Tunnelling - point to point, Computer Networking

Assignment Help:

Tunnelling

To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.

 

2128_Tunnelling.png

                                                                              figure Addressing in a VPN


Related Discussions:- Tunnelling - point to point

What do you mean by auto-reconfiguration, What do you mean by Beaconing an...

What do you mean by Beaconing and Auto-Reconfiguration? When a station does not receive a message from its nearest active upstream neighbor, it sends out a warning, otherwise c

Name the protocol responsible for finding the mac address , a)  What does t...

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?   b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases

Netware protocol provides link-state routing, Which NetWare protocol provid...

Which NetWare protocol provides link-state routing? Ans) NetWare Link Services Protocol (NLSP) gives link-state routing. SAP (Service Advertisement Protocol) advertises network

What is a dedicated server, What is a dedicated server? A network serve...

What is a dedicated server? A network server designated to provide one particular service is known as dedicated server. For example if a computer is assigned for database servi

Explain inference, What is inference? Ans) The principle of "inference"...

What is inference? Ans) The principle of "inference" is fairly a simple one: being capable to derive new data from data that you already know. In a mathematical sense, querying

Measurement on latency and bandwidth , Measure the performance (both latenc...

Measure the performance (both latency and throughput) of  TCP and UDP protocol stack  running on a pair of PCs  or Workstations in the Lab, and compare the results of your software

Prepare a lan from a set of stand-alone computers, Question 1: Describe...

Question 1: Describe the following terms in your own words: a. Internet b. WWW c. Intranet

Describe various mail protocols, Question 1 Describe the following a. Inte...

Question 1 Describe the following a. Internet Technologies b. Networks c. Media Access Control Question 2 Explain the various classes of networks Question 3 Describe various m

What does ''p'' mean when running a trace, When a P is returned when a Trac...

When a P is returned when a Trace is run, it means the Protocol is unreachable.

Why we use filter option, When we specifically block, single router update ...

When we specifically block, single router update for other routers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd