1 00:00:02,030 --> 00:00:05,180 OK, so now let's start with VPN. 2 00:00:06,130 --> 00:00:10,940 Now, nobody's virtual private networks aren't really that hard to understand. 3 00:00:11,350 --> 00:00:17,800 I want to explain in really simple words, a VPN that is a virtual private network. 4 00:00:18,070 --> 00:00:24,670 It fits somewhere between the local area network that we are connected to and the wide area network 5 00:00:24,670 --> 00:00:26,710 that connects to our more lands. 6 00:00:27,490 --> 00:00:34,990 And many times may seem just like a vine link because your computer on one LAN connects to a different 7 00:00:34,990 --> 00:00:38,330 remote land and uses its resources remotely. 8 00:00:38,950 --> 00:00:41,080 That is the basic definition of a VPN. 9 00:00:41,860 --> 00:00:47,730 Now the key difference between the virtual private networks is a big one security. 10 00:00:48,220 --> 00:00:55,650 So the definition of a connecting a LAN to a one may sound the same, but VPN is much more secure. 11 00:00:57,110 --> 00:00:58,310 Now, here's the difference. 12 00:00:58,880 --> 00:01:06,320 A typical wide area network connects two or more remote local area networks together using someone else's 13 00:01:06,320 --> 00:01:14,840 network like, say, your Internet service provider and router your local host and router see these 14 00:01:14,840 --> 00:01:19,640 networks as remote networks and not as local networks or resources. 15 00:01:20,620 --> 00:01:24,720 This would be a van in its most general definition, right? 16 00:01:26,310 --> 00:01:35,080 So VPN actually makes your local host part of the remote network by using the van link that connects 17 00:01:35,260 --> 00:01:36,590 to the remote LAN. 18 00:01:37,600 --> 00:01:43,630 Now, the VPN will make your host appear as though it's actually local and remote network. 19 00:01:44,200 --> 00:01:52,120 This means that we now have access to the remote local areas resources and that access is very secure. 20 00:01:53,210 --> 00:02:00,620 This may sound like a lot like a villain definition that is a virtual land, that is take my host and 21 00:02:00,620 --> 00:02:04,070 make it appear local to the remote resources. 22 00:02:05,300 --> 00:02:12,230 Just remember that for networks that are physically local, using virtual land is a good solution. 23 00:02:12,650 --> 00:02:19,730 But for networks that are physically remote, those that span a wide area, network weapons is the best 24 00:02:19,730 --> 00:02:23,500 solution for a simple VPN. 25 00:02:23,630 --> 00:02:27,560 Let's use a home office in a country or a city. 26 00:02:28,130 --> 00:02:33,080 And, you know, on the screen you can show you can you can see this figure. 27 00:02:33,110 --> 00:02:35,330 So what basically is going on? 28 00:02:35,690 --> 00:02:41,290 I am sending data to someone on the Internet through a tunnel. 29 00:02:41,310 --> 00:02:47,360 Now, this is a preventive tunnel through which I'm sending a data and whoever is trying to access is 30 00:02:47,360 --> 00:02:48,800 getting rebundled. 31 00:02:48,800 --> 00:02:56,180 So neither hacker nor the government can see what is sending between the data. 32 00:02:56,180 --> 00:03:00,950 And that is why many people use virtual private networks. 33 00:03:00,950 --> 00:03:07,190 Now, in some cases, the let's say if you're watching a Netflix movie now, if you are from India or 34 00:03:07,190 --> 00:03:14,180 from us, some movies of, let's say, European countries are not allowed to be broadcasted in your 35 00:03:14,180 --> 00:03:14,600 country. 36 00:03:15,050 --> 00:03:22,190 So what most people do is they make use of VPN, which means that I suppose this is Netflix and this 37 00:03:22,190 --> 00:03:27,170 is you you are trying to directly access Netflix, but you are not able to do that. 38 00:03:27,180 --> 00:03:28,530 So I'll use this. 39 00:03:28,530 --> 00:03:31,920 So if I drink trying to use Netflix, you are not able to do that. 40 00:03:32,540 --> 00:03:40,820 So what you do is you access Netflix through this country, this ISP of, let's say us, and then this 41 00:03:40,820 --> 00:03:49,250 ISP sends packet to the Netflix and let us say this, ISPs from a country where the movies are allowed 42 00:03:49,340 --> 00:03:50,070 to broadcast. 43 00:03:50,480 --> 00:03:52,420 So what is this here? 44 00:03:52,460 --> 00:03:58,690 So what does this Netflix things that the packets are received from European country and now I can permit. 45 00:03:59,180 --> 00:04:06,370 So these data, this data is again transmitted to the ISP of the country in which the movie is allowed. 46 00:04:06,380 --> 00:04:09,530 And again, this ISP sends the data back to you. 47 00:04:09,890 --> 00:04:15,950 So in this case, instead of this channel, they can you use a VPN here? 48 00:04:15,950 --> 00:04:23,900 So what, uh, what actually, uh, the user or you use it, you use a VPN here, a virtual private 49 00:04:23,900 --> 00:04:27,590 network through which the data is getting transferred. 50 00:04:28,460 --> 00:04:31,460 So now there are different types of weapons. 51 00:04:31,880 --> 00:04:34,870 Now, why is this so important now? 52 00:04:34,880 --> 00:04:42,680 Because, uh, the types of weapons are named based on the kind of role they play in the real world 53 00:04:42,680 --> 00:04:43,220 business. 54 00:04:43,670 --> 00:04:49,880 So the first one is client to client virtual private network, which is also known as a remote access 55 00:04:49,880 --> 00:04:58,370 virtual private network, not a remote access virtual private network allows remote users like telecommunications 56 00:04:58,370 --> 00:05:04,040 to securely access the corporate network wherever and whenever they need to. 57 00:05:04,790 --> 00:05:09,720 It is typical that users can connect to the Internet, but not to the office. 58 00:05:09,740 --> 00:05:11,330 Why are they VPN client? 59 00:05:11,750 --> 00:05:16,280 Because they don't have the correct VPN address and password. 60 00:05:17,300 --> 00:05:24,170 This is the most common problem and one should always check first before trying to access the resources. 61 00:05:25,460 --> 00:05:33,350 The next one is host to host weepin, a host to host a virtual private network is somewhat like a site 62 00:05:33,350 --> 00:05:40,370 to site in concept, except that the end points of the tunnel are to individual hosts. 63 00:05:40,970 --> 00:05:47,690 In this case, all the traffic is protected from the time it leaves the network interface card of one 64 00:05:47,690 --> 00:05:51,620 host until it reaches the network interface card of the next host. 65 00:05:51,620 --> 00:05:57,350 Which means if you are trying to communicate with your friend and if you are using a VPN that is a kind 66 00:05:57,350 --> 00:06:04,120 of a host to host virtual private network, site to site, virtual private network. 67 00:06:04,550 --> 00:06:13,430 Now site to site weapons are also known as Internet weapons allows a company to connect is remote sites 68 00:06:13,430 --> 00:06:18,720 to the corporate backbone securely over a public media like the Internet. 69 00:06:19,580 --> 00:06:26,600 Now, instead of requiring more expensive area that is a wide area network connections, this is probably 70 00:06:26,600 --> 00:06:30,520 the best solution for connecting remote office to a machine company. 71 00:06:30,530 --> 00:06:36,770 So if someone asks you how do you connect your remote office to the main company headquarters, the 72 00:06:36,770 --> 00:06:40,490 answer is site to site virtual private networks. 73 00:06:41,210 --> 00:06:49,340 And the last kind of VPN is extranet VPN Extranet Vivienne's allows and organization suppliers, its 74 00:06:49,340 --> 00:06:56,420 partners and its customers to be connected to the corporate network in a limited way for only business 75 00:06:56,420 --> 00:06:57,180 purposes. 76 00:06:58,430 --> 00:07:04,360 So these are the types of weapons that you need to remember from the exact point of view or any example 77 00:07:04,370 --> 00:07:08,420 where you're going to appear on an interview you're going to appear for. 78 00:07:08,450 --> 00:07:11,720 Just make sure that you remember the definition of VPN. 79 00:07:12,250 --> 00:07:13,790 Why do we require Ripkin? 80 00:07:13,880 --> 00:07:16,670 The answer is for security purposes. 81 00:07:17,570 --> 00:07:22,730 And just remember the four types of weapons that we have just discussed. 82 00:07:23,270 --> 00:07:24,830 That is it for this lecture.