SlideShare a Scribd company logo
1 of 4
Download to read offline
Protocol Data Units (PDU) and Encapsulation
As application data is passed down the protocol stack on its way to be transmitted across
the network media, various protocols add information to it at each level. This is
commonly known as the encapsulation process.
The form that a piece of data takes at any layer is called a Protocol Data Unit (PDU).
During encapsulation, each succeeding layer encapsulates the PDU that it receives from
the layer above in accordance with the protocol being used. At each stage of the process,
a PDU has a different name to reflect its new appearance. Although there is no universal
naming convention for PDUs, in this course, the PDUs are named according to the
protocols of the TCP/IP suite.
>> Data - The general term for the PDU used at the Application layer
>> Segment - Transport Layer PDU
>> Packet - Internetwork Layer PDU
>> Frame - Network Access Layer PDU
>> Bits - A PDU used when physically transmitting data over the medium
Addressing in the Network
The OSI model describes the processes of encoding, formatting, segmenting, and
encapsulating data for transmission over the network. A data stream that is sent from a
source to a destination can be divided into pieces and interleaved with messages traveling
from other hosts to other destinations. Billions of these pieces of information are
traveling over a network at any given time. It is critical for each piece of data to contain
enough identifying information to get it to the correct destination.
There are various types of addresses that must be included to successfully deliver the data
from a source application running on one host to the correct destination application
running on another. Using the OSI model as a guide, we can see the different addresses
and identifiers that are necessary at each layer.
Getting the Data to the End Device
During the process of encapsulation, address identifiers are added to the data as it travels
down the protocol stack on the source host. Just as there are multiple layers of protocols
that prepare the data for transmission to its destination, there are multiple layers of
addressing to ensure its delivery.
The first identifier, the host physical address, is contained in the header of the Layer 2
PDU, called a frame. Layer 2 is concerned with the delivery of messages on a single local
network. The Layer 2 address is unique on the local network and represents the address
of the end device on the physical media. In a LAN using Ethernet, this address is called
the Media Access Control (MAC) address. When two end devices communicate on the
local Ethernet network, the frames that are exchanged between them contain the
destination and source MAC addresses. Once a frame is successfully received by the
destination host, the Layer 2 address information is removed as the data is decapsulated
and moved up the protocol stack to Layer 3.
Getting the Data through the Internetwork
Layer 3 protocols are primarily designed to move data from one local network to another
local network within an internetwork. Whereas Layer 2 addresses are only used to
communicate between devices on a single local network, Layer 3 addresses must include
identifiers that enable intermediary network devices to locate hosts on different networks.
In the TCP/IP protocol suite, every IP host address contains information about the
network where the host is located.
At the boundary of each local network, an intermediary network device, usually a router,
decapsulates the frame to read the destination host address contained in the header of the
packet, the Layer 3 PDU. Routers use the network identifier portion of this address to
determine which path to use to reach the destination host. Once the path is determined,
the router encapsulates the packet in a new frame and sends it on its way toward the
destination end device. When the frame reaches its final destination, the frame and packet
headers are removed and the data moved up to Layer 4.
Getting the Data to the Right Application
At Layer 4, information contained in the PDU header does not identify a destination host
or a destination network. What it does identify is the specific process or service running
on the destination host device that will act on the data being delivered. Hosts, whether
they are clients or servers on the Internet, can run multiple network applications
simultaneously. People using PCs often have an e-mail client running at the same time as
a web browser, an instant messaging program, some streaming media, and perhaps even a
game. All these separately running programs are examples of individual processes.
Viewing a web page invokes at least one network process. Clicking a hyperlink causes a
web browser to communicate with a web server. At the same time, in the background, an
e-mail client may be sending and receiving email, and a colleague or friend may be
sending an instant message.
Think about a computer that has only one network interface on it. All the data streams
created by the applications that are running on the PC enter and leave through that one
interface, yet instant messages do not popup in the middle of word processor document or
e-mail showing up in a game.
This is because the individual processes running on the source and destination hosts
communicate with each other. Each application or service is represented at Layer 4 by a
port number. A unique dialogue between devices is identified with a pair of Layer 4
source and destination port numbers that are representative of the two communicating
applications. When the data is received at the host, the port number is examined to
determine which application or process is the correct destination for the data.
Ch1 computer networks internet_encapsulation_4

More Related Content

What's hot (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
Protocols
Protocols Protocols
Protocols
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
The First Class of Data Communication
The First Class of Data CommunicationThe First Class of Data Communication
The First Class of Data Communication
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Class 3
Class 3Class 3
Class 3
 
Class 2
Class 2Class 2
Class 2
 
Computer networks-4
Computer networks-4Computer networks-4
Computer networks-4
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Chapter4
Chapter4Chapter4
Chapter4
 
Chapter3
Chapter3Chapter3
Chapter3
 
OSI Draft
OSI DraftOSI Draft
OSI Draft
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Tcp/ip model and protocol
Tcp/ip model and protocolTcp/ip model and protocol
Tcp/ip model and protocol
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
Cna
CnaCna
Cna
 

Viewers also liked

Edward O. Amster-Resume2016-07
Edward O. Amster-Resume2016-07Edward O. Amster-Resume2016-07
Edward O. Amster-Resume2016-07Edward Amster
 
Actividades de gestion de centro
Actividades de gestion de centroActividades de gestion de centro
Actividades de gestion de centroartilescorniel
 
De los Medios a las Mediaciones.
De los Medios a las Mediaciones.De los Medios a las Mediaciones.
De los Medios a las Mediaciones.Stephanie Pinzón
 
Prinses Luisa Maria samen met prins Karl Ilias Auersperg
Prinses Luisa Maria samen met prins Karl Ilias AuerspergPrinses Luisa Maria samen met prins Karl Ilias Auersperg
Prinses Luisa Maria samen met prins Karl Ilias AuerspergThierry Debels
 
Excellence awar
Excellence awarExcellence awar
Excellence awar100498
 
22 whiringa ā rangi 115 somerville rd 2015
22 whiringa ā rangi 115 somerville rd 201522 whiringa ā rangi 115 somerville rd 2015
22 whiringa ā rangi 115 somerville rd 2015Jason Turuwhenua
 
Visit of Belgian Foreign Minister, Charles Nothomb
Visit of Belgian Foreign Minister, Charles NothombVisit of Belgian Foreign Minister, Charles Nothomb
Visit of Belgian Foreign Minister, Charles NothombThierry Debels
 
Derecho Deportivo en Mexico y su escasa practica
Derecho Deportivo en Mexico y su escasa practicaDerecho Deportivo en Mexico y su escasa practica
Derecho Deportivo en Mexico y su escasa practicahenrygallohidalgo
 
slides from personal tax
slides from personal taxslides from personal tax
slides from personal taxDouglas Lui
 
Parent Meeting - Winter I
Parent Meeting - Winter IParent Meeting - Winter I
Parent Meeting - Winter Iscottjordanlkms
 
Biomarcadores de efecto, metabolismo de xenobioticos,
Biomarcadores de efecto, metabolismo de xenobioticos,Biomarcadores de efecto, metabolismo de xenobioticos,
Biomarcadores de efecto, metabolismo de xenobioticos,Fernando Uriel González
 

Viewers also liked (20)

Edward O. Amster-Resume2016-07
Edward O. Amster-Resume2016-07Edward O. Amster-Resume2016-07
Edward O. Amster-Resume2016-07
 
Consulta documento
Consulta documentoConsulta documento
Consulta documento
 
Actividades de gestion de centro
Actividades de gestion de centroActividades de gestion de centro
Actividades de gestion de centro
 
De los Medios a las Mediaciones.
De los Medios a las Mediaciones.De los Medios a las Mediaciones.
De los Medios a las Mediaciones.
 
Prinses Luisa Maria samen met prins Karl Ilias Auersperg
Prinses Luisa Maria samen met prins Karl Ilias AuerspergPrinses Luisa Maria samen met prins Karl Ilias Auersperg
Prinses Luisa Maria samen met prins Karl Ilias Auersperg
 
Ramadhan 23
Ramadhan 23Ramadhan 23
Ramadhan 23
 
Excellence awar
Excellence awarExcellence awar
Excellence awar
 
22 whiringa ā rangi 115 somerville rd 2015
22 whiringa ā rangi 115 somerville rd 201522 whiringa ā rangi 115 somerville rd 2015
22 whiringa ā rangi 115 somerville rd 2015
 
Visit of Belgian Foreign Minister, Charles Nothomb
Visit of Belgian Foreign Minister, Charles NothombVisit of Belgian Foreign Minister, Charles Nothomb
Visit of Belgian Foreign Minister, Charles Nothomb
 
Derecho Deportivo en Mexico y su escasa practica
Derecho Deportivo en Mexico y su escasa practicaDerecho Deportivo en Mexico y su escasa practica
Derecho Deportivo en Mexico y su escasa practica
 
M A P A M E N T A L
M A P A  M E N T A LM A P A  M E N T A L
M A P A M E N T A L
 
Aakanksha cv
Aakanksha cvAakanksha cv
Aakanksha cv
 
Jaime-Mendoza-Resume
Jaime-Mendoza-ResumeJaime-Mendoza-Resume
Jaime-Mendoza-Resume
 
slides from personal tax
slides from personal taxslides from personal tax
slides from personal tax
 
Sap
SapSap
Sap
 
Gurpreet Jandu
Gurpreet JanduGurpreet Jandu
Gurpreet Jandu
 
Mi practica educativa g5-6
Mi practica educativa g5-6Mi practica educativa g5-6
Mi practica educativa g5-6
 
Metodo Cartesiano
Metodo CartesianoMetodo Cartesiano
Metodo Cartesiano
 
Parent Meeting - Winter I
Parent Meeting - Winter IParent Meeting - Winter I
Parent Meeting - Winter I
 
Biomarcadores de efecto, metabolismo de xenobioticos,
Biomarcadores de efecto, metabolismo de xenobioticos,Biomarcadores de efecto, metabolismo de xenobioticos,
Biomarcadores de efecto, metabolismo de xenobioticos,
 

Similar to Ch1 computer networks internet_encapsulation_4

OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
OSI (Open Systems Interconnection) is reference model for how applic.pdf
OSI (Open Systems Interconnection) is reference model for how applic.pdfOSI (Open Systems Interconnection) is reference model for how applic.pdf
OSI (Open Systems Interconnection) is reference model for how applic.pdfsharnapiyush773
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusAnujashejwal
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networkingRameesh Paul
 
layering.pdf
layering.pdflayering.pdf
layering.pdfBoostHub
 

Similar to Ch1 computer networks internet_encapsulation_4 (20)

OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
OSI (Open Systems Interconnection) is reference model for how applic.pdf
OSI (Open Systems Interconnection) is reference model for how applic.pdfOSI (Open Systems Interconnection) is reference model for how applic.pdf
OSI (Open Systems Interconnection) is reference model for how applic.pdf
 
Osi
OsiOsi
Osi
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Network layer osi
Network layer osiNetwork layer osi
Network layer osi
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Internet1
Internet1Internet1
Internet1
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
four
fourfour
four
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Osi model
Osi modelOsi model
Osi model
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
 
Router bridge
Router bridgeRouter bridge
Router bridge
 

More from Syed Ariful Islam Emon

More from Syed Ariful Islam Emon (10)

Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
 
Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1
 
Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1
 
M.sc. engg (ict) admission guide database management system 4
M.sc. engg (ict) admission guide   database management system 4M.sc. engg (ict) admission guide   database management system 4
M.sc. engg (ict) admission guide database management system 4
 
M.sc
M.scM.sc
M.sc
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Lecture 7
 Lecture 7 Lecture 7
Lecture 7
 
08 neural networks(1).unlocked
08 neural networks(1).unlocked08 neural networks(1).unlocked
08 neural networks(1).unlocked
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Ch1 computer networks internet_encapsulation_4

