Virtual Private Network
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
22-09-2008, 09:46 AM

VPNs have emerged as the key technology for achieving security over the Internet. While a VPN is an inherently simple concept, early VPN solutions were geared towards large organizations and their implementation required extensive technical expertise. As a consequence, small and medium-sized businesses were left out of the e-revolution. Recently, VPN solutions have become available that focus specifically on the needs of small and medium-sized businesses. Historically, the term VPN has also been used in contexts other than the Internet, such as in the public
telephone network and in the Frame Relay network. In the early days of the Internet-based VPNs, they were
sometimes described as Internet-VPNs or IP-VPNs. However, that usage is archaic and VPNs are now synonymous
with Internet-VPNs.

Overview and Benefits
A firewall is an important security feature for Internet users. A firewall prevents data from leaving and entering an enterprise by unauthorized users. However, when packets pass through the firewall to the Internet, sensitive data such as user names, passwords, account numbers, financial and personal medical information, server addresses, etc. is visible to hackers and to potential e-criminals. Firewalls do not protect from threats within the Internet. This is where a VPN comes into play.

A VPN, at its core, is a fairly simple concept-the ability to use the shared, public Internet in a secure manner as if it were a private network. the flow of data between two users over the Internet when not using a VPN. As shown by the dotted lines, packets between a pair of users may go over networks run by many ISPs and may take different
paths. The structure of the Internet and the different paths taken by packets are transparent to the two users. With a VPN, users encrypt their data and their identities to prevent unauthorized people or computers from looking at the data or from tampering with the data.

A VPN can be used for just about any intranet and e-business (extranet) application. Examples on the following pages illustrate the use and benefits of VPN for mobile users and for remote access to enterpriseresources, for communications between remote offices and headquarters, and for extranet/e-business.

Remote Access
In this application, when not using a VPN, mobile and remote users often use analog (dial-up modems) or ISDN switched services to connect to a headquarters data center. This is shown in figure 2a. These connections are used to access e-mail, to download files and to execute other transactions. This type of connection would also be used by small offices that do not have a permanent connection to the enterprise intranet.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: virtual private network seminar report, virtual private network in mobile computing abstract, research paper on virtual private network, dynamic virtual private network ppt presentation, virtual private network reports 2011 pdf, virtual private network rsa pdf, vrtual private network ppt,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,412 31-03-2015, 09:08 AM
Last Post: Guest
  virtual keyboared jaseelati 0 152 22-01-2015, 01:51 PM
Last Post: jaseelati
  VIRTUAL P.C seminar projects crazy 4 3,888 08-10-2014, 03:33 PM
Last Post: DorothyKl
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 30,911 08-04-2014, 07:07 AM
Last Post: Guest
  Computerized Paper Evaluation using Neural Network computer science crazy 11 8,900 03-02-2014, 03:21 PM
Last Post: Guest
  Network Reconfiguration Using a Genetic Approach for Loss and Reliability Optimizati project report helper 1 1,587 16-10-2013, 05:35 AM
Last Post: dreambanned
  SIMULATION OF NETWORK PROTOCOLS: M/M/1 and M/M/1/N queues. seminar projects maker 0 411 25-09-2013, 04:29 PM
Last Post: seminar projects maker
  DATA STRUCTURES USED IN NETWORK PROGRAMMING seminar projects maker 0 553 25-09-2013, 04:27 PM
Last Post: seminar projects maker
  ppt on Wireless Mesh Network seminar projects maker 0 468 25-09-2013, 02:52 PM
Last Post: seminar projects maker
  Memory Management: Overlays and Virtual Memory ppt seminar projects maker 0 474 20-09-2013, 04:57 PM
Last Post: seminar projects maker