Unit 1 Assignment 1. What Is A VPN

Great Essays
What is a VPN? It stands for virtual private network. Its main purpose is to secure the connections between the host and the server. It fulfills that purpose by using tunneling protocols, encryption, data encapsulation and certified connections to protect the identity of the host. The simplest way to think about it is to compare it to a LAN connection but without wiring.
The History of VPN: Early VPNs were often set up to give individual employees secure remote access to their company networks, hence the name “virtual private network”. By connecting to the company’s network, an individual employee can access all the company’s resources and services as if the employee were inside the company.
Since then, VPNs have evolved to provide the same
…show more content…
It benefits the separated end systems and helps them to have secured connection.
Remote access VPNs:
Corporate VPN: It makes the VPN of the corporate think that the VPN of the sender is still the same one as his basic office regardless of where he is or what device he is using.
Personal VPN: It is similar to the corporate VPN service but used by individuals to secure any public WIFI networks. All connections will be encrypted, making it impossible for hackers or snoopers to steal any private information.

Why mask my IP address?
Security:
When you use a VPN, your IP address is masked so you can surf the web anonymously. Thus, no one can find out where you connect from or what you do online.
Geographic freedom: By exchanging your IP address with the VPN server’s IP address, you can virtually connect from a geographic location that is different from where you are physically located. This enables you to bypass regional internet restrictions and get access to content or internet services that are otherwise restricted or censored in the location you are staying
…show more content…
Because it does not provide any encryption or authentication features by itself, it is usually paired with an encryption protocol such as IPsec.
2. PPTP family
Point Tunneling Protocol (PPTP)
It uses a point-to-point protocol to make a direct connection between two nodes. It was the first VPN protocol to be supported by Microsoft Dial-up Networking and has been bundled into all releases of Microsoft Windows since Windows 95. The Microsoft connection has been an important part of PPTP’s acceptance in the market.
While the PPTP protocol has the advantage of a pre-installed client base on Windows platforms, analysis by cryptography experts have identified several security issues such as its vulnerability to password guessing attacks.
3. SSL family
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
SSL is commonly used to secure online shopping as a user’s web browsers can almost transparently switch to SSL without requiring additional configuration or extra software. SSL was the industry standard before it evolved into Transport Layer Security. The SSL protocol works at the application level independent of the specific network. The “sockets” part of the term refers to the sockets method of passing data back and forth between a client and a server or program layers in the same

Related Documents

  • Improved Essays

    Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for IPv4 access to VPN and IPv6 tunnel are completely independent. From the host's perspective, the tunnel configuration depends on the operating system used.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Pt2520 Unit 1 Assignment

    • 382 Words
    • 2 Pages

    PROPOSED METHODOLOGY OF PGP FRAMEWORK OF ENSURING SECURITY Distributed computing environment are a multidomain environment. Among which diverse area can utilize security, protection and trust prerequisites in an alternate way. So to the extent distributed computing is recently thought to create security has made business Web conceivable. Secure Socket Layer (SSL) like these cryptographic conventions are utilized for securing information and encryption reason.…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Kerberos authentication protocol that establishes a trusted connection between hosts in the untrusted network. The key function of this protocol is that it allows a single sign-on in a distributed network. It's best features lays in the fact that the password does not get shared over the network between nodes. In addition, it uses KDC - key distribution center which keeps the access maintained.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    A protocol suit contains a layered structural design where each layer represents some functionality which can be passed out by a protocol. Each layer usually contains more than one protocol options to carry out the duty that the layer follows to. TCP/IP usually has 4 layer system…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Personal area networks commonly include a portable machine, a cell and/or a handheld figuring gadget, for example, a PDA. You can utilize these networks to exchange documents including email and…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    This will require the ability to perform certain automated tasks: “Deploy appropriate management systems that can support the provision of the services within the appropriate resources; Setting up VPNs on demand, depending on the user and network’s context; Support for automatic vertical handover to ensure the best possible access to the network; Support for the management communication overlays’ setting up with uniform distribution of traffic load; Reaction to Quality of Service degradations identifying their causes and restoring the services concerned in a transparent manner” (Davy, Steven, 2010, p. 106). Using the strongest possible encryption method for VPN access is also a way to continue to improve the security of the VPN. As additional encryption methods are introduced they need to be worked in to the VPN…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    The router takes information from the modem and moves it to the computer. You don’t need to have a router but they are very useful as they allow you to take data from multiple networks and then send that data to multiple computers therefore allowing more than one person to use the internet at the same time using the same connection. Web server: A web server is a computer that stores all the information needed to display a website. This will include things such as images, files, scripts and pages that make up the website. Once there is an access to the site the browser will get the data from the web server.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    to use. These are designed for the typical users to complete normal work, normally in the school’s network they will have limitations on student accounts, for example, there are many sites that they cannot access, and their computer will only hold the essential applications (software), etc. It is very common to see Windows operating system installed in these workstations however they might not be up to date as it can be costly, hence they would use older versions of windows operating system. • Interconnection devices are a physical piece of hardware used to connect the users to a network they are connected to, some examples of these interconnection devices are: o Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth. o Switches – While routers send data packets, switches filter these data packets and then send the data packet to its destination, however it has very limited functions, it is more advanced than a hub, however it is less compared to a router.…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Final Exam Paper

    • 1307 Words
    • 6 Pages

    2.3 What is Protocol? Protocol is defined as a set of Rules which governs the communication to a network Between the Layers. In Order to establish a communication in a network Successfully, These are the Following Example: File Transfer Protocol, Simple Mail Transfer Protocol. 2.4…

    • 1307 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Overview: VPN users have the facility to anonymize internet their internet connection with Torguard. It provides P2P and Torrent related activities to its customers on most of its servers. It has a simple interface to facilitate the users and better than average performance which is satisfactory for most of the users but according to reviewers it lacks some features. Though options and services are quite good but the website of Torguard VPN is not very user-friendly and confusing. It provides you with manual selection of server.…

    • 241 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    A dynamic IP address is when the computers change their IP time to time constantly There are 2 different versions if the Internet Protocol being used. IP Version 4 (IPv4) and IP Version 6…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The internet consists of a large number of network domains that are called autonomous systems (AS). Autonomous Systems provide internet access to servers and to one another based on the relationships between autonomous systems. These relationships can be broken down into three main categories: • Provider-Customer relationship: In this relationship the customer pays the provider to carry his/her traffic to and fro the provider’s network. The network providers’ networks are generally quite huge and they offer their networks to carry customer’s traffic in return for fees.…

    • 1144 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays