Tunnelling - point to point, Computer Networking

Assignment Help:

Tunnelling

To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then encapsulated in  another  datagram as shown in figure.

This is called  tunnelling  because the original  datagram is hidden inside the outer  datagram  after  exiting  R1 in and becomes  invisible until it reaches R2. It looks as if the  original  datagram has gone  through  a tunnel that  spans R1 an dR2.

As the  figure  shows  the entire  IP datagram  is first  encrypted carries  the actual  source and destination address of the  packet. The  outer datagram header carries  the source and destination of the two  routers at eh boundary of the  private and public  networks  as shows in figure.

 

2128_Tunnelling.png

                                                                              figure Addressing in a VPN


Related Discussions:- Tunnelling - point to point

Default cdp broadcast update rate for cisco routers, What is the default CD...

What is the default CDP broadcast update rate for Cisco routers? Ans) Cisco Discovery Protocol is a proprietary protocol to permit you to access configuration information on oth

Subnet masking and designing small networks, The hotel has a class C public...

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This

Error correcting code - hamming code, Error Correcting Code - Hamming Code:...

Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

Host system in tcp-ip model, Q. Host System in TCP-IP model? - Standard...

Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the

Name the presentation layer standards, A.) JPEG and PICT B.) MPEG and MI...

A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC For example, the Presentation layer would be liable for changing from EDCDIC to ASCII. Data compression, decompres

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

What is the main purpose of ospf, What is the main purpose of OSPF? OSP...

What is the main purpose of OSPF? OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to verify the best possible path for data exchang

Interconnection networks and sorting, As in PRAM, there was no direct commu...

As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd