Virtual private networks are systemized computer networks that use the internet for as a public telecommunication infrastructure to provide a secure connection to for the organization’s network. Eventually, the cost effective nature of a VPN rules out the need of a leased or an owned line for the very purpose of an organization.

While a VPN is established, computers need to communicate with each other through standard methods of information transfer which are commonly known as protocols. This is because when humans talk to each other, they have a language to communicate with, however, with the case of two computers communicating with each other they need to have a structured program about how the information is to be shared and exchanged and what format is to be used to let one machine understand what is being communicated by another. Some of the protocols include PPTP, POP, FTP, HTTP,SSTP, OpenVPN, IPsec, SSL, L2TP etcetera.



PPTP is Point to Point Tunneling Protocol is one of the most common protocols ever in use to facilitate authorized users to connect to a dedicated VPN network through their own internet connection and then login through their specified VPN password. Most of the features used are add on software and even though a PPTP is user friendly a major disadvantage is that it depends heavily on Point to Point Protocol for security purposes and does not have encryption to be used.



Post Office Protocol is an internet protocol system that is used to retrieve email from remote servers over an IP/TCP connection and is developed through various versions. It is supported by many of the mail services in use these days which include Gmail, Yahoo and Hotmail.

Most common use of POP includes connecting to server, retrieving all messages, saving them on the computer and finally deleting them from the server and disconnecting. Quite a number of email clients are supportive of POP as well as IMAP (Internet Message Access Protocol) but very few internet service providers support the latter.



FTP known as File Transfer Protocol provides grounds for copying files from one computer to the other, that is, through the content present on the remote computer with the main purpose of uploading files to a website. Downloading is made possible through an HTTP server and websites that have a lot of downloading done from them would have FTP as part of the URL.



SSTP stands for Secure Socket tunneling Protocol which happens to be an application layer protocol and allows one connection and application end points on it while enabling efficiency. It is based on SSL for SSTP traffic which unlike SSL is in only a tunneling protocol. On the other hand, it support roaming while user clients are necessary and SSL does not support non IP protocols by default. Similarly, for those connections with a limited number of IP addresses problems are bound to occur because it’s main purpose if establishing a secure connection between websites.



HTTP is an abbreviation of Hyper Text Transfer Protocol which can be used for a number of tasks than just for it’s use of hypertext. It’s a protocol used by the World Wide Web and establishes a way how messages are to be transferred based on the browsers and servers in use and the commands which actions need to be taken for. When an a URL is typed in the address bar, an HTTP command is sent to the server after which the date is transmitted to the relevant page.

It is easy to handle, as authentication handling in the application is easily facilitated and HTTP is easy to code as well in terms of a number of programming languages and is easily available on shared hosting.

However, there is no encryption as requests are visible to those between the API server and the requesting one, at the same time, those accepting such a request can find out the user name and password.