blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
Model of Operation Connected: An Internet Encyclopedia
Model of Operation

Up: Connected: An Internet Encyclopedia
Up: Programmed Instruction Course
Up: Section 3 - The IP Protocol
Prev: Datagrams and Streams
Next: IP Packet Structure

Model of Operation

Model of Operation The next several reading selections come from RFC 791, IP's Protocol Specification.

Remember that IP's primary task is the delivery of data packets from one location to another.


The model of operation for transmitting a datagram from one application program to another is illustrated by the following scenario:

    We suppose that this transmission will involve one intermediate gateway.

    The sending application program prepares its data and calls on its local internet module to send that data as a datagram and passes the destination address and other parameters as arguments of the call.

    The internet module prepares a datagram header and attaches the data to it. The internet module determines a local network address for this internet address, in this case it is the address of a gateway. It sends this datagram and the local network address to the local network interface.

    The local network interface creates a local network header, and attaches the datagram to it, then sends the result via the local network.

    The datagram arrives at a gateway host wrapped in the local network header, the local network interface strips off this header, and turns the datagram over to the internet module. The internet module determines from the internet address that the datagram is to be forwarded to another host in a second network. The internet module determines a local net address for the destination host. It calls on the local network interface for that network to send the datagram.

    This local network interface creates a local network header and attaches the datagram sending the result to the destination host.

    At this destination host the datagram is stripped of the local net header by the local network interface and handed to the internet module.

    The internet module determines that the datagram is for an application program in this host. It passes the data to the application program in response to a system call, passing the source address and other parameters as results of the call.

                                    
   Application                                           Application
   Program                                                   Program
         \                                                   /      
       Internet Module      Internet Module      Internet Module    
             \                 /       \                /           
             LNI-1          LNI-1      LNI-2         LNI-2          
                \           /             \          /              
               Local Network 1           Local Network 2            

                            Transmission Path

                                Figure 2


Next: IP Packet Structure

Connected: An Internet Encyclopedia
Model of Operation

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609