Verified Document

Computers VPN As A Company Grows, It Essay

Computers VPN

As a company grows, it might increase to multiple shops or offices across the nation and around the world. In order to keep things running proficiently, the people working in those locations need a quick, secure and reliable way to share information across computer networks. In addition, travelling workers like salespeople need a regularly protected and reliable way to connect to their business's computer network from distant locations. One well-liked technology to achieve these goals is a VPN (virtual private network) (Tyson & Crawford, 2012).

Virtual Private Networking, or VPN, is a technology that lets people admission to their office's computer network over the Internet while at home or travelling. Entrance to a network in this way is referred to as remote access. VPN is most frequently put into practice by way of a router. Almost all small offices that share an Internet connection with more than one computer already have a router of some type, but most of them don't include VPN. Once the VPN router is in place, individual computers can be set up to join to it from outside the network. Depending on the router and the computers involved, one might need to install software on the computers that will use VPN. Sometimes computers have the capability to connect already built-in. Either way, once the hardware and software has been set up, the remote user can begin a VPN connection (Mutrux, 2008).

There are two common kinds of VPNs:

Remote-Access -- Also known as a Virtual Private Dial-up Network...

Parts of this document are hidden

View Full Document
svg-one

Characteristically, a corporation that wishes to set up a large remote-access VPN provides some form of Internet dial-up account to their users using an Internet service provider (ISP). The telecommuters can then dial an 800 number to reach the Internet and use their VPN client software to access the corporate network. A good instance of a company that needs a remote-access VPN would be a large company with hundreds of sales people in the field. Remote-access VPNs permit safe, encrypted connections between a company's private network and remote users through a third-party service provider.
Site-to-Site -- Through the use of devoted equipment and large-scale encryption, a company can link numerous fixed sites over a public network such as the Internet. Each site needs only a local connection to the same public network, thus saving money on long private leased-lines. "Site-to-site VPNs can be further classified into intranets or extranets. A site-to-site VPN built between offices of the same company is said to be an intranet VPN, while a VPN built to connect the company to its partner or customer is referred to as an extranet VPN" (How Virtual Private Networks Work, 2008).

Most VPNs rely on tunnelling to generate a private network that reaches across the Internet. Tunnelling is the procedure of placing a complete packet within another packet before it's transported over the Internet. That…

Sources used in this document:
References

How Virtual Private Networks Work. (2008). Retrieved from http://www.cisco.com/en/U.S./tech/tk583/tk372/technologies_tech_note09186a008009

4865.shtml

Mutrux, Z. (2008). Introduction to Virtual Private Networking (VPN). Retreived from http://www.techsoup.org/learningcenter/networks/page4775.cfm

Tyson, J. & Crawford, S. (2012). How VPNs Work. Retrieved from http://www.howstuffworks.com/vpn.htm
Why do Companies use VPN? (2011). Retrieved from http://www.alliancedatacom.com/why-use-vpn.asp
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Network for Bistro Bookstore Computer Network
Words: 1357 Length: 5 Document Type: Essay

Computer Network for Bistro Bookstore Computer Network Planning for Bistro Bookstore Launching a new bistro and bookstore is going to require three specific tasks be completed to ensure the stability, security and continued reliability of the network which over time will become the backbone of the information system and infrastructure of the store. These three tasks include the development of the new network, defining and implementing best practices and procedures for ensuring

Computer Network Security Issues Computer
Words: 1894 Length: 6 Document Type: Research Paper

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Computer Network Security -- Information
Words: 588 Length: 2 Document Type: Essay

Discussion Question 2 - Security Awareness Training and IA Training In general, security awareness training consists of periodic classes and online tutorials and related quizzes that promote understanding of the nature of different types of threats to information security (Boyce, 2008; Kizza, 2009). That training addresses threats in the nature of malicious intrusion from external entities, malicious intrusion and misuse of information access or system credentials from the inside; and malicious

Computer Networks Understood. Please Start Reviewing Articles
Words: 928 Length: 3 Document Type: Essay

computer networks understood. Please start reviewing articles discussing stranger requests received IT personnel: Jennifer Mears & Denise Dubie, Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, The seven most important things about computer networks that should be understood by everyone who uses one Principle one: Know how to 'talk the talk' In the article "They've heard them all," two of the most humorous stories detailing naive users' confusion about

Computer Networks Are Changing
Words: 383 Length: 1 Document Type: Essay

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external

Computer Networks and Terrorism
Words: 2546 Length: 8 Document Type: Research Paper

Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now