Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






HOW INFORMATION TRAVELS OVER THE INTERNET

 

All information is transmitted across the Internet in small units of data called packets. Software on the sending computer divides a large document into many packets for transmission; software on the receiving computer regroups incoming packets into the original document. Similar to a postcard, each packet has two parts: a packet header specifying the computer to which the packet should be delivered, and a packet payload containing the data being sent. The header also specifies how the data in the packet should be combined with the data in other packets by recording which piece of a document is contained in the packet.

A series of rules known as computer communication protocols specify how packet headers are formed and how packets are processed. The set of protocols used for the Internet are named TCP/IP after the two most important protocols in the set: the Transmission Control Protocol and the Internet Protocol. Hardware devices that connect networks in the Internet are called IP routers because they follow the IP protocol when forwarding packets. A router examines the header in each packet that arrives to determine the packet’s destination. The router either delivers the packet to the computer destination across a local network or forwards the packet to another router that is closer to the final destination. Thus, a packet travels from router to router as it passes through the Internet.

TCP/IP protocols enable the Internet to automatically detect and correct transmission problems. For example, if any network or device malfunctions, protocols detect the failure and automatically find an alternative path for packets to avoid the malfunction. Protocol software also ensures that data arrive complete and intact. If any packets are missing or damaged, protocol software on the receiving computer requests that the source resend them. Only when the data has arrived correctly the protocol software makes these data available to the receiving application program, and therefore to the user.

 

TASKS

 

1. Transcribe the words and give their Russian equivalents

 

1. transmission (n.)

2. specify (v.)

3. deliver (v.)

4. protocol (n.)

5. router (n.)

6. forward (v.)

7. examine (v.)

8. determine (v.)

9. malfunction (n.),(v.)

 

2. Translate the following word combinations

 

1. packet header

2. packet payload

3. computer communication protocol

4. Transmission Control Protocol

5. the Internet Protocol

6. IP routers

 

 

4. Choose the words which are close in meaning to the underlines ones.

 

1. Hardware devices that connect networks in the Internet are called IP routers.

· are referred to

· are referred to as

· are known as

· are famous as

· are named

 

2. A router examines the header in each packet that arrives to determine the packet’s destination.

· investigates

· finds

· receives



· transmits

· studies

3. The router either delivers the packet to the computer destination across a local network or forwards the packet to another router that is closer to the final destination.

· transmits

· determines

· refers to

· sends

· inputs

 

5. Define the following

 

1. The Internet

2. A packet

3. A packet header

4. A packet payload

5. Software

6. A sending computer

7. A receiving computer

8. Computer communication protocols

9. TCP/IP

10. IP routers

 

6. Read and translate the text

 


Date: 2015-01-02; view: 1598


<== previous page | next page ==>
INTERNET ACCESS | SOFTWARE
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.008 sec.)