Академический Документы
Профессиональный Документы
Культура Документы
Remote Connectivity
Centralized Processing
Distributed Processing
Remote Access
Communication established with a distant computer
systems or network is called remote access.
Types of Remote Access
Dial up remote access
Virtual Private Network
Dedicated connection
If you are prompted, you need to select whether you will use
a dialup connection or if you have a dedicated connection to
the Internet either via Cable, DSL, T1, Satellite, etc. Click
Next.
VPN Security
Firewalls
A filtering mechanism which checks the incoming and
outgoing information between the local network and
foreign network.
Encryption
The most effective way to achieve data security is to
translate the data into a secrete code. This translation is
called encryption and the encrypted data is called as the
cipher text.
IPSec
Internet Protocol Security (IPSec) is a protocol which
provides enhanced security features, such as better
encryption and authentication.
VPN Tunneling
Data intended for use only within a private network can
be transmitted through public network. In such a cases,
the public network may not be aware that the data
transmitted is part of the private network. This process is
knows as tunneling.
A Logical network connection is established and
maintained which has packets constructed in a specific
VPN protocol format.
These packets are encapsulated within other carrier
protocol and then tranmsitted between VPN client and
server.