A VPN is used to increase a corporate network or additional personal network beyond the physical boundaries of this network. A worker who connects to the web while traveling can hence work exactly as though he were at work.
The idea of a VPN
Imagine composing a letter to a particular worker of a organization or agency. The mail carrier will never be able to assign the name of the employee, nor will he understand the inner department titles. That the letter nevertheless arrives is simply because a transfer stage is defined. The postman hands over the mail to a central post office of the business. This is in a position to evaluate the internal address information.
understanding vpn connections works similarly. The data packets are at first addressed exactly as if the external computer were within the prospective network. The Internet does not know these internal addresses. Therefore, the entire data packet – including the destination address – is normally packed into another data packet. That is an extremely ordinary data bundle which can be delivered on the internet. This data packet is certainly delivered to the gateway of the organization network. This gateway forms the “post office”. It could be addressed from the web and knows the inner addresses of the prospective network.
So it is an envelope in the envelope. On the outer envelope is the deliverable address of the destination network, the gateway address. The gateway gets rid of the external envelope and forwards the internal envelope to the inner corporate address to which it is addressed. Because in this manner, data packets with invalid Internet addresses are routed through the web, this process is known as “tunneling the web”.
Feasible applications of a VPN
The most common application may be the mentioned previously connection of external computers to an internal network. Nevertheless, a VPN may also be used to attain, for instance, blocked websites. The prerequisite for this is that a gateway is available that forwards the info packets appropriately and whose address is not blocked. Complex locks are bypassed in this way because they just check the address of the “outer envelope” – that of the gateway. The real destination address shows up from the viewpoint of such blocking systems as part of the content of the data packet that’s not evaluated. You can’t observe that the contents of the envelope are another envelope which has another address.