Title: VPN (Virtual Private N/W)
1VPN (Virtual Private N/W)
2Outline
- What is VPN ??
- Encryption Method
- Tunneling
- Complete Process Involved In Tunneling
- Real Time Example
- Performance
- Advantages
- Conclusion
3What is VPN ??
- Uses Virtual connection
- Internet
- Leased Lines
4Public Private Key Encryption Process
Private Key
Host 2
Public Key
Host 1
Encryption
Encrypted Data
Host 3
Decrypted Data
Public Key
Decryption
5VPN Tunneling
6Tunneling
Encryption
Host 1
Internet
VPN Device
VPN Device
Host 2
Decryption
7Real Time Example
VPN
Software Company
Client
Wants to communicate
8Performance
Packet Reached The Destination
Packets On the Way to Destination
Internet
Packet
Source Router
Destination Router
9Performance In VPN Cntd..
Packet Reached The Destination
Packets On the Way to Destination
Internet
Packet
Source VPN Device
Destination VPN Device
10Advantages
- Extend geographic connectivity
- Improve security
- Reduce operational costs versus traditional WAN
- Provide global networking opportunities
11Conclusion
Once a Virtual Private Network tunnel is
established, the client computer is, for all
intents and purposes, networked with the server
or other computers at the servers location as if
connected via a local area network.