Time
1 hour 53 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back to end user. Creepy in Security course and welcome to module two off this course, which is called What is BPM?
00:10
So in this module, I will be talking about history of BP and give you
00:16
explanation about what BP in is and wise does it exist? And what is its used today?
00:23
Uh, so we're now at module to and in next module I will be explaining how we pian works, But let's get with this module. And the first lesson is history of ppm.
00:36
So
00:37
before we PM before we had, ah,
00:41
some kind of digital way to connect between two pc's online Andi. Even before the Internet was in full use, people had to find other ways to share documents. So if we work in
00:57
one office in one company in one city and there was some people, another city or even in the country,
01:02
the usual way to send the documents between
01:07
parts of companies, even if these documents were created by computers.
01:11
So we had it in digital form inside your PC, but then you printed it and then you use pack machine to senate. There was wanted
01:18
if it was something that you want to send to digital form, you could connect my modem,
01:23
and then you can send the file by email. Or you can connected directly to the
01:30
other
01:30
PC another city or another country where modem, which were very low speed. And then you send the video file in digital form over analog line.
01:42
Now, if the file was very big, for example, it was some kind of checked drawing that head
01:48
millions off components and are vectors, and they was
01:53
tens or hundreds of megabytes large.
01:57
You simply couldn't send it by email, and sending it by modem would mean that you should send it for for a day or so. So nobody used that because lines break and then you have to start all over again.
02:09
So the only way
02:12
how to do it was to copy down on some magnetic or optical media, likes floppy disks or CDs, and then send them by post or some kind of career service.
02:23
So that was the usual thing. If you had this small or medium sized company
02:30
now, if you were in big company, then you had
02:35
ah, different solution,
02:37
and, for example, you had the company headquarters And then he had one regional office and then second regional office.
02:46
And after that you had,
02:51
uh, some sales offices between Smaller but also had some people there in PC's, and they were all connecting to the company headquarters
03:01
by means a police line. So they used leased line. At least line is something that was provided by your telecom provider. It was a physical and line,
03:13
and the physical landline helped you connect to
03:16
toe the PC. And you have basically extension. You're off your land network in your company will do all these sites.
03:25
So you had some equipment in between the talking provider usually provided you build all the hardware, all you had to do. Install is basically a router on both sides. So you had for each released line you had some connection on your router and company headquarters, and you usually had the rocker in sales office.
03:45
So these people are. We're now part of same address space, and they
03:50
essentially acted them like
03:53
one big network.
03:55
What was the problem with leased line? Well, the only problem at least line, is that they were really expensive and the price were going up based on the bandwidth off the least line. So the more of Ben you had more had to
04:11
peso. These things could cost tens or even hundreds of thousands of dollars per month,
04:16
so that was very, very high cost.
04:20
And then somebody said, OK, we already have Internet. But Internet is not suitable to connect
04:29
two lands into one basically,
04:32
And so what happened? These?
04:38
That
04:40
in the 1996 people in Microsoft starting developing appear to peel Pierre Tunnel protocol. And in 1999 the specification was published. So Microsoft basically enabled people
04:56
to
04:57
connect using Internet. Because of that time, pretty much everybody had an Internet connection. So you could do
05:04
basically create a virtual private line between a virtual leased line between one location in your company headquarters. All also, what is also important you have seen on the previous the diagram that allow connections had to go to the corporate headquarters,
05:23
and now people could connect between branch offices without actually traffic going
05:29
to the corporate headquarters and then to the other
05:31
location. So this was very interesting
05:35
and very, very fast. It was adopted by large companies.
05:40
Um
05:42
um, it was adapted Aziz way toe connected to
05:50
locations together. And then very soon the software was developed and harder. Solutions were developed to allow people to remotely access
06:03
the corporate network in the same way they like. They were accessing from different branches, branch offices of the company
06:13
and then 2000 tens. Actually, 2012 you have seen first commercial, weepy and starting so basically commercial weepy, And it's something that you use is an individual or a small company, and it doesn't. Its function is not there to allow you to connect between two
06:31
branches of a company,
06:33
but just for you is an individual to connect to the Internet, having some benefits off the PM.
06:42
So this is all about history off the VPN on and let's do a small learning check.
06:55
So the question for you is what was the way to exchange large files in the past, before VPN and even before Internet
07:02
was it fax machine was multiple connection of all the usage of seedy rooms, right Herbal city rooms,
07:11
and, uh, the answer is,
07:19
it will see Durham so fax machine could send only
07:23
visual data, the digital in digital form. It was just you just receive a paper on the other side. And modern connection was not suitable because it was too slow. So for larger parts.
07:36
So, uh, in Ah, in this video you have learned how life was before we PN and when the VPN was created. So you have also understood why the BP and is there and why it was so easily adopted because it produced costs. Big companies. It was much cheaper than compared to,
07:57
um, leased lines.
07:59
In next lesson, I'm going to talk about the differences between VPN and the least line.

Up Next

End User VPN Security

In this course, students will learn the history of VPNs (Virtual Private Network) and who needs to use a VPN. This course will also teach students about the different types of VPNs and the hardware that is needed to implement VPNs.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor