Tunnelling - point to point, Computer Networking


To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.



                                                                              figure Addressing in a VPN

Posted Date: 3/19/2013 12:12:02 AM | Location : United States

Related Discussions:- Tunnelling - point to point, Assignment Help, Ask Question on Tunnelling - point to point, Get Answer, Expert's Help, Tunnelling - point to point Discussions

Write discussion on Tunnelling - point to point
Your posts are moderated
Related Questions
Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b)  Configure memory

Process Switching It applies the brute force method to switch packets wih consumption of large amount of CPU time List of items are needed when switching packets Routing

There are two logical addressing :- a) Datalink is physical (hardware) addressing. b) Network is logical (software) addressing.

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

categories of LAN

Explain multipoint connection. A multipoint connection is a link among three or more devices. Historically, multipoint connections were used to attach central CPs to distribute

Process communicating End   systems  communicate with each  other by the  processes. A process  can be  thought  of a s program  that is  running  within  end systems. Process

Q. Show about Alternate mark inversion? Bipolar AMI - Neutral, zero voltage represents binary 0 - Binary 1s symbolized by alternating positive and negative voltages