Tunnelling - point to point, Computer Networking

Tunnelling

To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.

 

2128_Tunnelling.png

                                                                              figure Addressing in a VPN

Posted Date: 3/19/2013 12:12:02 AM | Location : United States







Related Discussions:- Tunnelling - point to point, Assignment Help, Ask Question on Tunnelling - point to point, Get Answer, Expert's Help, Tunnelling - point to point Discussions

Write discussion on Tunnelling - point to point
Your posts are moderated
Related Questions
What are the two types of Transmission Technology available in ccna? Ans) Point - to - Point and Broadcast are the Two types of Transmission Technology available in CCNA

Concept Of Permutation Network In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and po

Recognize the command to show the Frame Relay map table Ans) Router# show frame-relay map is the the command to show the Frame Relay map table



Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control

Station Types No-transition mobility moreover stationary or moving only inside a BSS BSS-transition mobility is able to move from one BSS to another, but confined inside one

What are advantages of having e-commerce over extranets

What is NIC and WAN? NIC is short for Network Interface Card. This is a peripheral card that is joined to a PC in order to connect to a network. Each NIC has its own MAC addres

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b