by:- rahul ranjan singh suman kumar singh girish sharma sneha kumari smriti kumari
TRANSCRIPT
![Page 1: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/1.jpg)
A PRESENTATION ONVIRTUAL PRIVATE
NETWORK(VPN)
BY:-
Rahul Ranjan Singh
Suman Kumar Singh
Girish Sharma
Sneha kumari
Smriti kumari
![Page 2: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/2.jpg)
Traditional Connectivity
![Page 3: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/3.jpg)
VIRTUAL PRIVATE NETWORK:-
A set of hardware, software and procedures
That creates secure logical network.
It is type of private network that uses public telecommunication, such as internet instead of leased line to communicate.
![Page 4: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/4.jpg)
MAIN FUNCTION OF VPN:-
Authentication
Access Control
Confidentiality
Data Integrity
![Page 5: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/5.jpg)
CONT……..
Encryption
Tunneling
![Page 6: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/6.jpg)
IMPLEMENTATION:-
Extranet
Intranet
Remote Access
![Page 7: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/7.jpg)
![Page 8: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/8.jpg)
DEVICE TYPES:-
Hardware
Software
Firewall
![Page 9: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/9.jpg)
ADVANTAGES :- Cost saving
Emphasis on security
Greater redundancy is achieved
Efficiency
![Page 10: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/10.jpg)
INDUSTRIES THAT MAY USE:-
Healthcare
Manufacturing
Retail
Banking
![Page 11: BY:- Rahul Ranjan Singh Suman Kumar Singh Girish Sharma Sneha kumari Smriti kumari](https://reader031.vdocuments.mx/reader031/viewer/2022013122/56649f425503460f94c61c6b/html5/thumbnails/11.jpg)
THANK YOU