Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Tunneling

Related Topics

In the News (Sat 16 Feb 19)

  What is tunneling? - a definition from Whatis.com - see also: tunnel, port forwarding
Tunneling is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data.
Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network.
Tunneling, and the use of a VPN, is not intended as a substitute for encryption/decryption.
searchsecurity.techtarget.com /sDefinition/0,,sid14_gci213230,00.html   (378 words)

 TBM: Tunnel Business Magazine
Formed in 1846 as the amalgamation of three communities nestled along the banks of the Milwaukee River and Lake Michigan, the City of Milwaukee today is home to more than 570,000 people and the cultural and commercial center of Wisconsin.
Over the years, the Milwaukee Metropolitan Sewerage District (MMSD) has quietly built a network of tunnels that have helped to reduce the number of sewer overflows and accommodate growth within the Greater Milwaukee area.
The Past August issue of Tunnel Business Magazine published an excellent roundtable discussion on legal issues lead by Gary Brierley, with four lawyers participating — all well-known and respected in the underground construction industry — Bob Smith, Bob Fitzgerald, Randy Hafer and Dave Corkum.
www.tunnelingonline.com   (175 words)

  Implementing Tunneling for IPv6
The tunnels are not tied to a specific passenger or transport protocol, but in this case carry IPv6 as the passenger protocol with the GRE as the carrier protocol and IPv4 or IPv6 as the transport protocol.
An automatic 6to4 tunnel may be configured on a border router in an isolated IPv6 network, which creates a tunnel on a per-packet basis to a border router in another IPv6 network over an IPv4 infrastructure.
The reason that a 6to4 tunnel and an IPv4-compatible tunnel cannot share an interface is that both of them are NBMA "point-to-multipoint" access links and only the tunnel source can be used to reorder the packets from a multiplexed packet stream into a single packet stream for an incoming interface.
www.cisco.com /univercd/cc/td/doc/product/software/ios123/123cgcr/ipv6_c/sa_tunv6.htm   (4786 words)

Qualitatively the tunnel effect does not depend on the shape of the potential barrier, as illustrated in the next animation for the case of a triangular barrier.
It is a direct consequence of the fact that the tunnel probability is a function of the energy.
The properties of the transmitted wave packet strongly depends on the properties of the tunnel barrier and, to less extent, on the width of the slit whereas the length of the slit has little effect.
rugth30.phys.rug.nl /quantummechanics/tunnel.htm   (712 words)

 Quantum tunneling: Facts and details from Encyclopedia Topic   (Site not responding. Last check: 2007-11-07)
250pxthumbimage of substitutional cr impurities (small bumps) in the fe(001) surface.the scanning tunneling microscope (not to be confused with scanning electron...
The wavelength is the distance between repeating units of a wave pattern....
Tunneling is a source of major current leakage in Very-large-scale integration (VLSI)[For more info, click on this link] electronics.
www.absoluteastronomy.com /encyclopedia/q/qu/quantum_tunneling.htm   (703 words)

 Tunneling as Opposed to Trenching
If the tree has a tap root, tunneling may be offset to one side of the trunk; if not, tunneling directly under the tree may be the proper course.
Tunneling is an increasingly common tool used by electric, gas, telephone, cable TV and other industries to install and maintain pipes and transmission lines.
Tunneling equipment involves a cutting tool, connecting rods and/or hoses, a unit that provides thrust or torque, and a field power unit.
www.scenicflorida.org /lsctunneling1.html   (2300 words)

 SSH: Tunneling
Tunneling, or port forwarding, is a way to forward otherwise insecure TCP traffic through an encrypted Secure Shell tunnel.
Outgoing tunnels protect TCP connections that your local computer forwards from a specified local port to the specified port on the remote host computer you are connected to.
An Edit Tunnel dialog appears, allowing you to edit the name, listen port, destination host, and destination port of the outgoing tunnel.
www.ssh.com /support/documentation/online/ssh/winhelp/32/tunneling.html   (962 words)

The simplest explanation of the scanning tunneling microscope as a very sensitive profilometer depends on the belief that at the atomic scale the STM is actually taking a surface profile of the sample.
Assuming a simple model for the probe, and using the first order perturbation theory for determining the tunneling current, leads to the conclusion that the tunneling current is proportional to the local density of states.
Assuming the tunneling probe was spherical in shape with a radius R, Binnig determined the tunneling current would be related to the probe radius by equation 16.
www.phys.ttu.edu /~tlmde/thesis/ATOMIC_SCALE_TUNNELING_AND_IMAGING.html   (1185 words)

 SSH: Tunneling Explained
Tunneling, or port forwarding, is a way to forward otherwise insecure TCP traffic through SSH Secure Shell for Workstations.
The tunneling capability of SSH Secure Shell for Workstations is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road.
Tunneling makes it possible to access email from any type of Internet service (whether accessed via modem, a DSL line or a cable connection, or a hotel Internet service).
www.ssh.com /support/documentation/online/ssh/winhelp/32/Tunneling_Explained.html   (257 words)

 All About ISOC: Conferences - INET
Furthermore we will provide several examples, how tunneling can be implemented transparently for the users of a system, explain the necessary changes in the configuration of the server- and the client-side of the service, and discuss the problems that arise when tunneling is used through a firewall.
All communication requests are forwarded through the encrypted tunnel to the tunnel server, which in turn decrypts the incoming data and forwards it to the mail server at port 110.
Due to the tunnel, all data transmissions between the client machine and the tunnel server are encrypted and have been authenticated properly.
www.isoc.org /isoc/conferences/inet/98/proceedings/6h/6h_1.htm   (5861 words)

 O'Reilly Network -- Using SSH Tunneling
A tunnel is a networking term with an appropriate name.
An SSH tunnel works like this: Rather than connecting to the mail server directly, we establish an SSH connection to the internal network that the mail server lives in (frequently, the mail server itself).
With the tunnel in place, anyone who tries to monitor the conversation between your laptop and the mail server will get something resembling line noise.
www.oreillynet.com /pub/a/wireless/2001/02/23/wep.html   (1328 words)

 ONLamp.com -- IPsec Tunneling Between FreeBSD Hosts
In tunnel mode, AH or ESP (and sometimes both) secures the entire packet, and treats the result as the payload of a new packet.
Tunnel mode is obviously most useful between two routers or a host and a router.
Tunnel mode ESP is an excellent way to bring security to insecure portions of a network.
www.onlamp.com /pub/a/bsd/2001/12/10/ipsec.html   (1079 words)

 CITES : VPN : Split Tunneling
A tunnel is split when some network traffic is sent to the VPN server and other traffic is sent directly to the remote location without passing through the VPN server.
Split tunneling will be used when you connect with the standard off-campus/wired VPN profile (which is distributed alongside the VPN client software).
Disabling split tunneling for access to off-campus Library resources: If a computer is accessing a service that is outside UIUC IP address space but needs to be accessed from a UIUC IP address, the split tunneling profile will not serve your purposes.
www.cites.uiuc.edu /vpn/splittunneling.html   (1148 words)

 Quantum Tunneling   (Site not responding. Last check: 2007-11-07)
Observe how the tunneling probability of the chosen particle varies with energy for the chosen potential barrier.
From the probability density graph at each value of energy the program determines the tunneling probability, and then generates a graph of these tunneling probabilities vs. the energy.
The process takes a several moments, and the Tunneling Probability vs. Energy (T vs. E) graph is jagged because it is created from only six data points.
phys.educ.ksu.edu /vqm/html/qtunneling.html   (1045 words)

 Networking 101: Understanding Tunneling
Tunneling protocols allow you to use, for example, IP to send another protocol in the "data" portion of the IP datagram.
Tunnels are a mechanism used to send unsupported protocols across diverse networks.
Tunneled data, VPN or other, adds to the size of the packet, resulting in less data being sent per-packet.
www.enterprisenetworkingplanet.com /netsp/article.php/3624566   (1414 words)

 Quantum Tunneling on Your Kitchen Table
With tunnel diodes you must take on faith that the meter readings are explained by quantum tunneling of invisible electrons across a microscopic barrier.
Quantum Tunneling is a bizarre prediction of Quantum Physics, the physics which superceeded the physics of Einstein.
The probability of a photon tunneling is inversely proportional to the thickness of the barrier in terms of the photon's wavelength.
www.altair.org /Qtunnel.html   (576 words)

 RFC 3186 (rfc3186) - MAPOS/PPP Tunneling mode
Consider a tunneling path between customer premise equipment (CPE) A and CPE B which are industry standard POS equipment.
MAPOS/PPP tunneling mode The tunneling path between the two CPEs is managed by the ingress/egress MAPOS switches.
Latency measurement of reference platform for MAPOS/PPP tunneling mode There is a PPP connection between port 1 and 2 of the measurement equipment.
www.faqs.org /rfcs/rfc3186.html   (2347 words)

 Scanning Tunneling Microscope   (Site not responding. Last check: 2007-11-07)
The scanning tunneling microscope (STM) is widely used in both industrial and fundamental research to obtain atomic-scale images of metal surfaces.
Russell D. Young, of the National Bureau of Standards, was the first person to combine the detection of this tunneling current with a scanning device in order to obtain information about the nature of metal surfaces.
The instrument which he developed between 1965 and 1971, the Topografiner, altered the separation between the tip and the surface (z) so that, at constant voltage, the tunneling current (or, at constant current, the tunneling voltage) remained constant as the tip was scanned over the surface.
physics.nist.gov /GenInt/STM/text.html   (374 words)

 Alpha Particle Tunneling
This extraordinary dependence upon kinetic energy suggests an exponential process, and is modeled by quantum mechanical tunneling through the Coulomb barrier.
The illustration represents an attempt to model the alpha decay characteristics of polonium-212, which emits an 8.78 MeV alpha particle with a half-life of 0.3 microseconds.
Quantum mechanical tunneling gives a small probability that the alpha can penetrate the barrier.
hyperphysics.phy-astr.gsu.edu /hbase/nuclear/alptun.html   (191 words)

 [No title]
Extensibility The tunneling handshake is freely extensible using the HTTP/1.x headers; as an example, to enforce authentication for the proxy the proxy will simply use the 407 status code and the Proxy-authenticate response header (as defined by the HTTP/1.x specification) to ask the client to send authentication information: HTTP/1.0 407 Proxy authentication required Proxy-authenticate:...
Security Considerations The CONNECT tunneling mechanism is really a lower-level function than the rest of the HTTP methods, kind of an escape mechanism for saying that the proxy should not interfere with the transaction, but merely forward the data.
In the case of SSL tunneling, this is because the proxy should not need to know the entire URI that is being accessed (privacy, security), only the information that it explicitly needs (hostname and port number) in order to carry out its part.
www.web-cache.com /Writings/Internet-Drafts/draft-luotonen-web-proxy-tunneling-01.txt   (2213 words)

 Tunneling Definition
Tunneling is generally done by encapsulating the private network data and protocol information …
TUNNELING DEFINITION (continued): … within the public network transmission units so that the private network protocol information appears to the public network as data.
Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network.
www.bitpipe.com /tlist/Tunneling.html   (398 words)

 SSH Tunneling | Linux Magazine
Thus, you may be able to use SSH tunneling even if you don't administer the ultimate target system, so long as it runs SSH in addition to the protocol you want to tunnel.
This is done by launching SSH with appropriate parameters to have it connect to a remote server and listen to local connections on an appropriate port.
A special case of SSH tunneling is the protocol's capacity to tunnel X connections.
www.linux-mag.com /id/1705   (2497 words)

 Spin-Polarized Scanning Tunneling Microscopy
The simplest model for spin-dependent tunneling suggests that the spin-polarization of electrons extracted from the material is determined by the total density of states and thus can be both positive and negative.
Substantially polarized tunneling electrons are necessary to produce easily detectable variation (on the order of 10 %) of the tunneling current caused by the orientation of the sample magnetization.
Such splitting lowers the tunnel barrier energy for spin-up and raises it for spin-down electrons, leading to the preferential selection of spin-up electrons in the tunneling current.
nanowiz.tripod.com /spstm/spstm_l.htm   (2766 words)

 Earthworm Tunneling and Hot Rocks Power Cooperative Alternative Energy Sites
We are a research, development, and public advocacy company dedicated to both improving the state of the art in tunneling equipment and informing the general public and government officials of the great societal benefits available from increased public investment in mining and drilling technology improvements.
As a result of relevant technological research, we have become deeply invested in the field of geothermal energy and its benefits for businesses, the individual, and the environment.
Earthworm Tunneling is currently seeking a mechanical engineer and a grant writer to join our team.
www.earthwormtunneling.com   (374 words)

 DAG: Tunneling SSH over HTTP(S)
Tunneling SSH over HTTP(S) This document explains how to set up an Apache server and SSH client to allow tunneling SSH over HTTP(S).
To simplify tunneling over SSH, you might want to create a 'dynamic' tunnel using the -D 1080 OpenSSH option.
In this case you should point your browser to localhost:1080 to surf using the SSH tunnel.
dag.wieers.com /howto/ssh-http-tunneling   (683 words)

 Macromedia - Developer Center : Tunneling Macromedia Flash Communications through Firewalls and Proxy Servers   (Site not responding. Last check: 2007-11-07)
When the first version of Macromedia Flash Communication Server MX was released, some developers discovered that they could not show corporate clients communication applications they had developed because their clients were behind firewalls and proxy servers.
Tunneling solves many firewall and proxy server connection problems and introduces a surprising new feature that offers a new level of security to communication applications.
This article describes tunneling, why it is necessary and how to work with it.
www.adobe.com /devnet/flashcom/articles/firewalls_proxy.html   (346 words)

One of these projects was designed and constructed in the early 1980s when numerical methods were more cumbersome and not as commonly used in design as now.
The first rock reinforcement technologies employed were mechanical anchors such as split wedges or expansion shells with ⅝-inch-diameter steel bolts.
Polyester-resin-grouted rock reinforcement was introduced in the United States to mining in the late 1960s and to tunneling in the early 1970s.
www.agapito.com /tunneling.htm   (747 words)

 Data Driven Attacks Using HTTP Tunneling
IPSec is perhaps the most widely known version of tunneling followed by SSH tunneling as a close second.
By using HTTP tunneling during a penetration test, a security consultant can identify additional security risks that may not be readily visible by conducting simple network and vulnerability scanning.
Additionally, HTTP tunneling can be useful in determining the extent to which a network IDS can identify malicious traffic within a communication channel.
www.securityfocus.com /infocus/1793   (1440 words)

 Carrier Tunneling   (Site not responding. Last check: 2007-11-07)
Electrons can be transmitted through / tunnel through barrier material, if the barrier material is sandwiched between two materials that allow electron propagation and if the barrier material is thin enough.
Electron tunneling of electrons is a pure quantum mechanical effect that cannot be explained by a pure classical particle picture.
This is the basic operating principle of the resonant tunneling diode.
www-hpc.jpl.nasa.gov /PEP/gekco/nemo/BasicConcepts.html   (697 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.