What are the differences between tunneling and regulare encapsulation?how to block ssh tunneling traffic?Difference between RREQ ID and DestSeqNum in RREQ packet of AODV protocol?What is the difference between Ethernet II and 802.3 Ethernet?explanation of ssh tunnel and forwarding optionsWhat are currently used L2 and L3 protocols? (other than ethernet and ip4/6)PPP, VPN, Tunneling and OSI modelWhat is the difference between TCP/IP protocol and TCP model?What are the correct protocol versions (v4 vs v6) for packets inside DS-Lite tunnels?Do protocols ever have standards that affect multiple layers of networking?Does “tunnel” here mean the same as tunnelling as in SSH?

"Marked down as someone wanting to sell shares." What does that mean?

Have the tides ever turned twice on any open problem?

Unfrosted light bulb

Why doesn't the chatan sign the ketubah?

When should a starting writer get his own webpage?

Error in master's thesis, I do not know what to do

pipe commands inside find -exec?

Friend wants my recommendation but I don't want to

Single word to change groups

Exposing a company lying about themselves in a tightly knit industry: Is my career at risk on the long run?

Nested Dynamic SOQL Query

Can other pieces capture a threatening piece and prevent a checkmate?

UK Tourist Visa- Enquiry

10 year ban after applying for a UK student visa

What is the reasoning behind standardization (dividing by standard deviation)?

What will the Frenchman say?

How old is Nick Fury?

Do native speakers use "ultima" and "proxima" frequently in spoken English?

How to find the largest number(s) in a list of elements, possibly non-unique?

Did Nintendo change its mind about 68000 SNES?

Homology of the fiber

Hackerrank All Women's Codesprint 2019: Name the Product

If I cast the Enlarge/Reduce spell on an arrow, what weapon could it count as?

How to balance a monster modification (zombie)?



What are the differences between tunneling and regulare encapsulation?


how to block ssh tunneling traffic?Difference between RREQ ID and DestSeqNum in RREQ packet of AODV protocol?What is the difference between Ethernet II and 802.3 Ethernet?explanation of ssh tunnel and forwarding optionsWhat are currently used L2 and L3 protocols? (other than ethernet and ip4/6)PPP, VPN, Tunneling and OSI modelWhat is the difference between TCP/IP protocol and TCP model?What are the correct protocol versions (v4 vs v6) for packets inside DS-Lite tunnels?Do protocols ever have standards that affect multiple layers of networking?Does “tunnel” here mean the same as tunnelling as in SSH?













1















What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



Is TCP/UDP over IP considered tunneling?



Is HTTP/SSH over TCP considered tunneling?



Thanks.










share|improve this question




























    1















    What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



    Is TCP/UDP over IP considered tunneling?



    Is HTTP/SSH over TCP considered tunneling?



    Thanks.










    share|improve this question


























      1












      1








      1








      What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



      Is TCP/UDP over IP considered tunneling?



      Is HTTP/SSH over TCP considered tunneling?



      Thanks.










      share|improve this question
















      What are the difference between tunneling (https://en.wikipedia.org/wiki/Tunneling_protocol) and regular encapsulation (e.g. TCP/UDP over IP, HTTP/SSH over TCP)?



      Is TCP/UDP over IP considered tunneling?



      Is HTTP/SSH over TCP considered tunneling?



      Thanks.







      protocol-theory tunnel






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 3 hours ago









      Zac67

      31.3k21961




      31.3k21961










      asked 4 hours ago









      TimTim

      428416




      428416




















          2 Answers
          2






          active

          oldest

          votes


















          2














          Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



          Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



          The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






          share|improve this answer























          • Thanks. What does "It somewhat ties a knot in your layering model" mean?

            – Tim
            2 hours ago











          • He means that tunneling does not fit into the OSI or TCPIP model very well.

            – Ron Trunk
            23 mins ago


















          1














          For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






          share|improve this answer






















            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "496"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f57738%2fwhat-are-the-differences-between-tunneling-and-regulare-encapsulation%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2














            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






            share|improve this answer























            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              23 mins ago















            2














            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






            share|improve this answer























            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              23 mins ago













            2












            2








            2







            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.






            share|improve this answer













            Encapsulation is the normal method of using a lower layer mechanism for moving your data. E.g. HTTP is encapsulated by TCP, TCP is encapsulated by IPv4, IPv4 is encapsulated by an Ethernet frame.



            Encapsulating backwards or at the same layer - IP in GRE, IP in IPsec, IP in UDP, Ethernet in L2TP, ... is called tunneling. It somewhat ties a knot in your layering model.



            The most common use for tunneling is to allow you to pass packets/frames across a network that doesn't support the protocol or addressing scheme. You can tunnel private IP address packets across a public IP network, IPv4 over an IPv6 network or vice versa, Ethernet frames across a layer-3 connection, and so on.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 2 hours ago









            Zac67Zac67

            31.3k21961




            31.3k21961












            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              23 mins ago

















            • Thanks. What does "It somewhat ties a knot in your layering model" mean?

              – Tim
              2 hours ago











            • He means that tunneling does not fit into the OSI or TCPIP model very well.

              – Ron Trunk
              23 mins ago
















            Thanks. What does "It somewhat ties a knot in your layering model" mean?

            – Tim
            2 hours ago





            Thanks. What does "It somewhat ties a knot in your layering model" mean?

            – Tim
            2 hours ago













            He means that tunneling does not fit into the OSI or TCPIP model very well.

            – Ron Trunk
            23 mins ago





            He means that tunneling does not fit into the OSI or TCPIP model very well.

            – Ron Trunk
            23 mins ago











            1














            For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






            share|improve this answer



























              1














              For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






              share|improve this answer

























                1












                1








                1







                For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail






                share|improve this answer













                For me tunnelling is when you have another level of routing and once you reach one destination of one of the layers the datagram progress to another destination, for example when you have two IP layers on the same datagram, and encapsulation is just put information over TCP/UDP, that basically is put information to be read on the destination. Probably other users have better responses and with more detail







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 3 hours ago









                camp0camp0

                13111




                13111



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Network Engineering Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f57738%2fwhat-are-the-differences-between-tunneling-and-regulare-encapsulation%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Are there any AGPL-style licences that require source code modifications to be public? Planned maintenance scheduled April 23, 2019 at 23:30 UTC (7:30pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?Force derivative works to be publicAre there any GPL like licenses for Apple App Store?Do you violate the GPL if you provide source code that cannot be compiled?GPL - is it distribution to use libraries in an appliance loaned to customers?Distributing App for free which uses GPL'ed codeModifications of server software under GPL, with web/CLI interfaceDoes using an AGPLv3-licensed library prevent me from dual-licensing my own source code?Can I publish only select code under GPLv3 from a private project?Is there published precedent regarding the scope of covered work that uses AGPL software?If MIT licensed code links to GPL licensed code what should be the license of the resulting binary program?If I use a public API endpoint that has its source code licensed under AGPL in my app, do I need to disclose my source?

                    2013 GY136 Descoberta | Órbita | Referências Menu de navegação«List Of Centaurs and Scattered-Disk Objects»«List of Known Trans-Neptunian Objects»

                    Button changing it's text & action. Good or terrible? The 2019 Stack Overflow Developer Survey Results Are Inchanging text on user mouseoverShould certain functions be “hard to find” for powerusers to discover?Custom liking function - do I need user login?Using different checkbox style for different checkbox behaviorBest Practices: Save and Exit in Software UIInteraction with remote validated formMore efficient UI to progress the user through a complicated process?Designing a popup notice for a gameShould bulk-editing functions be hidden until a table row is selected, or is there a better solution?Is it bad practice to disable (replace) the context menu?