Abstract
The world of Internet as such is open and insecure by nature. Companies and organizations exploit enormous possibilities that internet offers to build computer systems to enable communication and data sharing capabilities within their corporate platforms. In doing so, they continuously strive towards providing a fast, efficient and at the same time secure working environment by protecting their organizational assets. Enterprises build their network infrastructure with intention to find reliable solutions to protect themselves from untrusted and cybercrime activities. In this sense, Virtual Private Networks (VPN) are primarily concerned about Data privacy. VPNs represent an extension of a private network made through added features like encapsulating the data packets with a header on both ends, along the lines of the communication as well as throughout setting communication tunnels using composite suite of protocols available. This paper offers a set of simulated secure data communication tunnels together with a comparison of results of the speed variables measured against the security through different encryption protocols between remote LAN's. These encryption protocols are ran onto distributed queries using various database functions.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have