Verified Document

Virtual Private Networks Use In Term Paper

VPNs are used for completing the necessary order and booking capture, booking management, pricing updates and validations with each agent, and the coordination with the literally thousands of travel partners to company has. Sabre opted for Web-based VPN architecture to deliver real-time updates of data to their MySabre travel agency booking portal that was recently introduced to the 70,000 travel agents that participate with the travel network. The use of an SSL-based VPN architecture for supporting the many quoting, ordering, and services processes was critical for Sabre, as their broader application development plan focused first on speed and security for their agent base. Sabre also wanted to have a single sign-on capability to ensure their agents, the majority of which are not technologically oriented, could quickly gain access to the MySabre portal and complete bookings. According to Sabre (1) the use of VPN technology also significantly dropped the cost of creating a partner management system online as the company was able to keep the application within its own it organization.

References

AMR Research (2004)- Time to Move Beyond Point Security Systems. AMR Research. Lance Travis, author. From the Research Alert of the same name. February 25, 2004

Aberdeen Group Research Report. March, 2006. Aberdeen Research
Columbus (2003) - Re-evaluate How Your Measure Your Channels' Performance. AMR Research. Boston, MA December 2, 2003. Accessed from the Internet February 21, 2007 from location:

http://www.lwcresearch.com/filesfordownloads/ReevaluateHowYouMeasureYourChannelDec2003.pdf

Findlaw (2006) - Modern Practice Magazine. Findlaw's Law Practice Magazine Glossary. Downloaded from the Internet on February 21, 2007 from location:

http://practice.findlaw.com/glossary.html

Teleworking: The Quiet Revolution (2005) - From the report of the same name. Gartner Group. Publication Date: September 14, 2005. ID number: G00122284. Stamford, CT.

Sabre (2006) - Sabre use of VPN Technologies. Nortel Networks website. Downloaded from the Internet on February 21, 2007 from location:

http://www2.nortel.com/go/news_detail.jsp?cat_id=-9252&oid=100190006&locale=en-U.S.

Virtual Private Network Consortium (2006) - From the white paper, VPN Technologies: Definitions and Requirements Downloaded from the Internet on February 21, 2007 from location::

http://www.vpnc.org/vpn-technologies.html

Sources used in this document:
References

AMR Research (2004)- Time to Move Beyond Point Security Systems. AMR Research. Lance Travis, author. From the Research Alert of the same name. February 25, 2004

Aberdeen Group (2003) - Buyer's Guide to Managed Delivery. Aberdeen Group Research Report. March, 2006. Aberdeen Research

Columbus (2003) - Re-evaluate How Your Measure Your Channels' Performance. AMR Research. Boston, MA December 2, 2003. Accessed from the Internet February 21, 2007 from location:

http://www.lwcresearch.com/filesfordownloads/ReevaluateHowYouMeasureYourChannelDec2003.pdf
http://practice.findlaw.com/glossary.html
http://www2.nortel.com/go/news_detail.jsp?cat_id=-9252&oid=100190006&locale=en-U.S.
http://www.vpnc.org/vpn-technologies.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Virtual Private Network VPN Now
Words: 1051 Length: 4 Document Type: Term Paper

Centralized telesaving control Managing cost-effective use of dial links centrally may no longer be possible. Overhead VPN tunnels impose overhead for dial-in users: encryption algorithms may impact the performance of the user's system, there will be an increased protocol header overhead, authentication latency will increase, PPP and IP compression will perform poorly (compared to a direct link), and modem compression won't work at all. Support issues Replacing direct-dial links with VPN tunnels may produce some

How Virtual Private Networks Operate to Enhance Cybersecurity
Words: 616 Length: 2 Document Type: Essay

Defining VPN in Computer NetworkingThe purpose of this paper is to provide a definition and explanation of a virtual private network (VPN) which is a key concept in information technology (security and network technologies). The explanation that follows includes selected quotes to provide some definitional clarity of the term and the key concepts that are involved as well as the different types of VPNs and how they are related to

IPV6 in Distributed Virtual Private
Words: 3653 Length: 10 Document Type: Term Paper

Very High - IPSec works at the protocol level, independent of applications, therefore scalability is best-in-class Comparing the technological and operational benefits specifically in the areas of client access options, access control, client-side security, installation, and client configuration highlights just how differentiated the IPv4-based IPSec vs. IPv6 -based SSL protocols are from each other. In analyzing these differences, Table 3: Comparing Technological and Operational benefits of IPv6-based SSL and IPv4-based IPSec

Network Design Scenario Straight Sales
Words: 1313 Length: 4 Document Type: Term Paper

The company should use the Cisco hedge router to make the company to achieve a reliable communication over the internet. The edge router will also make the company to achieve higher capacity, scalability, and improve routing protocol convergence at lower costs. As traffic volume increases, the solution will allow the company to implement incremental bandwidth upgrades without necessarily changing the router interface. The edge firewall will be used to

Network Design Network ABC Network Design a
Words: 3772 Length: 12 Document Type: Essay

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Virtual Team Communications Literature Review
Words: 4059 Length: 15 Document Type: Literature Review

When portals are designed to the specific requirements of Web 2.0 design objectives, companies with virtual teams are finding they can attain higher levels of shared task ownership as well. This is because there are significantly greater levels of trust overall throughout an organization based on the collective contributions of every member of a virtual and in-office team when they share their knowledge and information together (Mancini, 2010). Portals

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now