What Are the Different Tunnel Jobs?

Tunneling technology is a way to transfer data between networks by using the infrastructure of the Internet. The data (or payload) passed through the tunnel can be data frames or packets of different protocols. The tunneling protocol reseals the data frames or packets of these other protocols in a new header and sends them. The new headers provide routing information so that encapsulated payload data can be passed over the Internet. [1]

There are two types of tunnels: voluntary tunnels and mandatory tunnels. [2]
Tunnel technology is the basis of VPN technology. During the process of creating a tunnel, the client and server of the tunnel must use the same tunneling protocol. press

GPRS Tunnel technology GPRS protocol

With the development of tunnel technology, various services have begun to formulate corresponding tunnel protocols based on the characteristics of this service. One example is the GTP (GPRS Tunnel Protocol) in the General Packet Radio Service (GPRS). [5]
GPRS is a new bearer service of packet switching and packet transmission methods provided by GSM. It can be applied inside PLMN (Public Land Mobile Network) or between GPRS network and external interconnected packet data networks (IP, X.25) Data transmission. GPRS can provide seamless connection to existing data services. It adds two nodes in the GSM network: the serving GPRS support node (SGSN-serving GPRS support node) and the gateway GPRS support node (GGSN-Gateway GPRS support node). [5]
SGSN is the interface between the GPRS backbone network and the radio access network, and it switches packets to the correct base station subsystem (BSS). Its tasks include providing encryption, authentication, session management, mobility management and logical link management for mobile stations. It also provides connections to databases such as HLR. [5]
Through the GPRS tunneling protocol, tunnels can be provided for data packets of multiple protocols through the GPRS backbone network. GTP uses TCP or UDP protocols to provide reliable connections (such as supporting X.25 packet transmission) and connectionless services (such as IP packet), depending on the protocol requirements carried. [5]
Encapsulating a frame into different types of frames becomes a tunneling technique. [5]

Linux Tunneling Technology in Linux

In order to transmit data packets of other protocols in the TCP / IP network, Linux uses an IP tunneling technology. In the bridge technology that has been used for many years, it is achieved by putting an IP protocol cap on the source protocol data packet. [5]
Protocol packets transmitted using IP tunnels also include IP data packets, which is the case with Linux's IPIP packet encapsulation. Mobile-IP and IP-Multicast are two popular examples. IP tunnel technology also shows great charm in VPN. [5]
Mobile IP is a service that provides mobile functions on the global Internet. It allows nodes to maintain ongoing communications when switching links. It provides an IP routing mechanism that enables mobile nodes to connect to any link with a permanent IP address. Unlike specific host routing technologies and data link layer solutions, Mobile IP also addresses security and reliability issues and is independent of the transmission medium. The scalability of Mobile IP makes it applicable across the Internet. [5]

VPN Tunneling technology VPN protocol

Tunnel technology application VPN is the product of the rapid development of Internet technology. Its simple definition is to establish its own private data network on the public data network. In other words, long-distance dedicated lines are no longer used to establish private data networks, but instead, full public data networks are used to establish their own private networks. Its advantage is that it can be connected to any place that the public network can reach, enjoy its confidentiality, security and manageability, and reduce the cost of network use. [5]
VPN relies on Internet service providers (ISPs) and other network service providers (NSPs) to establish their own dedicated "tunnels" in public networks. Different information sources can use different "tunnels" for transmission. [5]
The newly released standard ISE CHEIP6 version guarantees the security and encryption of user data. Because users are sensitive to the transmission of personal data on corporate networks, more integrated VPN technologies will soon become popular. [5]

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?