You are on page 1of 14

Network Tunneling – The

Concept, the Applications


Atishay Jain,
10783017
BE 3rd Year,
Thapar University.

Atishay Jain,Network Tunneling 1


Contents

1 Introduction – The What?

2 A little basics – The How?

3 Applications – The Positives !

4 Misuse – The Negatives !

5 Conclusion – That Does it !

Atishay Jain,Network Tunneling 2


Introduction – What it is?
v Some terms, you might be interested in –
Proxy(URL Translation), Tunnel(Ultrasurf), Work
at Home, Virtual Private Networks, etc…

“A tunnel provides a
route for moving from
one of its ends to
another, hiding details
of the route in between”

Atishay Jain,Network Tunneling 3


Intro – contd…

vFormal Definition:
“The term tunneling
protocol is used to
describe when one
network protocol
called the payload
protocol is
encapsulated within
a different delivery
protocol”

Atishay Jain,Network Tunneling 4


The Basics – the How?

L2 for delivery
Layer 2

Tunneled in L3
Layer 3

Goes to L3
Layer 3

A normal packet
Layer 4

Atishay Jain,Network Tunneling 5


Types

Popular
Types

SSH HTTP
Encapsulation Encapsulation
This tunneling involves Plugging within a
encapsulation into the HTTP packet can be
SSH protocol – for for various reasons –
obvious reasons - Others: HTTP is most used,
security. L2 Encapsulation, normally accessible - I
hope you get an idea
IPv6 to IPv4, malicious as well as
Proprietary non-malicious …
Protocols, etc…

Atishay Jain,Network Tunneling 6


SSH Port Forwarding

Atishay Jain,Network Tunneling 7


HTTP & HTTPS

vHTTP inside HTTP,


the most popular…

Atishay Jain,Network Tunneling 8


Terms
v Proxy and URL Translation.
v SOCK 4/5.
v Tunnel Broker – RFC 3053
v Tunneling Software

Atishay Jain,Network Tunneling 9


Applications – the Positives !

Work at Home

Secure IPv6 in IPv4


Transfer
•Prepare an IPv6
packet.
•Encapsulate •Encrypt it in
information in
IPv4 packet with
primitive Tunneling the address of
protocol
•Encapsulate in a translation
server.
a secure •Cross the old
protocol
•Send IPv4 routers
•Decapsulate.
•Decapsulate

VPN

Atishay Jain,Network Tunneling 10


VPN & Work at Home Concept

Atishay Jain,Network Tunneling 11


Misuse – The Negatives !
vAccessing Blocked Material …..

Atishay Jain,Network Tunneling 12


Conclusion – That Does it !
vGood and Bad is of each technology…
vTunneling has changed the way we live…
vPreventing misuse is next to impossible,
but I think we would never want internet to
get lost over these issues.

Atishay Jain,Network Tunneling 13


Thank You !
Atishay Jain
10783017

Atishay Jain,Network Tunneling 14