0% found this document useful (0 votes)
62 views

How Encapsulation Works Within The TCP

The document discusses encapsulation in the TCP/IP model. It explains that as data passes through each layer of the model from application to network access layer, a header is added. This is similar to nesting Russian dolls, with each layer encapsulating the previous one. It provides examples of how a message becomes encapsulated in a segment, datagram, frame and finally a bitstream as it passes through each layer. Finally, it summarizes the encapsulation process, from a request to send data between computers to the data being rebuilt at the receiving end.

Uploaded by

Yolanda Konde
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

How Encapsulation Works Within The TCP

The document discusses encapsulation in the TCP/IP model. It explains that as data passes through each layer of the model from application to network access layer, a header is added. This is similar to nesting Russian dolls, with each layer encapsulating the previous one. It provides examples of how a message becomes encapsulated in a segment, datagram, frame and finally a bitstream as it passes through each layer. Finally, it summarizes the encapsulation process, from a request to send data between computers to the data being rebuilt at the receiving end.

Uploaded by

Yolanda Konde
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

How Encapsulation Works Within the

TCP/IP Model
January 27th, 2008 • Related • Filed Under

In the previous section we reviewed the TCP/IP and OSI model. For the sake of clarity, we will
be using the TCP/IP model to demonstrate encapsulation, as compared to the OSI model. If you
are still struggling with grasping concepts of the TCP/IP model you may wish to view the
previous section once more. Otherwise, onward to the encapsulation process!

The TCP/IP Model

As we learned in the previous section, the TCP/IP model has four layers. You can view a
diagram of the model below.

Keep in mind that we divide the stack into four separate layers because they each perform a
certain role or task. As data is being sent from one computer, it will pass from the top layer to the
bottom. On the receiving end, the data will then be rebuilt from the bottom layer to the top. You
can view an example of this process below.
Each layer a packet of information travels through adds what is called a header. Think of it in
terms of a Russian doll. You’re probably familiar with them: each doll has another smaller doll
inside of it. Just like the dolls, each layer a sending packet passes through gains another header
(or doll). When the packet is being rebuilt on the receiving end, each header is unpackaged the
same way. You can see an example of a sending packet gaining header information below.

Note that at the receiving end, we would have the reverse process (Headers would be taken away
at each layer, until the receiving packet is by itself.)

Since each layer of the TCP/IP model does a unique task separate of the other layers, we refer to
the data package at each layer with different names. For instance, the data package at the
Application Layer is called a message, while the same data package at the Internet Layer is
called a datagram. Review the diagram below for the complete list of names.

Notice that the Transport Layer may have one of two names- a segment or a datagram. If the
TCP protocol is being used, it is called a segment. If the UDP protocol is being used, it is called
a Datagram.

The data then passes through the Internet Layer onto the Network Access Layer, where a frame
is created. Once the data packet leaves this level it is converted into a bitstream of electrical
pulses, commonly referred to as 1’s and 0’s.

Finally, you should note that Cisco demands CCNA students to know specific information on the
Data Link Layer and encapsulation. As you can see, we haven’t used the OSI model, but the
TCP/IP model (so we use the Network Access Layer as opposed to the Data Link and Physical
Layer). Specifically, Cisco demands that students know that packets are packaged into frames at
the Data Link Layer. And, like other layers, a header and trailer are added to the information at
the Data Link Layer. You can see the encapsulation process with the OSI model below.

We know what you’re thinking- where’s a good pneumonic when you need it? The easiest one
we could find was “Dirty Sick People Feel Bad,” whereas each letter of each word corresponds
to Data, Segments, Packets, Frames, and Bits.
Putting it All Together

Now that we have the basics down, we can finally review the entire process of data
encapsulation. Refer to the below list to see a real-life example of encapsulation. If needed, you
can view the above diagrams if you get lost.

The Data Encapsulation Process

 1. One computer requests to send data to another over a network.


 2. The data message flows through the Application Layer by using a TCP or UDP port to
pass onto the internet layer.
 3. The data segment obtains logical addressing at the Internet Layer via the IP protocol,
and the data is then encapsulated into a datagram.
 4. The datagram enters the Network Access Layer, where software will interface with the
physical network. A data frame encapsulates the datagram for entry onto the physical
network. At the end of the process, the frame is converted to a stream of bits that is then
transmitted to the receiving computer.
 5. The receiving computer removes the frame, and passes the packet onto the Internet
Layer. The Internet Layer will then remove the header information and send the data to
the Transport layer. Likewise, the Transport layer removes header information and passes
data to the final layer. At this final layer the data is whole again, and can be read by the
receiving computer if no errors are present.

And there you have it: encapsulation at its finest. We realize that encapsulation isn’t the easiest
concept to grasp, but steady review of this and previous sections will ensure you will grasp the
concept soon enough.

Closing Comments

Data encapsulation allows devices to communicate, and therefore, it is completely necessary to


learn. It is present on networking exams such as the CCNA, so be sure to review these concepts
before exam day.

In the following sections we’ll be looking at each layer in more specifics. The next section we
will review the Network Access Layer in particular. Physical addresses, frames and LAN
technology- clearly we will have our hands full!

You might also like