What is secure tunnel network architecture?

Can somebody give me an idea of how this secure tunnel network architecture is deployed? Can I configure my windows computer to optimize the functioning of the tunnel network? Is this concept applicable to web networking or can I apply some of the principles to a small scale LAN network?
