How the Internet Work? (8 episode) (IP Addresses & DNS (:red_flag:…
How the Internet Work?
What is Internet?
Co created of the Interned was Bob Kahn and his partner.
Know as Arpanet during a long time ago.
Made up of an incredible large number of independent operated network.
There is no central control on how packedare routed or where pieces network are built.
Internet breaking message up into block and sending them fast through mesh network.
Letting to the creation of application.
IP Addresses & DNS
:red_flag: Communication device connect Wi-Fi, and Wi-Fi connect to an internet service provider (ISP), and ISP connect to Internet.
:red_flag: Internet is a design of philosophy and an architecture expressed in a set of protocols.
Protocol refer to a set of rules and standards used to communicate between the devices.
:red_flag: All the different devices on the internet have a unique addresses in number.
Internet protocol or IP is the most important protocol used in Internet communication
Provides more than 4 Billion unique addresses for devices connecting to the Internet.
32 bits long with 8 bit for each part of the address.
Design in 1973 and adopted in 1980s.
Provides over 340 undecillion unique addresses and contain 128 bits.
:check: DNS servers was create to be an open public communication protocol for government or education institution where connected in a distributed hierarchy.
:check: DNS Spoofing is one of the DNS attack occur when a hacker tap into a DNS server and changes it to match a domain name with the wrong IP addresses.
Packets, Routing & Reliability
:<3: Transmission control protocol (TCP) manages the sending and receiving of all the data as packets.
:<3: Each packet has the Internet address of where it came from and where it’s going.
:<3: Router act like traffic manager to keep the packets moving through the networks smoothly.
:<3: TCP and router is scalable where can work with 8 or 8billion devices.
:<3: Based on the principle of fault tolerance and redundancy, the more routers the reliable the internet becomes.
:<3: Computer device or routers along the Internet help all packets make their way to the destination reassembled in order.
HTTP & HTML
Hypertext Transfer Protocol (HTTP) is the language used to communicate between web browser and servers.
Hyper Text Markup Language (HTML) is the language to tell a web browser how to make a page look.
:red_flag: Since the Internet is completely open and the connections are share, it make possible for hacker to snoop on any personal information that send over Internet.
:red_flag: Safe websites prevent snooping or tampering by communicating with Secure Socket Layer (SSL) and its successor Transport Layer Security (TLS).
Encrytion & Public Keys
:star: Decryption is the process of un-scrambling the message to make it readable.
:star: Symmetric Encryption refer to when the sender and receiver share the same key to scramble and unscramble a message.
:star: Public key is used to encrypt data and anybody can use to create a secret message, but the secret can only be decrypted by a computer with access to the private key.
:star:Public key cryptography is the foundation of all secure messaging on the open Internet.
Cybersecurity & Crime
Cybercrime causes huge problem for society personally, financially, and even in matter of national security.
Eg. Software viruese, Denial-of-service attacks (DDoS), and phishing scams (spam email).
A computer virus executable program that gets installed, usually unintentionally, and harms the user and computer.
Computer Virus can steal or delete any files, control other program, or even allow someone else to remotely control the computer.
Steps to avoid getting hacked
:check: Use strong passwords
:check: Check for authentic web addresses
:check: Install system security updates often
:check:Don’t install software you don’t trust
How search work
:black_flag: Search engines are constantly scanning the web in advance.
:black_flag: The internet is a web of pages connected to each other by hyperlinks.
:black_flag: Search engines are constantly running a program that collect information called “spider”.
:black_flag: Search index is a database of information used for doing a search.
:black_flag: Each search engines rank the page based on ranking algorithm.
:black_flag: Search programs are always evolving to improve the algorithms for better and faster result.
Wires, Cables and Wifi
:pencil2: Enable Information (picture, text message or email) send from one place to another.
:pencil2: Information is made of bit, and Internet ship binary information (binary System).
:pencil2: The bit can be send through electricity (Ethernet wire), light (fiber optic cable), and radio wave (wireless).
8 bits = 1 byte
1024 bytes = 1 kilobyte
1024 kilobyte = 1 megabyte
The bit can be send through electricity (Ethernet wire), light (fiber optic cable), and radio wave (wireless).
The signal can be send and receive though cable Ethernet wire.
Wireless bit sending machines typically use a radio signal to send bit from one place to another.