It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lin...It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition.展开更多
This article describes how to utilize the VPN to construct the new Extranet’s topology. Firstly, it tells what is the Extranet. Secondly, some basic principles and technical idioms of the VPN are dealt with. Thirdly,...This article describes how to utilize the VPN to construct the new Extranet’s topology. Firstly, it tells what is the Extranet. Secondly, some basic principles and technical idioms of the VPN are dealt with. Thirdly, tunnel protocols about VPN are discussed. Finally, three kinds of Extranet’s architectures with VPNs are given. Through integrating the VPNs into the Extranet, we can get much more benefits from shared networks (e.g., Internet, ISDN, PSDN, etc.).展开更多
文摘It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition.
文摘This article describes how to utilize the VPN to construct the new Extranet’s topology. Firstly, it tells what is the Extranet. Secondly, some basic principles and technical idioms of the VPN are dealt with. Thirdly, tunnel protocols about VPN are discussed. Finally, three kinds of Extranet’s architectures with VPNs are given. Through integrating the VPNs into the Extranet, we can get much more benefits from shared networks (e.g., Internet, ISDN, PSDN, etc.).