Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

S.

Name / Fadhil Mohammed Mujbel Ahmed Subhi Wahhab

Fourth stage (evening)

Course material / Networking

Name of subject teacher /Mr. Mohammed Ridha Nsaif

For initial study students / electronic final exams / first semester

2019-2020

Report Title :

What is the VPN connection


In today's insecure world, there comes a need to gain ability to transfer
information in a network that won't be seen, or intercepted by unauthorized
people. The traditional way was to use a point to point lines where the lines
were just for you and the people you need to pass covert information to.
However, these lines were very expensive, and inflexible. What they needed
was to the ability to communicate safely through a public network. Thus
came the Virtual Private Network ( VPN )

The VPN purpose is to create a private connection between multiple people


and devices across the Internet. In effect it is an Internet within an Internet,
secure private and encrypted from prying eyes, malware, hackers and anyone
else who may wish to know where you surf, or where you are surfing from.
A Common Sense Definition of Virtual Private Networks
VPN Motivations
Types of VPN’s
How to choose a good VPN
Advantage of VPN
Disadvantage of VPN
Options for connecting to VPN services
Conclusions
References
A Common Sense Definition of Virtual Private Networks
VPN: VPN stands for (Virtual Private Network). It creates a secure and
encrypted connection over a less secure network. When a user connects to a
VPN, all his/her data and traffic get routed through that network. By
connecting to a VPN, the IP address also gets changed with the server’s
address. Its servers are located in multiple countries around the world.

VPN Motivations
A VPN works by routing your device's internet connection through your
chosen VPN's private server rather than your internet service provider (ISP)
so that when your data is transmitted to the internet, it comes from the VPN
rather than your computer.

Reasons for using a VPN :


 Hide browsing history and activity from the network and from the
service provider
 Browse blocked websites and services
 Bypass censorship on the Internet
 Connecting to the work network or home network while traveling or
outside
Types of VPN’s

To simplify the description of the different types of VPN’s, they have been
principally broken down in this paper into categories which reside in the
different layers of the TCP/IP protocol suite

3.1 Network Layer VPN’s

3.1.1 Controlled Route Leaking

3.1.2 Tunneling

3.1.2.1 Traditional Modes of Tunneling

3.1.2.2 Virtual Private Dial Networks (VPDN’s)

3.1.3 Network Layer Encryption


3.2 Link-Layer VPN’s

3.2.1 ATM and Frame Relay Virtual Connections

3.2.2 MPOA (Multi Protocol Over ATM) and The “Virtual Router” Concept

3.2.3 Multi-Protocol Label Switching

3.2.4 Link-Layer Encryption

3.3 Transport and Application Layer VPN’s

How to choose a good VPN

The protocol used (for example, the SSL protocol)


Where the VPN server is located
Reliability, company trust and failure to record user activity
Its support for fighting malware and spyware
Cost, VPN cost
Quality of service and technical support
The company is required to provide VPN software on computer and
mobile
Advantage of VPN
 Compatible with most devices.
 Completely anonymous.
 Provides top-of-the-line encryption protocols.
 Helps to bypass Geo-Blocks.
 Prevents Bandwidth Throttling.
 Bypass Firewalls.

Disadvantage of VPN
 VPN has Weak encryption.
 VPN is not completely free you have to pay to use.
 Software failures problem.  Using wrong VPN can put privacy in
danger.
 VPN connection breaks some times.
 In VPN it is difficult to check the quality of encryption.

Options for connecting to VPN services


A. Free services
B. Paid services
C. [Better still] , get a private server
Conclusions
he pertinent conclusion here is that while a VPN can take many forms,
there are some basic common problems that a VPN is built to solve,
which can be listed as virtualization of services and segregation of
communications to a closed community of interest, while simultaneously
exploiting the financial opportunity of economies of scale of the
underlying common host communications system.

References
 http://www.wired.com/wired/6.02/hypelist.html
 http://www.ccil.org/jargon/
 http://work.ucsd.edu:5141/cgi-bin/http_webster
 http://www.anl.gov/ECT/Public/research/morphnet.html
 http://www.faqs.org/rfcs/rfc1997.html
 http://www.faqs.org/rfcs/rfc1701.html
 http://sunsite.cnlab-switch.ch/ftp/mirror/internet-drafts/draft-ietf-pppext-l2tp-
10.txt
 http://www.microsoft.com/backoffice/communications/morepptp.htm
 ftp://ftp.isi.edu/mbone/faq.txt
 http://sunsite.cnlab-switch.ch/ftp/mirror/internet-drafts/draft-ietf-rolc-nhrp-
15.txt
 http://sunsite.cnlab-switch.ch/ftp/mirror/internet-drafts/draft-ietf-rolc-nhrp-
15.txt
 http://www.faqs.org/rfcs/rfc2131.html

You might also like