A connection that forms a virtual
network is called a tunnel. Tunneling is a process of encapsulating packets and
sending them over the public network.
Point-to-Point connections are
used to create tunnels through the internet.
When employees of a company are
located outside of main office over different cities they used to create
tunnels.
Tunneling connections need to be
secure since they run over the internet.
Tunneling process requires
internet protocols, carrier protocols and encapsulating
protocols.
1. Carrier protocols, through
which information travels over the public network
2. Encapsulating protocols,
though which data is wrapped, encapsulated and secured.
* The figure below shows two LANs
of two offices connected through the internet
using tunnels.
* Suppose office 1 and office 2
use their own networking protocols denoted by X.
* X-type packet cannot run over
the internet directly.
* The IP Gateway R1 on office 1
listens for X-type packets and encapsulates them in transport layer UDP
datagrams to transmit them to IP Gateway R2.
* When R2 receives these packets
it decapsulates and sends them to office 2, thus two offices communicate each
other.
Fig: protocol
packet tunneling through the Internet
Figure: A
point-to-point protocol (PPP) UDP tunnel connection
0 comments