I wrote up a whole thing that didn’t post. There’s good answers here but I think that, like me, you wanted a more “voltage based” one.
Short answer is they don’t. Everything on the network is always listening, and security is based solely off of a handshake. Everything is always employing a fancy multimeter that measures voltage high/low as a 1/0 turning it from bits to bytes etc. The router listens to that and decides where to send it upstream, which it isolates from downstream.
For a realllllly basic example look at the modbus protocol. That’s also why industrial equipment folks get real touchy about network access. For things like computers, theres talk back and forth to verify. Modbus is just “if the byte is the thing I do the thing”. But fundamentally, that’s the physical basis: all devices are always listening, the TCP/IP stack is what tells them what to disregard.
FuglyDuck@lemmy.world 8 months ago
it doesn’t send it down the correct table. It sends it on.
Imagine your friends. you need to talk to somebody. Lets call him Garry. You don’t know Garry’s contact info. So instead, you pull out your phone, and text Sally, asking her to ask Garry if he knows where your glasses are. Sally pretty much knows every one. Or at least, you thought she did. Reality is she sent to to Becky who sends it on to Steve. Now, Steve is the one who invited Becky to Garry’s party, and because… reasons, Becky invited Sally who invited you… so now, Steve relays the question to Garry.
Garry hasn’t seen your glasses, but, he does have a weird set of car keys with a giant Charzard key fob… maybe they’re yours? So, he sends his reply to Steve, which forwards it to Becky, who sends it to Sally, who giggles and asks if you really have a charzard key fob.
You get the idea. Only unlike people, the data usually doesn’t get mangled.
swab148@startrek.website 8 months ago
Hey, Garry found my keys!
LainTrain@lemmy.dbzer0.com 8 months ago
Fair! Thanks