2010
DOI: 10.17487/rfc5572
|View full text |Cite
|
Sign up to set email alerts
|

IPv6 Tunnel Broker with the Tunnel Setup Protocol (TSP)

Abstract: A tunnel broker with the Tunnel Setup Protocol (TSP) enables the establishment of tunnels of various inner protocols, such as IPv6 or IPv4, inside various outer protocols packets, such as IPv4, IPv6, or UDP over IPv4 for IPv4 NAT traversal. The control protocol (TSP) is used by the tunnel client to negotiate the tunnel with the broker. A mobile node implementing TSP can be connected to both IPv4 and IPv6 networks whether it is on IPv4 only, IPv4 behind a NAT, or on IPv6 only. A tunnel broker may terminate the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Once the tunnel is configured, data can flow between the tunnel client and the tunnel server. [RFC3053] describes the tunnel broker model, while [RFC5572] specifies the Tunnel Setup Protocol (TSP), which can be used by clients to communicate with the Tunnel Broker.…”
Section: Filtering Tunnel Broker With Tunnel Setup Protocol (Tsp)mentioning
confidence: 99%
“…Once the tunnel is configured, data can flow between the tunnel client and the tunnel server. [RFC3053] describes the tunnel broker model, while [RFC5572] specifies the Tunnel Setup Protocol (TSP), which can be used by clients to communicate with the Tunnel Broker.…”
Section: Filtering Tunnel Broker With Tunnel Setup Protocol (Tsp)mentioning
confidence: 99%
“…Backbone Topologies: Some deployment mechanisms [4,26,28] opt for more logically centralized systems such as backbones (e.g., 6bone for IPv6 or Mbone for multicast), where packets first must travel to a backbone router before reaching their destination (see Figure 2). A better solution would have packets travel directly to their destination (Figure 1), as diverting packets through additional infrastructure impacts performance by increasing latency as well as increases the potential for failures.…”
Section: Requirements and Deployment Scenariosmentioning
confidence: 99%
“…While the IPv6 standard itself is fairly stable, there are numerous (and varying) methods for deployment over the existing IPv4 Internet [4,7,8,18,26,28]. Broadly put, these mechanisms fall into two major categories: static tunnelingbased approaches and address mapping-based approaches.…”
Section: Previous Approachesmentioning
confidence: 99%
See 2 more Smart Citations