What is Tunnelling in Computer Networks?

Tunnelling is a protocol for transferring data securely from one network to another. Using a method known as encapsulation, tunnelling allows private network communications to be sent across a public network, such as the Internet. Encapsulation enables data packets to appear as general traffic to a public network when they actually contain private data, allowing them to pass unnoticed.

Note − Port forwarding is sometimes referred to as a form of tunnelling, though they are technically different concepts.

Tunnelling Process Overview Private Data Encapsulation (Add headers) Public Network Traffic Decapsulation

How Tunnelling Works

When data is tunnelled, it is divided into smaller parts called packets as it travels through the tunnel. The packets are encrypted and undergo encapsulation, where private network data and protocol information are wrapped in public network transmission units. These units appear as regular public data, allowing them to traverse the Internet securely. At the destination, decapsulation and decryption restore the original data.

Common Tunnelling Protocols

PPTP (Point-to-Point Tunnelling Protocol)

PPTP protects confidential information when transmitted over public networks. It enables authorized users to access a private network through their Internet service provider by creating a Virtual Private Network (VPN). This is called a "virtual" private network because it exists in a tunnelled environment rather than physical dedicated lines.

L2TP (Layer Two Tunnelling Protocol)

L2TP combines the best features of PPTP with Layer 2 Forwarding (L2F) protocol. It provides improved security and authentication mechanisms compared to PPTP alone, making it more suitable for enterprise environments.

Types of Tunnelling

Protocol Layer Primary Use Security Level
PPTP Data Link Remote access VPN Basic encryption
L2TP/IPSec Network Site-to-site VPN Strong encryption
SSH Application Secure remote access Strong encryption
GRE Network Protocol encapsulation No encryption

Applications of Tunnelling

Tunnelling protocols enable secure data transmission over public networks by establishing Virtual Private Networks (VPNs). Common applications include:

  • Protocol compatibility − Running IPv6 traffic over IPv4 networks when native IPv6 support is unavailable.

  • Remote access − Providing corporate network access to remote users whose physical location is outside the corporate network.

  • Firewall bypass − Using unblocked protocols like HTTP to "wrap" restricted traffic and bypass firewall rules.

  • Site-to-site connectivity − Connecting branch offices securely over the Internet using protocols like IPSec.

Conclusion

Tunnelling enables secure communication over public networks by encapsulating private data within public network packets. It forms the foundation of VPN technology, allowing organizations to extend their private networks across the Internet while maintaining security and privacy.

Updated on: 2026-03-16T23:36:12+05:30

21K+ Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements