You are here: DIME Home > Programming and Scripting > How Do Packets Make Their Way Through Packet-Switched Networks?


How Do Packets Make Their Way Through Packet-Switched Networks?

Earlier we said that a muter takes a packet arriving on one of its attached communication links and forwards that packet on to another of its attached communication links. But how does the router determine the link onto which it should forward the packet?

Author: Imran Rashid
Date: Dec 6, 2009 - 10:36:54 AM


Printer FriendlyPrinter friendly page

Earlier we said that a muter takes a packet arriving on one of its attached communication links and forwards that packet on to another of its attached communication links. But how does the router determine the link onto which it should forward the packet? This is actually done in different ways by different types of computer networks we will describe one popular approach, namely. The approach employed by the Internet. In the Internet, each packet traversing the network contains the address of the packet's destination in its header. As with postal addresses, this address has a hierarchical structure. When a. packet arrives at a router in the network, the router examines a portion of the packet's destination address and forwards the packet to an adjacent router. More specifically, each router has a forwarding table that maps destination addresses (or portions of the destination addresses) to outbound links. When a packet arrives at a router, the router examines the address and searches its table using this destination address to find the appropriate outbound link had muter then directs the packet to this outbound link.

We just learned that a router uses a packet's destination address to index a forwarding table and determine the appropriate outbound link. But this statement begs yet another question: how do forwarding tables get set? Are they configured by hand in each and every router, or does the Internet use a more automated procedure? But to whet your appetite here, we'll note now that the Internet has a number of special routing protocols that are used to automatically set the forwarding tables. A routing protocol may, for example, determine the shortest path from each router to each destination and use the shortest path results to configure the forwarding tables in the routers.

The end-to-end routing process is analogous to a car driver who does not use maps but instead prefers to ask for directions. For example, suppose Joe is driving from Philadelphia to 156 Lakeside Drive in Orlando, Florida. Joe first drives to his neighborhood gas station and ask how to get to 156 Lakeside Drive in Orlando, Florida. The gas station attendant extracts the Florida portion of the address and tells Joe that he needs to get onto the interstate highway 1-95 South, which has an entrance just next to the gas station. He also tells Joe that once he enters Florida he should ask someone else there. Joe then takes 1-95. South until he gets to Jack-sonville, Florida at which point he asks another gas station attendant for directions. The attendant extracts the Orlando portion of the address and tells Joe that he should continue on 1-95 to Daytona Beach and then ask someone else. In Daytona Beach another gas station attendant also extracts the Orlando portion of the address and tells Joe that he should take 1-4 directly to Orlando. Joe takes 1-4 and gets off at the Orlando exit. Joe goes to another gas station attendant, and this time the attendant extracts the Lakeside Drive portion of the address and tells Joe the road he must follow to get to Lakeside Drive. Once Joe reaches Lakeside Drive, he asks a kid on a bicycle how to get to his destination. The kid extracts the 156 portion of the address and points to the house. Joe finally reaches his ultimate destination. In the above analogy, the gas-station attendants and kids on bicycles are analogous to routers. Their forwarding tables, which are in their brains, have been configured by years of experience. How would you actually like to see the end-to-end mute that packets take in the Internet? We now invite you to get your hands dirty by interacting with the Tracer-oute program.

Imran Rashid has working knowledge about windows operating systems.For more information visit

Free CCNA Tests

Free Windows Tutorials



View all articles by Imran Rashid

Link to this article:

Code to copy: <a href="http://www.dime-co.com/programming/How-Do-Packets-Make-Their-Way-Through-Packet-Switched-Networks.shtml">How Do Packets Make Their Way Through Packet-Switched Networks? </a>




Related Articles...

HTML5 - The End of PSD to HTML Slicing Providers?

Oct 18, 2010 - 11:20:32 AM

In 2009 the World Wide Web Consortium (W3C) decided to concentrate their efforts on HTML5, a new revision of HTML, rather than XHTML2. HTML5 is strongly supported by Apple, Opera, Mozilla, Microsoft, Google and other leading IT companies and web browser developers. All this means that HTML5 is becoming a mainstream of the Internet.... [Read the full story]

Top 10 Points to Remember While Doing Web Development

Sep 17, 2010 - 6:44:25 AM

The web developers have a vital role to play in the success of the online business as they are actual programmers of the web site.  No one is going to fence on the fame of the web development in today’s competitive world. This is a high tech decade and you have to be on your toes all the time to contend well. The design of the website sets the tone for the success. If its attractive people would love it but if it’s not they are going to leave the page next moment.... [Read the full story]

Top 5 PHP Frame Work List to speed up your Programming efficiency

Jan 9, 2010 - 3:23:32 AM

PHP is a widely used and open source scripting language which designed for web development to build dynamic web pages. PHP Applications are normally hosted or found on Linux Servers. Its functionality same as Windows platform by Active Server Pages Technology.... [Read the full story]

