Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Virtual Private Network (VPN)
Post: #1

hi i want full detail
Post: #2
visit this thread for VPN:
Post: #3
Post: #4
This article is presented by:Sahil Sikka
Rohit Thapliyal

What is VPN?

Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.
Became popular as more employees worked in remote locations.
Gives users a secure link to access corporate network over the Internet

Private Networks vs. Virtual Private Networks

Employees can access the network (Intranet) from remote locations.
Secured networks.
The Internet is used as the backbone for VPNs
Saves cost tremendously from reduction of equipment and maintenance costs.

Remote Access Virtual Private Network
Brief Overview of How it Works

Two connections – one is made to the Internet and the second is made to the VPN.
Datagrams – contains data, destination and source information.
Firewalls – VPNs allow authorized users to pass through the firewalls.
Protocols – protocols create the VPN tunnels
Four Critical Functions

Authentication – validates that the data was sent from the sender.
Access control – limiting unauthorized users from accessing the network.
Confidentiality – preventing the data to be read or copied as the data is being transported.
Data Integrity – ensuring that the data has not been altered
Post: #5
to get information about the topic virtual private network full report ,ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: openwrt pptp vpn client, seminar topic on virtual private network using ipv6, project ideas using vpn, dynamic multipoint virtual private network abstract, access gateway vpn, mn private, windows vpn pptp error 619,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  cryptography and network security by atul kahate pdf torrent Guest 2 262 16-08-2016 12:08 PM
Last Post: Guest
  necola motherboard network drivers free download Guest 1 147 21-07-2016 10:04 AM
Last Post: jaseela123
  how to hack mtn network and free airtime and data Guest 2 344 16-07-2016 04:17 PM
Last Post: jaseela123
  how to steal airtime from vodacom network Guest 1 231 16-07-2016 12:04 PM
Last Post: jaseela123
  matlab code for steganography using wavelets neural network Guest 1 152 05-07-2016 12:21 PM
Last Post: visalakshik
  anna university question paper for network routing algorithm previous year questions Guest 1 153 02-07-2016 04:37 PM
Last Post: visalakshik
  literature review on virtual keyboard Guest 2 126 23-06-2016 11:55 AM
Last Post: seminar report asees
  network analysis by van valkenburg solution manual chapter 10 Guest 1 111 11-06-2016 02:27 PM
Last Post: dhanyavp
  how to hack mtn network and free airtime and data Guest 1 397 07-06-2016 04:05 PM
Last Post: dhanyavp
  cryptography and network security by atul khare pdf download srabonigorai 1 141 01-06-2016 04:33 PM
Last Post: dhanyavp