Components of the vpn - point to point , Computer Networking

Assignment Help:

Components of the VPN

When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  necessary to  create a true  service. The  pieces include

a.VPN server: This  is a computer  that enables and accepts VPN  connection from  VPN  client. The  sever can provide a remote  access connection or a  router to router  connection. The main  essences is user to log on  establish  a VPN  connection and be flexible enough to satisfy the number  of simultaneous connections  that we  fell are necessary.

b.VPN  client : The  VPN  client is a computer  that initials the VPN connection.  Usually a piece of software  which  is used to  create the VPN and include necessary security procedures.

c.Tunnel: This  is the virtual  piece of the network  that  carries the data. Not all  tunnels carry  secure data but  they all try  to carry  data  on a private link. The data is  encapsulated inside  a new  envelope  so that the  information is invisible inside  the  tunnel.

d.Connection : This  is the  place  where the  data  gets scrambled and jumbled. Many  choices for the  encryption technique  are available  and selected on  user  preference.

e.Protocols: We saw  that OSI layer 2 is  a framing protocols  fro the link. The same  holds  true in this case, we  need  a data link  layer  protocols to carry  the information. When we dial  up into the  internet for example  we transmit our IP  datagram  we sue  layer2 protocols called  the point to point  protocols to frame the IP  datagram's  and carry them  across  the dial  connection. In a VPN we see protocols that include the point  to point  tunnelling protocols  and we now have  layer 2  tunnel protocols. In  a windows  environment  the use of PPP is  currently  more  prevalent  but the  movement  is toward L2TP.

f.Networks : The networks  connections either  a dial up connections the internet  or another  IP based network.


Related Discussions:- Components of the vpn - point to point

Explain the acknowledged connectionless service, Explain the Acknowledged c...

Explain the Acknowledged connectionless service This is a cross between the previous two services. It provides that datagrams are to be acknowledged, but no prior logical conne

Banking industry, Will like to know what is the standard industrial practic...

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

The received message - application layer , The Received Message If  we...

The Received Message If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message wit

Dns id hacking - domain name server, DNS ID hacking The Dns use ID sys...

DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde

Show the importance of security, Q. Show the Importance of Security? Th...

Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major

Define firewall and its uses, Firewall is a device or a component that res...

Firewall is a device or a component that restricts access between a protected or an internal network from an external or untrustworthy network .A firewall basically limits unautho

What is two types of errors, Q. What is Two Types of Errors? Single-Bi...

Q. What is Two Types of Errors? Single-Bit Errors: Merely one bit in the data unit has changed Burst Errors of length 'n': 2 or more bits in the data unit have changed (

Network Administrator Support, Dear expert; I have an assignment about Net...

Dear expert; I have an assignment about Network Administrator Support . Here is the topic about:- Virtualization is an emerging type of network operating system that is currently

Data transfer - tcp connection management , Data Transfer After  conne...

Data Transfer After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  show

Dns - server attacks, DNS - Server Attacks It’s not so easy to list al...

DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd