Environment of the packet flow, Computer Engineering

Assignment Help:

Q. Environment of the Packet Flow?

Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!" took from our computer to computer with IP address 5.6.7.8, it would take place something like this:

541_Environment of the Packet Flow.png

Figure: Environment of the Packet Flow

1. Message would start at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that message passes through may break the message up into smaller chunks of data. This is since data sent over the Internet (and most computer networks) are sent in manageable chunks. On the Internet, these chunks of data are known as packets.

3. Packets would go through Application Layer and continue to the TCP layer. Every packet is assigned a port number, which is used by program on destination computer to receive message since it will be listening on a specific port.

4. After going through TCP layer, packets proceed to IP layer. This is where every packet receives its destination address, 5.6.7.8.

5. Now that our message packets have a port number and an IP address, they are ready to be sent over Internet. Hardware layer takes care of turning our packets containing alphabetic text of our message in electronic signals and transmitting them over the phone line.

6. On the other end of phone line your ISP has a direct connection to Internet. ISPs router examines destination address in every packet and determines where to send it. Generally, the packet's next stop is another router.

7. Ultimately, packets reach computer 5.6.7.8. Here, packets start at the bottom of destination computer's TCP/IP stack and work upwards.

8. As packets go upwards through the stack, all routing data that sending computer's stack added (like port number and IP address) is stripped from packets.

9. When data reaches top of the stack, packets have been re-assembled into their original form, "Hello computer 5.6.7.8!"


Related Discussions:- Environment of the packet flow

A graph ''g'' with ''n'' nodes is bipartite, A graph 'G' with 'n' nodes is ...

A graph 'G' with 'n' nodes is bipartite if it have  no cycle of odd length.

Over fitting considerations - artificial intelligence, Over fitting Conside...

Over fitting Considerations - artificial intelligence Left  unexamined ,  back  propagation  in  multi-layer  networks  may  be very susceptible  to over fitting itself to the

Bit manipulation techniques, We can also use the logical operators to numbe...

We can also use the logical operators to numbers directly and  perform simple bit manipulation . The operators are     &  Bitwise AND     |  Bitwise OR     ^  Bitwise exclusiv

Example of arrays pointers, Q. Example of arrays pointers? General form...

Q. Example of arrays pointers? General form of declaration of array in Fortran 90 is type, DIMENSION(bound) [,attr] :: name E.g. the declaration          INTEGER, D

Explain ip address structure, Q. Explain IP Address Structure? Internet...

Q. Explain IP Address Structure? Internet addresses are divided in five types of classes. Classes were designated A through E. class A address space enables a small number of n

Explain the importance of computer architecture, Explain the importance of ...

Explain the importance of Computer architecture Computer architecture courses cover application, organization, architecture, logic and transistor layers. However, four other la

Design a mod-5 synchronous counter using J-Kflip-flops, What are synchronou...

What are synchronous counters? Design a Mod-5 synchronous counter using J-K Flip-Flops. Ans. Synchronous Counters : It means that all flip-flops are clocked concurrently. T

Social media strategy design, For this phase of the project you are require...

For this phase of the project you are required to formulate a social media strategy for a product/service/business/concept/charity...etc. the strategy can include technologies such

Number used as operand data type, Q. Number used as operand data type? ...

Q. Number used as operand data type? Numbers: All machine languages comprise numeric data types. Numeric data generally use one of the three representations: o Floating po

Handshake packets - computer architecture, Handshake packets: Handshak...

Handshake packets: Handshake packets consist of nothing but a PID byte, and are usually sent in response to data packets. The 3 basic types are, NAK, indicating that the data

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd