SlideShare a Scribd company logo
1 of 21
VIRTUAL PRIVATE NETWORKS (VPN)
Name = Aviansh nath
B.tech – 2 year ( I T )
Traditional Connectivity
1. Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet,
instead of leased lines to communicate.
2. Became popular as more employees worked in remote
locations.
3. Terminologies to understand how VPNs work.
What is VPN?
Who uses VPN ?
 VPN’s can be found in homes, workplaces, or anywhere
else as long as an ISP (Internet Service Provider) is
available.
 VPN’s allow company employees who travel often or
who are outside their company headquarters to safely
and securely connect to their company’s Intranet
Private Networks
vs.
Virtual Private Networks
1. Employees can access the network (Intranet) from
remote locations.
2. Secured networks.
3. The Internet is used as the backbone for VPNs
4. Saves cost tremendously from reduction of equipment
and maintenance costs.
5. Scalability
Remote Access Virtual Private Network
1. Two connections – one is made to the Internet and the
second is made to the VPN.
2. Datagrams – contains data, destination and source
information.
3. Firewalls – VPNs allow authorized users to pass through
the firewalls.
4. Protocols – protocols create the VPN tunnels.
Brief Overview of How it Works
1. Authentication – validates that the data was sent
from the sender.
2. Access control – limiting unauthorized users from
accessing the network.
3. Confidentiality – preventing the data to be read or
copied as the data is being transported.
4. Data Integrity – ensuring that the data has not been
altered
Four Critical Functions
Encryption
Encryption -- is a method of “scrambling” data
before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
Tunneling
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Two types of end points:
 Remote Access
 Site-to-Site
In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there
are protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level.
What is protocol ?
The TCP/IP Internet protocols, a common example, consist of:
• Transmission Control Protocol (TCP), which uses a set of rules to
exchange messages with other Internet points at the information packet
level
• Internet Protocol (IP), which uses a set of rules to send and receive
messages at the Internet address level
• Additional protocols that include the Hypertext Transfer Protocol (HTTP)
and File Transfer Protocol (FTP), each with defined sets of rules to use with
corresponding programs elsewhere on the Internet
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones above
VPN Encapsulation of Packets
Types of Implementations
What does “implementation” mean in VPNs?
3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
Device Types
• What it means
• 3 types
• Hardware
• Firewall
• Software
Device Types: Hardware
• Usually a VPN type of router
Pros
• Highest network
throughput
• Plug and Play
• Dual-purpose
Cons
• Cost
• Lack of flexibility
Device Types: Firewall
• More security.
Pros
• “Harden” Operating System
• Tri-purpose
• Cost-effective
Cons
• Still relatively costly
Device Types: Software
• Ideal for 2 end points not in same org.
• Great when different firewalls implemented
Pros
• Flexible
• Low relative cost
Cons
• Lack of efficiency
• More labor training
required
• Lower productivity;
higher labor costs
Virtual private networks (vpn)
Virtual private networks (vpn)

More Related Content

What's hot

VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranetcalix_ricia
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 

What's hot (20)

Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
VPN
VPNVPN
VPN
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
VPN
VPNVPN
VPN
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
vpn
vpnvpn
vpn
 
Vpn
VpnVpn
Vpn
 
VPN Network
VPN NetworkVPN Network
VPN Network
 

Viewers also liked

Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13FGV-EAESP
 
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...Työterveyslaitos
 
балтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилейбалтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилейКахарман Балтабаев
 
Circuit de Música Moderna - Terrassa
Circuit de Música Moderna - TerrassaCircuit de Música Moderna - Terrassa
Circuit de Música Moderna - TerrassaMés A Prop Terrassa
 
12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, Tampere12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, TampereTyöterveyslaitos
 
Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16moronad45
 
2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?Työterveyslaitos
 
Jazz a prop 2017 - De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 -  De l'11 de febrer al 25 de març a TerrassaJazz a prop 2017 -  De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 - De l'11 de febrer al 25 de març a TerrassaMés A Prop Terrassa
 
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017Työterveyslaitos
 

Viewers also liked (11)

Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13Agenda FGV-EAESP - De 13/05/13 a 17/05/13
Agenda FGV-EAESP - De 13/05/13 a 17/05/13
 
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
14.3.2016 TyhyverkostoX -hankkeen esittely ja yhteisön työskentelyn koonti, P...
 
балтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилейбалтабаев кахарман + стоянка Xxi + владельцы автомобилей
балтабаев кахарман + стоянка Xxi + владельцы автомобилей
 
The Hegemonic Core
The Hegemonic CoreThe Hegemonic Core
The Hegemonic Core
 
Circuit de Música Moderna - Terrassa
Circuit de Música Moderna - TerrassaCircuit de Música Moderna - Terrassa
Circuit de Música Moderna - Terrassa
 
12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, Tampere12.5.2016 1.työpajan ohjeistus, Tampere
12.5.2016 1.työpajan ohjeistus, Tampere
 
Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16Presentación actividad 1 curso 15 16
Presentación actividad 1 curso 15 16
 
2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?2.2.2016 Mitä työterveyshuolto on?
2.2.2016 Mitä työterveyshuolto on?
 
Jazz a prop 2017 - De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 -  De l'11 de febrer al 25 de març a TerrassaJazz a prop 2017 -  De l'11 de febrer al 25 de març a Terrassa
Jazz a prop 2017 - De l'11 de febrer al 25 de març a Terrassa
 
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
Epoksit ja muut kertamuovit, Katri Suuronen 13.1.2017
 
Programação da Semana Santa de 2016
Programação da Semana Santa de 2016Programação da Semana Santa de 2016
Programação da Semana Santa de 2016
 

Similar to Virtual private networks (vpn)

Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of NetworkingNetwax Lab
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPoojaWalia6
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Network resources
Network resourcesNetwork resources
Network resourcesRohit Kumar
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 

Similar to Virtual private networks (vpn) (20)

Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
Vpn
VpnVpn
Vpn
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
Vpn
VpnVpn
Vpn
 
Mcse question
Mcse questionMcse question
Mcse question
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
F0322038042
F0322038042F0322038042
F0322038042
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Network resources
Network resourcesNetwork resources
Network resources
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Network Notes
Network Notes Network Notes
Network Notes
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 

Recently uploaded

8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Virtual private networks (vpn)

  • 1. VIRTUAL PRIVATE NETWORKS (VPN) Name = Aviansh nath B.tech – 2 year ( I T )
  • 3. 1. Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. 2. Became popular as more employees worked in remote locations. 3. Terminologies to understand how VPNs work. What is VPN?
  • 4. Who uses VPN ?  VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available.  VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet
  • 5. Private Networks vs. Virtual Private Networks 1. Employees can access the network (Intranet) from remote locations. 2. Secured networks. 3. The Internet is used as the backbone for VPNs 4. Saves cost tremendously from reduction of equipment and maintenance costs. 5. Scalability
  • 6. Remote Access Virtual Private Network
  • 7. 1. Two connections – one is made to the Internet and the second is made to the VPN. 2. Datagrams – contains data, destination and source information. 3. Firewalls – VPNs allow authorized users to pass through the firewalls. 4. Protocols – protocols create the VPN tunnels. Brief Overview of How it Works
  • 8. 1. Authentication – validates that the data was sent from the sender. 2. Access control – limiting unauthorized users from accessing the network. 3. Confidentiality – preventing the data to be read or copied as the data is being transported. 4. Data Integrity – ensuring that the data has not been altered Four Critical Functions
  • 9. Encryption Encryption -- is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature – for authentication
  • 10. Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Two types of end points:  Remote Access  Site-to-Site
  • 11.
  • 12. In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. What is protocol ? The TCP/IP Internet protocols, a common example, consist of: • Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level • Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level • Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet
  • 13. Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above
  • 15. Types of Implementations What does “implementation” mean in VPNs? 3 types Intranet – Within an organization Extranet – Outside an organization Remote Access – Employee to Business
  • 16. Device Types • What it means • 3 types • Hardware • Firewall • Software
  • 17. Device Types: Hardware • Usually a VPN type of router Pros • Highest network throughput • Plug and Play • Dual-purpose Cons • Cost • Lack of flexibility
  • 18. Device Types: Firewall • More security. Pros • “Harden” Operating System • Tri-purpose • Cost-effective Cons • Still relatively costly
  • 19. Device Types: Software • Ideal for 2 end points not in same org. • Great when different firewalls implemented Pros • Flexible • Low relative cost Cons • Lack of efficiency • More labor training required • Lower productivity; higher labor costs