Final Project Report
Mentor,
Pantea Nayebi
Team Members,
Gouri, Jayaprakash (C0700450)
Mintu, Varghese (C0696945)
Uthaya Nidhi, Kesarimangakam S Vanaja (C0694699)
Varun, Joseph (C0693430)
Table of Contents
1. Introduction……………………………………………………………………………..3
2. Virtual Private Network (VPN)………………………………………………………....3
3. Classification…………………………………………………………………………....4
3.1. Secure VPN……………………………………………………………………….4
3.2. Trusted VPN………………………………………………………………………5
4. Architecture of VPN……………………………………………………………………5
4.1. Intranet VPN………………………………………………………………………5
4.2. Extranet VPN……………………………………………………………………..6
4.3. Remote Access VPN……………………………………………………………...7
5. Typical elements of VPN…………………………………………………………….…7
6. Advantages of VPN………………………………………………………………….….8
7. OSI Model…………………………………………………………………………….…9
8. Security Protocols……………………………………………………………………..10
9. VPN Topology………………………………………………………………………...11
10. Productivity and Cost Benefit…………………………………………………………12
11. The Future of VPN…………………………………………………………………….14
12. Conclusion …………………………………………………………………………….15
13. Bibliography…………………………………………………………………………...16
1.Introduction
Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the …show more content…
When properly chosen,implemented, and used, such techniques can provide secure communicationsover unsecured networks. Because such choice, implementation, and use arenot trivial, there are many insecure VPN schemes on the market. SecureVPN technologies may also be used to enhance security as a 'securityoverlay' within dedicated networking infrastructures.Secure VPN protocols include the