Internet routing hierarchy, Computer Networking

Assignment Help:

So how packets do determines their way across the Internet? Does each computer linked to the Internet know where the other computers are? Do packets just get 'broadcast' to every computer on the Internet? The answer to both the preceeding questions is 'no'. No computer knows where any of the other computers are, & packets do not get sent to each computer. The information utilized to get packets to their destinations is contained in routing tables kept through each router linked to the Internet.

Routers are packet switches. Usually a router is linked between networks to route packets between them. Each of the router knows it's sub-networks and which IP addresses they employ. Usually the router doesn't know what IP addresses are 'above' it. Study the figure below. The black boxes linking the backbones are routers.

At the top the larger NSP backbones are linked at a NAP. Under them are many sub-networks, and under them, more sub-networks. At the bottom are two local area networks along computers attached.

1146_Internet Routing Hierarchy.png

Figure:  Routes Connecting in Network

While a packet arrives at a router, the router verifies the IP address put there through the IP protocol layer on the originating computer. The router verify it's routing table. If the network having the IP address is found, the packet is sent to that network. If network having the IP address is not found, then on a default route the router sends the packet, usually up the backbone hierarchy to the next router. Optimistically the next router will know where to send the packet. If this does not, again the packet is routed upwards till it reaches a NSP backbone. The routers linked to the NSP backbones hold the largest routing tables & here the packet will be routed to the right backbone, where it will starts its journey 'downward' through smaller and smaller networks till it finds it's destination.


Related Discussions:- Internet routing hierarchy

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

How is it different than bootp or rarp, Bootp protocol normally use it in d...

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

What is the multicast routing, Sending a message to a group multicast addre...

Sending a message to a group multicast address is known as multicasting, and its routing algorithm is known as multicast routing.

Causes of failures, CAUSES OF FAILURES Every failure has a well-define...

CAUSES OF FAILURES Every failure has a well-defined cause.  Any system or device has an inherent strength or capacity to resist failures. This depends on design, material, man

Explain the technique- backpressure, Explain the technique- Backpressure ...

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

Connection, how to connect two pc in lan?

how to connect two pc in lan?

Multiplexing and de multiplexing, Multiplexing  and De multiplexing An...

Multiplexing  and De multiplexing Another  critical set of services that are provided by the transport layer is that of application multiplexing and de multiplexing. This featu

What is the difference between trigger and rule, What is the difference bet...

What is the difference between trigger and rule? The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by client

Types of topologies, TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOL...

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd