SlideShare a Scribd company logo
1 of 27
presentation on
VIRTUAL PRIVATE NETWORKS (VPN)
Name = Aviansh nath
B.tech – 2 year ( I T )
Roll no. 1429013009
Submitted to:
MS ARCHANA SHARMA
(ASTT.PROF;CSE/IT)
ORIGION OF INTERNET
IN 1960 INTERNERT (ARPANET + MILINET)
Router’s concept
Traditional Connectivity
1. Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet,
instead of leased lines to communicate.
2. Became popular as more employees worked in remote
locations.
3. Terminologies to understand how VPNs work.
What is VPN?
Who uses VPN ?
 VPN’s can be found in homes, workplaces, or anywhere
else as long as an ISP (Internet Service Provider) is
available.
 VPN’s allow company employees who travel often or
who are outside their company headquarters to safely
and securely connect to their company’s Intranet
Private Networks
vs.
Virtual Private Networks
1. Employees can access the network (Intranet) from
remote locations.
2. Secured networks.
3. The Internet is used as the backbone for VPNs
4. Saves cost tremendously from reduction of equipment
and maintenance costs.
5. Scalability
Remote Access Virtual Private Network
1. Two connections – one is made to the Internet and the
second is made to the VPN.
2. Datagrams – contains data, destination and source
information.
3. Firewalls – VPNs allow authorized users to pass through
the firewalls.
4. Protocols – protocols create the VPN tunnels.
Brief Overview of How it Works
1. Authentication – validates that the data was sent
from the sender.
2. Access control – limiting unauthorized users from
accessing the network.
3. Confidentiality – preventing the data to be read or
copied as the data is being transported.
4. Data Integrity – ensuring that the data has not been
altered
Four Critical Functions
Encryption
Encryption -- is a method of “scrambling” data
before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
Tunneling
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Two types of end points:
 Remote Access
 Site-to-Site
In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there
are protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level.
What is protocol ?
The TCP/IP Internet protocols, a common example, consist of:
• Transmission Control Protocol (TCP), which uses a set of rules to
exchange messages with other Internet points at the information packet
level
• Internet Protocol (IP), which uses a set of rules to send and receive
messages at the Internet address level
• Additional protocols that include the Hypertext Transfer Protocol (HTTP)
and File Transfer Protocol (FTP), each with defined sets of rules to use with
corresponding programs elsewhere on the Internet
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones above
VPN Encapsulation of Packets
Types of Implementations
What does “implementation” mean in VPNs?
3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
Device Types
• What it means ?
• 3 types
• Hardware
• Firewall
• Software
Device Types: Hardware
• Usually a VPN type of router
Pros
• Highest network
throughput
• Plug and Play
• Dual-purpose
Cons
• Cost
• Lack of flexibility
Device Types: Firewall
• More security.
Pros
• “Harden” Operating System
• Tri-purpose
• Cost-effective
Cons
• Still relatively costly
Device Types: Software
• Ideal for 2 end points not in same org.
• Great when different firewalls implemented
Pros
• Flexible
• Low relative cost
Cons
• Lack of efficiency
• More labor training
required
• Lower productivity;
higher labor costs
Applications: Site-to-Site VPNs
Large-scale encryption between multiple fixed sites
such as remote offices and central offices
Network traffic is sent over the branch office Internet
connection
This saves the company hardware and management
expenses
Applications: Remote Access
• Encrypted connections between mobile or remote users
and their corporate networks
• Remote user can make a local call to an ISP, as opposed
to a long distance call to the corporate remote access
server.
• Ideal for a telecommuter or mobile sales people.
• VPN allows mobile workers & telecommuters to take
advantage of broadband connectivity.
i.e. DSL, Cable
Industries That Use a VPN
Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care provider
Manufacturing: allow suppliers to view inventory & allow clients to
purchase online safely
Retail: able to securely transfer sales data or customer info
between stores & the headquarters
Banking/Financial: enables account information to be transferred
safely within departments & branches
General Business: communication between remote employees can
be securely exchanged
Thank you

More Related Content

What's hot (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
VPN
VPNVPN
VPN
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Vpn
VpnVpn
Vpn
 
Firewall
FirewallFirewall
Firewall
 
VPN
VPNVPN
VPN
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Vpn
VpnVpn
Vpn
 

Viewers also liked

OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVNAIM Networks, Inc.
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationMark Morley, MBA
 
云网锦绣 SDN实战研讨会
云网锦绣 SDN实战研讨会云网锦绣 SDN实战研讨会
云网锦绣 SDN实战研讨会Hardway Hou
 
Insights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businessesInsights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businessesAlcatel-Lucent Enterprise
 
Building compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSBuilding compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSAmazon Web Services
 
Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -Naoto MATSUMOTO
 
Communication Service Providers (CSP) and the Telecom API Ecosystem
 Communication Service Providers (CSP) and the Telecom API Ecosystem Communication Service Providers (CSP) and the Telecom API Ecosystem
Communication Service Providers (CSP) and the Telecom API EcosystemAlan Quayle
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseToshal Dudhwala
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad IrzanIndonesia Network Operators Group
 
3 g networks technologies, services & benefits
3 g networks   technologies, services & benefits3 g networks   technologies, services & benefits
3 g networks technologies, services & benefitsMuhammad Rauf Akram
 
Your Network - Now Pay-Per-Use with Network on Demand Services
Your Network - Now Pay-Per-Use with Network on Demand ServicesYour Network - Now Pay-Per-Use with Network on Demand Services
Your Network - Now Pay-Per-Use with Network on Demand ServicesAlcatel-Lucent Enterprise
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANToshal Dudhwala
 
8 steps for excellent B2B CX (customer experience)
8 steps for excellent B2B CX (customer experience)8 steps for excellent B2B CX (customer experience)
8 steps for excellent B2B CX (customer experience)B2B Marketing
 

Viewers also liked (20)

Vpn
VpnVpn
Vpn
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B Integration
 
云网锦绣 SDN实战研讨会
云网锦绣 SDN实战研讨会云网锦绣 SDN实战研讨会
云网锦绣 SDN实战研讨会
 
vSRX
vSRXvSRX
vSRX
 
HW-204515
HW-204515HW-204515
HW-204515
 
Cloud B2B
 Cloud B2B Cloud B2B
Cloud B2B
 
NOD
NODNOD
NOD
 
Insights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businessesInsights in overcoming IT infrastructure challenges for small-medium businesses
Insights in overcoming IT infrastructure challenges for small-medium businesses
 
Building compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSBuilding compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWS
 
Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -
 
Communication Service Providers (CSP) and the Telecom API Ecosystem
 Communication Service Providers (CSP) and the Telecom API Ecosystem Communication Service Providers (CSP) and the Telecom API Ecosystem
Communication Service Providers (CSP) and the Telecom API Ecosystem
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
3 g networks technologies, services & benefits
3 g networks   technologies, services & benefits3 g networks   technologies, services & benefits
3 g networks technologies, services & benefits
 
Your Network - Now Pay-Per-Use with Network on Demand Services
Your Network - Now Pay-Per-Use with Network on Demand ServicesYour Network - Now Pay-Per-Use with Network on Demand Services
Your Network - Now Pay-Per-Use with Network on Demand Services
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
8 steps for excellent B2B CX (customer experience)
8 steps for excellent B2B CX (customer experience)8 steps for excellent B2B CX (customer experience)
8 steps for excellent B2B CX (customer experience)
 

Similar to Virtual private networks (vpn)

Similar to Virtual private networks (vpn) (20)

Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
vpn
vpnvpn
vpn
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Virtual private networks (vpn)

  • 1. presentation on VIRTUAL PRIVATE NETWORKS (VPN) Name = Aviansh nath B.tech – 2 year ( I T ) Roll no. 1429013009 Submitted to: MS ARCHANA SHARMA (ASTT.PROF;CSE/IT)
  • 2. ORIGION OF INTERNET IN 1960 INTERNERT (ARPANET + MILINET)
  • 5. 1. Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. 2. Became popular as more employees worked in remote locations. 3. Terminologies to understand how VPNs work. What is VPN?
  • 6. Who uses VPN ?  VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available.  VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet
  • 7. Private Networks vs. Virtual Private Networks 1. Employees can access the network (Intranet) from remote locations. 2. Secured networks. 3. The Internet is used as the backbone for VPNs 4. Saves cost tremendously from reduction of equipment and maintenance costs. 5. Scalability
  • 8. Remote Access Virtual Private Network
  • 9. 1. Two connections – one is made to the Internet and the second is made to the VPN. 2. Datagrams – contains data, destination and source information. 3. Firewalls – VPNs allow authorized users to pass through the firewalls. 4. Protocols – protocols create the VPN tunnels. Brief Overview of How it Works
  • 10. 1. Authentication – validates that the data was sent from the sender. 2. Access control – limiting unauthorized users from accessing the network. 3. Confidentiality – preventing the data to be read or copied as the data is being transported. 4. Data Integrity – ensuring that the data has not been altered Four Critical Functions
  • 11. Encryption Encryption -- is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature – for authentication
  • 12. Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Two types of end points:  Remote Access  Site-to-Site
  • 13.
  • 14. In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. What is protocol ? The TCP/IP Internet protocols, a common example, consist of: • Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level • Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level • Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet
  • 15. Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above
  • 17. Types of Implementations What does “implementation” mean in VPNs? 3 types Intranet – Within an organization Extranet – Outside an organization Remote Access – Employee to Business
  • 18. Device Types • What it means ? • 3 types • Hardware • Firewall • Software
  • 19. Device Types: Hardware • Usually a VPN type of router Pros • Highest network throughput • Plug and Play • Dual-purpose Cons • Cost • Lack of flexibility
  • 20. Device Types: Firewall • More security. Pros • “Harden” Operating System • Tri-purpose • Cost-effective Cons • Still relatively costly
  • 21. Device Types: Software • Ideal for 2 end points not in same org. • Great when different firewalls implemented Pros • Flexible • Low relative cost Cons • Lack of efficiency • More labor training required • Lower productivity; higher labor costs
  • 22.
  • 23. Applications: Site-to-Site VPNs Large-scale encryption between multiple fixed sites such as remote offices and central offices Network traffic is sent over the branch office Internet connection This saves the company hardware and management expenses
  • 24.
  • 25. Applications: Remote Access • Encrypted connections between mobile or remote users and their corporate networks • Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server. • Ideal for a telecommuter or mobile sales people. • VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable
  • 26. Industries That Use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged