+ Onmtlemieeselenision anc il providers have serves
that steam cqnvenitie client atrces,
+ Mony paerlo-peer satworks exist over the intarnet that
allow Use (9 ares, magesand videos, ach
nnecentont ancl aleons thar users ances
Cheep set upant
rairtain, Does notrequire
expensive servers,
Wo centralised caiabase
cf users, usernames
ancl passnards, misking
ithecderto maintain
secuity
Falure ofan individuel per
oriyremovesaceess to the
rosourcesand data wien
tha. 300° harelles, The 12st
ofthe retwark rerrairs
uratiecses
Users havea werny
about making backeps
asnoeenbalised 9aekup
service odts
Joes not equirespacalist
eshnicalstat zo raictan,
The more computers
te arecn 2aeert0-
peeinietwork, esiomer
iva ru
Table 6.05 - Advantages and disadvantages of a peer-to-
peer network,
Virtual private networks (VPN)
Tunnelling protocol 3 tionel oe
netwerkthet gover bye set ies
Jambi -géate so ‘carnetb= ercersioad
sethool a decnppien fey, ante aneneaste Virinaaples
Companies er organisat ans “ay wantto allow users
Ui sce 9 relwork, often a LAM, from a remote
tocatinn, [ney wil need 70 use ex-eral resources to
creslethinconmection, the external resoureas wll
vot tie ewned oF vein alted by Ihe over of leh AN,
which carn-make #ecess 9 the LAN network much 05
snouts, This sia be of great eancoine [he our af ho
LAI and the users who want to renoteiy access it
The bir of setureycan becwercem ayn aleiveniting,
Vial private network (vF}
—
AYN bared i ci sho ga ren talecsnpalet w@eorttect
Secunda private rel ek slip ocr al NCHS,
Oncz cennectae lo he VPS, Lig emote cemaue ther
ihas secre aves te the | AN’s reste, just a= iF twrere
sinweily cornectes: to the LAN,
Secuiily is enplemes tee Ihesugh Lense of tunnelling:
protocols aiid encryption, For xarnple, the secre
‘shell SSH) nnn! piotico) useserieryplion to securely
trans rit Urenc-yptes deta packets ecross a> unsafe
rebwurk.
To connesttn 4 YPN, auserrevnotely lags an othe
webwork, Once Lie user's entity has been gutter tice,
ie¥PN's tunnelig stole! sols up anonerypzed lin
te theuser's computes Gata cen then be ranernitted
securely.
Remember
vies oe ule ose Ly-orga saliow We powie
Diseesst in lramel ng employes, employerswne
telework snd usors thar wentte accessLAN wesou ces
alhore Jkerswho werllosecurelyarcesseata on 2
hove compute when iiey 272 aay ce cloo use £ YN
(here are severel advantags
‘rgar'setion using WEN asshowen nso
anc sedvartages tor an
£6.
TASK
Find ourwhat king of networkyou bavein your schoo!
‘orhome Wher s the stuctureof tard hors does esiere
ata
Dos your school or heme re meri hrave any seers?
does,yhat are they used fo
Intranets and extranets
0 Intraniot Is 3 privetoly onnied notwork that usesintemet
tecincloges, for example web peges, for ntemnal use
‘with nan orpsrisation. Nab pages nold organisations!
information such as cews, events, historical Cala etd
comman y used documerts, Ime lard instant mesa ag
cat also be usec ‘orintemal cammurication. Training
vldeosoy Co core Hiessapencen Leslee nedand
‘watched by employees,