Implementation and Analysis of IP Tunnel in Virtual Private Networks
Kavita Rani1, Avinash Jethi2
1Kavita Rani*, Studying her Masters in the field of Computer Science and Engineering from BGIET, Sangrur.
2Avinash Jethi, Assistant Professor in BGIET, Sangrur (Punjab).
Manuscript received on February 10, 2020. | Revised Manuscript received on February 20, 2020. | Manuscript published on March 10, 2020. | PP: 478-482 | Volume-9 Issue-5, March 2020. | Retrieval Number: D1956029420/2020©BEIESP | DOI: 10.35940/ijitee.D1956.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In Virtual Private Network tunneling is designed to examine the performance of Private network for transferring the data. It implements and analysis the IP tunnel in Virtual Private Network (VPN). Tunneling is a method that is used to transfer the data or packet of one protocol using different network communication mediums of another protocol. This research is emphasized to examine the performance of Private network using tunneling for the transfer of data. Basically tunneling is used to send a packet, data or traffic of one protocol using an intermediate structure of another protocol. It is called as the process of encapsulation, transmission, over different types of secured networks as encapsulation and security is one of the procedure within this network provides security .This paper gives overview of a Virtual Private Network with IP Tunnel. Virtual private Network generates a secure encryption and decryption of data with the help of IP tunneling at end points. Basically VPN routes through the internet from a private network to transferring the data from one end (source) to other end (destination). With the help of tunneling and VPN user can check the working of different parameters under various applications.
Keywords: IPV4, IPV6, VPN, IP Tunneling.
Scope of the Article: Predictive Analysis