Virtual Private Network: History, Challenges, Scope, and Future Research

Verified

Added on  2023/04/21

|14
|701
|165
Presentation
AI Summary
Learn about the history, challenges, scope, and future research areas of Virtual Private Networks (VPNs). Understand how VPNs provide secure transactions and prevent unauthorized access to internal networks. Explore the complexities and limitations of VPN implementation and the potential for future advancements in network security.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Virtual
Private
network
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
History and background
The history of VPN (virtual private network)
technology dates back to 1996, when a
Microsoft employee developed the peer-to-
peer tunnelling protocol, or PPTP.
It also prevents the access from geo
restriction area and make sure authenticated
connection is established [1]. It is created so
that secure point to point connection is
established and assures that data is
encrypted.
Document Page
Virtual private networks us used to secure the transactions
that take place over the network
Document Page
One of the approach that is used for securing the data
packets in tunnelling [2].
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Continued
Virtual private network can be said as an
extended private network that allows
users to send and receive the information
through public networks [2]. They are
directly connected to private network and
are offers security.
Document Page
Challenges and drawbacks
Some of the challenges that are faced
by organisation is due to
implementation of virtual private
network as it requires higher level of
understanding [3].
Virtual private network sometimes
causes security issues in case of
wireless connection. Thus, it is
important for the IT professionals to
establish a secure solution.
Document Page
Continued
It offers drawbacks like complexity in
setting up the network and controlling the
entire business through a VPN hosted
network. Thus, to meet the standards this
requires a reliable internet service provider.
Virtual private networks have gained
popularity but still there exists a little
limitation as it requires a detailed
understanding of network security so that
configurations could be done easily.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Scope
The scope of VPN is that in reduces the
risk of security breaches and cybercrimes
The scope of VPN is that in ensures that
unauthorised users do not access the
internal networks of an organisation [4].
The use of virtual private networks is to
be controlled by one time password and it
also forces all traffic to and from the PC to
tunnels.
Document Page
Future research areas
Some of the research areas of VPN are:
Researches in Open source projects.
Researches related to Protocol obfuscation.
Scientists are working on Authentication through
Anonymous tokens.
Researchers are concentrating on Network
Access Control [3].
Complete VPN client automation are being
tested.
Multi-factor authentication is getting found out.
Document Page
Future Works
VPNs have become much more common
from last year and will occupy a huge
place in the next 10-15 years. There work
same as firewalls but it the coming time
everyone will switch from firewalls to VPN
[4].
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Continue
In the coming years it is predicted that VPNs will
focus on Network Access Control, assessing the
connecting device to determine if it is in the right
state to connect.
Document Page
Conclusion
Virtual private networks have gained
popularity but still there exists a little
limitation as it requires a detailed
understanding of network security so that
configurations could be done easily. The
reliability and performance is not under
the control of organisation
Document Page
References
[1] Nagarajan, Vikram, Robert W. Kebler, Eric C. Rosen, Princy
T. Elizabeth, and Kapil Arora. "Communicating igmp leave
requests between load-balanced, multi-homed provider-edge
routers in an ethernet virtual private network." U.S. Patent
Application 15/281,362, filed February 1, 2018.
[2] Shen, Naiming, Jun Zhuang, and Enke Chen. "Virtual
private network forwarding and nexthop to transport
mapping scheme." U.S. Patent 9,825,777, issued November
21, 2017.
[3] Varanasi, Kanti, and Kevin Peterson. "Distributing and
sharing licenses across network devices in a virtual private
network (VPN)." U.S. Patent 8,955,099, issued February 10,
2015.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Continue
[4] Border, John, Douglas Dillon, and Peter
Pardee. "Method and system for
communicating over a segmented virtual
private network (VPN)." U.S. Patent
9,832,169, issued November 28, 2017.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]