Friday, June 12, 2009

virtual private networks tunneling

The Virtual private network it work on the base of tunneling protocol . Virtual private network tunneling establishing and maintaining his network connection, when user go out of office then he connect his localy network . On the connection, packets constructed in a specific VPN protocol format are encapsulated within some protocols, then transmitted between Virtual private network client and server.

The Virtual private networks, VPN protocols also support authentication and encryption to keep the tunnels secure. when connect his clients on his domain that time his network secure, VPN supports two types of tunneling - voluntary and compulsory. Both types of tunneling are commonly used. In voluntary tunneling, the VPN client manages connection setup. The client first makes a connection to the carrier network provider. Then, the VPN client application creates the tunnel to a VPN server over this live connection.

The some computer network protocols have been implemented We are use with VPN tunnels protocols. There are some most popular VPN tunneling protocols PPTP, L2TP, IPsec. These protocols are generally incompatible with each other. Several corporations worked together to create the PPTP specification. People generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in client support for this protocol. The initial releases of PPTP for Windows by Microsoft contained security features that some experts claimed were too weak for serious use. Microsoft continues to improve its PPTP support, though.

The The Virtual private networks original competitor to PPTP for VPN tunneling was L2F, a protocol implemented. with the cisco because cisco is very efective technology. In an attempt to improve on L2F, the best features of it and PPTP were combined to create new standard called L2TP. Like PPTP, L2TP exists at the data link layer. because it is transfers data between adjacent network nodes in a wide area network or between nodes on the same local area network segment.

Thus the origin of its name. IPsec is actually a collection of multiple related protocols. It can be used as a complete VPN protocol solution, or it can used simply as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer. because The Network Layer is responsible for end-to-end (source to destination) packet delivery including routing through intermediate hosts, whereas the Data Link Layer is responsible for node-to-node (hop-to-hop) frame delivery on the same link.

Source: http://compnetworking.about.com/od/vpn/a/vpn_tunneling.htm

No comments:

Post a Comment