SlideShare a Scribd company logo
DATA ENCAPSULATION 
by 
Raumil Rao 
Raumil Rao
ISO-OSI MODEL 
APPLICATION 
PRESENTATION 
SESSION 
TRANSPORT 
NETWORK 
DATA LINK 
PHYSICAL 
P PDU 
S PDU 
T PDU 
N PDU 
D PDU 
PH PDU 
User interaction 
Compression, Decompression, Encryption, Decryption 
Create, Manage, Terminate Session 
Connection-oriented, Connection-less 
Path determination, Switching of packets 
Physical transfer of data, error detection 
Convert data format of data link layer to bit/bytes or vice-versa 
• INTERACTION BETWEEN LAYERS WITH THE HELP OF PDUs. 
Raumil Rao
Data Format, Addressing Schemes, Devices 
PORT NO. 
IP Address 
MAC Address 
BIT/BYTES 
SEGMENT 
Raumil Rao
ENCAPSULATION 
HELLO 
H HELLO 
H 
H 
SEGMENT 
PACKET 
FRAMES 
BITS/BYTES 
HELLO 
SEGMENT 
PACKET 
FRAMES 
BITS/BYTES 
0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 
Raumil Rao
Reference 
CCNA Routing and Switching guide by Todd Lammle 
http://www.cisco.com 
http://www.inetdaemon.com 
http://www.omnisecu.com/ 
http://en.wikipedia.org/wiki/List_of_RFCs 
Implementing cisco ip routing by DIANE TEARE 
(ciscopress.com) 
http://www.gns3vault.com

More Related Content

What's hot

Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Operating Systems: Network Management
Operating Systems: Network ManagementOperating Systems: Network Management
Operating Systems: Network Management
Damian T. Gordon
 
Web Terminology
Web TerminologyWeb Terminology
Web Terminology
TanimSharia
 
COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5
BON SECOURS COLLEGE FOR WOMEN
 
W14webposter
W14webposterW14webposter
W14webposters1150245
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryShi Junxiao
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
Brandon Reader
 
XMPP For Cloud Computing
XMPP For Cloud ComputingXMPP For Cloud Computing
XMPP For Cloud Computing
Bluendo
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
maliksiddique1
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
Gopi A
 
Lab 4 presentation slide
Lab 4 presentation slideLab 4 presentation slide
Lab 4 presentation slidestevensc27
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Packets, routers and IPaddressess
Packets, routers and IPaddressessPackets, routers and IPaddressess
Packets, routers and IPaddressess
BAESUNITE
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
ParikshitTaksande1
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
HANNAHB13
 
The internet
The internetThe internet
The internet
charlieharding
 
Protocols
ProtocolsProtocols
Protocols
Sonali Chawla
 
Unit III
Unit IIIUnit III
Unit III
APARNA P
 

What's hot (20)

Network protocals
Network protocalsNetwork protocals
Network protocals
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Operating Systems: Network Management
Operating Systems: Network ManagementOperating Systems: Network Management
Operating Systems: Network Management
 
Web Terminology
Web TerminologyWeb Terminology
Web Terminology
 
COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5
 
W14webposter
W14webposterW14webposter
W14webposter
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
XMPP For Cloud Computing
XMPP For Cloud ComputingXMPP For Cloud Computing
XMPP For Cloud Computing
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Lab 4 presentation slide
Lab 4 presentation slideLab 4 presentation slide
Lab 4 presentation slide
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Packets, routers and IPaddressess
Packets, routers and IPaddressessPackets, routers and IPaddressess
Packets, routers and IPaddressess
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
The internet
The internetThe internet
The internet
 
Cna
CnaCna
Cna
 
Protocols
ProtocolsProtocols
Protocols
 
Unit III
Unit IIIUnit III
Unit III
 

Similar to raumilrao

iOT - Developing beacons
iOT - Developing beaconsiOT - Developing beacons
iOT - Developing beacons
sandeephegde
 
Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28
Ravikiran HV
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
Daniel Nüst
 
Wan networks
Wan networksWan networks
Wan networks
Arnold Derrick Kinney
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
Juniper Developer Resources Cooney
 
OSI layers
OSI layersOSI layers
OSI layers
Ahmed Elnaggar
 
internet protocols
internet protocolsinternet protocols
internet protocols
Srinivasa Rao
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET Journal
 
Pvdtn presentation
Pvdtn presentationPvdtn presentation
Pvdtn presentation
MIDAUTEL
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
ashwini870728
 
Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2
Quaid-i-Azam University
 
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory FabricsRealizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
inside-BigData.com
 
ARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdf
ARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdfARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdf
ARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdf
anonymus45
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET Journal
 

Similar to raumilrao (20)

iOT - Developing beacons
iOT - Developing beaconsiOT - Developing beacons
iOT - Developing beacons
 
Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Wan networks
Wan networksWan networks
Wan networks
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
 
OSI layers
OSI layersOSI layers
OSI layers
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Pvdtn presentation
Pvdtn presentationPvdtn presentation
Pvdtn presentation
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
 
Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2
 
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory FabricsRealizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
 
ARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdf
ARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdfARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdf
ARP_L2-3a_Redundancia-LAN-STP_v2_20201127.pdf
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

raumilrao

  • 1. DATA ENCAPSULATION by Raumil Rao Raumil Rao
  • 2. ISO-OSI MODEL APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL P PDU S PDU T PDU N PDU D PDU PH PDU User interaction Compression, Decompression, Encryption, Decryption Create, Manage, Terminate Session Connection-oriented, Connection-less Path determination, Switching of packets Physical transfer of data, error detection Convert data format of data link layer to bit/bytes or vice-versa • INTERACTION BETWEEN LAYERS WITH THE HELP OF PDUs. Raumil Rao
  • 3. Data Format, Addressing Schemes, Devices PORT NO. IP Address MAC Address BIT/BYTES SEGMENT Raumil Rao
  • 4. ENCAPSULATION HELLO H HELLO H H SEGMENT PACKET FRAMES BITS/BYTES HELLO SEGMENT PACKET FRAMES BITS/BYTES 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 Raumil Rao
  • 5. Reference CCNA Routing and Switching guide by Todd Lammle http://www.cisco.com http://www.inetdaemon.com http://www.omnisecu.com/ http://en.wikipedia.org/wiki/List_of_RFCs Implementing cisco ip routing by DIANE TEARE (ciscopress.com) http://www.gns3vault.com