Ethical Hacking for Strong Security

Jan 7, 2010 - 12:53:55 PM

Ethical hacking is a process that utilizes the same techniques that malicious hackers use, but for the purpose of assessing security threats to your organization’s information assets. Entities of all types (private businesses, government agencies, non-profit corporations, Hospitals, Universities, Etc.) need strong IT security now more than ever. It is imperative that IT security personnel learn “Black Hat” (malicious) hacking techniques in order to counter or prevent attacks on critical IT systems and assets.... [Read the full story]


Newest Articles in Popular Topics:

Business & Marketing Computers & the Internet Entertainment Health & Fitness
Finding Ways To Save Money And Maximize Revenue In Business
Cooper's Golf Park Tees Off Their New Website
Fiinovation Adjudged CSR Team of the Year & Caring Company at World CSR Day
Reasons Why Kale Realty is the Best Real Estate Firm in All of Chicago
Montreal Tech Startup Kangaroo Rewards Launches Mobile Loyalty Program for Local Merchants
It is time we break out of the SEO Shelter
3 Strong Reasons You Should Start Your Own Blog
Evolve Your Career With CompTIA A+ Certification Exam
High speed VMware Backups - Powered by UltraBlaze(™) from Vembu
Things to Consider When Selecting a Domain Name for Your Website
Fling Boom "Launches" This Holiday Season
Beautiful Abstract Canvas Art is Up for Grabs
Buying Art as a Gift: Tips From an Expert
Complete Guide to the 2014 Gatlinburg Fine Arts Festival Released by Jackson Mountain Homes
Learn Blues Music Online-Alternative to Traditional Piano Lessons
Causes and Treatment of Acne
What Type Of Constipation Home Remedies Are There?
Manual Wheelchairs: Buying One
Instant Facelift with Dental Implants
Lasik Surgery Leading Correction Of Vision Issues

Home & Family

Shopping

Sports

Travel
Enhance Your Learning Experience Through Best Responsive Elearning Development Tools
Best Apps for Learning German
Esvees is Cranbourne's Elite Hair Dressing Company
Ozone Generator
Practical Tips When Choosing Gates and Gate Openers for Your Home or Business
Why Cases are Required for Mobile Phones?
Are Dealership Services Worth It?
2015 Jeep Grand Cherokee Named Must-Shop SUV for Towing from AutoTrader.com
Online Selling With An Appraisal Advantage
Macsome AudioBook Converter released New Version V2.0.4
Aditi Ashok signs off with a double
Softball Coaching: Avoid Becoming A Nattering Nabob of Negativity
Softball Coaching Tips - The Funnel Approach
Pick Up Specialized Advice on Jumping Exercises Which Are Highly Effective
Vertical Jump Training Tactics to Increase Your Athletic Performance
Tips for Choosing the Right Paris Short Lets
Hostels - the best choice for working womens and college students
Perfect holiday? Book a cruise and sail in Croatia!
Say Aloha to Your Best Vacation Ever with Kohala Coast Properties
The Perfect Guide for a Fantastic Family Trip to Kansas City

 



Follow & Share Your Favorite Video Articles

Tell a Friend About This Site



Chamber of Commerce - on the Web logo



Subscribe to the eMarket SmartsTM Newsletter in order to keep up to date with what's happening with dime-co.com, get the emails on new video articles, featured articles, and more. Your privacy is always protected. We never rent, sell or trade your private information

:
:

Service provided by GetResponse Autoresponders


Recommended Associates


Latest Articles in All Categories


Putting Up a Small Commercial Printing Business
So You Might Be Unemployed And Desire To Become A San Francisco Real Estate Investor Now
Meditation and Mindfulness: Dealing With Emotion
CPA Websites: Five Essential Ideas for Composing Convincing Articles
Set Goals In Order to Come Up With Your Action Plan
Is the Air in Your Home Safe to Breathe?
Coarse Fishing Tackle Review: The JW Young 13ft Trotter Rod
Section 1031 Exchanges For San Diego Real Estate Investors
Phoenix Real Estate Investing For Highest Possible Earnings
Legendary are the Volk Racing TE37 Wheels
Developing the Next Generation Wall Station (ChaseDesk™) for Healthcare - A Case Study
What are step down transformers?
Introducing Sharehype, the Revolutionary Tool for Online Marketers
Rewards To Shopping For Austin Real Estate On The Web
Hydroponics for Beginners



Do you write?

Would you like submit your articles and have them approved on a priority status? Find out more about how you can become a Priority author for pennies a day! Click here.

Dime-co.com Home
  • Business (9328)
  • Computers & The Internet (5740)
  • Entertainment (1348)
  • Family (958)
  • Finance (1963)
  • Health (4246)
  • Home and Living (6670)
  • Marketing (6113)
  • Shopping & Product Reviews (2624)
  • Sports (694)
  • Travel and Vacations (1689)
  • Video Articles (1)
  • Editors Pick (1)