Open Access Open Access  Restricted Access Subscription or Fee Access

VPN: The Stride of Technology for Future Ready Business

Swarnangini Sinha, Vibha Thakur

Abstract


In today’s New Economy, whether companies have a local, national, or global presence, they all need one thing: a way to maintain speedy, secure, and reliable infrastructure and communications wherever their offices and workers are located. And, because these operations occur over a public network, VPNs can cost considerably less to implement than privately owned or leased services. VPNs make its deployment an easy and inexpensive solution for businesses of all sizes, including Small Medium Enterprises. The VPN market has changed considerably in the past ten years as the Internet has grown and as vastly more corporations have come to rely on the Internet for communications. They represent the stride of technology in terms of a communications solution for business that is future ready. With a VPN, organizations can see immediate cost-reduction prospects in their long distance charges, leased line fees, equipment stocks (like large bank of modems) and network support requirements.

Keywords


Deployment, Encryption, Network Security, Virtual Private Network

Full Text:

PDF

References


Angela Orebaugh, Sheila Frankel, Paul Hoffman and Richard Park, “Guide to SSL VPNs”, National Institute of Standards and Technology Special Publication 800-113, July 2008

Cristophes Leidigh, “Fundamental Principles of Network Security”, APC Legendary Reliability, 2005.

Frost & Sullivan, “MPLS/IP VPN Services Market”, 2009.

John E. Canavan, “Fundamentals of Network Security”, Library of Congress Cataloging in Publication Data, 2001.

John Phill, “ Benefits of using VPN Technology”, 12 Feb 2010

Kameshwari Chebrola, Bhaskaran Raman, “Cryptography and Network Security”, Fundamentals of wired & wireless network, May 2005.

Matt Curtin, “Introduction to Network Security”, Kent Information Services Inc. , March 1997.

Mohit Madhok “Demystifying VPN’s”, http://www.sifycorporate.com/download/virtualpnet.pdf

Peter Murray, “Network Security”, Version 1.0.1, 27 May 2004.

R. Figueiredo, P. O. Boykin, P. St. Juste, D. Wolinsky, "Social VPNs: Integrating Overlay and Social Networks for Seamless P2P Networking", in Proceedings of IEEE WETICE/COPS, Rome, Italy, June 2008.

Victor Olifer, “Different Flavours of VPN: Technology and Applications” JA.NET UK, March 2007

VPN Consortium “VPN Technologies: Definitions and Requirements”, January 2003, http://www.hit.bme.hu/~jakab/edu/litr/VPN/vpn-technologies .pdf

http://computer.howstuffworks.com/vpn.htm - a detail description on how VPN work

http://www.windowsnetworking.com/articles_tutorials/vpn.html - picture description of sample VPN


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.