/
 International Journal of Emerging Trends  Technology in Computer Science   International Journal of Emerging Trends  Technology in Computer Science

International Journal of Emerging Trends Technology in Computer Science - PDF document

tatiana-dople
tatiana-dople . @tatiana-dople
Follow
519 views
Uploaded On 2014-09-30

International Journal of Emerging Trends Technology in Computer Science - PPT Presentation

ijettcsorg Email editorijettcsorg editorijettcsgmailcom Vol ume 2 Issue 5 September October 2013 ISSN 2278 6856 Volume 2 Issue September October 2013 Page Abstract This paper discusses the algorithm for a backup virtual private network and its usag ID: 1278

ijettcsorg Email editorijettcsorg editorijettcsgmailcom Vol

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document " International Journal of Emerging Trend..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 1 Abstract : This paper discusses the algorithm for a backup virtual private network and its usage in banks for smooth and consistent functioning. It also discusses its functioning and implementation in banks. Keywords: Virtual Private Network, topology, ba nking technology, internet service provider. 1. I NTRODUCTION While using internet through a network service provider, the compiler is given a n address from the ISP. Banks do not allow users to access a particular service of the bank because their compiler is using an address from an external network. But still, we can connect to the banks VPN network through the internet. A VPN does not necessarily have explicit security features and properties, like authentication or data encryption. We can use Vi rtual Priva te Network to setup separate traffic for different communities of users over an underlying network having very high and strong security features. 2. V IRTUAL PRIVATE NETWO RK IN BANKING In order to have a secured connection between locations in an open interne t, s ite to site VPN allows you to have it. Banks can save a great deal of money, as cheaper means can always be used - on connections like d omestic broadband rather than high cost leased lines across sites with the help of site to site VPN. 3. R EMOTE ACCE SS VPN Normally r emote access VPN is also called VPDN (Virtual Private Dial up). It is used in banks that have a particular staff which works regularly in locations present outside the office. Dial up phone lines or isdn lines or over broadband can be us ed to connect into the office network from anywhere. Advanced e ncryption and tunneling can be used by virtual private network banking to allow desktops or PC’s to establish a end to end , secure, private network connection over networks whic h are insecure i.e. i nternet and wireless networks. The network performance and overall computing is deeply affected by VPN services. Existence of VPNs is to protect high amounts of traffic on public data networks such as the i nternet. Other ISP dialup services too can b e used to work with VPN services. 4. B ACKUP VPN 4.1 Implementation The head branch of the bank uses a dedicated LAN or VAN provided by network service provider (ISP) to connect to the different branches and their databases at different location. But the colli sions in this kind of networks are high. So to reduce the collision , VPN is used as it can create its own network and separates traffic of different user communities over an underlying network with strong security features and so restricts the traffic unto a limited value and reduces the collisions. 4.2 Algorithm Initially, when the bank uses VPN, the logic on link 1 is set to 1. If link 1 crashes, the logic on link 1 is then set to 0. As the backup VPN provider is connected by a NOT gate to link 1, the logic on link 2 becomes 1 and hence the backup VPN is created automatically. When traffic reduces to a certain level the bank gets connected to the other branches by the former VPN. So link 1 is created again and its logic becomes 1. S ince link 2 is connected to the server through the NOT gate , link 2’s logic becomes 0 and it gets deactivated automatically. 4.2.1 Figures and Tables Figure 1 Virtual Private Network Layout for banks 4.2.2 Figure 2 Overall Network Map Backup Virtual Private Networks in Banks Yadhu Ravinath 1 , Sangam Kumar 2 , Arkajit Bhatt acharya 3 1, 2, 3 School of Computing Sciences, VIT University, Vellore - 632014, Tamil Nadu, India International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 2 4.3 Advantages There will be a r eduction of packet co llision due to separation of traffic communities which is a basic characteristic of a VPN server. The u se of a backup VPN server will remove the disadvantage of VPN server i.e., its inconsistent behavior. Bank functionality can be improved by implementing site to site VPN server. 4.4 Disadvantages Generally, VPNs are inconsistent .For example; the user who is making a transaction at one branch can transact money from/to other branches through this VPN. If many users are operating on the network and the crowd o n this network reaches a threshold value of VPN, this VPN crashes and causes a link failure. And the users have to wait for getting the transaction done till the link is back. To solve this problem, B ackup VPN provides another network, so that the user can complete its transaction till the link is back and no time gets wasted. 5. CONCLUSION After observing the above advantages we can easily conclude that backup virtual private network can be implemented in banks as it provides a smooth functionality and do es not affect the user transactions from crashed networks. It also p rovides a new network whenever the usual networking in banks fails to stand up to the load and rush of concurrent transactions by users. It r ecovers from a link failure as quickly as possi ble so that there is no effect on functioning of banks. It i solates the networking failures from the users/customers so that they can complete their transactions without any hint of network failure. It also r educes the amount of collisions in the network. References [1] A Virtual Network Service for Integrated - Services Internetwork , Luca Delgrossi and Domenico Ferrari [2] J. Luo, Home network application security (mhp), 2002. [3] V. Ravi, Advances In Banking Technology and management. Information science reference, 20 08. [4] T. Gandy, “Banking in e - space”, The banker, 145 (838), pages 74 - 76 1995 [5] Vats, Your TV as your bank. pdf, 2007 .