Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Tunneling protocol
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Computer communications protocol}} {{IPstack}} In [[computer network]]s, a '''tunneling protocol''' is a [[communication protocol]] which allows for the movement of data from one network to another. They can, for example, allow [[private network]] communications to be sent across a public network (such as the [[Internet]]), or for one network protocol to be carried over an incompatible network, through a process called [[Encapsulation (networking)|encapsulation]]. Because tunneling involves repackaging the traffic data into a different form, perhaps with [[encryption]] as standard, it can hide the nature of the traffic that is run through a tunnel. Tunneling protocols work by using the data portion of a [[Network packet|packet]] (the [[Payload (computing)|payload]]) to carry the packets that actually provide the service. Tunneling uses a layered protocol model such as those of the [[Open Systems Interconnection|OSI]] or [[TCP/IP]] protocol suite, but usually violates the layering when using the payload to carry a service not normally provided by the network. Typically, the delivery protocol operates at an equal or higher level in the layered model than the payload protocol.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)