Virtual private network is the component of latest technology which is based upon tunnelling for private network access. A logical network connection is established using VPN tunnelling containing internal leaps. Internet simply works on the data files that are broken into sequential pieces that are sent or received by the systems connected to it. Tunneling is a process in which these pieces/packets are is placed in some other packet and then transported over the internet. This way tunneling provides safety to the outer packet and makes it safe from public access through virtual tunnel.
In this logical network connection, the small packets of our concerned data are encapsulated in a carrier protocol. This base or carrier network then transmits it between VPN client interface and the server and then reverted to the original state by de-encapsulating by the receiving side. With this the tunnels are made secure by authentication and encryption.
VPN Tunneling: Types
Two types of tunneling are supported by the high speed VPN, voluntary tunneling and compulsory tunneling. Both types are used in general.
Voluntary Tunneling: VPN clients manage the connection setup in the voluntary tunneling. When the connection is made from the client side, the carrier network provider/ISP creates a tunnel using VPN client application to the VPN server.
Compulsory Tunneling: Carrier network providers manage connection setup in compulsory tunneling. When the ordinary connection is made by the client to the carrier, the VPN connection is immediately broke the connection between the client and VPN server. As compared to the voluntary tunneling in which encryption is through two steps, the VPN connections are produced by a single step in compulsory tunneling.
The details of VPN server are hid in the compulsory tunneling with the help of VPN front end processor and then transfers management control to the ISP from the clients.
There are various network protocols involved in the VPN tunneling. L2F, PPTP and L2TP are three popular protocols that are widely used for the VPN tunnelling and to provide high speed VPN to give opportunity to surf freely.
Nisha Pandey is blogger written on various niche so far. She likes to write about technology, internet and networking related issues as a hobby.