Fig 6 - uploaded by Ruaa Al-falluji
Content may be subject to copyright.
Host-to-Host Architecture

Host-to-Host Architecture

Source publication
Article
Full-text available
The world has become increasingly interconnected in terms of technology. The use of internet has grown dramatically. Internet plays an important role for the today's business. Every organization wants to secure their moving data because significant data loss can damage the business continuity. So the necessity of network security became obvious. Th...

Context in source publication

Context 1
... VPN client is used in the administrator ends to establish a connection to the remote server. The following figure 6 shows a Host-to-Host architecture. International Journal of Computer Engineering and Information Technology (IJCEIT), Volume 9, Issue 9, September 2017 R. A. A. Al-falluji Host-to-Gateway Architecture: This model is practical for providing secure remote accesses. ...