Tip:
Highlight text to annotate it
X
A vital area of the internet is the IP address or internet protocol.
Without this, the Internet would not work because all the numbers will be interpreted as utter gibberish!
This is in simple terms a location pointer that tells any packet where its destination is.
Like a Post Office but without most of the hassle and open 24-7.
They send data in
packets.
There are 5 types of IP Address.
A point to remember. The IP ranges in the ovals relate to the first
digit on the left of an IP address.
Class A
This is the preferred choice of businesses due to its flexibility.
Can even be broadcast to potential customers or be kept private from the sneaks!
Both classes B and C are open to the general public
therefore common IP addresses are likely to range
between classes B and C. Class D is used for multi-casting.
Mostly video conferencing. Class E is used for experimentation.
No it's not used to
experiment with ninjas!!
Who comes up with these ideas?!!
In the simplest form the internet is a collection of communications between the host and
the user.
Before the communications can start there are a number of areas that the host must know
including the address of the sender.
That's when the TCP packet comes in!
This contains the information the host needs in order to send the content.
This also contains information on
what application a particular file was created in and
which app would be suitable for opening it.
3 TCP packets are sent to the host as part of a handshake routine.
This is when the first packet's IP address should be the same as the IP address
of the third packet.
This is to ensure that the packet is not misinterpreted as a denial of service attack!
Before the packets get sent
they're encrypted.
This is when the packet's data gets converted into binary to ensure that any sneaks
have a hard time interpreting the data! Aghh! Whyyyyyyyyyy!
Oh! I hope he had a parachute!
Anyway!
The only location that the packet can be decrypted is the users themselves.
This is when according to ASCII standards
it will change the coding back to how the user wanted the packet's information to look like.
Armed with the host's IP address, the packets start their journey by entering the LAN
This is where a variety of packets travel within the walls of the building
for example a house.
Moving on the packets firstly go through a router.
This simply checks the packets and their destination if needed
it moves the packet onto another network. Router Switches also direct the packets to their destinations
However,
there are some mistakes!
Whoa!! That's 2 that need a parachute now!! That looked like a long
way down!!!
Next these packets move to the proxy.
This is used to lessen the light of the internet connection and quite sensibly
for security reasons as
well. They check the web address or URL to see if it conforms
to the standards that the proxy's user for example a business has decided.
If it does not conforms to those standards (Can anyone translate this?) it becomes a very
grizzly ending
indeed!!
Huh?!
What's this gibberish?!
You're fired!!!
Oh dear!
The dangers of drink typing eh?
The webserver has the capability to run almost anything. It basically powers
the web!
It allows users to create websites and host them on servers making them available to the public.
The sites are also given a URL address to make their site easily available to the public because
numbers could be quite hard to remember for website addresses.
Webservers can handle multiple file types. This is where the packets go to
find the information that the user's computer requested from the clients computer.
No!!! I didn't request a ninja!! Ugh!!
But I haven't paid off my student loan yet!!
Whyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy!!
To protect people from the crooks of the computing world, firewalls were created.
They only let in packets that meet its
criteria.
Port 80 is used for packets from the internet
and port 25 is used for mail packets.
Any other
packets get incarcerated! Hot! Hot! Hot! Hot! Hoooooooottttttt!
Then the packets enter the final phase of their journey.
They enter the client's interface where the packets are received,
decrypted and then filled with the clients requested information.
They then repeat the journey the clients packets went thought to reach the user's computer. And
there you have it!
How the internet works! Subtitle caption by Andrew Franks