Presented by Rebecca Meinhold But How Does the Internet Work?

Slides:



Advertisements
Similar presentations
Everything.
Advertisements

CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
CCNA 1 v3.1 Module 11 Review.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Everything. MACIP End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: MACIP MACInterfaceMACInterface.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture 8 Modeling & Simulation of Communication Networks.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Process-to-Process Delivery:
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Examining TCP/IP.
Mr C Johnston ICT Teacher
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Network Services Networking for Home & Small Business.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
TCP/IP Protocols By: Patrick Moore Nykoya Watson Andre Wiggins.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
How Information Flows via the Internet By: Lee Farrell.
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
© 2003, Cisco Systems, Inc. All rights reserved.
LESSON Networking Fundamentals Understand TCP/IP.
A quick intro to networking
Due: a start of class Oct 12
Lec 2: Protocols.
How data travels through a network The Internet
Network Architecture Introductory material
Encapsulation/Decapsulation
How Data Flows through the Internet
Review of Important Networking Concepts
I. Basic Network Concepts
Process-to-Process Delivery:
Review of Important Networking Concepts
When you connect with DHCP, you are assigned a
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
CSE 313 Data Communication
Networking Essentials For Firewall-1 Administrators
Network and the internet
INFORMATION FLOW ACROSS THE INTERNET
Kyle Broussard, Alexandra Mikolai,
Review of Important Networking Concepts
Presentation transcript:

Presented by Rebecca Meinhold But How Does the Internet Work?

Let’s get started with the basics

First thing you need to know is that every computer has an IP address There are TWO ways in which a computer gets an IP address: A computer administrator will manually set the IP address to the machine The Dynamic Host Control Protocol (DHCP) server is responsible for assigning IP addresses to all computers on the network

There are two different types of IP addresses

Your computer Your router/ domain name server Google’s IP address A request is sent to the router to find out the IP address of the domain name Here is where the domain name is converted into it’s IP address Once the IP is known, the DNS server sends an HTTP GET request to Google’s particular IP google.com HTTP GET request

MAC addresses are added in the data link layer before the packet heads to the physical layer In the network later, information related to source & destination IP addresses are are added and then are sent to the Data Link layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer HTTP GET request Packet Requests are encapsulated in the form of transport layer packets and then are sent to the network layer

Two protocols operate in the Transport Layer: UDP TCP User Datagram Protocol Transmission Control Protocol Ensures that the packet is not larger than the largest protocol data unit in the path located between your computer and the destination Offers a limited amount of service when messages are exchanged between computers in a network that uses IP

The router searches it’s cache for the packets host address, when found, it forwards the packet to it’s destination Packet Your computer Router Destination Packet When the packet leaves your computer, the MAC Address of the router in which your packet is being transferred to is used as the packets destination MAC Address

The following slide will show the process that the packet goes through while traveling to it’s destination

HTTP GET Request is passed to the application listening on the port Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Packet IP address checks and check-sum verifications are done before passing to the transport layer The MAC address is checked to see if the packet is at the correct destination

The response is then formed and transmitted back in the same way that it came in