Featured Post

Cisco’s It Implementation of an Organizational Change

Presentation Today’s world requires a squeezing need to use the I. T administrations and assets while lessening the expense so as to ...

Thursday, October 17, 2019

Virtual Private Network Research Paper Example | Topics and Well Written Essays - 750 words

Virtual Private Network - Research Paper Example In the 1990s the most used technologies were frame relay, dial up modems and packet switching. These technologies were very essential for connectivity at the time. The need to have secured connections remotely, like connecting to an organization’s private network grew with time. The idea of having a private leased line could not work therefore bringing the need of having such a connection through the public infrastructure. Early VPNs were complex and expensive and did not make business sense. The advent of newer technologies, as will be looked at in the next section led to simpler virtualization and more expansive uses of VPNs. Technologies The VPN technologies can be widely divided into the secure VPNs, the trusted VPNS and the hybrid VPNs. There are different VPN technologies that are offered by service providers today. These are either layer 2 or layer 3 technologies. Example of the layer 2 trusted VPN technologies are the ATM circuits, the layer 2 frame-overs and the frame relay circuits. An Example of the trusted layer 3 VPN technology is the MPL that is constrained through the BGP. Some service providers offer a wide range of hybrid technologies that have several applications in the current world. It is, however, worth noting that the available VPN hybrid technologies only tend to be secure in the parts that are based on the VPNS alone. Examples of a hybrid VPNs are the technologies run over other VPN technologies that are secured or trusted. In such cases, the hybrid VPN acquires the features of the secured VPN.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.