Simple Description of VPN (Virtual Private Network)

By | November 18, 2010

Business environment around the globe has changed a lot within a considerate time frame. The growth of companies or businesses has not limited itself to local, regional or national level but has reached the extreme heights by going global. Many companies have subsidiaries all around the globe concluding human resources working at these facilities. Scalability of the existing business was a great concern for many business managements, companies were dealing stagnant or no growth issues.


Technological advancement has catered to all the issues faced by companies to operate and manage operations smoothly anywhere around the globe. This technological advancement has brought in the use of leased lines to maintain a Wide Area Network (WAN), these leased lines provided a company a platform to expand its private network beyond its local or regional reach. A WAN has its obvious advantages over a public network like the Internet in regards to reliability, performance and security. But on the counter part the maintenance of a WAN particularly when using a leased line, can become quite expensive and more often the cost rises as the distance between the offices increases.


As Internet started becoming more and more popular, business owners turned to it as a means of extending their own networks. This began with the use of Intranet, which is a password protected site designed for use only by company employees. Advancing further, now companies are creating their own VPN (Virtual Private Network) to cater to the needs of remote employees and distant offices. It has prominent use for large corporate houses with multiple working locations and for companies providing web hosting services with multiple support facilities. VPN can be used for different kinds of servers like Dedicated servers, Virtual Private Servers with Shared server hosting being an exception.


VPN is a private network that uses a public network (Internet) to connect remote sites and user together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization. Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts and packet sniffing, allowing sender authentication to block identity spoofing, and provide message integrity by preventing message alteration.