What Are The Main Purposses Of Tunnel In Networking?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Are the Main Purposes of Tunnel in Networking?
Tunneling un computer network is a communication protocol it allows the transfer of data from one computer network to another network by utilizing encapsulation. In encapsulation the process in which it allows to send personal network communication to the public network (like the internet). In tunneling, the traffic can be repacked into different forms but encryption conceals the nature of traffic through a tunnel.
Working:
Tunneling in a computer network works by utilizing the data of the payload (packets) to transfer the packet it provides the service. It uses the layered protocol such as TCP/IP and OSI protocol but it breaks the layering when using the payloads to transfer services not usually provided by the network. In layered model delivery protocol works at an equal or high level than the payload (packet) protocol.
Encapsulation:
All the packets use network protocols to get to their destinations. But all networks did not support all protocols. For example, the company wants to set (WAN) wide area network connecting offices b and c. The company uses the latest version of (IP) internet protocol like IPv6 but the network between offices B and C supports IPv4. So, by encapsulating IPv6 in IPv4 the company can use IPv6 to send data between the offices. Encapsulation is very important for network connections. In encryption, the data is scrambled and it can be descrambled by the specific key this undoing process is called decryption. If the header is also encrypted then the network routers not being able to transfer the data forward because they cannot see the header and do not know the encryption key. But encapsulated in the encrypted packet is an encrypted packet it can transfer across the network.
Application:
Many protocols use a public network to transfer data by using a VPN (Virtual Private Network) to make data secure specifically using encrypted data. For specific tunneling, these protocols are designed.
These are some examples of how tunneling protocol is used: