Environment of the packet flow, Computer Engineering

Assignment Help:

Q. Environment of the Packet Flow?

Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!" took from our computer to computer with IP address 5.6.7.8, it would take place something like this:

541_Environment of the Packet Flow.png

Figure: Environment of the Packet Flow

1. Message would start at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that message passes through may break the message up into smaller chunks of data. This is since data sent over the Internet (and most computer networks) are sent in manageable chunks. On the Internet, these chunks of data are known as packets.

3. Packets would go through Application Layer and continue to the TCP layer. Every packet is assigned a port number, which is used by program on destination computer to receive message since it will be listening on a specific port.

4. After going through TCP layer, packets proceed to IP layer. This is where every packet receives its destination address, 5.6.7.8.

5. Now that our message packets have a port number and an IP address, they are ready to be sent over Internet. Hardware layer takes care of turning our packets containing alphabetic text of our message in electronic signals and transmitting them over the phone line.

6. On the other end of phone line your ISP has a direct connection to Internet. ISPs router examines destination address in every packet and determines where to send it. Generally, the packet's next stop is another router.

7. Ultimately, packets reach computer 5.6.7.8. Here, packets start at the bottom of destination computer's TCP/IP stack and work upwards.

8. As packets go upwards through the stack, all routing data that sending computer's stack added (like port number and IP address) is stripped from packets.

9. When data reaches top of the stack, packets have been re-assembled into their original form, "Hello computer 5.6.7.8!"


Related Discussions:- Environment of the packet flow

Program for encoding ASCII alpha numeric, Q. Program for encoding ASCII Alp...

Q. Program for encoding ASCII Alpha numeric? ; A program for encoding ASCII Alpha numeric. ; ALGORITHM:             ; create the code table             ; read an input

Describe attributes and properties of system, System Analysis & Design ...

System Analysis & Design 1. Describe attributes, properties, and characteristics of system. 2. What do you mean by Organizational Aspects of System Life Cycles? Explain.

One can use the event get in a report without ldb attribute, One can use th...

One can use the event GET in a report without LDB attribute. False. no one can use the event GET in a report without attribute.

Explain the language processors, Name the language processors are? Asse...

Name the language processors are? Assembler, Compiler and Interpreter are the language processors.

Difference between static and dynamic RAM, Difference between static and dy...

Difference between static and dynamic RAM. Draw the circuits of one cell of each and explain its working. Ans: Differentiation among Static RAM and Dynamic RAM: Static

Use of intrinsic functions in fortran, Q. Use of Intrinsic Functions in FOR...

Q. Use of Intrinsic Functions in FORTRAN? HPF initiates some new intrinsic functions also to those defined in F90. The two mainly often used in parallel programming are system

Two independent mechanisms for controlling interrupt request, What are the ...

What are the two independent mechanisms for controlling interrupt request? At the device end, an interrupt enable bit in a control register verifies whether the device is permi

Explain about strategic planning and sensitivity training, Q. Explain about...

Q. Explain about strategic planning and sensitivity training? Formulation of business strategy with the due consideration of environmental analysis and organizational appraisal

Explain dataflow computing, DATAFLOW COMPUTING A substitute to the Von ...

DATAFLOW COMPUTING A substitute to the Von Neumann model of calculation is dataflow computation model. In the dataflow model, control is tied to flow of data. Order of instruct

Evaluate the damping coefficient, A certain car has suspension modes which ...

A certain car has suspension modes which are uncoupled front to back.  When a person with a mass of 60 kg sits in the rear of a car, in the centre of the seat which is directly ove

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd