SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1340
A SURVEY OF WORKING ON VIRTUAL PRIVATE NETWORKS
KOMALPREET KAUR1, ARSHDEEP KAUR2
1Department of Computer Science Engineering, Amritsar College of Engineering and Technology, Amritsar,
Punjab, India
2Department of Computer Science Engineering, Swami Sarvanand group of institution, Dinanagar, Punjab, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Virtual Private Network (VPN) is rapidly growing technology which plays a important role in WirelessLAN(WLAN)
by providing secure data transmission. The purpose of VPN istoprovidesafeandsecurecommunicationbycreatingvirtualtunnels
between pair of hosts, once tunnel is created data transfer can take place. This paper presentsacomprehensivestudyof VPN.VPN,
architecture and protocols used in this paper. A VPN protectstheprivatenetwork, usingencryptionandothersecurity mechanisms
to confirm that only authorized users can access the system and the data can be intercepted. ThisLiteraturereviewpaperexplains
about Virtual Private Network (VPN), its protocols and Security in VPN. In this paper we have discussed about various protocol
used in VPN.
Key Words: VPN, Architecture of VPN, Protocol in VPN
1. INTRODUCTION ABOUT VIRTUAL PRIVATE NETWORK
A virtual private network (VPN) extends a private network across a public network, and enables users to send and obtain
information across pooled or public networks as if their computing man oeuvres were directly associated to the cloistered
system. Applications running across the VPN may therefore benefit from the functionality, security, and management of the
private network. [1] VPN was not the first technology to make remote connections.Several yearsago,themostcommon wayto
connect computers between multiple offices was by using a leased line. Leased lines, such as ISDN (integrated services digital
network, 128 Kbps), are private network connections that a telecommunicationscompanycouldlease toitscustomers.Leased
lines provided a company with a way to expand its private network beyond its immediate geographic area. Theseconnections
form a single wide-area network (WAN) for the business. Though leased lines are reliableandsecure,theleasesare expensive,
with costs rising as the distance between offices increases.
Features in VPN [6]
• Provide extended connections across multiple geographic locations without using a leased line.
• Improving security mechanism of data using encryption techniques.
• Provides flexibility for remote offices and employees to use the business intranet over an existing Internet connection as if
they're directly connected to the network
• Saves time and expense for employees who commute from virtual workplaces
• VPN is preferred over leased line since leases are expensive, and as the distance between offices increases, the costofleased
line increase
. • IPSec VPN and SSL VPN are two solutions of VPN which are widely used in WLAN.Wewill discussbothofthemtogetherwith
their advantages and disadvantages.
Advantages of VPN [7]
• There are two main advantages of VPN’s, namely cost saving and scalability.
• VPN’s lower costs by eliminating the need for expensive long-distance leased lines.
• A local leased lines or even broadband connection is all that’sneededtoconnecttheinternetandutilizethe public network to
surely tunnel a private connection.
• Data transfers are encrypted
• Cost is low to implement.
Disadvantages of VPN [7]
• VPN connection is slow.
• Because the connection travels over public lines, a strong understanding of network security issues and proper precautions
before VPN deployment are necessary.
• VPN connection stability is mainly in control of the internet scalability, factors outside an organization control.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1341
• Differing VPN technology may not work together due to immature standards.
• Bad hardware and low speed connection on the user end.
1.1 History of VPN
The technology for implementing VPNs has been in existence for some time. Their origins can be found in the Virtual Circuit.
Virtualcircuits are easy to implement in highlyconnectednetworksaswellasbeingcosteffective.Wewillseethatthesebenefits
alsoapply to VPNs. The virtual circuit was originally produced in the lateseventies andearly eighties. The basicstructureofthe
virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops
between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct
connection between the two ports. In this way, two applications could communicate over a shared network. Virtual circuit
technology progressed with the addition of encryption equipment to router systems. This new equipment enciphered
information between the ports of the virtual circuit. Thismeant that attackers would not be abletoaccessinformationintransit
between the communicating entities. Later, other security technologies were added such as token authentication. The
communication lines were, unfortunately, still open toattack and thislead to the development of securecommunication overa
public network, a VPN. [1]
2. ARCHITECTURE OF VIRTUAL PRIVATE NETWORK
Before we examine the structure of VPNs, we must understand the structure of the underlying mechanisms that make them
possible. These mechanisms are Tunnels and Firewalls and Proxy Servers. The typical VPN system makes use, primarily, of
tunnels and sometimes firewalls and proxy servers. Whatwepresent hereisabriefreminderoffirewallsandproxyservers,and
an introduction to tunnels.
2.1 Tunnel
Tunneling or encapsulation is a technique of packaging one network packet inside another. The encapsulated packet is called
the tunneled packet and the outer, encapsulating, packet is called the transport packet. All the information in the packet is
encrypted at the lowest level, which is the link level of the OSI model. Like VPNs, the concept of encapsulation has been
available for many years. It has been used to bridge the portions of the Internetthathavedisjointedcapabilitiesor policies.The
tunnel acts as a router on top of the Internet protocol. The method for encapsulation is quite simple. An outer IP header is
added to the original header and between the two of these headers is the security information specific to the tunnel. Theouter
header specifies the source and destination or "endpoints" of the tunnel while the inner header identifies the original sender
and the recipient of the packet.
2.2 Remote access VPN
A remote access VPN connection is made by a remote access client. A remote access client is a single computer user who
connects to a private network from a remote location. The VPN serverprovidesaccesstothe resourcesofthe network towhich
the VPN server is connected. The packets sent across the VPN connection originate at the VPN client. The VPN client
authenticates itself to the VPN server and, for mutual authentication; the VPN server authenticates itself to the VPN client.
2.3 Site-to-site VPN
A site-to-site VPN connection connects two portions of a private network or two private networks. Forexample,thisallowsan
organization to have routed connections with separate offices, or with other organizations, over the Internet. A routed VPN
connection across the Internet logically operates as a dedicated Wide Area Network (WAN) link. [5]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1342
Figure1: VPN ARCHITECTURE
3. HOW IT WORKS
To use the Internet as a private wide area network, organizationsmayhavetoovercometwomainhurdles.First,networksoften
communicateusing a varietyof protocols, such asIPXandNetBEUI,buttheInternetcanonlyhandleIPtraffic.So,VPNsmayneed
to provide a way to pass non-IP protocols from one network to another. Second, data packets traveling the Internet are
transported in clear text. Consequently, anyonewho cansee Internet traffic can also readthedatacontainedinthepackets. This
is clearly a problem if companies want to use the Internet to pass important,confidential business information.VPNsovercome
these obstacles by usinga strategycalled tunneling.InsteadofpacketscrossingtheInternetoutintheopen,datapackets arefirst
encrypted for security, and then encapsulated in an IP package by the VPN and tunneled through the Internet. To illustrate the
concept, let's say we're running NetWare on one network, and a client on that network wants to connect to a remote NetWare
server. The primary protocolused with traditionalNetWare is IPX. So,touseagenericlayer-2VPNmodel,IPXpacketsboundfor
the remotenetwork reach a tunnel initiating device - perhapsa remoteaccess device, arouter, or even a desktop PC, in the case
of remote-client-to-server connections - whichpreparesthemfortransmissionovertheInternet.TheVPNtunnelinitiatoronthe
source network communicates with a VPN tunnel terminator on the destination network. The two agree upon an encryption
scheme, and the tunnel initiator encrypts the packet for security. Finally, the VPN initiator encapsulates the entire encrypted
package in an IP packet. Now, regardless of the type of protocol originally being transmitted, it can travel the IP-only Internet.
And, because the packet is encrypted, no one can read the original data. On the destination end, the VPN tunnel terminator
receives the packet and removes the IP information.Itthendecryptsthepacketaccordingtotheagreeduponencryptionscheme
and sends the resulting packet to the remoteaccess server or local router,whichpassesthehiddenIPXpackettothenetworkfor
delivery to the appropriate destination. [2]
4. PROTOCOL IN VPN
4.1 Peer-Peer VPN
Peer-Peer (P2P) VPN systems that allow only mutually trusted peers to participate. This can be achieved by using a central
server such as a connect hub to authenticate clients. Alternatively, users can exchange passwords or cryptographic keys with
friends to form a decentralized network. Tunneling is a network technology that enables the encapsulation of one type of
protocol packet within the datagram of a different protocol. For example, Windows VPN connections can use Point-to-Point
Tunneling Protocol (PPTP) packets to encapsulate and send privatenetworktraffic,suchasTCP/IPtrafficoverapublicnetwork
such as the Internet. [3] TheVPN server can be configuredto use either WindowsorRemoteAuthenticationDial-InUserService
as an authentication provider. If Windows is selected as the authentication provider, the user credentials sent by users
attemptingVPNconnectionsareauthenticatedusingtypicalWindowsauthenticationmechanisms,andtheconnectionattemptis
authorized using the VPN client’s user account properties and local remote access policies.
4.2 MPLS VPN
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1343
Multi-Protocol Label Switching (MPLS) VPN is a flexible method to transport and route several types of networktrafficusingan
MPLS backbone. MPLS VPNs combine the power of MPLSandtheBorderGatewayProtocol(BGP)routingprotocol.MPLSisused
to forward packets over the provider’s network backbone, and BGP is used for distributing routes over the backbone. [4] An
MPLS virtual private network (VPN) is compromised of the following equipment:
Customer Edge(CE) routers: These are placed on siteandareusuallyownedbytheenterprisecustomer.Someserviceproviders
also supply the CE equipment for a small rental fee.
Provider Edge(PE) routers:These are the provider’s edgerouters to which the CEroutersconnectto.ThePEroutersarealways
owned by the service provider.
Provider (P) routers: These routers are commonly referredtoas"transitrouters"andareintheserviceprovider’scorenetwork.
Routing information is passed from the CE router to the PE router using either static routes or a routing protocol such as BGP.
The PE router keeps a per-site forwarding table, also known as a virtual routing and forwarding table (VRF).
Centralized Decentralized
Figure 2: Peer-Peer Architecture
5. CONCLUSION
VPNs allow users or corporations to connect to remote servers, branch offices, or to other companies over a public inter-
network, while maintaining secure communications. VPNs are a flexible, low-cost, highly secure communication tool. The
development of this new technology over the next few years could well define the standard for secure communication
across the Internet. In this paper, we have a survey on Virtual Private networks. Firstly, we discussed about Virtual private
networks and its architecture, advantages, disadvantages. We have also defined how to works VPN. Thus in the end we
have reviewed various protocol in VPN.
REFERENCES
[1]. K. Karuna Jyothi*, Dr. B. Indira Reddy, “Study on Virtual Private Network (VPN), VPN’s Protocols And Security”,
International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018
IJSRCSEIT | Volume 3 | Issue 5 | ISSN : 2456-3307
[2]. Yoshinori Fujimoto, Tokyo (JP); Tomoki Ohsawa and Tokyo, ―VIRTUAL PRIVATE NETWORK, U.S, Mar. 18, 2004.
[3]. Mukherjee eta ―METHODANDAPPARATUSFORENABLINGPEER-TO-PEERVIRTUALPRIVATENETWORK(P2P-VPN)
SERVICES IN VPN-ENABLED NETWORK‖, Sep. 2, 2008.
[4]. Luca Cittadini Giuseppe Di Battista Maurizio Patrignani, L. Cittadini, G. Di Battista, M. Patrignani,, ―MPLS Virtual
Private Networks‖, Advances in Networking, (2013).
[5]. Yurcik and W. Doss, ―A planning framework for implementing VPNs‖, Volume: 3 Issue: 3, May-June 2001.
[6]. Ritika kajal, Deepshikha Saini, Kusum Grewal- International Journal of Advanced Research in Computer Science and
Software Engineering (2012) Volume 2, Issue 10, October 2012.
[7]. M.Krithikaa, 2M.Priyadharsini and 3C.Subha- Virtual Private Network – A Survey, International Journal of Trend in
Research and Development, Volume 3(1), ISSN: 2394-9333.

