Sitemap  |  Contact  |  Home  |  中文  |  CAS  |  Director’s Email
International Cooperation
Education & Training
Societies & Publications
Chinese Journal of Acoustics
 
 
  Location:Home>Resources>Popularization of scientific knowledge
How VPNs Work: What Makes a VPN?
Author:
ArticleSource:
Update time: 2014/10/27
Viewed:
Close
Text Size: A A A
Print

A good VPN can carry data in a secure, private tunnel across the chaos of the public Internet.

A VPN's purpose is providing a secure and reliable private connection between computer networks over an existing public network, typically the Internet. Before looking at the technology that makes a VPN possible, let's consider all the benefits and features a business should expect in a VPN.

A well-designed VPN provides a business with the following benefits:

  • Extended connections across multiple geographic locations without using a leased line
  • Improved security for exchanging data
  • Flexibility for remote offices and employees to use the business intranetover an existing Internet connection as if they're directly connected to the network
  • Savings in time and expense for employees to commute if they work fromvirtual workplaces
  • Improved productivity for remote employees

A business might not require all these benefits from its VPN, but it should demand the following essential VPN features:

  • Security -- The VPN should protect data while it's traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it.
  • Reliability -- Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections.
  • Scalability -- As a business grows, it should be able to extend its VPN services to handle that growth without replacing the VPN technology altogether.

One interesting thing to note about VPNs is that there are no standards about how to set them up. This article covers network, authentication and security protocols that provide the features and benefits listed above. It also describes how a VPN's components work together. If you're establishing your own VPN, though, it's up to you to decide which protocols and components to use and to understand how they work together.

The next two pages describe two common types of VPN. We'll start with the type that's most synonymous with the term VPN.

 
Copyright © 1996 - 2020 Institute of Acoustics, Chinese Academy of Sciences
No. 21 North 4th Ring Road, Haidian District, 100190 Beijing, China
E-mail: ioa@mail.ioa.ac.cn