Presentation is loading. Please wait.

Presentation is loading. Please wait.

Virtual Private Networks

Similar presentations


Presentation on theme: "Virtual Private Networks"— Presentation transcript:

1 Virtual Private Networks
Done By: Noor Alhathal Deena Jokhdar Sara Alghamdi

2 Outline Introduction Definition of VPN’s Functions of VPN’s
Types of VPN’s Advantages and disadvantages of VPN’s Security Mechanism used in VPN’s Conclusion and recommendation Summary References

3 Introduction Uses public telecommunication channels, such as the Internet or other network service, instead of leased lines channels. Described as Virtual because it is distant connection using private connections. Used to widely now because of today's globalization. Connects users or branches. Used to use dial-up or Leased communication, now using IP-VPN’s

4 Methodology We have conducted a library research Qualitative research
information mainly based on secondary resources. gathered information from articles, books related to Virtual Private Networks.

5 What is a VPN? Virtual private network is a communication it is usually used in companies and organizations. it scrambles the connections between two computers so that only the sender and intended recipient know what is being sent. It is useful for customers who exchange sensitive data.

6 Functions of VPN Extend geographic connectivity. Improve security
Reduce transfer time and transportation costs for remote users. Provide global networking opportunities. Provide home-worker support. Support remote access to an internet. Join networks between two organizations, forming an extranet.

7 Types of VPN’s: Access VPNs
alternatives to ISDN and dial connections Asynchronous dials, ISDN, DSL, mobile IP, and the cable technologies are also supported. access connections offer much lower cost solution, as well as a wide range of connectivity options.

8 Security identifying the user as a member of the approved consumer company, and then setting up a private tunnel to its gateway, which holds the per-user authentication and authorization.

9 Intranet connections link business headquarters, remote and branch offices over shared communication alternative to leased line communication Intranet connections also provide the advantage of lower cost and extended connectivity to users

10 Connection Remote employees or mobile users will connect to a limited Point of Presence, or POP, to the Service Provider and access their company’s network.

11 Extranet VPNs link consumers, suppliers or partners of a corporate intranet through a joint communications using dedicated connections. as alternative to EDI of fax and has replaced old communication channels widely used in today’s world as the extranet assist the process of e-commerce communication and made it way much easier and faster.

12 The Advantages of the Virtual Private Network:
Greater scalability Easy to add/remove users Reduced long-distance telecommunications costs Mobility Security

13 The Disadvantages of the Virtual Private Network:
Lack of standards Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors

14 The security mechanism used in VPNs:
For secure VPNs, the technologies that VPNC supports are: IPsec with encryption L2TP inside of IPsec SSL with encryption For trusted VPNs, the technologies that VPNC supports are: MPLS with constrained distribution of routing information through BGP ("layer 3 VPNs") Transport of layer 2 frames over MPLS ("layer 2 VPNs")

15 Conclusion In conclusion the VPNs let the users or companies to connect to remote servers over the public internet network, while maintaining protected telecommunications. The VPNs technology is designed to address concerns of the existing business trend toward improved telecommuting and broadly distributed international operations, where employees must be able to attach to central resources and communicate with each other.

16 Recommendations VPN can have some limitations such :
as the clients hit the network stack or may not play well with personal firewalls or other software or even may not need full access to the target network just encrypted access. So we recommend: VPN users to use SSL as the main transport protocol to an appliance. Users can add NT authentication to the appliance. Or, Clientless mode: Use web enabled applications over the Internet, the appliance SSLifies web sites.

17 Summary Definition of VPN’s Functions of VPN’s Types of VPN’s
Advantages and disadvantages of VPN’s Security Mechanism used in VPN’s

18 References jeff , T. (2009). How virtual private networks work. Retrieved from james, F. (2000). Multi-access virtual private network (May 9, 2000), Retrieved from What is VPN (virtual private networking)?. (2008, 8 12). Retrieved from mitchell, B. (n.d.). Vpn - virtual private network. Retrieved from

19 Thank you any questions!


Download ppt "Virtual Private Networks"

Similar presentations


Ads by Google