Concept

Generic Routing Encapsulation

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network. In conjunction with PPTP to create VPNs. In conjunction with IPsec VPNs to allow passing of routing information between connected networks. In mobility protocols. In A8/A10 interfaces to encapsulate IP data to/from Packet Control Function (PCF). Linux and BSD can establish ad-hoc IP over GRE tunnels which are interoperable with Cisco equipment. Distributed denial of service (DDoS) protected appliance to an unprotected endpoint. Based on the principles of protocol layering in OSI, protocol encapsulation, not specifically GRE, breaks the layering order. It may be viewed as a separator between two different protocol stacks, one acting as a carrier for another. GRE packets that are encapsulated within IP directly, use IP protocol type 47 in the IPv4 header's Protocol field or the IPv6 header's Next Header field. For performance reasons, GRE can also be encapsulated in UDP packets. Better throughput may be achieved by using Equal-cost multi-path routing. The extended version of the GRE packet header is represented below: {| class="wikitable" style="text-align: center"

+Extended GRE header format
!style="border-bottom:none; border-right:none;"
!style="border-left:none;"
!colspan="8"
!colspan="8"
!colspan="8"
!colspan="8"
-
!style="border-top: none"
!Bit
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.75%;"
!style="width:2.
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related courses (2)
MICRO-505: Organic and printed electronics
This course addresses the implementation of organic and printed electronics technologies using large area manufacturing techniques. It will provide knowledge on materials, printing techniques, devices
COM-301: Computer security and privacy
This is an introductory course to computer security and privacy. Its goal is to provide students with means to reason about security and privacy problems, and provide them with tools to confront them.
Related lectures (9)
Network Security: IP Security
Covers IP basics, vulnerabilities like IP spoofing, and the use of IPSec for Virtual Private Networks.
Telecommand System Requirements
Covers the requirements and functions of a telecommand system in spacecraft, including uploading programs and controlling spacecraft operations.
Postquantum TLS: Key Exchange and Authentication
Explores Post-Quantum TLS implementation without handshake signatures, focusing on key exchange and authentication using KEM.
Show more
Related publications (29)

Linear and nonlinear applications of miniaturized silicon nitride microresonators

Arslan Sajid Raja

Photonic integrated circuits (PICs) are the subject of massive interest due to the range of applications they can provide at a huge scale while building on well-established CMOS technologies. One of the critical parameters defining a technology's maturity ...
EPFL2023

Lifetime of dielectric elastomer actuators under DC electric fields

Fabio Beco Albuquerque

Dielectric elastomer actuators (DEAs) are interesting soft actuators compared to other actuation technologies owing to large achievable actuation strains, high energy density and fast actuation. However, because DEAs need to be operated under high electric ...
EPFL2022

Stable Al 2 O 3 Encapsulation of MoS 2 ‐FETs Enabled by CVD Grown h‐BN

Aleksandra Radenovic, Andras Kis, Zhenyu Wang

Molybdenum disulfide (MoS2) has great potential as a two-dimensional semiconductor for electronic and optoelectronic application, but its high sensitivity to environmental adsorbents and charge transfer from neighboring dielectrics can lead to device varia ...
2022
Show more
Related people (1)
Related concepts (5)
Tunneling protocol
In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It involves allowing private network communications to be sent across a public network (such as the Internet) through a process called encapsulation. Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, it can hide the nature of the traffic that is run through a tunnel.
Encapsulation (networking)
Encapsulation is the computer-networking process of concatenating layer-specific headers or tailers with a service data unit (i.e. a payload) for transmitting information over computer networks. Deencapsulation (or de-encapsulation) is the reverse computer-networking process for receiving information; it removes from the protocol data unit (PDU) a previously concatenated header or tailer that an underlying communications layer transmitted.
Communication protocol
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics, and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both. Communicating systems use well-defined formats for exchanging various messages.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.