You are on page 1of 3

hardwaresecrets.com http://www.hardwaresecrets.

com/article/How-TCP-IP-Protocol-Works-Part-1/433/6

How TCP/IP Protocol Works - Part 1

||||||||||||||

Content
Home » Networking
Main Menu

Newsletter Latest
How TCP/IP Protocol Works - Part 1
Content

Recommended May 7,
Author: Gabriel Torres 441,461 views 2015 -
3:15 AM
Type: Tutorials Last Updated: March 28, 2012
April 28,
Page: 6 of 6 2015 -
2:55 AM

Network Interface Layer April 27,


2015 -
2:40 AM
Datagrams generated on the Internet layer will be sent down to the
Network Interface layer, if we are sending data, or the Network April 22,
Interface layer will get data from the network and send it to the 2015 -
Internet layer, if we are receiving data. 4:00 AM

This layer is defined by what type of physical network your computer April 6,
is connected to. Almost always your computer will be connected to an 2015 -
Ethernet network (wireless networks are also Ethernet networks like 2:50 AM
we will explain).
March 31,
Like we said in the previous page, TCP/IP is a set of protocols that 2015 -
deals with layers 3 to 7 from the OSI reference model, while Ethernet 2:47 AM
is a set of protocols that deals with layers 1 and 2 from the OSI
reference model – meaning Ethernet deals with the physical aspect of March 25,
the data transmission. So they complement each other, as we need 2015 -
the full seven layers (or their equivalents) to establish a network 3:15 AM
connection.
March 9,
Ethernet has three layers: Logic Link Control (LLC), Media Access 2015 -
Control (MAC) and Physical. LLC and MAC layers correspond, 2:46 AM
together, to the second layer from the OSI reference model. You can
see Ethernet architecture in Figure 6. February
24, 2015 -
3:00 AM
January
click to enlarge 23, 2015 -
Figure 6: 4:15 AM
Ethernet
architecture.
Our Most
The Logic Link Popular
Control layer Articles
(LLC) is in
charge of adding
information of 2,501,407
which protocol on the Internet layer delivered data to be transmitted, views
so when receiving a frame from the network this layer on the
receiving computer has to know to which protocol from the Internet 2,032,307
layer it should deliver data. This layer is defined by IEEE 802.2 views
protocol.
1,736,675
The Media Access Control layer (MAC) is in charge of assembling the views
frame that will be sent over the network. This layer is in charge of
adding the source MAC address and the target MAC address – as 1,686,785
we explained before, MAC address is the physical address of a views
network card. Frames that are targeted to another network will use
the router MAC address as the target address. This layer is defined 1,639,251
by IEEE 802.3 protocol, if a cabled network is being used, or by IEEE views
802.11 protocol, if a wireless network is being used.
1,599,136
The Physical layer is in charge of converting the frame generated by views
the MAC layer into electricity (if a cabled network is being used) or
into electromagnetic waves (if a wireless network is being used). This 1,342,406
layer is also defined by IEEE 802.3 protocol, if a cabled network is views
being used, or by IEEE 802.11 protocol, if a wireless network is being
used. 1,113,028
views
The LLC and MAC layers add their own headers to the datagram they
receive from the Internet layer. So a complete structure of the frames 957,371
generated by these two layers can be seen in Figure 7. Notice that views
the headers added by the upper layers are seen as ”data“ by the LLC
layer. The same thing happens with the header inserted by the LLC 864,435
layer, which will be seen as data by the MAC layer. views
The LLC layer adds a 3-byte or 5-byte header and its datagram has a
maximum total size of 1,500 bytes, leaving a maximum of 1,497 or
1,492 bytes for data. The MAC layer adds a 22-byte header and a 4-
byte CRC (data correction) data at the end of the datagram received
from the LLC layer, forming the Ethernet frame. Thus the maximum
size of an Ethernet frame is of 1,526 bytes.

click to enlarge
Figure 7: Frame
on the Network
Interface layer.

To learn more
about other
TCP/IP protocols
and
functionalities,
read the second
part of this
tutorial.

Print Version | Send to Friend | Bookmark « Previous | Page 6


Article of 6
Related Content

© 2004-15 Clube do Hardware, all rights reserved.


Advertising | Legal Information | Privacy Policy
All times are Pacific Standard Time (PST, GMT -08:00)

You might also like