Environment of the packet flow, Computer Engineering

Assignment Help:

Q. Environment of the Packet Flow?

Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!" took from our computer to computer with IP address 5.6.7.8, it would take place something like this:

541_Environment of the Packet Flow.png

Figure: Environment of the Packet Flow

1. Message would start at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that message passes through may break the message up into smaller chunks of data. This is since data sent over the Internet (and most computer networks) are sent in manageable chunks. On the Internet, these chunks of data are known as packets.

3. Packets would go through Application Layer and continue to the TCP layer. Every packet is assigned a port number, which is used by program on destination computer to receive message since it will be listening on a specific port.

4. After going through TCP layer, packets proceed to IP layer. This is where every packet receives its destination address, 5.6.7.8.

5. Now that our message packets have a port number and an IP address, they are ready to be sent over Internet. Hardware layer takes care of turning our packets containing alphabetic text of our message in electronic signals and transmitting them over the phone line.

6. On the other end of phone line your ISP has a direct connection to Internet. ISPs router examines destination address in every packet and determines where to send it. Generally, the packet's next stop is another router.

7. Ultimately, packets reach computer 5.6.7.8. Here, packets start at the bottom of destination computer's TCP/IP stack and work upwards.

8. As packets go upwards through the stack, all routing data that sending computer's stack added (like port number and IP address) is stripped from packets.

9. When data reaches top of the stack, packets have been re-assembled into their original form, "Hello computer 5.6.7.8!"


Related Discussions:- Environment of the packet flow

Define html, HTML is a Hyper text Markup Language and it is  Scripting La...

HTML is a Hyper text Markup Language and it is  Scripting Language

What is structural hazard, What is structural hazard? Structural hazard...

What is structural hazard? Structural hazard is the situation when two instructions needs the use of a given hardware resource at the similar time. The most common case in whic

How authoring packages supports scripting language, How authoring packages ...

How authoring packages supports scripting language Many authoring packages support a scripting language to allow for even more sophisticated applications to be produced. Scrip

Example multi-layer ann with sigmoid units, Example Multi-layer ANN with Si...

Example Multi-layer ANN with Sigmoid Units: However we will concern ourselves here that with ANNs containing only one hidden layer and as this makes describing the backpropaga

What are the major characteristics of a pipeline, What are the major charac...

What are the major characteristics of a pipeline? The major characteristics of a pipeline are: a) Pipelining cannot be executed on a single task, as it works by splitting mu

Fact finding techniques on banking system, what are the questionnaries and ...

what are the questionnaries and observation of work site for banking system?

What is software quality assuranc, Software QA includes the whole software ...

Software QA includes the whole software development PROCESS - improving and monitoring the process, making sure that any agreed-upon standards and processes are followed, and ensur

Digital forensic investigation, (a) Name five important activities invol...

(a) Name five important activities involved in a digital forensic investigation. (b) Briefly describe the three types of data that a forensic examiner has to work with. Whic

Give the example of first come first served scheduling, Consider  the  foll...

Consider  the  following set of jobs with  their  arrival  times,  execution  time  (in minutes), and deadlines. Job Ids Ar r ival Time E

Overfitted the data, Overfitted the data: Moreover notice that as time...

Overfitted the data: Moreover notice that as time permitting it is worth giving the training algorithm the benefit of the doubt as more as possible. However that is, the error

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd