Encapsulation data in an IP packet for transport across the internet.
During tunneling, data from one protocol is embedded in another network protocol. This allows for secure (encrypted) connections (such as SSH) to be created via unsecured networks (TCP/IP, SMTP). A tunnel can also be used to circumvent a firewall. A user from the intranet can employ an outgoing tunnel to access external computers, networks or services. An incoming tunnel allows an external user access to a service, computer or data on the intranet.
The process of encrypting an entire IP packet, and wrapping it in another (unencrypted) IP packet. The source and destination addresses on the inner and outer packets may be different.
A technique to encapsulate a protocol X in a different protocol Y.
Transmitting data structured in one protocol format within the format of another protocol. Tunneling allows other types of transmission streams to be carried within the prevailing protocol.
A method of using an internetwork infrastructure of one protocol to transfer a payload (the frames or packets) of another protocol.
Provides services on a point-to-point basis without the data needing to change to accomodate differing network types or protocols.
The same as encapsulation as a Tunnel, but with additional connotations about changing the effects of Internet routing on the original IP packet. Back to the Top UMTS. Universal Mobile Telecommunications System. The GSM-based evolution for 3G wireless communications. This term is also referred to as W-CDMA.
A method of encapsulating data so it can be transmitted across a network that operates with a different protocol.
An interim deployment strategy to connect islands of multicast routers separated by links which do not support IP Multicast. Tunneling is used extensively in the MBONE. Tunneling is discussed in the IP Multicast Initiative white paper Introduction to IP Multicast Routing.
A secure connection between a client workstation and an intranet or other network, that provides a VPN to a user. This connection may be a voluntary tunnel initiated by the client or a compulsory tunnel initiated during authentication by a server or other dedicated network equipment.
Encapsulating data from one application/protocol to another - used for transporting multiple protocols over single connections, also used in network security applications.
Architecture that is designed to provide the services necessary to implement any standard point-to-point encapsulation scheme. See also Encapsulation.
Tunneling is technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft's PPTP technology enables organizations to use the Internet to transmit data across a virtual private network (VPN). It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet.
Tunneling is used to get data between administrative domains which use a protocol that is not supported by the internet connecting those domains.
The process of encapsulating a packet within a packet of a different protocol. Using tunneling, two networks based on the same protocol can communicate across a network based on a different protocol. For example, IPX packets can have IP headers attached so that they can be transported across the Internet.
The mechanism by which IPv6 packets are placed inside IPv4 packets and routed through the IPv4 routers.
This is an internet term which means setting up a link across different networks so that the two computers (or XBOXes) at either end can talk to eachother just like they were on the same network. This sets up a type of Virtual Private Network connection.
Architecture providing the services necessary to implement any standard point-to-point data encapsulation scheme.
A technique used to create private networks on the public systems of the Internet.
The act of transmitting data formed with one protocol within the structures of another protocol, allowing the data to be sent in the prevailing format of a network (usually IP). Examples of tunneling used in VPNs include L2TP and Microsoftâ€(tm)s PPTP.
The encapsulation of one protocol within another. Tunneling is often used to transport a LAN protocol across a backbone network that does not support the LAN protocol.
A mechanism of forwarding traffic from remote users to a corporate network through an existing public IP network. Data is encapsulated within an IP datagram and then decapsulated at the other end point of the tunnel. See also BayDVS TM, GRE, VPN.