More Related Content

What's hot

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
Shubhayu Roy
 
VPN
VPNVPN
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Sovello Hildebrand
 
Vpn ppt
Vpn pptVpn ppt
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
SOHIL SUNDARAM
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
sonalikasingh15
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
Shreyank Gupta
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPN
Sovello Hildebrand
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
Rama Krishna Nakka
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 

What's hot (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
VPN
VPNVPN
VPN
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 

Similar to IRJET- A Survey of Working on Virtual Private Networks

IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
IRJET Journal
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
Nicole Gomez
 
Vpn
VpnVpn
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
Vpn
VpnVpn
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
Editor IJMTER
 
V P N
V P NV P N
V P N
bhathiji
 
VPN
VPN VPN
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
Rajesh Thakur
 
Vpn rsvp
Vpn rsvpVpn rsvp
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
DAVID RAUDALES
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
Rajesh Porwal
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
vpn
vpnvpn
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
Divam Goyal
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
AIRCC Publishing Corporation
 
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
ijcsit
 

Similar to IRJET- A Survey of Working on Virtual Private Networks (20)

IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vpn
VpnVpn
Vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn
VpnVpn
Vpn
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
V P N
V P NV P N
V P N
 
VPN
VPN VPN
VPN
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
vpn
vpnvpn
vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 

Recently uploaded (20)

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 

IRJET- A Survey of Working on Virtual Private Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1340 A SURVEY OF WORKING ON VIRTUAL PRIVATE NETWORKS KOMALPREET KAUR1, ARSHDEEP KAUR2 1Department of Computer Science Engineering, Amritsar College of Engineering and Technology, Amritsar, Punjab, India 2Department of Computer Science Engineering, Swami Sarvanand group of institution, Dinanagar, Punjab, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Virtual Private Network (VPN) is rapidly growing technology which plays a important role in WirelessLAN(WLAN) by providing secure data transmission. The purpose of VPN istoprovidesafeandsecurecommunicationbycreatingvirtualtunnels between pair of hosts, once tunnel is created data transfer can take place. This paper presentsacomprehensivestudyof VPN.VPN, architecture and protocols used in this paper. A VPN protectstheprivatenetwork, usingencryptionandothersecurity mechanisms to confirm that only authorized users can access the system and the data can be intercepted. ThisLiteraturereviewpaperexplains about Virtual Private Network (VPN), its protocols and Security in VPN. In this paper we have discussed about various protocol used in VPN. Key Words: VPN, Architecture of VPN, Protocol in VPN 1. INTRODUCTION ABOUT VIRTUAL PRIVATE NETWORK A virtual private network (VPN) extends a private network across a public network, and enables users to send and obtain information across pooled or public networks as if their computing man oeuvres were directly associated to the cloistered system. Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network. [1] VPN was not the first technology to make remote connections.Several yearsago,themostcommon wayto connect computers between multiple offices was by using a leased line. Leased lines, such as ISDN (integrated services digital network, 128 Kbps), are private network connections that a telecommunicationscompanycouldlease toitscustomers.Leased lines provided a company with a way to expand its private network beyond its immediate geographic area. Theseconnections form a single wide-area network (WAN) for the business. Though leased lines are reliableandsecure,theleasesare expensive, with costs rising as the distance between offices increases. Features in VPN [6] • Provide extended connections across multiple geographic locations without using a leased line. • Improving security mechanism of data using encryption techniques. • Provides flexibility for remote offices and employees to use the business intranet over an existing Internet connection as if they're directly connected to the network • Saves time and expense for employees who commute from virtual workplaces • VPN is preferred over leased line since leases are expensive, and as the distance between offices increases, the costofleased line increase . • IPSec VPN and SSL VPN are two solutions of VPN which are widely used in WLAN.Wewill discussbothofthemtogetherwith their advantages and disadvantages. Advantages of VPN [7] • There are two main advantages of VPN’s, namely cost saving and scalability. • VPN’s lower costs by eliminating the need for expensive long-distance leased lines. • A local leased lines or even broadband connection is all that’sneededtoconnecttheinternetandutilizethe public network to surely tunnel a private connection. • Data transfers are encrypted • Cost is low to implement. Disadvantages of VPN [7] • VPN connection is slow. • Because the connection travels over public lines, a strong understanding of network security issues and proper precautions before VPN deployment are necessary. • VPN connection stability is mainly in control of the internet scalability, factors outside an organization control.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1341 • Differing VPN technology may not work together due to immature standards. • Bad hardware and low speed connection on the user end. 1.1 History of VPN The technology for implementing VPNs has been in existence for some time. Their origins can be found in the Virtual Circuit. Virtualcircuits are easy to implement in highlyconnectednetworksaswellasbeingcosteffective.Wewillseethatthesebenefits alsoapply to VPNs. The virtual circuit was originally produced in the lateseventies andearly eighties. The basicstructureofthe virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. In this way, two applications could communicate over a shared network. Virtual circuit technology progressed with the addition of encryption equipment to router systems. This new equipment enciphered information between the ports of the virtual circuit. Thismeant that attackers would not be abletoaccessinformationintransit between the communicating entities. Later, other security technologies were added such as token authentication. The communication lines were, unfortunately, still open toattack and thislead to the development of securecommunication overa public network, a VPN. [1] 2. ARCHITECTURE OF VIRTUAL PRIVATE NETWORK Before we examine the structure of VPNs, we must understand the structure of the underlying mechanisms that make them possible. These mechanisms are Tunnels and Firewalls and Proxy Servers. The typical VPN system makes use, primarily, of tunnels and sometimes firewalls and proxy servers. Whatwepresent hereisabriefreminderoffirewallsandproxyservers,and an introduction to tunnels. 2.1 Tunnel Tunneling or encapsulation is a technique of packaging one network packet inside another. The encapsulated packet is called the tunneled packet and the outer, encapsulating, packet is called the transport packet. All the information in the packet is encrypted at the lowest level, which is the link level of the OSI model. Like VPNs, the concept of encapsulation has been available for many years. It has been used to bridge the portions of the Internetthathavedisjointedcapabilitiesor policies.The tunnel acts as a router on top of the Internet protocol. The method for encapsulation is quite simple. An outer IP header is added to the original header and between the two of these headers is the security information specific to the tunnel. Theouter header specifies the source and destination or "endpoints" of the tunnel while the inner header identifies the original sender and the recipient of the packet. 2.2 Remote access VPN A remote access VPN connection is made by a remote access client. A remote access client is a single computer user who connects to a private network from a remote location. The VPN serverprovidesaccesstothe resourcesofthe network towhich the VPN server is connected. The packets sent across the VPN connection originate at the VPN client. The VPN client authenticates itself to the VPN server and, for mutual authentication; the VPN server authenticates itself to the VPN client. 2.3 Site-to-site VPN A site-to-site VPN connection connects two portions of a private network or two private networks. Forexample,thisallowsan organization to have routed connections with separate offices, or with other organizations, over the Internet. A routed VPN connection across the Internet logically operates as a dedicated Wide Area Network (WAN) link. [5]
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1342 Figure1: VPN ARCHITECTURE 3. HOW IT WORKS To use the Internet as a private wide area network, organizationsmayhavetoovercometwomainhurdles.First,networksoften communicateusing a varietyof protocols, such asIPXandNetBEUI,buttheInternetcanonlyhandleIPtraffic.So,VPNsmayneed to provide a way to pass non-IP protocols from one network to another. Second, data packets traveling the Internet are transported in clear text. Consequently, anyonewho cansee Internet traffic can also readthedatacontainedinthepackets. This is clearly a problem if companies want to use the Internet to pass important,confidential business information.VPNsovercome these obstacles by usinga strategycalled tunneling.InsteadofpacketscrossingtheInternetoutintheopen,datapackets arefirst encrypted for security, and then encapsulated in an IP package by the VPN and tunneled through the Internet. To illustrate the concept, let's say we're running NetWare on one network, and a client on that network wants to connect to a remote NetWare server. The primary protocolused with traditionalNetWare is IPX. So,touseagenericlayer-2VPNmodel,IPXpacketsboundfor the remotenetwork reach a tunnel initiating device - perhapsa remoteaccess device, arouter, or even a desktop PC, in the case of remote-client-to-server connections - whichpreparesthemfortransmissionovertheInternet.TheVPNtunnelinitiatoronthe source network communicates with a VPN tunnel terminator on the destination network. The two agree upon an encryption scheme, and the tunnel initiator encrypts the packet for security. Finally, the VPN initiator encapsulates the entire encrypted package in an IP packet. Now, regardless of the type of protocol originally being transmitted, it can travel the IP-only Internet. And, because the packet is encrypted, no one can read the original data. On the destination end, the VPN tunnel terminator receives the packet and removes the IP information.Itthendecryptsthepacketaccordingtotheagreeduponencryptionscheme and sends the resulting packet to the remoteaccess server or local router,whichpassesthehiddenIPXpackettothenetworkfor delivery to the appropriate destination. [2] 4. PROTOCOL IN VPN 4.1 Peer-Peer VPN Peer-Peer (P2P) VPN systems that allow only mutually trusted peers to participate. This can be achieved by using a central server such as a connect hub to authenticate clients. Alternatively, users can exchange passwords or cryptographic keys with friends to form a decentralized network. Tunneling is a network technology that enables the encapsulation of one type of protocol packet within the datagram of a different protocol. For example, Windows VPN connections can use Point-to-Point Tunneling Protocol (PPTP) packets to encapsulate and send privatenetworktraffic,suchasTCP/IPtrafficoverapublicnetwork such as the Internet. [3] TheVPN server can be configuredto use either WindowsorRemoteAuthenticationDial-InUserService as an authentication provider. If Windows is selected as the authentication provider, the user credentials sent by users attemptingVPNconnectionsareauthenticatedusingtypicalWindowsauthenticationmechanisms,andtheconnectionattemptis authorized using the VPN client’s user account properties and local remote access policies. 4.2 MPLS VPN
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1343 Multi-Protocol Label Switching (MPLS) VPN is a flexible method to transport and route several types of networktrafficusingan MPLS backbone. MPLS VPNs combine the power of MPLSandtheBorderGatewayProtocol(BGP)routingprotocol.MPLSisused to forward packets over the provider’s network backbone, and BGP is used for distributing routes over the backbone. [4] An MPLS virtual private network (VPN) is compromised of the following equipment: Customer Edge(CE) routers: These are placed on siteandareusuallyownedbytheenterprisecustomer.Someserviceproviders also supply the CE equipment for a small rental fee. Provider Edge(PE) routers:These are the provider’s edgerouters to which the CEroutersconnectto.ThePEroutersarealways owned by the service provider. Provider (P) routers: These routers are commonly referredtoas"transitrouters"andareintheserviceprovider’scorenetwork. Routing information is passed from the CE router to the PE router using either static routes or a routing protocol such as BGP. The PE router keeps a per-site forwarding table, also known as a virtual routing and forwarding table (VRF). Centralized Decentralized Figure 2: Peer-Peer Architecture 5. CONCLUSION VPNs allow users or corporations to connect to remote servers, branch offices, or to other companies over a public inter- network, while maintaining secure communications. VPNs are a flexible, low-cost, highly secure communication tool. The development of this new technology over the next few years could well define the standard for secure communication across the Internet. In this paper, we have a survey on Virtual Private networks. Firstly, we discussed about Virtual private networks and its architecture, advantages, disadvantages. We have also defined how to works VPN. Thus in the end we have reviewed various protocol in VPN. REFERENCES [1]. K. Karuna Jyothi*, Dr. B. Indira Reddy, “Study on Virtual Private Network (VPN), VPN’s Protocols And Security”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 5 | ISSN : 2456-3307 [2]. Yoshinori Fujimoto, Tokyo (JP); Tomoki Ohsawa and Tokyo, ―VIRTUAL PRIVATE NETWORK, U.S, Mar. 18, 2004. [3]. Mukherjee eta ―METHODANDAPPARATUSFORENABLINGPEER-TO-PEERVIRTUALPRIVATENETWORK(P2P-VPN) SERVICES IN VPN-ENABLED NETWORK‖, Sep. 2, 2008. [4]. Luca Cittadini Giuseppe Di Battista Maurizio Patrignani, L. Cittadini, G. Di Battista, M. Patrignani,, ―MPLS Virtual Private Networks‖, Advances in Networking, (2013). [5]. Yurcik and W. Doss, ―A planning framework for implementing VPNs‖, Volume: 3 Issue: 3, May-June 2001. [6]. Ritika kajal, Deepshikha Saini, Kusum Grewal- International Journal of Advanced Research in Computer Science and Software Engineering (2012) Volume 2, Issue 10, October 2012. [7]. M.Krithikaa, 2M.Priyadharsini and 3C.Subha- Virtual Private Network – A Survey, International Journal of Trend in Research and Development, Volume 3(1), ISSN: 2394-9333.