Input Keyboard/Mouse Write the email message, or request email message. Computer Data storage, manipulation, & retrieval. Store and retrieve the email.

Slides:



Advertisements
Similar presentations
UNIT 13 Time Clauses. How do we show the time relationship between two sentences? We often use time words like: When Until Before After As / While Once.
Advertisements

Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Chapter 9 Using Telephone and Cable Networks for Data Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
DSL ADSL Protocols Security Wi-Fi Cable vs ADSL
Information and Communication Unit 5, Lesson 4 Explanation Presentation © 2011 International Technology and Engineering Educators Association, STEM.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
The internet and the WWW
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Transmission Control Protocol Internet Protocol TCP/IP.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Unit 4, Lesson 11 How Data Travels the Internet
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Network Hardware. Where does internet come from?
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Computer Concepts 2014 Chapter 5 Local Area Networks.
HOW THE INTERNET WORKS. NOTES (DNEWS) Interconnected network of computers – The Internet Servers - hosts They store websites and transfer data to clients.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Communication, Networks, The internet and the Worldwide Web.
Ch 1. Computer Networks and the Internet Myungchul Kim
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
Presented by Rebecca Meinhold But How Does the Internet Work?
D. Beecroft Fremont High School Networks.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Chapter 3.  Upon completion of this chapter, you should be able to:  Select and install network cards to meet network connection requirements  Connect.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
TOPIC 3 DATA TRANSMISSION AND NETWORKING MEDIA. INTERNET SERVICE PROVIDER (ISP) also known as Internet Access Provider (IAP) It is a company that offers.
science/internet-intro
Network HARDWARE What HARDWARE do you think you need to connect to a Local Area Network??
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
Networking Components Assignment 3 Corbin Watkins.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Visit for more Learning Resources
Networking for Home and Small Businesses – Chapter 6
How data travels through a network The Internet
Wednesday, September 19, 2018 What Is the Internet?
Networking for Home and Small Businesses – Chapter 6
How Does Data Travel the Internet?
Modelling the internet
Modelling the internet
How Our Customers Communicate With Us
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
WJEC GCSE Computer Science
Presentation transcript:

Input Keyboard/Mouse Write the message, or request message. Computer Data storage, manipulation, & retrieval. Store and retrieve the application software. Encapsulation is encapsulated using SMTP into packets, or packet request sent via POP3/IMAP. Firewall Packets are checked against filters for access, both upwards and downwards, on the stack. Local Router/ Modem Routes data from the correct computer to the DSLAM, headers attached. DSLAM Digital Subscriber Line Access Multiplexer. Each DSL signal is filtered and routed to the correct ISP. ISP/SMTP The ISP sends the to an SMTP server which pulls the address out of the message and sends it to the DNS, once an address is found it sends it to the destination SMTP server. Regional Routers/Backhaul Providers Packets are routed to the correct destination. Location Router/Modem Router confirms packet retrieval and strips header. Firewall Packets are checked against filters for access, both upwards and downwards, on the stack. De-encapsulation Packets are De- encapsulated. Headers stripped, and message retrieved. SMTP/POP/IMAP Server/Computer Server determines message location, stores it and/or sends it back up the stack to further locations. ISP/DNS The DNS gets the IP address of the destination server and sends it back to the SMTP Server. Note: There may be additional DSLAMs, and routers, before reaching destination.

Wireless Device User inputs a request for a video stream. Encapsulation Wireless device encapsulates request in packets with headers and encrypts with WPA. Then sends the packet via Wi-Fi to the router. Wireless Router Receives encrypted packet, decrypts with appropriate WPA keys and strips headers. Packets are checked against filters for access, both upwards and downwards, on the stack. Firewall Packets are checked against filters for access, both upwards and downwards, on the stack. De-Encapsulation Packets are stripped of headers and de- encapsulated Computer/Server Reads message and acknowledges receipt by sending video stream. Encapsulation Stream is encapsulated into packets and sent to the router. Packets are checked against filters for access, both upwards and downwards, on the stack. Firewall Packets are checked against filters for access, both upwards and downwards, on the stack. Wireless Router The router places headers on the packets then broadcasts then via WPA encrypted Wi-Fi Omni-directionally. De-Encapsulation The wireless device receives the broadcast, decrypts the packets, strips the headers, and plays the video stream.