By Topic

Research on tunneling techniques in virtual private networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zhao Aqun ; Dept. of Comput. Sci. & Eng., Southeast Univ., Nanjing, China ; Yuan Yuan ; Ji Yi ; Gu Guanqun

It is a trend of virtual private networks (VPN) to be used for information exchange between enterprises, between branches of enterprises and between enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. With the VPN implementation requirements in mind, we perform comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition

Published in:

Communication Technology Proceedings, 2000. WCC - ICCT 2000. International Conference on  (Volume:1 )

Date of Conference: