HOME

TheInfoList



OR:

In
computer networking A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
, the Tunnel Setup Protocol (TSP) is an experimental networking control protocol used to negotiate
IP tunnel An IP tunnel is an Internet Protocol (IP) network communications channel between two networks. It is used to transport another network protocol by encapsulation of its packets. IP tunnels are often used for connecting two disjoint IP networks ...
setup parameters between a tunnel client host and a tunnel broker server, the tunnel end-points. A major use of TSP is in
IPv6 transition mechanism An IPv6 transition mechanism is a technology that facilitates the transitioning of the Internet from the Internet Protocol version 4 (IPv4) infrastructure in use since 1983 to the successor addressing and routing system of Internet Protocol Vers ...
s.


Parameter negotiation

The TSP protocol performs negotiation of the following parameters: *User authentication using the
Simple Authentication and Security Layer Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported ...
(SASL) protocol *Tunnel encapsulation for a variety of tunneling scenarios: **IPv6 over IPv4 tunnels **IPv4 over IPv6 tunnels **IPv6 over UDP/IPv4 tunnels for built-in traversal of network address translators (NAT) *
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
assignment for both tunnel endpoints *
Domain Name System The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned t ...
(DNS) registration of end point addresses and reverse DNS *Tunnel
keep-alive A keepalive (KA) is a message sent by one device to another to check that the link between the two is operating, or to prevent the link from being broken. Description Once a TCP connection has been established, that connection is defined to be v ...
mechanism as needed *IPv6 address prefix assignment for routers *Routing protocols


TSP Session

A TSP session is initiated by the TSP client in the goal of establishing an end-to-end tunnel with the TSP server (tunnel broker). The session consists of a basic exchange of
XML Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data. It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable ...
-encoded data using TCP or UDP. After the negotiation of tunnel setup parameters, the session is terminated and the client undertakes the task of configuring its local tunnel endpoint.


See also

*
Anything In Anything Anything In Anything (AYIYA) is a computer networking protocol for managing IP tunneling protocols in use between separated Internet Protocol networks. It is most often used to provide IPv6 transit over an IPv4 network link when network address ...
(AYIYA)


References

{{reflist


External links


IPv6 TSP Server Implementation
IPv6 Network protocols Tunneling protocols