0% found this document useful (0 votes)
57 views2 pages

Xavier University - Ateneo de Cagayan University College of Engineering Electronics Engineering Department

The documentary shows the process of how information travels on the internet. It follows TCP packets as they are packed with data and sent to routers for delivery. Various protocols and systems work together to transport data, screen for unacceptable content, and direct packets to their destinations. The film provides insight into the "warriors" that make up the internet, such as TCP, routers, firewalls, and proxy servers. It illustrates how quickly information can be sent and received over the internet through this complex system.

Uploaded by

Mor DepRz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views2 pages

Xavier University - Ateneo de Cagayan University College of Engineering Electronics Engineering Department

The documentary shows the process of how information travels on the internet. It follows TCP packets as they are packed with data and sent to routers for delivery. Various protocols and systems work together to transport data, screen for unacceptable content, and direct packets to their destinations. The film provides insight into the "warriors" that make up the internet, such as TCP, routers, firewalls, and proxy servers. It illustrates how quickly information can be sent and received over the internet through this complex system.

Uploaded by

Mor DepRz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Xavier University - Ateneo De Cagayan University

College of Engineering
Electronics Engineering Department

Laboratory Experiment #1
REACTION PAPER
DAWN OF THE NET

Submitted by:

Date Submitted:

Rommel Pedraza, BsEcE 5

November 21, 2013

Instructor:
Engr. Ian Giovanni Pabillaran, PECE

Title and Objective

(05):____

Procedure, Data, Results

(20):____

Observation, Analysis

(30):____

Conclusion

(25):____

Tardiness

(10):____

Presentation, Neatness

(20):____

Total

(100):____

The dawn of the net is the documentary show that illustrates the process or the sequence
involving the internet. The movie really amazes me on how the internet works, how the message
was being sent and what the computers usually do whenever there are unacceptable websites.
The movie shows more on what is inside the computer. Through this, I was able to know the
warriors of the net and the TCP packet or known as Transfer Control Protocol, the ICMP or
Internet Control Message Protocol, the UDP, Router, Ping of death, and Router Switch. I was
glad to know its process in transporting data, its security and screening test and able to know
those things that makes up the internet.
There are some characters that involved in the movie, one of those was the TCP (Transfer
Control Protocol) which looks like the bus where the information is being packed. Another
character is the ICMP Ping Packet or the internet control message protocol is classic example of
a client server application, The ICMP server executes on all IP end system computers and all IP
intermediate systems. Also, the Router is programmable memory. The router's switch on the
other hand is more specific of the destination of the packet. The Ping of death in the computer
refers to the police that captures the hacker and destroys the unacceptable sites. Whenever the
user types something in the website, the information is packed and it is already called as the TCP
packet. The TCP packet is the labeled and the address is being placed and it will be send to the
Router. The Router sends the TCP packet into the Router Switch which guides it to the network
interface and it will be received by the proxy or sometimes referred to as the mailman. It is then
that the TCP packet is being opened and its contents are checked. If the contents of the TCP
packet consist of sites that are unacceptable just like pornographic sites it is destroyed. After this,
the firewall will chose what TCP packets can come inside. There would be few that will be
remained to enter the spider web. After the spider web, it will be received again by the firewall
wherein the TCP packet is then categorized into 80 or 25. The packet would be destroyed if it
does not fall into either 80 or 25. After this it will go to the proxy server where it would be open
and unpacked. And lastly, the information is being sent back to you.
In this movie, it really shows a creative way of emphasizing how great the internet is improving
nowadays and that we are much grateful for this generation for we are given much of the
technology that contributes great help in doing our works easier and less consuming in terms of
time. It is really unbelievable that in just small amount of time the information will be send back
to you.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy