Sei sulla pagina 1di 1
+ Onmtlemieeselenision anc il providers have serves that steam cqnvenitie client atrces, + Mony paerlo-peer satworks exist over the intarnet that allow Use (9 ares, magesand videos, ach nnecentont ancl aleons thar users ances Cheep set upant rairtain, Does notrequire expensive servers, Wo centralised caiabase cf users, usernames ancl passnards, misking ithecderto maintain secuity Falure ofan individuel per oriyremovesaceess to the rosourcesand data wien tha. 300° harelles, The 12st ofthe retwark rerrairs uratiecses Users havea werny about making backeps asnoeenbalised 9aekup service odts Joes not equirespacalist eshnicalstat zo raictan, The more computers te arecn 2aeert0- peeinietwork, esiomer iva ru Table 6.05 - Advantages and disadvantages of a peer-to- peer network, Virtual private networks (VPN) Tunnelling protocol 3 tionel oe netwerkthet gover bye set ies Jambi -géate so ‘carnetb= ercersioad sethool a decnppien fey, ante aneneaste Virinaaples Companies er organisat ans “ay wantto allow users Ui sce 9 relwork, often a LAM, from a remote tocatinn, [ney wil need 70 use ex-eral resources to creslethinconmection, the external resoureas wll vot tie ewned oF vein alted by Ihe over of leh AN, which carn-make #ecess 9 the LAN network much 05 snouts, This sia be of great eancoine [he our af ho LAI and the users who want to renoteiy access it The bir of setureycan becwercem ayn aleiveniting, Vial private network (vF} — AYN bared i ci sho ga ren talecsnpalet w@eorttect Secunda private rel ek slip ocr al NCHS, Oncz cennectae lo he VPS, Lig emote cemaue ther ihas secre aves te the | AN’s reste, just a= iF twrere sinweily cornectes: to the LAN, Secuiily is enplemes tee Ihesugh Lense of tunnelling: protocols aiid encryption, For xarnple, the secre ‘shell SSH) nnn! piotico) useserieryplion to securely trans rit Urenc-yptes deta packets ecross a> unsafe rebwurk. To connesttn 4 YPN, auserrevnotely lags an othe webwork, Once Lie user's entity has been gutter tice, ie¥PN's tunnelig stole! sols up anonerypzed lin te theuser's computes Gata cen then be ranernitted securely. Remember vies oe ule ose Ly-orga saliow We powie Diseesst in lramel ng employes, employerswne telework snd usors thar wentte accessLAN wesou ces alhore Jkerswho werllosecurelyarcesseata on 2 hove compute when iiey 272 aay ce cloo use £ YN (here are severel advantags ‘rgar'setion using WEN asshowen nso anc sedvartages tor an £6. TASK Find ourwhat king of networkyou bavein your schoo! ‘orhome Wher s the stuctureof tard hors does esiere ata Dos your school or heme re meri hrave any seers? does,yhat are they used fo Intranets and extranets 0 Intraniot Is 3 privetoly onnied notwork that usesintemet tecincloges, for example web peges, for ntemnal use ‘with nan orpsrisation. Nab pages nold organisations! information such as cews, events, historical Cala etd comman y used documerts, Ime lard instant mesa ag cat also be usec ‘orintemal cammurication. Training vldeosoy Co core Hiessapencen Leslee nedand ‘watched by employees,

Potrebbero piacerti anche