Você está na página 1de 2

Xavier University

College of Engineering
Electronics Engineering Department

Experiment Number: 1
Dawn of the Net



Name: Calam, Ramon Cristopher M. Date Performed: November 19, 2013
Subject: COM05 L Date Submitted: November 26, 2013







Remarks:

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________


Engr. Ian Giovanni R. Pabillaran
Instructor
I. Objectives

To be able to understand and extract information about the world of internet.
To be able to understand the flow of information thru or from the internet.
To be able to identify basic network layer components in the internet.

II. Discussion
The video presented, The Dawn of the Net explains the basic and the most
fundamental idea behind the processes involved on the question asking how the information is
being sent through or from the internet. It also explains the function of the components found
in the network layer (TCP Packet, ICMP Ping Packet, and UDP Packet, The Router, Ping of Death
and the Router Switch).
Data from the individual computers in the network are packaged as packets, labeled and sends
to the medium which is comparable to the. Each packet are labeled with the senders address,
receivers address and type of packets used and then launched to LAN. The LAN connects all the
local computer, routers, printers etc. for information exchange in the network. Now the local
router reads the address and if necessary sends the packet to another network. Router is a
control that is very systematic. As the packets leave the router, they make their way into the
internet through the proxy. The Proxy is used to lessen the load of internet connection. In the
proxy, various security checks are perform to ensure that the connections are secure. The proxy
opens the web packet and then looks for the web address or URL and then are transmitted into
the internet.
Packets of different sizes and type flow across the internet highway. For those who
make it through the internet and to the destination, the packet encounters the firewall which
prevents nasty things from the internet from coming into the intranet and prevents sensitive
corporate information from being sent out onto the internet. The firewall is designed to let in
only those packets that meet its criteria. The firewall determines which port are opened for
communication and which are not. Once a packet is allowed to enter through the firewall, the
packets are screened more thoroughly preventing Ping of Death (dangerous packets) to enter.
After passing through the firewall, the packets are lined up to the interface to be taken by the
Web Server. The packet then is recycled ready to be send back filled with requested
information.

Você também pode gostar