SlideShare a Scribd company logo
1 of 21
VIRTUAL PRIVATE NETWORKS (VPN)
Name = Aviansh nath
B.tech – 2 year ( I T )
Traditional Connectivity
1. Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet,
instead of leased lines to communicate.
2. Became popular as more employees worked in remote
locations.
3. Terminologies to understand how VPNs work.
What is VPN?
Who uses VPN ?
 VPN’s can be found in homes, workplaces, or anywhere
else as long as an ISP (Internet Service Provider) is
available.
 VPN’s allow company employees who travel often or
who are outside their company headquarters to safely
and securely connect to their company’s Intranet
Private Networks
vs.
Virtual Private Networks
1. Employees can access the network (Intranet) from
remote locations.
2. Secured networks.
3. The Internet is used as the backbone for VPNs
4. Saves cost tremendously from reduction of equipment
and maintenance costs.
5. Scalability
Remote Access Virtual Private Network
1. Two connections – one is made to the Internet and the
second is made to the VPN.
2. Datagrams – contains data, destination and source
information.
3. Firewalls – VPNs allow authorized users to pass through
the firewalls.
4. Protocols – protocols create the VPN tunnels.
Brief Overview of How it Works
1. Authentication – validates that the data was sent
from the sender.
2. Access control – limiting unauthorized users from
accessing the network.
3. Confidentiality – preventing the data to be read or
copied as the data is being transported.
4. Data Integrity – ensuring that the data has not been
altered
Four Critical Functions
Encryption
Encryption -- is a method of “scrambling” data
before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
Tunneling
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Two types of end points:
 Remote Access
 Site-to-Site
In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there
are protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level.
What is protocol ?
The TCP/IP Internet protocols, a common example, consist of:
• Transmission Control Protocol (TCP), which uses a set of rules to
exchange messages with other Internet points at the information packet
level
• Internet Protocol (IP), which uses a set of rules to send and receive
messages at the Internet address level
• Additional protocols that include the Hypertext Transfer Protocol (HTTP)
and File Transfer Protocol (FTP), each with defined sets of rules to use with
corresponding programs elsewhere on the Internet
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones above
VPN Encapsulation of Packets
Types of Implementations
What does “implementation” mean in VPNs?
3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
Device Types
• What it means
• 3 types
• Hardware
• Firewall
• Software
Device Types: Hardware
• Usually a VPN type of router
Pros
• Highest network
throughput
• Plug and Play
• Dual-purpose
Cons
• Cost
• Lack of flexibility
Device Types: Firewall
• More security.
Pros
• “Harden” Operating System
• Tri-purpose
• Cost-effective
Cons
• Still relatively costly
Device Types: Software
• Ideal for 2 end points not in same org.
• Great when different firewalls implemented
Pros
• Flexible
• Low relative cost
Cons
• Lack of efficiency
• More labor training
required
• Lower productivity;
higher labor costs
Virtual private networks (vpn)
Virtual private networks (vpn)

More Related Content

What's hot

VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranetcalix_ricia
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 

What's hot (20)

Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
VPN
VPNVPN
VPN
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
VPN
VPNVPN
VPN
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
vpn
vpnvpn
vpn
 
Vpn
VpnVpn
Vpn
 
VPN Network
VPN NetworkVPN Network
VPN Network
 

Viewers also liked

Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13FGV-EAESP
 
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...Työterveyslaitos
 
балтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилейбалтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилейКахарман Балтабаев
 
Circuit de Música Moderna - Terrassa
Circuit de Música Moderna - TerrassaCircuit de Música Moderna - Terrassa
Circuit de Música Moderna - TerrassaMés A Prop Terrassa
 
12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, Tampere12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, TampereTyöterveyslaitos
 
Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16moronad45
 
2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?Työterveyslaitos
 
Jazz a prop 2017 - De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 -  De l'11 de febrer al 25 de març a TerrassaJazz a prop 2017 -  De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 - De l'11 de febrer al 25 de març a TerrassaMés A Prop Terrassa
 
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017Työterveyslaitos
 

Viewers also liked (11)

Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13
 
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
 
балтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилейбалтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилей
 
The Hegemonic Core
The Hegemonic CoreThe Hegemonic Core
The Hegemonic Core
 
Circuit de Música Moderna - Terrassa
Circuit de Música Moderna - TerrassaCircuit de Música Moderna - Terrassa
Circuit de Música Moderna - Terrassa
 
12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, Tampere12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, Tampere
 
Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16
 
2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?
 
Jazz a prop 2017 - De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 -  De l'11 de febrer al 25 de març a TerrassaJazz a prop 2017 -  De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 - De l'11 de febrer al 25 de març a Terrassa
 
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
 
Programação da Semana Santa de 2016
Programação da Semana Santa de 2016Programação da Semana Santa de 2016
Programação da Semana Santa de 2016
 

Similar to Virtual private networks (vpn)

Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of NetworkingNetwax Lab
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPoojaWalia6
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptshabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Network resources
Network resourcesNetwork resources
Network resourcesRohit Kumar
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 

Similar to Virtual private networks (vpn) (20)

Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
Vpn
VpnVpn
Vpn
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
Vpn
VpnVpn
Vpn
 
Mcse question
Mcse questionMcse question
Mcse question
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
F0322038042
F0322038042F0322038042
F0322038042
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Network resources
Network resourcesNetwork resources
Network resources
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Network Notes
Network Notes Network Notes
Network Notes
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 

Recently uploaded

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 

Recently uploaded (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 

Virtual private networks (vpn)

  • 1. VIRTUAL PRIVATE NETWORKS (VPN) Name = Aviansh nath B.tech – 2 year ( I T )
  • 3. 1. Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. 2. Became popular as more employees worked in remote locations. 3. Terminologies to understand how VPNs work. What is VPN?
  • 4. Who uses VPN ?  VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available.  VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet
  • 5. Private Networks vs. Virtual Private Networks 1. Employees can access the network (Intranet) from remote locations. 2. Secured networks. 3. The Internet is used as the backbone for VPNs 4. Saves cost tremendously from reduction of equipment and maintenance costs. 5. Scalability
  • 6. Remote Access Virtual Private Network
  • 7. 1. Two connections – one is made to the Internet and the second is made to the VPN. 2. Datagrams – contains data, destination and source information. 3. Firewalls – VPNs allow authorized users to pass through the firewalls. 4. Protocols – protocols create the VPN tunnels. Brief Overview of How it Works
  • 8. 1. Authentication – validates that the data was sent from the sender. 2. Access control – limiting unauthorized users from accessing the network. 3. Confidentiality – preventing the data to be read or copied as the data is being transported. 4. Data Integrity – ensuring that the data has not been altered Four Critical Functions
  • 9. Encryption Encryption -- is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature – for authentication
  • 10. Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Two types of end points:  Remote Access  Site-to-Site
  • 11.
  • 12. In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. What is protocol ? The TCP/IP Internet protocols, a common example, consist of: • Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level • Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level • Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet
  • 13. Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above
  • 15. Types of Implementations What does “implementation” mean in VPNs? 3 types Intranet – Within an organization Extranet – Outside an organization Remote Access – Employee to Business
  • 16. Device Types • What it means • 3 types • Hardware • Firewall • Software
  • 17. Device Types: Hardware • Usually a VPN type of router Pros • Highest network throughput • Plug and Play • Dual-purpose Cons • Cost • Lack of flexibility
  • 18. Device Types: Firewall • More security. Pros • “Harden” Operating System • Tri-purpose • Cost-effective Cons • Still relatively costly
  • 19. Device Types: Software • Ideal for 2 end points not in same org. • Great when different firewalls implemented Pros • Flexible • Low relative cost Cons • Lack of efficiency • More labor training required • Lower productivity; higher labor costs