Internet routing hierarchy, Computer Networking

Assignment Help:

So how packets do determines their way across the Internet? Does each computer linked to the Internet know where the other computers are? Do packets just get 'broadcast' to every computer on the Internet? The answer to both the preceeding questions is 'no'. No computer knows where any of the other computers are, & packets do not get sent to each computer. The information utilized to get packets to their destinations is contained in routing tables kept through each router linked to the Internet.

Routers are packet switches. Usually a router is linked between networks to route packets between them. Each of the router knows it's sub-networks and which IP addresses they employ. Usually the router doesn't know what IP addresses are 'above' it. Study the figure below. The black boxes linking the backbones are routers.

At the top the larger NSP backbones are linked at a NAP. Under them are many sub-networks, and under them, more sub-networks. At the bottom are two local area networks along computers attached.

1146_Internet Routing Hierarchy.png

Figure:  Routes Connecting in Network

While a packet arrives at a router, the router verifies the IP address put there through the IP protocol layer on the originating computer. The router verify it's routing table. If the network having the IP address is found, the packet is sent to that network. If network having the IP address is not found, then on a default route the router sends the packet, usually up the backbone hierarchy to the next router. Optimistically the next router will know where to send the packet. If this does not, again the packet is routed upwards till it reaches a NSP backbone. The routers linked to the NSP backbones hold the largest routing tables & here the packet will be routed to the right backbone, where it will starts its journey 'downward' through smaller and smaller networks till it finds it's destination.


Related Discussions:- Internet routing hierarchy

What is data traffic, Q. What is Data traffic? Data traffic ...

Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l

Independent loops statement, INDEPENDENT Loops HPF gives additional opp...

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

Describe the term - stateful implies, Describe the term - stateful implies ...

Describe the term - stateful implies The term stateful implies that the firewall is wakeful and is capable of remembering the state of each session of packet exchange across it

The size of a broadcast domain, Which switching technology can decrease the...

Which switching technology can decrease the size of a broadcast domain? Ans) VLAN's are logical ways to break up a huge broadcast domain. To get from VLAN to VLAN you must ha

Explain in brief -ring topolgy, Explain in brief -Ring Topolgy Comments 1 ...

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

Explain the functions and features of the ipmonitor program, Functions and ...

Functions and features of the IPMonitor program are as follows:   a)  This program should be able to list out detail information of IP traffic which includes source IP address an

Introduction to performance evaluations, INTRODUCTION In this part, th...

INTRODUCTION In this part, the topic of performance evaluation shows those parameters that are devised to calculate the performances of various parallel systems. Achieving the

Advantage and disadvantage of wiring schemes, ADVANTAGE AND DISADVANTAGE OF...

ADVANTAGE AND DISADVANTAGE OF WIRING SCHEMES:  Each of three wiring procedure has disadvantages and advantages, which are illustrate as follows: RELIABILITY ISSUES:  W

Modify the tcp server and udp server in client server, Let's imagine that w...

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd