SlideShare ist ein Scribd-Unternehmen logo
1 von 38
VIRTUAL PRIVATEVIRTUAL PRIVATE
NETWORKS (VPN)NETWORKS (VPN)
BY:BY:
Diana AshikyanDiana Ashikyan
Nikhil JerathNikhil Jerath
Connie MakalintalConnie Makalintal
Midori MurataMidori Murata
Traditional ConnectivityTraditional Connectivity
[From Gartner Consulting][From Gartner Consulting]
What is VPN?What is VPN?
Virtual Private Network is a type of privateVirtual Private Network is a type of private
network that uses public telecommunication,network that uses public telecommunication,
such as the Internet, instead of leased lines tosuch as the Internet, instead of leased lines to
communicate.communicate.
Became popular as more employees worked inBecame popular as more employees worked in
remote locations.remote locations.
Terminologies to understand how VPNs work.Terminologies to understand how VPNs work.
Private NetworksPrivate Networks
vs.vs.
Virtual Private NetworksVirtual Private Networks
Employees can access the network (Intranet)Employees can access the network (Intranet)
from remote locations.from remote locations.
Secured networks.Secured networks.
The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs
Saves cost tremendously from reduction ofSaves cost tremendously from reduction of
equipment and maintenance costs.equipment and maintenance costs.
ScalabilityScalability
Remote Access Virtual PrivateRemote Access Virtual Private
NetworkNetwork
(From Gartner Consulting)
Brief Overview of How it WorksBrief Overview of How it Works
Two connections – one is made to theTwo connections – one is made to the
Internet and the second is made to theInternet and the second is made to the
VPN.VPN.
Datagrams – contains data, destinationDatagrams – contains data, destination
and source information.and source information.
Firewalls – VPNs allow authorized usersFirewalls – VPNs allow authorized users
to pass through the firewalls.to pass through the firewalls.
Protocols – protocols create the VPNProtocols – protocols create the VPN
tunnels.tunnels.
Four Critical FunctionsFour Critical Functions
AuthenticationAuthentication – validates that the data was– validates that the data was
sent from the sender.sent from the sender.
Access controlAccess control – limiting unauthorized users– limiting unauthorized users
from accessing the network.from accessing the network.
ConfidentialityConfidentiality – preventing the data to be– preventing the data to be
read or copied as the data is beingread or copied as the data is being
transported.transported.
Data IntegrityData Integrity – ensuring that the data has– ensuring that the data has
not been alterednot been altered
EncryptionEncryption
Encryption -- is a method of “scrambling”Encryption -- is a method of “scrambling”
data before transmitting it onto thedata before transmitting it onto the
Internet.Internet.
Public Key Encryption TechniquePublic Key Encryption Technique
Digital signature – for authenticationDigital signature – for authentication
TunnelingTunneling
A virtual point-to-point connectionA virtual point-to-point connection
made through a public network. It transportsmade through a public network. It transports
encapsulated datagrams.encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Original Datagram
Data Encapsulation [From Comer]
Two types of end points:
 Remote Access
 Site-to-Site
Four Protocols used in VPNFour Protocols used in VPN
PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security
SOCKS – is not used as much as theSOCKS – is not used as much as the
ones aboveones above
VPN Encapsulation of PacketsVPN Encapsulation of Packets
Types of ImplementationsTypes of Implementations
What does “implementation” mean inWhat does “implementation” mean in
VPNs?VPNs?
3 types3 types
Intranet – Within an organizationIntranet – Within an organization
Extranet – Outside an organizationExtranet – Outside an organization
Remote Access – Employee to BusinessRemote Access – Employee to Business
Virtual Private Networks (VPN)
Basic Architecture
Device TypesDevice Types
 What it meansWhat it means
 3 types3 types
 HardwareHardware
 FirewallFirewall
 SoftwareSoftware
Device Types: HardwareDevice Types: Hardware
 Usually a VPN type of routerUsually a VPN type of router
Pros
• Highest network throughput
• Plug and Play
• Dual-purpose
Cons
• Cost
• Lack of flexibility
Device Types: FirewallDevice Types: Firewall
 More security?More security?
Pros
• “Harden” Operating System
• Tri-purpose
• Cost-effective
Cons
• Still relatively costly
Device Types: SoftwareDevice Types: Software
 Ideal for 2 end points not in same org.Ideal for 2 end points not in same org.
 Great when different firewallsGreat when different firewalls
implementedimplemented
Pros
• Flexible
• Low relative cost
Cons
• Lack of efficiency
• More labor
training required
• Lower
productivity; higher
labor costs
AdvantagesAdvantages
VS.VS.
DisadvantagesDisadvantages
 Eliminating the need for expensive long-distanceEliminating the need for expensive long-distance
leased linesleased lines
 Reducing the long-distance telephone chargesReducing the long-distance telephone charges
for remote access.for remote access.
 Transferring the support burden to the serviceTransferring the support burden to the service
providersproviders
 Operational costsOperational costs
 Cisco VPN Savings CalculatorCisco VPN Savings Calculator
Advantages: Cost SavingsAdvantages: Cost Savings
Flexibility of growthFlexibility of growth
Efficiency with broadband technologyEfficiency with broadband technology
Advantages: ScalabilityAdvantages: Scalability
VPNs require an in-depth understanding ofVPNs require an in-depth understanding of
public network security issues and properpublic network security issues and proper
deployment of precautionsdeployment of precautions
Availability and performance depends on factorsAvailability and performance depends on factors
largely outside of their controllargely outside of their control
Immature standardsImmature standards
VPNs need to accommodate protocols otherVPNs need to accommodate protocols other
than IP and existing internal network technologythan IP and existing internal network technology
DisadvantagesDisadvantages
Applications: Site-to-Site VPNsApplications: Site-to-Site VPNs
Large-scale encryption between multipleLarge-scale encryption between multiple
fixed sites such as remote offices andfixed sites such as remote offices and
central officescentral offices
Network traffic is sent over the branchNetwork traffic is sent over the branch
office Internet connectionoffice Internet connection
This saves the company hardware andThis saves the company hardware and
management expensesmanagement expenses
Site-to-Site VPNsSite-to-Site VPNs
Applications: Remote AccessApplications: Remote Access
Encrypted connections between mobile orEncrypted connections between mobile or
remote users and their corporate networksremote users and their corporate networks
Remote user can make a local call to an ISP, asRemote user can make a local call to an ISP, as
opposed to a long distance call to the corporateopposed to a long distance call to the corporate
remote access server.remote access server.
Ideal for a telecommuter or mobile sales people.Ideal for a telecommuter or mobile sales people.
VPN allows mobile workers & telecommuters toVPN allows mobile workers & telecommuters to
take advantage of broadband connectivity.take advantage of broadband connectivity.
i.e. DSL, Cablei.e. DSL, Cable
Industries That May Use a VPNIndustries That May Use a VPN
Healthcare:Healthcare: enables the transferring of confidential patientenables the transferring of confidential patient
information within the medical facilities & health care providerinformation within the medical facilities & health care provider
ManufacturingManufacturing: allow suppliers to view inventory & allow: allow suppliers to view inventory & allow
clients to purchase online safelyclients to purchase online safely
Retail:Retail: able to securely transfer sales data or customer infoable to securely transfer sales data or customer info
between stores & the headquartersbetween stores & the headquarters
Banking/Financial:Banking/Financial: enables account information to beenables account information to be
transferred safely within departments & branchestransferred safely within departments & branches
General Business:General Business: communication between remotecommunication between remote
employees can be securely exchangedemployees can be securely exchanged
Statistics From Gartner-Statistics From Gartner-
Consulting*Consulting*
50%
63%
79%
90%
0% 20% 40% 60% 80% 100%
Access to network for
business
partners/customers
Site-to-site connectivity
between offices
Remote access for
employees while
traveling
Remote access for
employees working out
of homes
% of Respondents
Percentages
*Source: www.cisco.com
Some Businesses using a VPNSome Businesses using a VPN
CVS Pharmaceutical Corporation upgraded theirCVS Pharmaceutical Corporation upgraded their
frame relay network to an IP VPNframe relay network to an IP VPN
ITW Foilmark secured remote location orders,ITW Foilmark secured remote location orders,
running reports, & internet/intranetrunning reports, & internet/intranet
communications w/ a 168-bit encryption bycommunications w/ a 168-bit encryption by
switching to OpenReach VPNswitching to OpenReach VPN
Bacardi & Co. Implemented a 21-country, 44-Bacardi & Co. Implemented a 21-country, 44-
location VPNlocation VPN
Where Do We See VPNsWhere Do We See VPNs
Going in the Future?Going in the Future?
VPNs are continually being enhanced.VPNs are continually being enhanced.
Example:Example: Equant NVEquant NV
As the VPN market becomes larger, moreAs the VPN market becomes larger, more
applications will be created along withapplications will be created along with
more VPN providers and new VPN types.more VPN providers and new VPN types.
Networks are expected to converge toNetworks are expected to converge to
create an integrated VPNcreate an integrated VPN
Improved protocols are expected, whichImproved protocols are expected, which
will also improve VPNs.will also improve VPNs.
Pop Quiz!Pop Quiz!
VPN stands for…
a) Virtual Public Network b) Virtual Private Network
c) Virtual Protocol Network
d)
Virtual Perimeter Network
Q.1Q.1
Pop Quiz!Pop Quiz!
A.1A.1
b) Virtual Private Network
VPN stands for…
VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a
private network in the sense that it carries controlled information, protected by various
security mechanisms, between known parties. VPNs are only "virtually" private,
however, because this data actually travels over shared public networks instead of fully
dedicated private connections.
Pop Quiz!Pop Quiz!
What are the acronyms for the 3 most common VPN
protocols?
Q.2Q.2
Pop Quiz!Pop Quiz!
A.2A.2
• PPTP
• L2TP
• IPsec
3 most common VPN protocols are…
PPTP, IPsec, and L2TP are three of today's most popular VPN tunneling protocols. Each
one of these is capable of supporting a secure VPN connection.
Pop Quiz!Pop Quiz!
What does PPTP stand for?
Q.3Q.3
Pop Quiz!Pop Quiz!
A.3A.3
PPTP = Point-to-Point Tunneling Protocol !
Pop Quiz!Pop Quiz!
What is the main benefit of VPNs compared to
dedicated networks utilizing frame relay, leased
lines, and traditional dial-up?
Q.4Q.4
a) better network performance b) less downtime on average
c) reduced cost d) improved security
Pop Quiz!Pop Quiz!
A.4A.4
c) reduced cost
The main benefit of VPNs is…
The main benefit of a VPN is the potential for significant cost savings compared to
traditional leased lines or dial up networking. These savings come with a certain amount
of risk, however, particularly when using the public Internet as the delivery mechanism
for VPN data.
Pop Quiz!Pop Quiz!
In VPNs, the term "tunneling" refers to
Q.5Q.5
a) an optional feature
that increases network
performance if it is
turned on
b) the encapsulation of packets inside
packets of a different protocol to
create and maintain the virtual circuit
c) the method a system
administrator uses to
detect hackers on the
network
d) a marketing strategy that involves
selling VPN products for very low
prices in return for expensive service
contracts
Pop Quiz!Pop Quiz!
A.5A.5
b) the encapsulation of packets inside packets
of a different protocol to create and
maintain the virtual circuit
In VPNs, the term "tunneling" refers to…

