Nt1310 Unit 4.2.3.1

Words: 932
Pages: 4

3.2.2 Database Layer This layer is mainly responsible for storing all the information needed for the system, as well as responsible for modeling and optimizing the data access.All the data needed by the messaging system logic layer will be recover from the database. Database in the proposed system consists of two tables for storing information related to and relevant to the client(account information related to the client as well as personal messages also belong to the client).

3.3 Other Security Schemes [44] Virtual Private Network (VPN) It represents a network technology that create a secure connection via the public network for example, the Internet or a private network owned by someone offers that service.There are many companies and government institutions and also educational are using of that technology for the purpose of providing security to contact private network for remote users.
…show more content…
Any user must be authenticated through a unique identification and a password in order to access to the private network.The authentication code is often used for the purpose access to the private network through a personal identification number (PIN) that a user must enter. The personal identification number is a unique authentication code changes according to specific frequency, and most likely every 30 seconds. VPN technique has many of the protocols that are using to secure the transfer of data traffic through the public infrastructure network.Each protocol differs slightly from the rest of the protocols in a way that is secure these data. Below are some of these protocols