Basic of Internet Work

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

BASIC OF INTERNET WORK

1|Page
 INTERNET:-
The internet is a global network of interconnected computers and servers that
communicate with each other using standardized protocols. It allows people to access and
share information, communicate, and conduct various activities online. Here are some key
concepts related to the internet:

1. World Wide Web (WWW): This is a system of interlinked hypertext documents


accessed via the internet. It uses web browsers to display web pages that can contain text,
images, videos, and links to other pages.

2. IP Address: Every device connected to the internet has a unique identifier known as an
Internet Protocol (IP) address. This address helps in locating and identifying devices on
the network.

3. Protocols: The internet operates using various protocols, which are sets of rules that
govern how data is transmitted. The most common protocols are HTTP (Hypertext
Transfer Protocol) for web pages and FTP (File Transfer Protocol) for transferring files.

4. Data Transmission: Information on the internet is transmitted in small packets. These


packets can take different routes to reach their destination, where they are reassembled
into the original message.

5. Internet Service Providers (ISPs): These are companies that provide individuals and
organizations access to the internet. They offer various types of connections, such as
broadband, fiber-optic, and dial-up.

6. Web Browsers: Software applications like Google Chrome, Mozilla Firefox, and Safari
that allow users to access and navigate the web.

7. Security: With the vast amount of information shared online, internet security is crucial.
This includes measures like encryption, firewalls, and antivirus software to protect data
from unauthorized access.

 CLASSIFICATION OF INTERNET :-

Basically internet is classified into two types are:


1.Intranet
2.Extranet
Intranet and extranet are both widely used forms of networks, but they differ in many ways.

2|Page
Intranets and extranet are both private networks, but they differ in significant ways.

Intranet:
 Definition: A private network accessible only to an organization's staff.
 Purpose: Facilitates internal communication, collaboration, and information sharing
within the organization.
 Access: Restricted to employees and authorized personnel only.
 Examples: Internal websites, document management systems, and employee portals.
Extranet:
 Definition: A private network that allows controlled access to outsiders, typically business
partners or clients.
 Purpose: Enables collaboration and information exchange between the organization and
external stakeholders.
 Access: Restricted to specific external users, often requiring authentication.
 Examples: Supplier portals, customer service platforms, and partner collaboration sites.

3|Page
 DEFINE DNS:
DNS, or Domain Name System, is a fundamental component of the internet that
translates human-friendly domain names (like www.example.com) into IP addresses (like
192.0.2.1) that computers use to identify each other on the network

 DNS working:
The process of DNS resolution involves converting a hostname (such as www.example.com)
into a computer-friendly IP address (such as 192.168.1.1). An IP address is given to each
device on the Internet, and that address is necessary to find the appropriate Internet device -
like a street address is used to find a particular home. When a user wants to load a webpage, a
translation must occur between what a user types into their web browser (example.com) and
the machine-friendly address necessary to locate the example.com webpage.
In order to understand the process behind the DNS resolution, it’s important hardware
components a DNS query must pass between. For the web browser, the DNS lookup occurs
"behind the scenes" and requires no interaction from the user’s computer apart from the
initial request.
There are 4 DNS servers involved in loading a webpage:
DNS recursor - The recursor can be thought of as a librarian who is asked to go find a
particular book somewhere in a library. The DNS recursor is a server designed to receive
queries from client machines through applications such as web browsers. Typically the
recursor is then responsible for making additional requests in order to satisfy the client’s
DNS query.

4|Page
Root nameserver - The root server is the first step in translating (resolving) human
readable host names into IP addresses. It can be thought of like an index in a library that
points to different racks of books - typically it serves as a reference to other more specific
locations.
TLD nameserver - The top level domain server (TLD) can be thought of as a specific rack
of books in a library. This nameserver is the next step in the search for a specific IP
address, and it hosts the last portion of a hostname (In example.com, the TLD server is
“com”).
Authoritative nameserver - This final nameserver can be thought of as a dictionary on a
rack of books, in which a specific name can be translated into its definition. The
authoritative nameserver is the last stop in the nameserver query. If the authoritative name
server has access to the requested record, it will return the IP address for the requested
hostname back to the DNS Recursor (the librarian) that made the initial request.

 Steps in a DNS lookup:

 A user types ‘example.com’ into a web browser and the query travels into the
Internet and is received by a DNS recursive resolver.

 The resolver then queries a DNS root nameserver (.).

 The root server then responds to the resolver with the address of a Top Level
Domain (TLD) DNS server (such as .com or .net), which stores the information
for its domains. When searching for example.com, our request is pointed
toward the .com TLD.

 The resolver then makes a request to the .com TLD.

 The TLD server then responds with the IP address of the domain’s
nameserver, example.com.

 Lastly, the recursive resolver sends a query to the domain’s nameserver.

5|Page
 The IP address for example.com is then returned to the resolver from the
nameserver.

 The DNS resolver then responds to the web browser with the IP address of the
domain requested initially.

Once the 8 steps of the DNS lookup have returned the IP address for
example.com, the browser is able to make the request for the web
page:

 The browser makes a HTTP request to the IP address.

 The server at that IP returns the webpage to be rendered in the browser (step
10).

 TYPES OF DNS:
They are two types are:
1. Forwarding DNS
2. Resolving DNS
FORWARDING DNS:

6|Page
 Definition: A forwarding DNS server, often called a DNS forwarder, takes DNS
queries from clients and forwards them to another DNS server for resolution.
 Purpose: It helps reduce the load on local DNS servers and can enhance performance
by directing queries to more efficient or reliable DNS servers.
 Usage: Common in larger networks where a local DNS server might forward requests
to a public DNS service (like Google DNS or Cloudflare) for resolution.
 Benefits:
o Simplifies DNS management.
o Can improve response times by using optimized external servers.
o Allows for centralized logging and monitoring of DNS queries.
Resolving DNS:
 Definition: A resolving DNS server (or DNS resolver) is responsible for processing
DNS queries from clients and finding the corresponding IP addresses. It performs the
entire resolution process, which may involve multiple steps and server lookups.
 Purpose: It translates domain names into IP addresses by querying other DNS servers
if necessary, following the DNS hierarchy until it retrieves the correct information.
 Usage: Typically found in ISPs or local networks where clients query the resolver for
domain name resolutions.
 Process:
o Receives a domain name query from a client.
o Checks its cache for the answer.
o If not cached, it may query root DNS servers, TLD servers, and authoritative
servers until it finds the correct IP address.

Feature Forwarding DNS Resolving DNS

Definition Forwards DNS queries to another Processes and resolves DNS


server queries

Function Acts as an intermediary for DNS Finds the IP address for a given
queries domain

Role Directs traffic to external DNS Performs the entire resolution


servers process

Example A local DNS server forwarding to A resolver querying various DNS


Google DNS servers to find an IP address

7|Page
 OSI Models:

The OSI model, created in 1984 by ISO, is a reference framework that explains the process
of transmitting data between computers. It is divided into seven layers that work together to
carry out specialised network functions, allowing for a more systematic approach to
networking.

Data Flow In OSI Model:


When we transfer information from one device to another, it travels through 7 layers of OSI
model. First data travels down through 7 layers from the sender’s end and then climbs

8|Page
back 7 layers on the receiver’s end.
Data flows through the OSI model in a step-by-step process:
 Application Layer: Applications create the data.
 Presentation Layer: Data is formatted and encrypted.
 Session Layer: Connections are established and managed.
 Transport Layer: Data is broken into segments for reliable delivery.
 Network Layer: Segments are packaged into packets and routed.
 Data Link Layer: Packets are framed and sent to the next device.
 Physical Layer: Frames are converted into bits and transmitted physically.
Each layer adds specific information to ensure the data reaches its destination correctly, and
these steps are reversed upon arrival.

 Each layer:
7. The application layer

9|Page
This is the only layer that directly interacts with data from the user. Software applications
like web browsers and email clients rely on the application layer to initiate
communications. But it should be made clear that client software applications are not part
of the application layer; rather the application layer is responsible for the protocols and data
manipulation that the software relies on to present meaningful data to the user.
Application layer protocols include HTTP as well as SMTP (Simple Mail Transfer Protocol
is one of the protocols that enables email communications).
6. The presentation layer

This layer is primarily responsible for preparing data so that it can be used by the
application layer; in other words, layer 6 makes the data presentable for applications to
consume. The presentation layer is responsible for translation, encryption, and
compression of data.
Two communicating devices communicating may be using different encoding methods, so
layer 6 is responsible for translating incoming data into a syntax that the application layer
of the receiving device can understand.
If the devices are communicating over an encrypted connection, layer 6 is responsible for
adding the encryption on the sender’s end as well as decoding the encryption on the
receiver's end so that it can present the application layer with unencrypted, readable data.
Finally the presentation layer is also responsible for compressing data it receives from the
application layer before delivering it to layer 5. This helps improve the speed and efficiency
of communication by minimizing the amount of data that will be transferred.
5. The session layer

This is the layer responsible for opening and closing communication between the two
devices. The time between when the communication is opened and closed is known as the
session. The session layer ensures that the session stays open long enough to transfer all the

10 | P a g e
data being exchanged, and then promptly closes the session in order to avoid wasting
resources.
The session layer also synchronizes data transfer with checkpoints. For example, if a 100
megabyte file is being transferred, the session layer could set a checkpoint every 5
megabytes. In the case of a disconnect or a crash after 52 megabytes have been transferred,
the session could be resumed from the last checkpoint, meaning only 50 more megabytes of
data need to be transferred. Without the checkpoints, the entire transfer would have to begin
again from scratch.
4. The transport layer

Layer 4 is responsible for end-to-end communication between the two devices. This
includes taking data from the session layer and breaking it up into chunks called segments
before sending it to layer 3. The transport layer on the receiving device is responsible for
reassembling the segments into data the session layer can consume.
The transport layer is also responsible for flow control and error control. Flow control
determines an optimal speed of transmission to ensure that a sender with a fast connection
does not overwhelm a receiver with a slow connection. The transport layer performs error
control on the receiving end by ensuring that the data received is complete, and requesting a
retransmission if it isn’t.
Transport layer protocols include the Transmission Control Protocol (TCP) and
the User Datagram Protocol (UDP).

3. The network layer

The network layer is responsible for facilitating data transfer between two different

11 | P a g e
networks. If the two devices communicating are on the same network, then the network
layer is unnecessary. The network layer breaks up segments from the transport layer into
smaller units, called packets, on the sender’s device, and reassembling these packets on
the receiving device. The network layer also finds the best physical path for the data to
reach its destination; this is known as routing.
Network layer protocols include IP, the Internet Control Message Protocol
(ICMP), the Internet Group Message Protocol (IGMP), and the IPsec suite.
2. The data link layer

The data link layer is very similar to the network layer, except the data link layer facilitates
data transfer between two devices on the same network. The data link layer takes packets
from the network layer and breaks them into smaller pieces called frames. Like the network
layer, the data link layer is also responsible for flow control and error control in intra-network
communication (The transport layer only does flow control and error control for inter-
network communications).

1. The physical layer

This layer includes the physical equipment involved in the data transfer, such as the cables
and switches. This is also the layer where the data gets converted into a bit stream, which
is a string of 1s and 0s. The physical layer of both devices must also agree on a signal
convention so that the 1s can be distinguished from the 0s on both devices.

12 | P a g e
 Advantages of OSI Model:
The OSI model helps users and operators of computer networks:
Determine the required hardware and software to build their network.
Understand and communicate the process followed by components communicating across a
network.
Perform troubleshooting, by identifying which network layer is causing an issue and
focusing efforts on that layer.
 Types of Internet Protocals :

1. TCP (Transmission Control Protocol): A connection-oriented protocol that ensures


reliable data transmission by guaranteeing that packets are delivered in order and
without errors. It's essential for applications where accuracy is crucial, such as web
browsing and email.
2. UDP (User Datagram Protocol): A connectionless protocol that enables fast data
transmission without reliability guarantees. Ideal for real-time applications like video
streaming and online gaming, where speed is more important than error correction.
3. HTTP (Hypertext Transfer Protocol): The foundation of data communication on
the web, HTTP facilitates the transfer of web pages between browsers and servers. It
operates in a stateless manner, allowing for efficient requests.
4. HTTPS (Hypertext Transfer Protocol Secure): An extension of HTTP that
encrypts data exchanged between the browser and server using SSL/TLS. This
ensures secure transactions, making it vital for online banking and e-commerce.
5. FTP (File Transfer Protocol): A standard network protocol for transferring files
between systems. It allows users to upload and download files, supporting both
anonymous and authenticated access.
6. FTPS (File Transfer Protocol Secure): An extension of FTP that adds a layer of
security through SSL/TLS encryption, ensuring secure file transfers suitable for
sensitive data.
7. DHCP (Dynamic Host Configuration Protocol): Automates the assignment of IP
addresses and network settings to devices, simplifying network management and
reducing manual configuration.

13 | P a g e
14 | P a g e

You might also like