Weitere ähnliche Inhalte

Was ist angesagt?

Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Rajendra Dangwal
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessSafar Safarov
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNSovello Hildebrand
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsSovello Hildebrand
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private NetworkShubhayu Roy
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 

Was ist angesagt? (17)

vpn
vpnvpn
vpn
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP Business
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPN
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn security
Vpn security Vpn security
Vpn security
 
VPN
VPNVPN
VPN
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Public wifi
Public wifiPublic wifi
Public wifi
 

Andere mochten auch

Portfolio power point 4
Portfolio power point 4Portfolio power point 4
Portfolio power point 4dlbell500
 
Sesion3 crear un blog con wordpress
Sesion3 crear un blog con wordpressSesion3 crear un blog con wordpress
Sesion3 crear un blog con wordpressncoge
 
#lspe: Dynamic Scaling
#lspe: Dynamic Scaling #lspe: Dynamic Scaling
#lspe: Dynamic Scaling steveshah
 
Intro to Java for C++ Developers
Intro to Java for C++ DevelopersIntro to Java for C++ Developers
Intro to Java for C++ DevelopersZachary Blair
 
C++ to java
C++ to javaC++ to java
C++ to javaAjmal Ak
 
Difference between C++ and Java
Difference between C++ and JavaDifference between C++ and Java
Difference between C++ and JavaAjmal Ak
 

Andere mochten auch (12)

Portfolio power point 4
Portfolio power point 4Portfolio power point 4
Portfolio power point 4
 
Sesion3 crear un blog con wordpress
Sesion3 crear un blog con wordpressSesion3 crear un blog con wordpress
Sesion3 crear un blog con wordpress
 
Language
LanguageLanguage
Language
 
#lspe: Dynamic Scaling
#lspe: Dynamic Scaling #lspe: Dynamic Scaling
#lspe: Dynamic Scaling
 
6. sumadi i
6. sumadi i6. sumadi i
6. sumadi i
 
Latitude
LatitudeLatitude
Latitude
 
Intro to Java for C++ Developers
Intro to Java for C++ DevelopersIntro to Java for C++ Developers
Intro to Java for C++ Developers
 
Ch19
Ch19Ch19
Ch19
 
C++ to java
C++ to javaC++ to java
C++ to java
 
Difference between C++ and Java
Difference between C++ and JavaDifference between C++ and Java
Difference between C++ and Java
 
C++vs java
C++vs javaC++vs java
C++vs java
 
OpenCV Introduction
OpenCV IntroductionOpenCV Introduction
OpenCV Introduction
 

Ähnlich wie Vp npresentation (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN
VPN VPN
VPN
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
All About VPN
All About VPNAll About VPN
All About VPN
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
The vpn
The vpnThe vpn
The vpn
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 

