Layers, massages, segments, datagram''s and frames, Computer Networking

Assignment Help:

Layers, Massages, Segments, Datagram's and Frames

Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stacks of an intervening link  layer  switch  and router  and then  up the protocol stack at the  receiving end systems.

1376_Layers, Massages, Segments, Datagram’s and Frames.gif

Host  Routers and link layer switches each contains a different set  of layer reflecting their  differences in functionality

As  show  in figure2.15 link  layer switches implement  layers  1 and 2 routers implement  layer 1 through 3. This  means for example that internet routers are capable of implementing the IP protocol ( a layer 3 protocol) while link  layer switch  are not .

 Host  routers and link layer switches each contains a  different  set of layer  reflecting  their  different  in functionality.

Figure 2.15 also  illustrates  the important  concept  of encapsulation. At the  sending  host  an application layer messages(M) is passed  to the transport layer. In  the simple  case the transport layer takes the massage and appends additional  information( so - called transport layer header information. H1) that  will be used  by the receiver side transport  layer. The  application  layer message and the transport layer header information together constitute the transport layer segment. The  transport layer segment thus  encapsulates the application layer message. The added  information might include information allowing  the receiver side transport layer to deliver the message  up to  the appropriate application and error detection bits  that allow  the receiver to determine  whether bits in  the message  have been  changed in route. The transport layer then passes the segment to the network  layer which  adds  networks layer header information(H n) such as source and  destination end system  address creating a network layer datagram. The  datagram  is then  passed  to the  link layer. Which  will add its  own link  layer  header information  and create  link  layer  frame.

 

 

 


Related Discussions:- Layers, massages, segments, datagram''s and frames

Broadcast domain and collision domain, Explain Difference between broadcast...

Explain Difference between broadcast domain and collision domain? Ans) Broadcast Domain Send the packet to all the Present Network IT might be send by the person It mig

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Clock-driven scheme , Assume that the clock-driven scheme for generating st...

Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

Tunnelling - point to point, Tunnelling To guarantee privacy for the  o...

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

Describe the automatic repeat request protocol, Question 1: (a) In net...

Question 1: (a) In networking, there are different possible topologies. Explain the Linear bus, Ring and Star topology along with their advantages and disadvantages. (b) W

Explain fat tree interconnection network, Fat tree: It is a customized ver...

Fat tree: It is a customized version of tree network. In this network bandwidth of edge (or connecting wire between nodes) increases in the direction of root. It's a more realisti

Verify passwords - ccna, Verify Passwords Step 1 : Telnet to the route...

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Example on TCP numbering, Q. Example on TCP numbering? Envision a TCP c...

Q. Example on TCP numbering? Envision a TCP connection is transferring a file of 6000 bytes. The first byte is numbered 10010. What are the sequence numbers for every seg

What is network virtual terminal, What is NVT (Network Virtual Terminal) ...

What is NVT (Network Virtual Terminal) It is a set of rules explaining a very simple virtual terminal interaction. The NVT is used in the begin of a Telnet session.

State about the single sign-on intranet, State about the Single Sign-On Int...

State about the Single Sign-On Intranet This Intranet, if managed efficiently, allows maximum security by firewalling anyone from inappropriate sites automatically. For exam

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd