StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Remote Access - Essay Example

Cite this document
Summary
The most ideal way of connecting to the office network would to use a virtual private network (VPN) when you are away from the office. In order to connect to the office VPN server we need to first connect to a local carrier (i.e.) Internet service provider (ISP).
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Network Remote Access
Read Text Preview

Extract of sample "Network Remote Access"

Download file to see previous pages

On this logical connection data packets are constructed in a specific VPN protocol and are encapsulated within some other carrier protocol then transmitted between VPN client and server. The name itself signifies that the client has to it self has to initiate or to manage the connection. The VPN client has to first establish a connection to the carrier and then the VPN client will create a tunnel to the VPN server over the logical live connection. In compulsory tunneling the Internet service provider has to manage VPN connection setup.

When the user in this case an employee away from the office tries to establisha connection to a local carrier, the ISP inurn establishes a connection to the VPN server. If we look from the clients point of view, Compared to voluntary tunneling compulsory tunneling sets up a VPN connection in just one step instead of two steps in a voluntary tunneling. This kind of tunneling authenticates the users or the client and then connects them with the specific VPN servers using specified logic built into the broker device.

The network device that comes into picture for compulsory tunneling is some times called FEP (front end processors), Network access servers (NAS) or point of presence (POS). The basic function of compulsory tunneling is to hide the details of server connectivity from the VPN client and then moves it's control from client to local carrier. Using a dialup connection also a connection can be esta. The network device that comes into picture for compulsory tunneling is some times called FEP (front end processors), Network access servers (NAS) or point of presence (POS).

The basic function of compulsory tunneling is to hide the details of server connectivity from the VPN client and then moves it's control from client to local carrier.The additional burden for the service provider is the he has to install and maintain the front-end processors. There are number VPN tunneling protocols available, which are presently implemented in various VPN applications. The most widely used are.1. Point-to-point tunneling protocol. (PPTP)2. Layer Two Tunneling Protocol (L2TP).3. Internet protocol security (Ipsec).1. Dialup connection using telephone line.

Using a dialup connection also a connection can be established to a VPN server from a remote place. But dialup connection is adequate to connect to an E-mail server. It lags in terms of continuous contact with the server due to frequent disconnection. So, connectivity and reliability is not associated with this type of connection, which are required for intensive and secure business applications2. Dialup connection using mobile phone.VPN connectivity to the company's network using a mobile phone is also possible with a hand set having GPRS feature.

This could be an ideal way for the employees who are always on the move. Connecting to company's network using mobile phone for prolonged duration is not advisable since there are chances of disconnection from the servers of the office network due to congestion in cellular network during peak time. Another disadvantage using a cell phone is that an employee has to compromise with the speed offered by the service provider. During an Internet

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Remote Access Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Network Remote Access Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1516992-network-remote-access
(Network Remote Access Essay Example | Topics and Well Written Essays - 1250 Words)
Network Remote Access Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1516992-network-remote-access.
“Network Remote Access Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1516992-network-remote-access.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Remote Access

Network Infrastructure Assignment

ere is no remote access to the company's data.... To establish remote access the company's enterprise resource planning (ERP) and databases.... The Internet access is limited to a shared ISDN line in each of the headquarters and dial-up access at the point of sales, the web presence, and e-mail support are outsourced to Yahoo Small Business Services.... All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use....
12 Pages (3000 words) Assignment

Network Infrastructure

According to Wikipedia contributors (2007), wireless broadband internet access, often shortened to "broadband internet" or just "broadband", is a high data-transmission rate Internet connection.... Wireless broadband internet access became a rapidly developing market in many areas in the early 2000s; one study found that broadband internet usage in the United States grew from 6% in June 2000 to over 30% in 2003.... The paper "network Infrastructure" tells us about Designing a comprehensive network infrastructure for a geographically dispersed retail company....
13 Pages (3250 words) Assignment

Critical evaluation of Intercontinental hotel network

It was found that the network in use was outdated and there were some obvious loopholes.... hellip; By critically evaluating the hotel's network infrastructure, this project will suggest ways in which the system can be improved, such as better network type and design, network security, bandwidth, Aspects to be considered will include hardware and software, in addition to strategies and policies.... This project will be based on a critical evaluation of the Intercontinental Hotel network....
48 Pages (12000 words) Essay

Data Protection Act and Conducting International Trade

As a result of this, the most recent OECD analysis on access and supply rights recognizes that: 1.... nbsp;A major purpose of the data protection act is to “extend the present laws of Canada that protect the privacy of individuals with respect to personal information about themselves held by a government institution and that provide individuals with a right of access to that information....
5 Pages (1250 words) Assignment

Integration of WIMAX to Broadband Networks

hellip; The author states that WIMAX provides ample opportunity to converge data and voice, and provide wireless access to the users in form of wireless local area network (WLAN).... The concept of fixed to mobile convergence (FMC), where user can access any content on any device, on any network from any where, is the need of the hour.... The Orthogonal frequency division multiple access (OFDMA) helps to sub channelize and support adaptive modulation allowing the data rates and link quality to be balanced dynamically....
4 Pages (1000 words) Dissertation

WAN intranet

This paper intends to give a general narrative regarding how to design WAN or intranet for an organization that has various remote locations that have high traffic requirements, a web business, use web meetings (multicast) to cut travel costs and a centralized database that all… An intranet is an information system implemented within an organization that makes use of internet technologies to share resources (like printers) communicate, access and transfer information in a much faster and improved approach Companies with remote locations have started preferring using intranet instead of conventional network configurations because it is easier navigating the intranet than a Local Area Network (LAN)....
4 Pages (1000 words) Research Paper

Home Network Components

These components will combine with each other to make an operational home network.... Moreover, along with the construction of a local home network, we will incorporate an electronic learning or distant learning… E learning is a concept and tool used to deliver the information in a simple way.... The objective is to utilize the home network for simplifying learning methodologies.... Category 5 cables are used for the data transmission in a home network design....
13 Pages (3250 words) Essay

Privacy of Data at Web Server

This information should be kept confidential and secure from unauthorized access modification and disclosure.... … Web server.... he use of information technology and information systems to facilitate operations in many organizations has been the most common practice today....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us