What are the IP NAT and IPSec protocols?

Asked by Last Modified  

Follow 0
Answer

Please enter your answer

Trainer

IP NAT we are using to commnicate public IP to private IP vs versa.. IP sec is the concept of Tunneling here we are creating a path between 2 remoe locations with secure tunnel.
Comments

Related Questions

How will you teach me? Is this coaching free or paid?
It is paid and I can teach you online complete basics of computers.
Deepan
What OSI layer uses frames: the data link layer or the physical layer?
Protocols running at Data link layer is responsible to encapsulate the frames from physical layer received bits format.
Honey
0 0
6
How can I find the IP address of my access point?
Check in LAN options. It may varies by model
Abhijith
0 0
5

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

A note on working of Transmission Control Protocol in Computer Networks.
TCP Connection establishment and termination TCP is one of theTCP is connection oriented protocol and reliable protocol. It originated in the initial network implementation in which it complemented the...

NETWORKING BASIC
Block-1 Following are the essential elements of communication system. Information source: Source that produces a message Transmitter: An element that functions on the message to generate a signal...
S

Sics Shah Institute Of Computer Science

0 0
0

Know about Computer Networking:
Know about Computer Networking: Parts of Computer: Monitor CPU (Central Processing Unit) Keyboard Mouse Speakers Printer NIC(Network Interface Card) Parts of Network: Router Gateway/ISP Switches Computers/PCs/Nodes Firewall Cabling IP...

Addressing mechanism of computers in the Internet
1 Introduction As many people have name like “Ramesh”, “Ram”, we are used to call these guys by name. We can give numbers also to these people. These people get numbers as PAN...

Ethical hacking : Important points for beginners
Dear passionate learners, I am posting below lesson to create enthusiasm among you all for learning ethical hacking . A beginner in Ethical Hacking is always in dilemma. Below are some misconceptions,...

Recommended Articles

Microsoft Excel is an electronic spreadsheet tool which is commonly used for financial and statistical data processing. It has been developed by Microsoft and forms a major component of the widely used Microsoft Office. From individual users to the top IT companies, Excel is used worldwide. Excel is one of the most important...

Read full article >

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Applications engineering is a hot trend in the current IT market.  An applications engineer is responsible for designing and application of technology products relating to various aspects of computing. To accomplish this, he/she has to work collaboratively with the company’s manufacturing, marketing, sales, and customer...

Read full article >

Looking for Computer Networking classes?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you