Once we click on a hyperlink, the flow of information begins. The information in form of binary was managed by the IP. Before the information was sent on its way to the network, the senders address, receivers address, proxy server address and the type of packet containing the information is modified and attached together in a packet. The clip also shows how collision takes place. Collision is mainly the reason why interruption in a computer network or internet connection exists. When there are so many packets or requests for information from different workstations, just like in a public road with too many cars on it, which can cause a traffic and sometimes accident.
That is the reason why some of our request for information fails, whether in a LAN or internet connections. A router will read the packets and pick those packets that are necessary to workstations connected to him and just leave those unnecessary packets to other networks. Router will locate the packets to different paths where they are meant to meet the router switch. The router switch will determine the route of the packets. From the router switch the packets will be headed from a Network Interface to the proxy. The proxys main task is to lessen the load of the internet connection and for security measures as well. The proxy will check if the web address or URL is acceptable or not. Those packets that are accepted by the proxy will be heading their way to the firewall, and those who will not be accepted will be simply dumped by the proxy.
After the firewall, another router will pick-up the packets and transfers these packets into a bandwidth where not all of them will be accepted to enter the spider web of interconnected networks or the internet. Nearly to the web server there is another firewall that will determine the port where the packet is addressed. The firewall will scan all the packets and eliminate those pings of death or unwanted ping packets. After the last firewall, the packets will be received by the web server application, and from there, your requested information will be sent back to you and travel the same way your request does. Imagine how this process of transferring information happens in just a few seconds. Somehow, it is quite convincing that in the dawn of the net, almost anything is possible. Thank you for reading!