4.1 The Internet

Part 1

Packet

How do computers send data to each other?

Popcorn Hack 1

The Internet

  1. Bandwidth
  2. Computer Network
  3. Packet Switching
  4. Operating System

Computer Network and Packet Switching

Part 2

OSI Model

TCP Model

Waist Model

Popcorn Hack 2

A request from the frontend to the backend is being made and the response returns JSON. What layer(s) did the data go through?

  1. Application
  2. Transport
  3. Internet
  4. Network Access
  5. All layers

All layers

What is an example of the OSI/TCP Model

Process

Network Access/Internet Layer

Application/Transport Layer

  1. The user sends a request to a server or page
  2. If the user wants to go to a website like amazon.com, it has its unique IP address but it isn’t readable by humans so a DNS(Domain Name Service), which stores the IP address inside of a database, sends it over the user
  3. During this process, the user sent a TCP request for the IP of amazon.com to the DNS server and the DNS server sent a TCP response in the form of packets for the IP of amazon.com
  4. Now, the user can send a request to the IP of the webpage like amazon.com
  5. The last step is for a router to send the user to the correct destination of the IP. In this case, amazon.com.

Popcorn Hack 3

How does a user get the IP for a web page when they enter the url?

  1. It goes through layers when the request is made to the webp
  2. The DNS sends it to the user in the form of a TCP response
  3. There is no need for the user to know the ip when going to the url
  4. The user automatically knows

2 is correct

Protocols used here are:

HTTP

TCP/IP

Homework

Bandwidth:

  1. In the context of computer networks, elaborate on the concept of bandwidth. Discuss how bandwidth influences the speed and efficiency of data transfer. Provide examples of scenarios where both high and low bandwidth can impact the performance of internet connected devices.

Bandwidth is the maximum rate of data transfer across a given path. A high processing bandwidth means the program can handle a large amount of data quickly, while low processing bandwidth implies slower data manipulation. Bandwidth influences how quickly data can be read from or written to memory. Efficient memory bandwidth usage is crucial for the speed of data access and manipulation. When downloading large files, such as software updates or game installations, high bandwidth allows for faster download speeds. Users can get the files they need quickly, reducing wait times. In a network with many users simultaneously downloading large files or streaming content, low bandwidth can lead to slow download speeds for everyone. This can be frustrating when trying to download files or updates.

Computer Network:

  1. Explore computer networks by detailing the key components and their interplay. Discuss the significance of scalability, security, and reliability in designing computer networks. Provide real-world examples of how different types of computer networks, such as local area networks (LANs) and wide area networks (WANs), serve distinct purposes in various settings.

A computer network is made up of switches, nodes, links, and protocols. Scalability permits network growth by ensuring growth flexibility. Basically, security protects against unwanted access. Performance consistency and connectivity are ensured via reliability. Devices that may communicate in a single location are called local area networks, or LANs (localized resource sharing). Geographically dispersed networks are connected via WANs (wide area networks), which are essentially networks over bigger areas.

Packet Switching:

  1. Investigate packet switching and its role in modern communication systems. Compare and contrast packet switching with alternative methods, such as circuit switching, highlighting the advantages that packet switching brings to data transmission. Describe the journey of a data packet through a network.

In short, packet switching divides data into smaller units for faster data transfer. It is not the same as circuit switching, which has more drawbacks such as lesser efficiency, slower speed, and fewer support for various file formats. First, the data is divided into separate packets, which are then routed and, after they arrive at their destination, reassembled (to maximize data transmission).

##