Apache Pig is a platform that is used to analyze large data sets. It consists of a high-level language to express data analysis programs, along with the infrastructure to evaluate these programs. One of the most significant features of Pig is that its structure is responsive to significant parallelization. Pig operates on the Hadoop platform,...
Layer 2 Tunneling Protocol (L2TP) is a computer networking protocol used by Internet service providers (ISPs) to enable virtual private network (VPN) operations. L2TP is similar to the Data Link Layer Protocol in the OSI reference model, but it is actually a session layer protocol. A User Datagram Protocol (UDP) port is used for L2TP communication. Because it does not provide any security for data such as encryption and confidentiality, an encryption protocol such as Internet Protocol security (IPsec) is often used with L2TP. This term is also known as Virtual Dialup Protocol.
Officially published in 1999, L2TP is an extension of Point-to-Point Tunneling Protocol (PPTP). It is the merger of two protocols, one from Microsoft (PPTP) and one from Cisco. L2TP saves the dial-up cost and overhead for any user willing to remotely connect with a site office. L2TP is known as Virtual Dialup Protocol because of its service of the Point-to-Point Protocol (PPP) extension over Internet. For example, suppose that a user in New York is connected with a traditional dial-up modem and is looking to communicate with someone in Sydney. For this purpose, the user gets a connection and establishes a dedicated link from New York to Sydney. This dedicated dial-up link will use a public switched telephone network (PSTN) and provide the lowest data transfer speed because of shared PSTN media. Thousands of other users are using the same medium, so the user will have an overall speed of 33 Kbps or worse. Instead, the user could use L2TP where PPP is used and configured at both ends (the ISP and the user site). Following the successful authentication of a user request, a tunnel is created for user data. When the tunnel is created, the user is open to start communication. Advantages of L2TP include:
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Janalta Interactive Sites: