Академический Документы
Профессиональный Документы
Культура Документы
confidential
CONTD
is a computer network using a public telecommunication infrastructure for providing remote offices or individual users secure access to their organization's network. It encapsulates data transfers using a secure cryptographic method between two or more networked devices enhances the private scope of computer communications or facilitates a secure extension of a private network into an insecure network
INTRODUCTORY CONCEPTS
Factors Leading To Emergence
Catering networking needs of desirable features of speed , security , functionality High amount of cost for transferring large amount of data
Voice VPN provided us with Tele-conferencing Toll-free numbers Private numbering plans Call-Management
CHARACTERISTICS OF VPN
Traffic is encrypted to prevent eavesdropping. Remote site is authenticated Multiple protocols are supported and connection is point to point. Exchange of data is controlled , secure and validated
Remote Access
VPN Corporate Intranet Website VPN VPN Remote office sites Internet Intranet of business partners
Data encryption
Key management Multiprotocol support
VPN TECHNOLOGIES
TUNNELING
a tunnel is a means of forwarding data across a network from one node to another , as if two nodes are directly connected
An extra header is added to the data sent by transmitting end of tunnel
Data is then forwarded by intermediate nodes based on this outer header without looking at content of original packet
TUNNELING
S1
Public Internet
S2
Authenticity
Data
security
Access
control
Internet
TYPES OF VPN
Trusted VPN : uses dedicated circuitry, transmissions can be compromised when they run through communications switches. Its path is set and consistent with the routing and addressing set prior to use Secure VPN : are those that use encryption between originating computer to the receiving computer. The network must be guarded from outside alteration of the security properties. Hybrid VPN: combination of the above two VPN
BENEFITS OF VPN
DRAWBACKS OF VPN
BIBLIOGRAPHY
Google.com
THANK YOU