SlideShare a Scribd company logo
Mobile computing
NEXT
VPN
PRIVATE AND SECURE NETWORK WITH
outline
1.WHAT ARE MOBILE VPNS AND HOW
DO THEY WORK?
2.BENEFITS OF USING VPNS FOR
REMOTE ACCESS
3.SECURITY FEATURES OF VPNS
4.DIFFERENT TYPES OF VPN PROTOCOL
5.COMPARISON OF DIFFERENT VPN
SOLUTIONS
Mobile computing
NEXT
what is VPN
• establishes a digital connection between your
computer and a remote server.
• creating a point-to-point tunnel that encrypts your
personal data, masks your IP address, and lets you
sidestep website blocks and firewalls on the internet.
(Azure,2024)
• VPN technology was first used in 1996 when a
Microsoft employee developed the PPTP
Mobile computing
Home About Us Service Contact
HOW VPN
WORKS?
Every VPN uses a form of encryption to achieve a secure,
private connection, but the rules and procedures for
creating this connection are established by a particular
protocol.(Avast,2023)
Source: https://www.avast.com/c-vpn-protocols
security of vpn
Mobile computing
Data encryption and protection
Secure connection to corporate
networks
Preventing data interception
Data encryption and protection Secure Remote Access
Protection from cyber threads
Mobile computing
Security features of vpn
HERE THE INFORMATION ABOUT
STRONG
ENCRYPTION
PPROTOCOL
DATA
INTEGRITY
AND
AUTHENTICAT
ION
SECURE
TUNNELLING
Additional
Features
Mobile computing
Cross-platform
support
Cross-platform
support
Mobile app
availability
Simultaneous
device
connection
Types of VPN
Mobile computing
1. Remote Access VPN
When the users connects to their
private network
Types of VPN
Mobile computing
2. Site-to-site VPN
When many fixed location offices
establish a secured connection with
each other over a public network such
as the Internet.
(Saugat Bhattarai, 2016)
Two type of site-to-site VPN
Mobile computing
1.Intranet-based
connection of one or many remote
users in company network
2.Extranet-based
connection of one or many
company network to another
company
• PPTP VPNs(Point -to -point
transfer protocol)
• L2TP(Layer 2 transfer
protocol
• IPSec VPNs(Internet
protocol security)
• SSL VPN(Internet security
protocol)
VPN
PROTOCOLS
VPN, follows a set of protocols that
dictate the transmission of internet
data through the network. But
different VPN protocols offer varying
levels of speed, security, and
reliability. (Riadi, 2019)
INTRODUCING
Mobile computing
• Open VPN
• WireGuad
VPN
PROTOCOLS
Mobile computing
AN OVERVIEW OF THE MAIN VPN PROTOCOLS’ KEY FEATURES:
(AVAST, 2024)
Mobile computing
POPULAR VPNS SERVICE PROVIDER IN 2024 (TOP VPN SERVICES FOR 2024, 2024)
Arowwai Industries
POPULAR VPNS SERVICE PROVIDER IN 2024 (TOP VPN SERVICES FOR 2024, 2024)
Reference
Kaspersky. (2024). Smartphone VPNs: What You Need to Know. Retrieved from
Kaspersky:https://www.kaspersky.com/resource-center/threats/why-use-vpn-on-
smartphone
Klusaite, L. (2023, 11 29). OpenVPN explained: Definition, how it works, and safety.
Retrieved from NordVPN: https://nordvpn.com/blog/what-is-openvpn/
misheel, m. (2015). A Comprehensive Guide to Virtual Private Networks, Volume III: Cross-
Platform Key and Policy Management. In O. A. Martin W. Murhammer, VPN overview and
technology update. IBM Corporation, International Technical Support Organization .
paloalto. (2023). what are different types of VPN. Retrieved from paloalto networks:
https://www.paloaltonetworks.com/cyberpedia/types-of-vpn
Rouse, M. (2023, 12 14). Mobile vistual private network. Retrieved from Techopedia:
https://www.techopedia.com/definition/15958/mobile-virtual-private-network-mvpn
Saugat Bhattarai, S. N. (2016). VPN research term paper. Research gate(january,2016), 1-
11. https://doi.org/DOI: 10.13140/RG.2.1.4215.8160
Thank You

More Related Content

DOCX
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
PDF
Ip tunneling and vpns
DOC
Virtual private network
PDF
Ip tunnelling and_vpn
PDF
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
PDF
Katuwal_Arun_flex_get_vpn.pdf
DOC
Virtual private network
PPTX
Virtual Private Network
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Ip tunneling and vpns
Virtual private network
Ip tunnelling and_vpn
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
Katuwal_Arun_flex_get_vpn.pdf
Virtual private network
Virtual Private Network

Similar to Mobile vpn(Private and secure network). Mobile computing (20)

PPTX
VPN In Details
PPTX
PPT
my presentation on vpn
PPT
All About VPN
PPT
Allaboutvpn
PDF
Introduction to Virtual Private Network and Components
PDF
IRJET- A Survey of Working on Virtual Private Networks
PDF
Lan Virtual Networks
PDF
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
PDF
Virtual private networks
PPTX
Virtual Private Network
PDF
Firewall and vpn investigation on cloud computing performance
DOCX
Virtual Private Network
PPT
PDF
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
PDF
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
PPTX
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
PPTX
VPN & FIREWALL
PPT
Vp npresentation (1)
VPN In Details
my presentation on vpn
All About VPN
Allaboutvpn
Introduction to Virtual Private Network and Components
IRJET- A Survey of Working on Virtual Private Networks
Lan Virtual Networks
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
Virtual private networks
Virtual Private Network
Firewall and vpn investigation on cloud computing performance
Virtual Private Network
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VPN & FIREWALL
Vp npresentation (1)
Ad

Recently uploaded (20)

PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Digital Literacy And Online Safety on internet
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Funds Management Learning Material for Beg
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Introduction to Information and Communication Technology
DOCX
Unit-3 cyber security network security of internet system
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
innovation process that make everything different.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Job_Card_System_Styled_lorem_ipsum_.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Digital Literacy And Online Safety on internet
522797556-Unit-2-Temperature-measurement-1-1.pptx
Paper PDF World Game (s) Great Redesign.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Funds Management Learning Material for Beg
RPKI Status Update, presented by Makito Lay at IDNOG 10
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
tcp ip networks nd ip layering assotred slides
Introduction to Information and Communication Technology
Unit-3 cyber security network security of internet system
introduction about ICD -10 & ICD-11 ppt.pptx
Sims 4 Historia para lo sims 4 para jugar
innovation process that make everything different.pptx
SAP Ariba Sourcing PPT for learning material
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
presentation_pfe-universite-molay-seltan.pptx
Ad

Mobile vpn(Private and secure network). Mobile computing

  • 2. outline 1.WHAT ARE MOBILE VPNS AND HOW DO THEY WORK? 2.BENEFITS OF USING VPNS FOR REMOTE ACCESS 3.SECURITY FEATURES OF VPNS 4.DIFFERENT TYPES OF VPN PROTOCOL 5.COMPARISON OF DIFFERENT VPN SOLUTIONS Mobile computing NEXT
  • 3. what is VPN • establishes a digital connection between your computer and a remote server. • creating a point-to-point tunnel that encrypts your personal data, masks your IP address, and lets you sidestep website blocks and firewalls on the internet. (Azure,2024) • VPN technology was first used in 1996 when a Microsoft employee developed the PPTP Mobile computing
  • 4. Home About Us Service Contact HOW VPN WORKS? Every VPN uses a form of encryption to achieve a secure, private connection, but the rules and procedures for creating this connection are established by a particular protocol.(Avast,2023) Source: https://www.avast.com/c-vpn-protocols
  • 5. security of vpn Mobile computing Data encryption and protection Secure connection to corporate networks Preventing data interception Data encryption and protection Secure Remote Access Protection from cyber threads
  • 6. Mobile computing Security features of vpn HERE THE INFORMATION ABOUT STRONG ENCRYPTION PPROTOCOL DATA INTEGRITY AND AUTHENTICAT ION SECURE TUNNELLING
  • 8. Types of VPN Mobile computing 1. Remote Access VPN When the users connects to their private network
  • 9. Types of VPN Mobile computing 2. Site-to-site VPN When many fixed location offices establish a secured connection with each other over a public network such as the Internet. (Saugat Bhattarai, 2016)
  • 10. Two type of site-to-site VPN Mobile computing 1.Intranet-based connection of one or many remote users in company network 2.Extranet-based connection of one or many company network to another company
  • 11. • PPTP VPNs(Point -to -point transfer protocol) • L2TP(Layer 2 transfer protocol • IPSec VPNs(Internet protocol security) • SSL VPN(Internet security protocol) VPN PROTOCOLS VPN, follows a set of protocols that dictate the transmission of internet data through the network. But different VPN protocols offer varying levels of speed, security, and reliability. (Riadi, 2019) INTRODUCING Mobile computing
  • 12. • Open VPN • WireGuad VPN PROTOCOLS Mobile computing
  • 13. AN OVERVIEW OF THE MAIN VPN PROTOCOLS’ KEY FEATURES: (AVAST, 2024)
  • 14. Mobile computing POPULAR VPNS SERVICE PROVIDER IN 2024 (TOP VPN SERVICES FOR 2024, 2024)
  • 15. Arowwai Industries POPULAR VPNS SERVICE PROVIDER IN 2024 (TOP VPN SERVICES FOR 2024, 2024)
  • 16. Reference Kaspersky. (2024). Smartphone VPNs: What You Need to Know. Retrieved from Kaspersky:https://www.kaspersky.com/resource-center/threats/why-use-vpn-on- smartphone Klusaite, L. (2023, 11 29). OpenVPN explained: Definition, how it works, and safety. Retrieved from NordVPN: https://nordvpn.com/blog/what-is-openvpn/ misheel, m. (2015). A Comprehensive Guide to Virtual Private Networks, Volume III: Cross- Platform Key and Policy Management. In O. A. Martin W. Murhammer, VPN overview and technology update. IBM Corporation, International Technical Support Organization . paloalto. (2023). what are different types of VPN. Retrieved from paloalto networks: https://www.paloaltonetworks.com/cyberpedia/types-of-vpn Rouse, M. (2023, 12 14). Mobile vistual private network. Retrieved from Techopedia: https://www.techopedia.com/definition/15958/mobile-virtual-private-network-mvpn Saugat Bhattarai, S. N. (2016). VPN research term paper. Research gate(january,2016), 1- 11. https://doi.org/DOI: 10.13140/RG.2.1.4215.8160