You are on page 1of 2

The Dawn of the Net

This film shows how the internet processes the data and how can we able to access through the
net. This shows the stages or phases of the data being accessed and screened for security
purposes. When a user type www.google.com, what is done first s through the TCP ( Transfer
Control Protocol) packet. This is made for specific purposes like as a message makes its way
across the Internet, TCP operates at a higher level, concerned only with the two end systems, for
example a Web browser and a Web server. In particular, TCP provides reliable, ordered delivery
of a stream of bytes from a program on one computer to another program on another computer.
Besides the Web, other common applications of TCP include e-mail and file transfer. Among
other management tasks, TCP controls segment size, flow control, and data exchange rate.
Second is through the ICMP (Internet Control Message Protocol) ping packet. The ICMP server
executes on all IP end system computers and all IP intermediate systems (I e routers). The
protocol is used to report problems with delivery of IP data grams within an IP network. It can be
sued to show when a particular End System (ES) is not responding, when an IP network is not
reachable, when a node is overloaded, when an error occurs in the IP header information, etc.
The protocol is also frequently used by Internet managers to verify correct operations of End
Systems (ES) and to check that routers are correctly routing packets to the specified destination
address. Third is the Ping of Death is a type of attack on a computer that involves sending a
malformed or otherwise malicious ping to a computer. A ping is normally 56 bytes in size (or 84
bytes when IP header is considered); historically, many computer systems could not handle a
ping packet larger than the maximum IP packet size, which is 65,535 bytes. Sending a ping of
this size could crash the target computer. Fourth is the Router is a device that interconnects two
or more computer networks, and selectively interchanges packets of data between them. Each
data packet contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one network
to another. Where multiple routers are used in a large collection of interconnected networks, the
routers exchange information about target system addresses, so that each router can build up a
table showing the preferred paths between any two systems on the interconnected networks. Next
is the Router Switch is a type of a router located in the middle of a Multiprotocol Label
Switching (MPLS) network. It is responsible for switching the labels used to route packets.
When an LSR receives a packet, it uses the label included in the packet header as an index to
determine the next hop on the Label Switched Path (LSP) and a corresponding label for the
packet from a look-up table. The old label is then removed from the header and replaced with the
new label before the packet is routed forward. Last is the Proxy server, is a server (a computer
system or an application program) that acts as an intermediary for requests from clients seeking
resources from other servers. A client connects to the proxy server, requesting some service,
such as a file, connection, web page, or other resource, available from a different server. The
proxy server evaluates the request according to its filtering rules. For example, it may filter
traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the
resource by connecting to the relevant server and requesting the service on behalf of the client. A
proxy server may optionally alter the client's request or the server's response, and sometimes it
may serve the request without contacting the specified server. In this case, it caches responses
from the remote server, and returns subsequent requests for the same content directly.