s frame relay or ATM link can be  a significant   initial expense and recurring cost  for a  company. Maintaining  telephone  line and RAS equipment  can also  be cost  prohibitive. A VPN  can become  very  attractive  when  the options  are weighed.

e.Ease of Administration :Because the most  common  VPN  configuration the  network- network  topology is transparent to users applications and hosts relatively nothing  is added  to the administration or training  efforts  for  these  components of your  organization.


Related Discussions:- Advantages of vpns - point to point

Explain how tcp handles connection-setup management, Problem: (a) Expla...

Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

Explain about lan, What is a LAN? A LAN is a Local Area Network, within...

What is a LAN? A LAN is a Local Area Network, within a single building or a specific confined space. LANs typically comprise only one transmission media type like coaxial cable

What is the difference between trigger and rule, What is the difference bet...

What is the difference between trigger and rule? The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by client

Show scalability and reliability of computer network, How do you account fo...

How do you account for higher scalability and reliability of computer network? Ans: Computer network will have a large number of computers, which can share database, software

Explain the OSI Model Facts, OSI Model Facts The OSI model classifies a...

OSI Model Facts The OSI model classifies and organizes the methods that hosts perform to maintain data for transport across the network. You should be familiar with the OSI m

Explain imap, Short for Internet Message Access Protocol. This is another m...

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Identify three characteristics of switches, Switches operate at layer 2. Th...

Switches operate at layer 2. They enhance bandwidth by decreasing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon la

Modeling a wan, To model a WAN, we need a graph in which the nodes model sw...

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d

What is shielded twisted pair, Q. What is Shielded Twisted Pair? - A me...

Q. What is Shielded Twisted Pair? - A metal foil or braided-mesh covering encases every pair of insulated conductors to prevent electromagnetic noise called crosstalk - Cros

Categories of address forms, Categories of address forms: STATIC: ...

Categories of address forms: STATIC:  In this type the hardware manufacturer gives permanent physical address to every network manufacturer and interface must ensure th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd