Welcome

Anti Essays offers essay examples to help students with their essay writing.

Sign Up

All About Virtual Private Networks Essay

  • Submitted by: NerdyMau
  • on April 16, 2015
  • Category: History
  • Length: 349 words

Open Document

Below is an essay on "All About Virtual Private Networks" from Anti Essays, your source for research papers, essays, and term paper examples.

What is VPN?

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.

A VPN can connect multiple sites over a large distance just like a Wide Area Network (WAN). VPNs are often used to extend intranets worldwide to disseminate information and news to a wide user base. Educational institutions use VPNs to connect campuses that can be distributed across the country or around the world.

In order to gain access to the private network, a user must be authenticated using a unique identification and a password. An authentication token is often used to gain access to a private network through a personal identification number (PIN) that a user must enter. The PIN is a unique authentication code that changes according to a specific frequency, usually every 30 seconds or so.

Protocols

There are a number of VPN protocols in use that secure the transport of data traffic over a public network infrastructure. Each protocol varies slightly in the way that data is kept secure.

IP security (IPSec) is used to secure communications over the Internet. IPSec traffic can use either transport mode or tunneling to encrypt data traffic in a VPN. The difference between the two modes is that transport mode encrypts only the message within the data packet (also known as the payload) while tunneling encrypts the entire data packet. IPSec is often referred to as a "security overlay" because of its use as a security layer for other protocols.

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over the Internet. Both protocols use a "handshake" method of authentication that involves a negotiation of network parameters between the client and...

Show More


Citations

MLA Citation

"All About Virtual Private Networks". Anti Essays. 18 Dec. 2018

<http://trenmayamx.com/free-essays/All-About-Virtual-Private-Networks-728454.html>

APA Citation

All About Virtual Private Networks. Anti Essays. Retrieved December 18, 2018, from the World Wide Web: http://trenmayamx.com/free-essays/All-About-Virtual-Private-Networks-728454.html