SlideShare a Scribd company logo
1 of 23
Inside of a computer…
What happens when you turn your computer on?
What loads?
Where are applications stored? How are do they run?
In what form is information stored in a computer?
What is the location in memory where they are
stored called? How much information is stored in
one location?
How does the RAM communicate with the Hard
Drive? How do they get power?
Internet Basics
This lesson includes the following sections:
• The Internet: Then and Now
• How the Internet Works
• Major Features of the Internet
• Online Services
• Internet Features in Application Programs
• The Internet was created by the Advanced Research
Projects Agency (ARPA) and the U.S. Department of
Defense for scientific and military communications.
• The Internet is a network of interconnected networks.
Even if part of its infrastructure was destroyed, data
could flow through the remaining networks.
• The Internet uses high-speed data lines, called
backbones, to carry data. Smaller networks connect to
the backbone, enabling any user on any network to
exchange data with any other user.
• ARPANET, NSFnet, Internet
• Internetworking: the process of connecting separate
networks
The Internet: Then and Now
• TCP/IP
• Routing Traffic Across the Internet
• Addressing Schemes
• Domains and Subdomains
How the Internet Works
• Every computer and network on the Internet uses
the same protocols (rules and procedures) to control
timing and data format.
• The protocol used by the Internet is the
Transmission Control Protocol/Internet Protocol,
or TCP/IP.
• No matter what type of computer system you
connect to the Internet, if it uses TCP/IP, it can
exchange data with any other type of computer.
How the Internet Works - TCP/IP
• Most computers don't connect directly to the Internet.
Instead, they connect to a smaller network that is
connected to the Internet backbone.
• The Internet includes thousands of host computers
(servers), which provide data and services as
requested by client systems.
• When you use the Internet, your PC (a client)
requests data from a host system. The request and
data are broken into packets and travel across
multiple networks before being reassembled at their
destination.
How the Internet Works -
Routing Traffic Across the Internet
The Operation of the Internet
• Packets of information flow between machines governed by
common rules (protocols):
– Internet protocol (IP)
– Transport control protocol (TCP)
• Internet is a packet-switching network
– Messages are decomposed into packets, containing part of the
message, plus information on the sending and receiving machines
and how the packet relates to the other packets
– Packets travel independently and possibly on different routes
through the Internet
– Packets are reassembled into the message at the receiving machine.
• In order to communicate across the Internet, a
computer must have a unique address.
• Every computer on the Internet has a unique
numeric identifier, called an Internet Protocol (IP)
address.
• Each IP address has four parts – each part a number
between 0 and 255. An IP address might look like
this: 205.46.117.104.
How the Internet Works -
Addressing Schemes
Where to Begin? Internet
Addresses
• Because the Internet is a global network of computers each
computer connected to the Internet must have a unique
address. Internet addresses are in the
form nnn.nnn.nnn.nnn where nnn must be a number from
0 - 255. This address is known as an IP address. (IP stands
for Internet Protocol; more on this later.)
• The picture below illustrates two computers connected to
the Internet; your computer with IP address 1.2.3.4 and
another computer with IP address 5.6.7.8. The Internet is
represented as an abstract object in-between.
• If you connect to the Internet through an Internet Service
Provider (ISP), you are usually assigned a temporary IP
address for the duration of your dial-in session. If you
connect to the Internet from a local area network (LAN)
your computer might have a permanent IP address or it
might obtain a temporary one from a DHCP (Dynamic
Host Configuration Protocol) server. In any case, if you
are connected to the Internet, your computer has a unique
IP address.
Check It Out - The Ping Program
IF you're using Microsoft Windows or a flavor of Unix and have a
connection to the Internet, there is a handy program to see if a
computer on the Internet is alive. It's called ping, probably after
the sound made by older submarine sonar systems.1 If you are
using Windows, start a command prompt window. If you're using
a flavor of Unix, get to a command prompt. Type ping
www.yahoo.com. The ping program will send a 'ping' (actually an
ICMP (Internet Control Message Protocol) echo request message)
to the named computer. The pinged computer will respond with a
reply. The ping program will count the time expired until the reply
comes back (if it does). Also, if you enter a domain name (i.e.
www.yahoo.com) instead of an IP address, ping will resolve the
domain name and display the computer's IP address. More on
domain names and address resolution later.
Protocol Stacks and Packets
So your computer is connected to the Internet and has a unique address.
How does it 'talk' to other computers connected to the Internet? An
example should serve here: Let's say your IP address is 1.2.3.4 and
you want to send a message to the computer 5.6.7.8. The message you
want to send is "Hello computer 5.6.7.8!". Obviously, the message
must be transmitted over whatever kind of wire connects your
computer to the Internet. Let's say you've dialed into your ISP from
home and the message must be transmitted over the phone line.
Therefore the message must be translated from alphabetic text into
electronic signals, transmitted over the Internet, then translated back
into alphabetic text. How is this accomplished? Through the use of
a protocol stack. Every computer needs one to communicate on the
Internet and it is usually built into the computer's operating system
(i.e. Windows, Unix, etc.). The protocol stack used on the Internet is
referred to as the TCP/IP protocol stack because of the two major
communication protocols used. The TCP/IP stack looks like this:
Protocol LayerComments
Application Protocols LayerProtocols specific to applications such as WWW, e-mail,
FTP, etc.
Transmission Control
Protocol Layer
TCP directs packets to a specific application on a computer
using a port number.
Internet Protocol Layer IP directs packets to a specific computer using an IP address.
Hardware Layer Converts binary packet data to network signals and back.
(E.g. ethernet network card, modem for phone lines, etc.)
• In addition to an IP address, most Internet hosts or
servers have a Domain Name System (DNS) address,
which uses words.
• A domain name identifies the type of institution that
owns the computer. An Internet server owned by IBM
might have the domain name ibm.com.
• Some enterprises have multiple servers, and identify
them with subdomains, such as products.ibm.com.
How the Internet Works -
Domains and Subdomains
• The World Wide Web
• E-Mail
• News
• Telnet
• File Transfer Protocol (FTP)
• Internet Relay Chat (IRC)
Major Features of the Internet
• The World Wide Web is a part of the Internet, which
supports hypertext documents, allowing users to view
and navigate different types of data.
• A Web page is a document encoded with hypertext
markup language (HTML) tags.
• HTML allows designers to link content together via
hyperlinks.
• Every Web page has an address, a Uniform Resource
Locator (URL).
Major Features of the Internet -
The World Wide Web
This address is for an
Internet server that uses
The hypertext transfer protocol.
This address is for an
Internet server that uses
The hypertext transfer protocol.
This site belongs to a
company named Glencoe.
This site belongs to a
company named Glencoe.
This site is on the part
of the Internet known
as the World Wide Web.
This site is on the part
of the Internet known
as the World Wide Web.
To find the specific Web pages
that accompany this book, your
browser follows the URL’s path
to a folder named “norton,” then
to a subfolder named “online.”
To find the specific Web pages
that accompany this book, your
browser follows the URL’s path
to a folder named “norton,” then
to a subfolder named “online.”
• Electronic mail (e-mail) is the most popular reason
people use the Internet.
• To create, send, and receive e-mail messages, you need
an e-mail program and an account on an Internet mail
server with a domain name.
• To use e-mail, a user must have an e-mail address,
which you create by adding your user name to the
e-mail server's domain name, as in jsmith@aol.com.
Major Features of the Internet - E-Mail

More Related Content

What's hot

Web browsers and website publishing
Web browsers and website publishingWeb browsers and website publishing
Web browsers and website publishingGurleen Kaur
 
History of the internet
History of the internetHistory of the internet
History of the internetKallie Sulanke
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet ArchDuty
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.Anish Thomas
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
A Brief History of Internet
A Brief History of InternetA Brief History of Internet
A Brief History of InternetKia Namoc
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologiesVTC_NeilaSofien
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 

What's hot (20)

Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Web browsers and website publishing
Web browsers and website publishingWeb browsers and website publishing
Web browsers and website publishing
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
PPT On INTERNET
PPT On INTERNETPPT On INTERNET
PPT On INTERNET
 
The internet
The internetThe internet
The internet
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Internet
InternetInternet
Internet
 
A Brief History of Internet
A Brief History of InternetA Brief History of Internet
A Brief History of Internet
 
What is the internet
What is  the internetWhat is  the internet
What is the internet
 
World Wide Web (WWW)
World Wide Web (WWW)World Wide Web (WWW)
World Wide Web (WWW)
 
Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologies
 
The internet
The internetThe internet
The internet
 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet
InternetInternet
Internet
 

Viewers also liked

ICANN 51: Thick WHOIS Implementation (working session)
ICANN 51: Thick WHOIS Implementation (working session)ICANN 51: Thick WHOIS Implementation (working session)
ICANN 51: Thick WHOIS Implementation (working session)ICANN
 
ICANN Rules vs Privacy
ICANN Rules vs PrivacyICANN Rules vs Privacy
ICANN Rules vs PrivacyBlacknight
 
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...Ghassan Shahrour
 
Power Point Lesson 08 P2
Power Point Lesson 08 P2Power Point Lesson 08 P2
Power Point Lesson 08 P2Nasir Jumani
 
The Needs Of Computation
The  Needs Of  ComputationThe  Needs Of  Computation
The Needs Of ComputationNasir Jumani
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep WebWendy DeGroat
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet WorksDan Goldstein
 
Setting standards-friendly web type
Setting standards-friendly web typeSetting standards-friendly web type
Setting standards-friendly web typePascal Klein
 
How the internet works
How the internet worksHow the internet works
How the internet worksSharon Chen
 
ICANN 51: DNS Risk Framework
ICANN 51: DNS Risk FrameworkICANN 51: DNS Risk Framework
ICANN 51: DNS Risk FrameworkICANN
 
Power Point Lesson 07 P1
Power Point  Lesson 07  P1Power Point  Lesson 07  P1
Power Point Lesson 07 P1Nasir Jumani
 
Infobrokering And Searching The Deep Web
Infobrokering And Searching The Deep WebInfobrokering And Searching The Deep Web
Infobrokering And Searching The Deep WebWitold Kozakiewicz
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it worksshahnaz10
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAPNIC
 
Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!Mohammad kermani
 
Akram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS ForumAkram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS ForumICANN
 
Power Point Lesson 08 P1
Power Point Lesson 08 P1Power Point Lesson 08 P1
Power Point Lesson 08 P1Nasir Jumani
 

Viewers also liked (20)

ICANN 51: Thick WHOIS Implementation (working session)
ICANN 51: Thick WHOIS Implementation (working session)ICANN 51: Thick WHOIS Implementation (working session)
ICANN 51: Thick WHOIS Implementation (working session)
 
ICANN Rules vs Privacy
ICANN Rules vs PrivacyICANN Rules vs Privacy
ICANN Rules vs Privacy
 
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
 
Power Point Lesson 08 P2
Power Point Lesson 08 P2Power Point Lesson 08 P2
Power Point Lesson 08 P2
 
The Needs Of Computation
The  Needs Of  ComputationThe  Needs Of  Computation
The Needs Of Computation
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep Web
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Setting standards-friendly web type
Setting standards-friendly web typeSetting standards-friendly web type
Setting standards-friendly web type
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Internet servers
Internet serversInternet servers
Internet servers
 
ICANN 51: DNS Risk Framework
ICANN 51: DNS Risk FrameworkICANN 51: DNS Risk Framework
ICANN 51: DNS Risk Framework
 
Power Point Lesson 07 P1
Power Point  Lesson 07  P1Power Point  Lesson 07  P1
Power Point Lesson 07 P1
 
Infobrokering And Searching The Deep Web
Infobrokering And Searching The Deep WebInfobrokering And Searching The Deep Web
Infobrokering And Searching The Deep Web
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Why do some people believe in myths?
Why do some people believe in myths?Why do some people believe in myths?
Why do some people believe in myths?
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
 
Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!
 
Akram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS ForumAkram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS Forum
 
Power Point Lesson 08 P1
Power Point Lesson 08 P1Power Point Lesson 08 P1
Power Point Lesson 08 P1
 

Similar to How the internet works

Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxsahilraturi
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfSeethaDinesh
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptxreddragon32
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
5 introduction to internet
5 introduction to internet5 introduction to internet
5 introduction to internetVedpal Yadav
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Week two lecture
Week two lectureWeek two lecture
Week two lectureHarry Essel
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
chapter07 - The Internet.pdf
chapter07 - The Internet.pdfchapter07 - The Internet.pdf
chapter07 - The Internet.pdfsatonaka3
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Introduction_to_Intndhjehddhjdhrjkrhernet.pptx
Introduction_to_Intndhjehddhjdhrjkrhernet.pptxIntroduction_to_Intndhjehddhjdhrjkrhernet.pptx
Introduction_to_Intndhjehddhjdhrjkrhernet.pptxrohitkumar54448
 

Similar to How the internet works (20)

Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Unit 4
Unit 4Unit 4
Unit 4
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Overview of Internet
Overview of InternetOverview of Internet
Overview of Internet
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Internet
InternetInternet
Internet
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
5 introduction to internet
5 introduction to internet5 introduction to internet
5 introduction to internet
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Week two lecture
Week two lectureWeek two lecture
Week two lecture
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
chapter07 - The Internet.pdf
chapter07 - The Internet.pdfchapter07 - The Internet.pdf
chapter07 - The Internet.pdf
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Internet
InternetInternet
Internet
 
Introduction_to_Intndhjehddhjdhrjkrhernet.pptx
Introduction_to_Intndhjehddhjdhrjkrhernet.pptxIntroduction_to_Intndhjehddhjdhrjkrhernet.pptx
Introduction_to_Intndhjehddhjdhrjkrhernet.pptx
 

How the internet works

  • 1.
  • 2. Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information stored in a computer? What is the location in memory where they are stored called? How much information is stored in one location? How does the RAM communicate with the Hard Drive? How do they get power?
  • 4. This lesson includes the following sections: • The Internet: Then and Now • How the Internet Works • Major Features of the Internet • Online Services • Internet Features in Application Programs
  • 5. • The Internet was created by the Advanced Research Projects Agency (ARPA) and the U.S. Department of Defense for scientific and military communications. • The Internet is a network of interconnected networks. Even if part of its infrastructure was destroyed, data could flow through the remaining networks. • The Internet uses high-speed data lines, called backbones, to carry data. Smaller networks connect to the backbone, enabling any user on any network to exchange data with any other user. • ARPANET, NSFnet, Internet • Internetworking: the process of connecting separate networks The Internet: Then and Now
  • 6.
  • 7. • TCP/IP • Routing Traffic Across the Internet • Addressing Schemes • Domains and Subdomains How the Internet Works
  • 8. • Every computer and network on the Internet uses the same protocols (rules and procedures) to control timing and data format. • The protocol used by the Internet is the Transmission Control Protocol/Internet Protocol, or TCP/IP. • No matter what type of computer system you connect to the Internet, if it uses TCP/IP, it can exchange data with any other type of computer. How the Internet Works - TCP/IP
  • 9. • Most computers don't connect directly to the Internet. Instead, they connect to a smaller network that is connected to the Internet backbone. • The Internet includes thousands of host computers (servers), which provide data and services as requested by client systems. • When you use the Internet, your PC (a client) requests data from a host system. The request and data are broken into packets and travel across multiple networks before being reassembled at their destination. How the Internet Works - Routing Traffic Across the Internet
  • 10. The Operation of the Internet • Packets of information flow between machines governed by common rules (protocols): – Internet protocol (IP) – Transport control protocol (TCP) • Internet is a packet-switching network – Messages are decomposed into packets, containing part of the message, plus information on the sending and receiving machines and how the packet relates to the other packets – Packets travel independently and possibly on different routes through the Internet – Packets are reassembled into the message at the receiving machine.
  • 11.
  • 12. • In order to communicate across the Internet, a computer must have a unique address. • Every computer on the Internet has a unique numeric identifier, called an Internet Protocol (IP) address. • Each IP address has four parts – each part a number between 0 and 255. An IP address might look like this: 205.46.117.104. How the Internet Works - Addressing Schemes
  • 13. Where to Begin? Internet Addresses • Because the Internet is a global network of computers each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is known as an IP address. (IP stands for Internet Protocol; more on this later.) • The picture below illustrates two computers connected to the Internet; your computer with IP address 1.2.3.4 and another computer with IP address 5.6.7.8. The Internet is represented as an abstract object in-between.
  • 14. • If you connect to the Internet through an Internet Service Provider (ISP), you are usually assigned a temporary IP address for the duration of your dial-in session. If you connect to the Internet from a local area network (LAN) your computer might have a permanent IP address or it might obtain a temporary one from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if you are connected to the Internet, your computer has a unique IP address.
  • 15. Check It Out - The Ping Program IF you're using Microsoft Windows or a flavor of Unix and have a connection to the Internet, there is a handy program to see if a computer on the Internet is alive. It's called ping, probably after the sound made by older submarine sonar systems.1 If you are using Windows, start a command prompt window. If you're using a flavor of Unix, get to a command prompt. Type ping www.yahoo.com. The ping program will send a 'ping' (actually an ICMP (Internet Control Message Protocol) echo request message) to the named computer. The pinged computer will respond with a reply. The ping program will count the time expired until the reply comes back (if it does). Also, if you enter a domain name (i.e. www.yahoo.com) instead of an IP address, ping will resolve the domain name and display the computer's IP address. More on domain names and address resolution later.
  • 16. Protocol Stacks and Packets So your computer is connected to the Internet and has a unique address. How does it 'talk' to other computers connected to the Internet? An example should serve here: Let's say your IP address is 1.2.3.4 and you want to send a message to the computer 5.6.7.8. The message you want to send is "Hello computer 5.6.7.8!". Obviously, the message must be transmitted over whatever kind of wire connects your computer to the Internet. Let's say you've dialed into your ISP from home and the message must be transmitted over the phone line. Therefore the message must be translated from alphabetic text into electronic signals, transmitted over the Internet, then translated back into alphabetic text. How is this accomplished? Through the use of a protocol stack. Every computer needs one to communicate on the Internet and it is usually built into the computer's operating system (i.e. Windows, Unix, etc.). The protocol stack used on the Internet is referred to as the TCP/IP protocol stack because of the two major communication protocols used. The TCP/IP stack looks like this:
  • 17. Protocol LayerComments Application Protocols LayerProtocols specific to applications such as WWW, e-mail, FTP, etc. Transmission Control Protocol Layer TCP directs packets to a specific application on a computer using a port number. Internet Protocol Layer IP directs packets to a specific computer using an IP address. Hardware Layer Converts binary packet data to network signals and back. (E.g. ethernet network card, modem for phone lines, etc.)
  • 18. • In addition to an IP address, most Internet hosts or servers have a Domain Name System (DNS) address, which uses words. • A domain name identifies the type of institution that owns the computer. An Internet server owned by IBM might have the domain name ibm.com. • Some enterprises have multiple servers, and identify them with subdomains, such as products.ibm.com. How the Internet Works - Domains and Subdomains
  • 19.
  • 20. • The World Wide Web • E-Mail • News • Telnet • File Transfer Protocol (FTP) • Internet Relay Chat (IRC) Major Features of the Internet
  • 21. • The World Wide Web is a part of the Internet, which supports hypertext documents, allowing users to view and navigate different types of data. • A Web page is a document encoded with hypertext markup language (HTML) tags. • HTML allows designers to link content together via hyperlinks. • Every Web page has an address, a Uniform Resource Locator (URL). Major Features of the Internet - The World Wide Web
  • 22. This address is for an Internet server that uses The hypertext transfer protocol. This address is for an Internet server that uses The hypertext transfer protocol. This site belongs to a company named Glencoe. This site belongs to a company named Glencoe. This site is on the part of the Internet known as the World Wide Web. This site is on the part of the Internet known as the World Wide Web. To find the specific Web pages that accompany this book, your browser follows the URL’s path to a folder named “norton,” then to a subfolder named “online.” To find the specific Web pages that accompany this book, your browser follows the URL’s path to a folder named “norton,” then to a subfolder named “online.”
  • 23. • Electronic mail (e-mail) is the most popular reason people use the Internet. • To create, send, and receive e-mail messages, you need an e-mail program and an account on an Internet mail server with a domain name. • To use e-mail, a user must have an e-mail address, which you create by adding your user name to the e-mail server's domain name, as in jsmith@aol.com. Major Features of the Internet - E-Mail