Environment of the packet flow, Computer Engineering

Assignment Help:

Q. Environment of the Packet Flow?

Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!" took from our computer to computer with IP address 5.6.7.8, it would take place something like this:

541_Environment of the Packet Flow.png

Figure: Environment of the Packet Flow

1. Message would start at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that message passes through may break the message up into smaller chunks of data. This is since data sent over the Internet (and most computer networks) are sent in manageable chunks. On the Internet, these chunks of data are known as packets.

3. Packets would go through Application Layer and continue to the TCP layer. Every packet is assigned a port number, which is used by program on destination computer to receive message since it will be listening on a specific port.

4. After going through TCP layer, packets proceed to IP layer. This is where every packet receives its destination address, 5.6.7.8.

5. Now that our message packets have a port number and an IP address, they are ready to be sent over Internet. Hardware layer takes care of turning our packets containing alphabetic text of our message in electronic signals and transmitting them over the phone line.

6. On the other end of phone line your ISP has a direct connection to Internet. ISPs router examines destination address in every packet and determines where to send it. Generally, the packet's next stop is another router.

7. Ultimately, packets reach computer 5.6.7.8. Here, packets start at the bottom of destination computer's TCP/IP stack and work upwards.

8. As packets go upwards through the stack, all routing data that sending computer's stack added (like port number and IP address) is stripped from packets.

9. When data reaches top of the stack, packets have been re-assembled into their original form, "Hello computer 5.6.7.8!"


Related Discussions:- Environment of the packet flow

Difference between a null pointer and a void pointer, A NULL pointer is a p...

A NULL pointer is a pointer of any type whose value is zero. A void pointer is a pointer to an object of an unknown type, and is guaranteed to have sufficient bits to hold a pointe

Using the memory map design an absolute decoding circuit, Using the memory ...

Using the memory map below; design an absolute decoding circuit.   The technique is to spot the differences between the start and stop of each device. The Ram chip has the follow

Explain sequential logic circuit, Explain Sequential logic circuit An...

Explain Sequential logic circuit Ans. Sequential logic circuit:- (i) Output not only depends upon the recent state of the input but also depend upon the earlier state

Select-options and parameters statement, The fields specified by select-opt...

The fields specified by select-options and parameters statement cannot be grouped together in the selection screen.  No, It can be grouped together in the selection screen

Major characteristics of a computer family, Q. Major characteristics of a c...

Q. Major characteristics of a computer family? Let us summarise the major characteristics of a computer family. These are as below: Figure: Characteristics of computer

Challenges in changing information technology, Q: Challenges and Prospects ...

Q: Challenges and Prospects in Changing Information Technology? There is no doubt that information technology has made significant progress during the past two decades. Modern

What is indexed addressing, What is Indexed addressing The location of ...

What is Indexed addressing The location of data is calculated as sum of an address specified by one of previous methods, and value of an index register. This allows an array of

Dbms, write er diagram for company database

write er diagram for company database

Vector-memory instructions-vector processing, Vector-Memory Instructions : ...

Vector-Memory Instructions : When vector operations with memory M are executed then these are vector-memory instructions. These instructions are denoted with the many function mapp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd