A
Micro project report On
                    “Virtual Private Network”
                      SUBMITTED TO M.S.B.T.E., Mumbai
                              For the Award of
             DIPLOMA IN INFORMATION TECHNOLOGY BY
Roll no             Name of Student                     Enrollment no
  28      Nikita Sudhakar Akhade                        2210740532
  57      Shraddha Girish Shaha                         2110740570
  75      Piyusha Ravindra Gaikawad                     23212470513
  80      Rudrani Pandhurang Kore                       2110740105
                       UNDER THE GUIDANCE OF
                             Mr.G.S.Misal
                  DEPARTMENT OF INFORMATION
                 TECHNOLOGY NBA ACCREDIATED
          SVERI’s College of Engineering (Polytechnic), Pandharpur
                       Gopalpur Pandharpur-413304
                                   2024-25
                             AFFILIATED TO
                                  M.S.B.T.E.
Evolution sheet for Micro Project
Academic Year:- 2024-25                            Name of Faculty:- Mr.G.S.Misal
Course:- Information Technology                  Course code:- IF5I
Subject:- Advance Computer Network               Subject Code:- 22447
Semester:- V                                     Scheme:- I
Title of Project:- “Virtual Private Network”
COs addressed by the Micro Project:
      CO 1         Select Alternative Energy Resource for Engineering.
 Comments/Suggestions about team work/leadership/inter-personal communication (if any)
                                                                           Marks out
                                                        Marks out of 6                   Total
                                                                             of 4for
                                                              for                        mark
   Roll No                    Name of students                            performance
                                                        performance in                   sout
                                                                            in oral/
                                                        group activity                   of 10
                                                                          Presentation
       28         Nikita Sudhakar Akhade
       57         Shraddha Girish Shaha
       75         Piyusha Ravindra Gaikawad
       80         Rudrani Pandhurang Kore
Name and
Signature of      Mr.G.S.Misal
faculty
    SVERI’s COLLEGE OF ENGINEERING (POLYTECHNIC), PANDHARPUR.
                                        CERTIFICATE
                            This is to certify that the Project report entitled
                                “Virtual Private Network”
                                              Submitted by
          Roll no                Name of Student                             Enrollment no
            28          Nikita Sudhakar Akhade                               2210740532
            57          Shraddha Girish Shaha                                2110740570
            75         Piyusha Ravindra Gaikawad                             23212470513
            80         Rudrani Pandhurang Kore                               2110740105
        is a bonafide work carried out by above students, under the guidance of Mr.G.S.Misal and it is
 submitted towards the fulfillment of requirement of MSBTE, Mumbai for the award of Diploma in
 Information Technology at SVERI’s COE (Polytechnic), Pandharpur during the academic year 2022-2023.
                                            (Mrs.G.S.Misal)
                                                   Guide
 (Mr.G.S.Misal.)                                                                  (Dr.N.D.Misal.)
     HOD                                                                           Principal
Place:Pandharpur
                                      Acknowledgement
     “Virtual Private Network” has been developed successfully with a great contribution of two students
in a period of two months. We like to appreciate their guidance, encouragement and willingness since
without their support the project would not have been a success. We would like to give our heartfelt gratitude
to Principal Dr. N. D. Misal, Guide Mr.G.S.Misal & HOD Mr.G.S.Misal who is the supervisor of our project
for helping and encouraging us in many ways to make our project a success. We would never been able to
finish our work without great support and enthusiasm from friends and support from our family. We would
like to thank the department of Information Technology, for giving us permission to initiate this project and
successfully finish it.
                                            Introduction
        A Virtual Private Network (VPN) creates a secure, encrypted connection over a public network, enabling
users to access private networks remotely. VPNs ensure privacy by masking IP addresses and protect data through
encryption, authentication, and integrity checks. Common types include remote access VPNs (for individual users)
and site-to-site VPNs (for connecting multiple networks). They offer benefits like enhanced security, bypassing
geo-restrictions, and protecting sensitive data on public Wi-Fi. Popular protocols include Open VPN, Wire Guard,
and IKEv2/IPsec. However, VPNs may slow down internet speeds and are not foolproof against all online threats
or legal restrictions in some regions.
 Methodology
    Definition:-
A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less
secure network, such as the Internet. A Virtual Private Network is a way to extend a private network using
a public network such as the Internet. The name only suggests that it is a “Virtual Private Network”, i.e.
user can be part of a local network sitting at a remote location. It makes use of tunneling protocols to
establish a secure connection.
    History of VPN:-
ARPANET introduced the idea of connecting distant computers in the 1960s. The foundation for current
internet connectivity was established by ensuring the development of protocols like TCP/IP in the 1980s.
Particular VPN technologies first appeared in the 1990s in response to the growing concerns about online
privacy and security.
      Need for VPN:-
It could easily be said that VPNs are a necessity since privacy, security, and free internet access should be
everybody’s right. First, they establish secure access to the corporate networks for remote users; then, they
secure the data during the transmission and, finally, they help users to avoid geo-blocking and censorship.
VPNs are highly useful for protecting data on open Wi-Fi, for privacy, and preventing one’s ISP from
throttling one’s internet connection.
    How Does a VPN Work?
Let us understand VPN with an example think of a situation where the corporate office of a bank is
situated in Washington, USA. This office has a local network consisting of say 100 computers. Suppose
other branches of the bank are in Mumbai, India, and Tokyo, Japan. The traditional method of establishing
a secure connection between the head office and the branch was to have a leased line between the branches
and head office which was a very costly as well as troublesome job. VPN lets us effectively overcome this
issue.
 The situation is described below:-
   All 100 hundred computers of the corporate office in Washington are connected to the VPN server
    (which is a well-configured server containing a public IP address and a switch to connect all computers
    present in the local network i.e. in the US head office).
   The person sitting in the Mumbai office connects to The VPN server using a dial-up window and the
    VPN server returns an IP address that belongs to the series of IP addresses belonging to a local
    network of the corporate office.
   Thus person from the Mumbai branch becomes local to the head office and information can be shared
    securely over the public internet.
   So this is the intuitive way of extending the local network even across the geographical borders of the
    country.
 VPN is well Exploited all Across the Global:-
We will explain to you with an example. Suppose we are using smartphones regularly. Spottily Swedish
music app that is not active in India But we are making full use of it sitting in India. So how?? VPN can be
used to camouflage our geo location.
   Suppose the IP address is 101.22.23.3 which belongs to India. That’s why our device is not able to
    access the Spotify music app.
   But the magic began when we used the Psiphon app which is an Android app used to change the device
    IP address to the IP address of the location we want (say US where Spotify works seamlessly).
   The IP address is changed using VPN technology. Basically what happens is that your device will
    connect to a VPN server of the respective country that you have entered in your location textbox of the
    Psiphon app and now you will inherit a new IP from this server.
    VPN also ensures security by providing an encrypted tunnel between the client and the VPN server.
    VPN is used to bypass many blocked sites.
    VPN facilitates Anonymous browsing by hiding your IP address.
    Also, the most appropriate Search engine optimization (SEO) is done by analyzing the data from VPN
     providers which provide country-wise statics of browsing a particular product.
    VPNs encrypt your internet traffic, safeguarding your online activities from potential eavesdropping
     and cyber threats, thereby enhancing your privacy and data protection.
    Characteristics of VPN:-
    Encryption: VPNs employ several encryption standards to maintain the confidentiality of the
     transmitted data and, even if intercepted, can’t be understood.
    Anonymity: Thus, VPN effectively hides the users IP address, thus offering anonymity and making
     tracking by websites or other third parties impossible.
    Remote Access: VPNs provide the means for secure remote connection to business’ networks thus
     fostering employee productivity through remote working.
    Geo-Spoofing: The user can also change the IP address to another country using the VPN hence
     breaking the regional restrictions of some sites.
    Data Integrity: VPNs make sure that the data communicated in the network in the exact form and not
     manipulated in any way.
 Types of VPN:-
There are several types of VPN and these are vary from specific requirement in computer network. Some
of the VPN are as follows:
1.   Remote Access VPN
2.   Site to Site VPN
3.   Cloud VPN
4.   Mobile VPN
5.   SSL VPN
 VPN Protocols:-
   OpenVPN: A cryptographic protocol that prioritises security is called OpenVPN. OpenVPN is
    compatible protocol that provides a variety of setup choices.
   Point-To-Point Tunneling Protocol (PPTP): PPTP is not utilized because there are many other secure
    choices with higher and more advanced encryption that protect data.
   WireGuard: Wireguard is a good choice that indicates capability in terms of performance.
   Secure Socket Tunneling Protocol (SSTP): SSTP is developed for Windows users by Microsoft. It is
    not widely used due to the lack of connectivity.
   Layer 2 Tunneling Protocol (L2TP) It connects a user to the VPN server but lacks encryption hence it
    is frequently used with IPSec to offer connection, encryption, and security simultaneously
 Advantages of VPN:-
     1. Enhanced Privacy and Anonymity
   IP Address Masking: A VPN hides your real IP address by routing your internet traffic through a remote server.
