The Experts below are selected from a list of 2679 Experts worldwide ranked by ideXlab platform
Carlos Pignataro - One of the best experts on this subject based on the ideXlab platform.
-
L2TPv3 Extended Circuit Status Values
2009Co-Authors: Carlos Pignataro, Neil McgillAbstract:This document defines additional Layer 2 Tunneling Protocol Version 3 (L2TPv3) bit values to be used within the "Circuit Status" Attribute Value Pair (AVP) to communicate more granular error states for Attachment Circuits (ACs) and Pseudowires (PWs). It also generalizes the Active bit and deprecates the use of the New bit in the "Circuit Status" AVP, updating RFC3931, RFC4349, RFC4454, RFC4591, and RFC4719.
-
Softwire Hub and Spoke Deployment Framework with Layer Two Tunneling Protocol Version 2 (L2TPv2)
2009Co-Authors: Bill Storer, Carlos Pignataro, Maria Alice Dos Santos, Bruno Stévant, Laurent Toutain, Jean-françois TremblayAbstract:This document describes the framework of the Softwire "Hub and Spoke" solution with the Layer Two Tunneling Protocol version 2 (L2TPv2). The implementation details specified in this document should be followed to achieve interoperability among different vendor implementations.
-
PPP Tunneling Using Layer Two Tunneling Protocol Version 3 (L2TPv3)
2008Co-Authors: Carlos PignataroAbstract:This document describes the use of "version 3" of Layer Two Tunneling Protocol (L2TPv3) to tunnel Point-to-Point Protocol (PPP) packets. This document defines the control Protocol and encapsulation specifics for Tunneling PPP over L2TPv3, and is a companion document to the L2TPv3 base specification.
-
Encapsulation of MPLS over Layer 2 Tunneling Protocol Version 3
2007Co-Authors: Jeff Young, Carlos Pignataro, Ted Seely, Scott WainnerAbstract:The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) defines a Protocol for Tunneling a variety of payload types over IP networks. This document defines how to carry an MPLS label stack and its payload over the L2TPv3 data encapsulation. This enables an application that traditionally requires an MPLS-enabled core network, to utilize an L2TPv3 encapsulation over an IP network instead. [STANDARDS-TRACK]
-
Asynchronous Transfer Mode (ATM) over Layer 2 Tunneling Protocol Version 3 (L2TPv3)
2006Co-Authors: Mark Townsley, Sanjeev Singh, Carlos PignataroAbstract:The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) defines an extensible Tunneling Protocol to transport layer 2 services over IP networks. This document describes the specifics of how to use the L2TP control plane for Asynchronous Transfer Mode (ATM) Pseudowires and provides guidelines for transporting various ATM services over an IP network. [STANDARDS-TRACK]
Sharon Galtzur - One of the best experts on this subject based on the ideXlab platform.
-
Layer Two Tunneling Protocol version 3 - Setup of Time-Division Multiplexing (TDM) Pseudowires
2009Co-Authors: Alexander Vainshtein, Sharon GaltzurAbstract:This document defines extensions to the Layer Two Tunneling Protocol version 3 (L2TPv3) for support of structure-agnostic and structure- aware (Circuit Emulation Service over Packet Switched Network (CESoPSN) style) Time-Division Multiplexing (TDM) pseudowires. Support of structure-aware (Time-Division Multiplexing over IP (TDMoIP) style) pseudowires over L2TPv3 is left for further study. [STANDARDS-TRACK]
-
Layer Two Tunneling Protocol - Setup of TDM Pseudowires
2007Co-Authors: Sasha Vainshtein, Sharon GaltzurAbstract:This document defines extensions to the Layer Two Tunneling Protocol (L2TP) for support of structure-agnostic [RFC4553] and structure- aware [PWE3-CESoPSN] pseudowires.
Li Xue - One of the best experts on this subject based on the ideXlab platform.
-
VTC Fall - A Software Defined Semi Distributed Mobility Management System Based on Layer 2 Backhaul Network
2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015Co-Authors: Jyotirmoy Banik, Yiding Luo, Jonathan Seawright, Marco Tacca, Andrea Fumagalli, Behcet Sarikaya, Li XueAbstract:This paper presents a software defined networking (SDN) based semi-distributed mobility management system. By both using an SDN approach and leveraging layer 2 technology, i.e., carrier grade Ethernet and the 802.1ad standard, it is possible to simplify the network architecture by removing the need for the relatively complex GPRS Tunneling Protocol currently in use in the user plane. An analytical model is used to evaluate the control overhead of the proposed approach and a proof of concept testbed based on OpenFlow running the Floodlight controller is presented. Obtained results demonstrate that, as long as the SDN controller can quickly react to user mobility, frame loss can be mitigated and the proposed architecture is viable.
Meng Yang - One of the best experts on this subject based on the ideXlab platform.
-
Research on Implemention Techniques of L2TP Tunneling with IPSec
Computer Science, 2004Co-Authors: Meng YangAbstract:It is well known that tunnelling is a crucial technique for constructing Virtual Private Network(VPN). At present, tunnelling Protocol primarily has two categories: data layer Tunneling Protocol and network layer tunnelling Protocol. From the view of security, data layer tunnelling Protocol provides authentication based on user and connection; and network layer tunnelling Protocol provides data encryption. Since IPSec and L2TP are respectively representative security Protocols in data layer and network layer, research and implemention of L2TP tunnelling with IPSec are focused. In this paper, the principles of L2TP tunnelling with IPSec are researched at first,then a scheme of L2TP tunnel and IPSec tunnel is designed; at last, the future of VPN with L2TP and IPSec is proposed.
Sajeeb Saha - One of the best experts on this subject based on the ideXlab platform.
-
application specific Tunneling Protocol selection for virtual private networks
International Conference Networking Systems and Security, 2017Co-Authors: Sohely Jahan, Md Saifur Rahman, Sajeeb SahaAbstract:The application scope of VPN is increasing day by day as the organizations are creating private networks through public Internet using VPN Tunneling instead of leased line. VPN Protocols are classified into site-to-site and remote access VPN which exhibits different set of characteristics in terms of security mechanism. But there is no VPN preferences based on the organizational application requirements. In this paper, different VPN Tunneling Protocols like GRE, IPSec, PPTP and L2TP with IPSec are analyzed to measure the performance in terms of throughput, RTT, Jitter and security parameters. The results exhibits that, GRE is preferable for delay and bandwidth sensitive application in context of site to site VPN and L2TP is more effective than PPTP for remote access VPN.
-
NSysS - Application specific Tunneling Protocol selection for Virtual Private Networks
2017 International Conference on Networking Systems and Security (NSysS), 2017Co-Authors: Sohely Jahan, Saifur Rahman, Sajeeb SahaAbstract:The application scope of VPN is increasing day by day as the organizations are creating private networks through public Internet using VPN Tunneling instead of leased line. VPN Protocols are classified into site-to-site and remote access VPN which exhibits different set of characteristics in terms of security mechanism. But there is no VPN preferences based on the organizational application requirements. In this paper, different VPN Tunneling Protocols like GRE, IPSec, PPTP and L2TP with IPSec are analyzed to measure the performance in terms of throughput, RTT, Jitter and security parameters. The results exhibits that, GRE is preferable for delay and bandwidth sensitive application in context of site to site VPN and L2TP is more effective than PPTP for remote access VPN.