tunneling protocol


Also found in: Dictionary, Medical, Wikipedia.

tunneling protocol

A network protocol that encapsulates packets at a peer level or below. It is used to transport multiple protocols over a common network as well as provide the vehicle for encrypted virtual private networks (VPNs). It is said to "tunnel" because it "pushes through" packets of different types.

Encapsulate Same or Lower Layer
In a regular protocol, the lower layer protocol encapsulates packets from the higher level protocol. For example, a network layer 3 packet encapsulates a transport layer 4 packet, and a data link layer 2 packet encapsulates a network layer 3 packet.

In contrast, a tunneling protocol encapsulates a packet of the same or lower layer. For example, generic routing encapsulation (GRE) can contain a layer 3 IPX packet within a layer 3 IP packet. A virtual private LAN service (VPLS) encapsulates a layer 2 Ethernet frame within a layer 3 IP packet. See IP tunneling, L2TP, SSTP, GRE and VPLS.
References in periodicals archive ?
INITIAL SAS DEPLOYMENTS CASE 1: Ultra320 SCSI Replacement CASE 2: "Super-sized" SATA Investment Protection Improved Reliability * Legacy SCSI Compatibility * Signal Integrity SATA Compatibility Improved Scalability * SATA Tunneling Protocol * Addressability Improved Scalability Out-of-box Expansion * Addressing/Cabling * External Cabling Improved Performance Multi-Initiator Support * Bandwidth & Wide Links * SATA Tunneling Investment Availability Failover Support * Dual-porting * Dual Porting Improved Reliability Improved Availability * Point-to-point * (RAID 6)
It combines the best of Cisco's Layer 2 Forwarding protocol and Microsoft's Point-to-Point Tunneling Protocol.
Stealth uses a Unisys-developed storage virtualisation technology and tunneling protocol that supports information sharing among different user communities, while permitting data to be accessed only by users authorised to see it, the company said.
Serial ATA Tunneling Protocol (STP) supports half duplex connections to the SATA devices attached to expanders.
Meanwhile, flaws discovered in the GSM digital cellular decryption algorithm and in Microsoft's point to point tunneling protocol made it clear that closed groups working on proprietary technology are at a serious disadvantage compared to their open, peer-reviewed rivals like the far more robust IPSec.
SATA commands are transmitted over SAS connections as a "tunneling" protocol called SATA Tunneling Protocol (STP).
Other alternatives include Microsoft's Point-to-Point Tunneling Protocol (PPTP), and L2TP, which combines PPTP with the similar Cisco Systems' Layer 2 Forwarding Protocol.
Cisco Systems have launched solutions to allow service providers to deliver Access VPNs, Intranet VPNs and Extranet VPNs and also released the Layer 2 Tunneling Protocol (L2TP) within Cisco's IOS software.
The Serial Management Protocol (SMP) is used simply for managing the new serial point-to-point topology, while the SATA Tunneling Protocol (STP) allows Serial-Attached SCSI to interface seamlessly with SATA devices.
Microsoft's point-to-point tunneling protocol (PPTP) creates tunnels for transporting multiprotocol traffic over the Internet, but its capabilities are more limited than IPSec's.
Efficient's VPN solution uses Layer 2 tunneling protocol to create a LAN-to-LAN communications link called a tunnel (a virtual path).