    This makes it difficult for websites, advertisers, and third parties to track your online activities.
   Anonymous Browsing: By masking your IP and encrypting your traffic, a VPN helps you browse the internet
    more anonymously, reducing the chances of being identified or tracked online.
     2. Improved Security
   Encryption: VPNs encrypt your internet traffic, protecting it from hackers and eavesdroppers. This is particularly
    useful when using public Wi-Fi networks, which are often not secure.
   Protection from Cyber-attacks: A VPN can help protect you from certain types of cyber-attacks, such as man-in-
    the-middle attacks, by encrypting your communication.
     3. Access to Restricted Content
   Bypass Geo-Restrictions: Many websites, streaming services, and platforms restrict access based on geographic
    location. With a VPN, you can connect to servers in different countries to access content that might be blocked in
    your region.
   Unblock Websites: VPNs can help bypass government censorship, firewalls, and geo-blocked websites, giving
    you unrestricted access to global information and services.
     4. Secure Online Transactions
   Safe Banking and Shopping: VPNs add a layer of security when conducting sensitive activities like online
    banking, shopping, or making financial transactions by protecting data from hackers and fraudsters.
     5. Bypass Censorship
   Evade Government or ISP Restrictions: In certain countries, internet access is heavily censored, and some
    websites may be blocked. A VPN can help circumvent these restrictions, providing more freedom to access
    information and services online.
     Disadvantages of VPN:-
1. Reduced Internet Speed
    Slower Speeds: VPNs can slow down your internet connection. This happens because your data is being
     routed through a remote server, which adds extra latency and encryption overhead. The speed drop can
     vary depending on the VPN provider, server location, and the protocol used.
    Distance from VPN Server: The farther the VPN server is from your physical location, the more likely
     your connection speed will be affected. For example, using a server in another country may cause
     noticeable slowdowns.
2. Compatibility and Access Issues
    Website or Service Blocks: Some websites, streaming services, or apps may actively block VPN users,
     either by detecting known IP addresses associated with VPN servers or by using more sophisticated anti-
     VPN technologies. This can prevent you from accessing certain content or services.
    Connection Problems: Certain devices or applications may have compatibility issues with VPNs,
     leading to connection errors or reduced functionality when using a VPN.
3. Legal and Policy Risks
    Illegal in Some Regions: In some countries (e.g., China, Russia, Iran), using a VPN to bypass
     government censorship or geo-restrictions is either partially restricted or outright illegal. Violating local
     laws can result in fines, legal action, or other penalties.
    Terms of Service Violations: Some websites and services (like Netflix or Hulu) have strict terms of
     service prohibiting the use of VPNs to bypass geo-restrictions. Using a VPN in such cases may lead to
     account suspension or banning.
4. Dependence on the VPN Provider
    Trust in the Provider: VPN providers typically handle all of your internet traffic, which means you are
     placing trust in them to protect your privacy and not to log or misuse your data. Some providers may
     collect logs or have security vulnerabilities that could compromise your privacy.
    Data Logging and Privacy Risks: While many VPN services advertise themselves as "no-log," there
     have been instances where providers were found to log user data or share it with third parties. It's
     important to thoroughly vet a VPN provider's privacy policy before committing.
5. VPN Service Costs
    Subscription Fees: While there are free VPNs available, they often come with significant limitations
     (such as fewer servers, slower speeds, or less security). High-quality VPN services generally require a
     monthly or annual subscription, which can add up over time.
    Free VPNs: Some free VPNs may be unreliable or even dangerous. They may track your online
     activities, inject ads into your browsing sessions, or sell your data to third parties, defeating the purpose
     of using a VPN for privacy.
Conclusion:-
    Renewable energy resources play a crucial role in addressing the challenges of climate change, energy
    security, and sustainable development. They offer significant environmental benefits by reducing
    greenhouse gas emissions and decreasing dependence on fossil fuels. As technologies continue to
    advance, the efficiency and affordability of renewable sources such as solar, wind, hydro, and biomass
    improve, making them increasingly viable alternatives. However, the transition to renewable energy also
    presents challenges, including resource management, infrastructure development, and ensuring equitable
    access. Policymakers, businesses, and communities must work collaboratively to create supportive
    frameworks that encourage investment and innovation in renewables.
References:-
https://www.bloomberg.com/markets/stock.
www.india-re-navigator.com/utility