and managed switches. Another layer includes implementation of authentication protocols and virtual private networks for a reliable and secure connection for remote users connecting through a public ...