Saturday 27 August 2016

Five steps of data encapsulation – TCP/IP


Image result for Five steps of data encapsulation – TCP/IP
Five steps of data encapsulation – TCP/IP


Data
Application layer

TCP
Data
Transport layer

IP
TCP
Data
Internet layer

LH
IP
TCP
Data
LT
Network interface

Transmit bits

No comments:

Post a Comment

BE AWARE OF FaKe Call

Phishing is defined as any attempt to obtain your personal and financial information. Mostly, phishing is carried out via emails. These ...