Tunnelling - point to point, Computer Networking

Tunnelling

To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.

 

2128_Tunnelling.png

                                                                              figure Addressing in a VPN

Posted Date: 3/19/2013 12:12:02 AM | Location : United States







Related Discussions:- Tunnelling - point to point, Assignment Help, Ask Question on Tunnelling - point to point, Get Answer, Expert's Help, Tunnelling - point to point Discussions

Write discussion on Tunnelling - point to point
Your posts are moderated
Related Questions
NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network. The NIC gives a physical connection among the networking medium and the comput

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

What is BGP (Border Gateway Protocol)? It is a protocol used to promote the set of networks that can be reached within an autonomous system. BGP enable this information to be c

What are the drawbacks of ARCNet? Here are some drawbacks of ARCNet: 1.  Standard ARCNet is very slow (2.5 Mb/s). It is almost seven times slower than Token Ring. 2.  ARC

restore the scrambled bits to their original order

A statistical encoding algorithm is being considered for the transmission of a large number of long text files over a public network. Part of the file content is as follows: DOD

Name the three ways or wireless data to be propagated.

Q. Describe OSI Routing Architecture? End systems (ESs) as well as intermediate systems (ISs) use routing protocols to distribute (-advertise?) some or all of the informati

Concept of how does the IP message finally reassemble?

What is one basic requirement for establishing VLANs? A VLAN needs dedicated equipment on each end of the connection that permits messages entering the Internet to be encrypted