00:00:05
[Music]
00:00:10
[Applause]
00:00:12
[Music]
00:00:14
[Applause]
00:00:15
[Music]
00:00:31
[Applause]
00:00:32
[Music]
00:00:37
[Applause]
00:00:51
[Music]
00:00:57
[Music]
00:01:03
for the first time in history people and
00:01:07
machinery are working together realizing
00:01:10
a dream a uniting force that knows no
00:01:14
geographical boundaries without regard
00:01:17
to race creed or color a new era where
00:01:21
communication truly brings people
00:01:23
together this is the dawn of the net
00:01:31
want to know how it works click here to
00:01:35
begin your journey into the net now
00:01:42
exactly what happened when you clicked
00:01:43
on that link you started a flow of
00:01:46
information this information travels
00:01:48
down into your own personal mail room
00:01:50
where mr. IP packages it labels it and
00:01:53
sends it on its way each packet is
00:01:56
limited in its size the mail room must
00:01:59
decide how to divide the information and
00:02:01
how to package it now the package needs
00:02:04
a label containing important information
00:02:06
such as senders address receivers
00:02:09
address and the type of packet it is
00:02:13
[Music]
00:02:28
because this particular packet is going
00:02:30
out onto the Internet it also gets an
00:02:33
address for the proxy server which has a
00:02:35
special function as we'll see later the
00:02:39
packet is now launched on to your local
00:02:41
area network or LAN this network is used
00:02:45
to connect all the local computers
00:02:47
routers printers etc for information
00:02:50
exchange within the physical walls of
00:02:52
the building the land is a pretty
00:02:54
uncontrolled place and unfortunately
00:02:56
accidents can happen
00:03:01
[Music]
00:03:07
the highway of the land is packed with
00:03:10
all types of information
00:03:11
these are IP packets Novell packets
00:03:14
appletalk packets they're going against
00:03:17
traffic as usual the local router reads
00:03:19
the address and if necessary lifts the
00:03:22
packet onto another network ah the
00:03:26
router a symbol of control in a
00:03:29
seemingly disorganized world there he is
00:03:43
systematic uncaring methodical
00:03:47
conservative and sometimes not quite of
00:03:49
disputed but at least he is exact for
00:03:53
the most part
00:04:07
as the packets leave the router they
00:04:11
make their way into the corporate
00:04:13
intranet and head for the router switch
00:04:16
a bit more efficient than the router the
00:04:20
router switch plays fast and loose with
00:04:22
IP packets deftly routing them along the
00:04:25
way
00:04:25
a digital pinball wizard if you will as
00:04:47
packets arrive at their destination
00:04:49
they're picked up by the network
00:04:50
interface ready to be sent to the next
00:04:53
level in this case the proxy the proxy
00:04:58
is used by many companies as sort of a
00:05:01
middleman in order to lessen the load on
00:05:03
the internet connection and for security
00:05:05
reasons as well as you can see the
00:05:10
packets are all of various sizes
00:05:12
depending upon their content
00:05:20
[Music]
00:05:31
the proxy opens the packet and looks for
00:05:35
the web address or URL depending upon
00:05:39
whether the address is acceptable the
00:05:42
packet is sent on to the Internet there
00:05:51
are however some addresses which do not
00:05:54
meet with the approval of the proxy that
00:05:57
is to say corporate or management
00:05:59
guidelines
00:06:02
these are Samara lis dealt with we'll
00:06:08
have none of that for those who make it
00:06:10
it's on the road again
00:06:12
[Music]
00:06:23
next up the firewall
00:06:27
[Music]
00:06:30
the corporate firewall serves two
00:06:33
purposes it prevents some rather nasty
00:06:36
things from the internet from coming
00:06:37
into the intranet and it can also
00:06:40
prevent sensitive corporate information
00:06:42
from being sent out on to the Internet
00:06:46
once through the firewall a router picks
00:06:49
up the packet and places it on to a much
00:06:51
narrower road or bandwidth as we say
00:06:54
obviously the road is not broad enough
00:06:58
to take them all now you might wonder
00:07:01
what happens to all those packets which
00:07:03
don't make it along the way well when
00:07:07
mr. IP doesn't receive an acknowledgment
00:07:09
that a packet has been received in due
00:07:11
time he simply sends a replacement
00:07:14
packet we are now ready to enter the
00:07:19
world of the internet a spider web of
00:07:23
interconnected networks which span our
00:07:26
entire globe here routers and switches
00:07:29
establish links between networks now the
00:07:33
net is an entirely different environment
00:07:35
than you'll find within the protected
00:07:37
walls of your land out here fits the
00:07:40
Wild West plenty of space plenty of
00:07:42
opportunities plenty of things to
00:07:44
explore and places to go thanks to very
00:07:48
little control and regulation new ideas
00:07:50
find fertile soil to push the envelope
00:07:53
of their possibilities but because of
00:07:56
this freedom certain dangers also lurk
00:07:59
you'll never know when you'll meet the
00:08:01
dreaded pain of death a special version
00:08:05
of a normal request pain which some
00:08:07
idiot thought up to mess up unsuspecting
00:08:10
hosts
00:08:12
the pass our packets take maybe via
00:08:15
satellite telephone lines wireless or
00:08:18
even transoceanic cable they don't
00:08:20
always take the fastest or shortest
00:08:22
routes possible but they will get there
00:08:25
eventually maybe that's why it's
00:08:29
sometimes called the world wide wait but
00:08:32
when everything is working smoothly you
00:08:34
can circumvent the globe five times over
00:08:37
at the drop of a hat
00:08:39
literally and offer the cost of a local
00:08:42
call or less near the end of our
00:08:46
destination we'll find another firewall
00:08:52
depending upon your perspective as a
00:08:54
data packet the firewall could be a
00:08:56
bastion of security or a dreaded
00:08:59
adversary it all depends on which side
00:09:02
you're on
00:09:03
and what your intentions are the
00:09:05
firewall is designed to let in only
00:09:08
those packets that meet its criteria
00:09:11
this fire was operating on ports 80 and
00:09:14
25 all attempts to enter through other
00:09:18
ports are closed for business
00:09:22
[Music]
00:09:34
port 25 is used for mail packets while
00:09:40
port 80 is the entrance for packets from
00:09:43
the Internet to the web server inside
00:09:48
the firewall packets are screened more
00:09:51
thoroughly some packets make it easily
00:09:53
through customs while others look just a
00:09:57
bit dubious the firewall officer is not
00:10:00
easily fooled
00:10:01
such as when this ping of death packets
00:10:04
it tries to disguise itself as a normal
00:10:07
ping packet for those packets lucky
00:10:16
enough to make it this far
00:10:17
the journey is almost over it's just a
00:10:23
line up on the interface to be taken up
00:10:26
into the web server nowadays a web
00:10:30
server can run on many things from a
00:10:33
mainframe to a webcam to the computer on
00:10:35
your desk why not your refrigerator with
00:10:39
a proper setup you can find out if you
00:10:41
have the makings for Chicken Cacciatore
00:10:43
or if you have to go shopping
00:10:45
remember this is the dawn of the net
00:10:48
almost anything is possible
00:10:54
one by one the packets are received
00:10:57
opened and unpacked the information they
00:11:04
contain that is your request for
00:11:07
information is sent on to the web server
00:11:10
application the packet itself is
00:11:20
recycled ready to be used again and
00:11:26
filled with your requested information
00:11:34
addressed and sent out on its way back
00:11:37
to you back past the firewall routers
00:11:43
and on through to the internet back
00:11:50
through your corporate firewall and on
00:11:58
to your interface ready to supply your
00:12:02
web browser with the information you
00:12:04
requested that is this film
00:12:10
[Music]
00:12:16
pleased with their efforts and trusting
00:12:19
in a better world our trusty data
00:12:22
packets ride off blissfully into the
00:12:24
sunset of another day knowing fully they
00:12:29
have served their masters well knives of
00:12:34
that a happy ending
00:12:37
[Music]
00:12:48
[Music]