SlideShare a Scribd company logo
1 of 8
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering and
Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 77
e-ISSN: 2349-9745
p-ISSN: 2393-8161
MANAGING ORGANISATION USING VPN's :
A SURVEY
Aakanksha Pandey1
, Saumyata Singh2
, Smriti Jaiswal3
1
Assistant Professor, Dept. of CSE, CEC Bilaspur (C.G.)
2
BE Scholar, Dept. of CSE, CEC Bilaspur (C.G)
3
BE Scholar, Dept. of CSE ,CEC Bilaspur (C.G)
Abstract—The basic concept of a VPN is to connect networks in separate offices in such a way that
makes them appear as a single network.The investigation of using peer-to-peer communication
began due to the low performance of traditional, client-server based model. The bandwidth and
latency of the communication between the connected clients , was improved by virtual private
networks (VPN's). Thus a new peer-to-peer connection based VPN protocol was developed. It uses
both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication to
transfer Ethernet frames between the connected clients across IPv4 and IPv6 networks, and it makes
direct communication for the clients possible. [1]
Keywords—TCP ,UDP ,LAN.
I. INTRODUCTION
The spread of VPN connections instead of direct dial-up or leased line connections is because of the
now-a-days the high speed Internet connections became inexpensive and reliable and make corporate
networks accessible for the employees anywhere using a single Internet connection by connecting
offices in different parts of the world. They also help reserving the remaining IPv4 address space by
making computers accessible without public IP addresses; they are still not practical for real-time,
delay or speed sensitive applications. Like online games, video streaming, and file sharing services
are just a few of the numerous protocols that through current point-to-point virtual private network
protocols are not accessible; however, recently many applications of peer-to-peer technologies
proved to be efficient, fast and reliable. It is possible to create faster VPN networks by combining
peer-to-peer technologies with VPNs.
In a packet switching (packet-based) network, includes network resources made up of networked
elements and customer premises equipment that are interconnected by one or more physical paths, a
Virtual Private Network (VPN) is built above this underlying packet-based network and the selected
portions of the packet-based network resources are included within it.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 78
Fig. 1. Basic Architecture of VPN
Peer-to-Peer Communication
A peer-to-peer (P2P) network have equally privileged participants. The servers and clients are not
clearly differentiated in the communication. They both provide and consume resources similarly.
There are several uses of this type of network as Voice over IP, file sharing etc.
Two types of end points:
1. Remote Access
2. Site-to-Site
Remote Access
The connections between mobile or remote users and their corporate networks are encrypted and
user in remote areas can easily make a local call to an ISP. VPN is ideal for a telecommuter or
mobile sales people as it allows them to take advantage of broadband connectivity that is. DSL,
Cable
Fig. 2.Remote Access VPN
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 79
Site-to-Site VPNs
Site-to-Site VPNs are fixed sites such as remote offices and central offices. Network traffic is sent
over their branchoffices and Internet connection .The company hardware and management expenses
are saved upto some extent by this.
Fig. 3.Site-to-Site VPN
II. LITERATURE REVIEW
Computer networking has grown explosively. Since the 1970s, computer communication has
changed from an esoteric research topic to an essential part of the infrastructure. The use of
Networking is in every aspect of business, that includes advertising, production, shipping, planning,
billing ,and accounting. Consequently, most corporations have multiple networks. Schools, at all
grade levels are using computer networks from elementary through post-graduate, to provide
students and teachers an instantaneous access to the online information. From Federal, state, and
local government offices use networks, so as do military organizations. In short, computer networks
are everywhere. [2]
By Modern computer networks data is handled in form of small data blocks that are called packets.
The name of this method is packet switching. The data is moved towards its destination through
different networks by using the address provided to it after encapsulating it in a packet. This method
of Packet switching can be connection less and connection-oriented.
IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to identify
devices on a network through an addressing system. The Internet Protocol is designed for use in
interconnected systems of packet-switched computer communication networks. IPv4 is the most
widely deployed Internet protocol used to connect devices to the Internet. IPv4 uses a 32-bit address
scheme allowing for a total of 2^32 addresses (just over 4 billion addresses). With the growth of the
Internet every device including computers, smartphones and game consoles that connects to the
Internet requires an address hence it is expected that the number of unused IPv4 addresses will
eventually run out. [3]
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 80
The successor of IPv4 is IPv6, which is incompatible with the IPv4. IPv6 has a larger, 128b address
space, and numerous new features compared to IPv4 (“RFC 2460”, 1998). It drops the support for
fragmentation. If a packet is simply dropped by the routers if it is too big to be transmitted through a
network segment. It simplifies the routing process. IPv6 is also more secure, and provides better
support for multicasting.
TCP is a connection oriented stream over an IP network. It guarantees transmission of all the
packets to the destination in the correct order. This uses acknowledgement packets that are sent back
to the sender, and automatic retransmission, which causes additional delays and a general less
efficient transmission than UDP but TCP guarantees reliable transmission.
UDP is a connection-less protocol and communication through this is datagram oriented. The
