Virtual Private Networks Use In Term Paper

VPNs are used for completing the necessary order and booking capture, booking management, pricing updates and validations with each agent, and the coordination with the literally thousands of travel partners to company has. Sabre opted for Web-based VPN architecture to deliver real-time updates of data to their MySabre travel agency booking portal that was recently introduced to the 70,000 travel agents that participate with the travel network. The use of an SSL-based VPN architecture for supporting the many quoting, ordering, and services processes was critical for Sabre, as their broader application development plan focused first on speed and security for their agent base. Sabre also wanted to have a single sign-on capability to ensure their agents, the majority of which are not technologically oriented, could quickly gain access to the MySabre portal and complete bookings. According to Sabre (1) the use of VPN technology also significantly dropped the cost of creating a partner management system online as the company was able to keep the application within its own it organization.

References

AMR Research (2004)- Time to Move Beyond Point Security Systems. AMR Research. Lance Travis, author. From the Research Alert of the same name. February 25, 2004

...

Aberdeen Group Research Report. March, 2006. Aberdeen Research
Columbus (2003) - Re-evaluate How Your Measure Your Channels' Performance. AMR Research. Boston, MA December 2, 2003. Accessed from the Internet February 21, 2007 from location:

http://www.lwcresearch.com/filesfordownloads/ReevaluateHowYouMeasureYourChannelDec2003.pdf

Findlaw (2006) - Modern Practice Magazine. Findlaw's Law Practice Magazine Glossary. Downloaded from the Internet on February 21, 2007 from location:

http://practice.findlaw.com/glossary.html

Teleworking: The Quiet Revolution (2005) - From the report of the same name. Gartner Group. Publication Date: September 14, 2005. ID number: G00122284. Stamford, CT.

Sabre (2006) - Sabre use of VPN Technologies. Nortel Networks website. Downloaded from the Internet on February 21, 2007 from location:

http://www2.nortel.com/go/news_detail.jsp?cat_id=-9252&oid=100190006&locale=en-U.S.

Virtual Private Network Consortium (2006) - From the white paper, VPN Technologies: Definitions and Requirements Downloaded from the Internet on February 21, 2007 from location::

http://www.vpnc.org/vpn-technologies.html

Sources Used in Documents:

References

AMR Research (2004)- Time to Move Beyond Point Security Systems. AMR Research. Lance Travis, author. From the Research Alert of the same name. February 25, 2004

Aberdeen Group (2003) - Buyer's Guide to Managed Delivery. Aberdeen Group Research Report. March, 2006. Aberdeen Research

Columbus (2003) - Re-evaluate How Your Measure Your Channels' Performance. AMR Research. Boston, MA December 2, 2003. Accessed from the Internet February 21, 2007 from location:

http://www.lwcresearch.com/filesfordownloads/ReevaluateHowYouMeasureYourChannelDec2003.pdf
http://practice.findlaw.com/glossary.html
http://www2.nortel.com/go/news_detail.jsp?cat_id=-9252&oid=100190006&locale=en-U.S.
http://www.vpnc.org/vpn-technologies.html


Cite this Document:

"Virtual Private Networks Use In" (2007, February 21) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/virtual-private-networks-use-in-39896

"Virtual Private Networks Use In" 21 February 2007. Web.19 April. 2024. <
https://www.paperdue.com/essay/virtual-private-networks-use-in-39896>

"Virtual Private Networks Use In", 21 February 2007, Accessed.19 April. 2024,
https://www.paperdue.com/essay/virtual-private-networks-use-in-39896

Related Documents

Centralized telesaving control Managing cost-effective use of dial links centrally may no longer be possible. Overhead VPN tunnels impose overhead for dial-in users: encryption algorithms may impact the performance of the user's system, there will be an increased protocol header overhead, authentication latency will increase, PPP and IP compression will perform poorly (compared to a direct link), and modem compression won't work at all. Support issues Replacing direct-dial links with VPN tunnels may produce some

Defining VPN in Computer NetworkingThe purpose of this paper is to provide a definition and explanation of a virtual private network (VPN) which is a key concept in information technology (security and network technologies). The explanation that follows includes selected quotes to provide some definitional clarity of the term and the key concepts that are involved as well as the different types of VPNs and how they are related to

Very High - IPSec works at the protocol level, independent of applications, therefore scalability is best-in-class Comparing the technological and operational benefits specifically in the areas of client access options, access control, client-side security, installation, and client configuration highlights just how differentiated the IPv4-based IPSec vs. IPv6 -based SSL protocols are from each other. In analyzing these differences, Table 3: Comparing Technological and Operational benefits of IPv6-based SSL and IPv4-based IPSec

The company should use the Cisco hedge router to make the company to achieve a reliable communication over the internet. The edge router will also make the company to achieve higher capacity, scalability, and improve routing protocol convergence at lower costs. As traffic volume increases, the solution will allow the company to implement incremental bandwidth upgrades without necessarily changing the router interface. The edge firewall will be used to

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

When portals are designed to the specific requirements of Web 2.0 design objectives, companies with virtual teams are finding they can attain higher levels of shared task ownership as well. This is because there are significantly greater levels of trust overall throughout an organization based on the collective contributions of every member of a virtual and in-office team when they share their knowledge and information together (Mancini, 2010). Portals