Solved

Understanding network bits

Posted on 2011-09-16
4
292 Views
Last Modified: 2012-05-12
Ive been trying to figure out how networks actually work.

I understand that the data is sent by packets, and that each packet is made up of bits of 0's and 1's (On and off of the electrical signal), but my question is if I wanted to read the the data stream - ie 1010111100110110011100001100110100001111100111001100111011011101, I understand that the first 96 bits contain the senders IP, Receiver's IP, Protocol and Packet numer, but If Im reading the first 96 bits of data, what bits are the senders IP, Receiver's IP etc????

Also how do you know when a BIT has started, and the next BIT starts, and what is the frequency of the reading?

I know this is all a bit technical, I just wanted to understand a bit better :-)

Thank you
0
Comment
Question by:tonelm54
4 Comments
 
LVL 8

Accepted Solution

by:
pilson66 earned 167 total points
ID: 36547855
Internet Protocol Packet Structure:
http://en.wikipedia.org/wiki/IPv4#Packet_structure
0
 
LVL 7

Assisted Solution

by:Pr1z
Pr1z earned 166 total points
ID: 36548087
The detail about the timings/frequencies of transmission varies from media type to media type (10/100/1000 Mbps, Wireless, ...)  These technologies are generically refered to as Ethernet.

You can find information about the "electrical connection" sides of networking here:
     http://en.wikipedia.org/wiki/Ethernet
     http://www.ieee802.org/3/

Hope this helps

Priz
0
 
LVL 3

Assisted Solution

by:Networking_Enthusiast
Networking_Enthusiast earned 167 total points
ID: 36571706
As for the bits (when each one begins / ends, etc), each 1 or 0 in of itself constitutes one bit. So, if you have 96 bits, you have 96 ones or zeroes (depending on the information contained therein). The most simple way to interpret this information is with a networking tool called a protocol analyzer...a good free one is called Wireshark:

http://www.wireshark.org/

This will interpret things like source and destination and format the bits in a user friendly manner.
0
 

Author Closing Comment

by:tonelm54
ID: 36941749
Thank you for your assistance.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now