Layers, massages, segments, datagram''s and frames, Computer Networking

Assignment Help:

Layers, Massages, Segments, Datagram's and Frames

Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stacks of an intervening link  layer  switch  and router  and then  up the protocol stack at the  receiving end systems.

1376_Layers, Massages, Segments, Datagram’s and Frames.gif

Host  Routers and link layer switches each contains a different set  of layer reflecting their  differences in functionality

As  show  in figure2.15 link  layer switches implement  layers  1 and 2 routers implement  layer 1 through 3. This  means for example that internet routers are capable of implementing the IP protocol ( a layer 3 protocol) while link  layer switch  are not .

 Host  routers and link layer switches each contains a  different  set of layer  reflecting  their  different  in functionality.

Figure 2.15 also  illustrates  the important  concept  of encapsulation. At the  sending  host  an application layer messages(M) is passed  to the transport layer. In  the simple  case the transport layer takes the massage and appends additional  information( so - called transport layer header information. H1) that  will be used  by the receiver side transport  layer. The  application  layer message and the transport layer header information together constitute the transport layer segment. The  transport layer segment thus  encapsulates the application layer message. The added  information might include information allowing  the receiver side transport layer to deliver the message  up to  the appropriate application and error detection bits  that allow  the receiver to determine  whether bits in  the message  have been  changed in route. The transport layer then passes the segment to the network  layer which  adds  networks layer header information(H n) such as source and  destination end system  address creating a network layer datagram. The  datagram  is then  passed  to the  link layer. Which  will add its  own link  layer  header information  and create  link  layer  frame.

 

 

 


Related Discussions:- Layers, massages, segments, datagram''s and frames

DHCP, Describe DHCP concept

Describe DHCP concept

Explain stop--and--wait automatic repeat request, Q. Explain Stop--and--Wai...

Q. Explain Stop--and--Wait automatic repeat request? 1. Numbering frames prevents the retaining off duplicate frames. 2. Numbered acknowledgement are needed in case of delay

Explain the three principles of data communication system, Question 1 Vide...

Question 1 Videoconferencing is used to conduct meetings with the people who are located in far distance. Videoconferencing is an example of which type of computer networks? Expla

Function of the transport system and workbench organizer, What is the funct...

What is the function of the transport system and workbench organizer? The function of the transport system and the Workbench Organizer is to handle any changes made to objects

What is a web server in client server environment, This new model of Client...

This new model of Client/Server having of thin, portable, "universal" clients that talks to superfast servers. In the simple form, a web server returns documents when clients ask f

Protocol layers and their service models - computer network, Protocol Laye...

Protocol Layers and their Service Models The  internet is an extremely complicated system. It  consists of many  pieces like  numerous  applications and protocols  various  t

What is unacknowledged connectionless service, What is Unacknowledged conne...

What is Unacknowledged connectionless service This service is a datagram-style service. It is a very simple service that does not involve any of the flow- and error-control mec

Differentiate between fast fading and slow fading, Differentiate between Fa...

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Ipv6 packet format - network layer and routing , IPv6 packet Format Th...

IPv6 packet Format The format  of an IPv6 header is shown  in figure. Although IPv6 addresses are four  times  the size  of IPv4 address  the basic  IPv6 header is only twice

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd