Explore chapters and articles related to this topic
The Future of the Enterprise
Published in Marcus K. Weldon, The Future X Network, 2018
Fuad Siddiqui, Kevin Sparks, Furquan Ansari
These tunnels are terminated at the gateways before the data traffic gets forwarded to networks within the enterprise. Such VPNs have become commonplace, with IPSec being one of the most popular technologies employed, but other VPN protocols are in use, including SSL/TLS, OpenVPN, DTLS and SSH. These tunneling protocols provide encryption to ensure privacy and protect against theft of information through methods such as deep packet inspection. VPN services include user authentication using some combination of passwords, two-factor authentication, certificates and/or biometrics. VPNs also ensure the integrity of the data from tampering. With workers connecting to the enterprise using cellular-based devices, such as smartphones and tablets, mobile VPNs have become more common. In the future, these mobile VPNs will allow users to roam across cellular and Wi-Fi networks, seamlessly changing IP addresses without service disruption or user authentication requests.
Next Generation Wireless Technologies
Published in K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz, Wireless Multimedia Communication Systems, 2017
K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
Intersystem service access (Level B) provide users the availability of specific services located in the home network while they are connected via a visited RAN. Intersystem user data transfer is a mechanism that enables the transfer of user data between interworking networks. A common approach to enforce user data transfer between networks relies on tunneling protocols. Tunnels may be established either directly between mobile terminals and remote gateways or may require additional dedicated nodes.
SRv6 OAM and On-Path Network Telemetry
Published in Zhenbin Li, Zhibo Hu, Cheng Li, SRv6 Network Programming, 2021
Zhenbin Li, Zhibo Hu, Cheng Li
Tunneling technologies are used extensively on networks, especially in multi-AS scenarios. Such technologies typically encapsulate a new tunneling protocol header outside the original packets, and only the outer encapsulation is processed during tunnel forwarding. Consequently, devices will process IFIT instructions differently depending on whether the instructions are inserted into the outer protocol header or the inner original packet.
Deploying IPv4-only Connectivity across Local IPv6-only Access Networks
Published in IETE Technical Review, 2019
The DS-Lite (Dual-Stack Lite Broadband Deployments Following IPv4 Exhaustion) [25,26] protocol is introduced to allow the IPv6 ISPs (after the migration period) to provide IPv4 service to their subscribers by tunnelling the IPv6 traffic into IPv6 packets and forwarding them across the IPv6 network infrastructure. The DS-Lite protocol also helps to share the available public IPv4 addresses among subscribers, by assigning private IPv4 addresses to the subscribers’ hosts. This can be achieved by combining the IPv4-in-IPv6 “softwire tunneling” (Softwire Hub and Spoke Deployment Framework with Layer Two Tunneling Protocol Version 2 (L2TPv2)) [30] and performing the NAT function (see further).