SlideShare a Scribd company logo
1 of 23
Presented By : SURENDRA BANE.
                 Class : T. E.
                  Roll No : 02
                A.Y. : 2012-13

Under The Guidance Of : Prof. Prerna Shinde.
CONTENTS
Introduction
Traditional Connectivity
Why VPN is needed ?
Principle
How it works?
Tunneling
Four Protocols
Critical Function
VPN Technologies
Applications and Real-time example
Advantages and Disadvantages
Future
Conclusion
INTRODUCTION
What is VPN ?

Virtual Private Network is a type of private network
that uses public telecommunication, such as the
Internet, instead of leased lines to communicate.

Became popular as more employees worked in remote
locations.

Terminologies to understand how VPNs work.
TRADITIONAL CONNECTIVITY
VIRTUAL PRIVATE NETWORK
           VS.
    PRIVATE NETWORK
Employees can access the network
(Intranet) from remote locations.
Secured networks.
The Internet is used as the backbone for
VPNs
Saves cost tremendously from reduction of
equipment and maintenance costs.
PRINCIPLE

“A Virtual Private Network (VPN) is a
network constructed over the Internet and
other existing networks, that allows easy
and secure data transfers between the
participants.”
HOW IT WORKS ?
Two connections – one is made to the Internet and the
second is made to the VPN.

Datagrams – contains data, destination and source
information.

Firewalls – VPNs allow authorized users to pass through
the firewalls.

Protocols – protocols create the VPN tunnels.
VIRTUAL PRIVATE
NETWORK(VPN)
 Basic Architecture
TUNNELING
A virtual point–to–point connection made through
Public Network.
It transport Encapsulated datagrams.
FOUR PROTOCOLS IN VPN
PPTP -- Point-to-Point Tunneling Protocol.

L2TP -- Layer 2 Tunneling Protocol.

IPsec -- Internet Protocol Security.

SOCKS – is not used as much as the ones above
FOUR CRITICAL FUNCTION
Authentication – validates that the data was sent from
the authorized sender

Access control – give access to only authorized users.

Confidentiality – preventing the data to be read or
copied as the data is being transported.

Data Integrity – maintaining and assuring the accuracy
and consistency of data.
VPN TECHNOLOGIES
1 : Trusted VPN
   Provide assurance of properties of paths such as QoS.
   No security.

2 : Secure VPN
   Provide Security.
   No assurance of paths.

3 : Hybrid VPN
 Provide Secure and Trusted VPNs.
 Company already have Trusted VPN and need Security.
APPLICATION : REMOTE ACCESS

Secure connection – own computer to VPN router.

Easily access email, data, files at work from
outside through Internet.

 VPN allows mobile workers & telecommuters to
take advantage of broadband connectivity.
Remote Access Virtual Private
         Network
APPLICATION : SITE-TO-SITE

 Data is encrypted from one VPN gateway to other
 by secure link between two sites over internet.

 This would enable both sites to share resources –
 documents, other data over VPN link.

 This saves the company           hardware    and
 management expenses.
Site-to-Site VPNs
REAL TIME EXAMPLE
Health care company Intranet Deployment
ADVANTAGES
     AND
DISADVANTAGES
ADVANTEGES
 Eliminating the need for expensive long-
distance leased lines
 Reducing the long-distance telephone
charges for remote access.
 data integrity and privacy is achieved.
 Reduced Operational costs.
 Flexibility of growth .
DISADVANTAGES

VPNs require an in-depth understanding of
public network, security issues and proper
deployment of precautions.

 VPNs need to accommodate protocols other
than IP and existing internal network
technology.
Where Do We See VPNs Going in
         the Future?
As the VPN market becomes larger, more applications
will be created along with more VPN providers and new
VPN types.

Networks are expected to converge to create an
integrated VPN.

Improvement of protocols are expected, which will also
improve VPNs.
CONCLUSION
 VPNs allow users to connect to remote
servers, branch offices, or to other
companies       over     a       public
internetwork, while maintaining secure
communications.

 A VPN, only requires a broadband
internet connection
THANK YOU !!!

More Related Content

What's hot (20)

VPN
VPNVPN
VPN
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffen
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Vpn
VpnVpn
Vpn
 
VPN
VPNVPN
VPN
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
 

Similar to Vpn

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpnAreeba Gill
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxtodd521
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 

Similar to Vpn (20)

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Vpn
VpnVpn
Vpn
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 

Vpn

  • 1. Presented By : SURENDRA BANE. Class : T. E. Roll No : 02 A.Y. : 2012-13 Under The Guidance Of : Prof. Prerna Shinde.
  • 2. CONTENTS Introduction Traditional Connectivity Why VPN is needed ? Principle How it works? Tunneling Four Protocols Critical Function VPN Technologies Applications and Real-time example Advantages and Disadvantages Future Conclusion
  • 3. INTRODUCTION What is VPN ? Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations. Terminologies to understand how VPNs work.
  • 5. VIRTUAL PRIVATE NETWORK VS. PRIVATE NETWORK Employees can access the network (Intranet) from remote locations. Secured networks. The Internet is used as the backbone for VPNs Saves cost tremendously from reduction of equipment and maintenance costs.
  • 6. PRINCIPLE “A Virtual Private Network (VPN) is a network constructed over the Internet and other existing networks, that allows easy and secure data transfers between the participants.”
  • 7. HOW IT WORKS ? Two connections – one is made to the Internet and the second is made to the VPN. Datagrams – contains data, destination and source information. Firewalls – VPNs allow authorized users to pass through the firewalls. Protocols – protocols create the VPN tunnels.
  • 9. TUNNELING A virtual point–to–point connection made through Public Network. It transport Encapsulated datagrams.
  • 10. FOUR PROTOCOLS IN VPN PPTP -- Point-to-Point Tunneling Protocol. L2TP -- Layer 2 Tunneling Protocol. IPsec -- Internet Protocol Security. SOCKS – is not used as much as the ones above
  • 11. FOUR CRITICAL FUNCTION Authentication – validates that the data was sent from the authorized sender Access control – give access to only authorized users. Confidentiality – preventing the data to be read or copied as the data is being transported. Data Integrity – maintaining and assuring the accuracy and consistency of data.
  • 12. VPN TECHNOLOGIES 1 : Trusted VPN Provide assurance of properties of paths such as QoS. No security. 2 : Secure VPN Provide Security. No assurance of paths. 3 : Hybrid VPN Provide Secure and Trusted VPNs. Company already have Trusted VPN and need Security.
  • 13. APPLICATION : REMOTE ACCESS Secure connection – own computer to VPN router. Easily access email, data, files at work from outside through Internet. VPN allows mobile workers & telecommuters to take advantage of broadband connectivity.
  • 14. Remote Access Virtual Private Network
  • 15. APPLICATION : SITE-TO-SITE Data is encrypted from one VPN gateway to other by secure link between two sites over internet. This would enable both sites to share resources – documents, other data over VPN link. This saves the company hardware and management expenses.
  • 17. REAL TIME EXAMPLE Health care company Intranet Deployment
  • 18. ADVANTAGES AND DISADVANTAGES
  • 19. ADVANTEGES Eliminating the need for expensive long- distance leased lines Reducing the long-distance telephone charges for remote access. data integrity and privacy is achieved. Reduced Operational costs. Flexibility of growth .
  • 20. DISADVANTAGES VPNs require an in-depth understanding of public network, security issues and proper deployment of precautions. VPNs need to accommodate protocols other than IP and existing internal network technology.
  • 21. Where Do We See VPNs Going in the Future? As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. Networks are expected to converge to create an integrated VPN. Improvement of protocols are expected, which will also improve VPNs.
  • 22. CONCLUSION VPNs allow users to connect to remote servers, branch offices, or to other companies over a public internetwork, while maintaining secure communications. A VPN, only requires a broadband internet connection