Abstract
This chapter highlights some of the advanced uses for the Internet Protocols (IP) that are being developed and are gaining in importance in the world of networking. Many uses of IP require a special technique whereby IP traffic is passed from one point in the network to another without examination by transit nodes. This process is called “tunneling” and it facilitates functions such as traffic engineering and mobile IP. Tunneling is a significant technology, both in traffic engineering and in Virtual Private Networks (VPNs). A tunnel may be viewed by the end points as a virtual wire, making it appear that they are connected by a single hop from a management perspective—that is, the end points of the tunnel only need to be aware of each other's addresses and can rely on some other technology to carry data between them. Tunneling provides a convenient way to gather together IP packets that are to be treated in the same way. There are many tunneling techniques that exist at the data-link layer, below the level of IP. These include the Layer 2 Tunneling Protocol (L2TP), X.25, Frame Relay, and Asynchronous Transfer Mode (ATM).
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.