You are on page 1of 3

What you will do: In your own words, describe what happens at each step of our network

model when a node in one network establishes a TCP connection to a node in another
network. You can assume that the two networks are connected to the same router.

Your presentation should include a detailed explanation of the following:

● Physical layer

● Data link layer

● Network layer

● Transport layer

MAC address

IP Address

TCP port

● Sum control

● Routing table

● TTL

We have three networks which will contain the address space Network A 10.1.1.0/24

Address B network will have an ip address 192.168.1.0/24 and network C will have an ip
172.16.1.0/24.

The router will be located between network a and network c with an interface whose ip is
configured with the following number 10.1.1.1 on network A and an interface on network B with
the following ip 192.168.1.254

A second router will be connected between network B and network c which will communicate
these two networks and will have a network interface on network B whose ip address will be
192.168.1.1.1 and on network c will have an interface whose ip address will be 172.16.1.1.

After having defined these networks with their respective routers and ip addresses, we will
proceed to connect a computer to one of these networks.
We will use a desktop computer located in a workstation of a company that will be our client for
this occasion and we will call it pc 1 is part of the network A and it was assigned the following ip
10.1.1.100

We will proceed to place another pc in the network c and we will call it pc 2 and we will assign it
the ip number 172.16.1.100 this one has a web server listening on port 80

Suppose the end user opens his web browser on computer 1 this user types into his browser the ip
172.16.1.100 computer 1 knows what he ordered so it proceeds to retrieve a web page from
172.16.1.100 so the web browser communicates with the network stack which is the part of our
operating system responsible for handling network functions.

The web browser will want to establish a tcp connection to 172.16.1.100, port 80 then the
network stack proceeds to examine its own subnet and sees that it is located on network
10.1.1/24 which means that the destination is on another network which is 172.16.1.100.

At this stage computer 1 knows that it has to send any data to its gateway to be routed to a
remote network which is configured with a gateway 10.1.1.1.

Then computer 1 looks at its arp table to determine which mac address so computer 1 makes an
arp request for an ip address of 10.1.1.1.1 which it sends to the hardware broadcast address which
is all f this arp discovery request is sent to each node on the local network.

When Router A receives this arp message it sees that it is the computer that is currently assigned
the ip address 10.1.1.1 so it replies to computer 1 to let it know its own MAC
address:00:11:22:33:44:55 so computer 1 receives the reply and now knows its own gateway
hardware address which means it is ready to start building its outgoing packet.

Computer 1 knows that the web browser is asking it to form an outgoing tcp connection which
means it will need an outgoing tcp port the operating system identifies ephemeral port 5000 as
available and opens a socket connecting the web browser to this port as it is a tcp connection the
network stack knows that before transmitting any data the web browser must establish a
connection.

So the network stack starts building a tcp segment and completes all the fields in the header
including a source port of 5000 and a destination port 80

So you choose a sequence number and use it to fill in the sequence number field and finally you
set a sym indicator and calculate the checksum for the segment and write it in the check field.

Our newly constructed tcp segment is now transferred to the ip layer of the network stack this
layer constructs an ip header which is populated with the source ip and destination ip and ttl equal
to 64 which is a standard value for this field.

Then the tcp segment is inserted as a data payload for the ip datagram then a checksum is
calculated for all this now the ip datagram can be constructed.

Computer 1 needs to send this to its gateway which now knows that its mac address is
MAC:00:11:22:33:44:55.
So an ethernet frame is assembled, all important data is filled in with appropriate data, especially
the source and destination mac addresses, finally the ip datagram is inserted as a data payload for
the ethernet frame and another checksum is calculated.

After all this process we have an ethernet frame ready to send through the physical layer the
network interface connected to computer 1 sends this data as well as voltage and current
modulators through a cat 6 cable connected between computer 1 and a network switch.

This network switch is used to receive the frame and then inspect the destination mac address,
the switch knows which of its interfaces are connected to this mac address and forwards the
frame only through the cable connected to this interface.

At the other end of this link is router A which receives the frame and recognizes its own hardware
address as the destination this router knows this frame is destined for it and will now take the
entire frame and calculate a checksum.

Router A will compare the checksum with the one in the ethernet frame header to see if they
match to ensure that all data arrives safely.

Then router A disassembles the ethernet frame and keeps the ip datagram and again performs a
checksum for the whole datagram and when it finds a match it will realize that all the data is
correct.

Router A realizes that the fastest way to send data to the network 172.16.1.0/24 is one hop away
through router b whose ip is 192.168.1.1.1 router A looks at all the data in the ip datagram and
decreases the ttl by 1 and calculates a new checksum to reflect this new ttl value and makes a new
datagram with this data router A knows that it has to send this datagram to router B whose ip
address is 192.168.1.1.168.1.1 looks at the arp table and sees that there is an entry for
192.168.1.1.1 now router A can start making an ethernet frame with the mac address of its
interface on network B as the source and the mac address on router B's interface on network B as
the destination.

Once the frame values are completed for all the respective fields Router A places the newly
constructed ip datagram in the data payload field and calculates a checksum and places it in place
and sends the frame to network B as before this frame traverses over B and is received by Router
B, Router B performs all the checks and removes the encapsulation of the ethernet frame and
performs a checksum against the destination ip datagram and then examines the destination ip
address and checks the routing table to see the destination address of the computer 2 of the
destination computer.Router B performs all the checks and removes the encapsulation of the
ethernet frame and performs a checksum against the ip datagram then examines the destination
ip address and checks the routing table to see the destination address of computer 2 with ip
172.16.1.100 again decreases the ttl value by 1 and calculates a new checksum and creates a new
ip datagram.

This whole process is repeated for the network c

You might also like