As you can see in the diagram, the development process is taking place in 2 different locations simultaneously. They share common repositories so that whatever changes are made in either of the 2 development centers could be viewed or modified by the developers in either of the centers simultaneously. A centralized server is being used to share the data. Only those employees who have the authentication can access the repositories and make modifications or changes.
Other Benefits Of VPN
Many people want to work at home for personal reasons such as taking care of their children or eliminating time commuting to and from work. In today's competitive business climate, companies are catering to employee demands and often will let skilled employees telecommute in order to retain their services. Additionally, many companies will now hire the best candidate for a job regardless of where that person is located. To do this, company's let these people telecommute full time rather than move them closer to the office. Additionally, there is a different kind of mobile work force today than in the past. People have always traveled, but today's traveler needs frequent access to the corporate network. For example, access to e-mail is now considered essential by most travelers. On top of that, more employees' work extended hours. It is common for professionals to require access to e-mail and network applications at night and on the weekends. All of this is increasing the demand for connectivity. Further driving the connectivity needs of a corporation are other major business changes. Decentralization of corporations is on the rise. Rather than having a corporate headquarters where the majority of employees are located, most companies today spread their operations across the country or even the world.
Virtual Private Network and the Internet Advantage
As connectivity increases, your exposure also increases and so does your potential security risks. Network managers strive to preserve the characteristics of a dedicated network for their e-business applications, including well-defined performance expectations and higher levels of security.
VPNs are considered to provide the best available solution currently. It assures:
- Control over Performance: VPNs can provide well-defined performance and quality. Robust VPNs will control performance at both ends of the user level.
- Application and Service Integration: Users on one network may need to access a variety of applications or services on different VPNs, within and external to the enterprise. So, users on one network with the right access and security capabilities can connect to other networks of business partners and even communicate across different service provider boundaries.
Additional cost savings VPN can result in a network that is less expensive to build operate and administer. Outsourcing the VPN to a service provider can produce even greater savings.
Virtual Private Network and Security
- Authentication - The ability to verify the parties on both ends of the link
- Integrity - The ability to verify that all data transmitted and received has not been tampered or changed.
- Confidentiality- The ability to ensure that all the transmitted data over the link is read or intercepted.
VPN is a combination of software and hardware that allows telecommuters, remote sites and business partners to use the Internet to establish a secure connection with a host network. This connection forms what appears to be a private network.
A secure connection is established by tunneling through the Internet. Tunneling encapsulates message packet within an Internet Protocol packet for transmission across the Internet. There are three protocols for tunneling through the Internet, Internet Protocol Security, Layer 2 Tunneling Protocol and Point-to-Point Tunneling Protocol. All three protocols adhere to the basic Internet security standards.
VPNs cater to large networks that want to exploit the benefits of the public Internet without compromising on their security, reliability and performance. VPN can be a viable alternative to dedicated, private network links but needs a thorough understanding to help organizations build infrastructures that will support their business needs today as well as tomorrow.