Global Information Lookup Global Information

Tunneling protocol information


In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It can, for example, allow private network communications to be sent across a public network (such as the Internet), or for one network protocol to be carried over an incompatible network, through a process called encapsulation.

Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, it can hide the nature of the traffic that is run through a tunnel.

The tunneling protocol works by using the data portion of a packet (the payload) to carry the packets that actually provide the service. Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite, but usually violates the layering when using the payload to carry a service not normally provided by the network. Typically, the delivery protocol operates at an equal or higher level in the layered model than the payload protocol.

and 24 Related for: Tunneling protocol information

Request time (Page generated in 0.8443 seconds.)

Tunneling protocol

Last Update:

Secure Socket Tunneling Protocol IPSec (Protocol 50 and 51): Internet Protocol Security L2TP (Protocol 115): Layer 2 Tunneling Protocol VXLAN (UDP port...

Word Count : 1864

Layer 2 Tunneling Protocol

Last Update:

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery...

Word Count : 1826

Secure Socket Tunneling Protocol

Last Update:

Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an...

Word Count : 747

Tunnel Setup Protocol

Last Update:

(SASL) protocol Tunnel encapsulation for a variety of tunneling scenarios: IPv6 over IPv4 tunnels IPv4 over IPv6 tunnels IPv6 over UDP/IPv4 tunnels for built-in...

Word Count : 302

GPRS Tunnelling Protocol

Last Update:

GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS, LTE...

Word Count : 2229

Virtual private network

Last Update:

plaintext tunneling protocols include Layer 2 Tunneling Protocol (L2TP) when it is set up without IPsec and Point-to-Point Tunneling Protocol (PPTP) or...

Word Count : 3697

Tunneling

Last Update:

Look up tunneling in Wiktionary, the free dictionary. Tunneling or tunnelling may refer to: Digging tunnels (the literal meaning) Hobby tunneling Quantum...

Word Count : 112

Teredo tunneling

Last Update:

port 3544. For 6to4, the most common IPv6 over IPv4 tunneling protocol, requires that the tunnel endpoint have a public IPv4 address. However, many hosts...

Word Count : 3433

Layer 2 Forwarding Protocol

Last Update:

L2F, or Layer 2 Forwarding, is a tunneling protocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet...

Word Count : 132

SCSI connector

Last Update:

installed in an SAS drive bay, and the enclosure can use the Serial ATA Tunneling Protocol (STP) to make use of the drive.: 16, 17  There are keyed parts to...

Word Count : 2744

Generic Routing Encapsulation

Last Update:

Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point...

Word Count : 1288

HTTP tunnel

Last Update:

tunnel is created by an intermediary called a proxy server which is usually located in a DMZ. Tunneling can also allow communication using a protocol...

Word Count : 591

IP tunnel

Last Update:

to block IP tunnels. The first specification of IP tunneling was in RFC 1075, which described DVMRP, the first IP multicast routing protocol. Because multicast...

Word Count : 467

List of IP protocol numbers

Last Update:

This is a list of the IP protocol numbers found in the field Protocol of the IPv4 header and the Next Header field of the IPv6 header. It is an identifier...

Word Count : 120

IPsec

Last Update:

alternative to DPD. The IPsec protocols AH and ESP can be implemented in a host-to-host transport mode, as well as in a network tunneling mode. In transport mode...

Word Count : 5081

IP in IP

Last Update:

IP in IP is an IP tunneling protocol that encapsulates one IP packet in another IP packet. To encapsulate an IP packet in another IP packet, an outer header...

Word Count : 519

Virtual Extensible LAN

Last Update:

Overlay Transport Virtualization (OTV) Virtual LAN (VLAN) Layer 2 Tunneling Protocol (L2TP) Steve Herrod (August 30, 2011). "Towards Virtualized Networking...

Word Count : 554

List of computing and IT abbreviations

Last Update:

Video, Mouse L10N—Localization L2TP—Layer two Tunneling Protocol LACP—Link Aggregation Control Protocol LAMP—Linux Apache MySQL Perl LAMP—Linux Apache...

Word Count : 6615

Multiprotocol Label Switching

Last Update:

paths between endpoints. MPLS can encapsulate packets of various network protocols, hence the multiprotocol component of the name. MPLS supports a range...

Word Count : 4549

GPRS core network

Last Update:

network. All GSNs should have a Gn interface and support the GPRS tunneling protocol. There are two key variants of the GSN, namely gateway GPRS support...

Word Count : 2032

SoftEther VPN

Last Update:

University of Tsukuba. VPN protocols such as SSL VPN, L2TP/IPsec, OpenVPN, and Microsoft Secure Socket Tunneling Protocol are provided in a single VPN...

Word Count : 2053

ICMP tunnel

Last Update:

packets. An example of this technique is tunneling complete TCP traffic over ping requests and replies. ICMP tunneling works by injecting arbitrary data into...

Word Count : 559

Voice over IP

Last Update:

be provided by using encryption and tunneling. The common tunneling protocol used is Layer 2 Tunneling Protocol and the common encryption mechanism used...

Word Count : 9910

Communication protocol

Last Update:

example, protocols are often stacked in a tunneling arrangement to accommodate the connection of dissimilar networks. For example, IP may be tunneled across...

Word Count : 8206

PDF Search Engine © AllGlobal.net