You may have two separate trusted networks that are connected by an untrusted/shared network

Trusted networks separated by untrusted networks

Use virtual tunnels to encapsulate

Virtual network decapsulation

Whenever a packet is passed, the Internet will see this as Gateway A sending a packet to Gateway B

  • Encapsulation: Wrap the IP packet in another IP packet
  • Decapsulation: Rip off IP header to get actual IP header
  • Also add encryption

Pros:

  • Security
  • Special capabilities between routers (e.g. multicast)
  • Supporting heterogeneity (TODO what does this mean? Different packets using different protocols?) Cons:
  • Increases packet length
    • Wastage of bandwidth
    • More processing
    • Increased fragmentation
  • Increases management cost