You are on page 1of 14

VIRTUAL PRIVATE NETWORK

VIRTUAL PRIVATE NETWORK

A VIRTUAL network overlaid on top of the ubiquitous interconnection of the Internet

and a PRIVATE network for communications and exclusive usage.

confidential

CONTD
is a computer network using a public telecommunication infrastructure for providing remote offices or individual users secure access to their organization's network. It encapsulates data transfers using a secure cryptographic method between two or more networked devices enhances the private scope of computer communications or facilitates a secure extension of a private network into an insecure network

INTRODUCTORY CONCEPTS
Factors Leading To Emergence

Previous Existing VPN

Catering networking needs of desirable features of speed , security , functionality High amount of cost for transferring large amount of data

Voice VPN provided us with Tele-conferencing Toll-free numbers Private numbering plans Call-Management

CHARACTERISTICS OF VPN
Traffic is encrypted to prevent eavesdropping. Remote site is authenticated Multiple protocols are supported and connection is point to point. Exchange of data is controlled , secure and validated

Remote Access

VPN Corporate Intranet Website VPN VPN Remote office sites Internet Intranet of business partners

NEED FOR VPN

Extending geographical connectivity User authentication

Data encryption
Key management Multiprotocol support

VPN TECHNOLOGIES

TUNNELING
a tunnel is a means of forwarding data across a network from one node to another , as if two nodes are directly connected
An extra header is added to the data sent by transmitting end of tunnel

Data is then forwarded by intermediate nodes based on this outer header without looking at content of original packet

TUNNELING

S1

Public Internet

S2

OTHER TECHNOLOGIES USED

Authenticity

Data

security

Access

control

Internet

TYPES OF VPN

Trusted VPN : uses dedicated circuitry, transmissions can be compromised when they run through communications switches. Its path is set and consistent with the routing and addressing set prior to use Secure VPN : are those that use encryption between originating computer to the receiving computer. The network must be guarded from outside alteration of the security properties. Hybrid VPN: combination of the above two VPN

BENEFITS OF VPN

Improved security of data transfer


Reduced implementation cost Extended connectivity Effective bandwidth use

DRAWBACKS OF VPN

Increase in the size of IP packets


Less bandwidth than dedicated line Needs to accommodate protocols Inter connectivity problem

BIBLIOGRAPHY

Information System Security by Nina Godbole


Information Security & Cyber Laws by Pankaj Sharma References also from Wikipedia

Google.com

THANK YOU

You might also like