This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
Data communication and computer networks | Network TopologiesMSA Technosoft
This video tutorial is all about Data Communication & Computer Network. In this video we have covered several networking topics:
Data Communication, Computer Networks, Network Topologies, Components of Data Communication, Mode of Data flow, Type of Connection, point-to-point connection, multipoint connection, Physical topology, Logical Topology, Mesh Topology, Bus Topology, Ring Topology, Star Topology, Hybrid Topology, LAN Topologies, WAN Topologies, Daisy Chains, Hierarchies, Switched Topologies, Token passing, Three-Tiered WAN, Two-Tiered WAN, Categories of Networks, Internet, Protocol and Standards
For more details visit our Tech Blog:
https://msatechnosoft.in/blog/
This tutorial help you to learn about Computer Network.
Key Concepts:
Protocol Layers,
Advantages of Layering.
Protocols,
Open System Protocols,
Network Protocols,
Internet Protocol Stack,
Postal Network,
Protocol Layering & Data
For more detail visit Tech Blog:
https://msatechnosoft.in/blog/
This tutorial helps you to learn about Computer Network.
Key Concepts:
ISO OSI reference model, Service Architecture, Reference Architecture, 7 Layers of OSI, OSI Layers Protocol Stack, physical Layer, Data Link Layer, Network Layer, Transpost Layer, Session Layer, Presentation Layer, Application Layer
For more detail visit our Tech Blog:
https://msatechnosoft.in/blog/tech-blogs/
Inter-networking Device
Is the practice of connecting a computer network with other network through the use of gateways that provide a common method of routing information packets between the networks.
Data communication and computer networks | Network TopologiesMSA Technosoft
This video tutorial is all about Data Communication & Computer Network. In this video we have covered several networking topics:
Data Communication, Computer Networks, Network Topologies, Components of Data Communication, Mode of Data flow, Type of Connection, point-to-point connection, multipoint connection, Physical topology, Logical Topology, Mesh Topology, Bus Topology, Ring Topology, Star Topology, Hybrid Topology, LAN Topologies, WAN Topologies, Daisy Chains, Hierarchies, Switched Topologies, Token passing, Three-Tiered WAN, Two-Tiered WAN, Categories of Networks, Internet, Protocol and Standards
For more details visit our Tech Blog:
https://msatechnosoft.in/blog/
This tutorial help you to learn about Computer Network.
Key Concepts:
Protocol Layers,
Advantages of Layering.
Protocols,
Open System Protocols,
Network Protocols,
Internet Protocol Stack,
Postal Network,
Protocol Layering & Data
For more detail visit Tech Blog:
https://msatechnosoft.in/blog/
This tutorial helps you to learn about Computer Network.
Key Concepts:
ISO OSI reference model, Service Architecture, Reference Architecture, 7 Layers of OSI, OSI Layers Protocol Stack, physical Layer, Data Link Layer, Network Layer, Transpost Layer, Session Layer, Presentation Layer, Application Layer
For more detail visit our Tech Blog:
https://msatechnosoft.in/blog/tech-blogs/
Inter-networking Device
Is the practice of connecting a computer network with other network through the use of gateways that provide a common method of routing information packets between the networks.
For Complete Learning- http://www.thelearnet.com/
UNIT I
Introduction Concepts: Goals and Applications of Networks, Network structure and architecture, The OSI reference model, services, Network Topology Design, connecting devices,
Physical Layer: Transmission Media, Line coding scheme, Basic idea of modulation and multiplexing, Switching methods.
Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE standards
UNIT II
Data Link Layer: HDLC and point to point protocol, Error detection and correction, Flow control (sliding window protocol)
Network Layer: Network Layer –IP addressing, Internetworking, Address mapping, introduction to IPv6, transition from IPv4 to IPv6, routing.
UNIT III
Transport Layer: Transport Layer - Design issues, connection management, Flow control, TCP window management, congestion control-slow start algorithm
Session Layer: Design issues, remote procedure call.
Presentation Layer: Design issues, Data compression techniques, cryptography
Application Layer: Application Layer: File Transfer, Access and Management, Electronic mail, Virtual Terminals
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
A framework that helps to understand complex network interactions. It is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
Similar to Lecture 1 networking & internetworking (20)
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2. Networks
Any connection between two or more computers
e.g. Even when you connect two computers via a USB
cable
Networks use a set of low-level protocols (rules for
communication)
e.g. TCP/IP, IPX/SPX (Internetwork Packet Exchange/Sequenced
Packet Exchange)
Networks use standardized hardware
e.g. Twisted pair cabling & Ethernet hubs, ATM
switches & optical fibre cabling
3. Network Speed
A network’s speed can be summed up with two
values:
Bit rate:
How many bits can be placed on the network in a
given time interval (e.g. 1 second)?
This is often called bandwidth, but this is a misnomer
since bandwidth has to do with the range of
frequencies to be used
Bit rate becomes the dominant factor when sending
many packets (e.g. a large file)
Latency:
How long does it take a bit to be received by the
destination node?
Latency becomes the dominant factor when sending
individual packets, or alternating sending/receiving
6. Network Messaging
Most local area networks use electrostatic
network hardware
The wires transmit messages using electricity
The transmission hardware charges the wire
positively or negatively to indicate 1 and 0
respectively
The reception hardware senses the charge
7. Internetworking: internets (WANs)
e.g. The Internet
Any connection between two or more
networks
e.g. An Ethernet network connected to another
Ethernet network by glass fibre cable and
ATM switches
11. Important Network Properties
Scope: A network should provide services to
several applications
Scalability: A network should operate
efficiently when deployed on a small-scale as
well as on a large-scale
Robustness: A network should operate in
spite of failures or lost data
12. Important Network Properties
Self-Stabilization: A network, after a failure
or other problem, should return to normal (or
near normal) without human intervention
Autoconfigurability: A network should
optimize its own parameters in order to
achieve better performance
Safety: A network should prevent failures as
well as prevent failures from affecting other
areas of the network
13. Important Network Properties
Configurability: A network’s parameters
should be configurable to improve
performance
Determinism: Two networks with identical
conditions should yield identical results
Migration: It should be possible to add new
features to a network without disruption of
network service
14. Network Usage
Ideally, the network usage should be
maximized
If network resources are unused, the network
is not being used efficiently
Unused network resources could be used to
provide higher throughput to hosts
This typically becomes a problem in routing
If all routers choose the single optimal path,
some (less than optimal) regions of the
network will be unused
17. The Birth of Arpanet
Developed by ARPA (Advanced Research
Projects Agency)
A packet-switched network connecting a
number of LANs, called Arpanet
Used primarily for connecting the networks of
the U.S. Government’s defense initiative
(DARPA, which was a branch of the DoD)
Became a useable internet in 1977
18. The Internet Split
Originally, Arpanet was strictly military and defense-
oriented
Arpanet was converted to use the new standard
TCP/IP protocol set (1980)
The Defense Communication Agency (DCA) split
Arpanet into two networks (1983):
Arpanet: To be used for internetworking research
projects
Milnet: To be used strictly for military purposes
19. A Military & University Internet
The University of California (at Berkeley)
incorporated TCP/IP programming into its
BSD UNIX operating system (1983)
ARPA funded research projects at many
Universities in order to make then internet-
capable (1983-1989)
BSD UNIX developed the socket network
programming model commonly used today
It was now possible for anyone to write
internet applications
This resulted in a boom of internet applications,
many of which survive to this day
20. A Public Internet
It became practical for private organizations
to connect to the Internet (mid-late 1980s)
Due to inexpensive hardware
The Internet Architecture Board (IAB) was
empowered to manage research
Coordinates and focuses research and
development with regards to the Internet and
TCP/IP
22. TCP/IP
A considerably large part of this course
The underlying network protocols upon which
application-level protocols are built
e.g. HTTP, SMTP, IMAP(Internet Message Access Protocol
TCP/IP is the framework for the Internet
23. TCP/IP
TCP/IP is actually two protocols:
TCP: Transport control protocol
Creates reliable transport (handles lost
messages), offers a logical stream of data
(reorders mixed up messages)
IP: Internet protocol
Defines addressing (e.g. 137.207.32.2), routing
protocols (how to get messages from source to
destination), etc.
24. Internet Messaging
TCP is a reliable protocol
If a message does not arrive, it is re-sent
Messages must be acknowledged by their
recipients before a certain time expires
The message’s time-to-live (TTL) value
26. Network Service Models
Provide a layered abstraction for networking
Each layer performs specific tasks
Between each layer is an interface
e.g. The hardware access layer might interact directly with
the hardware, providing a hardware-independent interface
to higher layers
The same layer at the source and the destination are known
as ‘peer’ layers
e.g. A ‘transport’ layer may provide reliable messaging, so
the transport layer in the source and destination will
communicate to ensure each message arrived in tact
27. Network Service Model
Sender Receiver
Layer n Layer n
……
Layer 2 Layer 2
Layer 1Layer 1
Network
Lowerlevel
Higherlevel
28. The OSI Reference Model
A layered service model developed by the
International Standardization Organization
(ISO)
Defines 7 conceptual layers
Each serves a very specific purpose
OSI: Open System Interconnection
Developed as a reference to be used for all
future protocols
29. The OSI Reference Model
The 7 layers are (highest to lowest level):
1. Application
2. Presentation
3. Session
4. Transport
5. Network
6. Data link
7. Physical
30. The OSI Reference Model
Application Application
Presentation Presentation
Session Session
TransportTransport
Network Network
Data linkData link
Physical Physical
protocol
protocol
protocol
protocol
protocol
protocol
protocol
31. The OSI Reference Model
Represents the actual network hardware
Deals with problems such as:
Sending signals across wires
e.g. Charging a wire with a specific voltage
Converting bits to signals
Even two Ethernet cards may have different physical
layers, as this layer deals with hardware specific
concerns
Physical Layer
32. The OSI Reference Model
Represents the interface to the network
hardware
Deals with problems such as:
Transmission of groups of bits
e.g. Groups of bits might represent an ASCII text
string, a floating point number, or a chunk of
binary data
Verifying data integrity (using checksums)
Data Link Layer
33. The OSI Reference Model
Handles the connection between sender and receiver
Deals with problems such as:
Determining a path from the sender node to the
recipient node (i.e. routing)
Determining the correct recipient (i.e. addressing)
Network congestion
Fragmenting data into packets
Reassembly of packets
Network Layer
34. The OSI Reference Model
Represents an end-to-end reliable
communication stream
Deals with problems such as:
Lost (unacknowledged) packets
Duplicate packets
Reordering packets
Transport Layer
35. The OSI Reference Model
Represents a dialogue between sender and receiver
Somewhat irrelevant in today’s networks
Handles the establishment of an authenticated
connection to the receiver
Deals with problems such as:
Authentication of the sender node on the packet
assembler and dissembler (PAD)
This is a remote computer which provided the lower
layers in a shared manner, which required
authentication
Session Layer
36. The OSI Reference Model
Specifies data representations so that both sides can
determine how to read data
e.g. How many bytes to use for floating point values
(including compressed as well as uncompressed
values, encryption)
e.g. What is the order of the bytes?
Uses an ISO-defined standard for these
representations: Abstract Syntax Notation 1 (ASN.1)
Presentation Layer
37. The OSI Reference Model
Defines what data is stored in the message
(specific to each application)
e.g. An E-Mail application would store such
things as recipient, subject, and body text into
an E-Mail application-level message
e.g. A web server would put header
information (information about the server & the
document) as well as the document itself into
its application-level messages
Application Layer
38. Session Message:
•Session Header
•Recipient
•Subject
•Body
Message:
•Recipient – CHAR(9)
•Subject – CHAR (17)
•Body – CHAR (243)
Frame:
•Data Link Header
•Network Header
•Transport Header
•Session Header
•Recipient
•Subject
•Body
OSI Reference Model: An Example
Application
Presentation
Session
Transport
Network
Data link
Physical
E-Mail:
•Recipient
•Subject
•Body
Network01001101111010010011001…
Network Frame:
•Network Header
•Transport Header
•Session Header
•Recipient
•Subject
•Body
Transport Message:
•Transport Header
•Session Header
•Recipient
•Subject
•Body
39. OSI Reference Model: Routing
Application
Presentation
Session
Transport
Network
Data link
Physical
Application
Presentation
Session
Transport
Network
Data link
Physical
Network
Data link
Physical
Router
40. OSI Reference Model Overview
Each layer provides some abstraction to the higher
levels
e.g. The physical layer actually charges the wire
Higher layers need not worry about how to charge the
wire
e.g. The transport layer ensures that message arrive
Higher layers can assume that messages will arrive,
and will not be lost
The OSI reference model was used as the basis for
X.25 networks.
41. The TCP/IP Service Model
Researchers developing the TCP/IP protocol
suite also developed a layered reference
model
The TCP/IP reference model consists of 5
layers
3 software layers
1 software & hardware layer
1 hardware layer
42. The TCP/IP Service Model
The 5 layers:
1. Application
2. Transport
3. Internet
4. Network Interface
5. Hardware
43. The TCP/IP Service Model
Defines what data is stored in the message (specific
to each application)
e.g. An E-Mail application would store such things as
recipient, subject, and body text into an E-Mail
application-level message
e.g. A web server would put header information
(information about the server & the document) as well
as the document itself into its application-level
messages
Essentially, this layer is identical to the application
layer in the OSI reference model
Application Layer
44. The TCP/IP Service Model
Handles end-to-end communication
Divides the data into manageable chunks of
information (packets)
Provides reliable communication
Ensures that all packets are received
Provides error-free communication
Uses a checksum to verify data integrity
Implemented by the TCP protocol
Transport control protocol
Transport Layer
45. The TCP/IP Service Model
Handles communication between machines
The path of a message is determined (routing)
The destination of a message is determined
(addressing)
Implemented by the IP protocol
Internet protocol
Internet Layer
46. The TCP/IP Service Model
Handles low level interaction with hardware
Issues commands to the hardware to transmit a
number of bits (1 or 0)
Deals with hardware-specific concerns
Implemented by the device drivers for the hardware
installed into the operating system
Essentially, this layer is identical to the data link layer
in the OSI model
Network Interface Layer
47. The TCP/IP Service Model
Actually transmits signals onto the network
Deals with issues such as:
How to transmit signals (e.g. electrify the wire)
How to detect problems (e.g. collisions)
Represents the actual network hardware
Essentially this layer is identical to the physical layer
in the OSI model
Hardware Layer
48. TCP/IP Service Model: Example
Application
Transport
Internet
Network
Interface
Hardware
Network01001101111010010011001…
IP Datagrams:
•IP Header
•TCP Header
•Data Bytes
Transport Packet:
•TCP Header
•Data Bytes
E-Mail:
•Data Bytes
Network Frame:
•IP Header
•TCP Header
•Data Bytes
49. TCP/IP Service Model: Routing
Application
Transport
Internet
Network
Interface
Hardware
Application
Transport
Internet
Network
Interface
Hardware
Internet
Network
Interface
Hardware
Router
50. TCP/IP Service Model: Overview
Major differences between OSI and TCP/IP:
TCP/IP has no presentation layer
The applications must agree on a data format (how
many bytes for a floating point, etc)
Thus, presentation/encoding is handled by the
application layer
TCP/IP has no session layer
Not significant: It does little in modern networks
In TCP/IP a session is typically managed by the
application layer
51. The TCP/IP Protocol in Action
Consider the following simplified network
route
The source (S) and destination (D) are
separated by two routers (R1, R2)
S DR1 R2
52. The TCP/IP Protocol in Action
Let’s consider a web browser, using HTTP
The web browser on S sends a packet to the web
server on D
The application layer (i.e. the browser) provides the
logical (IP) addresses for S (IPS) and D (IPD)
The application layer also provides the port numbers
for the source (PortS) and destination (PortD)
S DR1 R2
HTTP Req
53. The TCP/IP Protocol in Action
The Transport layer (TCP) uses the port
numbers (e.g. 2765 and 80) to create a TCP
packet (sometimes called a segment):
S DR1 R2
Source Port: 2765
Destination Port: 80
HTTP Req
54. Source IP: 137.207.140.71
Dest IP: 24.87.204.16
The TCP/IP Protocol in Action
The Internet (i.e. IP) layer uses the IP
addresses specified by the application layer
to create an IP datagram
e.g. 137.207.140.71, 24.87.204.16
Next, a route is determined for the packet,
using S’s routing table
S only needs one router’s address (R1)
S DR1 R2
TCP Segment
HTTP Req
55. Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
The MAC addresses of S and R1 (MACS and
MACR1) are used to create a network frame
If the MAC address of R1 is not known, ARP
(address resolution protocol) is used
S DR1 R2
TCP Segment
HTTP Req
56. Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
Let’s simplify the picture (for clarity)
In subsequent steps the IP datagram and its
contents will not change very much
S DR1 R2
57. Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
The network frame is transmitted on the
network to R1
This is possible since S and R1 are both
members of the same network
S DR1 R2
58. IP Datagram
The TCP/IP Protocol in Action
R1 will extract the IP datagram from the
payload of the network frame
R1 looks up the destination IP address (IPD) in
it’s routing table, to determine which router
should get the datagram next (R2)
S DR1 R2
59. Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
R1 uses its own MAC address (MACR1) and
R2’s MAC address (MACR2) to create another
network frame
S DR1 R2
60. Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
The network frame is received by R2, and the
IP datagram is extracted from it’s payload
R2 uses its routing table to lookup IPD
In this case, R2 is directly connected to D
This is called direct routing
S DR1 R2
61. ARP Request
IP: 24.87.204.16
MAC: ?
IP Datagram
The TCP/IP Protocol in Action
Most likely, R2 does not have the MAC
address of D (MACD)
The address resolution protocol (ARP) is used
to determine the MAC address:
S DR1 R2
62. ARP Response
IP: 24.87.204.16
MAC: 08-7F-3C-90-0C-DF
IP Datagram
The TCP/IP Protocol in Action
D recognizes it’s IP address and responds
with its MAC address (MACD)
e.g. 08-7F-3C-90-0C-DF
S DR1 R2
63. Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
A network frame is created by R2 now that
the MAC address is known
The frame is sent directly to D
S DR1 R2
64. Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
D extracts the IP datagram from the network
frame (which is discarded)
The IP datagram’s payload is passed to the
transport layer
S DR1 R2
65. The TCP/IP Protocol in Action
The Transport layer (within D’s operating
system), will use the port numbers specified
in the TCP segment to determine to which
application it should send the segment
In this case, to the application bound to port
80 (the web server)
S DR1 R2
Source Port: 2765
Destination Port: 80
HTTP Req
66. The TCP/IP Protocol in Action
Now, the web server on D has the HTTP
request, and it processes it
An HTTP response is sent back using the
same process
The web server uses the same IP addresses
and logical addresses as the last message
S DR1 R2
HTTP Req
Editor's Notes
<number>
The application layer has an E-Mail message to send.
When sent through the presentation layer, the data types are well defined for each component of the E-Mail message.
The session layer typically would do very little in modern networks.
The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued.
The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be.
The data link layer issues commands to the network device to send the appropriate bytes.
The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.
<number>
The application layer has an E-Mail message to send.
When sent through the presentation layer, the data types are well defined for each component of the E-Mail message.
The session layer typically would do very little in modern networks.
The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued.
The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be.
The data link layer issues commands to the network device to send the appropriate bytes.
The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.
<number>
The application layer has an E-Mail message to send.
When sent through the presentation layer, the data types are well defined for each component of the E-Mail message.
The session layer typically would do very little in modern networks.
The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued.
The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be.
The data link layer issues commands to the network device to send the appropriate bytes.
The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.
<number>
The application layer has an E-Mail message to send.
When sent through the presentation layer, the data types are well defined for each component of the E-Mail message.
The session layer typically would do very little in modern networks.
The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued.
The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be.
The data link layer issues commands to the network device to send the appropriate bytes.
The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.