0% found this document useful (0 votes)
212 views11 pages

Virtual Private Server

A virtual private server (VPS) is a virtual machines sold as a service by an Internet hosting service.[1] The VPS runs its own copy of its operating system, and customers have superuser-level access to that operating system instance, so can install almost any software that runs on that OS. For many purposes they are functionally equivalent to a dedicated physical server, and being software defined are able to be much more easily created and configured.

Uploaded by

oureducation.in
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
212 views11 pages

Virtual Private Server

A virtual private server (VPS) is a virtual machines sold as a service by an Internet hosting service.[1] The VPS runs its own copy of its operating system, and customers have superuser-level access to that operating system instance, so can install almost any software that runs on that OS. For many purposes they are functionally equivalent to a dedicated physical server, and being software defined are able to be much more easily created and configured.

Uploaded by

oureducation.in
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

VIRTUAL PRIVATE NETWORK

OUTLINE

VIRTUAL PRIVATE NETWORK

A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users an access to a central organizational network.
It is a computer network using a public telecommunication infrastructure for providing remote offices or individual users secure access to their organization's network

It is a computer network using a public telecommunication infrastructure for providing remote offices or individual users secure access to their organization's network. VPNs may serve any network functionality that is found on any network, such as sharing of data and access to network resources, printers, databases, websites, etc. A VPN user typically experiences the central network in a manner that is identical to being connected directly to the central network.

Types of VPN

the protocols used to tunnel the traffic. the tunnel's termination point, i.e., customer edge or network-provider edge.

whether they offer site-to-site or remote-access connectivity


the levels of security provided.

Characteristics Of Virtual Private Networks

NETWORK member workstations in touch by IP address VIRTUAL physically not a network geographically dispersed no common hub/wire

PRIVATE but traffic on that wire cant be tapped

Need For VPN

Extending geographical connectivity


User authentication Address management Data encryption Key management Multiprotocol support

VPN Technologies
TUNNELING
-VPN tunneling involves establishing maintaining a logical network connection. and

-On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, and finally de-encapsulated on the receiving side.

THANK YOU

You might also like