Advantages of vpns - point to point , Computer Networking

Assignment Help:

Advantages of VPNs

Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration.

a. Improved security : First  and foremost a VPN  provides  multiple  elements of security  to your  networks. However  a VPN  should  not be  implemented to defer good  and thorough approach to security because  a VPN  does not necessarily protect hosts  from  malicious users inside  the networks.

b. Consolidation of Scattered Resources : Having  multiple officers  and multiple office  networks  means  you probably have resources  scattered amongst them.  These scattered resources signify a few things increased administration. Multiple pieces of hardware and software duplication of effort and so on.  This all  equates to a higher  total  cost o f ownership.

A VPPN is an easy way to consolidate thee resource. Which in turn can reduce your total cost of  ownership. In addition the hardware and software that remain after consolidation can be applied to increase the availability of those  resources.

 c.Transparency to Users: One  of the major  advantages of VPN  is transparency of users applications and in most  cases even hosts  need not  that a VPN is in use. Thus adding  new software or hardware to  your  network  does not  require any more  configuration than  usual.

d. Reduced Cost : Because a VPN  is implemented using  a local  internet  connection the need for  dedicated lines and internal  dial up  infrastructure is removed. The cost of a dedicated circuit whether it s frame relay or ATM link can be  a significant   initial expense and recurring cost  for a  company. Maintaining  telephone  line and RAS equipment  can also  be cost  prohibitive. A VPN  can become  very  attractive  when  the options  are weighed.

e.Ease of Administration :Because the most  common  VPN  configuration the  network- network  topology is transparent to users applications and hosts relatively nothing  is added  to the administration or training  efforts  for  these  components of your  organization.


Related Discussions:- Advantages of vpns - point to point

Unix for multiprocessor system, UNIX For Multiprocessor System:- The UN...

UNIX For Multiprocessor System:- The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let

Data parallel programming with parallel virtual machine, Data Parallel Prog...

Data Parallel Programming In the data parallel programming model, main focus is on performing simultaneous operations on a data set. The data set is typically prepared into a c

Describe about the term- network, Describe about the term- network If n...

Describe about the term- network If network tends to lose the packets, it is better to acknowledge each one of them separately, so the lost packets could be retransmitted. On t

Enumerate the concept of ip address, Enumerate the concept of IP address ...

Enumerate the concept of IP address The router must have an IP address of the same network (194.62.15.x in this case) for the convenience of the entire network to use the servi

Explain multipurpose internet mail extensions, Q. Explain Multipurpose Inte...

Q. Explain Multipurpose Internet Mail Extensions? - The Multipurpose Internet Mail Extensions is an extension of SMTP that allows the transfer of multimedia and other non-ASCII

What is the protocol number for tcp, Transmission Control Protocol - TCP i...

Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments

Command to disable cdp on an interface, Recognize the command to disable CD...

Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable

How to protect computer hardware by threats, How to protect computer Hardwa...

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

Application of satellite communication , Application of Satellite Communica...

Application of Satellite Communication started with the installation and commissioning of STD- “B” Earth Station having 11m diameter antenna in 1982, Initially with to only three

Classify different types of ip routing, INTERNETWORKING - TCP/IP 1. Sta...

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd