The domain name system (DNS) signifies the “telephone book” of the Internet. Equivalent to using the phone booklet to search for a company name in order to find a mobile phone number, you research addresses in DNS to discover an IP address.
We all are aware of that a phone call is not carried out through the telephone book itself. In the same way, Internet traffic does not go through DNS.
IP addresses and names of domain are associated
It is the solutions supplied on the technical facilities that symbolize worth to Internet users. The best-known providers are ınternet sites and email, but it is also viable to use the net for activities such as binding phone interactions, transfering data files and logging on to numerous databases.
So how do we get access to these offerings? All personal computers linked to the Internet have their very own Ip, which is composed of a long series of numbers. Applying this address can help you join right to a laptop. On the other hand, to save clients from having to bear in mind long strings of numbers, DNS links an unique domain name to the IP address. When you look up a domain name, a search for an IP address is initiated inorder to communicate with the server hosting the services you are looking for.
So what is VPN
Virtual Private Network or just VPN is a personal network created over the internet, so that the equipment connected over it can have an unrelenting connection, no matter any kind of physical or virtual obstructions in the mid-way.
In what way it operates?
The working of VPN is not a challenging deal to understand, although it is. But, prior to that, you should get a concept about the standards or set of rules in laymen terms, used by VPN in providing a secure personal network. Let’s tell you more about it:
SSL (Secured Socket Layer): It uses a 3-way handshake method for ensuring appropriate authentication between the client and server devices. The authentication procedure is based on cryptography where certificates performing as cryptographic keys already stored in the client and server, are used for commencing the connection.
IPSec (IP Security): This process can work on transport mode or tunneling mode, so that it can do its job of safe-guarding the VPN interconnection. The improvement between your two is, transport mode only scrambles the Payload in the data i.e. just the message present in the info, whereas tunneling setting encrypts the whole data to be sent.
PPTP (Point-To-Point Transfer Protocol): It connects an user located at some remote specific location to a private server in a VPN network, and also uses the tunneling mode for its operations. Its low maintenance and straight forward functioning makes it the most broadly used VPN protocol, further more credit goes to the built-in support provided by Microsoft Windows.
L2TP (Layer Two Tunnelling Protocol): It makes it possible for the tunneling of data between two regional sites over the VPN network, often used in combination with the IPSec protocol which usually additionally supports to the security layer of the connection.
So, you have got a hard idea about the various protocols used in a VPN. We shall move forward further more and see how it works. When you are linked to an open public network such as for example cyberspace, you can believe that all your data is flowing through a big tunnel together with the data of other users.
So, any person who wants to spy on you, can simply sniff your data packets from the network. When VPN comes into the scene, it in fact delivers you an individual tunnel inside that big tunnel. And all of your data is transformed into garbage entries, so nobody can understand it.