Introduction To (VPN), Virtual Private Network

Virtual Private Networks (VPNs) are a type of networking technology that enables communication between 2 computers or groups of computers on a public channel, usually on the Internet. Implementing a virtual private network requires an examination of network components and how it differs from traditional, hard-wired network systems.

What is a network? According to Webster's Dictionary, is "through a system of interconnected computersTelephone lines or other means to share information. "Before the Internet was able to talk about computers in different offices, cities or countries, even with the other, how could – through telephone lines.

When do the requirements for businesses to grow, the telephone has been replaced by higher volume wires, like T3 circuits, but the concept was the same. A computer to talk to computer B, you must have a physical connection wire . For security reasons, youwants to ensure that only use 2 computers that line, so you would contract with a provider of lease "that circuit.

Now imagine if you have hundreds of computers around the country, all they need to talk to each other and exchange information. The cost of leasing dedicated lines, all these computers would come in contact with each other to increase with the distance between the computer and the number of connections.

But with the advent of the Internet, all the more necessary connectionsphysically. As long as each computer had access to the Internet, information on the Internet could similarly be divided, that, if the computers are physically connected. Here is the "virtual" the concept of VPN at stake, is a network exists, but is virtual because the connections are not hard-wired dedicated, leased lines are no more.

The last component of our virtual private network introduction and privacy. If the networks are still in progress atLeased lines, the protection of privacy to a large extent the commitment of the supplier of the circuit to maintain their integrity called circuits, and thus the customer information.

But with a Virtual Private Network, privacy is achieved by encryption. If the information leaves a computer network, will be encrypted to a specific protocol or a code. It is therefore a private "tunnel" or a path through the Internet to your computer, they will be sentbe decoded and received. No one can, as the data they send, or make changes so that you refused, without being read by the recipient, so that data is safe.

To create a VPN, you must decide who to share information, in which direction and how often. First, you need a list of hardware and software systems for the preparation is being used at each location. You may need to make changes so that the computer can talk to each otherslightly.

He also wants to consider how important that data remain protected. Now that you have considered these introduced virtual private network, you should switch to look at things such as the type of record you require and the seller (s) you want to use.

January 21, 2010. Tags: , , , , . computer network. Leave a comment.

Virtual Private Network (VPN)

vpn-scheme
Virtual Private Network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (eg Internet), rather than physical cables. Data protocols layer of virtual network are said to tunnel through the larger network when this is appropriate. A common application is secure communications through the public Internet, VPN, but no specific security features such as authentication or content encryption. Virtual private networks, could be used for traffic of different user groups to separate the main network with strong security.

A VPN is the best performance, effort, or may have a service level agreement (SLA) between the VPN client and VPN service provider. Usually, VPN has a topology more complex than point to point.

A VPN allows computer users to go to edit the IP address space, other than the actual computer that connects to the Internet.

November 9, 2009. Tags: , , , . network. Leave a comment.

Design a site like this with WordPress.com
Get started