8
forwards the data to all other ports. A switch is more sophisticated, in that a
switch can determine the port that each piece of data is supposed to be
delivered to. A switch minimizes network traffic and speeds up the
communication over a network.
Networks take some time in order to plan and implement correctly.
There are many types of scenarios to consider which could affect the
operability of a network.
Introduction to Virtual Private Networking
Virtual Private Networking (VPN) uses a publicly wired network (the
Internet) to securely connect two different networks as if they were the same
network. For example, an employee can access the corporate network from
home using VPN, allowing the employee to access files and printers. Here
are several different implementations of VPN that can be used.
Point -to-Point Tunneling Protocol (PPTP)
PPTP uses proprietary means of connecting two private networks over the
Internet. PPTP is a way of securing the information that is communicated
between networks. PPTP secures information by encrypting the data inside
of a packet.
IP Security (IPSec)
IPSec provides a more secure network-to-network connection across the
Internet or a Wide Area Network (WAN). IPSec encrypts all communication
between the client and server whereas PPTP only encrypts the data packets.
Both of these VPN implementations are used because there is not a