· Web viewTunneling process requires internet protocols, carrier protocols and encapsulating...
Transcript of · Web viewTunneling process requires internet protocols, carrier protocols and encapsulating...
protocols. encapsulating and protocols carrier protocols, internet requires process Tunneling
Tunneling connections need to be secure since they run over the internet. they used to create tunnels. When employees of a company are located outside of main office over different cities Point-to-Point connections are used to create tunnels through the internet. encapsulating packets and sending them over the public network. A connection that forms a virtual network is called a tunnel. Tunneling is a process of
Tunneling and Point to Point Protocol (PPP)
Fig: Three types of VPNs to and from a headquarter organization
v Companies can create their own VPNs to remote employees and distant offices for communication.
v When they establish VPN connection they need to think about security.v Using firewalls, encryption system, IPsec features and authentication server they can
provide a well protected virtual private network.
1. firewall: a firewall acts as an effective barrier between private network and the internet.
2. Encryption System: these systems are used to hide the original information by giving some other representation to it.
Security in VPNs
Figure: A point-to-point protocol (PPP) UDP tunnel connection
Fig: protocol packet tunneling through the Internet
offices communicate each other. When R2 receives these packets it decapsulates and sends them to office 2, thus two transport layer UDP datagrams to transmit them to IP Gateway R2. The IP Gateway R1 on office 1 listens for X-type packets and encapsulates them in X-type packet cannot run over the internet directly. Suppose office 1 and office 2 use their own networking protocols denoted by X. using tunnels.
the through connected offices two of LANs two shows below figure The internet
Encapsulating protocols, though which data is wrapped, encapsulated and secured. 2.Carrier protocols, through which information travels over the public network 1.
www.allsyllabus.com