计算机科学
計算機科學
계산궤과학
COMPUTER SCIENCE
2003年
1期
99-101
,共3页
Virtual private network (VPN),Tunneling technique,MPLS,IPSec,GRE,IP-in-IP,L2TP
Virtual private network (VPN),Tunneling technique,MPLS,IPSec,GRE,IP-in-IP,L2TP
Virtual private network (VPN),Tunneling technique,MPLS,IPSec,GRE,IP-in-IP,L2TP
Virtual private network (VPN)%Tunneling technique%MPLS%IPSec%GRE%IP-in-IP%L2TP
Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,and L2TP. We can conclude the evolutive trend of utilizing tunneling techniques in VPN by analyzing them syntheti-cally. Especially, it will probably become a key problem that guarantees the compatibility and interoperability be-tween MPLS, IPSec and L2TP.
Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,and L2TP. We can conclude the evolutive trend of utilizing tunneling techniques in VPN by analyzing them syntheti-cally. Especially, it will probably become a key problem that guarantees the compatibility and interoperability be-tween MPLS, IPSec and L2TP.
Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,and L2TP. We can conclude the evolutive trend of utilizing tunneling techniques in VPN by analyzing them syntheti-cally. Especially, it will probably become a key problem that guarantees the compatibility and interoperability be-tween MPLS, IPSec and L2TP.
Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,and L2TP. We can conclude the evolutive trend of utilizing tunneling techniques in VPN by analyzing them syntheti-cally. Especially, it will probably become a key problem that guarantees the compatibility and interoperability be-tween MPLS, IPSec and L2TP.