The Dawn of the Net Essay

In the video of warriors of the . net the whole way of accessing the internet is described, the devices which the information goes through in the form of packaged data, the summary is as follows:

When we enter a web address on the internet explorer it is considered as a package in which all the information is contained within it, as soon as we press the return button the packed data goes to the local area network commonly known as LAN where the packed data is guided to the router, router can be considered as a device which transfers the data to the different network which in turn goes to the corporate internet or sometimes can be called as the router switch from there it goes to the network interface.

From the network interface the packed data goes to the proxy which serves the purpose of sending the data to the internet it looks for the URL and is used by the companies for security purposes. Then it goes to the firewall which performs the main security purpose of blocking the unexpected data and let the desired data to go pass through it, than another router picks up the packaged data and moves it to the band width which performs the purpose of transferring the data from one place to another place, there can be many types of band width.

Finally the packed data goes to the world of internet and reaches to its destination, where the packed data is reopened and sends back the desired information in the same kind of packages which goes through all the way back through all the devices and reaches where it was started and hence we view the desired website or some other kind of information. The more summarized process is shows on the next page in the form of a diagram.

Read also  Networking Concepts

More Essays

  • Checkpoint Switching

    Packet switched networks move data in small blocks, or packets based on the destination address in each packet. When they are received the packets are reassembled in sequence to make up the message. Circuit switched networks rely on dedicated point-to-point connections during transmission. There are many...

  • Impacts of Data Classification Standards

    Through my research I have found three basic domains that are affected by the "internal use only" data classification standard. What I would like to discuss in this report addressing IT infrastructure is how these three domains are affected. I will be discussing the User Domain, Workstation Domain, and LAN...

  • Why Is It Impractical for an Organization to Own the Entirety of a Wan_

    Why is it impractical for an organization to own the entirety of a WAN? There are no limitations on WANs so they can be custom built for the size of the organization. Why is it favorable for an organization to maintain ownership of the entirety of the LAN? For the purpose of organizational...

  • Patton Fuller Community Hospital Request for Project

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital's current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas...

  • Backbone Network

    The chapter starts out explaining how a BN (Backbone Network) works. Backbone Network: Connecting all of the LANs of an organization entails another type of network (BN). A properly designed backbone network provides a high-speed circuit that serves as the central conduit across which the LANs of an...

  • The Ethical Hack Itself

    Once the contractual agreement is in place, the testing may start as defined in the agreement. It should be noted that the testing itself poses some risk to the customer, since a criminal hacker seeking the transmissions of the ethical hackers could learn the same information. If the ethical hackers...

  • ´╗┐protocol Numbers

    Protocol numbers are used to configure firewalls, routers, and proxy servers. In Internet Protocol version 4 (IPv4, Request for Comments [RFC] 791I), the protocol number can be found in the Protocol field of an IP header.ICMP Echos are used mostly for troubleshooting. When there are 2 hosts which have...

  • Networking Concepts

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro's and con's. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other...

  • Internet Connections

    The security implications of sharing Internet connections between FTD employees and stuff must be strong in order to assure safety for both the clients and the employees. The main security issue such as data access must be implemented in such a way that the privilege given to the FTD employees which is...

  • Project Network Design

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation's data and provide accessibility to employees and the public. The private-public network edge is...

Read also  Performing Protocol Captures