Fortnightly News Letter From IT Desk Vol. II. Issue–XIII. Technology that gears movement of Cargo. Oct 15, 2002 What is a VPN? .. Explaining Virtual Private Networks … For years, voice, data, and just about all softwaredefined network services were called "virtual private networks" by the telephone companies. The current generation of VPNs, however, is a more advanced combination of tunneling, encryption, authentication and access control technologies and services used to carry traffic over the Internet, a managed IP network or a provider's backbone. The traffic reaches these backbones using any combination of access technologies, including T1, frame relay, ISDN, ATM or simple dial access. The client sends a stream of encrypted Point-to-Point Protocol (PPP) packets to a remote server or router, except instead of going across a dedicated line (as in the case of WANs), the packets go across a tunnel over a shared network. Using this VPN model, packets headed towards the remote network will reach a tunnelinitiating device, which can be anything from an extranet router to a PC with VPN-enabled dial-up software. The tunnel initiator communicates with a VPN terminator, or a tunnel switch, to agree on an encryption scheme. The tunnel initiator then encrypts the package for security before transmitting to the terminator, which decrypts the packet and delivers it to the appropriate destination on the network. VPN technology can be used for site-to-site connectivity as well, which would allow a branch office with multiple access lines get rid of the data line, and move traffic over the existing Internet access connection. Since many sites use multiple lines, this can be a very useful application, and it can be deployed without adding additional equipment or software. VPNs can also reduce costs by eliminating the need for long-distance telephone charges to obtain remote access, as client need only call into the service provider's nearest access point. Privacy and protection of data is of utmost importance when deploying services over the Internet, where it can be vulnerable to attacks or illegal entry. Secure IP-VPNs are networks that are secured by encryption and authentication, and layered on an existing IP network. In response to security issues, the Internet Engineering Task Force (ietf.org) has developed the IP Security (IPSec) protocol suite, a set of IP extensions that offer strong data authentication and privacy guarantees. Although security features differ from product to product, most IP-VPN providers generally private network tunneling through the IP backbone, data encryption, authentication proxying,, firewall, and spam filtering. VPN products fall into three broad categories: hardware-based systems, firewall-based systems, and standalone application packages. Most hardware-based VPNs are encrypting routers, which are considered secure and simple to use, as they are the nearest things to "plug-and-play" equipment available. However, they may not be as flexible as software-based systems, which are ideal in situations where both endpoints of a VPN are not controlled by the same organization, which is typical for business partnerships or when client support is required. Firewall-based VPNs are considered among the most secure, as they take advantage of the firewall's existing security mechanisms. However, if the firewall is already loaded, performance issues may pop up. However, as the VPN market continues to rapidly evolve, the lines between different VPN architectures are increasingly blurred; many hardware vendors have included software clients to their product offerings, and extended their server capabilities to include the security features found in software- or firewall-based VPNs. Similarly, some standalone products have added support for hardware-based encryptors to boost their performance. VPN allows two or more private networks to be connected over a publicly accessed network similar to wide area networks (WAN) or a securely encrypted tunnel, but the key feature of VPNs is that they are able to use public networks like the Internet rather than rely on expensive, private leased lines. At they same time, VPNs have the same security and encryption features as a private network, while taking the advantage of the economies of scale and remote accessibility of large public networks. A VPN is an especially effective means of exchanging critical information for employees working remotely in branch offices, at home, or on the road. It can securely deliver information between vendors, suppliers, and business partners, who may have a huge physical distance between them. Any Queries should be forwarded to Editor: Swastika Johorey Phone: 0124-6381603(5 lines), Fax:0124-6381611, Email: [email protected] Your Attention Please Ensure that your branch has proper earthing for the power supply, and all machines should be connected through properly working UPS. o Heartiest Congratulations to Ahmedabad for HAT_TRICK in sending DBR data first of all Region for the third time in a row i.e. This month again AHRO, whole region has sent the DBR to corporate before any other region like the previous two months. o Panjim, Rajkot, Pondicherry, Mangalore and Kolhapur was the first five Controllings in sending the DBR for the month of Sep 02. All should try to become first five and try to send last day DBR of the month on the same day. o CBS has still not started on daily basis in most of the controllings Please ensure that daily CBS must be prepared at all locations with immediate effect i.e. on 10th of the month CBS of 10th must be prepared. o It has been observed that problems are not reported from field to corporate. o It has been observed that most of the mails with attachment of files are sent, as Cc. Please don’t do like this, send the attachment only to concern person and Cc must be sent without attachment for info only. o VSAT are not being used effectively as well as efficiently. o Chat must be used more frequently then telephone wherever possible. o The scheduled Time for sending data through FTP is not followed due to which bandwidth is choke. So kindly follow the scheduling given below. o Any kind of problems/query should be directed to [email protected] and [email protected]. o POD/DWB/challan/DBR data should be sent regularly and should be taken on priority basis. If there is some problem faced in this regard, please let us know immediately so that it can be solved. Tight Spot: Missing data and mismatch in MBR at o Data to be sent through FTP only, and according to your time schedule Steps to be followed for MBR Processing o POD de-centralization has started. Please ensure that the modified xps2.exe sent to you, is implemented at all your branches so that the POD data of the whole region is available at the regions. When you export the pod data it makes files for corporate, all booking stations and booking region as well as the delivery region. o Please make sure that the problems faced in the software should be reported immediately and solved with proper follow up with the corporate. o Please ensure to implement the latest Software sent to you from corporate. Corporate. Solution: MBR Processing at regions. o Create dir for all accounting centres. o Copy the respective files to the directories o Now merge the different files and keep it in xprocess dir. o Now index the xprocess dir run (XPSD), run XPS5 (reconcile TBB files), RUN xps6 (bill reconciliation) and if unmatch list is coming then clear it and then run XPS7 (all options related to MBR) and print the MBR and tally it with the hardcopy of the accounting centres. o Send the MBRFILE, AMBRFILE and all the other merged files to XCRP. o Any kind of problem /query should be sent to [email protected] The scheduled Time for sending data through FTP to reduce the data traffic is as follows. Check your Time Region and its Controlling TCI XPS AHRO, BBRO XARO, XKRO BNRO, CARO XBRO, XCRO DLRO, HYRO XDRO MDRO, VNRO XPRO Time 11:00AM TO 12:00PM 12:00PM TO 1:00 PM 3:00PM TO 4:00PM 4:00PM TO 5:00PM Note: Please ask all of your controllings to strictly follow the same as it chocks the bandwidth and reducing the speed of data transfer. Anybody missing this scheduled should do it after 6:30 PM. Internet terms Packet: A chunk of data. The TCP/IP protocol breaks large data files into smaller "packets" for transmission. When the data reaches its destination, the protocol makes sure that all packets have arrived without error. Page: An HTML document, or Web site. PING: Ping - a program for determining if another computer is presently connected to the Internet. Pixel: Short for picture element - the smallest unit of resolution on a monitor. Commonly used as a unit of measurement. Plug-In: A small application, which extends the built in capabilities of your Web browser. Examples include Macromedia's Shockwave, providing animation, and RealAudio, offering streamed sound files over the Internet. Compared to helpers, the multimedia files do not need to be downloaded before shown or played. Any Queries should be forwarded to Editor: Swastika Johorey Phone: 0124-6381603(5 lines), Fax:0124-6381611, Email: [email protected]
© Copyright 2026 Paperzz