It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lin...It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition.展开更多
实现和测试了一种可扩展的分布式Web服务器原型。原型由多台接收和处理TCP连接的服务器通过负载均衡集群而成,主机IP地址利用Round Robin DNS发布,任意主机都可以接收客户端的请求。一旦当客户试图建立连接,主机要决定接收连接提供...实现和测试了一种可扩展的分布式Web服务器原型。原型由多台接收和处理TCP连接的服务器通过负载均衡集群而成,主机IP地址利用Round Robin DNS发布,任意主机都可以接收客户端的请求。一旦当客户试图建立连接,主机要决定接收连接提供服务还是重定向连接到其它主机。每台主机保持集群定期组播的系统负载信息,并利用低负荷的IP封装IP技术重构数据包来重定向请求。性能测试表明这种技术比RR-DNS具有更好的性能,而且利用系统负载状态的重定向连接比无状态的重定向效果更好。展开更多
Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,an...Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,and L2TP. We can conclude the evolutive trend of utilizing tunneling techniques in VPN by analyzing them syntheti-cally. Especially, it will probably become a key problem that guarantees the compatibility and interoperability be-tween MPLS, IPSec and L2TP.展开更多
文摘It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition.
文摘实现和测试了一种可扩展的分布式Web服务器原型。原型由多台接收和处理TCP连接的服务器通过负载均衡集群而成,主机IP地址利用Round Robin DNS发布,任意主机都可以接收客户端的请求。一旦当客户试图建立连接,主机要决定接收连接提供服务还是重定向连接到其它主机。每台主机保持集群定期组播的系统负载信息,并利用低负荷的IP封装IP技术重构数据包来重定向请求。性能测试表明这种技术比RR-DNS具有更好的性能,而且利用系统负载状态的重定向连接比无状态的重定向效果更好。
文摘Tunneling technique is one of the key technologies in establishing virtual private network (VPN). In thispaper, we perform a comparative research on various tunneling techniques including MPLS, IPSec, GRE, IP-in-IP,and L2TP. We can conclude the evolutive trend of utilizing tunneling techniques in VPN by analyzing them syntheti-cally. Especially, it will probably become a key problem that guarantees the compatibility and interoperability be-tween MPLS, IPSec and L2TP.