Layers, massages, segments, datagram''s and frames, Computer Networking

Assignment Help:

Layers, Massages, Segments, Datagram's and Frames

Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stacks of an intervening link  layer  switch  and router  and then  up the protocol stack at the  receiving end systems.

1376_Layers, Massages, Segments, Datagram’s and Frames.gif

Host  Routers and link layer switches each contains a different set  of layer reflecting their  differences in functionality

As  show  in figure2.15 link  layer switches implement  layers  1 and 2 routers implement  layer 1 through 3. This  means for example that internet routers are capable of implementing the IP protocol ( a layer 3 protocol) while link  layer switch  are not .

 Host  routers and link layer switches each contains a  different  set of layer  reflecting  their  different  in functionality.

Figure 2.15 also  illustrates  the important  concept  of encapsulation. At the  sending  host  an application layer messages(M) is passed  to the transport layer. In  the simple  case the transport layer takes the massage and appends additional  information( so - called transport layer header information. H1) that  will be used  by the receiver side transport  layer. The  application  layer message and the transport layer header information together constitute the transport layer segment. The  transport layer segment thus  encapsulates the application layer message. The added  information might include information allowing  the receiver side transport layer to deliver the message  up to  the appropriate application and error detection bits  that allow  the receiver to determine  whether bits in  the message  have been  changed in route. The transport layer then passes the segment to the network  layer which  adds  networks layer header information(H n) such as source and  destination end system  address creating a network layer datagram. The  datagram  is then  passed  to the  link layer. Which  will add its  own link  layer  header information  and create  link  layer  frame.

 

 

 


Related Discussions:- Layers, massages, segments, datagram''s and frames

Architecture of cisco ios software, Architecture of Cisco IOS software ...

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

What is transmission control protocol, Q. What is Transmission Control Prot...

Q. What is Transmission Control Protocol? Transmission Control Protocol TCP Services - Stream delivery service Permits the sending process to deliver data as a stream

Go back-n ( gbn) - transport layer, Go Back ( GBN) Go back  N ARQ is s...

Go Back ( GBN) Go back  N ARQ is specific  instance of the  automatic  repeat request protocols  in which  the sending  process continues to send  a number of frames specific

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

What are three ways to give login access to router, The three ways to give ...

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

What is unbound transmission media, Unbound Transmission Media Unbound ...

Unbound Transmission Media Unbound transmission media extend beyond the limiting confines of cabling. They give a good communication alternative for WANS. The lack of physical

What is session layer in osi model, Q. What is Session Layer in osi model? ...

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Show the character-level encryption, Q. Show the Character-level Encryption...

Q. Show the Character-level Encryption? - Substitutional - Monoalphabetic - simplest form; also called Caesar cipher - Every character is replaced with another character

Error detection-- crc, Error Detection-- CRC Powerful error detecti...

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

Show scalability and reliability of computer network, How do you account fo...

How do you account for higher scalability and reliability of computer network? Ans: Computer network will have a large number of computers, which can share database, software

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd