Building on Pripr Success
Uploaded by countrymama08 on Jun 06, 2012
I would have to say I would encourage the President to go ahead with the original set-up that I had suggested. That would be a client/server-based network. The advantage of a client/client/server-based network is that the data files that will be used by all of the users are stored on the one server. Which gives you a central point to setup permissions on the data files, and it will give a central point from which to back up all the data in case data loss should occur.
I would recommend they switch to a twisted pair wiring because there are several advantages for the use of twisted pair cabling. It is very flexible to make it very easy to work with. It is also less expensive than coax cable. The reason why twisted pair cable has become so popular is because networking protocols and standards were designed to support twisted pair wiring. There are a few disadvantages such as the casing; the sheath around the twisted pair networking cabling that is relatively thin. It doesn’t have a second insulator like coax and it is a bit more susceptible to electromagnetic interference, and twisted pair is a bit more susceptible to eavesdropping.
A virtual private network (VPN) is a private network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet. VPNs provide security through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to securely connect the branch offices of an organization to a head office network through the public Internet. A VPN can also be used to interconnect two similar-type networks over a dissimilar middle network for example, two IPv6 networks over an IPv4 network.
There are two main types of VPN: remote-access VPNs and Site-to-site VPNs. Remote-access VPNs allow individual users to connect to a remote network such as roaming salespeople connecting to their company's intranet. Site-to-site VPNs allow inter-connection of networks of multiple users for example, branch offices to the main company network. VPNs hence reduce costs as they eliminate the need for dedicated leased lines between networks, but instead use existing infrastructures to connect networks while adding a layer of security.
VPNs typically require remote users to be authenticated and make use of encryption techniques to prevent disclosure of private information to unauthorized parties present on the network(s) the VPN goes through.Through VPNs, users are able to...