blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
2.2. Model of Operation Connected: An Internet Encyclopedia
2.2. Model of Operation

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 791
Up: 2. OVERVIEW
Prev: 2.1. Relation to Other Protocols
Next: 2.3. Function Description

2.2. Model of Operation

2.2. Model of Operation

The model of operation for transmitting a datagram from one application program to another is illustrated by the following scenario:

    We suppose that this transmission will involve one intermediate gateway.

    The sending application program prepares its data and calls on its local internet module to send that data as a datagram and passes the destination address and other parameters as arguments of the call.

    The internet module prepares a datagram header and attaches the data to it. The internet module determines a local network address for this internet address, in this case it is the address of a gateway. It sends this datagram and the local network address to the local network interface.

    The local network interface creates a local network header, and attaches the datagram to it, then sends the result via the local network.

    The datagram arrives at a gateway host wrapped in the local network header, the local network interface strips off this header, and turns the datagram over to the internet module. The internet module determines from the internet address that the datagram is to be forwarded to another host in a second network. The internet module determines a local net address for the destination host. It calls on the local network interface for that network to send the datagram.

    This local network interface creates a local network header and attaches the datagram sending the result to the destination host.

    At this destination host the datagram is stripped of the local net header by the local network interface and handed to the internet module.

    The internet module determines that the datagram is for an application program in this host. It passes the data to the application program in response to a system call, passing the source address and other parameters as results of the call.

                                    
   Application                                           Application
   Program                                                   Program
         \                                                   /      
       Internet Module      Internet Module      Internet Module    
             \                 /       \                /           
             LNI-1          LNI-1      LNI-2         LNI-2          
                \           /             \          /              
               Local Network 1           Local Network 2            

                            Transmission Path

                                Figure 2


Next: 2.3. Function Description

Connected: An Internet Encyclopedia
2.2. Model of Operation

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609