Tunnelling - point to point, Computer Networking

Tunnelling

To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.

 

2128_Tunnelling.png

                                                                              figure Addressing in a VPN

Posted Date: 3/19/2013 12:12:02 AM | Location : United States







Related Discussions:- Tunnelling - point to point, Assignment Help, Ask Question on Tunnelling - point to point, Get Answer, Expert's Help, Tunnelling - point to point Discussions

Write discussion on Tunnelling - point to point
Your posts are moderated
Related Questions
What is Microwave? Microwaves have been used in data communications. Microwave has a higher frequency than radio waves and thus can handle larger amounts of data.


Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Error Detection- Check Sum The Checksum generator are subdivides the data unit into equal segments of "n" bits (usually 16) These segments are added utilizing one's c

What does the following sequence of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0 Ans) It isolates network 10.0.0.0 and 172.68.7.0 and

MIME The Multipurpose Internet Mail Extensions While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for

The Data link layer performs the following: Responsible for physically passing data from single node to another. Translates messages from the upper layers into data frames and adds

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

TCP/IP Protocol Suite 1. What is the concept of Multi-protocol encapsulation in ATM networks? 2. Differentiate between RARP and ARP. 3. Differentiate TDP and UDP. 4. D

Overhead SONET overhead  is not added as headers or trailers as we have seen  in other  protocols. Instead SONET  insert overhead at a variety of location in middle  of the  f