What is internet routing hierarchy, Computer Engineering

Assignment Help:

Q. What is Internet Routing Hierarchy?

So how do packets find their way across Internet? Does every computer connected to Internet know where other computers are? Do packets basically get 'broadcast' to each computer on the Internet? Answer to both the preceding questions is 'no'. No computer knows where any of the other computers are and packets don't get sent to each computer. Information used to get packets to their destinations is contained in routing tables kept by every router connected to Internet.

Routers are packet switches. A router is typically connected between networks to route packets between them. Each router knows about its sub-networks and which IP addresses they use. Router usually doesn't know what IP addresses are 'above' it. Examine the figure below. Black boxes connecting backbones are routers. Larger NSP backbones at the top are connected at a NAP. Under them are various sub-networks and under them, more sub-networks. At bottom are two local area networks with computers attached.

170_What is Internet Routing Hierarchy.png

Figure: Routes Connecting in Network

When a packet arrives at a router, router examines IP address put there by IP protocol layer on originating computer. Router checks its routing table. If network containing IP address is found, packet is sent to that network. If network comprising IP address isn't found, then router sends the packet on a default route, usually up backbone hierarchy to the next router. Confidently subsequent router will know where to send packet. If it doesn't, again packet is routed upwards till it reaches a NSP backbone. Routers connected to NSP backbones hold the largest routing tables and here packet would be routed to correct backbone, where it will begin its journey 'downward' through smaller and smaller networks till it finds its destination.


Related Discussions:- What is internet routing hierarchy

Define a technique of temporarily removing inactive program, is a technique...

is a technique of temporarily removing inactive programs from the memory of computer system? Swapping is a technique of temporarily eliminating inactive programs from the memor

Explain bit slice ALUs, Bit Slice ALUs It was possible to manufacture ...

Bit Slice ALUs It was possible to manufacture smaller like 4 or 8 bits fixed point ALUs on a single IC chip. If these chips are constructed as expendable types then employing

Illustrate about fourth generation computers, Q. Illustrate about fourth ge...

Q. Illustrate about fourth generation computers? One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integr

Why did some plug-ins disappear for 0.99.19, Some of the plug-ins have prov...

Some of the plug-ins have proven unstable. These have been moved into a split download, which should be available anywhere you got the GIMP, in the file gimp-plugins-unstable-VERSI

Software estimation, Software Estimation The statement of scope helps t...

Software Estimation The statement of scope helps the planner to established estimates using one or more method which fail into two wide categories: empirical modeling and decom

Hierarchical design in multisim, It is recommended that you capture your as...

It is recommended that you capture your assignment as a Hierarchical Design in Multisim. Look at the Help topic Working with Larger Designs. Design and thoroughly test each module

Explain various steps for analysing an algorithm, Explain various steps for...

Explain various steps for analysing an algorithm.  The several steps involved in analysis of an algorithm are: 1. For any algorithm, the first step should be to show that it

Define syntax of mpi_bcast function, Q. Define syntax of MPI_Bcast function...

Q. Define syntax of MPI_Bcast function? MPI_Bcast(msgaddr, count, datatype, rank, comm):   This function is used by a process ranked rank in group comm to transmit messag

Lifo under perpetual inventory procedure, Q. LIFO under perpetual inventory...

Q. LIFO under perpetual inventory procedure? LIFO under perpetual inventory procedure observes Exhibit to see the LIFO method using perpetual inventory procedure. In this proce

Process of an e-mail transfer across the internet, Q. Process of An e-mail ...

Q. Process of An e-mail transfer across the Internet? When you open your mail client to read your e-mail, this is what normally happens: 1. Mail client (Netscape Mail, Micro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd