SlideShare une entreprise Scribd logo
1  sur  29
Networks and VPN Computer Networks and how it relates to Internet Security
Purpose The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security. Topics Covered: Computer Networks  IP Addressing Traffic Routing Security
Networking Terms Network Switch Connects multiple computers on network Router Connects a network to the Internet Contains a list of its known addresses Protects its own network from the outside Ethernet cable Connects a computer to a network WIFI A wireless connection to a network
Computer Network A computer network is a collection of computers that are connected and are communicating. They generally communicate through a communication device called a network switch, or switch for short.
Network Types ,[object Object]
WAN - Wide Area Network
VPN - Virtual Private networkComputer networks come in various types, shapes, and sizes.  We’ll talk about the following:
Local Area Networks A LAN is a network that is limited to a specific geographical location. Used in a home, smaller school, or smaller business. The computers will likely be connected using Ethernet cables or though WIFI.
Wide Area Networks A WAN is a collection of LANs that are interconnected, or simply, a network of LANs. A WAN is useful for: Splitting larger networks Joining together networks in different geographical locations.
Communication So, how do these computers communicate? In order for computers to communicate with each other, they need to have an addressing scheme. Networks use Internet Protocol addresses(IP addresses).
IP Addresses An IP address is a numeric number assigned to a device.  Each IP address on a particular network is unique. The IP address tells the networking equipment the device’s location on the network. Think of it like your house address: Your street and house number identify your location.  However, they may not be unique, but they are unique within your zip code.
Public and Private IP Addresses An IP address may be public or private.
Public and Private IP Addresses Think about it like a university mail system.
Public and Private IP Addresses The student’s mailbox at the university is private and only has meaning to the university.
Public and Private IP Addresses The university’s address is public and known by the post office.
Public and Private IP Addresses The post office only knows to deliver the mail to the university.
Public and Private IP Addresses The university then has the information to know which student’s box the mail goes in.
Routers Routers direct or route the internet traffic. When a router receives data with a destination IP address, it knows where to send it. Routers come in all shapes and sizes and are built for different purposes. Home router Commercial router
Routing The university post office acts like a router: It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere. When it receives mail from the public post office, it determines what to do with it. If the student’s mailbox exists, it is delivered.  If the student’s mailbox does not exist, the mail is discarded or returned.
Security Now that you understand how networks operate, let’s talk a bit about security.
Unsecure WAN Typically, most data across the internet is open and can be intercepted and then downloaded. For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded. A VPN can prevent this scenario!
Virtual Private Network A VPN extends a LAN to a remote user using a public network, such as the internet. This is possible by creating a secure tunnel from the user to a VPN Server on another network. Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.
A WAN using VPN A VPN creates a tunnel through the Internet. The data exchange between the office networks are all encrypted. Each office can now access the data in the other offices as if they were on the same network.
Why use a VPN? Securely access files on a remote LAN with ease Cost Effective Location hiding
VPN – Location Hiding Tom recently moved to Turkey Tom needs YouTube for a school assignment …but, Turkey blocks YouTube
VPN – Location Hiding Tom has an idea! Tom connects to his school’s network in the USA via VPN
VPN – Location Hiding Bingo! He can know access YouTube. Why?  The VPN allowed him to view YouTube as if he was physically connected at his school.
Resources http://www.ehow.com/about_4671848_what-is-vpn.html http://www.ciaograzie.it/listing/poli/tsr/VPN_E_A.pdf http://en.wikipedia.org/wiki/Routing_table http://en.wikipedia.org/wiki/Router http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm http://en.wikipedia.org/wiki/IP_address http://en.wikipedia.org/wiki/Computer_network http://en.wikipedia.org/wiki/Virtual_private_network
Image References Gnome Network:  http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg School IP:  http://commons.wikimedia.org/wiki/File:School_ip.svg Router:  http://commons.wikimedia.org/wiki/File:Router.svg File Lock:  http://commons.wikimedia.org/wiki/File:Lock_icon.png VPN Tunnel:  http://commons.wikimedia.org/wiki/File:VPN_remote.jpg RJ45 Jack:  http://commons.wikimedia.org/wiki/File:Network-wired.svg LAN Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg LAN/WAN Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svg House Number: House Number: http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg

Contenu connexe

Tendances

Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)IMRAN KHAN
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3Tutorials Tips Tricks
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service providerAtika Zaimi
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNSovello Hildebrand
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceTransweb Global Inc
 
A fieldtrip through the ladse network
A fieldtrip through the ladse networkA fieldtrip through the ladse network
A fieldtrip through the ladse networkcmorfoot
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Computer networks
Computer networksComputer networks
Computer networksSudar Sudar
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networkingshierly pabello
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshowchairesj
 

Tendances (20)

Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
5 - Networking
5 - Networking5 - Networking
5 - Networking
 
IP Address
IP AddressIP Address
IP Address
 
Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
Assignment no 4
Assignment no 4Assignment no 4
Assignment no 4
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network
NetworkNetwork
Network
 
Implementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPNImplementation of a Virtual Private Network - VPN
Implementation of a Virtual Private Network - VPN
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer Science
 
A fieldtrip through the ladse network
A fieldtrip through the ladse networkA fieldtrip through the ladse network
A fieldtrip through the ladse network
 
Data Communication
Data Communication Data Communication
Data Communication
 
Computer networks
Computer networksComputer networks
Computer networks
 
Wlan Basics
Wlan BasicsWlan Basics
Wlan Basics
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networking
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
 

Similaire à Networks and VPN

What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdfEIHEducation
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Chapter- 4.pptx
Chapter- 4.pptxChapter- 4.pptx
Chapter- 4.pptxKviskvis
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2MDHASNAIN23
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
What is a VPN 2.pdf
What is a VPN 2.pdfWhat is a VPN 2.pdf
What is a VPN 2.pdfEIHEducation
 
Computing - Networks
Computing - NetworksComputing - Networks
Computing - NetworksJamie Hutt
 
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfTypes of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfsunil shukla
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptxSonuSingh81247
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfAceAtigaVallo
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsSovello Hildebrand
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 

Similaire à Networks and VPN (20)

What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdf
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
What is a VPN.pdf
What is a VPN.pdfWhat is a VPN.pdf
What is a VPN.pdf
 
AWS VPC .pptx
AWS  VPC .pptxAWS  VPC .pptx
AWS VPC .pptx
 
Chapter- 4.pptx
Chapter- 4.pptxChapter- 4.pptx
Chapter- 4.pptx
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
What is a VPN 2.pdf
What is a VPN 2.pdfWhat is a VPN 2.pdf
What is a VPN 2.pdf
 
Computing - Networks
Computing - NetworksComputing - Networks
Computing - Networks
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Class note 4
Class note 4Class note 4
Class note 4
 
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfTypes of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
 
Kai
KaiKai
Kai
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
 
Private LTE.pdf
Private LTE.pdfPrivate LTE.pdf
Private LTE.pdf
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 

Dernier

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Networks and VPN

  • 1. Networks and VPN Computer Networks and how it relates to Internet Security
  • 2. Purpose The purpose of this presentation is to talk about Virtual Private Networks (VPN) from the perspective of security. Topics Covered: Computer Networks IP Addressing Traffic Routing Security
  • 3. Networking Terms Network Switch Connects multiple computers on network Router Connects a network to the Internet Contains a list of its known addresses Protects its own network from the outside Ethernet cable Connects a computer to a network WIFI A wireless connection to a network
  • 4. Computer Network A computer network is a collection of computers that are connected and are communicating. They generally communicate through a communication device called a network switch, or switch for short.
  • 5.
  • 6. WAN - Wide Area Network
  • 7. VPN - Virtual Private networkComputer networks come in various types, shapes, and sizes. We’ll talk about the following:
  • 8. Local Area Networks A LAN is a network that is limited to a specific geographical location. Used in a home, smaller school, or smaller business. The computers will likely be connected using Ethernet cables or though WIFI.
  • 9. Wide Area Networks A WAN is a collection of LANs that are interconnected, or simply, a network of LANs. A WAN is useful for: Splitting larger networks Joining together networks in different geographical locations.
  • 10. Communication So, how do these computers communicate? In order for computers to communicate with each other, they need to have an addressing scheme. Networks use Internet Protocol addresses(IP addresses).
  • 11. IP Addresses An IP address is a numeric number assigned to a device. Each IP address on a particular network is unique. The IP address tells the networking equipment the device’s location on the network. Think of it like your house address: Your street and house number identify your location. However, they may not be unique, but they are unique within your zip code.
  • 12. Public and Private IP Addresses An IP address may be public or private.
  • 13. Public and Private IP Addresses Think about it like a university mail system.
  • 14. Public and Private IP Addresses The student’s mailbox at the university is private and only has meaning to the university.
  • 15. Public and Private IP Addresses The university’s address is public and known by the post office.
  • 16. Public and Private IP Addresses The post office only knows to deliver the mail to the university.
  • 17. Public and Private IP Addresses The university then has the information to know which student’s box the mail goes in.
  • 18. Routers Routers direct or route the internet traffic. When a router receives data with a destination IP address, it knows where to send it. Routers come in all shapes and sizes and are built for different purposes. Home router Commercial router
  • 19. Routing The university post office acts like a router: It determines if the sending student’s mail should go to another student, or if it should go to the public post office to be delivered elsewhere. When it receives mail from the public post office, it determines what to do with it. If the student’s mailbox exists, it is delivered. If the student’s mailbox does not exist, the mail is discarded or returned.
  • 20. Security Now that you understand how networks operate, let’s talk a bit about security.
  • 21. Unsecure WAN Typically, most data across the internet is open and can be intercepted and then downloaded. For example, if the Field Support Office downloads a document from the Corporate Office, someone could intercept the same document as it is being downloaded. A VPN can prevent this scenario!
  • 22. Virtual Private Network A VPN extends a LAN to a remote user using a public network, such as the internet. This is possible by creating a secure tunnel from the user to a VPN Server on another network. Even though the user is physically in a different location, the VPN connection makes it look like the user is physically connected to that LAN.
  • 23. A WAN using VPN A VPN creates a tunnel through the Internet. The data exchange between the office networks are all encrypted. Each office can now access the data in the other offices as if they were on the same network.
  • 24. Why use a VPN? Securely access files on a remote LAN with ease Cost Effective Location hiding
  • 25. VPN – Location Hiding Tom recently moved to Turkey Tom needs YouTube for a school assignment …but, Turkey blocks YouTube
  • 26. VPN – Location Hiding Tom has an idea! Tom connects to his school’s network in the USA via VPN
  • 27. VPN – Location Hiding Bingo! He can know access YouTube. Why? The VPN allowed him to view YouTube as if he was physically connected at his school.
  • 28. Resources http://www.ehow.com/about_4671848_what-is-vpn.html http://www.ciaograzie.it/listing/poli/tsr/VPN_E_A.pdf http://en.wikipedia.org/wiki/Routing_table http://en.wikipedia.org/wiki/Router http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm http://en.wikipedia.org/wiki/IP_address http://en.wikipedia.org/wiki/Computer_network http://en.wikipedia.org/wiki/Virtual_private_network
  • 29. Image References Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg School IP: http://commons.wikimedia.org/wiki/File:School_ip.svg Router: http://commons.wikimedia.org/wiki/File:Router.svg File Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.png VPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg LAN Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg LAN/WAN Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svg House Number: House Number: http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg
  • 30. Image References cont. Mailboxes: http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpg Cisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677| Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpg Public sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG Mail truck: http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg
  • 31. Image References cont. Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.png YouTube: http://commons.wikimedia.org/wiki/File:Youtube.svg No Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg

Notes de l'éditeur

  1. Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svgSchool IP : http://commons.wikimedia.org/wiki/File:School_ip.svgRouter: http://commons.wikimedia.org/wiki/File:Router.svgFile Lock: http://commons.wikimedia.org/wiki/File:Lock_icon.pngVPN Tunnel: http://commons.wikimedia.org/wiki/File:VPN_remote.jpg
  2. RJ45 Jack: http://commons.wikimedia.org/wiki/File:Network-wired.svg
  3. Network: http://commons.wikimedia.org/wiki/File:Server-based-network.svg
  4. Network: http://commons.wikimedia.org/wiki/File:Gateway_firewall.svgRouter: http://commons.wikimedia.org/wiki/File:Router.svg
  5. Gnome Network: http://commons.wikimedia.org/wiki/File:Gnome-preferences-system-network.svg
  6. House Number:http://commons.wikimedia.org/wiki/File:House_numbering_of_National_Quantum_Information_Centre_of_Gda%C5%84sk.jpg
  7. Private sign: http://commons.wikimedia.org/wiki/File:GWMNM_private_property_sign.jpgPublic sign: http://upload.wikimedia.org/wikipedia/commons/thumb/d/d3/Public_footpath_sign%2C_Alvechurch.JPG/512px-Public_footpath_sign%2C_Alvechurch.JPG
  8. Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  9. Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  10. Cardiff University: http://commons.wikimedia.org/wiki/File:Cardiff_University.JPG
  11. Mail truck:http://commons.wikimedia.org/wiki/File:USPS-Mail-Truck.jpg
  12. Mailboxes:http://commons.wikimedia.org/wiki/File:JMU_student_mailboxes.jpg
  13. D-Link Router: http://commons.wikimedia.org/wiki/File:D-Link_DI-524.jpgCisco Router: http://commons.wikimedia.org/wiki/File:Cisco_7603_Chassis.png
  14. Letter: http://office.microsoft.com/en-us/images/similar.aspx#ai:MC900127677|
  15. Paddle lock: http://commons.wikimedia.org/wiki/File:Abus_Lock.jpg
  16. Tunnel: http://commons.wikimedia.org/wiki/File:Tunnel_42m.jpg
  17. Turkey Map: http://commons.wikimedia.org/wiki/File:Turkey_map_blank.pngYouTube:http://commons.wikimedia.org/wiki/File:Youtube.svgNo Sign: http://commons.wikimedia.org/wiki/File:No_sign.svg