What are the differences between tunneling and regulare encapsulation?how to block ssh tunneling traffic?Difference between RREQ ID and DestSeqNum in RREQ packet of AODV protocol?What is the difference between Ethernet II and 802.3 Ethernet?explanation of ssh tunnel and forwarding optionsWhat are currently used L2 and L3 protocols? (other than ethernet and ip4/6)PPP, VPN, Tunneling and OSI modelWhat is the difference between TCP/IP protocol and TCP model?What are the correct protocol versions (v4 vs v6) for packets inside DS-Lite tunnels?Do protocols ever have standards that affect multiple layers of networking?Does “tunnel” here mean the same as tunnelling as in SSH?

Print last inputted byte

Hackerrank All Women's Codesprint 2019: Name the Product

Help with identifying unique aircraft over NE Pennsylvania

Justification failure in beamer enumerate list

Was World War I a war of liberals against authoritarians?

Homology of the fiber

Print a physical multiplication table

Weird lines in Microsoft Word

Exposing a company lying about themselves in a tightly knit industry: Is my career at risk on the long run?

Would mining huge amounts of resources on the Moon change its orbit?

What are the differences between tunneling and regulare encapsulation?

Is this Pascal's Matrix?

Why does Surtur say that Thor is Asgard's doom?

How do you justify more code being written by following clean code practices?

is this saw blade faulty?

How can a new country break out from a developed country without war?

Does the Shadow Magic sorcerer's Eyes of the Dark feature work on all Darkness spells or just his/her own?

Do people actually use the word "kaputt" in conversation?

How old is Nick Fury?

Imaginary part of expression too difficult to calculate

What kind of footwear is suitable for walking in micro gravity environment?

Why doesn't the chatan sign the ketubah?

Pre-Employment Background Check With Consent For Future Checks

How are passwords stolen from companies if they only store hashes?



What are the differences between tunneling and regulare encapsulation?


how to block ssh tunneling traffic?Difference between RREQ ID and DestSeqNum in RREQ packet of AODV protocol?What is the difference between Ethernet II and 802.3 Ethernet?explanation of ssh tunnel and forwarding optionsWhat are currently used L2 and L3 protocols? (other than ethernet and ip4/6)PPP, VPN, Tunneling and OSI modelWhat is the difference between TCP/IP protocol and TCP model?What are the correct protocol versions (v4 vs v6) for packets inside DS-Lite tunnels?Do protocols ever have standards that affect multiple layers of networking?Does “tunnel” here mean the same as tunnelling as in SSH?













1















What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



Is TCP/UDP over IP considered tunneling?



Is HTTP/SSH over TCP considered tunneling?



Thanks.










share|improve this question




























    1















    What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



    Is TCP/UDP over IP considered tunneling?



    Is HTTP/SSH over TCP considered tunneling?



    Thanks.










    share|improve this question


























      1












      1








      1








      What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



      Is TCP/UDP over IP considered tunneling?



      Is HTTP/SSH over TCP considered tunneling?



      Thanks.










      share|improve this question
















      What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



      Is TCP/UDP over IP considered tunneling?



      Is HTTP/SSH over TCP considered tunneling?



      Thanks.







      protocol-theory tunnel






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 3 hours ago









      Zac67

      31.3k21961




      31.3k21961










      asked 4 hours ago









      TimTim

      428416




      428416




















          2 Answers
          2






          active

          oldest

          votes


















          2














          Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



          Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



          The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






          share|improve this answer























          • Thanks. What does "It somewhat ties a knot in your layering model" mean?

            – Tim
            2 hours ago











          • He means that tunneling does not fit into the OSI or TCPIP model very well.

            – Ron Trunk
            40 mins ago


















          1














          For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






          share|improve this answer






















            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "496"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f57738%2fwhat-are-the-differences-between-tunneling-and-regulare-encapsulation%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2














            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






            share|improve this answer























            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              40 mins ago















            2














            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






            share|improve this answer























            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              40 mins ago













            2












            2








            2







            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






            share|improve this answer













            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 3 hours ago









            Zac67Zac67

            31.3k21961




            31.3k21961












            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              40 mins ago

















            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              40 mins ago
















            Thanks. What does "It somewhat ties a knot in your layering model" mean?

            – Tim
            2 hours ago





            Thanks. What does "It somewhat ties a knot in your layering model" mean?

            – Tim
            2 hours ago













            He means that tunneling does not fit into the OSI or TCPIP model very well.

            – Ron Trunk
            40 mins ago





            He means that tunneling does not fit into the OSI or TCPIP model very well.

            – Ron Trunk
            40 mins ago











            1














            For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






            share|improve this answer



























              1














              For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






              share|improve this answer

























                1












                1








                1







                For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






                share|improve this answer













                For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 4 hours ago









                camp0camp0

                13111




                13111



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Network Engineering Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f57738%2fwhat-are-the-differences-between-tunneling-and-regulare-encapsulation%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Oświęcim Innehåll Historia | Källor | Externa länkar | Navigeringsmeny50°2′18″N 19°13′17″Ö / 50.03833°N 19.22139°Ö / 50.03833; 19.2213950°2′18″N 19°13′17″Ö / 50.03833°N 19.22139°Ö / 50.03833; 19.221393089658Nordisk familjebok, AuschwitzInsidan tro och existensJewish Community i OświęcimAuschwitz Jewish Center: MuseumAuschwitz Jewish Center

                    Valle di Casies Indice Geografia fisica | Origini del nome | Storia | Società | Amministrazione | Sport | Note | Bibliografia | Voci correlate | Altri progetti | Collegamenti esterni | Menu di navigazione46°46′N 12°11′E / 46.766667°N 12.183333°E46.766667; 12.183333 (Valle di Casies)46°46′N 12°11′E / 46.766667°N 12.183333°E46.766667; 12.183333 (Valle di Casies)Sito istituzionaleAstat Censimento della popolazione 2011 - Determinazione della consistenza dei tre gruppi linguistici della Provincia Autonoma di Bolzano-Alto Adige - giugno 2012Numeri e fattiValle di CasiesDato IstatTabella dei gradi/giorno dei Comuni italiani raggruppati per Regione e Provincia26 agosto 1993, n. 412Heraldry of the World: GsiesStatistiche I.StatValCasies.comWikimedia CommonsWikimedia CommonsValle di CasiesSito ufficialeValle di CasiesMM14870458910042978-6

                    Typsetting diagram chases (with TikZ?) Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern)How to define the default vertical distance between nodes?Draw edge on arcNumerical conditional within tikz keys?TikZ: Drawing an arc from an intersection to an intersectionDrawing rectilinear curves in Tikz, aka an Etch-a-Sketch drawingLine up nested tikz enviroments or how to get rid of themHow to place nodes in an absolute coordinate system in tikzCommutative diagram with curve connecting between nodesTikz with standalone: pinning tikz coordinates to page cmDrawing a Decision Diagram with Tikz and layout manager