VPN stands for Virtual Private network is an encrypted tunnel connection over the internet that lets you access web privately. The encrypted connection between the device and the network assures safely data transmission.
VPN technology is one of the most trending techniques used in corporate organizations, colleges and many government sectors for preventing unauthorized access. In this, a virtual connection is made instead of a dedicated connection i.e. leased line that permits user for conducting work remotely.
Data Transmits in VPN through tunneling. Before transmitting any packet, it is first encapsulated into a new packet by integrating a header. That header contains entire routing information due to which it traverses data through a public network before reaching its destination. The logical route, through which an encapsulated packet pass is known as a tunnel. When it reaches the endpoint of the tunnel, it will be decapsulated and then further forwarded into the final destination.
This entire process of tunneling operates with the help of tunneling protocols such as IPsec, SSL, PPTL and many more. These all protocols are functioned at either Network layer or OSI or data-link-layer. This packet contains a non-routable IP address, which can be sent Globally IP address inside the packet. VPN provides a virtual IP address apart from unique IP address.
When VPNs are required?
VPNs are beneficial when there is a need to encrypt or hide activities on the internet. It also hides location and permits users to be more anonymous.
Types of VPN
a) Remote Access VPN:
Secure remote access facilitates a secure method for connecting device and users remotely over a corporate network. It consists of VPN technology for authentication and applicable for both home users as well as business users.
b) Site-to-site VPN:
Site-to-site VPN is also known as Router-to-Router i.e. dependent on communication between two routers in which one router acts as a Client and another one as a VPN server. In these routers, interaction takes place through an authentication.
Different features required to be incorporated in a well-designed VPN are below:
b) Policy Management
e) Network Management
Advantage of VPN:
a) Extend geographic connectivity
b) Decrease operational costs
c) Lesson transmission time as well as traveling expenses for remote users
d) Expand productivity
e) The complex network topology is improved.
f) Deliver global networking chances
g) Facilitates telecommuter support
h) Fasten Return on Investment (ROI)
i) Provides IP addresses Globally
j) File sharing
k) Online anonymity