Layers, massages, segments, datagram''s and frames, Computer Networking

Assignment Help:

Layers, Massages, Segments, Datagram's and Frames

Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stacks of an intervening link  layer  switch  and router  and then  up the protocol stack at the  receiving end systems.

1376_Layers, Massages, Segments, Datagram’s and Frames.gif

Host  Routers and link layer switches each contains a different set  of layer reflecting their  differences in functionality

As  show  in figure2.15 link  layer switches implement  layers  1 and 2 routers implement  layer 1 through 3. This  means for example that internet routers are capable of implementing the IP protocol ( a layer 3 protocol) while link  layer switch  are not .

 Host  routers and link layer switches each contains a  different  set of layer  reflecting  their  different  in functionality.

Figure 2.15 also  illustrates  the important  concept  of encapsulation. At the  sending  host  an application layer messages(M) is passed  to the transport layer. In  the simple  case the transport layer takes the massage and appends additional  information( so - called transport layer header information. H1) that  will be used  by the receiver side transport  layer. The  application  layer message and the transport layer header information together constitute the transport layer segment. The  transport layer segment thus  encapsulates the application layer message. The added  information might include information allowing  the receiver side transport layer to deliver the message  up to  the appropriate application and error detection bits  that allow  the receiver to determine  whether bits in  the message  have been  changed in route. The transport layer then passes the segment to the network  layer which  adds  networks layer header information(H n) such as source and  destination end system  address creating a network layer datagram. The  datagram  is then  passed  to the  link layer. Which  will add its  own link  layer  header information  and create  link  layer  frame.

 

 

 


Related Discussions:- Layers, massages, segments, datagram''s and frames

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

The ip address ranges for public and private ip address, What are the IP ad...

What are the IP address ranges for public and private IP address?

Show the drawbacks of go-back-N, Q. Show the Drawbacks of Go-back-N? D...

Q. Show the Drawbacks of Go-back-N? Drawbacks of Go-back- N - Inefficient - Every out of order received packets are discarded (receiver side is simplified) - This

Authentication in ppp - point to point , Authentication in PPP PPP can ...

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

What is the last step in data encapsulation, The Five steps to data encapsu...

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

List the advantages of arcnet, List the advantages of ARCNet. Here are ...

List the advantages of ARCNet. Here are some of the ARCNet's benefits: 1.  It is extremely reliable. 2. ARCNet is simple to install and troubleshoot. 3. It has an exce

Characteris potential problems of a peer-to-peer environment, Question: ...

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

Describe about the server and browser software, Describe about the Server a...

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd