VPN Explained: VPN Basics Simplified

Technology

The question of how exactly to explain or define a VPN is one that is often debated among today’s network consumers and communications providers. Looking at the literal definition of the words virtual private network can help you understand what a VPN is and is not.

Using Webster’s dictionary definitions of the component words, a VPN must have the following attributes:

Virtual: defined as “being such in practice or in effect, though not in actual fact or name.” Therefore, the first part of the answer to our question “what is a VPN?” it is that it is something that acts like a wired network, but in reality it is not.

Private: defined as “of, pertaining to, or relating to a particular person or group; not common or general.” Therefore, a VPN should be one where the consumer has exclusive use of the network links. (Note that this is different from a secure network, which can be a private or public network.)

Network: Defined as “a system of computers interconnected by telephone wires or other means of sharing information.” This is the goal of a VPN or any other type of network.

The VPN explained in this way is a network technology that gives the owner the ability to share information with others on the network through a private and exclusive link that is created by a method other than wired or leased lines; usually via the Internet. Before the Internet, computers in different offices, cities, or even countries could only communicate with each other the way people did: through telephone wires. As the needs for this type of communication grew, telephone lines were replaced by larger volume cables, such as T3 circuits, but the concept was the same.

For computer A to communicate with computer B, there had to be a physical wired connection. For security reasons, you’ll want to make sure only your 2 computers use that line, so you’d contract with a provider to “lease” that circuit. However, this type of network was expensive and difficult to expand, not to mention difficult for the customer to control.

With the advent of the Internet, connections no longer need to be physical. As long as each computer has access to the Internet, information can be shared through local ISP circuits, across the Internet, and to the recipient in the same way as when the computers were physically connected. That’s why the way VPN works is considered a “virtual” network; the whole connection is not wired.

The VPN aspects explained in this article so far have not yet discussed an ever-present concern in today’s world: security. In an older WAN arrangement, the security of data transmission could depend entirely on vendor guarantees. Today, however, a VPN keeps information private by encrypting it on both the sending and receiving end. There are a variety of encryption protocols, depending on what a company needs, who it needs to communicate with (and therefore be compatible with), etc. The data is not only encrypted, but also encapsulated, meaning it is sent over its own private “tunnel” or connection over the Internet. Nobody can see the data, and even if they could, they can’t decrypt or change it. In this way, information can be sent over the Internet without being susceptible to interception or corruption by those outside the VPN.

To create a virtual private network, you need to decide who needs to share information, in what directions, and how often. Next, you will need to prepare a list of the hardware and software systems you are currently using at each location. You may very well need to make changes so that the computers can communicate with each other easily. You’ll also want to consider how important it is that your data remains secure, as this will impact the type of protocol you select. Preparing this information will prepare you for the discussions you will need to have with potential vendors.

Leave a Reply

Your email address will not be published. Required fields are marked *