Saturday, August 24, 2019
Network Remote Access Essay Example | Topics and Well Written Essays - 1250 words
Network Remote Access - Essay Example On this logical connection data packets are constructed in a specific VPN protocol and are encapsulated within some other carrier protocol then transmitted between VPN client and server. The name itself signifies that the client has to it self has to initiate or to manage the connection. The VPN client has to first establish a connection to the carrier and then the VPN client will create a tunnel to the VPN server over the logical live connection. In compulsory tunneling the Internet service provider has to manage VPN connection setup. When the user in this case an employee away from the office tries to establisha connection to a local carrier, the ISP inurn establishes a connection to the VPN server. If we look from the clients point of view, Compared to voluntary tunneling compulsory tunneling sets up a VPN connection in just one step instead of two steps in a voluntary tunneling. This kind of tunneling authenticates the users or the client and then connects them with the specific VPN servers using specified logic built into the broker device. The network device that comes into picture for compulsory tunneling is some times called FEP (front end processors), Network access servers (NAS) or point of presence (POS). The basic function of compulsory tunneling is to hide the details of server connectivity from the VPN client and then moves it's control from client to local carrier. Using a dialup connection also a connection can be esta... The network device that comes into picture for compulsory tunneling is some times called FEP (front end processors), Network access servers (NAS) or point of presence (POS). The basic function of compulsory tunneling is to hide the details of server connectivity from the VPN client and then moves it's control from client to local carrier. The additional burden for the service provider is the he has to install and maintain the front-end processors. There are number VPN tunneling protocols available, which are presently implemented in various VPN applications. The most widely used are. 1. Point-to-point tunneling protocol. (PPTP) 2. Layer Two Tunneling Protocol (L2TP). 3. Internet protocol security (Ipsec). 1. Dialup connection using telephone line. Using a dialup connection also a connection can be established to a VPN server from a remote place. But dialup connection is adequate to connect to an E-mail server. It lags in terms of continuous contact with the server due to frequent disconnection. So, connectivity and reliability is not associated with this type of connection, which are required for intensive and secure business applications 2. Dialup connection using mobile phone. VPN connectivity to the company's network using a mobile phone is also possible with a hand set having GPRS feature. This could be an ideal way for the employees who are always on the move. Connecting to company's network using mobile phone for prolonged duration is not advisable since there are chances of disconnection from the servers of the office network due to congestion in cellular network during peak time. Another disadvantage using a cell phone is that an employee has to compromise with the speed offered by the service provider. During an Internet
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.