Internet routing hierarchy, Computer Networking

Assignment Help:

So how packets do determines their way across the Internet? Does each computer linked to the Internet know where the other computers are? Do packets just get 'broadcast' to every computer on the Internet? The answer to both the preceeding questions is 'no'. No computer knows where any of the other computers are, & packets do not get sent to each computer. The information utilized to get packets to their destinations is contained in routing tables kept through each router linked to the Internet.

Routers are packet switches. Usually a router is linked between networks to route packets between them. Each of the router knows it's sub-networks and which IP addresses they employ. Usually the router doesn't know what IP addresses are 'above' it. Study the figure below. The black boxes linking the backbones are routers.

At the top the larger NSP backbones are linked at a NAP. Under them are many sub-networks, and under them, more sub-networks. At the bottom are two local area networks along computers attached.

1146_Internet Routing Hierarchy.png

Figure:  Routes Connecting in Network

While a packet arrives at a router, the router verifies the IP address put there through the IP protocol layer on the originating computer. The router verify it's routing table. If the network having the IP address is found, the packet is sent to that network. If network having the IP address is not found, then on a default route the router sends the packet, usually up the backbone hierarchy to the next router. Optimistically the next router will know where to send the packet. If this does not, again the packet is routed upwards till it reaches a NSP backbone. The routers linked to the NSP backbones hold the largest routing tables & here the packet will be routed to the right backbone, where it will starts its journey 'downward' through smaller and smaller networks till it finds it's destination.


Related Discussions:- Internet routing hierarchy

How receiver detects error, How receiver detects error The frame is 100...

How receiver detects error The frame is 10011101. The generator is 1001. The message after appending the three zeros is 10011101000. The reminder on dividing 10011101000 by 100

Define layered network model, Q. Define layered network model? - The OS...

Q. Define layered network model? - The OSI Reference Model is collection of seven layers every specifying particular network functions. - The process of breaking up the func

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Digital encoding, A modified NRZ code known as enhanced-NRZ (E-NRZ) operate...

A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

Network design by detailing infrastructure, i have an assigment due and wan...

i have an assigment due and want some one to do my assognment

Define csma/cd, CSMA/CD - A Simple Definition A netwo...

CSMA/CD - A Simple Definition A network station wishing to broadcast will first check the cable plant to make sure that no other station is currently transmit

What common software problems can lead to network defects, What common soft...

What common software problems can lead to network defects? Software related problems can be any or a combination of the following: - Client server problems - Application

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Advantage of ip sec tunnelling mode, Advantage of IP sec  Tunnelling Mode ...

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd