Sie sind auf Seite 1von 5

REACTION PAPER IN COMPUTER NETWORKS THE DAWN OF THE NET

Submitted by: Binhaon, Ryza Grail Inohiaban, Ariel Paga Ruther Ford

Submitted to: Mr. Jordan T. Colcol

How Does the Internet Work?

Many scientific and technological advances mark the beginning of the twentieth century. These advances include inventions such as the airplane, the television, and most especially the computer. As time passes by, things in the computer also take its advance. Internet became the ultimate breakthrough ever happened with computers. It is a worldwide network of computer networks that connects university, government, commercial, and other computers in over 150 countries. There are thousands of networks, tens of thousands of computers, and millions of users on the Internet, with the numbers expanding daily. It is the superhighway of unimaginable number of information that creates what we call the cyberspace. Working with the internet makes our work easier and faster but what happens when we do such work, here it is The information travels down to your personal mail room where your IP packages it labels it and send it on its way. Each packet is limited in its size; the mail room must decide how to divide the information and how to package it. Now a packet needs a label containing important information such as senders address, receivers address and the type of package you need. Because this particular packet is going out onto the internet it also gets its address from the proxy server which is a special function. The package is now launch on to your local area network or LAN, this network is used to connect all local computers routers for information exchange within the visible walls of the building. The LAN is a pretty uncontrolled placed in unfortunately accidents can happen. The highway of the LAN is packed with all types of information this is your IP packets, ICMP ping packets, and UDP packets they go against traffic as usually. The local router reads the address and if necessary leaves the packet unto another network called the router, a symbol of control in a seemingly disorganized world.

As the packets leaves the router they make there way into the corporate internet and head for the router switch a bit more efficient than the router, the router switch plays fast and loose with IP packets definitely routing them along their way. As packet arrives at their destination theyre picked up by the network interface ready to be sent to the proxy. The proxy is use for in order to lessen the load of internet connections and for security reasons as well. The proxy opens the packets and looks for the web address or the URL depending upon whether the address is acceptable the packet is sent on to the internet . However there are some addresses that dont meet with the approval of the proxy that is to say corporate or manageable guidelines these are scenery dont live. Next up the firewall the corporate firewall serves two purposes it prevents some whether nasty things from the internet coming into the internet and it can also prevent sensitive corporate information from being sent out onto the internet. Once through the firewall a router picks up the packet and places it in newer road or a bandwidth but the road is not broad to take them all. Now when IP doesnt receive an acknowledgement that the packet has been received in due time it simply sent a replacement packets. Now the packets enter to the world of the internet, an internet is like a spider web of interconnected between networks; Here here plenty routers of and switches plenty of establish links networks. space,

opportunities, plenty of things to explore and place to go things though very little control and regulation. But because of this freedom certain dangers also lurk, youll never know when you meet the dread pain of death. The paths the packets take maybe via satellites, telephone lines, wireless or even cables. They not always take the fastest or shortest way as possible but they will get there. Near the end of their destination well find another firewall, depending upon your perspective as a data packet the fire wall is design to let in only those packets that meet its criteria.

This firewall is up for port 80 and port 25. All attempts to enter other ports are closed for business. Port 25 is use for mail package while port 80 is the entrance for packets of the internet to the web server. Inside the firewall some packets make it easily through customs and fire wall officers is not easily fooled such as it destroys a ping of death packet tries to disguise itself as a normal ping packet. For those packets lucky enough to make this far the journey is almost over its just a line up in the interface to be taken up into the web server . One by one the packets are recived, open and unpacked the information they contain that is your request for information is sent on to the web server application. Thepackets itself is recycled ready to be used again and filled with your requested information. For those packets lucky enough to make this far the journey is almost over its just a line up in the interface to be taken up into the web server . One by one the packets are recived, open and unpacked the information they contain that is your request for information is sent on to the web server application. Thepackets itself is recycled ready to be used again and filled with your requested information.

REACTION/CONCLUSION

Computer alone can make your work easier, faster, and fun. Putting internet on it would make the computer do more incredible and exciting things. Every time you do something on the internet or click something on it, the information you requested will undergo various steps then eventually pops out to your computer window. During the process, some information that are considered nasty or sensitive corporate information can be destroyed or removed.

Das könnte Ihnen auch gefallen