WAN encapsulationSonicWall tz 215 with three LAN and three WANCan't Ping INTERNET from clients but I CAN from Internal RoutersCisco 1921 private LAN can't access internet on WAN interfaceHow is inverse ARP configured in frame relay?Running office WAN via MPLS connected Datacenter's WAN connection. Thoughts?Using an ASE(MPLS) line to route datacenter WAN traffic to officeWhat problem does Frame Relay or ATM solve that Ethernet does not?WAN/Campus network design - Learning purposesDifference between WAN and VPN(tunnels)

Why do Russians sometimes spell "жирный" (fatty) as "жырный"?

What does the triangle look like in this diagram?

Sending mail to the Professor for PhD, after seeing his tweet

Did Tolkien ever write about a Heaven or Hell for Men?

Can the President of the US limit First Amendment rights?

Realistically, how much do you need to start investing?

Re-entering the UK after overstaying in 2008

Job interview by video at home and privacy concerns

Why most footers have a background color as a divider of section?

Can a passenger predict that an airline or a tour operator is about to go bankrupt?

How can Germany increase investments in Russia while EU economic sanctions against Russia are still in place?

If I travelled back in time to invest in X company to make a fortune, roughly what is the probability that it would fail?

Parent asking for money after moving out

What is the difference between increasing volume and increasing gain?

Everyone Gets a Window Seat

IEEE 754 square root with Newton-Raphson

Bothered by watching coworkers slacking off

Looking for circuit board material that can be dissolved

Garage door sticks on a bolt

Principled construction of the quaternions

What are one's options when facing religious discrimination at the airport?

Did the Soviet army intentionally send troops (e.g. penal battalions) running over minefields?

What is the meaning of first flight and introduction in aircraft production?

How important is knowledge of trig identities for use in Calculus



WAN encapsulation


SonicWall tz 215 with three LAN and three WANCan't Ping INTERNET from clients but I CAN from Internal RoutersCisco 1921 private LAN can't access internet on WAN interfaceHow is inverse ARP configured in frame relay?Running office WAN via MPLS connected Datacenter's WAN connection. Thoughts?Using an ASE(MPLS) line to route datacenter WAN traffic to officeWhat problem does Frame Relay or ATM solve that Ethernet does not?WAN/Campus network design - Learning purposesDifference between WAN and VPN(tunnels)






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;









4















I am having some trouble understanding why does a WAN link need encapsulation, such as MPLS or frame relay? Is it merely to encrypt the info from one LAN to another LAN across the internet?










share|improve this question


























  • Do you perhaps mean "encode" (put into computer form) not "encrypt" (provide privacy/secrecy) ? Providing secrecy is not normally an L2 function.

    – jonathanjo
    Apr 15 at 17:37












  • Is this the same as asking why not every network node is an IP router? I think so but I'm not sure.

    – immibis
    Apr 15 at 22:42











  • @immibis No, Alexandre is asking about how layer 2 links work. Some nodes not being an IP router is about layer 3 links and whether IP forwarding is taking place.

    – jonathanjo
    Apr 16 at 14:30











  • @immibis it has nothing to do with that, im asking about encapsulation of frame through a wan network

    – Alexandre Amaral Bednell
    Apr 17 at 15:10

















4















I am having some trouble understanding why does a WAN link need encapsulation, such as MPLS or frame relay? Is it merely to encrypt the info from one LAN to another LAN across the internet?










share|improve this question


























  • Do you perhaps mean "encode" (put into computer form) not "encrypt" (provide privacy/secrecy) ? Providing secrecy is not normally an L2 function.

    – jonathanjo
    Apr 15 at 17:37












  • Is this the same as asking why not every network node is an IP router? I think so but I'm not sure.

    – immibis
    Apr 15 at 22:42











  • @immibis No, Alexandre is asking about how layer 2 links work. Some nodes not being an IP router is about layer 3 links and whether IP forwarding is taking place.

