Working of internet, Computer Networking

Assignment Help:

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer along with the IP address 5.7.7.8. The message you wish to send is "Hi computer 5.7.7.8!" Let's assume you've dialed in your ISP from home & the message must be transmitted over the phone line. Thus the message have to be translated from alphabetic text in electronic signals, transmitted onto the Internet, & then translated back into alphabetic text. How is this achieved? Through the use of a protocol stack. Every computer desires one to communicate on the Internet and usually it is built into the computer's operating system (that means Windows, Unix, etc.). On the Internet the protocol stack used is referred to as the TCP/IP protocol stack.

If we were to follow the path that the message "Hello computer 5.9.7.8!" took from our computer to the computer along with IP address 5.6.7.8, it would happen such as:

177_Working of INTERNET.png

Figure: Environment of the Packet Flow

1. The message would begin at the top of protocol stack on your computer and work its way downward.

2. If the message to be sent is long, every stack layer that the message passes through might break the message up in smaller chunks of data. It is because data sent over the Internet (and most computer networks) are sent in manageable chunks. These chunks of data are known as packets on the Internet,.

3. The packets would go through the Application Layer and continue to the TCP layer. Each of the packets is assigned a port number, which is used through program on destination computer to receive the message because it will be listening on a specific port.

4. After going through the TCP layer, packets proceed to the IP layer. It is where each of the packets receives at its destination address, 5.6.7.8.

5. Now that our message packets contain a port number & an IP address, they are ready to be sent on the Internet. The hardware layer is responsible for turning our packets having the alphabetic text of our message in electronic signals & transmitting them on the phone line.

6. On another end of the phone line your ISP have a direct connection to the Internet. The ISPs router verifies the destination address in each of packet and searched where to send it. Frequently, the packet's next stop is another router. More on routers & Internet infrastructure later on.

7. Eventually, the packets attain computer 5.6.7.8. Here, the packets begin at the bottom of the destination computer's TCP/IP stack & work upwards.

8. As the packets go upwards by the stack, all of the routing data that the sending computer's stack added (like IP address & port number) is stripped from the packets.

9. While the data reaches the top of the stack, the packets has been re-assembled in their original form, "computer 5.6.7.8!"


Related Discussions:- Working of internet

Define remote procedure call (rpc), RPC adumbrates the intricacies of the ...

RPC adumbrates the intricacies of the network by using the ordinary procedure call mechanism familiar to each programmer. A client process calls a function on a remote server and

Ethernet fields, ETHERNET FIELDS:  In Ethernet fields the preamble and...

ETHERNET FIELDS:  In Ethernet fields the preamble and CRC is usually not given in frame. The destination address of each is the broadcast address. There is special value reser

Discuss on the characteristics of agents, Question 1 Discuss on the cha...

Question 1 Discuss on the characteristics of agents 2 Belief, Desire and Intention architecture is the most popular agent architecture. Procedural Reasoning System (PRS) is

Internet protocols, A communication protocol is an agreement which specifie...

A communication protocol is an agreement which specifies a common language two computers use to exchange messages. For instance, a protocol denotes the exact format and meaning of

Error correction in burst error correction, Q. Error Correction in Burst Er...

Q. Error Correction in Burst Error Correction? Error Correction-Burst Error Correction In its place of sending all the bits in a data unit together we can organize "N

Shortest path tree and minimum-spanning tree, We studied Dijkstra's link-st...

We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these

Determine the task which should intranet require, Determine the task which ...

Determine the task which should intranet require Intranet to work smoothly, the following tasks should be properly synchronised: All computers connected together in a n

Spanning tree protocol - ccna, Perform Basic Switch Configurations Step...

Perform Basic Switch Configurations Step 1: Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has

Control - transport layer, Control This field  defines 6 different  co...

Control This field  defines 6 different  control  bits or  flags. These bits  enable flow  control  connection  establishment  and termination connection abortion and the mode

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd