top of page

What is a VPN and how it works?

Updated: Jun 18, 2024



ree

Welcome to the TECHNOHOLIA TECHY THURSDAY:


Date: THURSDAY, 13th June 2024

Time: 5:30 PM to 6:00 PM

Topic 1: VPN

Software: Surfshark VPN / ESET VPN


A Virtual Private Network (VPN) is a secure and encrypted connection that allows you to send and receive data across public networks as if you were directly connected to a private network. It provides several key benefits:


Benefits of Using a VPN


1. Online Privacy and Anonymity: A VPN masks your IP address and encrypts your internet traffic, making it difficult for third parties to track your online activities or identify your location.


2. Security on Public Wi-Fi: When connected to a VPN, your data is encrypted, protecting you from potential threats like hackers or eavesdroppers on public Wi-Fi networks.


3. Access Geo-Restricted Content: VPNs allow you to bypass geographic restrictions and access content that may be blocked in your region by connecting to a server in a different country.


4. Avoid Bandwidth Throttling: Internet Service Providers (ISPs) sometimes throttle bandwidth for certain online activities like streaming or torrenting. A VPN can help circumvent this throttling.


5. Secure Remote Access: VPNs provide a secure way for remote workers or travelers to access corporate networks and resources.


How a VPN Works?


A VPN works by creating an encrypted tunnel between your device and a VPN server. Your internet traffic is routed through this secure tunnel, hiding your IP address and encrypting your data. The VPN server acts as a middleman, receiving your data, decrypting it, and forwarding it to its intended destination.


Potential Drawbacks of VPNs


1. Slower Internet Speeds: Routing your traffic through a VPN server can sometimes result in slower internet speeds due to the encryption overhead and increased distance to the server.


2. Limited Bandwidth and Data Caps: Some VPN providers, especially free ones, may impose data caps or bandwidth limitations.


3. Potential Security Risks: While reputable VPN providers prioritize security, some less trustworthy VPNs may log user data or have security vulnerabilities.


Top VPN Tools and Software in 2024


Based on expert reviews and testing, some of the top VPN services in 2024 include:


1. NordVPN: Praised for its strong security, fast speeds, and user-friendly apps.


2. ExpressVPN: Known for its reliable performance, robust encryption, and excellent customer support.


3. Surfshark: A budget-friendly option with unlimited simultaneous connections and advanced security features.


4. Private Internet Access (PIA): Commended for its ease of use, large server network, and strong privacy policies.


5. ProtonVPN: A secure and privacy-focused VPN with a strict no-logs policy and open-source applications.


When choosing a VPN, it's essential to consider factors like server locations, simultaneous connections allowed, logging policies, and customer support. Reputable VPN providers typically offer robust encryption, kill switches, and other advanced security features to protect your online privacy and security.


More information for advanced Users:


Layer 2 VPN and Layer 3 VPN refer to two different approaches to implementing virtual private networks (VPNs) based on the layer of the OSI model at which they operate.


Layer 2 VPN (L2VPN)


A Layer 2 VPN operates at the data link layer (Layer 2) of the OSI model. It virtualizes the data link layer, allowing multiple customer sites to appear as if they are on the same local area network (LAN). Key characteristics of L2VPNs:


- Provides site-to-site connectivity by emulating LAN services over a service provider's network.

- Forwards customer traffic based on Layer 2 information (MAC addresses).

- Customers have full control over their own Layer 3 routing and policies.

- Service provider is not involved in customer subnet IP routing.

- Supports various Layer 2 protocols like Ethernet, Frame Relay, ATM, etc.

- Less scalable compared to L3VPNs for large, complex networks.


Layer 3 VPN (L3VPN)


A Layer 3 VPN operates at the network layer (Layer 3) of the OSI model. It virtualizes the network layer, allowing customer sites to be interconnected over a service provider's network. Key characteristics of L3VPNs:


- Provides site-to-site connectivity by routing customer traffic over the service provider's network.

- Forwards customer traffic based on Layer 3 information (IP addresses).

- Service provider is involved in customer subnet IP routing and shares routing information.

- Customers can exchange routing information with the service provider's edge routers.

- Supports only IP-based protocols like IPv4, IPv6, etc.

- More scalable than L2VPNs for large, complex networks.


Key Differences


1. Layer of Operation: L2VPNs operate at Layer 2 (data link), while L3VPNs operate at Layer 3 (network).


2. Routing Control: In L2VPNs, customers manage their own routing policies, while in L3VPNs, the service provider is involved in routing customer traffic.


3. Protocol Support: L2VPNs can support various Layer 2 protocols, while L3VPNs are limited to IP-based protocols.


4. Scalability: L3VPNs are generally more scalable than L2VPNs for large, complex networks.


5. Connectivity Model: L2VPNs provide LAN-like connectivity, while L3VPNs provide routed connectivity.


The choice between L2VPN and L3VPN depends on factors such as the customer's network requirements, control preferences, scalability needs, and the protocols used within their network. L2VPNs are often preferred when customers want more control over their routing policies and support for non-IP protocols, while L3VPNs are suitable for larger, IP-based networks where scalability and service provider routing management are desired.


Learn, Work, Repeat!!!

Comments


bottom of page