Working of internet, Computer Networking

Assignment Help:

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer along with the IP address 5.7.7.8. The message you wish to send is "Hi computer 5.7.7.8!" Let's assume you've dialed in your ISP from home & the message must be transmitted over the phone line. Thus the message have to be translated from alphabetic text in electronic signals, transmitted onto the Internet, & then translated back into alphabetic text. How is this achieved? Through the use of a protocol stack. Every computer desires one to communicate on the Internet and usually it is built into the computer's operating system (that means Windows, Unix, etc.). On the Internet the protocol stack used is referred to as the TCP/IP protocol stack.

If we were to follow the path that the message "Hello computer 5.9.7.8!" took from our computer to the computer along with IP address 5.6.7.8, it would happen such as:

177_Working of INTERNET.png

Figure: Environment of the Packet Flow

1. The message would begin at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that the message passes through might break the message up in smaller chunks of data. It is because data sent over the Internet (and most computer networks) are sent in manageable chunks. These chunks of data are known as packets on the Internet,.

3. The packets would go through the Application Layer and continue to the TCP layer. Each of the packets is assigned a port number, which is used through program on destination computer to receive the message because it will be listening on a specific port.

4. After going through the TCP layer, packets proceed to the IP layer. It is where each of the packets receives at its destination address, 5.6.7.8.

5. Now that our message packets contain a port number & an IP address, they are ready to be sent on the Internet. The hardware layer is responsible for turning our packets having the alphabetic text of our message in electronic signals & transmitting them on the phone line.

6. On another end of the phone line your ISP have a direct connection to the Internet. The ISPs router verifies the destination address in each of packet and searched where to send it. Frequently, the packet's next stop is another router. More on routers & Internet infrastructure later on.

7. Eventually, the packets attain computer 5.6.7.8. Here, the packets begin at the bottom of the destination computer's TCP/IP stack & work upwards.

8. As the packets go upwards by the stack, all of the routing data that the sending computer's stack added (like IP address & port number) is stripped from the packets.

9. While the data reaches the top of the stack, the packets has been re-assembled in their original form, "computer 5.6.7.8!"


Related Discussions:- Working of internet

Recognize the definition of demarcation, Demarcation is the point in which ...

Demarcation is the point in which responsibility changes hands.

Job of designing the new network layout, You have been tasked with the job ...

You have been tasked with the job of designing the new network layout for R2I's new location. R2I has a fractional T1 line that enters the premises at Site B. You can use: 1

How to perform basic switch configurations-ccna, How to Perform Basic Switc...

How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

The application layer - fundamentals of networks, The application layer ...

The application layer This  layer enables users  to access the  network  by providing  a few  services to the user some of the protocols and services available to the  user ar

Command Necessary to enter the extended ping command , Determine the comman...

Determine the command mode necessary to enter the extended ping command Ans) Router#

Verify passwords - ccna, Verify Passwords Step 1 : Telnet to the route...

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Process switching and fast switching, Process Switching It applies the...

Process Switching It applies the brute force method to switch packets wih consumption of large amount of CPU time List of items are needed when switching packets Routing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd