Monday 31 March 2014

What Is VPN And How It Works

What Is VPN And How It Works


VPN stands for virtual private network, the private network (not for public access) that uses a non-personal medium (eg, the Internet) to connect between remote-site safely. The application of certain technologies in order to even use a common medium, but traffic (traffic) between the remote site can not be intercepted easily, nor allow others to smuggle undue traffic to the remote site.


According to the IETF, the Internet Engineering Task Force, a VPN is an emulation of [a] private Wide Area Network (WAN) IP using shared or public facilities, such as the Internet or private IP backbones.VPN is a form of public private network via the internet ( internet), with emphasis on data security and global access via the internet. This relationship is built through a tunnel (tunnel) between 2 virtual nodes.

is a private network (usually for a particular agency or group) in the Internet network (public), which is a private network as if they were accessing its local network but using public networks

VPN is a virtual connection that is private why are so called because in essence this network does not exist physically only a virtual network and why it is called private because this network is a network of private nature that not everyone can access it. VPN Connecting the PC to the public network or internet but its nature private, because it is private so not everyone can be connected to the network and access it. It is therefore necessary data security
VPN working concept basically requires a VPN server that berfungsing as a liaison between PCs. If pictured something like this
Internet <-> VPN Server <-> VPN Client <-> Client
when used to connect 2 computers with a private network such as the internet then this: A Computer <-> VPN clinet <-> Internet <-> VPN Server <-> VPN Client <-> Computer B
So all connections are set by the VPN Server VPN Server so it needs adequate skills so connections can be smoothly.

then what the hell do this VPN?? first of all VPN Server must be configured first and then in the VPN client program must be installed only after that can be connected. VPN on the client side will be making some sort of virtual connections so it will appear sort of VPN network adapter adater network (Lan card) but virtual. The task of VPN Client is doing authentication and encryption / decryption.
Well once connected then later when the client accessing the data tell a client wants to open the site http://www.google.com. This request before it is sent to the VPN server is encrypted by the first instance encrypted VPN Client with a formula that will contain the data request codes. After arriving to the VPN server by the server to decrypt this data in the formula A, having previously been configured between the server and the client, the server will have the same algorith to read an encryption. Vice versa, from server to client

Thus, the concept of security with VPN network offers security and untraceable, can not be detected so that our IP is not used is known as Public IP belongs to VPN servers. With no encryption and decryption of the data through the internet network is not accessible by others even by another client connected to the same VPN server though. Because the key to unlock the encryption is only known by the VPN server and client are connected. Encryption and decryption can cause data to be modified and read so keamananya guaranteed. To break down the data pirate decryption process data must pass the course to find the right formula takes a very long time so it is common to use super computing to break down and of course not everyone has a PC with this super abilities and the process is complicated and takes a long time, the agents FBI or CIA usually have this kind of computer to read confidential data that is sent through the VPN.

Is using a VPN connection is faster????? It depends on the connection between the client and the VPN server for the data processing is done on the VPN automatically all the data is entered into our computer from the Internet will go first to the VPN server so that when a client connection to a VPN server connection is good then it will also be much faster. Usually what happens is a slight decrease in speed is slower because it must first pass through 2 pathways including the encryption process. The VPN connection can be used to accelerate external (international) how???
for example, we have a local connection (IIX) equal 384kbps 1mbps and external connections use VPN so that we could be the same as the international connection local connection 1mbps. Ways to use VPN to VPN routed Local Affairs

Internet <-> VPN Affairs <-> VPN local <-> Client

why this network model can be faster because access to the outside network by external VPN and then forwarded by the local VPN nah we access to the local network, which means the access speed of 1mbps. Certainly needed a VPN with a large bandwidth so that connections can be smoothly.

Well why the HSDPA connection macem Telkomsel and Indosat get faster??? Operators to limit the bandwidth of the internet we say IM2 with 256kbps package if we use 3G and HSDPA networks sebenarny then we have a bandwidth of 384 kbps and 3.6 Mbps for HSDPA but only use 256kbps because the operator is restricted to the VPN server limitation can be broken ways will be discussed further.

Is able to make the Internet free and non-quota??? answer can be used as long as the gap is unknown operator. How to do this is to use a VPN to access a particular port server. Operators typically use a specific port for billing calculations and total unused data which can be exploited this loophole. For example there are certain ports that can be used to connect to the VPN server can be used free internet and free qouta. Why is that??? Port is not used for the calculation of billing so we did not pass well to the billing server port, then we can connect to the VPN server over the network internet.kita connect to the internet but do not pass through our automatic billing server not be charged and count calculated if the data does not count for very little pinging the server. By connecting to the VPN server then all access will be performed by the VPN server and transmitted through an open port earlier so that we could freely access the intenet. Such technique less there may be other techniques due to VPN has many advantages

Another advantage of a VPN is access anywhere. We have access to a computer at home through a VPN network for Internet-connected computer at home and we have Internet access required only for  VPN Client software configuration and authentication process. That way we can access the internet safely and undetected



Then How VPN works.?


Let's use an example to explain how the VPN works. Virtual Entity Networks Inc.. (VEN Inc.) Has two branches, London and Sydney. If the Australian branch in Sydney decided to contract the dealer, then the London office had to know right away. The main part of the IT infrastructure is provided in London. In Sydney there are twenty people whose jobs depend on the availability of data hosted on Server London.



Both locations are equipped with a permanent internet lines. Internet is a gateway router is set up to provide Internet access to staff it. Successor is set to protect the local network location from unauthorized access from the side, which is the "evil" internet. Successor as it provides for blocking specific traffic can be called a firewall and must be found within the individual branches are thought to take part in the VPN.

VPN software must be installed on the firewall or a server or appliance that is protected by it. Many firewalls modern equipment from manufacturers such as Cisco or Bintec include these features, and no VPN software for all hardware and software platforms.

In the next step, the VPN software must be set up to establish a connection to the VPN server instance lainnyasebagai London must accept connections from Sydney server, and the server must connect Sydney to London or vice versa. If this step is successfully completed, the company has a Virtual Network. Both branches are connected to the internet and can work together as in a real network. Here, we have a VPN without any privacy, because many internet roter between London and Sydney can read data exchange. A competitor who gained control of the internet on a roter can read all relevant business data network that actually was. So how do we create a Virtual Private Network? The solution is encryption. VPN path between two branches locked with a special key, and only the person or computer that has the key that can open and look at the data sender.



All data sent from Sydney to London or from London to Sydney should be encrypted before transmission and decrypted after. Encryption protects data in such connection from the walls of a train tunnel to protect the mountain around it. This explains why it is often known as a VPN tunnel (tunnel) or VPN tunneling, and tunneling technology is often referred to-even if no other Kwantum mechanics involved.

Proper encryption methods and provide the key to all partitions involving one of the main differentiating factor between different VPN solutions. A VPN connection is normally established between two routers internet access that comes with a firewall and VPN software. The software must be set up to connect to the VPN partner, the firewall must be set up to be able to access and exchange data between the VPN partner with encryption. Encryption keys must be presented for all VPN partner, so that exchanged data can only be read by authorized VPN partner.