Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F

Preeti, Ajay Rana

Layer 2 Tunnel Protocol (L2TP) is an emerging Internet Engineering Task Force standard that combines the best features of two existing tunnelling protocolsCiscos Layer 2 Forwarding (L2F) and Microsofts Point-to-Point Tunnelling Protocol (PPTP) and ensures interoperability among vendors, increase customer flexibility and service availability. In this paper, we will study how tunnelling enables remote access to users in order to connect to a variety of network resources (an Internet Service Provider) through a public data network and traffic is managed by shaping or queuing traffic on a per-session basis that helps to avoid traffic congestion and provides a higher degree of granularity on the network

Keywords: L2TP, tunnelling, L2F, PPTP, LAC

Edition: Volume 2 Issue 5, May 2013

Pages: 44 - 47

Share this Article

How to Cite this Article?

Preeti, Ajay Rana, "Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013950, Volume 2 Issue 5, May 2013, 44 - 47

71 PDF Views | 57 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'LAC'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANET's

Umar I. Masumdar, N. S. Killarikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Expert's Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article
Top