0% found this document useful (0 votes)
34 views

Tunneling

Tunneling technology offers several key advantages: 1) It is simple to implement as it does not require changes to existing infrastructure. 2) It provides security as data traveling through tunnels is protected despite being transmitted over public networks. 3) It is cost-effective by using public networks instead of expensive private intranets or long-distance leased lines. Voluntary tunnels are requested by client nodes, with the client acting as the endpoint. A separate tunnel is provided for each communication. Compulsory tunnels are created by intermediate devices, with the device as the endpoint. The same tunnel is shared by multiple communications, making data exchange slower.

Uploaded by

AmoOonz
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Tunneling

Tunneling technology offers several key advantages: 1) It is simple to implement as it does not require changes to existing infrastructure. 2) It provides security as data traveling through tunnels is protected despite being transmitted over public networks. 3) It is cost-effective by using public networks instead of expensive private intranets or long-distance leased lines. Voluntary tunnels are requested by client nodes, with the client acting as the endpoint. A separate tunnel is provided for each communication. Compulsory tunnels are created by intermediate devices, with the device as the endpoint. The same tunnel is shared by multiple communications, making data exchange slower.

Uploaded by

AmoOonz
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Q1: Tunneling technology offers a number of advantages that have played a major role in its popularity,

briefly state and explain two of these advantages.

- Simplicity and ease of implementation:


Tunneling concept is simple. There is no need to change the existing infrastructure to accommodate
tunneling technology.
- Security
Tunnel access is protected. As a result data traveling through the tunnels is relatively safe – despite
the fact that the data is being transmitted across an unsafe and public medium, such as the Internet.
- Cost-effectiveness
Tunneling uses public networks as the intermediate internet. This makes tunneling an extremely cost-
effective solution, especially when you compare it to the cost of implementing private intranets that
span the globe or long distance lease lines. Organizations save money spend annually on the
administration and maintenance of these expensive solutions.
- Protocol indifference
Tunneling allows you to route non-IP packets, e.g. NetBIOS, successfully to the destination by
encapsulating them within IP packets.
- IP address saving
As mentioned earlier, tunneling allows protocols with non-routable non-IP addresses to be inserted
within a packet that uses a globally unique public IP address. As a result, instead of having to buy and
assign a globally unique IP address for each node within the network, the network can buy a small
collection of public IP addresses. Tunneling reduces the organization’s need for globally unique IP
addresses.

Q2: Based on the manner in which a tunnel is created, it can be either voluntary or compulsory.
Compare between the two types (3 factors).

Voluntary (end-to-end) Tunnels Compulsory Tunnels

Tunnel is requested and created by the client Tunnel is created and configured by intermediate devices
node e.g. NAS or RAS
The initiator (client) acts as the tunnel
The intermediate device acts as the tunnel endpoints.
endpoints
A separate tunnel is provided for each The same tunnel is shared by multiple ongoing
ongoing communication communication
A tunnel is terminated when the data The tunnel is not terminated until the last communicating
exchange between the two ends is complete pair completes data transaction
Data exchange between the two entities is slow; because
Data exchange between the two ends is faster
the tunnel is shared by multiple communications

You might also like