Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 See also  





2 References  





3 External links  














Encapsulation (networking)






العربية
Čeština
Deutsch
Español
فارسی
Français
Italiano
Latviešu
Nederlands

Polski
Português
Română
Русский
Svenska
Українська
Tiếng Vit

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 




In other projects  



Wikimedia Commons
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Encapsulation of user data in the Unix-style UDP stack, in which each new layer includes the data from the previous layer, but without being able to identify which part of the data is the header or trailer from the previous layer. This effectively hides (encapsulates) the information from lower layers.[1]

Encapsulation is the computer-networking process of concatenating layer-specific headersortrailers with a service data unit (i.e. a payload) for transmitting information over computer networks.[2][3][4] Deencapsulation (orde-encapsulation) is the reverse computer-networking process for receiving information; it removes from the protocol data unit (PDU) a previously concatenated header or tailer that an underlying communications layer transmitted.[3][5][4]

Encapsulation and deencapsulation allow the design of modular communication protocols so to logically separate the function of each communications layer, and abstract the structure of the communicated information over the other communications layers.[2][4] These two processes are common features of the computer-networking models and protocol suites, like in the OSI model and internet protocol suite.[3] However, encapsulation/deencapsulation processes can also serve as malicious features like in the tunneling protocols.[6]

The physical layer is responsible for physical transmission of the data, link encapsulation allows local area networking, IP provides global addressing of individual computers, and TCP selects the process or application (i.e., the TCP or UDP port) that specifies the service such as a WeborTFTP server.[7]

For example, in the IP suite, the contents of a web page are encapsulated with an HTTP header, then by a TCP header, an IP header, and, finally, by a frame header and trailer. The frame is forwarded to the destination node as a streamofbits, where it is decapsulated into the respective PDUs and interpreted at each layer by the receiving node.[8]

The result of encapsulation is that each lower-layer provides a service to the layer or layers above it, while at the same time each layer communicates with its corresponding layer on the receiving node. These are known as adjacent-layer interaction and same-layer interaction, respectively.[8]

In discussions of encapsulation, the more abstract layer is often called the upper-layer protocol while the more specific layer is called the lower-layer protocol. Sometimes, however, the terms upper-layer protocols and lower-layer protocols are used to describe the layers above and below IP.[7]

See also[edit]

References[edit]

  1. ^ Forouzan, Behrouz A. (2010). TCP/IP protocol suite (4th ed.). Boston: McGraw-Hill Higher Educations. p. 23. ISBN 978-0073376042.
  • ^ a b Eric Conrad; Seth Misenar; Joshua Feldman (2012). "Domain 2: Telecommunications and Network Security". CISSP Study Guide (2nd ed.). Elsevier. pp. 63–142. ISBN 978-1-59749-961-3.
  • ^ a b c Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. ISBN 978-1-58714-385-4.
  • ^ a b c Conrad E, Misenar S, Feldman J (2023). CISSP Study Guide (4th ed.). Elsevier. ISBN 978-0443187353.
  • ^ Salva-Garcia, Alcaraz-Calero, Wang, Qi, Bernabe, Skarmeta (2018). "5G NB-IoT: efficient network traffic filtering for multitenant IoT cellular networks". Security & Communication Networks. 2018: 1–21. doi:10.1155/2018/9291506.
  • ^ Raman, D., Sutter, B. D., Coppens, B., Volckaert, S., Bosschere, K. D., Danhieux, P., & Buggenhout, E. V. (2012, November). DNS tunneling for network penetration. In International Conference on Information Security and Cryptology (pp. 65-77). Springer, Berlin, Heidelberg.
  • ^ a b "How Encapsulation Works Within the TCP/IP Model". learn-networking.com. 2008-01-27. Archived from the original on 2012-08-07. Retrieved 2013-11-22.
  • ^ a b Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. pp. Ch. 1. ISBN 978-1-58714-385-4.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=Encapsulation_(networking)&oldid=1181162985"

    Categories: 
    Network protocols
    Data transmission
    Packets (information technology)
    Hidden categories: 
    Articles with short description
    Short description is different from Wikidata
     



    This page was last edited on 21 October 2023, at 07:15 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki