Layers, massages, segments, datagram''s and frames, Computer Networking

Assignment Help:

Layers, Massages, Segments, Datagram's and Frames

Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stacks of an intervening link  layer  switch  and router  and then  up the protocol stack at the  receiving end systems.

1376_Layers, Massages, Segments, Datagram’s and Frames.gif

Host  Routers and link layer switches each contains a different set  of layer reflecting their  differences in functionality

As  show  in figure2.15 link  layer switches implement  layers  1 and 2 routers implement  layer 1 through 3. This  means for example that internet routers are capable of implementing the IP protocol ( a layer 3 protocol) while link  layer switch  are not .

 Host  routers and link layer switches each contains a  different  set of layer  reflecting  their  different  in functionality.

Figure 2.15 also  illustrates  the important  concept  of encapsulation. At the  sending  host  an application layer messages(M) is passed  to the transport layer. In  the simple  case the transport layer takes the massage and appends additional  information( so - called transport layer header information. H1) that  will be used  by the receiver side transport  layer. The  application  layer message and the transport layer header information together constitute the transport layer segment. The  transport layer segment thus  encapsulates the application layer message. The added  information might include information allowing  the receiver side transport layer to deliver the message  up to  the appropriate application and error detection bits  that allow  the receiver to determine  whether bits in  the message  have been  changed in route. The transport layer then passes the segment to the network  layer which  adds  networks layer header information(H n) such as source and  destination end system  address creating a network layer datagram. The  datagram  is then  passed  to the  link layer. Which  will add its  own link  layer  header information  and create  link  layer  frame.

 

 

 


Related Discussions:- Layers, massages, segments, datagram''s and frames

Explain about bridges, Bridges The bridge function is to attach separat...

Bridges The bridge function is to attach separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only essential

Cnet sliding window protocol, implementing cnet sliding window protocol wit...

implementing cnet sliding window protocol with 6 nodes

Explain the different types of physical networking, Question 1 Explain the...

Question 1 Explain the different activities carried out on E-Commerce, with appropriate examples Question 2 Explain the core components of E-Commerce in detail with appropria

Define bandwidth and latency, Define Bandwidth and Latency? Network per...

Define Bandwidth and Latency? Network performance is calculated in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be

Protocol layering - computer network, Protocol Layering To design  str...

Protocol Layering To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. E

Byte number - transport layer, Byte Number TCP number all data  bytes ...

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

Inductor, #clasification of inductor

#clasification of inductor

Line layer - sonet sdh , Line Layer The line layer provides the synchr...

Line Layer The line layer provides the synchronization multiplexer, multiplexing and automatic  protection switching for the layer . primary  concerned with the  reliable trans

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd