0% found this document useful (0 votes)
117 views1 page

Internet

When a device makes a post request or sends information to a website or server, it is submitting data like a form or signing up for an account. A get request is when a device asks for a page, file, or other resource from a server. HTTP is the communication language that manages sending and receiving files between browsers and servers over the internet. HTTPS indicates that a website connection is secured with SSL/TLS encryption to protect the information being transmitted.

Uploaded by

api-473857759
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views1 page

Internet

When a device makes a post request or sends information to a website or server, it is submitting data like a form or signing up for an account. A get request is when a device asks for a page, file, or other resource from a server. HTTP is the communication language that manages sending and receiving files between browsers and servers over the internet. HTTPS indicates that a website connection is secured with SSL/TLS encryption to protect the information being transmitted.

Uploaded by

api-473857759
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Post request

When the personal device/computer


"posts" or sends information, like a form,
or signing up on a website.
IETF
Internet Engineering Task Force

Get request "An international community of


A device asking for a page, website,
document, image, or file. network designers, operators,
vendors, and researchers..."
(source)
HTTP
Stands for Hypertext Transfer
Protocol. Communication language
SSL/TLS
between browsers and servers.
Manages the sending and receving of
A layer of security that
Before the internet,
web files . prevents hackers from
there was the
HTTPS accessing your information
on websites
Shows on the URL that the website ARPANET. It was a
is secured (along with the lock
defense department
symbol alongside it).
research project.
HTML
Stands for hyper text markup
language. It is a coding language
to tell a website how it should look.

Websites use cookies


to remember who you are

Digital
Certificate
Official claim that
the website is the
website, and not a
fake one.
Internet Service Providers Wifi Routers route internet

(ISP) connection to all devices (in your


home/office, etc)

LAN WAN
Local area network of Wide area network A website's address is
computers and devices. consisted of multiple LANs. called itsURL (uniform
High speed and High speed and expensive. resource locater)
inexpensive.

Modems bring the

Is overseen by internet to your location.


Modems translate analog
networks
signals to digital signals.

Built off protocol ,


a well known set of Transmits data

THE
rules to communicate
using packets.
between machines.

INTERNET Invented by

Uses binary Vint Kerf


and Bob
info
Kahn

Internet Protocol (IP) DNS manages the sending and


receiving of web files. Computers
IP is the protocol that allows computers to use DNS Servers and
communicate and send data using the associates domain names to the

internet DNS server, which provides the IP

IP Address address.

A unique, identifying number/address


for each machine on a network DNS servers are organized by

domain names (.com, .gov, .org)


Designed in 1973 <In progress>

om ov rg
.c .g .o

IPv IPv6
4
• 32-Bits long • 128-Bits long

addresses addresses

• >4 billion unique • >340 undecillion


unique addresses
addresses

IP Address Hierarchy
10010101 10100101 11010110 10100110
Network - Subnetwork -  Device  Since DNS servers are an open public
communication, they are vulnerable to cyber
attacks, or DNS Spoofing .

DHCP
IP, DNS, TC
P,and router
s are scaled
so as the in ,
ternet grow Dynamic Host Configuration Protocol
s, there won
be an interr 't
uption of se A service that runs on a server that provides
rvice. a computer/machine an IP address (as a lease to
ensure IP addresses are not repeated), a subnet
mask, a default gateway, and a DNS server

The amount of bits sent


Band width is
Latency is how long it can be altered by band
takes the bit to travel width (maximum capacity measured by bitrate
from the source to the without faulty errors of
Ex: 200 bits per second
requesting device. transportation)

Byte (8 bits)

Packets Packet Bit


These contain the data or bits that the
computer is sending over the internet. A large s
file will break apart into multiple packets and
sretuoR

reassemble at the end.

Routers
Packets don't choose the path they go to. Routers,
or switches, do. They act as traffic controllers. TCP
The Transmission Control Protocol makes sure
that all the assembled packets are the correct
ones, present, etc so they can "deliver" the
packets back to the requesting device.

Different routes makes the internet reliable. Even if multiple routes are
damaged, there will be others to choose from.

Bits can be sent by electricity through ethernet wires, radio


by wireless, or light by fiber optic cables. Sending
through light is the fastest and there is not a chance of
signal loss. Fiber optic cables can be laid under the sea and
under the ground.

You might also like