Based on my analysis, the main objective of the video clip is to discuss clearly, systematically and easily the flow of information in a computer network to the internet, and to give the viewer a deeper understanding about different networking terminologies, components and processes. As an IT student, it is very important for us to know what was really happening to the information we are working with in a computer network. The clip removed all my doubts and questions in mind like “How it is possible to communicate from a far distant country through the use of computers? How information was transmitted from the computer to the internet? And is that all really possible?”Well, yes it is. And here is how the warriors of the net works: When we click a hyperlink on a computer or in a website on the internet in form of alpha-numeric, first, it is converted into ones and zeros or binary form.
Once we click on a hyperlink, the flow of information begins. The information in form of binary was managed by the IP. Before the information was sent on its way to the network, the sender’s address, receiver’s address, proxy server address and the type of packet containing the information is modified and attached together in a packet. The clip also shows how collision takes place. Collision is mainly the reason why interruption in a computer network or internet connection exists. When there are so many packets or requests for information from different workstations, just like in a public road with too many cars on it, which can cause a traffic and sometimes accident.
That is the reason why some of our request for information fails, whether in a LAN or internet connections. A router will read the packets and pick those packets that are necessary to workstations connected to him and just leave those unnecessary packets to other networks. Router will locate the packets to different paths where they are meant to meet the router switch. The router switch will determine the route of the packets. From the router switch the packets will be headed from a Network Interface to the proxy. The proxy’s main task is to lessen the load of the internet connection and for security measures as well. The proxy will check if the web address or URL is acceptable or not. Those packets that are accepted by the proxy will be heading their way to the firewall, and those who will not be accepted will be simply dumped by the proxy.
After the firewall, another router will pick-up the packets and transfers these packets into a bandwidth where not all of them will be accepted to enter the spider web of interconnected networks or the internet. Nearly to the web server there is another firewall that will determine the port where the packet is addressed. The firewall will scan all the packets and eliminate those pings of death or unwanted ping packets. After the last firewall, the packets will be received by the web server application, and from there, your requested information will be sent back to you and travel the same way your request does. Imagine how this process of transferring information happens in just a few seconds. Somehow, it is quite convincing that in the dawn of the net, almost anything is possible. Thank you for reading!