Net-Centric Computing and Information Systems

Net-CentricComputing and Information Systems

August21, 2014.

Youtubevideo (2012), How are IP Packets Routed on a Local Area Network?Retrieved from

Inthis case the video tutorial is about how IP packets are passed orforwarded from one node (router or machine) to another node in thesame local area network. In particular, the tutorial emphasizes aboutthe importance of network administrators to have a clearunderstanding on how IP packet are delivered effectively on the sameLAN. The video tutorial uses the example of small internetsub-netting in which network is created as a result of routingpackets from one node to the other within LAN (Youtube video, 2012).

Thetutorial further explains how Internets is as a result of severalnetworks that enhance the passage of packets data from one localnetwork to another built on the same IP addresses and how thisfacilitates effective packet routing. In addition, the tutorialexplains how each computer within LAN uses IP address to ‘subnetmask’ (determine) if the packets are sent to another computerwithin the same LAN or IP range (GibsonResearch Corporation, 2008).The tutorial is insightful as one understands how hackers use networkrouters to hack into internet user accounts by identifying thepackets and the IP address source. In this way, the hackers use therouting table to find ways of getting to the victim’s account.

Newlanguage learned and major technical terms

Privatenetwork-refers to a network that has private IP address and is used in homes,offices or local area network.

Broadcasting-This is a new term learned that is synonymous to computer networking-this means the transmission of packet data from one single hostidentifiable by a specific IP address to multiple receiverssimultaneously.

Packetswitching-Refers to how packets are routed and in some cases in different pathsand IP UDP addresses.

Subnetwork-Refers to the process of subdividing the IP network. Subnetting ofnetwork facilitates routing efficiency, enhance network trafficmanagement.

Anyareas of uncertainty left by the tutorial

Thetutorial was not clear on the aspect of link-layer address and howcommunication is enhanced between two host computers across localphysical network. In addition, the tutorial was not detailed on theEthernet networks, point to point networks and private networks.

Evaluationand experiences from the tutorial

Thevideo tutorial gives an insightful guide on how IP routing isenhanced and how office computers can be arranged to access internetfrom the same LAN. In particular, the tutorial has made a significantattempt in explaining how network and internet comes about (Youtubevideo, 2012). The tutorial is insightful and effective in explainingbasic aspects of computing and information systems and especially howIP address for work computers can be configured to enhance internetsecurity. In addition, the tutorial gives a vivid explanation oftechnical terms and language making the tutorial more insightful.However, the tutorial lacks more information on aspect of link-layeraddress and how communication is enhanced between two host computersacross local physical network. In addition, the tutorial does notclearly detail how Ethernet networks, point to point networks andprivate networks operates.

Tutorialspoint (2014), Network Layer Routing, from

Thistutorial gives significant details on network layer routing throughthe configuration of the routes to the preferred route. The tutorialalso explains how software can be used to enhance routing as well ashow multiple routing can be achieved (Gibson Research Corporation,2008). The tutorial also explains that, routing can be done throughconfiguration and dynamic learning (Tutorials point, 2014).

Newlanguage learned and major technical terms

Unicastrouting-refers to routing of network packets to known destinations in therouter tables.

Multicastrouting-In this case, routing of network packets is done only to specificnodes that want to receive such network packets.

Anycastrouting-Routingtakes place where multiple hosts have same logical address and whennetwork packets are received by one computer routing takes place toother computers that are near in the routing topology.

Anyareas of uncertainty left by the tutorial


Thetutorial is not clear on the explanation regarding routingalgorithms. In particular, the tutorial fails to give more detailsabout flooding and how this affects network packet forwarding. In thesame line the tutorial has limited information on shortest pathalgorithms such as Dijkstra`s algorithm, Bellman-Ford algorithm andthe Floyd Warshall algorithm (Tutorials point, 2014). One is leftwondering how the routing algorithm determines the cost and thenumber of hop counts in the routing network. Furthermore, thetutorial has limited information on hop count, bandwidth, metric,prefix-length and delay in relation to the influence they have onmultiple routing (Tutorials point, 2014).

Evaluationand experiences from the tutorial

Informationgained on multiple routing of network is significant on how severalcomputers can be configured to receive network from a single host(Gibson Research Corporation, 2008).The tutorial gives details on how to achieve efficient networkbroadcasting through unicast and multicast methods can be achievedacross a department in an organization or network configuration inbusinesses. The tutorial on network layer routing gives furtherinsight on how multiple network routing is achieved through variousways of broadcasting. In particular, the tutorial is helpful on theway it explains anycast and multicast network routing. However, thetutorial has limited information on routingalgorithms especially how flooding affects network packet forwarding.In the same line, the tutorial has limited information about shortestpath algorithms and how it influences layer-routing.


GibsonResearch Corporation. (2008). Open VPN: Step-By-Step ‘How-to’Guide.Retrieved from

Tutorialspoint (2014). Network Layer Routing. Retrievedfrom

Youtubevideo, (2012). How are IP Packets Routed on a Local Area Network?Retrieved from