Tunnelling - point to point, Computer Networking

Tunnelling

To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.

 

2128_Tunnelling.png

                                                                              figure Addressing in a VPN

Posted Date: 3/19/2013 12:12:02 AM | Location : United States







Related Discussions:- Tunnelling - point to point, Assignment Help, Ask Question on Tunnelling - point to point, Get Answer, Expert's Help, Tunnelling - point to point Discussions

Write discussion on Tunnelling - point to point
Your posts are moderated
Related Questions
What is source route and OSPF? Source route It is a series of IP addresses identifying the route a datagram must follow. A source route might optionally be included in an

What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but d

Discuss about the Hypertext The hypertext allows for the integration of text, graphics, audio and video on a webpate. This can make it very easy to browse and very exciting to

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

Memory Pools IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al


Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's

Unfortunately, building real-life distributed systems is not easy. It is hard, for instance, to implement instructions such as "send this data structure to be processed on that com

Reliable  data transfer  over a perfectly reliable channel rdt 1.0 First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protoco

VLAN ( Virtual Local Area Network) is a concept of creating distinct broadcast domains. It is a network which aims at partitioning the physical network. VLAN comprises all the attr