Вы находитесь на странице: 1из 14

JAIPURIA INSTITUTE OF MANAGEMENT

LUCKNOW

Internet and vpn

Submitted by
Submitted to
Mumuksh Sharma
Mrs. Sanchita Ghatak
Section – B
Enrolment no. - Jiml-10-080
Acknowledgment

I am heartily thankful to my lecturer Mrs. Sanchita Ghatak ,


whose encouragement, guidance and support from the initial to the final
level enabled me to develop an understanding of the subject.
I would like to thank my friends for helping me out making me
aware about vpn services.
Last but not the least, I am very grateful to have such a
wonderful parents. Without them it would have been next to impossible.
They helped me out by providing all the necessary things required for
this project.
An Introduction To Networking

A network is a group of interconnected systems which share services and


interact with each other by means of a shared communication link. These
systems can be located anywhere. Network is often classified according to
its geographical size.

Classifications of Networking:-

Local Area Networks (LAN)

Wide Area Networks (WAN)

Metropolitan Area Networks (MAN)


LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building,
school, or home usually contains a single LAN, though sometimes one building will contain a
few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby
buildings. In TCP/IP networking, a LAN is often but not always implemented as a single
IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and
managed by a single person or organization. They also tend to use certain connectivity
technologies, primarily Ethernet and Token Ring.

WAN - Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN,
spanning the Earth.
A WAN is a geographically-dispersed collection of LANs. A network device called
a routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address
and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not
owned by any one organization but rather exist under collective or distributed ownership and
management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity
over the longer distances.

LAN, WAN and Home Networking

Residences typically employ one LAN and connect to the Internet WAN via an Internet Service
Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem,
and all of the computers on the home network use LAN (so-called private) IP addresses. All
computers on the home LAN can communicate directly with each other but must go through a
central gateway, typically a broadband router, to reach the ISP.
Internet

The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is anetwork of
networks that consists of millions of private, public, academic, business, and government
networks of local to global scope that are linked by a broad array of electronic and optical
networking technologies. The Internet carries a vast array ofinformation resources and services,
most notably the inter-linked hypertextdocuments of the World Wide Web (WWW) and the
infrastructure to supportelectronic mail.

Most traditional communications media, such as telephone and television services, are reshaped
or redefined using the technologies of the Internet, giving rise to services such as Voice over
Internet Protocol (VoIP) and IPTV. Newspaper publishing has been reshaped into Web
sites, blogging, and web feeds. The Internet has enabled or accelerated the creation of new forms
of human interactions throughinstant messaging, Internet forums, and social networking sites.

The origins of the Internet reach back to research in the 1960s, both commissioned by the United
States government to develop projects of its military agencies to build robust, fault-tolerant, and
distributed computer networks as well as private research. This research and a period of civilian
funding of a new U.S. backbone by the National Science Foundation, as well as private funding
for commercial backbones spawned worldwide participation in the development of new
networking technologies and led to the merger of many networks. The commercialization of an
international network in the mid 1990s, and resulted in the following popularization of countless
applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of
Earth's population uses the services of the Internet.

The Internet has no centralized governance in either technological implementation or policies for
access and usage; each constituent network sets its own standards. Only the overreaching
definitions of the two principal name spaces in the Internet, the Internet Protocol addressspace
and the Domain Name System, are directed by a maintainer organization, the Internet
Corporation for Assigned Names and Numbers(ICANN). The technical underpinning and
standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering
Task Force (IETF), a non-profit organization of loosely affiliated international participants that
anyone may associate with by contributing technical expertise.
Virtual Private Network (VPN)

Definition: A VPN utilizes public telecommunications networks to conduct private data


communications. Most VPN implementations use the Internet as the public infrastructure and a
variety of specialized protocols to support private communications through the Internet.

VPN follows a client and server approach. VPN clients authenticate users, encrypt data, and
otherwise manage sessions with VPN servers utilizing a technique called tunneling.

VPN clients and VPN servers are typically used in these three scenarios:

1. to support remote access to an intranet,


2. to support connections between multiple intranets within the same organization, and
3. to join networks between two organizations, forming an extranet.

The main benefit of a VPN is the lower cost needed to support this technology compared to
alternatives like traditional leased lines or remote access servers.

VPN users typically interact with simple graphical client programs. These applications support
creating tunnels, setting configuration parameters, and connecting to and disconnecting from the
VPN server. VPN solutions utilize several different network protocols including PPTP, L2TP,
IPsec, and SOCKS.

VPN servers can also connect directly to other VPN servers. A VPN server-to-server connection
extends the intranet or extranet to span multiple networks.

Many vendors have developed VPN hardware and software products. Some of these do not
interoperate due to the immaturity of some VPN standards.
A VPN supplies network connectivity over a possibly long physical distance. In this respect, a
VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video conferencing and
similar network services. Virtual private networks generally don't provide any new functionality
that isn't already offered through alternative mechanisms, but a VPN implements those services
more efficiently / cheaply in most cases.
A key feature of a VPN is its ability to work over both private networks as well as public
networks like the Internet. Using a method called tunneling, a VPN use the same hardware
infrastructure as existing Internet or intranet links. VPN technologies includes various security
mechanisms to protect the virtual, private connections.
Specifically, a VPN supports at least three different modes of use:

• Internet remote access client connections


• LAN-to-LAN internetworking
• Controlled access within an intranet

Internet VPNs for Remote Access

In recent years, many organizations have increased the mobility of their workers by allowing
more employees to telecommute. Employees also continue to travel and face a growing need to
stay connected to their company networks.

A VPN can be set up to support remote, protected access to the corporate home offices over the
Internet. An Internet VPN solution uses aclient/server design works as follows:

1. A remote host (client) wanting to log into the company network first connects to any
public Internet Service Provider (ISP).

2. Next, the host initiates a VPN connection to the company VPN server. This connection is
made via a VPN client installed on the remote host.

3. Once the connection has been established, the remote client can communicate with the internal
company systems over the Internet just as if it were a local host.
Before VPNs, remote workers accessed company networks over private leased lines or through
dialup remote access servers. While VPN clients and servers careful require installation of
hardware and software, an Internet VPN is a superior solution in many situations.

VPNs for Internetworking

Besides using virtual private networks for remote access, a VPN can also bridge two networks
together. In this mode of operation, an entire remote network (rather than just a single remote
client) can join to a different company network to form an extended intranet. This solution uses a
VPN server to VPN server connection.

Intranet / Local Network VPNs

Internal networks may also utilize VPN technology to implement controlled access to individual
subnets within a private network. In this mode of operation, VPN clients connect to a VPN
server that acts as the network gateway.
This type of VPN use does not involve an Internet Service Provider (ISP) or public network
cabling. However, it allows the security benefits of VPN to be deployed inside an organization.
This approach has become especially popular as a way for businesses to protect their WiFi local
networks.
A VPN - Virtual Private Network - is one solution to establishing long-distance and/or secured
network connections. VPNs are normally implemented (deployed) by businesses or
organizations rather than by individuals, but virtual networks can be reached from inside a home
network. Compared to other technologies, VPNs offers several advantages, particularly benefits
for wireless local area networking.
Answer: For an organization looking to provide a secured network infrastructure for its client
base, a VPN offers two main advantages over alternative technologies: cost savings, and network
scalability. To the clients accessing these networks, VPNs also bring some benefits of ease of
use.

Cost Savings with a VPN

A VPN can save an organization money in several situations:


• eliminating the need for expensive long-distance leased lines
• reducing long-distance telephone charges
• offloading support costs

VPNs vs leased lines - Organizations historically needed to rent network capacity such as T1
lines to achieve full, secured connectivity between their office locations. With a VPN, you use
public network infrastructure including the Internet to make these connections and tap into that
virtual network through much cheaper local leased lines or even just broadband connections to a
nearby Internet Service Provider (ISP).

Long distance phone charges - A VPN also can replace remote access servers and long-
distance dialup network connections commonly used in the past by business travelers needing to
access to their company intranet. For example, with an Internet VPN, clients need only connect
to the nearest service provider's access point that is usually local.

Support costs - With VPNs, the cost of maintaining servers tends to be less than other
approaches because organizations can outsource the needed support from professional third-party
service providers. These provides enjoy a much lower cost structure through economy of scale
by servicing many business clients.
VPN Network Scalability

The cost to an organization of building a dedicated private network may be reasonable at first but
increases exponentially as the organization grows. A company with two branch offices, for
example, can deploy just one dedicated line to connect the two locations, but 4 branch offices
require 6 lines to directly connect them to each other, 6 branch offices need 15 lines, and so on.

Internet based VPNs avoid this scalability problem by simply tapping into the the public lines
and network capability readily available. Particularly for remote and international locations, an
Internet VPN offers superior reach and quality of service.

Using a VPN

To use a VPN, each client must possess the appropriate networking software or hardware support
on their local network and computers. When set up properly, VPN solutions are easy to use and
sometimes can be made to work automatically as part of network sign on.
VPN technology also works well with WiFi local area networking. Some organizations use
VPNs to secure wireless connections to their local access points when working inside the office.
These solutions provide strong protection without affecting performance excessively.

Limitations of a VPN

Despite their popularity, VPNs are not perfect and limitations exist as is true for any technology.
Organizations should consider issues like the below when deploying and using virtual private
networks in their operations:

1. VPNs require detailed understanding of network security issues and careful installation /
configuration to ensure sufficient protection on a public network like the Internet.

2. The reliability and performance of an Internet-based VPN is not under an


organization's direct control. Instead, the solution relies on an ISP and their quality of
service.

3. Historically, VPN products and solutions from different vendors have not always been
compatible due to issues with VPN technology standards. Attempting to mix and match
equipment may cause technical problems, and using equipment from one provider may
not give as great a cost savings.
What Exactly Is A VPN?

A VPN supplies network connectivity over a possibly long physical distance. In this respect, a
VPN is a form of Wide Area Network (WAN).

The key feature of a VPN, however, is its ability to use public networks like the Internet rather
than rely on private leased lines. VPN technologies implement restricted-access networks that
utilize the same cabling and routers as a public network, and they do so without sacrificing
features or basic security.

