Skip to main content

PACKETS IN NETWORKING


 

In networking, packets are a smaller segments of large messages.  When a message is sent over the internet, it is divided into packets.  In other words, packets are small amount of data that are sent over the network.  In accordance to a real life happening, the packets have a source and destination as well as content that are transferred from one place to another.

To be more significant, the network breaks a messaged that is emailed into small size in bytes.  The packets carry the data in the protocols that can be found on the internet: Transmission Control Protocol/Internet Protocol (TCP/IP).

A Packet has a header and a payload.  The header keeps overhead information about the packet, the service and other transmission related data.  Each packet header contains proper protocols, originating address (The IP address of your computer), the destination address (The IP address to where you are sending the email to) and the packet number (1, 2, 3 or 4 since there are 4 packets altogether).

The body of the packet contains data.

The information in the packets include the version of the protocol being used (IPv4 or IPv6), the length of the packet, the number of packets used to send, the source and destination addresses, checksum and The Time to Live (TTL) data.



WHAT IS A TCP?

TCP is a connection oriented protocol, which means a connection is established and maintained until the application programs at each end have finished exchanging messages. TCP determines how to  break the messages into packets that networks can deliver, sends packet to and accepts packets from the network layer.

In the OSI communication model, TCP covers parts of Layer 4, the Transport Layer and parts of Layer 5, Session Layer.

Example: When you send out a complete message, TCP breaks the messages into small packets.  The small packets are.  TCP will number them and send them to the IP layer for delivery to take place.  Even though all the packets are destined to reach the same IP address, they are sent down in multiple routes and they gather into one once they reach the destination.  The TCP program layer in the client computer actually waits till the entire packets arrive.  TCP arranges for a secure transmission between server and client.

Why TCP is crucial?

It sets up rules and standards for the way information is communicated over the network.


WHAT IS THE DIFFERENCE BETWEEN PACKETS AND FRAMES?

Segments are units of data in the Transport Layer (TCP/UDP) in the case of internet)

Packets are units of data in the Network Layer (IP in the case of internet)

Frames are units of data in the Link Layer (Wifi, bluetooth, Ethernet..etc)


WHAT IS PACKET LOSS?

Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their destination.  Packet loss is either caused by errors in data transmission across wireless network or network congestion. 


Causes of Network Loss

  • Network Congestion
  • Problems with network hardware
  • Software bugs
  • Overloaded Devices
  • Security Threats
  • Inadequate Infrastructure for handling packet loss


HOW TO REDUCE PACKET LOSS?

  • Check your connections
  • Restart your system
  • Try cable connections instead of wifi
  • Remove anything that can cause a static
  • Update your software
  • Replace out of date software
  • Use QoS Settings




Comments

Popular posts from this blog

THE OSI MODEL: THE 7 LAYERS IN NETWORKING EXPLAINED

 The Open Systems Interconnection (OSI)  was developed by the International Organization for Standardization in 1984 to enable different types of networks to be linked together.  The model contains seven layers, as shown in the Figure below. These layers describe networking functions from the physical network interface to the software applications interfaces. The intent of the OSI model is to provide a framework for networking that ensures compatibility in the network hardware and software and to accelerate the development of new networking technologies.  Physical layer Provides the electrical and mechanical connection to the network. Examples of technologies working in this layer are Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA)–related technologies, UTP, fiber, and network interface cards (NICs).  It uses topologies: BUS, STAR, RING, MESH Communication modes: Simplex, Half Duplex, Full Duplex Hardware including networking devices, antennas, c

NETWORKING: PACKET TRACER - IoT

In simple terms the IoT is a connection of :  networked sensors, actuators, and smart devices that collect and share data.   Packet Tracer 7 contains many new features to support the IoT.  This includes the addition of IoT devices that can be configured to react to certain environmental values such as sun, wind, rain, and humidity. These devices can be configured to take actions based on the changing environmental values, such as turning on lights or closing garage doors.  The next parts of learning will include instructions to locate the IoT devices, to connect them to your network, to configure and modify scripts to make them function, and to control these devices remotely. Packet Tracer provides everything you need to create simulated smart homes, smart cities, and smart factories. CONFIGURE IoT DEVICES USING PACKET TRACER Packet Tracer has a wide variety of sensors and smart devices that will allow you to design smart homes, smart cities, smart factories, and smart power grids

HOW CAN CLIENT / SERVER NETWORK MODEL BE A CHANGE FOR YOU??

WHAT IS CLIENT / SERVER?  In the client-server network model (which is sometimes called the client-server architecture or client-server topology), resources are managed by the network operating system through a centralized directory database.  The database can be managed by one or more servers, as long as they have the same network operating system. In the midst of a WINDOWS SERVER   controls network access to a group of computers, this LOGICAL group is known as Windows DOMAIN .  The centralized directory database that keeps user account information & security for the entire group of computers is called AD (Active Directory) .   Each user on the network has his/her own domain level account assigned by the network administrator and kept in Active Directory .   A user can sign on to the network from any computer on the network and get access to the resources that Active Directory allows. The process is managed by AD DS (Active Directory Domain Services) .  A computer makes a re