Advantages of vpns - point to point , Computer Networking

Assignment Help:

Advantages of VPNs

Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration.

a. Improved security : First  and foremost a VPN  provides  multiple  elements of security  to your  networks. However  a VPN  should  not be  implemented to defer good  and thorough approach to security because  a VPN  does not necessarily protect hosts  from  malicious users inside  the networks.

b. Consolidation of Scattered Resources : Having  multiple officers  and multiple office  networks  means  you probably have resources  scattered amongst them.  These scattered resources signify a few things increased administration. Multiple pieces of hardware and software duplication of effort and so on.  This all  equates to a higher  total  cost o f ownership.

A VPPN is an easy way to consolidate thee resource. Which in turn can reduce your total cost of  ownership. In addition the hardware and software that remain after consolidation can be applied to increase the availability of those  resources.

 c.Transparency to Users: One  of the major  advantages of VPN  is transparency of users applications and in most  cases even hosts  need not  that a VPN is in use. Thus adding  new software or hardware to  your  network  does not  require any more  configuration than  usual.

d. Reduced Cost : Because a VPN  is implemented using  a local  internet  connection the need for  dedicated lines and internal  dial up  infrastructure is removed. The cost of a dedicated circuit whether it s frame relay or ATM link can be  a significant   initial expense and recurring cost  for a  company. Maintaining  telephone  line and RAS equipment  can also  be cost  prohibitive. A VPN  can become  very  attractive  when  the options  are weighed.

e.Ease of Administration :Because the most  common  VPN  configuration the  network- network  topology is transparent to users applications and hosts relatively nothing  is added  to the administration or training  efforts  for  these  components of your  organization.


Related Discussions:- Advantages of vpns - point to point

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Explain the functions and features of the ipmonitor program, Functions and ...

Functions and features of the IPMonitor program are as follows:   a)  This program should be able to list out detail information of IP traffic which includes source IP address an

Explain imap, Short for Internet Message Access Protocol. This is another m...

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Modeling a wan, To model a WAN, we need a graph in which the nodes model sw...

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d

Explain the term ftp- file transfer protocol, Explain the term FTP: File T...

Explain the term FTP: File Transfer Protocol A very common method of moving files between two Internet sites. FTP is a special way to log in to another Internet site for pur

Programs for implement tools for digital sound, You must write the 6 progra...

You must write the 6 programs described below. All of these are command-line tools that follow the Unix style of passing switches and arguments on the command line. As such, your p

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Determine how many bits are used for the page number, 1.  A virtual memory ...

1.  A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes.  Each page table entry occupies 4 bytes.   a)  How many bits remain unchanged

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd