Introduction to cyber security: stay safe online
Introduction to cyber security: stay safe online

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Introduction to cyber security: stay safe online

1.1 How data moves around the internet

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1008.mp4
Skip transcript

Transcript

TEACHER
When we talk about the internet, it's very tempting to think of it as a single computer network. But in reality, it's made up of thousands of separate networks owned by governments, corporations, and individual users. The computers and links that make up the internet are built by a huge number of companies, and use a large range of different technologies to store and transmit information. The internet is made possible, because although there are a large number of different types of computer and networking equipment, they all understand a relatively small number of communications protocols.
The two most common are the Internet Protocol, IP, which is used to transmit information. And the Transmission Control Protocol, TCP, which provides a structure for sending data over a network. The two are so important that they're often written together as TCP/IP. Since all of our computers understand the same protocols, it appears that they all belong to the same network.
The internet is made up of a hierarchy of networks all communicating through TCP/IP. The lowest tier is made up of individual users, who might be connected together in a local area network. These small networks are connected to the next tier, which is made up from internet service providers or corporate networks who provide access to internet services. These, in turn, are connected to higher tiers, such as telecommunication companies who own the all-important cables that allow data to travel around the world. The topmost part of the internet is sometimes called the internet backbone, or tier one.
Before data can be sent across the internet, the TCP is used to break it into fixed-size chunks. These are known as datagrams, but are sometimes called packets. Each datagram contains a small amount of data, as well as information needed by the internet itself, including the addresses of both the sender and the recipient and a serial number. The addressed datagrams are passed by the sender's computer to a nearby router, such as one on their home network. The local router extracts the destination address of the datagram, and looks for that destination in a table of known addresses. If the destination address is known to the router, then the datagram is sent to the destination computer. However, if the destination address isn't known to the router, it forwards the datagram to a higher-level router, which has a more comprehensive list of addresses. A datagram 1 might be forwarded all the way up to the routers on the internet's backbone.
The higher-level routers only need to examine the first part of the destination address to determine where the datagram needs to be forwarded. Once its address is found in a router's address table, the datagram can be redirected to a lower-level router, which will in turn forward it to more and more local routers until it eventually reaches its destination.
Routers constantly inform one another about their status and how busy they are. When parts of the internet become congested, or the router becomes unavailable, other routers will find new paths for datagrams that to avoid the problem. IP's ability to constantly reroute data to ensure a reliable flow of traffic means it's entirely possible for datagrams containing parts of the same file to take completely different routes across the internet.
When datagrams finally reach their destination, TCP is responsible for restoring the data to its original condition. The serial numbers on each datagram allow them to be ordered so that the data can be correctly reconstructed. TCP also allows the receiver to request new copies of missing or damaged datagrams from the sender. Between them, TCP and IP offer an extremely reliable way of sending data over what might be an unreliable network.
End transcript
 
Interactive feature not available in single page view (see it in standard view).

The video explains how data is routed across a network of computers and how the internet is resilient to failures of individual computers, known as nodes of the network, or connections between computers, known as the links.

Instead of using a dedicated circuit for all of the information, internet traffic is split up and may take any number of routes through the network moving from its origin to the destination by a series of hops.

Note: Early in the above the video [2:05], an example packet is shown with destination address 6.7.8.104. However, there are subsequently two separate examples of different packets being routed. In the first example, the packet is being sent to a host on the local network, 1.2.3.104 and in the second example it is being sent to a remote host, 6.7.8.101.

CYBER_B1

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to university level study, find out more about the types of qualifications we offer, including our entry level Access courses and Certificates.

Not ready for University study then browse over 900 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus