Sie sind auf Seite 1von 12

The Internet: How it Works

Management of the Internet


Who o o o o o o Who o o o o owns the internet? Individuals Universities Government agencies Private companies Nonprofit organizations User groups pays for the internet? U.S. taxpayers Businesses Universities Other countries

Connecting to the Internet


Internet backbone o Collection of large national and international networks o T lines initially used for backbone ISP connections Carried digital data over twisted pair wires o Optical carrier line (OC) todays most common backbone ISP connection High-speed, fiber-optic lines designed to provide high throughput OC Line Speeds

In the past o Points of connection between ISPs Once known as network access points (NAPs) Designed to move large amounts of data among networks Now o Private sector companies make up the internet system Exchange data via internet exchange points (IXPs) Typical IXP is made up of one or more network switches

Points of Presence (POPs)


Banks of modems where individual users connect to an ISP

The Network Model of the Internet


Internet communications follow the client/server network model Clients request services Servers respond to client requests Types of servers o Web servers Host web pages o Commerce servers Enable the purchase of goods and services over the web o File servers

Provide remote storage space for files that users can download uTorrent

Data Transmission and Protocols


Computer protocols are rules for electronic information exchange Open system protocols o Any computer can communicate with other computers using the same protocols

Circuit Switching
Dedicated connection between two points Remains active until the transmission is terminated Used in telephone communications Inefficient for computers

Packet Switching
Data is broken into small units (packets) Packets are sent over various routes to their destination Packets are reassembled by the receiving computer Packets contain: o Destination/source addresses o Reassembling instructions o Data

TCIP/IP
Transmission Control Protocol (TCP) o Prepares data for transmission o Provides error checking o Enables resending lost data Internet Protocol (IP) o Responsible for sending data from one computer to another Suite of interrelated protocols

Protocols

IP Address
Unique number that identifies each device connected to the internet Typical IP address o 197.24.72.157 Static address o address never changes Dynamic address o Temporary address

Having Enough IP Addresses


IPv4 addressing scheme didnt foresee explosive growth Classless Interdomain Routing (CIDR) o Allows a single IP address to represent several unique addresses o Uses a network prefix (slash and number)

o Identifies how many bits in the IP address are unique identifiers Internet Protocol version 6 (IPv6) o Longer IP addresses o Many companies and government agencies are starting to switch to IPv6

Domain Names
Names that take the place of an IP address o Sample domain name: www.mydomain.com Top-level domain (TLD) o Portion of the domain name that follows the dot o Includes .com, .org, .gov, .edu, and .net Second-level domain o Unique name within a top-level domain o Yahoo.com, whitehouse.gov, unesco.org

Domain Name System Servers


Internet servers that translate domain names into IP addresses ISPs go first to a default DNS to resolve a name Name queries work up the hierarchy to the root DNS servers if required

Other Protocols
File Transfer Protocol (FTP) o File-sharing protocol o Files are downloaded and uploaded using the internet

HTTP and SSL


HyperText Transfer Protocol (HTTP) o Protocol for transferring hypertext documents o Hypertext documents are linked to other documents through hyperlinks HyperText Transfer Prtocotol Secure (HTTPS) Transport Layer Security (TLS) and Secure Sockets Layer (SSL) o Protect the integrity of data and security of transmissions over the internet

HTML/XHTML
HyperText Markup Language (HTML) o Tags that describe the formatting and layout of a web page Xtensible HyperText Markup Language (XHTML) o Successor to HTML o Much more stringent rules regarding tagging Not programming languages, but sets of rules for specifying how a browser should display text

Extensible Markup Language (XML)


Designed for information exchange Can be used to create your own markup language Used in e-commerce transactions Custom packages for specific communities o MathML, Wireless Markup Language (WML)

Common Gateway Interface (CGI)


Browsers request that a program file executes (runs) CGI files are often called CGI scripts Adds Web page interaction o Adding names to guest books/mailing lists

o Completing forms

Dynamic HTML
A combination of technologies o HTML/XHTML o Cascading style sheets o JavaScript Allows a web page to change in response to user action Brings special effects to otherwise static web pages

AJAX and JavaScript


AJAX (Asynchronous JavaScript and XML) o Newer technology o Facilitates creation of web applications that update a page without requiring a page refresh or leaving the page o Does not require JavaScript or XML JavaScript o Most commonly used scripting language for creating DHTML effects

Cascading Style Sheets


Statements that define in a single location how to display HTML/XHTML elements Enable a web developer to define a style for each HTML/XHTML element o The rule may be applied to as many elements on as many web pages as needed o Speeds up global changes

Document Object Model

Organizes the objects and elements of a web page Defines every item on a web page as an object Developers can easily change the properties of these objects

Client-Side Applications
Programs that run on a client computer with no interaction with the server Types include o HTML/XHTML document embedded with JavaScript code o Applet: small program that resides on the server

Communications Over the Internet


Email
Simple Mail Transfer Protocol (SMTP) Multipurpose Internet Mail Extensions (MIME) Email Security o Encryption Private-key encryption Public-key encryption o Secure data transmission software SafeMessage

Instant Messaging (IM)


Client/server program for real-time, text-based conversations Popular IM programs o AOL Instant Messenger o ICQ o Yahoo! Messenger o Windows Live Messenger Increasing security threats o Should not be used for sensitive data

Voice over Internet Protocol (VoIP)

Allows inexpensive or free long-distance phone calls over the internet Some cell phones are VoIP enabled o Customers must be able to connect to a Wi-Fi signal uses packet switching

Looking Ahead (a bit)


Broadband over power lines (BPL)
Already deployed in Australia and Europe Not as fast as cable or DSL Prospect of sending exobits per second (1017)

WiMax the next generation of Wi-Fi


Wi-Fi has approximately 300 feet of connectivity WiMax would offer up to 31 miles at 72 Mbps (faster than current cable or DSL connections) Currently 400 WiMax networks deployed in 130 countries Bell and Rogers offering a limited service now and other companies are beginning to offer it

Looking Ahead (not too far)


As HTML5 is being developed, developers are looking again at packets and circuits switching o Faster processing might mean a return to circuit switching Websockets provide a continuous connection so requiring less data to be transferred with each transaction (bits vs. Kbits) o Send and receive data at the same time

Do you believe what you read?


Man in the Middle proxy servers

o Intercept traffic going to and from particular sites like Facebook and Google o Change the text to make the message m ore government friendly or to disrupt the site to make it look like a site problem o China is accused of using them as well as Tunisia o Fake security certificates encountered

Your Personal Cloud


Google Chrome OS and HPs WebOS are positioning for the personal cloud revolution o Your device need to have no apps installed o Access apps, data, and devices anywhere

Das könnte Ihnen auch gefallen