SlideShare a Scribd company logo
1 of 1
Task 2 – Computer Networking By Hope Oliver 9D.

1.How do information packets get from one computer to another within a
single network?

To make computer’s job easier, they break down the information into small
chunks called packets, including emails, chat systems, etc. Each packet
travels along the Internet on its own, making its way to its destination.
When the packets reach where they need to be, they are put back together.
Sometimes, packets get lost along the way, and sometimes they join other
packets on the way by mistake. The packets travel through machines called
routers, which kind of acts like a traffic cop. The routers direct which way
the information should go.



2. How many routers does a packet have to pass through to get from
one side of the model to the other?

A packet has to pass through numerous routers to get from one side of the
model to the other.

3. What would cause a traffic jam (or bottleneck) at a router?

Sometimes it may occur that many packets arrive at a router at the same
time. This is when a traffic jam happens, called a bottleneck. Some packets
get through straight away, however some are left to wait for their turn.
This is what causes emails to have a delay. The good thing is, routers find
out about this and there are always other routers to back them up, so the
connection never really fails.

More Related Content

Viewers also liked

La gestione del mobbing strategico di Maria Grazia De Angelis
La gestione del mobbing strategico di Maria Grazia De Angelis La gestione del mobbing strategico di Maria Grazia De Angelis
La gestione del mobbing strategico di Maria Grazia De Angelis
Drughe .it
 
Video cuddigan anderson_104_final
Video cuddigan anderson_104_finalVideo cuddigan anderson_104_final
Video cuddigan anderson_104_final
Chelsea Banderpson
 

Viewers also liked (14)

Presentacion
PresentacionPresentacion
Presentacion
 
Viral Bonuses Members Area.htm
Viral Bonuses Members Area.htmViral Bonuses Members Area.htm
Viral Bonuses Members Area.htm
 
Fet d'armes
Fet d'armesFet d'armes
Fet d'armes
 
WWW.MESSAGEKINGDOM.COM
WWW.MESSAGEKINGDOM.COMWWW.MESSAGEKINGDOM.COM
WWW.MESSAGEKINGDOM.COM
 
YO-kirjoitukset
YO-kirjoituksetYO-kirjoitukset
YO-kirjoitukset
 
Resource2x
Resource2xResource2x
Resource2x
 
[Slideshare] tafaqqahu-(aug-2015)-lesson-#3b-reflections-regarding four impor...
[Slideshare] tafaqqahu-(aug-2015)-lesson-#3b-reflections-regarding four impor...[Slideshare] tafaqqahu-(aug-2015)-lesson-#3b-reflections-regarding four impor...
[Slideshare] tafaqqahu-(aug-2015)-lesson-#3b-reflections-regarding four impor...
 
La gestione del mobbing strategico di Maria Grazia De Angelis
La gestione del mobbing strategico di Maria Grazia De Angelis La gestione del mobbing strategico di Maria Grazia De Angelis
La gestione del mobbing strategico di Maria Grazia De Angelis
 
La dipendenza affettiva
La dipendenza affettivaLa dipendenza affettiva
La dipendenza affettiva
 
The global API Ecosystem: A deep dive into gaming
The global API Ecosystem: A deep dive into gamingThe global API Ecosystem: A deep dive into gaming
The global API Ecosystem: A deep dive into gaming
 
Slideshare (lesson#1b)tauheed-course-(batch#6-januay-may-2017)-muqaddimah=his...
Slideshare (lesson#1b)tauheed-course-(batch#6-januay-may-2017)-muqaddimah=his...Slideshare (lesson#1b)tauheed-course-(batch#6-januay-may-2017)-muqaddimah=his...
Slideshare (lesson#1b)tauheed-course-(batch#6-januay-may-2017)-muqaddimah=his...
 
Top 5 IT challenges for 2017
Top 5 IT challenges for 2017Top 5 IT challenges for 2017
Top 5 IT challenges for 2017
 
Video cuddigan anderson_104_final
Video cuddigan anderson_104_finalVideo cuddigan anderson_104_final
Video cuddigan anderson_104_final
 
Why garden
Why gardenWhy garden
Why garden
 

Similar to Task 2 hope9 d

Review Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdfReview Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdf
anjanaarts2014
 
Chapter 2Network ArchitectureTo engineer and build a s
Chapter 2Network ArchitectureTo engineer and build a sChapter 2Network ArchitectureTo engineer and build a s
Chapter 2Network ArchitectureTo engineer and build a s
EstelaJeffery653
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
wardjo
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
H K
 
Packet switching
Packet switchingPacket switching
Packet switching
Vikash Dhal
 
Elt 2 computing homework
Elt 2 computing homeworkElt 2 computing homework
Elt 2 computing homework
tigger00
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
Anware Kade
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
Iaetsd Iaetsd
 

Similar to Task 2 hope9 d (20)

Nicole Shim 9D 1
Nicole Shim 9D 1Nicole Shim 9D 1
Nicole Shim 9D 1
 
The internet
The internetThe internet
The internet
 
Review Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdfReview Questions -11.Is web server an end system A. There is no.pdf
Review Questions -11.Is web server an end system A. There is no.pdf
 
Chapter 2Network ArchitectureTo engineer and build a s
Chapter 2Network ArchitectureTo engineer and build a sChapter 2Network ArchitectureTo engineer and build a s
Chapter 2Network ArchitectureTo engineer and build a s
 
Redundant Gateway for industrial Ethernet ring. White Paper. WoMaster
Redundant Gateway for industrial Ethernet ring. White Paper. WoMasterRedundant Gateway for industrial Ethernet ring. White Paper. WoMaster
Redundant Gateway for industrial Ethernet ring. White Paper. WoMaster
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
 
How Does The Internet Work? : Notes
How Does The Internet Work? : NotesHow Does The Internet Work? : Notes
How Does The Internet Work? : Notes
 
HendersonTheInternetandTheWorldWideWeb.pdf
HendersonTheInternetandTheWorldWideWeb.pdfHendersonTheInternetandTheWorldWideWeb.pdf
HendersonTheInternetandTheWorldWideWeb.pdf
 
The internet
The internetThe internet
The internet
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Elt 2 computing homework
Elt 2 computing homeworkElt 2 computing homework
Elt 2 computing homework
 
Elt 2 computing homework
Elt 2 computing homeworkElt 2 computing homework
Elt 2 computing homework
 
Mat 540 Quiz 3
Mat 540 Quiz 3Mat 540 Quiz 3
Mat 540 Quiz 3
 
network devices, types of delay
network devices, types of delaynetwork devices, types of delay
network devices, types of delay
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
 
Router bridge
Router bridgeRouter bridge
Router bridge
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
 
Study guide1(1)
Study guide1(1)Study guide1(1)
Study guide1(1)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Task 2 hope9 d

  • 1. Task 2 – Computer Networking By Hope Oliver 9D. 1.How do information packets get from one computer to another within a single network? To make computer’s job easier, they break down the information into small chunks called packets, including emails, chat systems, etc. Each packet travels along the Internet on its own, making its way to its destination. When the packets reach where they need to be, they are put back together. Sometimes, packets get lost along the way, and sometimes they join other packets on the way by mistake. The packets travel through machines called routers, which kind of acts like a traffic cop. The routers direct which way the information should go. 2. How many routers does a packet have to pass through to get from one side of the model to the other? A packet has to pass through numerous routers to get from one side of the model to the other. 3. What would cause a traffic jam (or bottleneck) at a router? Sometimes it may occur that many packets arrive at a router at the same time. This is when a traffic jam happens, called a bottleneck. Some packets get through straight away, however some are left to wait for their turn. This is what causes emails to have a delay. The good thing is, routers find out about this and there are always other routers to back them up, so the connection never really fails.