Professional Documents
Culture Documents
2.4 Addressing
Ann takes the first machine; Maria keeps the second one.
The two friends can still communicate using the secret code, as
shown in Figure 2.2.
Hierarchy
Services
Layered Architecture
Layer-to-layer Communication
Encapsulation
A R1 R3 R4 B
Physical Physical
layer layer
Link 1 Link 3 Link 5 Link 6
Physical Physical
Link 1 Link 3 Link 5 Link 6
D2 H2
Frame
D2 ame
Fr
H2
D2 H2 D2 H2
Frame Frame
Physical Physical
D3 H3
Datagram
D3 H3
Datagram
Physical Physical
D4 H4
Segment
D4 H4
Segment
A B
Application Legend Source Destination D Data H Header Application
Transport Transport
R1 R3 R4
Network Network
Physical Physical
D5 D5
Message
D5 D5
Message
12/22/22 Prof S D Patil, RGIT, Mumbai (Ref: TCP/IP Protocol suite) 40
Note
packet packet
discarded discarded
1 packet
87 10 Data accepted
87 10 Data
2 3
4
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address
Physical
addresses
changed
95 66 A P Data 95 66 A P Data
33 99 A P Data
Physical
addresses
changed
A Sender Receiver P
Data Data
a j Data a j Data
A P a j Data A P a j Data
H2 A P a j Data H2 A P a j Data
Internet
753
A 16-bit port address represented as one single number