Skip to main content

GRE Protocol

The Generic Routing Encapsulation (GRE), specified in [RFC2784], is an IETF standard defining multi-protocol encapsulation format that could be suitable to tunnel any network layer protocol over any network layer protocol. This concept was originally specified in [RFC 1701], which was an informational RFC. When this original protocol was moved to a standards track, the decision was made to replace it with two separate RFCs: [RFC2784] and [RFC2890]. [RFC2890] is an extension of the basic GRE header described in [RFC2784]. It was determined necessary because [RFC 2784] does not lend itself to encapsulation of PPP frames, since it does not have a sequence number in the GRE encapsulation format. This limitation was removed by adding a sequence number extension to the basic GRE header. Also, [RFC2784] does not allow for multiplexing onto the same GRE tunnel of tunneled packets belonging to different administrative entities possibly adopting overlapping private address spaces (a very useful feature for the provision of Virtual Private Networks). This limitation was also removed by adding a key field—that is, a numeric value used to uniquely identify a logically correlated flow of packets within the GRE tunnel—as an extension of the basic GRE header. These extensions to a basic GRE defined by [RFC2890] were especially useful in wireless data communications. For example, they allowed for in-sequence delivery of PPP frames over the R-P interface in CDMA2000 (see Chapters 4 and 7 for more details), and the provisioning of compulsory MVPN services.
GRE, as defined by these RFCs, is normally used in two classes of applications: the transport of different protocols between IP networks and the provision of VPN services for networks configured with potentially overlapping private address space. The GRE header key field can be used to discriminate the identity of the customer network where encapsulated packets originate. In this way, it provides a way to offer many virtual interfaces to customer networks on a single GRE tunnel endpoint. This feature allows for policy-based routing (that is, when routing decisions are not based only on the destination IP address but on the combination of a virtual interface identifier, and service desk salary the destination IP address) and relatively easy per-user network accounting. Also, a GRE header allows the identification of the type of the protocol that is being carried over the GRE tunnel, thus allowing IP networks to serve as a bearer service onto which a virtual multi-protocol network can be defined and implemented.

Comments

Popular posts from this blog

5G Network Day

Following quite a while of expectation, the 5G organize has at last shown up in the UK and the race is on between the administrators for its boundless rollout. EE was the leading the imprint and turned on their system in zones of London, Cardiff, Belfast, Edinburgh, Birmingham and Manchester on the 30th May. Vodafone is close behind, propelling on the third July, and 02 and Three will play catchup not long from now. 5G is set to change the substance of portable interchanges in light of the fact that up to this point, all versatile broadband systems have been intended to address the issues of individuals. 5G, then again, has been planned considering machines, offering low-inertness and high-effectiveness information move speeds. For sure, it will be the supporting innovation behind AI-driven administrations, for example, driverless autos, Smart Cities, robots and IoT. In light of this, what precisely does the 5G rollout mean from an end client point of view and in what manner shoul...

AC-DC Power Conversion

Two key processing and systems administration engineering patterns—programming characterized systems (SDNs) and system work virtualization (NFV)— remain to drastically reshape how correspondences specialist organizations (CSPs) work and carry chances to smooth out activities, decrease costs, and improve administration. These methodologies are genuine and ready today, effectively received comprehensively for registering needs in an assortment of ventures. Both rotate around a straightforward idea: separate fundamental equipment and related system capacities from application administration works that at that point work as virtual systems, existing exclusively in the product domain. For instance, switches become virtual switches, and voice calls use carefully programming capacities on a virtual system, working across universally useful equipment. The vision is one of straightforwardness—and one that can situate you for an increasingly advanced, purchaser driven future. Generally, in an...

5G Network Technology Performance

At the same time, as indicated by the study, information break and client experience are the two greatest system stresses. Around 33 percent of system experts said an information rupture stresses them the most over their system. Given the practically day by day information breaks, who can accuse them? In a perfect world, organize chiefs might want to see devices that consolidate system and security the executives. Notwithstanding, just around 40 percent of respondents said their association was utilizing a similar heap of apparatuses to oversee both system execution and security. Be that as it may, arrange stars are likewise being overpowered by the immense multiplication of cloud and system the executives devices. Numerous associations are attempting mixes of devices to deal with the test. System traffic investigation seems, by all accounts, to be the most ordinarily utilized, with a little more than 28 percent of system experts utilizing it to deal with their system challenge. ...