Virtual Private Networks and VPN Functionality

A virtual private network (VPN) allows for secure communications across insecure mediums. VPNs are useful in wireless networks as the wireless medium is inherently insecure.
By: Betty Yuan
 
March 15, 2012 - PRLog -- Virtual Private Networks
A virtual private network (VPN) allows for secure communications across insecure mediums. VPNs are useful in wireless networks as the wireless medium is inherently insecure. They are also useful for internal wireless connections to the wired network or for securely accessing services across the Internet in public hotspots. In this section, I explain what a VPN is and give some examples of useful scenarios where VPN technology can be utilized.
VPN Functionality
While the acronym VPN stands for virtual private networking, you might think of the technology as encrypted public networking. A secure VPN connection tunnels encrypted data across an insecure connection. For example, you connect to the Internet (an insecure connection) and then use a VPN protocol to connect to a corporate server at work (a secure connection). VPN connections can be many-to-one or one-to-one.
Many-to-One VPN
In a many-to-one scenario, you have one VPN server that many VPN clients connect to. This scenario is common when you have mobile workers who need to access the corporate network. They connect to their Internet service the data is unencrypted (unless an additional encryption standard is used on the local network) as it travels the local network on its way to the VPN connection. The data is then encrypted and transferred across the VPN connection (this is called tunneling) and decrypted at the other end. Now, the data travels unencrypted on the destination network.
The tunnel, once created, is "transparent" to the applications running on your computer. The applications do not see it as an encrypted connection— they just see a connection. VPN connections reduce actual throughput even further than the wireless management overhead by itself, in many cases 25 percent of the data rate or lower.
VPN Protocols
There are three common VPN protocols in use on networks today: the Point-to-Point Tunneling Protocol (PPTP), the Layer 2 Tunneling Protocol (L2TP)/IPSec (IP Security), and the Secure Shell (SSH) protocol.

Please visit the related security products: http://www.techhoo.com/wholesale-china-security-system_c6... for details.

# # #

We are located in the most prosperous of electronic manufacturing base,we can support mobile phones, memory cards, digital audio players, computers and peripheral accessories of consumer electronics-based products ,automotive electronics products.
End
Source:Betty Yuan
Email:***@live.cn
Zip:518131
Tags:Security Gadgets, Security accessory, Ip Cameras, Security wireless accessory
Industry:Wireless Security devices
Location:Shenzhen - Guangdong - China
Account Phone Number Verified     Disclaimer     Report Abuse
HK Sunshine Sea Industry Limited News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share