0% found this document useful (0 votes)
111 views

Abstract:-Virtual Private Network: History

Virtual private networks (VPNs) allow users to securely access an organization's internal network over a public network like the Internet. VPNs avoid the high costs of leased lines by using the existing public network infrastructure for secure data transfers between networked devices not on the same private network. There are different types of VPNs that can provide remote access, connect local area networks, or control access within an intranet. VPNs provide benefits like cost savings compared to leased lines, scalability by leveraging public networks, and secure remote access to internal networks. However, VPNs also have disadvantages like needing expertise to select secure technologies and dealing with standards maturity between vendors.

Uploaded by

Dhanjj Yadav
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views

Abstract:-Virtual Private Network: History

Virtual private networks (VPNs) allow users to securely access an organization's internal network over a public network like the Internet. VPNs avoid the high costs of leased lines by using the existing public network infrastructure for secure data transfers between networked devices not on the same private network. There are different types of VPNs that can provide remote access, connect local area networks, or control access within an intranet. VPNs provide benefits like cost savings compared to leased lines, scalability by leveraging public networks, and secure remote access to internal networks. However, VPNs also have disadvantages like needing expertise to select secure technologies and dealing with standards maturity between vendors.

Uploaded by

Dhanjj Yadav
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Abstract:- Virtual private network

History :

Until the end of the 1990s, networked computers were connected through expensive leased lines and/or
dial-up phone lines.

Virtual Private Networks reduce network costs because they avoid a need for many leased lines that
individually connect remote offices (or remote users) to a private Intranet (internal network). Users can
exchange private data securely, making the expensive leased lines unnecessary.[1]

VPN technologies have a myriad of protocols, terminologies and marketing influences that define them.
For example, VPN technologies can differ in:

• The protocols they use to tunnel the traffic


• The tunnel's termination point, i.e., customer edge or network provider edge
• Whether they offer site-to-site or remote access connectivity
• The levels of security provided
• The OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network
connectivity

Some classification schemes are discussed in the following sections.

What is VPN :

A virtual private network (VPN) is a computer network that uses a public telecommunication
infrastructure such as the Internet to provide remote offices or individual users with secure access to their
organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by
only one organization.

It encapsulates data transfers between two or more networked devices which are not on the same private
network so as to keep the transferred data private from other devices on one or more intervening local or
wide area networks. There are many different classifications, implementations, and uses for VPNs.

Field of VPN :

The VPN (virtual private network) is the field related to the computer science and mainly to the computer
network .

VPNs can support at least three different modes of use:

· Remote access client connections

· LAN-to-LAN internetworking

· Controlled access within an intranet


Advantages :

• The most obvious one is cost savings. A VPN topography frees you up from the expense of long-
haul lease lines in favor of a local dedicated link to a service provider— and the link can either be a
local leased line or a local broadband connection. And as we discussed earlier, if you’re using
VPNs for remote access, you eliminate long-distance telephone charges that would be involved in
dial-up RAS connections.

• Next, because VPNs leverage the existing public network infrastructure, you gain the advantage of
scalability. Your VPN links can take you wherever the public network goes.

• VPNs provide a relatively simple means of giving designated remote users or client devices secure
access to your LAN.

• Finally, a VPN provides WAN capability with the economies of scale and accessibility provided by
the
Internet.

DisAdvantage :

• Need clear understanding of public network security issues to select appropriate


technologies and vendors

• Standards are immature, so getting vendors to work together can be difficult

• Availability and performance depend on factors outside your control (Internet)

Conclusion :

• VPNs provide compelling advantages

• Technical evaluation, assessment and support are critical

• VPNs gaining momentum, but plan ahead to make any transition orderly and
nondisruptive

You might also like