Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Virtual Private Network
Post: #1

Virtual Private Network

VPNs have emerged as the key technology for achieving security over the Internet. While a VPN is an inherently simple concept, early VPN solutions were geared towards large organizations and their implementation required extensive technical expertise. As a consequence, small and medium-sized businesses were left out of the e-revolution. Recently, VPN solutions have become available that focus specifically on the needs of small and medium-sized businesses.

Historically, the term VPN has also been used in contexts other than the Internet, such as in the public telephone network and in the Frame Relay network. In the early days of the Internet-based VPNs, they were sometimes described as Internet-VPNs or IP-VPNs. However, that usage is archaic and VPNs are now synonymous with Internet-VPNs.A firewall is an important security feature for Internet users. A firewall prevents data from leaving and entering an enterprise by unauthorized users.

However, when packets pass through the firewall to the Internet, sensitive data such as user names, passwords, account numbers, financial and personal medical information, server addresses, etc. is visible to hackers and to potential e-criminals. Firewalls do not protect from threats within the Internet. This is where a VPN comes into play.A VPN, at its core, is a fairly simple concept-the ability to use the shared, public Internet in a secure manner as if it were a private network. the flow of data between two users over the Internet when not using a VPN. As shown by the dotted lines, packets between a pair of users may go over networks run by many ISPs and may take different paths.

The structure of the Internet and the different paths taken by packets are transparent to the two users. With a VPN, users encrypt their data and their identities to prevent unauthorized people or computers from looking at the data or from tampering with the data.A VPN can be used for just about any intranet and e-business (extranet) application. Examples on the following pages illustrate the use and benefits of VPN for mobile users and for remote access to enterpriseresources, for communications between remote offices and headquarters, and for extranet/e-business

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ccsu ma private result 2012, full description of virtual private network, private bhms college in up, private university list in, virtual private network droid, free us virtual private network, private school jobs manhattan,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
Lightbulb Virtual Laser Keyboards (Download PPT,Abstract,Report) computer science crazy 493 104,721 28-03-2016 04:10 AM
Last Post: zotufalist
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 7,176 10-02-2015 05:52 PM
Last Post: seminar report asees
  VIRTUAL KEYBOARD A SEMINAR REPORT Computer Science Clay 17 22,418 25-01-2015 09:57 AM
Last Post: Beslanlox
  Virtual keyboard computer science crazy 3 2,465 17-09-2014 10:23 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,688 30-03-2014 04:40 AM
Last Post: Guest
  Computerized Paper Evaluation using Neural Network computer science crazy 12 8,918 17-07-2013 04:08 PM
Last Post: Guest
  Quadrics Interconnection Network computer science crazy 2 2,788 28-02-2013 02:42 PM
Last Post: Guest
  network security seminar report computer science technology 13 10,542 24-01-2013 12:42 PM
Last Post: seminar details
  Network security and protocols project topics 1 1,356 24-01-2013 12:41 PM
Last Post: seminar details
  Gigabit Ethernet passive optical network (GE-PON) electronics seminars 1 1,919 12-01-2013 12:00 PM
Last Post: seminar details