Warrior Of The Net (description)
-This is a good video that show how the internet work. This video show what happen inside the network when you type an URL or web address to surf the internet. how the URLs that you types in address bar is sent to the server until the information you requested displayed in your computer monitor.
When user clicks the links or enters URL in the web browser,
the information is going to the lower level of the OSI model and break into
parts of a certain size in bytes called packets. In the lower level, IP
(internet protocol), is responsible for labeling each packets with the
information such as sender address, receiver address and the type of packet it
is. The packet also gets an address for the Proxy Server. Each packet is
limited in its size and the size of each packet also different with each other
according to the transmission media in the network and the type of service. The
packets then send through the wire of Local Area Network or LAN. All the local
network such as computers, routers, printers and other is connected to this
network and using the same wire for information exchange within the physical
walls of the building. The LAN is packed with all types of information such as
IP packets, Novell packets, Apple Talk packets. Here, the role of the local
router is to reads the address of the packets and if necessary route the packet
onto another network route. Router has the map of the Internet in its memory
which is the complete map of its network neighborhood. The packet may pass
through several routers on the way to its destination. When, the packets leave
the router, the packets then head to the router switch before enter the
internet network.
When the packets arrive at their destination, the network
interface will pick up the packets to be sent to the proxy. The proxy is
responsible to lessen the load of the internet connection and also for the
security reason. The proxy will filter which packet is allowed to the internet.
The proxy will opens the packet and looks for the WEB address and URL. Based on
the information or the configuration of that proxy, the packets that not meet
the criteria will be destroyed and for the packets that approved by proxy will
be continuing their journey.
After that the packets will go through the fire wall. The
fire wall serves two purposes which is prevents some other nasty thing from
internet from coming into the intranet and also can prevent sensitive data from
being sent out to the internet. In short, fire wall is responsible in
controlling what is going to internet and what is allowed to enter the
intranet. Here, packet sometimes lost and when it happens, the browser resends
the replacement packet.
And now, the packets enter the world of the Internet. Here,
the routers and switches establish links between networks. The path that the
packets take can be different which is maybe via satellite, telephone lines,
wireless or cable under ocean. The packet will be routed based on the routing protocol
that being used.
Near the end of the packet destination, there is another wall
that controls the packet that come in and come out. The fire wall is designed
to let in only those packets that meet its criteria. From this example, the
fire wall is operating on port 80(HTTP) and port 25(SMTP) only. The packets
that attempt to enter other than port 80 and port 25 are not allowed to pass
through.
The packets that meet the criteria will be taken to the web
server. Web server will open and unpack the packets and look up for information
that contained which is the request from user. The packets then recycled and
filled with the requested information that will be sent to the user who request
the information based on the sender address. Here, the process is reversed
until the information arrives and displayed onto sender interface.
here is the text file of what have been said in the video: Dawn of the Net
No comments:
Post a Comment