Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Virtual private network (VPN)

Encyclopedia of Multimedia Technology and Networking, Second Edition
Virtual private communications network established over a public infrastructure through an authentication mechanism, for the secure exchange of information between two entities.
Published in Chapter:
Simulation-Based Comparison of TCP and TCP-Friendly Protocols
Gábor Hosszú (Budapest University of Technology and Economics, Hungary)
DOI: 10.4018/978-1-60566-014-1.ch176
Abstract
Internet streaming media changed the Web from a static medium into a multimedia platform, which supports audio and video content delivery. In our days streaming media turns into the standard way of global media broadcasting and distribution. The low costs, worldwide accessibility, and technical simplicity of this telecommunication way make media streams very attractive for content providers. Streaming works by cutting the compressed media content into packets, which are sent to the receiver. Packets are reassembled and decompressed on the receiver side into a format that can be played by the user. To achieve smooth playback, packets are buffered on the receiver side. However, in case of a network congestion, the stream of packets slows down, and the player application runs out of data, which results in poor playback quality. This article presents the comparison of different transport level congestion control schemes, including variants of the TCP. The protocol mechanisms, implemented in various protocols, are hard to investigate in a uniform manner; therefore, the simulator SimCast (Simulator for multiCast) is developed for traffic analysis of the unicast and multicast streams. In this article the TCP and other transport protocol mechanisms will be compared using the SimCast simulator (Orosz & Tegze, 2001). The simulated results are presented through examples. Due to spreading of traffic lacking end-to-end congestion control, congestion collapse may arise in the Internet (Floyd & Fall, 1999). This form of congestion collapse is caused by congested links that are sending packets to be dropped only later in the network. The essential factor behind this form of congestion collapse is the absence of end-to-end feedback. On the one hand an unresponsive flow fails to reduce its offered load at a router in response to an increased packet drop rate, and on the other hand a disproportionate-bandwidth flow uses considerably more bandwidth than other flows in time of congestion. In order to achieve accurate multicast traffic simulation—being not so TCP-friendly yet—the effects of the flow control of the TCP protocol should be determined (Postel, 1981). However, there are many different kinds of TCP and other unicast transport protocol implementations with various flow control mechanisms, which make this investigation rather difficult (He, Vicat-Blanc Primet, & Welzl, 2005).
Full Text Chapter Download: US $37.50 Add to Cart
More Results
QoS Provisioning Framework in IP-Based VPN
A service that enables restricted communication between a set of sites, making use of a backbone that is shared with other traffic not belonging to that communication.
Full Text Chapter Download: US $37.50 Add to Cart
What Is Cloud Computing?
Is a programming method that encrypts the public internet connection to a secure private network. VPN gives benefit over the public infrastructure by securing the resource to be used on sharing.
Full Text Chapter Download: US $37.50 Add to Cart
E-Health Sites Development Using Open Source Software and OMT Methodology as Support for Family Doctors’ Activities: A Romanian Case Study
Is a network emulated (the virtual) built on public infrastructure (shared), dedicated to a client (the private) to connect users in locations and to ensure similar conditions of integrity, confidentiality and quality similar with those of a private network.
Full Text Chapter Download: US $37.50 Add to Cart
Overlay Networks: New Techniques for Global Service and Network Provisioning
Virtual private networks provide overlays on the network layer in order to connect separated networks at different locations via a telecommunication network. The IETF has developed a standard suite for VPNs on the Internet. The operator of a VPN can have limited visibility of the underlying network structure of a service provider supporting the VPN.
Full Text Chapter Download: US $37.50 Add to Cart
E-Government's Barriers and Opportunities in Greece
It is a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge Transfer in G2G Endeavors
A private communications network usually used within a company, or by several different companies or organizations, to communicate over a public network.
Full Text Chapter Download: US $37.50 Add to Cart
End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies
VPN is a communications tunnel uses a pre-existing (and often unsecure, such as the Internet) network to connect a remote user to a corporate network. The information is tunneled, encapsulated, and encrypted when passes through the unsecure network. Once the information reaches the destination, it is decapsulated and decrypted.
Full Text Chapter Download: US $37.50 Add to Cart
Virtual Private Networks
A commercial approach to network management where privately owned voice and data networks are set up on public network infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
House Builders
A technology that allows a company’s remote users and branch offices to securely access their corporate systems, providing a safe and encrypted connection over a less secure network, such as the internet. It enables users to send and receive data across public networks as if their computers or hand-held devices were directly connected to the private network.
Full Text Chapter Download: US $37.50 Add to Cart
The Dark Side of Engaging With Social Networking Sites (SNS)
A virtual private network (VPN) provides a means of connecting to a network within an organisation (as if you were inside the organisation) even though you are not physically present.
Full Text Chapter Download: US $37.50 Add to Cart
Improving Health Services Via Advanced ICT Networks
A hybrid network that includes both public and private facilities. The user leases a bundle of circuits and configures the VPN on an as-needed basis so that some traffic travels on the private leased network and some travels on the common carrier’s public network.
Full Text Chapter Download: US $37.50 Add to Cart
The WiMAX Network Solutions for Virtual Enterprises Business Network
A network emulated (the virtual) built on public infrastructure (shared), dedicated to a client (the private) to connect users in locations and to ensure similar conditions of integrity, confidentiality and quality similar with those of a private network.
Full Text Chapter Download: US $37.50 Add to Cart
Regulating the Internet
A remote server that creates an encrypted connection between the client and server to protect access.
Full Text Chapter Download: US $37.50 Add to Cart
Broadband Solutions for the Last Mile to Malaysian Residential Customers
VPN is a private communications network often used by companies or organizations to communicate confidentially over a public network. VPN traffic can be carried over a public networking infrastructure (e.g., the Internet) on top of standard protocols, or over a service provider’s private network with a defined Service level agreement (SLA) between the VPN customer and the VPN service provider.
Full Text Chapter Download: US $37.50 Add to Cart
Trust Management in Virtual Product Development Networks
A private communication network often used within a company, or by several different companies or organizations, to communicate confidentially over a publicly accessible network.
Full Text Chapter Download: US $37.50 Add to Cart
Grid Computing Initiatives in India
VPN is a private communications network often used by companies or organizations to communicate confidentially over a public network.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR