L32 - Tunneling An IP datagram can be tunneled through a...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Tunneling An IP datagram can be tunneled through a subnetwork that has a different protocol, such as a virtual circuit ATM network. The multiprotocol router inserts the IP datagram in a WAN network layer packet addressed to the multiprotocol router on the destination network. This destination network router removes the datagram and delivers it by the IP address to Host 2.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Global Addressing This is a two-level hierarchy. It tends to waste a great deal of addresses. (We will look more at Internet addressing strategy, but first let’s look at the transport layer protocols (Chapter 6), then come back to Chapter 5.)
Background image of page 2
The most important transport layer protocol for reliable communication is TCP (Transport Control Protocol.) In the IP datagram, its header follows the IP header: TCP at the source assembles bytes at a source to make up a “segment” of reasonable size. It makes sure the bytes arrive correctly and
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 13

L32 - Tunneling An IP datagram can be tunneled through a...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online