Virtual Private Network is a network within a network. This is very popular with businesses that have people working remotely. In essence what we have here is the use of the network already provided by the Internet. Internet infrastructure can be used as a network for remote employees to access their corporate systems.
Corporate environments have a far greater need for tight security. This is achieved by creating a VPN (virtual private network) on top of the normal internet connection. This type of connection allows for greater security and encryption.
Just so users can access the corporate network and data being transferred can not be detected.
So this VPN (virtual private network) connection is to continue until the network of public Internet.
Two components are necessary to make this scenario work. Firstly, there needs to be a corporate server setup which has installed VPN server software (and a good router with a firewall). Next would be to have VPN client software installed on remote machines to workers. Once the client machine is online, they will use VPN client software to communicate in the corporate VPN server where to happen. After connecting the server identifies the client as a valid drive, a network access is granted. From then on all information to / from client to server is traveling across the virtual private network and is protected by additional layers of encryption and security guaranteed.
Finally, there may be a cost savings if you determine whether a leased line or VPN is for you. Line rental may be increased in price based on the geographical distance between countries. A virtual private network and is in fact more scalable. (This is ONLY a general statement. It is best to consult with your communications broker to make this decision before. A broker will be able to provide more information when compared to speech with a vendor specific)
VPN is definitely a viable option for small businesses and large that have remote employees need site-to-site with access to certain offices or remote dial-up connection.
This article is only a very general overview. You should use this only as a starting point and to determine whether or not this type of technology is for you. During your evaluation of this technology, you should consider what type of application in your quest to make; remote access, site-to-site, secure dial-up. Additional areas of research will be security, firewalls, encryption, server type and IPSec (Internet Protocol security protocol).