Home     
 
 


   Top Subjects

CD Burners
Home Networking
RAM
Computer Viruses
Web Servers

Sponsored By:

   Categories
  
Hardware
Internet
Peripherals
Security
ShortStuff
Software
Browse the Computer Library

    
Main > Computer > Security

How Virtual Private Networks Work
by Jeff Tyson


 Introduction to How Virtual Private Networks Work
What Makes A VPN?
› Analogy: Each LAN is an Island
VPN Security
VPN Technologies
Tunneling
Lots More Information

Analogy: Each LAN is an Island
Imagine that you live on an island in a huge ocean. There are thousands of other islands all around you, some very close and others farther away. The normal way to travel is to take a ferry from your island to whichever island you wish to visit. Of course, traveling on a ferry means that you have almost no privacy. Anything you do can be seen by someone else.

Let's say that each island represents a private LAN and the ocean is the Internet. Traveling by ferry is like connecting to a Web server or other device through the Internet. You have no control over the wires and routers that make up the Internet, just like you have no control over the other people on the ferry. This leaves you susceptible to security issues if you are trying to connect between two private networks using a public resource.

Continuing with our analogy, your island decides to build a bridge to another island so that there is easier, more secure and direct way for people to travel between the two. It is expensive to build and maintain the bridge, even though the island you are connecting with is very close. But the need for a reliable, secure path is so great that you do it anyway. Your island would like to connect to a second island that is much farther away but decides that the cost are simply too much to bear.

This is very much like having a leased line. The bridges (leased lines) are separate from the ocean (Internet), yet are able to connect the islands (LANs). Many companies have chosen this route because of the need for security and reliability in connecting their remote offices. However, if the offices are very far apart, the cost can be prohibitively high -- just like trying to build a bridge that spans a great distance.

So how does VPN fit in? Using our analogy, we could give each inhabitant of our islands a small submarine. Let's assume that your submarine has some amazing properties:

  • It's fast.
  • It's easy to take with you wherever you go.
  • It's able to completely hide you from any other boats or submarines.
  • It's dependable.
  • It costs little to add additional submarines to your fleet once the first is purchased.


In our analogy, each person having a submarine is like a remote user having access to the company's private network.

Although they are traveling in the ocean along with other traffic, the inhabitants of our two islands could travel back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works. Each remote member of your network can communicate in a secure and reliable manner using the Internet as the medium to connect to the private LAN. A VPN can grow to accommodate more users and different locations much easier than a leased line. In fact, scalability is a major advantage that VPNs have over typical leased lines. Unlike with leased lines, where the cost increases in proportion to the distances involved, the geographic locations of each office matter little in the creation of a VPN.

Lowest Price
1.Linksys EtherFast Cable/DSL Firewall Router 4 Port Switch VPN ENDPOINT $53.90
2.LINKSYS-CISCO VPN ROUTER WITH 8 PORT 10/100 SWITCH $259.00
3.NetGear FVS318 Cable/DSL Prosafe VPN Firewall Internet Gateway Router w/8-Port Switch $97.00
4.SNAPGEAR SME530 2 Port VPN Firewall $329.77
5.Linksys EtherFast Cable/DSL VPN Router w/4-Port Switch $98.21

 

 
<< Prev Page    Intro    Next Page >>

  HSW Home


Table of Contents:
Introduction to How Virtual Private Networks Work
What Makes A VPN?
› Analogy: Each LAN is an Island
VPN Security
VPN Technologies
Tunneling
Lots More Information


 
Search Google:
powered by Google  
Rate this Article!
 


Copyright � 1998-2003 Howstuffworks, Inc. All rights reserved.

Lycos (R) s a registered trademark of Carnegie Mellon University.

Privacy Policy | Children's Privacy Notice | Terms and
Conditions |  Standard Advertising Terms and Conditions