SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
 
    FAKLUTI PENGURUSAN MAKLUMAT UITM
     




    IMD 251 Support Services 
    and Maintenance II 
    INTERNET 
    By Isma Ishak 

     




                                       2009
IMD 251 Support Services and Maintenance II 
INTERNET 
 
How Internet Infrastructure Works
Introduction to How Internet Infrastructure Works

One of the greatest things about the Internet is that nobody really owns it. It is a global
collection of networks, both big and small. These networks connect together in many
different ways to form the single entity that we know as the Internet. In fact, the very
name comes from this idea of interconnected networks.
Since its beginning in 1969, the Internet has grown from four host computer systems to
tens of millions. However, just because nobody owns the Internet, it doesn't mean it is not
monitored and maintained in different ways. The Internet Society, a non-profit group
established in 1992, oversees the formation of the policies and protocols that define how we
use and interact with the Internet.


The Internet: Computer Network Hierarchy
Every computer that is connected to the Internet is part of a network, even the one in your
home. For example, you may use a modem and dial a local number to connect to an
Internet Service Provider (ISP). At work, you may be part of a local area network
(LAN), but you most likely still connect to the Internet using an ISP that your company has
contracted with. When you connect to your ISP, you become part of their network. The ISP
may then connect to a larger network and become part of their network. The Internet is
simply a network of networks.
Most large communications companies have their own dedicated backbones connecting
various regions. In each region, the company has a Point of Presence (POP). The POP is a
place for local users to access the company's network, often through a local phone number
or dedicated line. The amazing thing here is that there is no overall controlling network.
Instead, there are several high-level networks connecting to each other through Network
Access Points or NAPs




When     you       connect          to       the      Internet,       your       computer
becomes part of a network.

                                             Diploma In Information Management      2 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
Internet Network Example


Here's an example. Imagine that Company A is a large ISP. In each major city, Company A
has a POP. The POP in each city is a rack full of modems that the ISP's customers dial into.
Company A leases fiber optic lines from the phone company to connect the POPs together
(see, for example, this UUNET Data Center Connectivity Map).
Imagine that Company B is a corporate ISP. Company B builds large buildings in major
cities and corporations locate their Internet server machines in these buildings. Company B
is such a large company that it runs its own fiber optic lines between its buildings so that
they are all interconnected.
In this arrangement, all of Company A's customers can talk to each other, and all of
Company B's customers can talk to each other, but there is no way for Company A's
customers and Company B's customers to intercommunicate. Therefore, Company A and
Company B both agree to connect to NAPs in various cities, and traffic between the two
companies flows between the networks at the NAPs.
In the real Internet, dozens of large Internet providers interconnect at NAPs in various
cities, and trillions of bytes of data flow between the individual networks at these points.
The Internet is a collection of huge corporate networks that agree to all intercommunicate
with each other at the NAPs. In this way, every computer on the Internet connects to every
other.


The Function of an Internet Router


All of these networks rely on NAPs, backbones and routers to talk to each other. What is
incredible about this process is that a message can leave one computer and travel halfway
across the world through several different networks and arrive at another computer in a
fraction of a second!
The routers determine where to send information from one computer to another. Routers
are specialized computers that send your messages and those of every other Internet user
speeding to their destinations along thousands of pathways. A router has two separate, but
related, jobs:
•   It ensures that information doesn't go where it's not needed. This is crucial for keeping
    large volumes of data from clogging the connections of quot;innocent bystanders.quot;
•   It makes sure that information does make it to the intended destination.
    In performing these two jobs, a router is extremely useful in dealing with two separate
    computer networks. It joins the two networks, passing information from one to the
    other. It also protects the networks from one another, preventing the traffic on one from
    unnecessarily spilling over to the other. Regardless of how many networks are attached,
    the basic operation and function of the router remains the same. Since the Internet is
    one huge network made up of tens of thousands of smaller networks, its use of routers
    is an absolute necessity.




                                              Diploma In Information Management      3 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
Internet Backbone


The National Science Foundation (NSF) created the first high-speed backbone in 1987.
Called NSFNET, it was a T1 line that connected 170 smaller networks together and
operated at 1.544 Mbps (million bits per second). IBM, MCI and Merit worked with NSF to
create the backbone and developed a T3 (45 Mbps) backbone the following year.
Backbones are typically fiber optic trunk lines. The trunk line has multiple fiber optic cables
combined together to increase the capacity. Fiber optic cables are designated OC for optical
carrier, such as OC-3, OC-12 or OC-48. An OC-3 line is capable of transmitting 155 Mbps
while an OC-48 can transmit 2,488 Mbps (2.488 Gbps). Compare that to a typical 56K
modem transmitting 56,000 bps and you see just how fast a modern backbone is.
Today there are many companies that operate      their own high-capacity backbones, and all of
them interconnect at various NAPs around the     world. In this way, everyone on the Internet,
no matter where they are and what company        they use, is able to talk to everyone else on
the planet. The entire Internet is a gigantic,   sprawling agreement between companies to
intercommunicate freely.


Internet Protocol: IP Addresses


Every machine on the Internet has a unique identifying number, called an IP Address. The
IP stands for Internet Protocol, which is the language that computers use to communicate
over the Internet. A protocol is the pre-defined way that someone who wants to use a
service talks with that service. The quot;someonequot; could be a person, but more often it is a
computer program like a Web browser.
A typical IP address looks like this:
                                      216.27.61.137
To make it easier for us humans to remember, IP addresses are normally expressed in
decimal format as a dotted decimal number like the one above. But computers communicate
in binary form. Look at the same IP address in binary:
                       11011000.00011011.00111101.10001001
The four numbers in an IP address are called octets, because they each have eight
positions when viewed in binary form. If you add all the positions together, you get 32,
which is why IP addresses are considered 32-bit numbers. Since each of the eight positions
can have two different states (1 or zero), the total number of possible combinations per
octet is 28 or 256. So each octet can contain any value between zero and 255. Combine the
four octets and you get 232 or a possible 4,294,967,296 unique values!
Out of the almost 4.3 billion possible combinations, certain values are restricted from use as
typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network
and the address 255.255.255.255 is used for broadcasts.
The octets serve a purpose other than simply separating the numbers. They are used to
create classes of IP addresses that can be assigned to a particular business, government or
other entity based on size and need. The octets are split into two sections: Net and Host.
The Net section always contains the first octet. It is used to identify the network that a
computer belongs to. Host (sometimes referred to as Node) identifies the actual computer
on the network. The Host section always contains the last octet. There are five IP classes
plus certain special addresses.



                                              Diploma In Information Management        4 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
Internet Protocol: Domain Name System


When the Internet was in its infancy, it consisted of a small number of computers hooked
together with modems and telephone lines. You could only make connections by providing
the IP address of the computer you wanted to establish a link with. For example, a typical
IP address might be 216.27.22.162. This was fine when there were only a few hosts out
there, but it became unwieldy as more and more systems came online.
The first solution to the problem was a simple text file maintained by the Network
Information Center that mapped names to IP addresses. Soon this text file became so large
it was too cumbersome to manage. In 1983, the University of Wisconsin created the
Domain Name System (DNS), which maps text names to IP addresses automatically. This
way you only need to remember www.howstuffworks.com, for example, instead of
HowStuffWorks.com's IP address.


URL: Uniform Resource Locator

When you use the Web or send an e-mail message, you use a domain name to do it. For
example, the Uniform Resource Locator (URL) quot;http://www.howstuffworks.comquot; contains
the    domain     name     howstuffworks.com.       So  does    this    e-mail    address:
example@howstuffworks.com. Every time you use a domain name, you use the Internet's
DNS servers to translate the human-readable domain name into the machine-readable IP
address. Check out How Domain Name Servers Work for more in-depth information on DNS.
Top-level domain names, also called first-level domain names, include .COM, .ORG, .NET,
.EDU and .GOV. Within every top-level domain there is a huge list of second-level domains.
For example, in the .COM first-level domain there is:
          •    HowStuffWorks
          •    Yahoo
          •    Microsoft
Every name in the .COM top-level domain must be unique. The left-most word, like www, is
the host name. It specifies the name of a specific machine (with a specific IP address) in a
domain. A given domain can, potentially, contain millions of host names as long as they are
all unique within that domain.
DNS servers accept requests from programs and other name servers to convert domain
names into IP addresses. When a request comes in, the DNS server can do one of four
things with it:
    1. It can answer the request with an IP address because it already knows the IP
       address for the requested domain.
    2. It can contact another DNS server and try to find the IP address for the name
       requested. It may have to do this multiple times.
    3. It can say, quot;I don't know the IP address for the domain you requested, but here's the
       IP address for a DNS server that knows more than I do.quot;
    4. It can return an error message because the requested domain name is invalid or
       does not exist.




                                             Diploma In Information Management      5 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
A DNS Example


    1. Let's say that you type the URL www.howstuffworks.com into your browser. The
       browser contacts a DNS server to get the IP address. A DNS server would start its
       search for an IP address by contacting one of the root DNS servers. The root
       servers know the IP addresses for all of the DNS servers that handle the top-level
       domains (.COM, .NET, .ORG, etc.). Your DNS server would ask the root for
       www.howstuffworks.com, and the root would say, quot;I don't know the IP address for
       www.howstuffworks.com, but here's the IP address for the .COM DNS server.quot;
    2. Your name server then sends a query to the .COM DNS server asking it if it knows
       the IP address for www.howstuffworks.com. The DNS server for the COM domain
       knows the IP addresses for the name servers handling the www.howstuffworks.com
       domain, so it returns those.
    3. Your name server then contacts the DNS server for www.howstuffworks.com and
       asks if it knows the IP address for www.howstuffworks.com. It actually does, so it
       returns the IP address to your DNS server, which returns it to the browser, which
       can then contact the server for www.howstuffworks.com to get a Web page.
    4. One of the keys to making this work is redundancy. There are multiple DNS servers
       at every level, so that if one fails, there are others to handle the requests. The other
       key is caching. Once a DNS server resolves a request, it caches the IP address it
       receives. Once it has made a request to a root DNS server for any .COM domain, it
       knows the IP address for a DNS server handling the .COM domain, so it doesn't have
       to bug the root DNS servers again for that information. DNS servers can do this for
       every request, and this caching helps to keep things from bogging down.
    5. Even though it is totally invisible, DNS servers handle billions of requests every day
       and they are essential to the Internet's smooth functioning. The fact that this
       distributed database works so well and so invisibly day in and day out is a testimony
       to the design. Be sure to read How Domain Name Servers Work for more information
       on DNS.

Internet Servers and Clients


Internet servers make the Internet possible. All of the machines on the Internet are either
servers or clients. The machines that provide services to other machines are servers. And
the machines that are used to connect to those services are clients. There are Web servers,
e-mail servers, FTP servers and so on serving the needs of Internet users all over the world.
When you connect to www.howstuffworks.com to read a page, you are a user sitting at a
client's machine. You are accessing the HowStuffWorks Web server. The server machine
finds the page you requested and sends it to you. Clients that come to a server machine do
so with a specific intent, so clients direct their requests to a specific software server running
on the server machine. For example, if you are running a Web browser on your machine, it
will want to talk to the Web server on the server machine, not the e-mail server.
A server has a static IP address that does not change very often. A home machine that is
dialing up through a modem, on the other hand, typically has an IP address assigned by the
ISP every time you dial in. That IP address is unique for your session -- it may be different
the next time you dial in. This way, an ISP only needs one IP address for each modem it
supports, rather than one for each customer.



                                               Diploma In Information Management         6 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
Ports and HTTP


Any server machine makes its services available using numbered ports -- one for each
service that is available on the server. For example, if a server machine is running a Web
server and a file transfer protocol (FTP) server, the Web server would typically be available
on port 80, and the FTP server would be available on port 21. Clients connect to a service at
a specific IP address and on a specific port number.
Once a client has connected to a service on a particular port, it accesses the service using a
specific protocol. Protocols are often text and simply describe how the client and server will
have their conversation. Every Web server on the Internet conforms to the hypertext
transfer protocol (HTTP). You can learn more about Internet servers, ports and protocols
by reading How Web Servers Work.
Networks, routers, NAPs, ISPs, DNS and powerful servers all make the Internet possible. It
is truly amazing when you realize that all this information is sent around the world in a
matter of milliseconds! The components are extremely important in modern life -- without
them, there would be no Internet. And without the Internet, life would be very different
indeed for many of us.




                                              Diploma In Information Management       7 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication
language or protocol of the Internet. It can also be used as a communications protocol in a
private network (either an intranet or an extranet). When you are set up with direct access
to the Internet, your computer is provided with a copy of the TCP/IP program just as every
other computer that you may send messages to or get information from also has a copy of
TCP/IP.

TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages
the assembling of a message or file into smaller packets that are transmitted over the
Internet and received by a TCP layer that reassembles the packets into the original
message. The lower layer, Internet Protocol, handles the address part of each packet so
that it gets to the right destination. Each gateway computer on the network checks this
address to see where to forward the message. Even though some packets from the same
message are routed differently than others, they'll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client)
requests and is provided a service (such as sending a Web page) by another computer (a
server) in the network. TCP/IP communication is primarily point-to-point, meaning each
communication is from one point (or host computer) in the network to another point or host
computer. TCP/IP and the higher-level applications that use it are collectively said to be
quot;statelessquot; because each client request is considered a new request unrelated to any
previous one (unlike ordinary phone conversations that require a dedicated connection for
the call duration). Being stateless frees network paths so that everyone can use them
continuously. (Note that the TCP layer itself is not stateless as far as any one message is
concerned. Its connection remains in place until all packets in a message have been
received.)
Many Internet users are familiar with the even higher layer application protocols that use
TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer
Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to
remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols
are often packaged together with TCP/IP as a quot;suite.quot;
Personal computer users with an analog phone modem connection to the Internet usually
get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point
Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the
dial-up phone connection to an access provider's modem.




                                             Diploma In Information Management      8 
 
IMD 251 Support Services and Maintenance II 
INTERNET 
 
                                How Modems Work
The Origin of Modems


The word quot;modemquot; is a contraction of the words modulator-demodulator. A modem is
typically used to send digital data over a phone line.
The sending modem modulates the data into a signal that is compatible with the phone
line, and the receiving modem demodulates the signal back into digital data. Wireless
modems convert digital data into radio signals and back.
Modems came into existence in the 1960s as a way to allow terminals to connect to
computers over the phone lines. A typical arrangement is shown below:




In a configuration like this, a dumb terminal at an off-site office or store could quot;dial inquot; to
a large, central computer. The 1960s were the age of time-shared computers, so a
business would often buy computer time from a time-share facility and connect to it via a
300-bit-per-second (bps) modem.
A dumb terminal is simply a keyboard and a screen. A very common dumb terminal at the
time was called the DEC VT-100, and it became a standard of the day (now memorialized
in terminal emulators worldwide). The VT-100 could display 25 lines of 80 characters each.
When the user typed a character on the terminal, the modem sent the ASCII code for the
character to the computer. The computer then sent the character back to the computer so it
would appear on the screen.
When personal computers started appearing in the late 1970s, bulletin board systems
(BBS) became the rage. A person would set up a computer with a modem or two and some
BBS software, and other people would dial in to connect to the bulletin board. The users
would run terminal emulators on their computers to emulate a dumb terminal.
People got along at 300 bps for quite a while. The reason this speed was tolerable was
because 300 bps represents about 30 characters per second, which is a lot more characters
per second than a person can type or read. Once people started transferring large programs
and images to and from bulletin board systems, however, 300 bps became intolerable.
Modem speeds went through a series of steps at approximately two-year intervals:
       •    300 bps - 1960s through 1983 or so
       •    1200 bps - Gained popularity in 1984 and 1985
       •    2400 bps
       •    9600 bps - First appeared in late 1990 and early 1991
       •    19.2 kilobits per second (Kbps)
       •    28.8 Kbps
       •    33.6 Kbps
       •    56 Kbps - Became the standard in 1998
       •    ADSL, with theoretical maximum of up to 8 megabits per second (Mbps) - Gained
            popularity in 1999

                                               Diploma In Information Management       9 
 

Más contenido relacionado

La actualidad más candente

Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebPatty Ramsey
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
How does the internet work
How does the internet workHow does the internet work
How does the internet workmraheel205
 
Communication & network
Communication & networkCommunication & network
Communication & networkDhani Ahmad
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
 
Data communication assignment id1925102518
Data communication assignment  id1925102518Data communication assignment  id1925102518
Data communication assignment id1925102518MdZakirHossain66
 
Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5atom1716
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
Intro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakirIntro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakirUniversity of Education
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals NotesCLSIG
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Leng Kimlieng
 

La actualidad más candente (20)

Akki
AkkiAkki
Akki
 
Computer networks
Computer networksComputer networks
Computer networks
 
Chapter09
Chapter09Chapter09
Chapter09
 
Telephony DNS
Telephony DNSTelephony DNS
Telephony DNS
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
 
Internet
InternetInternet
Internet
 
Network
NetworkNetwork
Network
 
CCNA
CCNACCNA
CCNA
 
Data Communication
Data Communication Data Communication
Data Communication
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Communication & network
Communication & networkCommunication & network
Communication & network
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
Data communication assignment id1925102518
Data communication assignment  id1925102518Data communication assignment  id1925102518
Data communication assignment id1925102518
 
Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Intro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakirIntro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakir
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals Notes
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...
 

Destacado

Mr President Slide
Mr President SlideMr President Slide
Mr President Slidegueste6b8e
 
плешивцева татьяна
плешивцева татьянаплешивцева татьяна
плешивцева татьянаguestfb393
 
System Resources
System ResourcesSystem Resources
System Resourcesisma ishak
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Understanding And Managing Memory
Understanding And Managing MemoryUnderstanding And Managing Memory
Understanding And Managing Memoryisma ishak
 

Destacado (7)

Mr President Slide
Mr President SlideMr President Slide
Mr President Slide
 
плешивцева татьяна
плешивцева татьянаплешивцева татьяна
плешивцева татьяна
 
System Resources
System ResourcesSystem Resources
System Resources
 
Imd102
Imd102Imd102
Imd102
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
WindowsNT
WindowsNTWindowsNT
WindowsNT
 
Understanding And Managing Memory
Understanding And Managing MemoryUnderstanding And Managing Memory
Understanding And Managing Memory
 

Similar a IMD 251 - INTERNET

Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Wireless technology movie
Wireless technology  movieWireless technology  movie
Wireless technology movieRadhika Gupta
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 
Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet WorksAnkur Jain
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
Ch01.pdf kurose and ross
Ch01.pdf kurose and rossCh01.pdf kurose and ross
Ch01.pdf kurose and rossDavid Charles
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetTanvir Raihan
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetAnish Thomas
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th semRenu Thakur
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSwajahat Gul
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 

Similar a IMD 251 - INTERNET (20)

Internet Infrastructure 26 Jan 2004 3
Internet Infrastructure 26 Jan 2004 3Internet Infrastructure 26 Jan 2004 3
Internet Infrastructure 26 Jan 2004 3
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Wireless technology movie
Wireless technology  movieWireless technology  movie
Wireless technology movie
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 
Internet and www
Internet and wwwInternet and www
Internet and www
 
Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet Works
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Ch01.pdf kurose and ross
Ch01.pdf kurose and rossCh01.pdf kurose and ross
Ch01.pdf kurose and ross
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Essay On Networking
Essay On NetworkingEssay On Networking
Essay On Networking
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
Assignment 1
Assignment 1  Assignment 1
Assignment 1
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Network
NetworkNetwork
Network
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th sem
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDS
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
 

Más de isma ishak

Imd 151 Perception
Imd 151 PerceptionImd 151 Perception
Imd 151 Perceptionisma ishak
 
Interpersonal Communication Chapter 6
Interpersonal Communication Chapter 6Interpersonal Communication Chapter 6
Interpersonal Communication Chapter 6isma ishak
 
IMD51 - Carry Marks
IMD51 - Carry MarksIMD51 - Carry Marks
IMD51 - Carry Marksisma ishak
 
IMD202 ISD 3E2 - Carry Marks
IMD202 ISD 3E2 - Carry MarksIMD202 ISD 3E2 - Carry Marks
IMD202 ISD 3E2 - Carry Marksisma ishak
 
Troubleshooting Fundamentals
Troubleshooting FundamentalsTroubleshooting Fundamentals
Troubleshooting Fundamentalsisma ishak
 
Microsoft Windows Nt
Microsoft Windows NtMicrosoft Windows Nt
Microsoft Windows Ntisma ishak
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardwareisma ishak
 
Network Cabling
Network CablingNetwork Cabling
Network Cablingisma ishak
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating Systemisma ishak
 
IMD251-Chapter 5
IMD251-Chapter 5IMD251-Chapter 5
IMD251-Chapter 5isma ishak
 

Más de isma ishak (10)

Imd 151 Perception
Imd 151 PerceptionImd 151 Perception
Imd 151 Perception
 
Interpersonal Communication Chapter 6
Interpersonal Communication Chapter 6Interpersonal Communication Chapter 6
Interpersonal Communication Chapter 6
 
IMD51 - Carry Marks
IMD51 - Carry MarksIMD51 - Carry Marks
IMD51 - Carry Marks
 
IMD202 ISD 3E2 - Carry Marks
IMD202 ISD 3E2 - Carry MarksIMD202 ISD 3E2 - Carry Marks
IMD202 ISD 3E2 - Carry Marks
 
Troubleshooting Fundamentals
Troubleshooting FundamentalsTroubleshooting Fundamentals
Troubleshooting Fundamentals
 
Microsoft Windows Nt
Microsoft Windows NtMicrosoft Windows Nt
Microsoft Windows Nt
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating System
 
IMD251-Chapter 5
IMD251-Chapter 5IMD251-Chapter 5
IMD251-Chapter 5
 

Último

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

IMD 251 - INTERNET

  • 1.   FAKLUTI PENGURUSAN MAKLUMAT UITM     IMD 251 Support Services  and Maintenance II  INTERNET  By Isma Ishak    2009
  • 2. IMD 251 Support Services and Maintenance II  INTERNET    How Internet Infrastructure Works Introduction to How Internet Infrastructure Works One of the greatest things about the Internet is that nobody really owns it. It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as the Internet. In fact, the very name comes from this idea of interconnected networks. Since its beginning in 1969, the Internet has grown from four host computer systems to tens of millions. However, just because nobody owns the Internet, it doesn't mean it is not monitored and maintained in different ways. The Internet Society, a non-profit group established in 1992, oversees the formation of the policies and protocols that define how we use and interact with the Internet. The Internet: Computer Network Hierarchy Every computer that is connected to the Internet is part of a network, even the one in your home. For example, you may use a modem and dial a local number to connect to an Internet Service Provider (ISP). At work, you may be part of a local area network (LAN), but you most likely still connect to the Internet using an ISP that your company has contracted with. When you connect to your ISP, you become part of their network. The ISP may then connect to a larger network and become part of their network. The Internet is simply a network of networks. Most large communications companies have their own dedicated backbones connecting various regions. In each region, the company has a Point of Presence (POP). The POP is a place for local users to access the company's network, often through a local phone number or dedicated line. The amazing thing here is that there is no overall controlling network. Instead, there are several high-level networks connecting to each other through Network Access Points or NAPs When you connect to the Internet, your computer becomes part of a network. Diploma In Information Management 2   
  • 3. IMD 251 Support Services and Maintenance II  INTERNET    Internet Network Example Here's an example. Imagine that Company A is a large ISP. In each major city, Company A has a POP. The POP in each city is a rack full of modems that the ISP's customers dial into. Company A leases fiber optic lines from the phone company to connect the POPs together (see, for example, this UUNET Data Center Connectivity Map). Imagine that Company B is a corporate ISP. Company B builds large buildings in major cities and corporations locate their Internet server machines in these buildings. Company B is such a large company that it runs its own fiber optic lines between its buildings so that they are all interconnected. In this arrangement, all of Company A's customers can talk to each other, and all of Company B's customers can talk to each other, but there is no way for Company A's customers and Company B's customers to intercommunicate. Therefore, Company A and Company B both agree to connect to NAPs in various cities, and traffic between the two companies flows between the networks at the NAPs. In the real Internet, dozens of large Internet providers interconnect at NAPs in various cities, and trillions of bytes of data flow between the individual networks at these points. The Internet is a collection of huge corporate networks that agree to all intercommunicate with each other at the NAPs. In this way, every computer on the Internet connects to every other. The Function of an Internet Router All of these networks rely on NAPs, backbones and routers to talk to each other. What is incredible about this process is that a message can leave one computer and travel halfway across the world through several different networks and arrive at another computer in a fraction of a second! The routers determine where to send information from one computer to another. Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways. A router has two separate, but related, jobs: • It ensures that information doesn't go where it's not needed. This is crucial for keeping large volumes of data from clogging the connections of quot;innocent bystanders.quot; • It makes sure that information does make it to the intended destination. In performing these two jobs, a router is extremely useful in dealing with two separate computer networks. It joins the two networks, passing information from one to the other. It also protects the networks from one another, preventing the traffic on one from unnecessarily spilling over to the other. Regardless of how many networks are attached, the basic operation and function of the router remains the same. Since the Internet is one huge network made up of tens of thousands of smaller networks, its use of routers is an absolute necessity. Diploma In Information Management 3   
  • 4. IMD 251 Support Services and Maintenance II  INTERNET    Internet Backbone The National Science Foundation (NSF) created the first high-speed backbone in 1987. Called NSFNET, it was a T1 line that connected 170 smaller networks together and operated at 1.544 Mbps (million bits per second). IBM, MCI and Merit worked with NSF to create the backbone and developed a T3 (45 Mbps) backbone the following year. Backbones are typically fiber optic trunk lines. The trunk line has multiple fiber optic cables combined together to increase the capacity. Fiber optic cables are designated OC for optical carrier, such as OC-3, OC-12 or OC-48. An OC-3 line is capable of transmitting 155 Mbps while an OC-48 can transmit 2,488 Mbps (2.488 Gbps). Compare that to a typical 56K modem transmitting 56,000 bps and you see just how fast a modern backbone is. Today there are many companies that operate their own high-capacity backbones, and all of them interconnect at various NAPs around the world. In this way, everyone on the Internet, no matter where they are and what company they use, is able to talk to everyone else on the planet. The entire Internet is a gigantic, sprawling agreement between companies to intercommunicate freely. Internet Protocol: IP Addresses Every machine on the Internet has a unique identifying number, called an IP Address. The IP stands for Internet Protocol, which is the language that computers use to communicate over the Internet. A protocol is the pre-defined way that someone who wants to use a service talks with that service. The quot;someonequot; could be a person, but more often it is a computer program like a Web browser. A typical IP address looks like this: 216.27.61.137 To make it easier for us humans to remember, IP addresses are normally expressed in decimal format as a dotted decimal number like the one above. But computers communicate in binary form. Look at the same IP address in binary: 11011000.00011011.00111101.10001001 The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight positions can have two different states (1 or zero), the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between zero and 255. Combine the four octets and you get 232 or a possible 4,294,967,296 unique values! Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts. The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet. There are five IP classes plus certain special addresses. Diploma In Information Management 4   
  • 5. IMD 251 Support Services and Maintenance II  INTERNET    Internet Protocol: Domain Name System When the Internet was in its infancy, it consisted of a small number of computers hooked together with modems and telephone lines. You could only make connections by providing the IP address of the computer you wanted to establish a link with. For example, a typical IP address might be 216.27.22.162. This was fine when there were only a few hosts out there, but it became unwieldy as more and more systems came online. The first solution to the problem was a simple text file maintained by the Network Information Center that mapped names to IP addresses. Soon this text file became so large it was too cumbersome to manage. In 1983, the University of Wisconsin created the Domain Name System (DNS), which maps text names to IP addresses automatically. This way you only need to remember www.howstuffworks.com, for example, instead of HowStuffWorks.com's IP address. URL: Uniform Resource Locator When you use the Web or send an e-mail message, you use a domain name to do it. For example, the Uniform Resource Locator (URL) quot;http://www.howstuffworks.comquot; contains the domain name howstuffworks.com. So does this e-mail address: example@howstuffworks.com. Every time you use a domain name, you use the Internet's DNS servers to translate the human-readable domain name into the machine-readable IP address. Check out How Domain Name Servers Work for more in-depth information on DNS. Top-level domain names, also called first-level domain names, include .COM, .ORG, .NET, .EDU and .GOV. Within every top-level domain there is a huge list of second-level domains. For example, in the .COM first-level domain there is: • HowStuffWorks • Yahoo • Microsoft Every name in the .COM top-level domain must be unique. The left-most word, like www, is the host name. It specifies the name of a specific machine (with a specific IP address) in a domain. A given domain can, potentially, contain millions of host names as long as they are all unique within that domain. DNS servers accept requests from programs and other name servers to convert domain names into IP addresses. When a request comes in, the DNS server can do one of four things with it: 1. It can answer the request with an IP address because it already knows the IP address for the requested domain. 2. It can contact another DNS server and try to find the IP address for the name requested. It may have to do this multiple times. 3. It can say, quot;I don't know the IP address for the domain you requested, but here's the IP address for a DNS server that knows more than I do.quot; 4. It can return an error message because the requested domain name is invalid or does not exist. Diploma In Information Management 5   
  • 6. IMD 251 Support Services and Maintenance II  INTERNET    A DNS Example 1. Let's say that you type the URL www.howstuffworks.com into your browser. The browser contacts a DNS server to get the IP address. A DNS server would start its search for an IP address by contacting one of the root DNS servers. The root servers know the IP addresses for all of the DNS servers that handle the top-level domains (.COM, .NET, .ORG, etc.). Your DNS server would ask the root for www.howstuffworks.com, and the root would say, quot;I don't know the IP address for www.howstuffworks.com, but here's the IP address for the .COM DNS server.quot; 2. Your name server then sends a query to the .COM DNS server asking it if it knows the IP address for www.howstuffworks.com. The DNS server for the COM domain knows the IP addresses for the name servers handling the www.howstuffworks.com domain, so it returns those. 3. Your name server then contacts the DNS server for www.howstuffworks.com and asks if it knows the IP address for www.howstuffworks.com. It actually does, so it returns the IP address to your DNS server, which returns it to the browser, which can then contact the server for www.howstuffworks.com to get a Web page. 4. One of the keys to making this work is redundancy. There are multiple DNS servers at every level, so that if one fails, there are others to handle the requests. The other key is caching. Once a DNS server resolves a request, it caches the IP address it receives. Once it has made a request to a root DNS server for any .COM domain, it knows the IP address for a DNS server handling the .COM domain, so it doesn't have to bug the root DNS servers again for that information. DNS servers can do this for every request, and this caching helps to keep things from bogging down. 5. Even though it is totally invisible, DNS servers handle billions of requests every day and they are essential to the Internet's smooth functioning. The fact that this distributed database works so well and so invisibly day in and day out is a testimony to the design. Be sure to read How Domain Name Servers Work for more information on DNS. Internet Servers and Clients Internet servers make the Internet possible. All of the machines on the Internet are either servers or clients. The machines that provide services to other machines are servers. And the machines that are used to connect to those services are clients. There are Web servers, e-mail servers, FTP servers and so on serving the needs of Internet users all over the world. When you connect to www.howstuffworks.com to read a page, you are a user sitting at a client's machine. You are accessing the HowStuffWorks Web server. The server machine finds the page you requested and sends it to you. Clients that come to a server machine do so with a specific intent, so clients direct their requests to a specific software server running on the server machine. For example, if you are running a Web browser on your machine, it will want to talk to the Web server on the server machine, not the e-mail server. A server has a static IP address that does not change very often. A home machine that is dialing up through a modem, on the other hand, typically has an IP address assigned by the ISP every time you dial in. That IP address is unique for your session -- it may be different the next time you dial in. This way, an ISP only needs one IP address for each modem it supports, rather than one for each customer. Diploma In Information Management 6   
  • 7. IMD 251 Support Services and Maintenance II  INTERNET    Ports and HTTP Any server machine makes its services available using numbered ports -- one for each service that is available on the server. For example, if a server machine is running a Web server and a file transfer protocol (FTP) server, the Web server would typically be available on port 80, and the FTP server would be available on port 21. Clients connect to a service at a specific IP address and on a specific port number. Once a client has connected to a service on a particular port, it accesses the service using a specific protocol. Protocols are often text and simply describe how the client and server will have their conversation. Every Web server on the Internet conforms to the hypertext transfer protocol (HTTP). You can learn more about Internet servers, ports and protocols by reading How Web Servers Work. Networks, routers, NAPs, ISPs, DNS and powerful servers all make the Internet possible. It is truly amazing when you realize that all this information is sent around the world in a matter of milliseconds! The components are extremely important in modern life -- without them, there would be no Internet. And without the Internet, life would be very different indeed for many of us. Diploma In Information Management 7   
  • 8. IMD 251 Support Services and Maintenance II  INTERNET    TCP/IP TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination. TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be quot;statelessquot; because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.) Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a quot;suite.quot; Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem. Diploma In Information Management 8   
  • 9. IMD 251 Support Services and Maintenance II  INTERNET    How Modems Work The Origin of Modems The word quot;modemquot; is a contraction of the words modulator-demodulator. A modem is typically used to send digital data over a phone line. The sending modem modulates the data into a signal that is compatible with the phone line, and the receiving modem demodulates the signal back into digital data. Wireless modems convert digital data into radio signals and back. Modems came into existence in the 1960s as a way to allow terminals to connect to computers over the phone lines. A typical arrangement is shown below: In a configuration like this, a dumb terminal at an off-site office or store could quot;dial inquot; to a large, central computer. The 1960s were the age of time-shared computers, so a business would often buy computer time from a time-share facility and connect to it via a 300-bit-per-second (bps) modem. A dumb terminal is simply a keyboard and a screen. A very common dumb terminal at the time was called the DEC VT-100, and it became a standard of the day (now memorialized in terminal emulators worldwide). The VT-100 could display 25 lines of 80 characters each. When the user typed a character on the terminal, the modem sent the ASCII code for the character to the computer. The computer then sent the character back to the computer so it would appear on the screen. When personal computers started appearing in the late 1970s, bulletin board systems (BBS) became the rage. A person would set up a computer with a modem or two and some BBS software, and other people would dial in to connect to the bulletin board. The users would run terminal emulators on their computers to emulate a dumb terminal. People got along at 300 bps for quite a while. The reason this speed was tolerable was because 300 bps represents about 30 characters per second, which is a lot more characters per second than a person can type or read. Once people started transferring large programs and images to and from bulletin board systems, however, 300 bps became intolerable. Modem speeds went through a series of steps at approximately two-year intervals: • 300 bps - 1960s through 1983 or so • 1200 bps - Gained popularity in 1984 and 1985 • 2400 bps • 9600 bps - First appeared in late 1990 and early 1991 • 19.2 kilobits per second (Kbps) • 28.8 Kbps • 33.6 Kbps • 56 Kbps - Became the standard in 1998 • ADSL, with theoretical maximum of up to 8 megabits per second (Mbps) - Gained popularity in 1999 Diploma In Information Management 9