Font Size: a A A

Virtual Private Network To Carry Protocol-l2tp To Achieve

Posted on:2004-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:X X JiaFull Text:PDF
GTID:2208360095960233Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Now VPN technology has been used in everywhere。With the technology development,the tunneling technology become very important。In this article,we give all kinds of tunneling technology overview and implement the L2TP tunneling。We give the protocol's operation procedure. VPN is a very important technology and widely used. Through building the VPN on the internet,a enterprise can reduce the spending and have a privacy communication。For VPN provider,it will provide many kinds of service for user. Comparing all kinds of tunneling protocol,L2TP protocol has many virtue. So we choose the L2TP protocol to implement。At first,we describe the L2TP protocol and give the whole description about the protocol。We use many state machine in the implementing. It is very convenient to use the state table for the state machine implementing. Through the state table,we dissolve many problem and finished the implement.
Keywords/Search Tags:VPN, Tunnel, L2TP, IP in IP Encapsulation, L2F, PPTP, IPSec, PPP, Implement
PDF Full Text Request
Related items