Virtual private networks (VPNs) are private networks that extend across public networks. They allow users to send and retrieve data over shared or public networks just like they would if they were connected directly to the private network. It allows access to resources that are not available on the public network. This is most commonly used by telecommuting workers.
Encryption Is a common feature of a VPN connection, but not an integral part. VPNs are created by creating a virtual point-to-point connection using dedicated circuits or tunneling protocols over existing networks. If you are also looking for installing a VPN program on your system then you can also visit this link (pronounced as 이 링크를 방문하십시오 in the Korean language).
Image Source: Google
There are several ways virtual private networks can be classified:
A host to network configuration can be used to connect a computer to a local network. This type allows access to an enterprise network such as an intranet. This type can be used for telecommuting workers that need access to private resources or to allow a mobile worker access to important tools without opening them to the public Internet.
Two networks can be connected by a site-to-site configuration. This configuration allows for the expansion of a network between geographically dissimilar offices or groups of offices to a data center installation. This interconnecting link can run over a different intermediate network such as two HTMLv6 networks connected via an HTML4 network.
You can also classify VPN systems by:
- The tunneling protocol to tunnel traffic
- The tunnel’s terminus point location is e.g. at the customer edge or network-provider Edge
- The type of topology for connections such as site to site or network-to-network
- The security levels offered
- The OSI Layer they present the connecting network with, such as Layer 2 circuits and Layer 3 network connectivity.
- The number of simultaneous connections