SlideShare a Scribd company logo
Multiprotocol Label
Switching (MPLS)
 It is type of data-carrying technique for
high-performance telecommunication
networks that directs data from one
network node to the next based on short
path labels rather than long network
addresses
Multiprotocol Label
Switching (MPLS)
 The labels identify virtual links (paths)
between distant nodes rather than
endpoints
 MPLS can encapsulate packets of
various network protocol, hence its name
"multiprotocol"
TunnelingTunneling
 Tunneling is a protocol that allows for the
secure movement of data from one
network to another
 It involves allowing private network
communications to be sent across a public
network, such as the Internet, through a
process called encapsulation
TunnelingTunneling
 The encapsulation process allows for data
packets to appear as though they are of a
public nature to a public network when
they are actually private data packets,
allowing them to pass through unnoticed
 Tunneling is also known as port
forwarding
TunnelingTunneling
 The data are broken into smaller pieces
called packets.
 As the packets move through the tunnel,
they are encrypted and another process
called encapsulation occurs
TunnelingTunneling
 The private network data and the protocol
information that goes with it are
encapsulated in public network
transmission units for sending
 The units look like public data, allowing
them to be transmitted across the Internet
TunnelingTunneling
 Encapsulation allows the packets to arrive
at their proper destination. At the final
destination, de-capsulation and decryption
occur.
Point-to-Point Tunneling
Protocol (PPTP)
  It keeps proprietary data secure even
when it is being communicated over public
networks
 Authorized users can access a private
network called a virtual private network,
which is provided by an Internet service
provider. This is a private network in the
virtual sense because it is actually being
created in a tunneled environment.
Layer Two Tunneling Protocol
(L2TP)
 This type of tunneling protocol involves a
combination of using PPTP and Layer 2
Forwarding
 Tunneling is a way for communication to
be conducted over a private network but
tunneled through a public network.
Layer Two Tunneling Protocol
(L2TP)
 This is particularly useful in a corporate
setting and also offers security features
such as encryption options

More Related Content

What's hot

Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
CU
 
Mpls
MplsMpls
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
Online
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
Netwax Lab
 
MPLS
MPLS MPLS
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
Ericsson
 
Mpls basics introduction
Mpls basics introductionMpls basics introduction
Mpls basics introduction
Philip Agu Bah
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
Matiullah Jamil
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
Ahmad Atta
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
Jay Patel
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
Sherif Hussein
 
MPLS
MPLSMPLS
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 
MPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingMPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label Switching
Peter R. Egli
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
Nir Cohen
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
Reza Farahani
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
kennedy Ochieng Ndire
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
ymghorpade
 
Mpls basic
Mpls basicMpls basic
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
Reza Farahani
 

What's hot (20)

Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
Mpls
MplsMpls
Mpls
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
MPLS
MPLS MPLS
MPLS
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
Mpls basics introduction
Mpls basics introductionMpls basics introduction
Mpls basics introduction
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
 
MPLS
MPLSMPLS
MPLS
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
MPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingMPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label Switching
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Mpls basic
Mpls basicMpls basic
Mpls basic
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 

Viewers also liked

IEEE P2P 2011 Flexible Routing Tables
IEEE P2P 2011 Flexible Routing TablesIEEE P2P 2011 Flexible Routing Tables
IEEE P2P 2011 Flexible Routing Tables
Hiroya Nagao
 
A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs . A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs .
Save Manos
 
Multiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCsMultiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCs
Silicon Labs
 
A Hybrid Approach to Modeling End-to-End Delay in P2P Networks
A Hybrid Approach to Modeling End-to-End Delay in P2P NetworksA Hybrid Approach to Modeling End-to-End Delay in P2P Networks
A Hybrid Approach to Modeling End-to-End Delay in P2P Networks
Alpen-Adria-Universität
 
My Final Project
My Final ProjectMy Final Project
My Final Project
askkathir
 
IoT RF Protocols
IoT RF ProtocolsIoT RF Protocols
IoT RF Protocols
APNIC
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
Uwe Schmidt
 
LoRaWAN vs Haystack
LoRaWAN vs HaystackLoRaWAN vs Haystack
LoRaWAN vs Haystack
Haystack Technologies
 
Blue Ocean Strategy - Summary and Examples
Blue Ocean Strategy - Summary and ExamplesBlue Ocean Strategy - Summary and Examples
Blue Ocean Strategy - Summary and Examples
Khai Biau Yip
 

Viewers also liked (9)

IEEE P2P 2011 Flexible Routing Tables
IEEE P2P 2011 Flexible Routing TablesIEEE P2P 2011 Flexible Routing Tables
IEEE P2P 2011 Flexible Routing Tables
 
A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs . A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs .
 
Multiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCsMultiprotocol Wireless Gecko SoCs
Multiprotocol Wireless Gecko SoCs
 
A Hybrid Approach to Modeling End-to-End Delay in P2P Networks
A Hybrid Approach to Modeling End-to-End Delay in P2P NetworksA Hybrid Approach to Modeling End-to-End Delay in P2P Networks
A Hybrid Approach to Modeling End-to-End Delay in P2P Networks
 
My Final Project
My Final ProjectMy Final Project
My Final Project
 
IoT RF Protocols
IoT RF ProtocolsIoT RF Protocols
IoT RF Protocols
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
LoRaWAN vs Haystack
LoRaWAN vs HaystackLoRaWAN vs Haystack
LoRaWAN vs Haystack
 
Blue Ocean Strategy - Summary and Examples
Blue Ocean Strategy - Summary and ExamplesBlue Ocean Strategy - Summary and Examples
Blue Ocean Strategy - Summary and Examples
 

Similar to Tunneling in MPLS

Vp ns
Vp nsVp ns
F0322038042
F0322038042F0322038042
F0322038042
inventionjournals
 
Vpn
VpnVpn
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
earleanp
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
L2 tp., ip sec
L2 tp., ip secL2 tp., ip sec
L2 tp., ip sec
ZekriaMuzafar
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
Kirti Ahirrao
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdf
Huynh MVT
 
Vpn
VpnVpn
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
Pokala Sai
 
Cryptographic tunneling
Cryptographic tunnelingCryptographic tunneling
Cryptographic tunneling
Kevin Ndemo
 
Internet1
Internet1Internet1
Internet1
Joseph Lagod
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
Which of the following are VPN (Virtual Private Network) tunneling pro.docx
Which of the following are VPN (Virtual Private Network) tunneling pro.docxWhich of the following are VPN (Virtual Private Network) tunneling pro.docx
Which of the following are VPN (Virtual Private Network) tunneling pro.docx
jbarbara1
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 
5 Lan
5 Lan5 Lan
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
HNDE Labuduwa Galle
 
Modul 5 VPN.ppt
Modul 5 VPN.pptModul 5 VPN.ppt
Modul 5 VPN.ppt
cemporku
 

Similar to Tunneling in MPLS (20)

Vp ns
Vp nsVp ns
Vp ns
 
F0322038042
F0322038042F0322038042
F0322038042
 
Vpn
VpnVpn
Vpn
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 
L2 tp., ip sec
L2 tp., ip secL2 tp., ip sec
L2 tp., ip sec
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdf
 
Vpn
VpnVpn
Vpn
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 
Cryptographic tunneling
Cryptographic tunnelingCryptographic tunneling
Cryptographic tunneling
 
Internet1
Internet1Internet1
Internet1
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Which of the following are VPN (Virtual Private Network) tunneling pro.docx
Which of the following are VPN (Virtual Private Network) tunneling pro.docxWhich of the following are VPN (Virtual Private Network) tunneling pro.docx
Which of the following are VPN (Virtual Private Network) tunneling pro.docx
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
5 Lan
5 Lan5 Lan
5 Lan
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Modul 5 VPN.ppt
Modul 5 VPN.pptModul 5 VPN.ppt
Modul 5 VPN.ppt
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 

Tunneling in MPLS

  • 1. Multiprotocol Label Switching (MPLS)  It is type of data-carrying technique for high-performance telecommunication networks that directs data from one network node to the next based on short path labels rather than long network addresses
  • 2. Multiprotocol Label Switching (MPLS)  The labels identify virtual links (paths) between distant nodes rather than endpoints  MPLS can encapsulate packets of various network protocol, hence its name "multiprotocol"
  • 3. TunnelingTunneling  Tunneling is a protocol that allows for the secure movement of data from one network to another  It involves allowing private network communications to be sent across a public network, such as the Internet, through a process called encapsulation
  • 4. TunnelingTunneling  The encapsulation process allows for data packets to appear as though they are of a public nature to a public network when they are actually private data packets, allowing them to pass through unnoticed  Tunneling is also known as port forwarding
  • 5. TunnelingTunneling  The data are broken into smaller pieces called packets.  As the packets move through the tunnel, they are encrypted and another process called encapsulation occurs
  • 6. TunnelingTunneling  The private network data and the protocol information that goes with it are encapsulated in public network transmission units for sending  The units look like public data, allowing them to be transmitted across the Internet
  • 7. TunnelingTunneling  Encapsulation allows the packets to arrive at their proper destination. At the final destination, de-capsulation and decryption occur.
  • 8. Point-to-Point Tunneling Protocol (PPTP)   It keeps proprietary data secure even when it is being communicated over public networks  Authorized users can access a private network called a virtual private network, which is provided by an Internet service provider. This is a private network in the virtual sense because it is actually being created in a tunneled environment.
  • 9. Layer Two Tunneling Protocol (L2TP)  This type of tunneling protocol involves a combination of using PPTP and Layer 2 Forwarding  Tunneling is a way for communication to be conducted over a private network but tunneled through a public network.
  • 10. Layer Two Tunneling Protocol (L2TP)  This is particularly useful in a corporate setting and also offers security features such as encryption options