JETIR2211292
JETIR2211292
org (ISSN-2349-5162)
Abstract: Now a days, network security becomes an essential part of human life. Everyone wants that his or her network should be
secure and free from every kind of malicious activities. Network security is important because it keeps sensitive data safe from
cyber-attacks and ensure the network is usable and trustworthy. Virtual Private Network provides us a protected network
connection, whenever we use public network connection Virtual Private Network encrypt our internet traffic and hide our online
identity. Due to this, third-party applications cannot get our data. Virtual Private Network connects our mobiles or PCs to server
computer so that internet connection of server computer can be easily used. Virtual Private Networks are legal networks. Our data
remains secure from hackers, public networks and government and third-party applications. The intention of this paper is to
enlighten the structure of Virtual Private Network and how it is easy to use for individual and other sectors ae well. At the
beginning we have introduced about Virtual Private Network and then working of VPN.
Keywords: Tunnel, Encryption, Remote Access VPNs, Personal VPNs, Mobile VPNs, Site-to-Site VPNs, WAN
I. INTRODUCTION
A Virtual Private Network (VPN) is a part of data security which provides security to its users from hackers, government, public
networks and third-party applications. Virtual Private Network provides users an encrypted server and conceal user’s IP address
from corporations, government agencies and hackers. Virtual Private Network protects user identity even if they are using public or
shared Wi-Fi and keep user’s data private and safe from any prying internet eyes. Virtual Private Network or VPN is a technology
which used for connecting the components and resources of one network over another. In common usage, a Virtual Private
Network (VPN) is a private corporate network whose Wide Area Network (WAN) connections are made over a shared public
network, usually the Internet.
VPN was firstly developed by Microsoft in 1996.The purpose behind it is that to provide secure access of Internet network of
company to the remote employees of the company, here remote employees are the employee who works from outside location. By
doing this productivity of company get increased and observing this other companies also started using VPN services. A Virtual
Private network extends a private network across public network and enables users to send and receive data across shared or public
networks as their devices are directly get connected to the private network. The benefits of VPN consist of increase in
functionality, security and management of the private network. A VPN is created by establishing a virtual point-to point
connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the
Public Internet can provide some of the benefits of a Wide Area Network (WAN).
JETIR2211292 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org c777
© 2022 JETIR November 2022, Volume 9, Issue 11 www.jetir.org (ISSN-2349-5162)
JETIR2211292 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org c778
© 2022 JETIR November 2022, Volume 9, Issue 11 www.jetir.org (ISSN-2349-5162)
VII. CONCLUSION
Security of data is very important for everyone, as there are many different sources and services are available in the market but
among them Virtual Private Networks services provides better privacy and security to the users. VPN hides our original online
identity and activities or work we perform on internet from hackers and third-party applications. User can switch as often as he or
she lies with no limits using different locations; using VPN one can download or access content from anywhere; VPN can access
on various platforms like Windows, Mac, iOS, Android, Linux, routers, etc. Virtual Private Networks make users relax in terms of
online security and privacy.
REFERENCE
1. 1.Kanuga Karuna Jyothi, Dr. B. Indira Reddy “Study on Virtual PrivateNetwork (VPN), VPN’s Protocols And Security”,
Int © 2018IJSRCSEIT | Volume 3 | Issue 5.
2. Komalpreet Kaur, Arshdeep Kaur “A Survey of Working on VirtualPrivate Network” © 2019 IRJET | Volume 6 | Issue 9.
3. 3.https://scholar.google.com/citations?hl=en&user=OOI01CwAAAAJ
4. https://www.servercake.blog/types-virtual-private-network-vpn/
5. https://www.geeksforgeeks.org/types-of-virtual-private-network-vpnand-its-protocols/
6. D. Simion, M.F. Ursuleanu, A. Graur, A.D. Potorac, A. Lavric“Efficiency Consideration for Data Packets Encryption
with inWireless Tunneling for Video Streaming” INT J COMPUT COMMUN8(1):136-145
7. https://whatismyipaddress.com/vpn-comparison
8. 8.https://scholar.google.com/citations?hl=en&pli=1&user=ks9yhS0AAAAJ
9. Charlie Scotte et al., “Virtual Private Network” Second Edition,O’Reilly, January
JETIR2211292 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org c779