integrity is guaranteed only on the single datagram. Datagrams reaches to their destination and can
arrive out of order or don't arrive at all. Since it uses non ACK IT is more efficient than TCP. Hence
it does not guarantees a reliable transmission. It's generally used for real time communication, where
quick transmission is required rather than reliable. [4]
Virtual Private Networks
The aim of a virtual private network is to provide a computer network that uses an existing computer
network infrastructure and provides a secure access to a network. There are many different uses of
VPNs;
Fig.4. A typical VPN topology
A typical VPN topology is mentioned in which both of the clients are connected to the Internet, but
all the VPN traffic is going through a single server. [1]
To satisfy the need for a less expensive way to interconnect corporate networks than leased or owned
lines virtual private networks were created. This is because the original purpose of the VPN
development was to replace leased or owned lines. Typically a point-to-point topology is used in
VPN’s; currently individual computers are also connected using VPN’s.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 81
There are various VPN Tunnelling Protocols that enables the encapsulation of a packet from one
type of protocol into the datagram of a different type of protocol. Some of them are as follows:
1. PPTP VPN
This is the most common and widely used VPN protocol. By using the existing Internet connection
this protocol enables the authorized remote users to connect to the VPN network and then log on to
the VPN with the help of a password.
2. SITE-TO-SITE VPN
It allows different sites of the same organization to connect together to form a VPN with its own
real network.
3. L2TP VPN
It provides data confidentiality and also data integrity. [5]
All the three protocol mentioned above depend heavily on the features originally specified for Point-
to-Point Protocol (PPP) which was originally designed to send data across dial-up or dedicated point-
to-point connections. PPP encapsulates IP packets within PPP frames and then those encapsulated
PPP-packets are transmitted across a point-to-point link.
A frequently used protocol for VPNs is PPTP (Point-to-Point Tunneling Protocol), which
encapsulates PPP (Point-to-Point Protocol) connections (“RFC 2637”, 1999). For connecting a client
to a VPN, at first we have to make PPTP connection and then this connection is used for creating the
actual network connection by tunneling PPP through the PPTP connection. This protocol was simple
to implement as PPP was already supported by most operating systems and devices. The PPTP is
compatible with existing software and devices as any PPP traffic can be transferred transparently
through a PPTP tunnel.
PPTP can be used with a variety of Microsoft clients such as Microsoft Windows 2000, Windows
XP, Windows Vista, and Windows Server 2008. There is no use of a public key infrastructure (PKI)
in PPTP. By using encryption, PPTP-based VPN connections provide data confidentiality (captured
packets cannot be interpreted without the encryption key). PPTP-based VPN connections, however,
do not provide data integrity (proof that the data was not modified in transit) or data origin
authentication (proof that the data was sent by the authorized user). [6]
PPTP has been the subject of many security analyses and serious security vulnerabilities have been
found in the protocol. The known vulnerabilities relate to the underlying PPP authentication
protocols used, the design of the MPPE protocol as well as the integration between MPPE and PPP
authentication for session key establishment.[1]
III. CONCLUSION
At present the “Virtual Private Network (VPN)” has emerged as one of the leading technologies and
many organizations looking to expand their networking capabilities and reducing their costs are
attracting towards this technology. This project deals with the upcoming technology, VPN - Virtual
Private Network and it has been proved that VPN provides reliable transferring of data between
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 82
remote places via a secured network hence it is paving the way for Data Security. The connection
between the user (client) & the server of the organization not within the workplace itself but from
home too is provided along with the data being transferred & received in a highly secured way with
the help of creating VPN. The two parties exchanging information are really who they claim to be is
guaranteed by Digital certificates that are used in Network Security. With the help of this certificate
authority keeps a complete list of all the certificates issued by it along with the information on their
status: valid, expired, or revoked.
REFERENCES
[1]. Daniel Kasza,”Virtual Private Network Using Peer-to-Peer Techniques”.
[2]. Douglas E. Comer, “ Introduction and Overview ”, Computer Networks and Internets, Fifth Edition, Pearson
Education, Upper Saddle River, New Jersey.2009
[3]. Traditional IP Network Address Translator (RFC 3022). (2001). Retrieved November 15, 2010,
from http://datatracker.ietf.org/doc/rfc3022/
[4] . Managing Cisco networking security, Michael J. Wenstrom, Cisco Press, Indianapolis, IN 46290 USA
[5]. “www.techpp.com/Different types of protocals”Retrieved on 2 november 2014
[6]. P. Ruth, J. Rhee, D. Xu, R. Kennell, and S. Goasguen. Autonomic live adaptation of virtual computational
environments in a multi-domain infrastruc-ture. In ICAC ’06: Proceedings of the 2006 IEEE International Conference on
Autonomic Computing, Washington, DC, USA, 2006.
[7]. "Microsoft says don't use PPTP and MS-CHAP"
[8]. P. Ruth, J. Rhee, D. Xu, R. Kennell, and S. Goasguen. Autonomic live adaptation of virtual computational
environments in a multi-domain infrastruc-ture. In ICAC ’06: Proceedings of the 2006 IEEE International Conference on
Autonomic Computing, Washington, DC, USA, 2006.
[9]. Basics of VPN ,Retrieved on 2 November 2014, “www.topnettricks.com”
[10].How VPN works, Retrieved on 30 october 2014 , “www.howtogeek.com”.
[11]. A primer for Implementing a Cisco Virtual Private Network. (1999). Cisco System. Retrieved October28,2002
http://www.cisco.com/warp/public/cc/so/neso/vpn/vpne/vpn21_rg.htm.
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY

More Related Content

What's hot

Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private NetworkShubhayu Roy
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksSneha Vurrakula
 
VPN presentation
VPN presentationVPN presentation
VPN presentationRiazehri
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...BDDazza
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 

What's hot (20)

Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
VPN
VPNVPN
VPN
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Vpn
VpnVpn
Vpn
 
Vpn
Vpn Vpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless Networks
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 

Viewers also liked

Renaissance Movement
Renaissance MovementRenaissance Movement
Renaissance MovementMansa Daby
 
Discipline Models
Discipline ModelsDiscipline Models
Discipline Modelsjkitt5
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
Construction sector facts
Construction sector factsConstruction sector facts
Construction sector factsUmakant Tiwari
 
JofApplPhys_Iwanaga-Marciniak 2007
JofApplPhys_Iwanaga-Marciniak 2007JofApplPhys_Iwanaga-Marciniak 2007
JofApplPhys_Iwanaga-Marciniak 2007Monika Marciniak
 
Sports quiz- by Pulkit Rohilla
Sports quiz- by Pulkit RohillaSports quiz- by Pulkit Rohilla
Sports quiz- by Pulkit RohillaPulkit Rohilla
 
Class dojo parent and student invites for math
Class dojo parent and student invites for mathClass dojo parent and student invites for math
Class dojo parent and student invites for mathanayely26
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
Autobiography through my wardrobe
Autobiography through my wardrobeAutobiography through my wardrobe
Autobiography through my wardrobesimranherani
 
Super copa gaúcha artilharia
Super copa gaúcha   artilhariaSuper copa gaúcha   artilharia
Super copa gaúcha artilhariaRafael Passos
 
Mecanicavectorialparaingenieros9es 140220102429-phpapp01
Mecanicavectorialparaingenieros9es 140220102429-phpapp01Mecanicavectorialparaingenieros9es 140220102429-phpapp01
Mecanicavectorialparaingenieros9es 140220102429-phpapp01Dulce Ramirez
 

Viewers also liked (19)

DEF meets KAS BANK
DEF  meets KAS BANKDEF  meets KAS BANK
DEF meets KAS BANK
 
Nepse Technical Analysis September 6 - September 10, 2015
Nepse Technical Analysis September 6 - September 10, 2015Nepse Technical Analysis September 6 - September 10, 2015
Nepse Technical Analysis September 6 - September 10, 2015
 
Renaissance Movement
Renaissance MovementRenaissance Movement
Renaissance Movement
 
Discipline Models
Discipline ModelsDiscipline Models
Discipline Models
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
EM Newsletter EN Oct 2013
EM Newsletter EN Oct 2013EM Newsletter EN Oct 2013
EM Newsletter EN Oct 2013
 
cv (1)
cv (1)cv (1)
cv (1)
 
Construction sector facts
Construction sector factsConstruction sector facts
Construction sector facts
 
JofApplPhys_Iwanaga-Marciniak 2007
JofApplPhys_Iwanaga-Marciniak 2007JofApplPhys_Iwanaga-Marciniak 2007
JofApplPhys_Iwanaga-Marciniak 2007
 
Sports quiz- by Pulkit Rohilla
Sports quiz- by Pulkit RohillaSports quiz- by Pulkit Rohilla
Sports quiz- by Pulkit Rohilla
 
Class dojo parent and student invites for math
Class dojo parent and student invites for mathClass dojo parent and student invites for math
Class dojo parent and student invites for math
 
Ajk pengawas
Ajk pengawasAjk pengawas
Ajk pengawas
 
Fabric protect
Fabric protectFabric protect
Fabric protect
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
Autobiography through my wardrobe
Autobiography through my wardrobeAutobiography through my wardrobe
Autobiography through my wardrobe
 
Super copa gaúcha artilharia
Super copa gaúcha   artilhariaSuper copa gaúcha   artilharia
Super copa gaúcha artilharia
 
U pog ppb
U pog ppbU pog ppb
U pog ppb
 
Mecanicavectorialparaingenieros9es 140220102429-phpapp01
Mecanicavectorialparaingenieros9es 140220102429-phpapp01Mecanicavectorialparaingenieros9es 140220102429-phpapp01
Mecanicavectorialparaingenieros9es 140220102429-phpapp01
 

Similar to MANAGING ORGANISATION USING VPN's : A SURVEY

IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET Journal
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkIRJET Journal
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...IJNSA Journal
 

Similar to MANAGING ORGANISATION USING VPN's : A SURVEY (20)

IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Vpn
VpnVpn
Vpn
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
my project publication
my project publicationmy project publication
my project publication
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
 
F0322038042
F0322038042F0322038042
F0322038042
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
V P N
V P NV P N
V P N
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private Network
 
