BC: All Copyrights Reserved to Student Name The American School of Tampico Mexico, 2012
FC: computer network | Alex Reynoso Perales 7B Technology Ms.Perla #8
1: Case#1 Teacher using a laptop to open her ATS e-mail account. | In this case the node of the teacher is the laptop. The signal she sends pass through the NIC network interface card and then to the wireless access point
2: The wireless access point sends the signal to site and inside the site it is send to the router.
3: Then this when the router sends the request to the proxy that is the border police in charge of taking unwanted information
4: The firewall is the second line of defense because when the request gets to the firewall it blocks all viruses or harming things.
5: after passing the second defense then it is ready to be send to the web mail server that is in charge of receiving manage.