Kürzlich hochgeladen

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Vp npresentation

  • 1. VIRTUAL PRIVATEVIRTUAL PRIVATE NETWORKS (VPN)NETWORKS (VPN) BY:BY: Diana AshikyanDiana Ashikyan Nikhil JerathNikhil Jerath Connie MakalintalConnie Makalintal Midori MurataMidori Murata
  • 2. Traditional ConnectivityTraditional Connectivity [From Gartner Consulting][From Gartner Consulting]
  • 3. What is VPN?What is VPN? Virtual Private Network is a type of privateVirtual Private Network is a type of private network that uses public telecommunication,network that uses public telecommunication, such as the Internet, instead of leased lines tosuch as the Internet, instead of leased lines to communicate.communicate. Became popular as more employees worked inBecame popular as more employees worked in remote locations.remote locations. Terminologies to understand how VPNs work.Terminologies to understand how VPNs work.
  • 4. Private NetworksPrivate Networks vs.vs. Virtual Private NetworksVirtual Private Networks Employees can access the network (Intranet)Employees can access the network (Intranet) from remote locations.from remote locations. Secured networks.Secured networks. The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs Saves cost tremendously from reduction ofSaves cost tremendously from reduction of equipment and maintenance costs.equipment and maintenance costs. ScalabilityScalability
  • 5. Remote Access Virtual PrivateRemote Access Virtual Private NetworkNetwork (From Gartner Consulting)
  • 6. Brief Overview of How it WorksBrief Overview of How it Works Two connections – one is made to theTwo connections – one is made to the Internet and the second is made to theInternet and the second is made to the VPN.VPN. Datagrams – contains data, destinationDatagrams – contains data, destination and source information.and source information. Firewalls – VPNs allow authorized usersFirewalls – VPNs allow authorized users to pass through the firewalls.to pass through the firewalls. Protocols – protocols create the VPNProtocols – protocols create the VPN tunnels.tunnels.
  • 7. Four Critical FunctionsFour Critical Functions AuthenticationAuthentication – validates that the data was– validates that the data was sent from the sender.sent from the sender. Access controlAccess control – limiting unauthorized users– limiting unauthorized users from accessing the network.from accessing the network. ConfidentialityConfidentiality – preventing the data to be– preventing the data to be read or copied as the data is beingread or copied as the data is being transported.transported. Data IntegrityData Integrity – ensuring that the data has– ensuring that the data has not been alterednot been altered
  • 8. EncryptionEncryption Encryption -- is a method of “scrambling”Encryption -- is a method of “scrambling” data before transmitting it onto thedata before transmitting it onto the Internet.Internet. Public Key Encryption TechniquePublic Key Encryption Technique Digital signature – for authenticationDigital signature – for authentication
  • 9. TunnelingTunneling A virtual point-to-point connectionA virtual point-to-point connection made through a public network. It transportsmade through a public network. It transports encapsulated datagrams.encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] Two types of end points:  Remote Access  Site-to-Site
  • 10. Four Protocols used in VPNFour Protocols used in VPN PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security SOCKS – is not used as much as theSOCKS – is not used as much as the ones aboveones above
  • 11. VPN Encapsulation of PacketsVPN Encapsulation of Packets
  • 12. Types of ImplementationsTypes of Implementations What does “implementation” mean inWhat does “implementation” mean in VPNs?VPNs? 3 types3 types Intranet – Within an organizationIntranet – Within an organization Extranet – Outside an organizationExtranet – Outside an organization Remote Access – Employee to BusinessRemote Access – Employee to Business
  • 13. Virtual Private Networks (VPN) Basic Architecture
  • 14. Device TypesDevice Types  What it meansWhat it means  3 types3 types  HardwareHardware  FirewallFirewall  SoftwareSoftware
  • 15. Device Types: HardwareDevice Types: Hardware  Usually a VPN type of routerUsually a VPN type of router Pros • Highest network throughput • Plug and Play • Dual-purpose Cons • Cost • Lack of flexibility
  • 16. Device Types: FirewallDevice Types: Firewall  More security?More security? Pros • “Harden” Operating System • Tri-purpose • Cost-effective Cons • Still relatively costly
  • 17. Device Types: SoftwareDevice Types: Software  Ideal for 2 end points not in same org.Ideal for 2 end points not in same org.  Great when different firewallsGreat when different firewalls implementedimplemented Pros • Flexible • Low relative cost Cons • Lack of efficiency • More labor training required • Lower productivity; higher labor costs
  • 19.  Eliminating the need for expensive long-distanceEliminating the need for expensive long-distance leased linesleased lines  Reducing the long-distance telephone chargesReducing the long-distance telephone charges for remote access.for remote access.  Transferring the support burden to the serviceTransferring the support burden to the service providersproviders  Operational costsOperational costs  Cisco VPN Savings CalculatorCisco VPN Savings Calculator Advantages: Cost SavingsAdvantages: Cost Savings
  • 20. Flexibility of growthFlexibility of growth Efficiency with broadband technologyEfficiency with broadband technology Advantages: ScalabilityAdvantages: Scalability
  • 21. VPNs require an in-depth understanding ofVPNs require an in-depth understanding of public network security issues and properpublic network security issues and proper deployment of precautionsdeployment of precautions Availability and performance depends on factorsAvailability and performance depends on factors largely outside of their controllargely outside of their control Immature standardsImmature standards VPNs need to accommodate protocols otherVPNs need to accommodate protocols other than IP and existing internal network technologythan IP and existing internal network technology DisadvantagesDisadvantages
  • 22. Applications: Site-to-Site VPNsApplications: Site-to-Site VPNs Large-scale encryption between multipleLarge-scale encryption between multiple fixed sites such as remote offices andfixed sites such as remote offices and central officescentral offices Network traffic is sent over the branchNetwork traffic is sent over the branch office Internet connectionoffice Internet connection This saves the company hardware andThis saves the company hardware and management expensesmanagement expenses
  • 24. Applications: Remote AccessApplications: Remote Access Encrypted connections between mobile orEncrypted connections between mobile or remote users and their corporate networksremote users and their corporate networks Remote user can make a local call to an ISP, asRemote user can make a local call to an ISP, as opposed to a long distance call to the corporateopposed to a long distance call to the corporate remote access server.remote access server. Ideal for a telecommuter or mobile sales people.Ideal for a telecommuter or mobile sales people. VPN allows mobile workers & telecommuters toVPN allows mobile workers & telecommuters to take advantage of broadband connectivity.take advantage of broadband connectivity. i.e. DSL, Cablei.e. DSL, Cable
  • 25. Industries That May Use a VPNIndustries That May Use a VPN Healthcare:Healthcare: enables the transferring of confidential patientenables the transferring of confidential patient information within the medical facilities & health care providerinformation within the medical facilities & health care provider ManufacturingManufacturing: allow suppliers to view inventory & allow: allow suppliers to view inventory & allow clients to purchase online safelyclients to purchase online safely Retail:Retail: able to securely transfer sales data or customer infoable to securely transfer sales data or customer info between stores & the headquartersbetween stores & the headquarters Banking/Financial:Banking/Financial: enables account information to beenables account information to be transferred safely within departments & branchestransferred safely within departments & branches General Business:General Business: communication between remotecommunication between remote employees can be securely exchangedemployees can be securely exchanged
  • 26. Statistics From Gartner-Statistics From Gartner- Consulting*Consulting* 50% 63% 79% 90% 0% 20% 40% 60% 80% 100% Access to network for business partners/customers Site-to-site connectivity between offices Remote access for employees while traveling Remote access for employees working out of homes % of Respondents Percentages *Source: www.cisco.com
  • 27. Some Businesses using a VPNSome Businesses using a VPN CVS Pharmaceutical Corporation upgraded theirCVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPNframe relay network to an IP VPN ITW Foilmark secured remote location orders,ITW Foilmark secured remote location orders, running reports, & internet/intranetrunning reports, & internet/intranet communications w/ a 168-bit encryption bycommunications w/ a 168-bit encryption by switching to OpenReach VPNswitching to OpenReach VPN Bacardi & Co. Implemented a 21-country, 44-Bacardi & Co. Implemented a 21-country, 44- location VPNlocation VPN
  • 28. Where Do We See VPNsWhere Do We See VPNs Going in the Future?Going in the Future? VPNs are continually being enhanced.VPNs are continually being enhanced. Example:Example: Equant NVEquant NV As the VPN market becomes larger, moreAs the VPN market becomes larger, more applications will be created along withapplications will be created along with more VPN providers and new VPN types.more VPN providers and new VPN types. Networks are expected to converge toNetworks are expected to converge to create an integrated VPNcreate an integrated VPN Improved protocols are expected, whichImproved protocols are expected, which will also improve VPNs.will also improve VPNs.
  • 29. Pop Quiz!Pop Quiz! VPN stands for… a) Virtual Public Network b) Virtual Private Network c) Virtual Protocol Network d) Virtual Perimeter Network Q.1Q.1
  • 30. Pop Quiz!Pop Quiz! A.1A.1 b) Virtual Private Network VPN stands for… VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only "virtually" private, however, because this data actually travels over shared public networks instead of fully dedicated private connections.
  • 31. Pop Quiz!Pop Quiz! What are the acronyms for the 3 most common VPN protocols? Q.2Q.2
  • 32. Pop Quiz!Pop Quiz! A.2A.2 • PPTP • L2TP • IPsec 3 most common VPN protocols are… PPTP, IPsec, and L2TP are three of today's most popular VPN tunneling protocols. Each one of these is capable of supporting a secure VPN connection.
  • 33. Pop Quiz!Pop Quiz! What does PPTP stand for? Q.3Q.3
  • 34. Pop Quiz!Pop Quiz! A.3A.3 PPTP = Point-to-Point Tunneling Protocol !
  • 35. Pop Quiz!Pop Quiz! What is the main benefit of VPNs compared to dedicated networks utilizing frame relay, leased lines, and traditional dial-up? Q.4Q.4 a) better network performance b) less downtime on average c) reduced cost d) improved security
  • 36. Pop Quiz!Pop Quiz! A.4A.4 c) reduced cost The main benefit of VPNs is… The main benefit of a VPN is the potential for significant cost savings compared to traditional leased lines or dial up networking. These savings come with a certain amount of risk, however, particularly when using the public Internet as the delivery mechanism for VPN data.
  • 37. Pop Quiz!Pop Quiz! In VPNs, the term "tunneling" refers to Q.5Q.5 a) an optional feature that increases network performance if it is turned on b) the encapsulation of packets inside packets of a different protocol to create and maintain the virtual circuit c) the method a system administrator uses to detect hackers on the network d) a marketing strategy that involves selling VPN products for very low prices in return for expensive service contracts
  • 38. Pop Quiz!Pop Quiz! A.5A.5 b) the encapsulation of packets inside packets of a different protocol to create and maintain the virtual circuit In VPNs, the term "tunneling" refers to…