Home » Hosting Encyclopedia » Web Terms » VPN


VPN or a Virtual Private Network provides a way to connect two PC’s on two different networks simulating their being both on the same local network. Hence the “virtual” part of the name. This allows secure remote access to a local network’s resources using a public network like the Internet. For example, a user could log in to a PC at the office while using his home PC via a secure VPN tunnelWhat is the VPN from the user’s point of view – a point-to-point connection between his computer and an organization’s server? The exact model of the shared or public network doesn’t matter because it is shown logically as if the data is sent over a dedicated private link.


Types of VPN

Older networks allowed VPN-style remote connections through dial-up modems or through-line connections. They used Frame Relay and Asynchronous Transfer Mode (ATM) virtual circuits provided through a network supported by TELCOs like AT&T and Verizon. Those networks aren’t true VPNs because they passively secure the data being transmitted by the creation of logical data streams. Instead of them nowadays VPNs based on IP and IP/Multi-protocol Label Switching Networks (MPLS) based VPNs are used due to big price reduction and increased bandwidth provided by new technologies such as Digital Subscriber Line (DSL) and fiber-optic networks. A VPN server can be classified by which protocols they’re using; where does the tunnel end; whether they offer site-to-site or remote-access connectivity; what kind of security they support.


Why Would You Set Up a VPN Tunnel

Creating a VPN Tunnel between your PC and a remote network or server can be useful in many cases. For example, the tunnel could be used to encrypt all of your Internet traffic practically anonymizing your connection. The second most popular reason for using a VPN tunnel is when remote access to sensitive data is necessary. When at home or traveling, one could create a VPN connection via the Internet and access corporate assets from afar using encryption. Site-to-site VPNs make it possible for employees located worldwide to share one cohesive virtual network. A VPN tunnel could also be used to connect two identical networks over a dissimilar middle network. For example, two IPv6 networks over an IPv4 network.

Was this article useful?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Newest Articles:


What you need to know: KVM (Kernel-based Virtual Machine) is a virtualization technology that is free, open-source, and available in most modern Linux distributions. Thanks to it, you can create and run Linux and Windows-based virtual machines that are independent of...

Second Level Domain (SLD)

The Second Level Domain or SLD is essential to the hierarchical Domain Name System. It is the second part of the full domain name after the Top Level Domain, on its left side. The Second Level Domain is often the same as the website name, the company, or the...

Top-Level Domain (TLD)

The Top Level Domain name (TLD) is the last or right-most fragment of the domain name. The parts of the domain name are separated with dots and form their own hierarchy in the Domain Name System (DNS). There is a Top-Leveл Domain list where you can see all available...


What is IANA? Although the Internet is not really a centralized system, there are some key infrastructure elements that need to be coordinated. The Internet Assigned Numbers Authority (IANA) is an organization that was founded in 1988 by the government of the U.S.A....


What is ICANN? ICANN is an abbreviation from Internet Corporation for Assigned Names and Numbers. It is the non-profit organization that’s responsible for the assignment and coordination of unique Internet addresses and names for all devices connected to the Internet,...

Ready to Create Your Website?