VPN
VPN VPN
VPN
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 

Recently uploaded (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 

MANAGING ORGANISATION USING VPN's : A SURVEY

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 77 e-ISSN: 2349-9745 p-ISSN: 2393-8161 MANAGING ORGANISATION USING VPN's : A SURVEY Aakanksha Pandey1 , Saumyata Singh2 , Smriti Jaiswal3 1 Assistant Professor, Dept. of CSE, CEC Bilaspur (C.G.) 2 BE Scholar, Dept. of CSE, CEC Bilaspur (C.G) 3 BE Scholar, Dept. of CSE ,CEC Bilaspur (C.G) Abstract—The basic concept of a VPN is to connect networks in separate offices in such a way that makes them appear as a single network.The investigation of using peer-to-peer communication began due to the low performance of traditional, client-server based model. The bandwidth and latency of the communication between the connected clients , was improved by virtual private networks (VPN's). Thus a new peer-to-peer connection based VPN protocol was developed. It uses both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication to transfer Ethernet frames between the connected clients across IPv4 and IPv6 networks, and it makes direct communication for the clients possible. [1] Keywords—TCP ,UDP ,LAN. I. INTRODUCTION The spread of VPN connections instead of direct dial-up or leased line connections is because of the now-a-days the high speed Internet connections became inexpensive and reliable and make corporate networks accessible for the employees anywhere using a single Internet connection by connecting offices in different parts of the world. They also help reserving the remaining IPv4 address space by making computers accessible without public IP addresses; they are still not practical for real-time, delay or speed sensitive applications. Like online games, video streaming, and file sharing services are just a few of the numerous protocols that through current point-to-point virtual private network protocols are not accessible; however, recently many applications of peer-to-peer technologies proved to be efficient, fast and reliable. It is possible to create faster VPN networks by combining peer-to-peer technologies with VPNs. In a packet switching (packet-based) network, includes network resources made up of networked elements and customer premises equipment that are interconnected by one or more physical paths, a Virtual Private Network (VPN) is built above this underlying packet-based network and the selected portions of the packet-based network resources are included within it.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 78 Fig. 1. Basic Architecture of VPN Peer-to-Peer Communication A peer-to-peer (P2P) network have equally privileged participants. The servers and clients are not clearly differentiated in the communication. They both provide and consume resources similarly. There are several uses of this type of network as Voice over IP, file sharing etc. Two types of end points: 1. Remote Access 2. Site-to-Site Remote Access The connections between mobile or remote users and their corporate networks are encrypted and user in remote areas can easily make a local call to an ISP. VPN is ideal for a telecommuter or mobile sales people as it allows them to take advantage of broadband connectivity that is. DSL, Cable Fig. 2.Remote Access VPN
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 79 Site-to-Site VPNs Site-to-Site VPNs are fixed sites such as remote offices and central offices. Network traffic is sent over their branchoffices and Internet connection .The company hardware and management expenses are saved upto some extent by this. Fig. 3.Site-to-Site VPN II. LITERATURE REVIEW Computer networking has grown explosively. Since the 1970s, computer communication has changed from an esoteric research topic to an essential part of the infrastructure. The use of Networking is in every aspect of business, that includes advertising, production, shipping, planning, billing ,and accounting. Consequently, most corporations have multiple networks. Schools, at all grade levels are using computer networks from elementary through post-graduate, to provide students and teachers an instantaneous access to the online information. From Federal, state, and local government offices use networks, so as do military organizations. In short, computer networks are everywhere. [2] By Modern computer networks data is handled in form of small data blocks that are called packets. The name of this method is packet switching. The data is moved towards its destination through different networks by using the address provided to it after encapsulating it in a packet. This method of Packet switching can be connection less and connection-oriented. IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks. IPv4 is the most widely deployed Internet protocol used to connect devices to the Internet. IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion addresses). With the growth of the Internet every device including computers, smartphones and game consoles that connects to the Internet requires an address hence it is expected that the number of unused IPv4 addresses will eventually run out. [3]
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 80 The successor of IPv4 is IPv6, which is incompatible with the IPv4. IPv6 has a larger, 128b address space, and numerous new features compared to IPv4 (“RFC 2460”, 1998). It drops the support for fragmentation. If a packet is simply dropped by the routers if it is too big to be transmitted through a network segment. It simplifies the routing process. IPv6 is also more secure, and provides better support for multicasting. TCP is a connection oriented stream over an IP network. It guarantees transmission of all the packets to the destination in the correct order. This uses acknowledgement packets that are sent back to the sender, and automatic retransmission, which causes additional delays and a general less efficient transmission than UDP but TCP guarantees reliable transmission. UDP is a connection-less protocol and communication through this is datagram oriented. The integrity is guaranteed only on the single datagram. Datagrams reaches to their destination and can arrive out of order or don't arrive at all. Since it uses non ACK IT is more efficient than TCP. Hence it does not guarantees a reliable transmission. It's generally used for real time communication, where quick transmission is required rather than reliable. [4] Virtual Private Networks The aim of a virtual private network is to provide a computer network that uses an existing computer network infrastructure and provides a secure access to a network. There are many different uses of VPNs; Fig.4. A typical VPN topology A typical VPN topology is mentioned in which both of the clients are connected to the Internet, but all the VPN traffic is going through a single server. [1] To satisfy the need for a less expensive way to interconnect corporate networks than leased or owned lines virtual private networks were created. This is because the original purpose of the VPN development was to replace leased or owned lines. Typically a point-to-point topology is used in VPN’s; currently individual computers are also connected using VPN’s.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 81 There are various VPN Tunnelling Protocols that enables the encapsulation of a packet from one type of protocol into the datagram of a different type of protocol. Some of them are as follows: 1. PPTP VPN This is the most common and widely used VPN protocol. By using the existing Internet connection this protocol enables the authorized remote users to connect to the VPN network and then log on to the VPN with the help of a password. 2. SITE-TO-SITE VPN It allows different sites of the same organization to connect together to form a VPN with its own real network. 3. L2TP VPN It provides data confidentiality and also data integrity. [5] All the three protocol mentioned above depend heavily on the features originally specified for Point- to-Point Protocol (PPP) which was originally designed to send data across dial-up or dedicated point- to-point connections. PPP encapsulates IP packets within PPP frames and then those encapsulated PPP-packets are transmitted across a point-to-point link. A frequently used protocol for VPNs is PPTP (Point-to-Point Tunneling Protocol), which encapsulates PPP (Point-to-Point Protocol) connections (“RFC 2637”, 1999). For connecting a client to a VPN, at first we have to make PPTP connection and then this connection is used for creating the actual network connection by tunneling PPP through the PPTP connection. This protocol was simple to implement as PPP was already supported by most operating systems and devices. The PPTP is compatible with existing software and devices as any PPP traffic can be transferred transparently through a PPTP tunnel. PPTP can be used with a variety of Microsoft clients such as Microsoft Windows 2000, Windows XP, Windows Vista, and Windows Server 2008. There is no use of a public key infrastructure (PKI) in PPTP. By using encryption, PPTP-based VPN connections provide data confidentiality (captured packets cannot be interpreted without the encryption key). PPTP-based VPN connections, however, do not provide data integrity (proof that the data was not modified in transit) or data origin authentication (proof that the data was sent by the authorized user). [6] PPTP has been the subject of many security analyses and serious security vulnerabilities have been found in the protocol. The known vulnerabilities relate to the underlying PPP authentication protocols used, the design of the MPPE protocol as well as the integration between MPPE and PPP authentication for session key establishment.[1] III. CONCLUSION At present the “Virtual Private Network (VPN)” has emerged as one of the leading technologies and many organizations looking to expand their networking capabilities and reducing their costs are attracting towards this technology. This project deals with the upcoming technology, VPN - Virtual Private Network and it has been proved that VPN provides reliable transferring of data between
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 82 remote places via a secured network hence it is paving the way for Data Security. The connection between the user (client) & the server of the organization not within the workplace itself but from home too is provided along with the data being transferred & received in a highly secured way with the help of creating VPN. The two parties exchanging information are really who they claim to be is guaranteed by Digital certificates that are used in Network Security. With the help of this certificate authority keeps a complete list of all the certificates issued by it along with the information on their status: valid, expired, or revoked. REFERENCES [1]. Daniel Kasza,”Virtual Private Network Using Peer-to-Peer Techniques”. [2]. Douglas E. Comer, “ Introduction and Overview ”, Computer Networks and Internets, Fifth Edition, Pearson Education, Upper Saddle River, New Jersey.2009 [3]. Traditional IP Network Address Translator (RFC 3022). (2001). Retrieved November 15, 2010, from http://datatracker.ietf.org/doc/rfc3022/ [4] . Managing Cisco networking security, Michael J. Wenstrom, Cisco Press, Indianapolis, IN 46290 USA [5]. “www.techpp.com/Different types of protocals”Retrieved on 2 november 2014 [6]. P. Ruth, J. Rhee, D. Xu, R. Kennell, and S. Goasguen. Autonomic live adaptation of virtual computational environments in a multi-domain infrastruc-ture. In ICAC ’06: Proceedings of the 2006 IEEE International Conference on Autonomic Computing, Washington, DC, USA, 2006. [7]. "Microsoft says don't use PPTP and MS-CHAP" [8]. P. Ruth, J. Rhee, D. Xu, R. Kennell, and S. Goasguen. Autonomic live adaptation of virtual computational environments in a multi-domain infrastruc-ture. In ICAC ’06: Proceedings of the 2006 IEEE International Conference on Autonomic Computing, Washington, DC, USA, 2006. [9]. Basics of VPN ,Retrieved on 2 November 2014, “www.topnettricks.com” [10].How VPN works, Retrieved on 30 october 2014 , “www.howtogeek.com”. [11]. A primer for Implementing a Cisco Virtual Private Network. (1999). Cisco System. Retrieved October28,2002 http://www.cisco.com/warp/public/cc/so/neso/vpn/vpne/vpn21_rg.htm.