How Do Packets Make Their Way Through Packet-Switched Networks? - Earlier we said that a muter takes a packet arriving on one of its attached communication links and forwards that packet on to another of its attached communication links. But how does the router determine the link onto which it should forward the packet? |
|
Business Related Topics...
Computer Related Topics...
Entertainment, Recreation & Sports Related Topics...
Health & Fitness Related Topics...
Home & Family Related Topics...
Shopping Related Topics...
Would you like to submit articles to our site? Have a question or a problem?
You are here: DIME Home > Programming and Scripting > How Do Packets Make Their Way Through Packet-Switched Networks?
Earlier we said that a muter takes a packet arriving on one of its attached communication links and forwards that packet on to another of its attached communication links. But how does the router determine the link onto which it should forward the packet?
Author: Imran Rashid
Date: Dec 6, 2009 - 10:36:54 AM
Earlier
we said that a muter takes a packet arriving on one of its attached
communication links and forwards that packet on to another of its
attached communication links. But how does the router determine the
link onto which it should forward the packet? This is actually done in
different ways by different types of computer networks
we will describe one popular approach, namely. The approach employed by
the Internet. In the Internet, each packet traversing the network
contains the address of the packet's destination in its header. As with
postal addresses, this address has a hierarchical structure. When a.
packet arrives at a router in the network, the router examines a
portion of the packet's destination address and forwards the packet to
an adjacent router. More specifically, each router has a forwarding
table that maps destination addresses (or portions of the destination
addresses) to outbound links. When a packet arrives at a router, the
router examines the address and searches its table using this
destination address to find the appropriate outbound link had muter
then directs the packet to this outbound link.
We just learned that a router uses a packet's destination address to
index a forwarding table and determine the appropriate outbound link.
But this statement begs yet another question: how do forwarding tables
get set? Are they configured by hand in each and every router, or does
the Internet use a more automated procedure? But to whet your appetite
here, we'll note now that the Internet has a number of special routing protocols
that are used to automatically set the forwarding tables. A routing
protocol may, for example, determine the shortest path from each router
to each destination and use the shortest path results to configure the
forwarding tables in the routers.
The end-to-end routing process is analogous to a car driver who does
not use maps but instead prefers to ask for directions. For example,
suppose Joe is driving from Philadelphia to 156 Lakeside Drive in
Orlando, Florida. Joe first drives to his neighborhood gas station and
ask how to get to 156 Lakeside Drive in Orlando, Florida. The gas
station attendant extracts the Florida portion of the address and tells
Joe that he needs to get onto the interstate highway 1-95 South, which
has an entrance just next to the gas station. He also tells Joe that
once he enters Florida he should ask someone else there. Joe then takes
1-95. South until he gets to Jack-sonville, Florida at which point he
asks another gas station attendant for directions. The attendant
extracts the Orlando portion of the address and tells Joe that he
should continue on 1-95 to Daytona Beach and then ask someone else. In
Daytona Beach another gas station attendant also extracts the Orlando
portion of the address and tells Joe that he should take 1-4 directly
to Orlando. Joe takes 1-4 and gets off at the Orlando exit. Joe goes to
another gas station attendant, and this time the attendant extracts the
Lakeside Drive portion of the address and tells Joe the road he must
follow to get to Lakeside Drive. Once Joe reaches Lakeside Drive, he
asks a kid on a bicycle how to get to his destination. The kid extracts
the 156 portion of the address and points to the house. Joe finally
reaches his ultimate destination. In the above analogy, the gas-station
attendants and kids on bicycles are analogous to routers. Their
forwarding tables, which are in their brains, have been configured by
years of experience. How would you actually like to see the end-to-end
mute that packets take in the Internet? We now invite you to get your
hands dirty by interacting with the Tracer-oute program.
Imran Rashid has working knowledge about windows operating systems.For more information visit
Free CCNA Tests
Free Windows Tutorials
HTML5 - The End of PSD to HTML Slicing Providers?Oct 18, 2010 - 11:20:32 AM In 2009 the World Wide Web Consortium (W3C) decided to concentrate their efforts on HTML5, a new revision of HTML, rather than XHTML2. HTML5 is strongly supported by Apple, Opera, Mozilla, Microsoft, Google and other leading IT companies and web browser developers. All this means that HTML5 is becoming a mainstream of the Internet.... [Read the full story] |
Top 10 Points to Remember While Doing Web DevelopmentSep 17, 2010 - 6:44:25 AM The web developers have a vital role to play in the success of the online business as they are actual programmers of the web site. No one is going to fence on the fame of the web development in today’s competitive world. This is a high tech decade and you have to be on your toes all the time to contend well. The design of the website sets the tone for the success. If its attractive people would love it but if it’s not they are going to leave the page next moment.... [Read the full story] |
Top 5 PHP Frame Work List to speed up your Programming efficiencyJan 9, 2010 - 3:23:32 AM PHP is a widely used and open source scripting language which designed for web development to build dynamic web pages. PHP Applications are normally hosted or found on Linux Servers. Its functionality same as Windows platform by Active Server Pages Technology.... [Read the full story] |
Ethical Hacking for Strong SecurityJan 7, 2010 - 12:53:55 PM Ethical hacking is a process that utilizes the same techniques that malicious hackers use, but for the purpose of assessing security threats to your organization’s information assets. Entities of all types (private businesses, government agencies, non-profit corporations, Hospitals, Universities, Etc.) need strong IT security now more than ever. It is imperative that IT security personnel learn “Black Hat” (malicious) hacking techniques in order to counter or prevent attacks on critical IT systems and assets.... [Read the full story] |
Search for articles: |
Latest Articles in All Categories |
Putting Up a Small Commercial Printing Business |
So You Might Be Unemployed And Desire To Become A San Francisco Real Estate Investor Now |
Meditation and Mindfulness: Dealing With Emotion |
CPA Websites: Five Essential Ideas for Composing Convincing Articles |
Set Goals In Order to Come Up With Your Action Plan |
Is the Air in Your Home Safe to Breathe? |
Coarse Fishing Tackle Review: The JW Young 13ft Trotter Rod |
Section 1031 Exchanges For San Diego Real Estate Investors |
Phoenix Real Estate Investing For Highest Possible Earnings |
Legendary are the Volk Racing TE37 Wheels |
Developing the Next Generation Wall Station (ChaseDesk™) for Healthcare - A Case Study |
What are step down transformers? |
Introducing Sharehype, the Revolutionary Tool for Online Marketers |
Rewards To Shopping For Austin Real Estate On The Web |
Hydroponics for Beginners |
Would you like submit your articles and have them approved on a priority status? Find out more about how you can become a Priority author for pennies a day! Click here.
Dime-co.com Home |
|
|
|
|
|
|
|
|
|
|
|
|
|
Disclaimer: Dime-Co.Com is an online information article and video article network. All articles, video articles, comments, and other features herein are for informational purposes only and are provided "as is" without warranties, representations or guarantees of any kind. The views and opinions expressed in an article, comments, links or blogs are the author's own, and not necessarily those of dime-co.com's owners. For full disclaimer, please read our TOS.