SlideShare a Scribd company logo
1 of 25
Virtual Private Network(VPN)
Contents:
▪ Introduction:VPN
▪ Traditional Connectivity
▪ Remote Access Virtual Private Network
▪ Brief Overview of How it Works
▪ Four Critical Functions
▪ Tunneling
▪ Four Protocols used in VPN
Contents:
▪ VPNTopology :Type ofVPNs
▪ Remote AccessVPN
▪ Site to siteVPN
▪ VPN Security
▪ VPN : Advantages
▪ VPN : Disadvantages
▪ Applications
▪ Future OfVPN
▪ References
Introduction: VPN
▪ Linking of two or more computing devices to share
resources is networking.
▪ Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet, instead
of leased lines to communicate .
Traditional Connectivity
Remote Access Virtual Private Network
Brief Overview of How it Works
▪ Two connections – one is made to the Internet and the
second is made to the VPN.
▪ Datagrams – contains data, destination and source
information.
▪ Firewalls – VPNs allow authorized users to pass through the
firewalls.
▪ Protocols – protocols create the VPN tunnels.
Four Critical Functions
▪ Authentication – validates that the data was sent from the
sender.
▪ Access control – limiting unauthorized users from
accessing the network.
▪ Confidentiality – preventing the data to be read or copied
as the data is being transported.
▪ Data Integrity – ensuring that the data has not been altered
Tunneling
▪ A virtual point-to-point connection made through a
public network. It transports encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram DataArea
Original Datagram
Data Encapsulation
Two types of end points:
 Remote Access
 Site-to-Site
Tunneling
▪ MostVPNs rely on tunneling to create a private network
that reaches across the Internet. Essentially, tunneling is
the process of placing an entire packet within another
packet and sending it over a network.
Tunneling requires three different protocols:
▪ Passenger protocol -The original data (IPX, IP) being
carried
▪ Encapsulating protocol -The protocol (GRE, IPSec, L2F,
PPTP, L2TP) that is wrapped around the original data
▪ Carrier protocol -The protocol used by the network that
the information is traveling over
Four Protocols used in VPN
▪ PPTP -- Point-to-Point Tunneling Protocol
▪ L2TP -- Layer 2 Tunneling Protocol
▪ IPsec -- Internet Protocol Security
▪ SOCKS – is not used as much as the ones above
VPN Topology : Type of VPNs
▪ Remote Access VPN
▪ Site-to-Site VPN
▪ Intranet VPN
▪ Extranet VPN
Remote AccessVPN
▪ Remote-access, called as virtual private dial-up network
(VPDN)
▪ LAN connection used by a company that has employees
who need to connect to the private network from various
remote locations.
▪ Remote-access VPNs permit secure encrypted
▪ connections between a company's private network.
Site-to-Site VPN
▪ Intranet-based - If a company has one or more remote locations
that they wish to join in a single private network, they can
create an intranet VPN to connect LAN to LAN.
▪ Extranet-based - When a company has a close relationship with
another company (for example, a partner, supplier or
customer), they can build an extranet VPN that connects LAN
to LAN, and that allows all of the various companies to work
in a shared environment.
VPN Security
▪ A well-designed VPN uses several methods for keeping your
connection and data secure:
▪ Firewalls
▪ Encryption
▪ IPSec
▪ You can set firewalls to restrict the number of open ports, what type of
packets are passed through and which protocols are allowed through.
VPN : Advantages
▪ Cost Savings .
▪ Extend geographic connectivity.
▪ Improve security
▪ Provide broadband networking compatibility
▪ Improve productivity
▪ Reliable
VPN : Disadvantages
▪ VPNs require an in-depth understanding of public network security
▪ VPN require more tools.
Applications
▪ Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care
provider
▪ Manufacturing: allow suppliers to view inventory & allow
clients to purchase online safely
▪ Retail: able to securely transfer sales data or customer info
between stores & the headquarters
▪ Banking/Financial: enables account information to be
transferred safely within departments & branches
▪ General Business: communication between remote
employees can be securely exchanged
Future OfVPN
▪ VPNs are continually being enhanced.
Example: Equant NV
▪ As the VPN market becomes larger, more applications
will be created along with more VPN providers and
new VPN types.
▪ Networks are expected to converge to create an
integrated VPN
▪ Improved protocols are expected, which will also
improve VPNs.
Future ofVPN: Companies withVPN
References:
▪ http://vpn.shmoo.com/
▪ http://www.uwsp.edu/it/vpn/
▪ http://info.lib.uh.edu/services/vpn.html
▪ http://www.cites.uiuc.edu/vpn/
▪ http://www.positivenetworks.net/images/client-
uploads/jumppage2.htm
All reference links have been checked so far and have been found running on 10-08-2013
References
▪ <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>
▪ Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007
<http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.
▪ Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works.
6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>.
▪ "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar.
2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.
All reference links have been checked so far and have been found running on 10-08-2013

More Related Content

What's hot

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)Mohammad Awais Javaid
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)ISMT College
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting Newtechbed
 

What's hot (20)

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
200 301-ccna
200 301-ccna200 301-ccna
200 301-ccna
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Network security
Network security Network security
Network security
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 

Similar to Vpn

Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPNNaim Latifi
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 

Similar to Vpn (20)

Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 

Recently uploaded

Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 

Recently uploaded (20)

Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 

Vpn

  • 2. Contents: ▪ Introduction:VPN ▪ Traditional Connectivity ▪ Remote Access Virtual Private Network ▪ Brief Overview of How it Works ▪ Four Critical Functions ▪ Tunneling ▪ Four Protocols used in VPN
  • 3. Contents: ▪ VPNTopology :Type ofVPNs ▪ Remote AccessVPN ▪ Site to siteVPN ▪ VPN Security ▪ VPN : Advantages ▪ VPN : Disadvantages ▪ Applications ▪ Future OfVPN ▪ References
  • 4. Introduction: VPN ▪ Linking of two or more computing devices to share resources is networking. ▪ Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate .
  • 6. Remote Access Virtual Private Network
  • 7. Brief Overview of How it Works ▪ Two connections – one is made to the Internet and the second is made to the VPN. ▪ Datagrams – contains data, destination and source information. ▪ Firewalls – VPNs allow authorized users to pass through the firewalls. ▪ Protocols – protocols create the VPN tunnels.
  • 8. Four Critical Functions ▪ Authentication – validates that the data was sent from the sender. ▪ Access control – limiting unauthorized users from accessing the network. ▪ Confidentiality – preventing the data to be read or copied as the data is being transported. ▪ Data Integrity – ensuring that the data has not been altered
  • 9. Tunneling ▪ A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram DataArea Original Datagram Data Encapsulation Two types of end points:  Remote Access  Site-to-Site
  • 10. Tunneling ▪ MostVPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. Tunneling requires three different protocols: ▪ Passenger protocol -The original data (IPX, IP) being carried ▪ Encapsulating protocol -The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data ▪ Carrier protocol -The protocol used by the network that the information is traveling over
  • 11. Four Protocols used in VPN ▪ PPTP -- Point-to-Point Tunneling Protocol ▪ L2TP -- Layer 2 Tunneling Protocol ▪ IPsec -- Internet Protocol Security ▪ SOCKS – is not used as much as the ones above
  • 12. VPN Topology : Type of VPNs ▪ Remote Access VPN ▪ Site-to-Site VPN ▪ Intranet VPN ▪ Extranet VPN
  • 13. Remote AccessVPN ▪ Remote-access, called as virtual private dial-up network (VPDN) ▪ LAN connection used by a company that has employees who need to connect to the private network from various remote locations. ▪ Remote-access VPNs permit secure encrypted ▪ connections between a company's private network.
  • 14.
  • 15. Site-to-Site VPN ▪ Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. ▪ Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 16.
  • 17.
  • 18. VPN Security ▪ A well-designed VPN uses several methods for keeping your connection and data secure: ▪ Firewalls ▪ Encryption ▪ IPSec ▪ You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.
  • 19. VPN : Advantages ▪ Cost Savings . ▪ Extend geographic connectivity. ▪ Improve security ▪ Provide broadband networking compatibility ▪ Improve productivity ▪ Reliable
  • 20. VPN : Disadvantages ▪ VPNs require an in-depth understanding of public network security ▪ VPN require more tools.
  • 21. Applications ▪ Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider ▪ Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely ▪ Retail: able to securely transfer sales data or customer info between stores & the headquarters ▪ Banking/Financial: enables account information to be transferred safely within departments & branches ▪ General Business: communication between remote employees can be securely exchanged
  • 22. Future OfVPN ▪ VPNs are continually being enhanced. Example: Equant NV ▪ As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. ▪ Networks are expected to converge to create an integrated VPN ▪ Improved protocols are expected, which will also improve VPNs.
  • 24. References: ▪ http://vpn.shmoo.com/ ▪ http://www.uwsp.edu/it/vpn/ ▪ http://info.lib.uh.edu/services/vpn.html ▪ http://www.cites.uiuc.edu/vpn/ ▪ http://www.positivenetworks.net/images/client- uploads/jumppage2.htm All reference links have been checked so far and have been found running on 10-08-2013
  • 25. References ▪ <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt> ▪ Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>. ▪ Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>. ▪ "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>. All reference links have been checked so far and have been found running on 10-08-2013