Working of internet, Computer Networking

Assignment Help:

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer along with the IP address 5.7.7.8. The message you wish to send is "Hi computer 5.7.7.8!" Let's assume you've dialed in your ISP from home & the message must be transmitted over the phone line. Thus the message have to be translated from alphabetic text in electronic signals, transmitted onto the Internet, & then translated back into alphabetic text. How is this achieved? Through the use of a protocol stack. Every computer desires one to communicate on the Internet and usually it is built into the computer's operating system (that means Windows, Unix, etc.). On the Internet the protocol stack used is referred to as the TCP/IP protocol stack.

If we were to follow the path that the message "Hello computer 5.9.7.8!" took from our computer to the computer along with IP address 5.6.7.8, it would happen such as:

177_Working of INTERNET.png

Figure: Environment of the Packet Flow

1. The message would begin at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that the message passes through might break the message up in smaller chunks of data. It is because data sent over the Internet (and most computer networks) are sent in manageable chunks. These chunks of data are known as packets on the Internet,.

3. The packets would go through the Application Layer and continue to the TCP layer. Each of the packets is assigned a port number, which is used through program on destination computer to receive the message because it will be listening on a specific port.

4. After going through the TCP layer, packets proceed to the IP layer. It is where each of the packets receives at its destination address, 5.6.7.8.

5. Now that our message packets contain a port number & an IP address, they are ready to be sent on the Internet. The hardware layer is responsible for turning our packets having the alphabetic text of our message in electronic signals & transmitting them on the phone line.

6. On another end of the phone line your ISP have a direct connection to the Internet. The ISPs router verifies the destination address in each of packet and searched where to send it. Frequently, the packet's next stop is another router. More on routers & Internet infrastructure later on.

7. Eventually, the packets attain computer 5.6.7.8. Here, the packets begin at the bottom of the destination computer's TCP/IP stack & work upwards.

8. As the packets go upwards by the stack, all of the routing data that the sending computer's stack added (like IP address & port number) is stripped from the packets.

9. While the data reaches the top of the stack, the packets has been re-assembled in their original form, "computer 5.6.7.8!"


Related Discussions:- Working of internet

Intranet, Intranets are fundamentally "small" Internets. They employ the sa...

Intranets are fundamentally "small" Internets. They employ the same network facilities which the Internet does, however access is limited to a restricted sphere. For example, a com

What is nos, What is NOS? NOS, or Network Operating System, are special...

What is NOS? NOS, or Network Operating System, are specialized software whose major task is to give network connectivity to a computer in order for it to be able to converse wi

How to define a constant variable in java, How to define a constant variabl...

How to define a constant variable in Java? The variable should be declared as static and final. So only one copy of the variable exists for all instances of the class and the v

Projecr assingment, I have a project that need to be submit as soon as poss...

I have a project that need to be submit as soon as possible

Create a client and a server - message queues & socket, Lab will require yo...

Lab will require you to create a client and a server that communicate over either message queues, sockets, or a well known fifo. The data passed will be a simple request/response i

Interconnection networks and sorting, As in PRAM, there was no direct commu...

As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net

How to protect computer hardware by threats, How to protect computer Hardwa...

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

Whcih is the routing metric used by rip, Routing Information Protocol (RIP)...

Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd

Explain about traditional modems, Q. Explain about Traditional Modems? ...

Q. Explain about Traditional Modems? - Subsequent to modulation by the modem an analog signal reaches the telephone company switching station where it sampled and digitized to

Master construct program in parallel construct, master construct #incl...

master construct #include extern float average(float,float,float); void master_construct ( float* x, float* xold, int n, float tol )  { int c, i, toobig; floa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd