Académique Documents
Professionnel Documents
Culture Documents
1) Applicatio Layer: Data is first processed according to one of the many applic
ations layer protocols, such as SMTP. This layer usually specify details such as
how data should be encoded, compressed, or encrypted, and how sessions should b
e managed.
Some of Appications layer protocols are:
a) HTTP, FTP,DNS,SMTP
2) Transport Layer : This layer specify which Application layer protocols should
be process the data on the receving computer. Each application layer protocol i
s assigned a unique numerical identifier, called port, which is used to identify
the protocol.
Eg: HTTP : Port 80, DNS : Port 53, SMTP use: Port 25
This layer also include Sorce port number and destination port number.
Two transport layer protocols are:
a) User Data gram protocol (UDP) {no delivery ack,no error checking}
Like DNS, Online gaming,VOIP, Streaming Video uses UDP.,,,,,as speed is critica
l in this.
b) Transmission Control protocol (TCP): A robost protocol providing delivery not
ification, error checking and recovery procedures. The receving computer tells t
he sending computer when the data was recived.
HTTP,SMTP,FTP uses TCP.
TCP accepts data from the application layer protocol and cut the data into a sma
ller pieces called segments.( like numbering the pages of a book), So TCP uses s
equence number to put segment back together in the correct order, Recepints chec
k the as per seq nos.
Network Layer: The n/w layer receive data segment from the TX layer and adds a h
eader to create a packet. The layer 3 header contains a destination and source I
P address. It adds Source IP, Dest. IP address and IP port number: The n/w layer
identifies the upper layer TX layer protocol that is being used. Each TX layer
protocol is assigned a unique identifier,or IP pootocol No.
Eg: UDP ( IP port no:17), (TCP : IP port no: 6), So what happen is that when rec
eving computer see this IP port no.: IF UDP-17 ( simple and fast protocol), IF
TCP-6, then process with (reassamble segments)
Data link layer: The data link layer recives packets and adds its own header to
each packet to create a FRAME. the header usually includes another address reffe
red to as a layer 2 address , a physical address or a MAC address. Layer 2 also
perform's a data integrity check, by adding a checksum in the trail of the frame
.
This layer uses: Ethernet, FDDI( fiber distributed data interface) and ATM ( use
s fixed size cells [53 bytes] protocol.
Physical layer: Layer 1 converts bits into electrical signals and sends them acr
oss the physical medium , which and be a telephone wire , a fiber -optic cable ,
or even a wireless environment. This define characteristic such as cabling spec
ifications, voltage levels, physical data rates, maximum transmission distance,
physical connectors.
On RECEVING THE DATA
1) Layer 1: Recived electrical signals.
2) Layer 2: Reassembled bits into a frame , Validated checksum.
3) Layer 3: Verified packet has reached correct IP address, Determine whether to
process as TCP or UDP.
4) Layer 4: Determine which application layer protocol should be used to process
data.
5) Layer 7: Processes data using the specified application layer protocol.
2)Ethernet Operations:
802.3 : CSMA/ CD ( the collision detection used by ethernet)
802.5 : token ring technology
802.2 : A method of supprotiong alternative layer 3 protocols
802.11 Wireless standards
MAC address 48 bits( 6 bytes)
00:90:69:9f:ea:46 , here first 3 bytes reps: Identifies the manufacturer Orga
nizationally Unique Identifier (OUI), last 3 bytes reps: Identifies the unique N
IC
1) When one device send data to one other device , it uses an individual or unic
ast address, one-to-one mapping.
2) If a device needs to send the same data to every device on the network , it u
ses a broadcast destination MAC address. Brodcast : ffff.ffff.ffff means except
all bits of this bytes. one-to-many.
3) If the device need to send the same data to a group of devices on the same ne
twork ,it must use a group address or multicast MAC address.
it always has first bit of first byte set to one (1)...eg... 0100.5e28.123s
i.e multicast address always begin with "01".
5-4-3 rule::: 5 segments,4 repeters, 3 operational segments,
HUB acts on layer 1, it is just internal physical connection bus.
Bridge: connected b/w two hub's, it separate the collision domains, it acts at l
ayer 2.
its functions: a) forwarding frames, b) learning MAC address, c) Controlling tra
ffic.
Bridges use Source Address ( SA) to bulid there MAC table not Dest. Address .
*** file sizes are measuresd in Mega bytes per secone ( Bps) and data rate is me
asures in bits per second (bps)
RJ45 cable description::
Blue/white blue : Voice ( pin : 4 5
Orange/orange white : Ethernet receive ( pin 1 2
brown/brown white : Auxiliary ( pin 7 8
green/green white : Ethernet transmit ( pin 3 6
Switches (layer 2 ): TX / RX different on ethernet cable,
Each port has separate coillision domain, VLAN are possible in switches were not
possible in bridges.