A VPN supports at least three different modes of use:

• Remote access client connections


• LAN-to-LAN internetworking
• Controlled access within an intranet
Read more - About VPN Applications

VPN Pros and Cons

Like many commercialized network technologies, a significant amount of sales and marketing
hype surrounds VPN. In reality, VPNs provide just a few specific potential advantages over more
traditional forms of wide-area networking. These advantages can be significant, but they do not
come for free.

The potential problems with the VPN outnumber the advantages and are generally more difficult
to understand. The disadvantages do not necessarily outweigh the advantages, however. From
security and performance concerns, to coping with a wide range of sometimes incompatible
vendor products, the decision of whether or not to use a VPN cannot be made without significant
planning and preparation.
The diagram above illustrates the difference between a dial-in connection and a
connection with a VPN.
Pantaloon's retail connectivity operations provided by sify
Background

Pantaloon today is a leading manufacturer-retailer in the country with 13


Pantaloon stores, 9 Hypermarkets, 13 Food Bazaars and 2 Central
operations across the country.

Incorporated in the year 1987, the retail major currently operates multiple
format stores like Pantaloons - The Family Store, Big Bazaar, The Discount
Hypermarket & Food Bazaar, Food & Grocery Super Market. The company
recently launched Central -- India's first seamless mall chain, spread across
1.5 lakh square feet in Bangalore & in Hyderabad followed by Pune.

In line with its exponential growth plans, Pantaloon Retail (India) Ltd., one
of the country's major players in the retailing segment, entered into a major
IT deployment drive by revamping its back-end operations.

Commenting on Pantaloon's connectivity requirement, Mr. Jitendra Sarode,


IT Infrastructure Head said, "Pantaloon was looking for an IP based VPN
solution to establish network connectivity between its central location at
Mumbai (Jogeshwari) and the branch offices and stores located across India.
The main application servers were to be located at Mumbai and the primary
data interchange was for accessing the Oracle Financial Applications,
Messaging, Video Conferencing, VOIP & Intranet.

Pantaloon was looking for a robust, redundant and secure network for
connecting its remote locations to the central location for running its data

The set-up before the VPN deployment consisted of Individual PSTN Dial-
up connections at stores and branch offices and the Central Warehouse at
Tarapore, connected through ISDN Dialup. Daily sales reports were sent to
HO, via e-mail and were consolidated at HO. ORACLE Financials and in-
house developed package Retail Enterprise Manager /MIS were the
applications running on these lines.

Issues with Earlier Connectivity

After discussions with officials, four issues emerged in relation to the earlier
Unreliable connectivity
Process of consolidating data was time consuming
High response times
Updates about production, sales and collections from stores were not
reaching on time.

Moreover, Pantaloon was in the process of rolling out its Oracle Financial
application & was in need of a robust, scalable, cost effective and highly
reliable Last Mile connectivity solution.

Pantaloon evaluated many options like Last Mile Leased Line and Wireless
before zeroing in on the solution presented by Sify.

Criteria for Selection of Service Provider

Says Mr. Jitendra Sarode, IT Infrastructure Head: "Our criteria for selecting
a service provider was based on several criterias, (a) The service provider
should have had experience in implementing the technology solution
presented to us (b) Expertise in Last Mile solution (c) Robust Infrastructure
(d) The right price-value proposition and (e) Service infrastructure.

Sify was chosen because they are one of the leaders in implementing Last
Mile wireless solutions, a fail-safe infrastructure with extensive presence in

Sify's Connectivity Solution for Pantaloon

Sify proposed an IP VPN solution on its countrywide backbone for


connecting the branch offices of Pantaloon to the central location in
Jogeshwari, Mumbai.

Sify recommended Pantaloon to go in for an IP VPN solution as this


technology offers the best features and functions of the technologies, viz
ATM /Frame Relay. The implementation was performed at the ISP's edge,
thereby providing greater control and management while maintaining
complete customer transparency, as in the case of ATM / Frame Relay.

Sify connected all branch offices to the central office location in


Jogeshwari, Mumbai. All the critical servers of Pantaloon were to be located
in Jogeshwari office and all the branch locations / stores were to access this
server through tunnels created on a IP based VPN network of Sify.
The central office in Mumbai would connect to the nearest Sify NOC in
Mumbai on a 2 Mbps Wireless Link. Sify provisioned 2 Mbps of VPN
bandwidth in Mumbai, which was to be used by the branch offices for
accessing the servers at Mumbai, with provision for a 512 kbps of ISDN
backup to ensure high availability.

Sify has a fully meshed Tier 1 network and thus the data from all the offices
of Pantaloon could access the central office through the IP tunnels created
on the Sify backbone. Sify provided adequate VPN bandwidth ports at all
these locations to access the central servers in Mumbai.

Sify also configured IP tunnels between the branch offices and the central
location at Mumbai. All data traffic originating at each of these offices
would travel through the IP tunnels to the central server location of

Sify also provided Pantaloon with a web-based tool for monitoring the
bandwidth utilisation on these links. Pantaloon could thus augment the
bandwidth at the central location in case the link utilization reached the

Вам также может понравиться