When sending or receiving information, the gateway computer reads the destination address, and the packet continues forward to the next neighboring gateway to read the destination address as usual until a gateway confirms that the packet belongs to its nearest neighbor or other computers within the range, ultimately going directly to the computer at its specified address.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Every computer (host) on the network has at least one IP address to distinguish it from other computers on the network. When sending or receiving information (for example, an email message or a web page), the information is broken into several small pieces, called packets. Each packet contains the network addresses of the sender and receiver.
The gateway computer reads the destination address, and the packet continues forward to the next neighboring gateway to read the destination address as usual, and so on through the network until a gateway confirms that the packet belongs to its nearest neighbor or other computers within range. Eventually going directly to the computer at its designated address.
Extended information
IP protocol is mainly used to interconnect heterogeneous networks, such as interconnecting LAN and WAN (using X.25 technology). Although the low-level network protocols used in these two types of networks are different, LLC frames in the LAN and X.25 packets in the WAN can be exchanged with each other through IP in the gateway.
The frame formats and address formats of various networks are very different. TCP/IP unifies them through IP datagrams and IP addresses, and provides unified IP datagrams to the upper layer (mainly the transport layer). The difference between the lower-layer physical frames no longer exists for the upper-layer protocol, thus achieving the purpose of shielding the lower layer and providing consistency.
Although the IP protocol ensures that computers can send and receive datagrams, it is not responsible for solving security issues such as the reliability of datagram transmission. These security factors are mainly completed by the TCP protocol.
For more computer-related knowledge, please visit the FAQ column!
The above is the detailed content of How does the IP protocol realize communication between any two computers on the Internet?. For more information, please follow other related articles on the PHP Chinese website!