Chapter Two:Internet Fundamentals: Operations, Management, the Web, and Wireless By: Laura Marshall, Mary Mauro, and Doug Moore
“The Internet IS for everyone- but it won't be unless WE make it so." • Quote from Vinton Cerf, co-founder of the Internet. • Believes the Internet is a “global megaphone for all voices” • Cerf identifies such barriers as: • affordability, restricted access, keeping up with demands, accessibility, legal restrictions, privacy and confidentiality, and irresponsible uses. • Chapter 2: These barriers exist for reasons- generate revenues, over crowding, promotion effectiveness, etc.
How Web Servers Work • The Main Components -Internet – a gigantic collection of millions of computers that allows other computers to network together and communicate. Computers are linked to the internet through ISP’s (internet service providers) - Clients and Servers - each computer on the internet is either 1 of 2 things: a client or a server. Servers are machines that provide services to other machines. In turn, those other machines that request service are clients. - IP Addresses - to keep all the machines straight, they are all assigned a specific unique IP (internet protocol) address. IP addresses are uniquely assigned per session – this way ISP’s can have 1 IP address per modem, not per customer. - Domain Names – a human-worded address (i.e. www.blogger.com) that is easier to remember than an IP address (i.e. 220.127.116.11) They are broken down into three parts: -The host name (“www”), the Domain Name (“blogger”), and the top level domain name (“.com”) - Name Servers – a set of servers called Domain Name Servers (DNS) are simple databases that map names to IP addresses and are distributed all over the internet - Ports –any service machine make its services available using numbered ports - Protocols – the pre-defined way that someone who wants to use the service talks to the server. • Putting it All Together – The browser breaks the URL into three parts (host, domain, and upper domain), then communicates with a name server to translate the domain name into an IP address, then forms a connection to the web server at an IP address on a specific port. Following HTTP protocol, the browser sends a GET request to the server, which in turn sends the HTML text from the server to the browser, in which the browser finally reads the HTML tags and formats the page onto your screen.
“The Incredible Hidden Wireless Connection” • There are many drawbacks to wireless connections. -privacy -security • Un-permitted people can access other people’s wireless connections through certain access points. -Fear of identity theft -Credit Card Information, etc. • Even if an administer thinks he is secured and regulated, people can still get connected and steal information through these hidden connections, known as access points. • Also, wireless connections are linked through a chip that connects to a GPS system that find any locations of people connected through a wireless connection. • The use of wireless connections is a huge problem for many companies. Many companies are afraid of using this new technology because of the detrimental problems that could occur within their company, such as stealing highly confidential information.