In such cases, the hybrid VPN acquires the features of the secured VPN.The use of VPNS over the other approaches has two major advantages. These are cost saving and the scalability of the approach (Lewis 45). VPNs are known to lower cost in several ways. One of the main ways through which this occurs is the elimination of the need for long distance lines that are usually leased. Instead of the leased lines, organizations are only required to have a dedicated line that connects it to the chosen service provider. This can be done through broadband or a local short distance leased line. As such, the cost for the connection will be greatly reduced.Costs are also reduced by the lessening of the telephone charges for the long distance access. Through the use of remote access, the users are only required to contact the nearest access point. Finally, costs are reduced by the offloading of the support that is required. When the VPNs are used, the service providers are the ones that support the access. This means that the support cost is shared between the organization and the service provider (Lewis 67). The other major advantage of the VPNS is the scalability of the technology. The use of long distance leased lines requires companies to add more lines when they open more branches or offices. This results in what is known as combinational explosions. This is not the case with the VPNs where the organization or company can use the internet to connect several offices without the need for additional network lines.Due to the several advantages and the hype that has been associated with VPN, its shortcomings are at times forgotten. The first disadvantage of the VPNs is that they need a very deep understanding of the security of the public network, as well as the associated precautions. The second disadvantage is that the availability as well as the functioning of the VPN networks is dependant on factors that the organization has minimal control over (Cisco Systems 234). The third disadvantage is that the VPNs technologies that come from different vendors may not work in synchrony. The final limitation is that the VPNs are required to accommodate existing network technologies and protocols apart from the IP.VPNs are currently used or different purposes. The technologies are used by organizations to allow employees have access to data, files and other shared resources. It is also used
Cisco Systems. Internet working Technologies Handbook, Third Edition. Indianapolis: Cisco Press, 2000, Print.
Lewis, Mark. Comparing, Designing and Deploying VPNS. Indianapolis: Cisco Press, 2006. Print.
Please type your essay title, choose your document type, enter your email and we send you essay samples