Verified Document

Computers VPN As A Company Grows, It Essay

Computers VPN

As a company grows, it might increase to multiple shops or offices across the nation and around the world. In order to keep things running proficiently, the people working in those locations need a quick, secure and reliable way to share information across computer networks. In addition, travelling workers like salespeople need a regularly protected and reliable way to connect to their business's computer network from distant locations. One well-liked technology to achieve these goals is a VPN (virtual private network) (Tyson & Crawford, 2012).

Virtual Private Networking, or VPN, is a technology that lets people admission to their office's computer network over the Internet while at home or travelling. Entrance to a network in this way is referred to as remote access. VPN is most frequently put into practice by way of a router. Almost all small offices that share an Internet connection with more than one computer already have a router of some type, but most of them don't include VPN. Once the VPN router is in place, individual computers can be set up to join to it from outside the network. Depending on the router and the computers involved, one might need to install software on the computers that will use VPN. Sometimes computers have the capability to connect already built-in. Either way, once the hardware and software has been set up, the remote user can begin a VPN connection (Mutrux, 2008).

There are two common kinds of VPNs:

Remote-Access -- Also known as a Virtual Private Dial-up Network...

Characteristically, a corporation that wishes to set up a large remote-access VPN provides some form of Internet dial-up account to their users using an Internet service provider (ISP). The telecommuters can then dial an 800 number to reach the Internet and use their VPN client software to access the corporate network. A good instance of a company that needs a remote-access VPN would be a large company with hundreds of sales people in the field. Remote-access VPNs permit safe, encrypted connections between a company's private network and remote users through a third-party service provider.
Site-to-Site -- Through the use of devoted equipment and large-scale encryption, a company can link numerous fixed sites over a public network such as the Internet. Each site needs only a local connection to the same public network, thus saving money on long private leased-lines. "Site-to-site VPNs can be further classified into intranets or extranets. A site-to-site VPN built between offices of the same company is said to be an intranet VPN, while a VPN built to connect the company to its partner or customer is referred to as an extranet VPN" (How Virtual Private Networks Work, 2008).

Most VPNs rely on tunnelling to generate a private network that reaches across the Internet. Tunnelling is the procedure of placing a complete packet within another packet before it's transported over the Internet. That…

Sources used in this document:
References

How Virtual Private Networks Work. (2008). Retrieved from http://www.cisco.com/en/U.S./tech/tk583/tk372/technologies_tech_note09186a008009

4865.shtml

Mutrux, Z. (2008). Introduction to Virtual Private Networking (VPN). Retreived from http://www.techsoup.org/learningcenter/networks/page4775.cfm

Tyson, J. & Crawford, S. (2012). How VPNs Work. Retrieved from http://www.howstuffworks.com/vpn.htm
Why do Companies use VPN? (2011). Retrieved from http://www.alliancedatacom.com/why-use-vpn.asp
Cite this Document:
Copy Bibliography Citation

Related Documents

Firewalls Computers Have Become an
Words: 2053 Length: 8 Document Type: Term Paper

Which Products are Best Suited to a Small LAN With One Publicly Accessible Web Site: Cisco PIX Firewall Software is an excellent solution for small LANs with one publicly accessible web site. "Integrated Cisco PIX firewall hardware and software delivers full stateful firewall protection and IP Security (IPSec) VPN capabilities, allowing (...) rigorous (protection of...) internal network from outside intrusions" ("Cisco PIX," 2005). Cisco PIX firewall differs from typical CPU-intensive full-time

Information Technology IT Security Implementation
Words: 3195 Length: 10 Document Type: Term Paper

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

Coca-Cola Supply Chain Management-A Coca Cola Supply
Words: 3120 Length: 10 Document Type: Essay

Coca-Cola Supply Chain Management-A Coca cola supply chain management The first section of this paper touches on the Coca-Cola Company's historical background detailing the time of its inception and the brains that were behind its formation and growth. This section also touches on the advertisements that have since been used from its inception. This section finally illuminates its mission statement. The second section talks about the challenges that Coca-cola has faced. These challenges

It Security Plan & Implementation
Words: 5733 Length: 16 Document Type: Research Proposal

Second, the specific connection points throughout the network also need to be evaluated for their levels of existing security as well, with the WiFi network audited and tested (Loo, 2008). Third, the Virtual Private Networks (VPNS) and the selection of security protocols needs to be audited (Westcott, 2007) to evaluate the performance of IPSec vs. SSL protocols on overall network performance (Rowan, 2007). Many smaller corporations vacillate between IPSec

Network Design Network ABC Network Design a
Words: 3772 Length: 12 Document Type: Essay

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Virtual Private Networks Use in
Words: 1672 Length: 6 Document Type: Term Paper

There are over 400 airlines, 60,000 hotel properties, 32 rental car companies, nine cruise lines, and 220 tour operators that comprise the database of offerings in Sabre data architecture. VPNs are used for completing the necessary order and booking capture, booking management, pricing updates and validations with each agent, and the coordination with the literally thousands of travel partners to company has. Sabre opted for Web-based VPN architecture to deliver

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now