Tunneling and Point to Point Protocol (PPP)

A connection that forms a virtual network is called a tunnel. Tunneling is a process of encapsulating packets and sending them over the public network.
Point-to-Point connections are used to create tunnels through the internet.
When employees of a company are located outside of main office over different cities they used to create tunnels.
Tunneling connections need to be secure since they run over the internet.
Tunneling process requires internet protocols, carrier protocols and encapsulating
protocols.
1. Carrier protocols, through which information travels over the public network
2. Encapsulating protocols, though which data is wrapped, encapsulated and secured.
* The figure below shows two LANs of two offices connected through the internet
using tunnels.
* Suppose office 1 and office 2 use their own networking protocols denoted by X.
* X-type packet cannot run over the internet directly.
* The IP Gateway R1 on office 1 listens for X-type packets and encapsulates them in transport layer UDP datagrams to transmit them to IP Gateway R2.

* When R2 receives these packets it decapsulates and sends them to office 2, thus two offices communicate each other.

Fig: protocol packet tunneling through the Internet
Figure: A point-to-point protocol (PPP) UDP tunnel connection

0 comments