SlideShare a Scribd company logo
1 of 10
Virtual Private Network
(VPN)
Sarmad Soomro
2k12/IT/72
Context
• Introduction
• Protocols Used in VPN
• Advantages
• Disadvantages
• Where its used
• Conclusion
Introduction
• Definition : VPN means Virtual Private Network, a secure tunnel between two
devices.
OR
• A Virtual Private Network (VPN) is a network technology that creates a secure
network connection over a public network such as the Internet or a private network
owned by a service provider.
OR
• VPN is method used to add security and privacy to private and public networks
Here is what happens when using internet with VPN and without VPN
Protocols Used in VPN
• There are a number of VPN protocols in use that secure the transport of
data traffic over a public network infrastructure. Some of them are listed
below:
• IP security (IPSec)
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• Point-To-Point Tunneling Protocol (PPTP)
Where its Used:
• If a multinational company wants to communicate or share something with
his clients that are located at different place or different countries, they can
communicate, then VPN extends the network to that authenticated users.
• In banking VPN enables account information to be transferred safely within
departments and branches.
Advantages
• Virtual private networks offer a much higher level of secure communication when
compared to other remote methods of communication.
• By using a VPN companies view this as one of the safest ways to link users together that are
distributed across multiple locations.
• When it comes to operating a VPN within an organization the costs are significantly lower
than other types of configurations, the opportunity to communicate securely at low cost in
other parts of the world.
• Virtual private networks are very flexible in terms of growing with the company and adding
new users to the network.
• Virtual private networks offer more flexibility for business partners to communicate over a
secure connection.
Disadvantages of VPN
• The design and security implementation for a virtual private network can be
complex. This means that it requires a professional with a high level of
understanding for the best type of VPN configuration and some of the security
issues that can occur when using a VPN.
• Reliability can become a factor depending upon the service provider that you
choose.
• If it happens to be necessary to create additional infrastructure the solutions can
become incompatible and cause technical issues.
• The use of mobile devices to initiate connectivity to the virtual private network can
cause security issues especially if the connection is wireless
Conclusion
• In my point of view, the conclusion is:
• VPN eliminates the need of long distance lines.
• Reduces the long distance telephone charges.
• Reduces the Operational costs.
References: http://www.slideshare.net/stolentears/vpn-presentation-
10778886?related=2
http://www.thrivenetworks.com/blog/2011/07/28/the-pros-and-cons-of-
using-a-virtual-private-network/

More Related Content

Viewers also liked

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Configuracion de red en ubuntu
Configuracion de red en ubuntuConfiguracion de red en ubuntu
Configuracion de red en ubuntuLupita Chacon
 
Man (metropolitan area network)
Man (metropolitan area  network)Man (metropolitan area  network)
Man (metropolitan area network)mizus
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Servermmoizuddin
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolutionSidra Mallick
 
How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7Tola LENG
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 

Viewers also liked (17)

Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Configuracion de red en ubuntu
Configuracion de red en ubuntuConfiguracion de red en ubuntu
Configuracion de red en ubuntu
 
Man (metropolitan area network)
Man (metropolitan area  network)Man (metropolitan area  network)
Man (metropolitan area network)
 
VPN
VPNVPN
VPN
 
4 vpn s
4 vpn s4 vpn s
4 vpn s
 
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolution
 
How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7How to configure IPA-Server & Client-Centos 7
How to configure IPA-Server & Client-Centos 7
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

Recently uploaded

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Virtual private network (vpn)

  • 2. Context • Introduction • Protocols Used in VPN • Advantages • Disadvantages • Where its used • Conclusion
  • 3. Introduction • Definition : VPN means Virtual Private Network, a secure tunnel between two devices. OR • A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. OR • VPN is method used to add security and privacy to private and public networks
  • 4. Here is what happens when using internet with VPN and without VPN
  • 5. Protocols Used in VPN • There are a number of VPN protocols in use that secure the transport of data traffic over a public network infrastructure. Some of them are listed below: • IP security (IPSec) • Secure Sockets Layer (SSL) • Transport Layer Security (TLS) • Point-To-Point Tunneling Protocol (PPTP)
  • 6. Where its Used: • If a multinational company wants to communicate or share something with his clients that are located at different place or different countries, they can communicate, then VPN extends the network to that authenticated users. • In banking VPN enables account information to be transferred safely within departments and branches.
  • 7. Advantages • Virtual private networks offer a much higher level of secure communication when compared to other remote methods of communication. • By using a VPN companies view this as one of the safest ways to link users together that are distributed across multiple locations. • When it comes to operating a VPN within an organization the costs are significantly lower than other types of configurations, the opportunity to communicate securely at low cost in other parts of the world. • Virtual private networks are very flexible in terms of growing with the company and adding new users to the network. • Virtual private networks offer more flexibility for business partners to communicate over a secure connection.
  • 8. Disadvantages of VPN • The design and security implementation for a virtual private network can be complex. This means that it requires a professional with a high level of understanding for the best type of VPN configuration and some of the security issues that can occur when using a VPN. • Reliability can become a factor depending upon the service provider that you choose. • If it happens to be necessary to create additional infrastructure the solutions can become incompatible and cause technical issues. • The use of mobile devices to initiate connectivity to the virtual private network can cause security issues especially if the connection is wireless
  • 9. Conclusion • In my point of view, the conclusion is: • VPN eliminates the need of long distance lines. • Reduces the long distance telephone charges. • Reduces the Operational costs.