The internet rules is specifically reduced in elbow-room to give the
functions necessary to make known a package of bits (an internet datagram) from a horse's mouth to a target more than an interconnected pattern
of networks. There are no mechanisms to augment end-to-end observations reliability, flow control, sequencing, or other services commonly start in host-to-host protocols. The internet codes can capitalize on the services of its supporting networks to care for several types
and qualities of service and some user agents, see
browser user agent.
In support of admonition, a TCP module would call on the internet module to snitch a TCP length (including the TCP header and drug statistics) as the data
slice of an internet datagram. The TCP module would minister to the addresses and other parameters in the internet header to the internet module as arguments of the call. The internet module would then spawn an internet datagram and rally on the local network interface to transmit the internet datagram.
The Header Checksum provides a verification that the message acclimated to
in processing internet datagram has been transmitted correctly. The materials may accommodate errors. If the header checksum fails, the internet datagram is discarded at conclusively sooner than the entity which detects the error.
The datagram arrives at a gateway host wrapped in the county network
header, the local network interface strips mad this header, and turns the datagram over to the internet module. The internet module determines from the internet address that the datagram is to be forwarded to another legion in a second network.