Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Encapsulation (networking)
Method of designing modular communication protocols in which separate functions are abstracted from their underlying structures

Encapsulation is the computer-networking process of concatenating layer-specific headers or trailers with a service data unit (i.e. a payload) for transmitting information over computer networks. Deencapsulation (or de-encapsulation) is the reverse computer-networking process for receiving information; it removes from the protocol data unit (PDU) a previously concatenated header or trailer that an underlying communications layer transmitted.

Encapsulation and deencapsulation allow the design of modular communication protocols so to logically separate the function of each communications layer, and abstract the structure of the communicated information over the other communications layers. These two processes are common features of the computer-networking models and protocol suites, like in the OSI model and internet protocol suite. However, encapsulation/deencapsulation processes can also serve as malicious features like in the tunneling protocols.

The physical layer is responsible for physical transmission of the data, link encapsulation allows local area networking, IP provides global addressing of individual computers, and TCP selects the process or application (i.e., the TCP or UDP port) that specifies the service such as a Web or TFTP server.

For example, in the IP suite, the contents of a web page are encapsulated with an HTTP header, then by a TCP header, an IP header, and, finally, by a frame header and trailer. The frame is forwarded to the destination node as a stream of bits, where it is decapsulated into the respective PDUs and interpreted at each layer by the receiving node.

The result of encapsulation is that each lower-layer provides a service to the layer or layers above it, while at the same time each layer communicates with its corresponding layer on the receiving node. These are known as adjacent-layer interaction and same-layer interaction, respectively.

In discussions of encapsulation, the more abstract layer is often called the upper-layer protocol while the more specific layer is called the lower-layer protocol. Sometimes, however, the terms upper-layer protocols and lower-layer protocols are used to describe the layers above and below IP.

Related Image Collections Add Image
We don't have any YouTube videos related to Encapsulation (networking) yet.
We don't have any PDF documents related to Encapsulation (networking) yet.
We don't have any Books related to Encapsulation (networking) yet.
We don't have any archived web articles related to Encapsulation (networking) yet.

See also

  • RFC 1983: Internet Users' Glossary (contains an entry for encapsulation)

References

  1. Eric Conrad; Seth Misenar; Joshua Feldman (2012). "Domain 2: Telecommunications and Network Security". CISSP Study Guide (2nd ed.). Elsevier. pp. 63–142. ISBN 978-1-59749-961-3. 978-1-59749-961-3

  2. Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. ISBN 978-1-58714-385-4. 978-1-58714-385-4

  3. Conrad E, Misenar S, Feldman J (2023). CISSP Study Guide (4th ed.). Elsevier. ISBN 978-0443187353. 978-0443187353

  4. Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. ISBN 978-1-58714-385-4. 978-1-58714-385-4

  5. Salva-Garcia, Alcaraz-Calero, Wang, Qi, Bernabe, Skarmeta (2018). "5G NB-IoT: efficient network traffic filtering for multitenant IoT cellular networks". Security and Communication Networks. 2018: 1–21. doi:10.1155/2018/9291506. https://doi.org/10.1155%2F2018%2F9291506

  6. Conrad E, Misenar S, Feldman J (2023). CISSP Study Guide (4th ed.). Elsevier. ISBN 978-0443187353. 978-0443187353

  7. Eric Conrad; Seth Misenar; Joshua Feldman (2012). "Domain 2: Telecommunications and Network Security". CISSP Study Guide (2nd ed.). Elsevier. pp. 63–142. ISBN 978-1-59749-961-3. 978-1-59749-961-3

  8. Conrad E, Misenar S, Feldman J (2023). CISSP Study Guide (4th ed.). Elsevier. ISBN 978-0443187353. 978-0443187353

  9. Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. ISBN 978-1-58714-385-4. 978-1-58714-385-4

  10. Raman, D., Sutter, B. D., Coppens, B., Volckaert, S., Bosschere, K. D., Danhieux, P., & Buggenhout, E. V. (2012, November). DNS tunneling for network penetration. In International Conference on Information Security and Cryptology (pp. 65-77). Springer, Berlin, Heidelberg.

  11. "How Encapsulation Works Within the TCP/IP Model". learn-networking.com. 2008-01-27. Archived from the original on 2012-08-07. Retrieved 2013-11-22. https://web.archive.org/web/20120807024653/http://learn-networking.com/tcp-ip/how-encapsulation-works-within-the-tcpip-model

  12. Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. pp. Ch. 1. ISBN 978-1-58714-385-4. 978-1-58714-385-4

  13. Odom, Wendell (2013). Cisco CCENT/ CCNA ICND1 100-101 Official Cert Guide. Pearson Education. pp. Ch. 1. ISBN 978-1-58714-385-4. 978-1-58714-385-4

  14. "How Encapsulation Works Within the TCP/IP Model". learn-networking.com. 2008-01-27. Archived from the original on 2012-08-07. Retrieved 2013-11-22. https://web.archive.org/web/20120807024653/http://learn-networking.com/tcp-ip/how-encapsulation-works-within-the-tcpip-model