VPN (virtual private network) is a network technology that creates a secure network connection over a public network such as the Internet. So Users are able to connect to the private network from a public network without sacrificing security concerns.
How do VPN�s work?
A virtual private network is based on a protocol called tunneling protocol, this protocol allows to circulate encrypted data from one end to the other, as if you are connected directly to the local network.
The principle of tunneling is to build a virtual path after identifying the sender and the recipient. Thereafter, the source encrypts the data and forwards it by taking this virtual path. To ensure easy and inexpensive communication, virtual private networks access simulate a private network, when they actually use a shared infrastructure, such as Internet access.
Advantages of VPN:
VPNs have many advantages, they are based on robust encryption technologies and the generation and implementation of encryption keys is under the control of the owner of VPN. The privacy level is very high.
- Inexpensive way of building a private network.
- Easy implementation (no particular skills required for users).
- Hide/Change your IP address.
- Security ensured using data encryption.
- No dependence on the security of your ISP.
- The relative ease, speed, and flexibility of VPN provisioning in comparison to leased lines.
Disadvantages of VPN:
As any technology, VPN has some potential disadvantages:
- Skills required for implementation (for service providers).
- The lack of Quality of Service (QoS) management over the Internet can cause packet loss and other performance issues.
- Adverse network conditions that occur outside of the private network is beyond the control of the VPN administrator.
- Vendor interoperability as VPN technologies from one vendor may not be compatible with VPN technologies from another vendor.
Note! The VPN is NOT a way to increase its anonymity for prohibited practices. A VPN does not make you completely anonymous and invisible !. It�s a way to protect your Internet privacy.
No comments:
Post a Comment