  • 1. Protocol Data Units (PDU) and Encapsulation As application data is passed down the protocol stack on its way to be transmitted across the network media, various protocols add information to it at each level. This is commonly known as the encapsulation process. The form that a piece of data takes at any layer is called a Protocol Data Unit (PDU). During encapsulation, each succeeding layer encapsulates the PDU that it receives from the layer above in accordance with the protocol being used. At each stage of the process, a PDU has a different name to reflect its new appearance. Although there is no universal naming convention for PDUs, in this course, the PDUs are named according to the protocols of the TCP/IP suite. >> Data - The general term for the PDU used at the Application layer >> Segment - Transport Layer PDU >> Packet - Internetwork Layer PDU >> Frame - Network Access Layer PDU >> Bits - A PDU used when physically transmitting data over the medium Addressing in the Network The OSI model describes the processes of encoding, formatting, segmenting, and encapsulating data for transmission over the network. A data stream that is sent from a source to a destination can be divided into pieces and interleaved with messages traveling from other hosts to other destinations. Billions of these pieces of information are traveling over a network at any given time. It is critical for each piece of data to contain enough identifying information to get it to the correct destination. There are various types of addresses that must be included to successfully deliver the data from a source application running on one host to the correct destination application running on another. Using the OSI model as a guide, we can see the different addresses and identifiers that are necessary at each layer.
  • 2. Getting the Data to the End Device During the process of encapsulation, address identifiers are added to the data as it travels down the protocol stack on the source host. Just as there are multiple layers of protocols that prepare the data for transmission to its destination, there are multiple layers of addressing to ensure its delivery. The first identifier, the host physical address, is contained in the header of the Layer 2 PDU, called a frame. Layer 2 is concerned with the delivery of messages on a single local network. The Layer 2 address is unique on the local network and represents the address of the end device on the physical media. In a LAN using Ethernet, this address is called the Media Access Control (MAC) address. When two end devices communicate on the local Ethernet network, the frames that are exchanged between them contain the destination and source MAC addresses. Once a frame is successfully received by the destination host, the Layer 2 address information is removed as the data is decapsulated and moved up the protocol stack to Layer 3. Getting the Data through the Internetwork Layer 3 protocols are primarily designed to move data from one local network to another local network within an internetwork. Whereas Layer 2 addresses are only used to communicate between devices on a single local network, Layer 3 addresses must include identifiers that enable intermediary network devices to locate hosts on different networks. In the TCP/IP protocol suite, every IP host address contains information about the network where the host is located.
  • 3. At the boundary of each local network, an intermediary network device, usually a router, decapsulates the frame to read the destination host address contained in the header of the packet, the Layer 3 PDU. Routers use the network identifier portion of this address to determine which path to use to reach the destination host. Once the path is determined, the router encapsulates the packet in a new frame and sends it on its way toward the destination end device. When the frame reaches its final destination, the frame and packet headers are removed and the data moved up to Layer 4. Getting the Data to the Right Application At Layer 4, information contained in the PDU header does not identify a destination host or a destination network. What it does identify is the specific process or service running on the destination host device that will act on the data being delivered. Hosts, whether they are clients or servers on the Internet, can run multiple network applications simultaneously. People using PCs often have an e-mail client running at the same time as a web browser, an instant messaging program, some streaming media, and perhaps even a game. All these separately running programs are examples of individual processes. Viewing a web page invokes at least one network process. Clicking a hyperlink causes a web browser to communicate with a web server. At the same time, in the background, an e-mail client may be sending and receiving email, and a colleague or friend may be sending an instant message. Think about a computer that has only one network interface on it. All the data streams created by the applications that are running on the PC enter and leave through that one interface, yet instant messages do not popup in the middle of word processor document or e-mail showing up in a game. This is because the individual processes running on the source and destination hosts communicate with each other. Each application or service is represented at Layer 4 by a port number. A unique dialogue between devices is identified with a pair of Layer 4 source and destination port numbers that are representative of the two communicating applications. When the data is received at the host, the port number is examined to determine which application or process is the correct destination for the data.