    – jonathanjo
    Apr 16 at 14:30











  • @immibis it has nothing to do with that, im asking about encapsulation of frame through a wan network

    – Alexandre Amaral Bednell
    Apr 17 at 15:10













4












4








4








I am having some trouble understanding why does a WAN link need encapsulation, such as MPLS or frame relay? Is it merely to encrypt the info from one LAN to another LAN across the internet?










share|improve this question
















I am having some trouble understanding why does a WAN link need encapsulation, such as MPLS or frame relay? Is it merely to encrypt the info from one LAN to another LAN across the internet?







protocol-theory transport-protocol wan






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Apr 15 at 17:15









jonathanjo

13.8k1 gold badge12 silver badges43 bronze badges




13.8k1 gold badge12 silver badges43 bronze badges










asked Apr 15 at 14:28









Alexandre Amaral BednellAlexandre Amaral Bednell

1285 bronze badges




1285 bronze badges















  • Do you perhaps mean "encode" (put into computer form) not "encrypt" (provide privacy/secrecy) ? Providing secrecy is not normally an L2 function.

    – jonathanjo
    Apr 15 at 17:37












  • Is this the same as asking why not every network node is an IP router? I think so but I'm not sure.

    – immibis
    Apr 15 at 22:42











  • @immibis No, Alexandre is asking about how layer 2 links work. Some nodes not being an IP router is about layer 3 links and whether IP forwarding is taking place.

    – jonathanjo
    Apr 16 at 14:30











  • @immibis it has nothing to do with that, im asking about encapsulation of frame through a wan network

    – Alexandre Amaral Bednell
    Apr 17 at 15:10

















  • Do you perhaps mean "encode" (put into computer form) not "encrypt" (provide privacy/secrecy) ? Providing secrecy is not normally an L2 function.

    – jonathanjo
    Apr 15 at 17:37












  • Is this the same as asking why not every network node is an IP router? I think so but I'm not sure.

    – immibis
    Apr 15 at 22:42











  • @immibis No, Alexandre is asking about how layer 2 links work. Some nodes not being an IP router is about layer 3 links and whether IP forwarding is taking place.

    – jonathanjo
    Apr 16 at 14:30











  • @immibis it has nothing to do with that, im asking about encapsulation of frame through a wan network

    – Alexandre Amaral Bednell
    Apr 17 at 15:10
















Do you perhaps mean "encode" (put into computer form) not "encrypt" (provide privacy/secrecy) ? Providing secrecy is not normally an L2 function.

– jonathanjo
Apr 15 at 17:37






Do you perhaps mean "encode" (put into computer form) not "encrypt" (provide privacy/secrecy) ? Providing secrecy is not normally an L2 function.

– jonathanjo
Apr 15 at 17:37














Is this the same as asking why not every network node is an IP router? I think so but I'm not sure.

– immibis
Apr 15 at 22:42





Is this the same as asking why not every network node is an IP router? I think so but I'm not sure.

– immibis
Apr 15 at 22:42













@immibis No, Alexandre is asking about how layer 2 links work. Some nodes not being an IP router is about layer 3 links and whether IP forwarding is taking place.

– jonathanjo
Apr 16 at 14:30





@immibis No, Alexandre is asking about how layer 2 links work. Some nodes not being an IP router is about layer 3 links and whether IP forwarding is taking place.

– jonathanjo
Apr 16 at 14:30













@immibis it has nothing to do with that, im asking about encapsulation of frame through a wan network

– Alexandre Amaral Bednell
Apr 17 at 15:10





@immibis it has nothing to do with that, im asking about encapsulation of frame through a wan network

– Alexandre Amaral Bednell
Apr 17 at 15:10










4 Answers
4






active

oldest

votes


















3
















The simplest WAN topology is a point-to-point link known as leased line or private wire. No encapsulation is necessary (although, in practice, there is usually a small header and checksum, such as HDLC).



In this scenario, the telco transports your bitstream from end to end, reserving 100% of the contracted bandwith at all points on the network.



Suppose you have a head office and 20 branches in a star of point-to-point links. You will need 20 links and 20 router ports. This is expensive. If you want to create a backup data centre, you multiply the cost by two.



To save money and router ports, the telco can offer you a switched WAN.



At the head office site, you have one high-bandwith link, which encapsulates the data streams to the branches in a protocol such as frame relay or ATM (the first non-proprietary protocol of this type was X.25). Encapsulation is necessary to address the WAN endpoint. One can also give information about priority and congestion. The telco can sell you different levels of garanteed bandwith (less than the circuit capacity), which saves you money. The branches have a similar setup. If necessary, the branches can communicate directly, without passing through head office.



MPLS is a VPN overlay on these layer 2 protocols, which enables the telco to route your packets by IP address, making it much simpler to set up large and complex networks, while still having a secure private network. It is simpler (and therefore cheaper) for the telco to mix private MPLS networks and public internet on their network. They can also provide internet and private MPLS services on the same router at your site.



In all these switched WAN scenarios, adding a backup data centre requires just one extra connection, one router port and the appropriate configuration.



I should also mention Internet VPN. In this case, you are encapsulating and encrypting your data over the public network. Encapsulation allows you to access private IP addresses in the corporate network, encryption is necessary for security. What you do not have (with certain exceptions) is guaranteed bandwidth or high service levels, but it's much cheaper.






share|improve this answer
































    7
















    IP packets are encapsulated in a layer 2 protocol, whether they are sent on a LAN or WAN. Frame relay is one such WAN layer 2 protocol. There are others, but most are being rapidly replaced by Ethernet. On LANs, of course, you have Ethernet and Wi-fi.



    MPLS doesn't quite fit into the TCP/IP or OSI model. Some consider it a "layer 2.5" protocol.






    share|improve this answer


































      4
















      Layer 2 Encapsulation covers a number of purposes, most notably framing, error detection, compression, addressing, and protocol layering, and these really apply whether the networking is wide area or local area.




      • Framing: We need some way to reliably chunk the data into frames


      • Error detection: If the encapsulation has addressing or length fields, it's normally vastly much more efficient if it can do its own error detection (and perhaps correction), so it can discard frames which have been corrupted. It's good to put this at a low level, because it's much more likely to have knowledge of what kinds of errors are probably and improbable.


      • Compression: it might be that there is a lot of redundant information in the frames, such as for example perhaps all the packets have pretty much the same header, and a low-level compression might be practical.


      • Addressing: Very frequently there are multiple devices on the medium, and we want to be able to select which to disturb with this frame: most notable for broadcast media such as ethernet, and often not present in encapsulation for point-to-point networks.


      • Protocol layering: it's very common that the technology should be capable of being used by several upper protocols, perhaps internet protocol and some other. The encapsulation has some method of saying which upper-layer protocol stack should receive it.

      The simplest encapsulation is SLIP, which just does framing and nothing else: it's for point to point links, so addressing isn't used, and the only upper protocol suppported is IP, so it doesn't even have to say that. Van Jacobson's method of compressing TCP/IP headers is an example of low-level compression.



      One of the most complex is ethernet, which does framing, error checking, broadcast/unicast, local addressing and upper protocol selection.






      share|improve this answer


































        3
















        The term encapsulation is used to describe a process of adding headers and trailers around some data. For example, here is what happens when you send an email using your favourite email program (like Outlook or Thunderbird):



        • The email is sent from the Application layer to the Transport layer.


        • The Transport layer encapsulates the data and adds its own header (with its own information, such as which port will be used) and passes the data to the Internet layer


        • The Internet layer encapsulates the received data and adds its own header, usually with information about the source and destination IP addresses. The Internet layer than passes the data to the Network Access layer


        • The Network Access layer is the only layer that adds both a header and a trailer. The data is then sent through a physical network link.


        Fore more details wiki






        share|improve this answer


























          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "496"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          noCode: true, onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );














          draft saved

          draft discarded
















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f58483%2fwan-encapsulation%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          4 Answers
          4






          active

          oldest

          votes








          4 Answers
          4






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          3
















          The simplest WAN topology is a point-to-point link known as leased line or private wire. No encapsulation is necessary (although, in practice, there is usually a small header and checksum, such as HDLC).



          In this scenario, the telco transports your bitstream from end to end, reserving 100% of the contracted bandwith at all points on the network.



          Suppose you have a head office and 20 branches in a star of point-to-point links. You will need 20 links and 20 router ports. This is expensive. If you want to create a backup data centre, you multiply the cost by two.



          To save money and router ports, the telco can offer you a switched WAN.



          At the head office site, you have one high-bandwith link, which encapsulates the data streams to the branches in a protocol such as frame relay or ATM (the first non-proprietary protocol of this type was X.25). Encapsulation is necessary to address the WAN endpoint. One can also give information about priority and congestion. The telco can sell you different levels of garanteed bandwith (less than the circuit capacity), which saves you money. The branches have a similar setup. If necessary, the branches can communicate directly, without passing through head office.



          MPLS is a VPN overlay on these layer 2 protocols, which enables the telco to route your packets by IP address, making it much simpler to set up large and complex networks, while still having a secure private network. It is simpler (and therefore cheaper) for the telco to mix private MPLS networks and public internet on their network. They can also provide internet and private MPLS services on the same router at your site.



          In all these switched WAN scenarios, adding a backup data centre requires just one extra connection, one router port and the appropriate configuration.



          I should also mention Internet VPN. In this case, you are encapsulating and encrypting your data over the public network. Encapsulation allows you to access private IP addresses in the corporate network, encryption is necessary for security. What you do not have (with certain exceptions) is guaranteed bandwidth or high service levels, but it's much cheaper.






          share|improve this answer





























            3
















            The simplest WAN topology is a point-to-point link known as leased line or private wire. No encapsulation is necessary (although, in practice, there is usually a small header and checksum, such as HDLC).



            In this scenario, the telco transports your bitstream from end to end, reserving 100% of the contracted bandwith at all points on the network.



            Suppose you have a head office and 20 branches in a star of point-to-point links. You will need 20 links and 20 router ports. This is expensive. If you want to create a backup data centre, you multiply the cost by two.



            To save money and router ports, the telco can offer you a switched WAN.



            At the head office site, you have one high-bandwith link, which encapsulates the data streams to the branches in a protocol such as frame relay or ATM (the first non-proprietary protocol of this type was X.25). Encapsulation is necessary to address the WAN endpoint. One can also give information about priority and congestion. The telco can sell you different levels of garanteed bandwith (less than the circuit capacity), which saves you money. The branches have a similar setup. If necessary, the branches can communicate directly, without passing through head office.



            MPLS is a VPN overlay on these layer 2 protocols, which enables the telco to route your packets by IP address, making it much simpler to set up large and complex networks, while still having a secure private network. It is simpler (and therefore cheaper) for the telco to mix private MPLS networks and public internet on their network. They can also provide internet and private MPLS services on the same router at your site.



            In all these switched WAN scenarios, adding a backup data centre requires just one extra connection, one router port and the appropriate configuration.



            I should also mention Internet VPN. In this case, you are encapsulating and encrypting your data over the public network. Encapsulation allows you to access private IP addresses in the corporate network, encryption is necessary for security. What you do not have (with certain exceptions) is guaranteed bandwidth or high service levels, but it's much cheaper.






            share|improve this answer



























              3














              3










              3









              The simplest WAN topology is a point-to-point link known as leased line or private wire. No encapsulation is necessary (although, in practice, there is usually a small header and checksum, such as HDLC).



              In this scenario, the telco transports your bitstream from end to end, reserving 100% of the contracted bandwith at all points on the network.



              Suppose you have a head office and 20 branches in a star of point-to-point links. You will need 20 links and 20 router ports. This is expensive. If you want to create a backup data centre, you multiply the cost by two.



              To save money and router ports, the telco can offer you a switched WAN.



              At the head office site, you have one high-bandwith link, which encapsulates the data streams to the branches in a protocol such as frame relay or ATM (the first non-proprietary protocol of this type was X.25). Encapsulation is necessary to address the WAN endpoint. One can also give information about priority and congestion. The telco can sell you different levels of garanteed bandwith (less than the circuit capacity), which saves you money. The branches have a similar setup. If necessary, the branches can communicate directly, without passing through head office.



              MPLS is a VPN overlay on these layer 2 protocols, which enables the telco to route your packets by IP address, making it much simpler to set up large and complex networks, while still having a secure private network. It is simpler (and therefore cheaper) for the telco to mix private MPLS networks and public internet on their network. They can also provide internet and private MPLS services on the same router at your site.



              In all these switched WAN scenarios, adding a backup data centre requires just one extra connection, one router port and the appropriate configuration.



              I should also mention Internet VPN. In this case, you are encapsulating and encrypting your data over the public network. Encapsulation allows you to access private IP addresses in the corporate network, encryption is necessary for security. What you do not have (with certain exceptions) is guaranteed bandwidth or high service levels, but it's much cheaper.






              share|improve this answer













              The simplest WAN topology is a point-to-point link known as leased line or private wire. No encapsulation is necessary (although, in practice, there is usually a small header and checksum, such as HDLC).



              In this scenario, the telco transports your bitstream from end to end, reserving 100% of the contracted bandwith at all points on the network.



              Suppose you have a head office and 20 branches in a star of point-to-point links. You will need 20 links and 20 router ports. This is expensive. If you want to create a backup data centre, you multiply the cost by two.



              To save money and router ports, the telco can offer you a switched WAN.



              At the head office site, you have one high-bandwith link, which encapsulates the data streams to the branches in a protocol such as frame relay or ATM (the first non-proprietary protocol of this type was X.25). Encapsulation is necessary to address the WAN endpoint. One can also give information about priority and congestion. The telco can sell you different levels of garanteed bandwith (less than the circuit capacity), which saves you money. The branches have a similar setup. If necessary, the branches can communicate directly, without passing through head office.



              MPLS is a VPN overlay on these layer 2 protocols, which enables the telco to route your packets by IP address, making it much simpler to set up large and complex networks, while still having a secure private network. It is simpler (and therefore cheaper) for the telco to mix private MPLS networks and public internet on their network. They can also provide internet and private MPLS services on the same router at your site.



              In all these switched WAN scenarios, adding a backup data centre requires just one extra connection, one router port and the appropriate configuration.



              I should also mention Internet VPN. In this case, you are encapsulating and encrypting your data over the public network. Encapsulation allows you to access private IP addresses in the corporate network, encryption is necessary for security. What you do not have (with certain exceptions) is guaranteed bandwidth or high service levels, but it's much cheaper.







              share|improve this answer












              share|improve this answer



              share|improve this answer










              answered Apr 15 at 23:34









              grahamj42grahamj42

              2201 silver badge3 bronze badges




              2201 silver badge3 bronze badges


























                  7
















                  IP packets are encapsulated in a layer 2 protocol, whether they are sent on a LAN or WAN. Frame relay is one such WAN layer 2 protocol. There are others, but most are being rapidly replaced by Ethernet. On LANs, of course, you have Ethernet and Wi-fi.



                  MPLS doesn't quite fit into the TCP/IP or OSI model. Some consider it a "layer 2.5" protocol.






                  share|improve this answer































                    7
















                    IP packets are encapsulated in a layer 2 protocol, whether they are sent on a LAN or WAN. Frame relay is one such WAN layer 2 protocol. There are others, but most are being rapidly replaced by Ethernet. On LANs, of course, you have Ethernet and Wi-fi.



                    MPLS doesn't quite fit into the TCP/IP or OSI model. Some consider it a "layer 2.5" protocol.






                    share|improve this answer





























                      7














                      7










                      7









                      IP packets are encapsulated in a layer 2 protocol, whether they are sent on a LAN or WAN. Frame relay is one such WAN layer 2 protocol. There are others, but most are being rapidly replaced by Ethernet. On LANs, of course, you have Ethernet and Wi-fi.



                      MPLS doesn't quite fit into the TCP/IP or OSI model. Some consider it a "layer 2.5" protocol.






                      share|improve this answer















                      IP packets are encapsulated in a layer 2 protocol, whether they are sent on a LAN or WAN. Frame relay is one such WAN layer 2 protocol. There are others, but most are being rapidly replaced by Ethernet. On LANs, of course, you have Ethernet and Wi-fi.



                      MPLS doesn't quite fit into the TCP/IP or OSI model. Some consider it a "layer 2.5" protocol.







                      share|improve this answer














                      share|improve this answer



                      share|improve this answer








                      edited Apr 15 at 16:57

























                      answered Apr 15 at 16:22









                      Ron TrunkRon Trunk

                      45.7k3 gold badges43 silver badges94 bronze badges




                      45.7k3 gold badges43 silver badges94 bronze badges
























                          4
















                          Layer 2 Encapsulation covers a number of purposes, most notably framing, error detection, compression, addressing, and protocol layering, and these really apply whether the networking is wide area or local area.




                          • Framing: We need some way to reliably chunk the data into frames


                          • Error detection: If the encapsulation has addressing or length fields, it's normally vastly much more efficient if it can do its own error detection (and perhaps correction), so it can discard frames which have been corrupted. It's good to put this at a low level, because it's much more likely to have knowledge of what kinds of errors are probably and improbable.


                          • Compression: it might be that there is a lot of redundant information in the frames, such as for example perhaps all the packets have pretty much the same header, and a low-level compression might be practical.


                          • Addressing: Very frequently there are multiple devices on the medium, and we want to be able to select which to disturb with this frame: most notable for broadcast media such as ethernet, and often not present in encapsulation for point-to-point networks.


                          • Protocol layering: it's very common that the technology should be capable of being used by several upper protocols, perhaps internet protocol and some other. The encapsulation has some method of saying which upper-layer protocol stack should receive it.

                          The simplest encapsulation is SLIP, which just does framing and nothing else: it's for point to point links, so addressing isn't used, and the only upper protocol suppported is IP, so it doesn't even have to say that. Van Jacobson's method of compressing TCP/IP headers is an example of low-level compression.



                          One of the most complex is ethernet, which does framing, error checking, broadcast/unicast, local addressing and upper protocol selection.






                          share|improve this answer































                            4
















                            Layer 2 Encapsulation covers a number of purposes, most notably framing, error detection, compression, addressing, and protocol layering, and these really apply whether the networking is wide area or local area.




                            • Framing: We need some way to reliably chunk the data into frames


                            • Error detection: If the encapsulation has addressing or length fields, it's normally vastly much more efficient if it can do its own error detection (and perhaps correction), so it can discard frames which have been corrupted. It's good to put this at a low level, because it's much more likely to have knowledge of what kinds of errors are probably and improbable.


                            • Compression: it might be that there is a lot of redundant information in the frames, such as for example perhaps all the packets have pretty much the same header, and a low-level compression might be practical.


                            • Addressing: Very frequently there are multiple devices on the medium, and we want to be able to select which to disturb with this frame: most notable for broadcast media such as ethernet, and often not present in encapsulation for point-to-point networks.


                            • Protocol layering: it's very common that the technology should be capable of being used by several upper protocols, perhaps internet protocol and some other. The encapsulation has some method of saying which upper-layer protocol stack should receive it.

                            The simplest encapsulation is SLIP, which just does framing and nothing else: it's for point to point links, so addressing isn't used, and the only upper protocol suppported is IP, so it doesn't even have to say that. Van Jacobson's method of compressing TCP/IP headers is an example of low-level compression.



                            One of the most complex is ethernet, which does framing, error checking, broadcast/unicast, local addressing and upper protocol selection.






                            share|improve this answer





























                              4














                              4










                              4









                              Layer 2 Encapsulation covers a number of purposes, most notably framing, error detection, compression, addressing, and protocol layering, and these really apply whether the networking is wide area or local area.




                              • Framing: We need some way to reliably chunk the data into frames


                              • Error detection: If the encapsulation has addressing or length fields, it's normally vastly much more efficient if it can do its own error detection (and perhaps correction), so it can discard frames which have been corrupted. It's good to put this at a low level, because it's much more likely to have knowledge of what kinds of errors are probably and improbable.


                              • Compression: it might be that there is a lot of redundant information in the frames, such as for example perhaps all the packets have pretty much the same header, and a low-level compression might be practical.


                              • Addressing: Very frequently there are multiple devices on the medium, and we want to be able to select which to disturb with this frame: most notable for broadcast media such as ethernet, and often not present in encapsulation for point-to-point networks.


                              • Protocol layering: it's very common that the technology should be capable of being used by several upper protocols, perhaps internet protocol and some other. The encapsulation has some method of saying which upper-layer protocol stack should receive it.

                              The simplest encapsulation is SLIP, which just does framing and nothing else: it's for point to point links, so addressing isn't used, and the only upper protocol suppported is IP, so it doesn't even have to say that. Van Jacobson's method of compressing TCP/IP headers is an example of low-level compression.



                              One of the most complex is ethernet, which does framing, error checking, broadcast/unicast, local addressing and upper protocol selection.






                              share|improve this answer















                              Layer 2 Encapsulation covers a number of purposes, most notably framing, error detection, compression, addressing, and protocol layering, and these really apply whether the networking is wide area or local area.




                              • Framing: We need some way to reliably chunk the data into frames


                              • Error detection: If the encapsulation has addressing or length fields, it's normally vastly much more efficient if it can do its own error detection (and perhaps correction), so it can discard frames which have been corrupted. It's good to put this at a low level, because it's much more likely to have knowledge of what kinds of errors are probably and improbable.


                              • Compression: it might be that there is a lot of redundant information in the frames, such as for example perhaps all the packets have pretty much the same header, and a low-level compression might be practical.


                              • Addressing: Very frequently there are multiple devices on the medium, and we want to be able to select which to disturb with this frame: most notable for broadcast media such as ethernet, and often not present in encapsulation for point-to-point networks.


                              • Protocol layering: it's very common that the technology should be capable of being used by several upper protocols, perhaps internet protocol and some other. The encapsulation has some method of saying which upper-layer protocol stack should receive it.

                              The simplest encapsulation is SLIP, which just does framing and nothing else: it's for point to point links, so addressing isn't used, and the only upper protocol suppported is IP, so it doesn't even have to say that. Van Jacobson's method of compressing TCP/IP headers is an example of low-level compression.



                              One of the most complex is ethernet, which does framing, error checking, broadcast/unicast, local addressing and upper protocol selection.







                              share|improve this answer














                              share|improve this answer



                              share|improve this answer








                              edited Apr 16 at 11:40

























                              answered Apr 15 at 17:26









                              jonathanjojonathanjo

                              13.8k1 gold badge12 silver badges43 bronze badges




                              13.8k1 gold badge12 silver badges43 bronze badges
























                                  3
















                                  The term encapsulation is used to describe a process of adding headers and trailers around some data. For example, here is what happens when you send an email using your favourite email program (like Outlook or Thunderbird):



                                  • The email is sent from the Application layer to the Transport layer.


                                  • The Transport layer encapsulates the data and adds its own header (with its own information, such as which port will be used) and passes the data to the Internet layer


                                  • The Internet layer encapsulates the received data and adds its own header, usually with information about the source and destination IP addresses. The Internet layer than passes the data to the Network Access layer


                                  • The Network Access layer is the only layer that adds both a header and a trailer. The data is then sent through a physical network link.


                                  Fore more details wiki






                                  share|improve this answer





























                                    3
















                                    The term encapsulation is used to describe a process of adding headers and trailers around some data. For example, here is what happens when you send an email using your favourite email program (like Outlook or Thunderbird):



                                    • The email is sent from the Application layer to the Transport layer.


                                    • The Transport layer encapsulates the data and adds its own header (with its own information, such as which port will be used) and passes the data to the Internet layer


                                    • The Internet layer encapsulates the received data and adds its own header, usually with information about the source and destination IP addresses. The Internet layer than passes the data to the Network Access layer


                                    • The Network Access layer is the only layer that adds both a header and a trailer. The data is then sent through a physical network link.


                                    Fore more details wiki






                                    share|improve this answer



























                                      3














                                      3










                                      3









                                      The term encapsulation is used to describe a process of adding headers and trailers around some data. For example, here is what happens when you send an email using your favourite email program (like Outlook or Thunderbird):



                                      • The email is sent from the Application layer to the Transport layer.


                                      • The Transport layer encapsulates the data and adds its own header (with its own information, such as which port will be used) and passes the data to the Internet layer


                                      • The Internet layer encapsulates the received data and adds its own header, usually with information about the source and destination IP addresses. The Internet layer than passes the data to the Network Access layer


                                      • The Network Access layer is the only layer that adds both a header and a trailer. The data is then sent through a physical network link.


                                      Fore more details wiki






                                      share|improve this answer













                                      The term encapsulation is used to describe a process of adding headers and trailers around some data. For example, here is what happens when you send an email using your favourite email program (like Outlook or Thunderbird):



                                      • The email is sent from the Application layer to the Transport layer.


                                      • The Transport layer encapsulates the data and adds its own header (with its own information, such as which port will be used) and passes the data to the Internet layer


                                      • The Internet layer encapsulates the received data and adds its own header, usually with information about the source and destination IP addresses. The Internet layer than passes the data to the Network Access layer


                                      • The Network Access layer is the only layer that adds both a header and a trailer. The data is then sent through a physical network link.


                                      Fore more details wiki







                                      share|improve this answer












                                      share|improve this answer



                                      share|improve this answer










                                      answered Apr 15 at 15:51









                                      infrainfra

                                      2,0162 gold badges5 silver badges21 bronze badges




                                      2,0162 gold badges5 silver badges21 bronze badges































                                          draft saved

                                          draft discarded















































                                          Thanks for contributing an answer to Network Engineering Stack Exchange!


                                          • Please be sure to answer the question. Provide details and share your research!

                                          But avoid


                                          • Asking for help, clarification, or responding to other answers.

                                          • Making statements based on opinion; back them up with references or personal experience.

                                          To learn more, see our tips on writing great answers.




                                          draft saved


                                          draft discarded














                                          StackExchange.ready(
                                          function ()
                                          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f58483%2fwan-encapsulation%23new-answer', 'question_page');

                                          );

                                          Post as a guest















                                          Required, but never shown





















































                                          Required, but never shown














                                          Required, but never shown












                                          Required, but never shown







                                          Required, but never shown

































                                          Required, but never shown














                                          Required, but never shown












                                          Required, but never shown







                                          Required, but never shown







                                          Popular posts from this blog

                                          Tamil (spriik) Luke uk diar | Nawigatjuun

                                          Align equal signs while including text over equalitiesAMS align: left aligned text/math plus multicolumn alignmentMultiple alignmentsAligning equations in multiple placesNumbering and aligning an equation with multiple columnsHow to align one equation with another multline equationUsing \ in environments inside the begintabularxNumber equations and preserving alignment of equal signsHow can I align equations to the left and to the right?Double equation alignment problem within align enviromentAligned within align: Why are they right-aligned?

                                          Training a classifier when some of the features are unknownWhy does Gradient Boosting regression predict negative values when there are no negative y-values in my training set?How to improve an existing (trained) classifier?What is effect when I set up some self defined predisctor variables?Why Matlab neural network classification returns decimal values on prediction dataset?Fitting and transforming text data in training, testing, and validation setsHow to quantify the performance of the classifier (multi-class SVM) using the test data?How do I control for some patients providing multiple samples in my training data?Training and Test setTraining a convolutional neural network for image denoising in MatlabShouldn't an autoencoder with #(neurons in hidden layer) = #(neurons in input layer) be “perfect”?