Academic literature on the topic 'Tunneling protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tunneling protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Tunneling protocol"

1

Arifwidodo, Bongga. "PERFORMANSI EOIP-PPTP DENGAN EOIP-L2TP PADA ROUTER MIKROTIK." Journal of Telecommunication, Electronics, and Control Engineering (JTECE) 2, no. 1 (2020): 01–07. http://dx.doi.org/10.20895/jtece.v2i1.104.

Full text
Abstract:
Router berfungsi melewatkan paket Internet Protocol (IP) dari suatu jaringan yang berbeda, dengan metode pengalamatan serta protokol tertentu agar bisa melewatkan suatu paket data. Suatu topologi jaringan untuk mengirimkan sebuah data digunakan berbagai protocol seperti PPTP (Point to Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), dan EoIP (Ethernet over Internet Protocol). Dimana Protokol ini digunakan sebagai keamanan data yang akan di kirim maupun diterima. Metode tunneling adalah suatu teknologi yang ditugaskan untuk menangani hingga menyediakan koneksi point to point dari s
APA, Harvard, Vancouver, ISO, and other styles
2

M. Khofikur R.A, Fauzan Prasetyo Eka Putra, Moh Wahid Ridho G, and Valentino Huda. "Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik." Infotek: Jurnal Informatika dan Teknologi 8, no. 2 (2025): 334–44. https://doi.org/10.29408/jit.v8i2.30230.

Full text
Abstract:
Virtual Private Network (VPN) has become a critical solution for ensuring secure communication over public networks. This research conducts a comprehensive analysis of the performance and security of two major VPN protocols: Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol with Internet Protocol Security (L2TP/IPSec) implemented on MikroTik devices. The research methodology uses an experimental approach by testing throughput, latency, packet loss, and CPU utilization in various network scenarios. The results show that PPTP provides higher throughput with minimal overhead
APA, Harvard, Vancouver, ISO, and other styles
3

Silvia Anggraeni, Nico Setyo Triwibowo, Muhammad Fahrurizqi Ilham, Irfan Rizki Arip, and Rubio Azza Arafah. "Perbandingan Quality of Service antara VPN Point-to-Point Tunneling Protocol Dan Layer Two Tunneling Protocol Di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta." JE-Unisla 9, no. 2 (2024): 195–204. https://doi.org/10.30736/je-unisla.v9i2.1320.

Full text
Abstract:
Penelitian ini membandingkan kualitas layanan quality of service (QoS) antara virtual private network (VPN) point-to-point tunneling protocol (PPTP) dan layer two tunneling protocol (L2TP) di Fakultas Teknik Universitas Pembangunan Nasional Veteran Jakarta (FT UPNVJ). Parameter QoS yang diuji meliputi latency, throughput, jitter, dan packet loss menggunakan perangkat lunak Wireshark. Hasil pengukuran menunjukkan bahwa PPTP lebih baik dalam hal jitter dan delay, sedangkan L2TP unggul dalam throughput dan packet loss. Temuan ini memberikan panduan bagi pengelola jaringan dalam memilih protokol V
APA, Harvard, Vancouver, ISO, and other styles
4

Gunawan, Muhammad Alvin, and Sukma Wardhana. "Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)." RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) 6, no. 1 (2023): 69. http://dx.doi.org/10.24853/resistor.6.1.69-78.

Full text
Abstract:
VPN merupakan teknologi yang dapat membuat jaringan privat dengan memanfaatkan jaringan publik untuk mengamankan proses pertukaran data. Teknologi VPN biasanya digunakan untuk menghubungkan unit dan kantor cabang, yaitu dengan membangun terowongan antara dua lokasi. Penelitian ini memiliki tujuan utama untuk mengimplementasikan jaringan VPN antara cabang dan kantor cabang dengan penambahan jaringan keamanan untuk melindungi data agar tidak terkomunikasikan. Hal ini juga yang peneliti lakukan dalam makalah ini dengan membandingkan protokol VPN PPTP (Point-To-Point Tunneling Protocol) dan L2TP/I
APA, Harvard, Vancouver, ISO, and other styles
5

Mirdan, Syahid Mulya Sudrajat, Perdana Doan, and Muldina Negara Ridha. "Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network." Bulletin of Electrical Engineering and Informatics 6, no. 3 (2017): 295–300. https://doi.org/10.11591/eei.v6i3.622.

Full text
Abstract:
Virtualization is a new revolutionary approach in networking industry, its make possible to build several virtual machine (VM) in one physical hardware. In virtualization practice, one VM might be connected to others, but not all of VM in one environment must be connected due the privacy and security issues. One of the solutions which can address this issue is tunneling protocol. Tunneling protocol is a layer-2-in-layer-3 protocol which can isolate tenant traffic in virtualize environment. This research conducted about the performance of VXLAN and NVGRE tunneling protocol which works on virtua
APA, Harvard, Vancouver, ISO, and other styles
6

Slameto, Andika Agus, and Rahmat Hidayat. "Comparative Analysis of PPPOE and SSTP Performance in Microtic(Analisis Perbandingan Kinerja PPPOE dan SSTP Pada Mikrotik)." Jurnal KomtekInfo 6, no. 2 (2019): 107–16. http://dx.doi.org/10.35134/komtekinfo.v6i2.49.

Full text
Abstract:
Tunneling is the process of packaging data sent by other protocols in a network. Point to point over Ethernet (PPPOE) andSecure Socket Tunneling Protocol (SSTP) are protocols that function or are designed to carry out tunneling processes. Datasecurity in this case is a top priority, with the encapsulation and authentication process making tunnels one of the many waysto secure data in a network. Besides security, network performance is something that must be considered in providing goodservices. In the process of testing the performance of PPPOE and SSTP using the Quality of Service method, it
APA, Harvard, Vancouver, ISO, and other styles
7

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Full text
Abstract:
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research
APA, Harvard, Vancouver, ISO, and other styles
8

Khalil, Knaj Nouma. "IMPACT OF TUNNELING ON NETWORK CAPACITY." SYNCHROINFO JOURNAL 8, no. 4 (2022): 9–13. http://dx.doi.org/10.36724/2664-066x-2022-8-4-9-13.

Full text
Abstract:
For many companies, setting up a VPN for secure, encrypted communication is a cost-effective alternative to purchasing, operating, and managing a separate physical network. Many institutions, corporations, government agencies and nonprofit organizations want to have their own private IP network for secure and reliable connectivity between offices across multiple geographies. A virtual private network (VPN) is a secure, encrypted connection over a public public network. Creating a separate network requires the purchase of equipment, its installation and maintenance. A VPN-based solution using t
APA, Harvard, Vancouver, ISO, and other styles
9

Samad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.5673.

Full text
Abstract:
The Internet has been an integral part of the Information and Communication Technology (ICT) community in recent years. New internet users have been growing steadily over the years. This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. The existing Internet Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6. The changeover from IPv4 to IPv6 is expected to be implemented progressively. During this transition period, these two protocols are expected
APA, Harvard, Vancouver, ISO, and other styles
10

Samad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.9337.

Full text
Abstract:
The Internet has been an integral part of the Information and Communication Technology (ICT) community in recent years. New internet users have been growing steadily over the years. This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. The existing Internet Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6. The changeover from IPv4 to IPv6 is expected to be implemented progressively. During this transition period, these two protocols are expected
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Tunneling protocol"

1

Стьопа, Дмитро Олександрович, та Dmytro Stiopa. "Методи захисту інформаційно-телекомунікаційних систем та мереж від несанкціонованого доступу з використанням технології VPN". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36970.

Full text
Abstract:
Методи захисту інформаційно-телекомунікаційних систем та мереж від несанкціонованого доступу з використанням технології VPN // Дипломна робота ОР «Магістр» // Стьопа Дмитро Олександрович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп’ютерно-інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБм-61 // Тернопіль, 2021 // С. 63, рис. – 17, табл. – 0, слайдів – 10, додат. – 2.<br>В даній роботі було проаналізовано підходи до захисту мережі на базі рішення VPN. Визначено основні функціональні аспекти, виявлено ключові переваги та недолі
APA, Harvard, Vancouver, ISO, and other styles
2

RODRIGUES, Moisés Bezerra Estrela. "Towards Improvements in resource management for content delivert networks." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/18367.

Full text
Abstract:
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2017-03-02T14:56:30Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) moises.rodrigues-phd.thesis-final-v3.pdf: 4286662 bytes, checksum: 9e67a238c996afd5b50b91cf3c59c86a (MD5)<br>Made available in DSpace on 2017-03-02T14:56:30Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) moises.rodrigues-phd.thesis-final-v3.pdf: 4286662 bytes, checksum: 9e67a238c996afd5b50b91cf3c59c86a (MD5) Previous issue date: 2016-10-03<br>Dur
APA, Harvard, Vancouver, ISO, and other styles
3

Čížek, Michal. "Tunelovací a kryptografické protokoly jako ochrana soukromí na regulovaném internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218840.

Full text
Abstract:
This thesis is about internet regulations and usage of tunneling protocols as a privacy protection on regulated internet. The thesis includes detailed description of most widely used tunneling protocols focused on their usage in regulated networks. The produce the teoretical part of the thesis is synoptical comparative table including benefits and disadvantages of each protocol and examples of suitable usage. The practical part presents the tunneling protocols in three different scenarios which are very frequent in practice. Each scenario has been realized, the communication has been captured
APA, Harvard, Vancouver, ISO, and other styles
4

Rawat, Priyanka. "Improving efficiency of tunneling mechanisms over IP networks." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0131.

Full text
Abstract:
Durant plusieurs années, le tunneling a été utilisé à diverses fins. Par exemple pour fournir une solution pour les problèmes de sécurité réseau, pour le support de la migration des réseaux (d’IPv4 à IPv6) et pour traverser le NAT. Aujourd’hui le tunneling est utilisé dans les solutions de gestion de la mobilité comme MobileIP et NEMO qui fournissent un accès Internet transparente même en cas de déplacement des noeuds ou des réseaux. Cependant, l’utilisation du tunneling entraine une surcharge au niveau du paquet due à la concaténation des en-têtes. Cette surcharge est encore plus remarquable
APA, Harvard, Vancouver, ISO, and other styles
5

BESIERS, PARAYRE FRANCOISE. "Prevention des accidents dysbariques sur le chantier du metro toulousain : selection medicale et protocoles de securite." Toulouse 3, 1991. http://www.theses.fr/1991TOU31002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Validity and accuracy issues in electronic commerce with specific reference to VPN's." Thesis, 2012. http://hdl.handle.net/10210/5494.

Full text
Abstract:
M.Comm.<br>Business have traditionally relied on private leased lines to link remote office together so that distant workers could share information over a Wide Area Network (WAN). However, while providing a high degree of privacy, leased lines are expensive to set up and maintain. The Internet is fast becoming a requirement for supporting business operations in the global economy. The major concern in using a public network, like the Internet, for data exchange is the lack of security. The Internet was designed to be an "open" network, accessible to anyone with low or none security considerat
APA, Harvard, Vancouver, ISO, and other styles
7

Von, Gordon Albert Fredrich Johannes. "The design of a software architectural framework for tunnelling metering protocols over TCP/IP and low bandwidth packet switched networks with support for proprietary addressing." Diss., 2007. http://hdl.handle.net/2263/29032.

Full text
Abstract:
This document discusses the concept of drivers implemented within the context of the REMPLI (Real-Time Energy Management over Power line and Internet, see section 1.8.) network. The process image approach and the tunnelling approach are presented and reasoning is given why the tunnelling approach is preferred. Each of the drivers implemented is associated with a specific metering protocol. This document further discusses the general architecture of such a driver structure. The generic software architecture serves as a framework for integrating serial communication based metering protocols over
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Tunneling protocol"

1

Zubairy, M. Suhail. Quantum Mechanics for Beginners. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198854227.001.0001.

Full text
Abstract:
Quantum mechanics is a highly successful yet a mysterious theory. Quantum Mechanics for Beginners provides an introduction of this fascinating subject to someone with only a high school background in physics and mathematics. This book, except the last chapter on the Schrödinger equation, is entirely algebra-based. A major strength of this book is that, in addition to the foundation of quantum mechanics, it provides an introduction to the fields of quantum communication and quantum computing. The topics covered include wave–particle duality, the Heisenberg uncertainty relation, Bohr’s principle
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Tunneling protocol"

1

Collins, Jeff. "GPRS Tunneling Protocol (GTP)." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1522-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Collins, Jeff. "GPRS Tunneling Protocol (GTP)." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Weyde. "Tunneling and VPN." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_26.

Full text
Abstract:
AbstractTunneling is a technique used to transport data packets over a network. The original data packets, with a protocol not supported by the host network, are encapsulated within another packet and then transported through the network. While tunneling is often used in a virtual private network, virtual private network, and tunneling are technically not the same, and there are virtual private networks without tunneling. However, tunneling is essential for securing a remote resource as an integral part of most VPN implementations. Without such encrypted tunnels, the traffic to this remote res
APA, Harvard, Vancouver, ISO, and other styles
4

Opmane, Inara, Leo Truksans, Guntis Barzdins, Adrians Heidens, Rihards Balodis, and Pavel Merzlyakov. "ZERO: An Efficient Ethernet-Over-IP Tunneling Protocol." In Inter-cooperative Collective Intelligence: Techniques and Applications. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35016-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Viswa Bharathy, A. M., and V. Chandrasekar. "A Novel Virtual Tunneling Protocol for Underwater Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3600-3_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fischer, Marc, Moritz Walker, Philipp A. Neher, Michael Neubauer, Armin Lechler, and Alexander Verl. "EtherCAT Tunneling Through Time-Sensitive Networks: An Experimental Evaluation." In ARENA2036. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88831-1_13.

Full text
Abstract:
Abstract Due to flexibility requirements, the strictly horizontal communication of the automation pyramid is converging. This includes communication at the field level. Due to the long lifetime of machines in manufacturing, it is important to support converged communication for existing fieldbuses such as EtherCAT. This enables the implementation of brownfield approaches for gradually implementing converged networks in existing plants. EtherCAT is a widely used industrial Ethernet-based fieldbus protocol for communication between programmable logic controllers and field devices. This work anal
APA, Harvard, Vancouver, ISO, and other styles
7

Akter, Happy, Sohely Jahan, Sajeeb Saha, Rahat Hossain Faisal, and Shariful Islam. "Evaluating Performances of VPN Tunneling Protocols Based on Application Service Requirements." In Proceedings of the Third International Conference on Trends in Computational and Cognitive Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7597-3_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sathu, Hira, Mohib A. Shah, and Kathiravelu Ganeshan. "Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling Mechanisms." In Advances in Computing and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22726-4_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Prowell, Stacy, Rob Kraus, and Mike Borkin. "Protocol Tunneling." In Seven Deadliest Network Attacks. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-549-3.00004-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Network Tunneling Protocol." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_300640.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Tunneling protocol"

1

Ilias, Irma Syarlina Che, Sera Syarmila Sameon, Muhammad Zaqwan Ezzad Zulkifli, and Mohammad Zahir Mat Salleh. "Optimizing VPN Security in Financial Services: Implementing 256-Bit Encryption and Tunneling Protocols for Secure Data Transmission." In 2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM). IEEE, 2025. https://doi.org/10.1109/imcom64595.2025.10857544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ugwuanyi, Stephen, Kinan Ghanem, and Ibrahim Abdulhadi. "Implementing Secure Layer 2 Tunneling Protocols for IEC 61850-90-5 Based Routable and Non-Routable GOOSE and SV Messages." In 2024 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE). IEEE, 2024. https://doi.org/10.1109/isgteurope62998.2024.10863237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

An, Hailin, Wanming Luo, Xingfeng Li, Xinchang Zhang, and Baoping Yan. "A New IPv6 Tunneling Protocol: Escort." In 2009 International Symposium on Computer Network and Multimedia Technology (CNMT 2009). IEEE, 2009. http://dx.doi.org/10.1109/cnmt.2009.5374781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Akbar, M., N. Javaid, S. Yousaf, et al. "TRP: Tunneling Routing Protocol for WSNs." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prisantama, Alfadoni, Widyawan, and I. Wayan Mustika. "Tunneling 6LoWPAN protocol stack in IPv6 network." In PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SYNCHROTRON RADIATION INSTRUMENTATION – SRI2015. Author(s), 2016. http://dx.doi.org/10.1063/1.4958501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lamali, Mohamed Lamine, Simon Lassourreuille, Stephan Kunne, and Johanne Cohen. "A stack-vector routing protocol for automatic tunneling." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Yu, Fei Wang, and Shuhui Chen. "VPN Traffic Identification Based on Tunneling Protocol Characteristics." In 2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2022. http://dx.doi.org/10.1109/ccet55412.2022.9906397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schneier, Bruce, and Mudge. "Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)." In the 5th ACM conference. ACM Press, 1998. http://dx.doi.org/10.1145/288090.288119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jahan, Sohely, Md Saifur Rahman, and Sajeeb Saha. "Application specific tunneling protocol selection for Virtual Private Networks." In 2017 International Conference on Networking, Systems and Security (NSysS). IEEE, 2017. http://dx.doi.org/10.1109/nsyss.2017.7885799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Putra, Chrystia Aji, Yisti Vita Via, and Wahyu SJ Saputra. "Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing." In Proceedings of the International Conference on Science and Technology (ICST 2018). Atlantis Press, 2018. http://dx.doi.org/10.2991/icst-18.2018.220.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Tunneling protocol"

1

Townsley, W., A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter. Layer Two Tunneling Protocol "L2TP". RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hamzeh, K., G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn. Point-to-Point Tunneling Protocol (PPTP). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lau, J., M. Townsley, and I. Goyret, eds. Layer Two Tunneling Protocol - Version 3 (L2TPv3). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Palter, W., and W. Townsley. Layer-Two Tunneling Protocol Extensions for PPP Link Control Protocol Negotiation. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rawat, V., R. Tio, S. Nanji, and R. Verma. Layer Two Tunneling Protocol (L2TP) over Frame Relay. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Calhoun, P., W. Luo, D. McPherson, and K. Peirce. Layer Two Tunneling Protocol (L2TP) Differentiated Services Extension. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Caves, E., P. Calhoun, and R. Wheeler. Layer Two Tunneling Protocol "L2TP" Management Information Base. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Townsley, M., G. Wilkie, S. Booth, S. Bryant, and J. Lau. Frame Relay over Layer 2 Tunneling Protocol Version 3 (L2TPv3). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Townsley, M., C. Pignataro, S. Wainner, T. Seely, and J. Young. Encapsulation of MPLS over Layer 2 Tunneling Protocol Version 3. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, V., ed. Fail Over Extensions for Layer 2 Tunneling Protocol (L2TP) "failover". RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!