Sei sulla pagina 1di 115

Introduction to the Internet

and Web
Introduction
By the turn of the century, information, including access to the Internet,
will be the basis for personal, economic, and political advancement.

The popular name for the Internet is the information superhighway.

Whether you want to find the latest financial news, browse through
library catalogs, exchange information with colleagues, or join in a lively
political debate, the Internet is the tool that will take you beyond
telephones, faxes, and isolated computers to a networked information
frontier. 

The Internet supplements the traditional tools you use to gather


information, Data Graphics, News and correspond with other people.
What is I N T E R N E T ?
• The largest network of networks in the
world.
What is I N T E R N E T ?
Continue……
• A network of networks, joining many
government, university and private
computers together and providing an
infrastructure for the use of E-mail, bulletin
boards, file archives, hypertext documents,
databases and other computational
resources.
What is I N T E R N E T ?
Continue……
• The vast collection of computer networks
which form and act as a single huge
network for transport of data and messages
across distances which can be anywhere
from the same office to anywhere in the
world.
Brief History of Internet
• ARPA – Advanced Research Project Agency.
• 1969 January 2 – started an experimental
Computer Network.
• Concept – No Server, but equal
importance/participation to every computer in
the Network.
• Even if, one or two node destroyed that will
not affect the Network.
Paul Baran
• Paul Baran developed
the field of packet
switching networks
while conducting
research at the historic
RAND organization.
Vinton Cerf
• Father of Internet
• Co-designer of the
TCP/IP networking
protocol.
Brief History of Internet
Continue……
• First named as ARPANET

• This is renamed as INTERNET

– TCP/IP (Transmission Control Protocol/Internet


Protocol)
Internet Growth Trends
• 1977: 111 hosts on Internet
• 1981: 213 hosts
• 1983: 562 hosts
• 1984: 1,000 hosts
• 1986: 5,000 hosts
• 1987: 10,000 hosts
• 1989: 100,000 hosts
• 1992: 1,000,000 hosts
• 2001: 150 – 175 million hosts
• 2002: over 200 million hosts
• By 2010, about 80% of the planet will be on the Internet
Internet Services
• Electronic Mail (e-mail)
• World Wide Web
• Telnet
• File Transfer Protocol (FTP)
• Internet Telephone
• Web TV/Radio
• Internet Relay Chat
• News Groups
How to Connect to Internet
Basic Communication
• Computer Networks interconnects
computers to exchange data and resource
sharing.
• Internet uses some kind of media to connect
computers/networks together.
– Eg:- Telephone line
Basic Communication
• Communication is done by passing
electrical signals across wires.
• Telephone wires are using Analog Signals
for communication.
• Computers are using Digital Signals for
processing.
MODEM
Modulator - Demodulator
• A modem is a device needed for
communication across a dial-up telephone
connection or for long distance
communication across a wire.
• A modem supports two-way
communication because it contains a
modulator for the signal being sent and a
demodulator for the signal being received.
MODEM
Modulator - Demodulator
• When a computer interacts with a modem,
it sends and receives digital data; the
modem encodes the data for transmission.

modem - 1 modem - 2
transmission line

Computer Computer
A B
Introduction to Computer Networks

Computer Networks

Computer network
connects two or more
autonomous
computers.

The computers can be


geographically located
anywhere.
Introduction to Computer Networks

Uses of Computer Networks


Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)
Distributed Processing

A task is divided among


multiple computers

19
Network Criteria
• Performance – affected by
1. # users
2. Type of medium
3. HW/SW
4. Transit time –amount of time required a message travel
from one device to another
5. Response time-is the elapsed time between in request and
response
• Reliability – measured by
1. Frequency of failure
2. Recovery time
• Security
1. Protection from unauthorized access
2. Viruses
20
TYPE OF CONNECTION
• Point to point
– A dedicated link is provided
between two devices.
– Satellite, infrared are example
• Multipoint or Multidrop Point – to – point connection
– More than two specific
devices share a single link
– Spatially shared connection –
several device can use the link
simultaneously
– Timeshared connection
-user must take their turns

Multipoint connection 21
Topology
• Physical or logical arrangement
• 4 basic types: mesh, star, bus, ring
• May often see hybrid

22
Mesh Topology
• Every device has a dedicated point-to-point link
to every other devices
• Dedicated
– Link carries traffic only between the two devices it
connects
– A fully connected mesh network has n(n-1)/2
physical channels to link n devices
– Every device on the network must have n-1 I/O
ports
• Advantage
– Less traffic
– robust
– Secure
– fault identification and isolation
• Disadvantage
– Need more resource (cable & ports)
– Expensive
23
Star Topology
• Each device has a dedicated point-to-point link
only to a central controller ( hub ).
• No direct traffic and link between devices
• Advantage
– Less expensive than mesh
– Easy to install and reconfigure
– Robustness
– Fault identification and isolation
• Disadvantage
• Single point of failure
• Star topology is mainly used in
LAN

24
Bus Topology
• A multipoint topology
• All devices are linked through a backbone cable
• Nodes are connected to the bus cable by drop lines and taps.
– Drop line
• A connection running between the device and the main cable
– Tap
• A connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core
• Advantage
– Ease of installation
• Disadvantages
– Difficult reconnection and fault isolation
– Broken or fault of the bus cable stops all transmission
– Damaged area reflect signals back creates noise

25
Ring Topology
• Each device is dedicated point-to-point connection only with the two
devices on either side of it
• Signal is passed from device to device until it reaches destination in
one direction
• Each device functions as a repeater
• Advantage
– Relatively easy to install and reconfigure
– Fault isolation is simplified
by issuing alarm
• Disadvantage
– Unidirectional traffic

26
Hybrid topology

27
Categories of Networks
• Based on
– Ownership
– Distance covered i.e. size
– Physical architecture
– Control
• Local Area Network (LAN)
– smaller geographical area
• Metropolitan Area Network (MAN)
– network extended over an entire city
• Wide Area Network (WAN)
– large geographical area

28
Local Area Network (LAN)
• Privately owned.
• Links the devices in single office.
• Within few kilometers.
• Resource sharing
• Transmission media
• Topology
– Bus,Ring,Star
• Data rates
– Early 4 to 16 mbps
29 – Now 100 to 1000 mbps
Introduction to Computer Networks

LAN
Network in small geographical Area
(Room, Building or a Campus) is called LAN

• LAN- Local Area Network


– used by schools and businesses
– used to connect around 10-500
computers in a building
– only accessible from within the building
Local Area Network

• A computer communication technology is


classified as a Local Area Network (LAN) if it
provides a way to interconnect multiple
computers across short distances.
• LANs are inexpensive, highly reliable, and
convenient to install and manage.
Local Area Network continue…

• A computer needs additional hardware to


connect it to a local area network.
• The hardware consists of a circuit board that
plugs into the computer and a cable that
attaches the circuit board to the LAN.
• Once connected, a computer uses the network
interface to send and receive data.
Local Area Network continue…

• Because each computer attached to a LAN


contains interface hardware that isolates the
computer from the LAN, the speed of the LAN
does not depend on the speed of the computers
that attach to it.
• As a result, heterogeneous computers can
communicate across a LAN.
Network Interface Card

• The primary function of a network interface


card (NIC) is to provide a physical link to a
computer network.
• This connection allows computers to
communicate with servers, as well as other
computers on the network.
Network Interface Card continue…
• Each NIC has a unique serial number, which is called a
MAC address.
• Every computer connected to the network is required to
have a unique MAC address that is stored on the network
interface card.
• If you are building a home network or utilizing
broadband Web access, your NIC connects you to the
outside world.
Network Interface Card continue…

• Network interface cards are either wired (LAN) or


wireless.
• Both NICs are generally compatible with Windows
and other popular operating systems.
• Most NICs use network drivers, which are computer
programs that allow software applications to
communicate with network hardware.
Network Interface Card continue…

• The necessary drivers are usually integrated into


the computer system. The drivers usually installs
automatically when the hardware is turned on.
VPN

• Virtual Private Networks (VPNs) are essentially


software applications that use a public network,
such as the Internet, to link computers together.
Metropolitan Area Networks(MAN)

• Size between LAN and WAN


• Covers the area inside the town or a city.
• Example are cable TV
• High speed DSL(Digital Subscriber Line)
to customer for internet connection

39
Wide Area Networks (WAN)
• Provides long distance transmission of data,
image, etc

• Example for a WAN is X.25,a network


designed to provide connectivity between
end users.

• Now it is replaced with Frame relay and


ATMs(Asynchronous Transfer mode)
•40 ISP are mainly used here.
Internetworks
• Connection of two or more networks
• Internet vs. internet
• internet
– Two or more networks can communicate with each other
• Internet
– A collaboration of more than hundreds of thousands interconnected networks

41
The Internet
• Collaboration of more than hundreds of
thousands of interconnected networks

• 1969 – started as ARPAnet, a small network


of connected computers-(Advanced
Research Project Agency) in Department of
Defense

• 1972 - Cerf and Kahn – packet delivery and


42 Transmission Control Protocol (TCP)
• For internetThe Internet
connection Today
today we use the services
of Internet service providers(ISPs).
• It is run by private agency, Not by government
ISP ISP ISP ISP

Regional Regional
ISP ISP

National
43 ISP
MAN&WAN

Network in a City is called MAN


(Metropolitan Area Network)

Network spread geographically (Country or


across Globe) is called WAN
(Wide Area Network)
Introduction to Computer Networks

Network Concepts
• Network Hardware
– Servers- powerful computers dedicated
to controlling all of the systems on the
network. All networked computers are
connected to the server in some way
– Printers- One of the reasons networks
were developed was to make a single
printer accessible by many different
computers
– Computers- individual machines that
are connected to the server
– Network Interface Card (NIC)- a device
that is installed into a computer to give
it a terminal that can run a cable to
access the network
Introduction to Computer Networks

Network Software
• Network Operating System
– the system software run on the server

– An operating system (OS) is software that computers


use to run the environment that allows you to access
applications and create files. Without an OS, a
computer is useless. OS Logos

• Networked Applications
– computer programs located on the network that are
accessed by individual computers

– This makes loading software on individual


computers unnecessary.
Computer Networks
Data Transmission Media
Data Transmission Media
Data Transmission Media
Data Transmission Media
Data Transmission Media
Data Transmission
Packet Switching
• This is the basic communication technology
that Internet uses.
• In Networks multiple devices shares
hardware facilities.
• Arranging for multiple devices to share a
single transmission path lowers cost
because it uses fewer wires and fewer
switching machines.
Packet Switching
• Granting one party exclusive access of a
shared transport path can be impractical
because it can delay all other parties.
• To avoid long delays, network technologies
limit the amount of data that a computer can
transfer on each turn – Packet Switching (1960)
• The unit of data that can be transferred at
one time is called a packet.
SIMPLE SWITCHED NETWORK

2
3
1

5
3
6
4
7
Packet Switching
• Messages are broken up into small packets
• Each packet is transmitted individually .
• Packets may even follow different routes to the
destination.
• At each node the entire packet is received, stored,
and then forwarded (store-and-forward
networks)
• At the destination the packets are reassembled into
the original message.
• Used in the Internet
Packet
packets are split into three parts:
• header - The header contains instructions about the
data carried by the packet.
– Length of packet
– Packet number
– Protocol ( what type of packet is being transmitted:
e-mail, Web page, streaming video)
– Destination address
– Originating address
• payload - actual data of the packet
Packet

• trailer /footer- It contains a couple of bits


that tell the receiving device that it has
reached the end of the packet.
• It may also have some type of error
checking.
• The most common error checking used in
packets is Cyclic Redundancy Check
(CRC).
Packet
• Each computer attached to a network is
assigned a unique number called its address.
• A packet contains the address of the
computer that sent it and the address of the
computer to which it is sent.
• Although packet switching technologies
limit the amount of data in a packet, they
allow the sender to transmit any size packet
up to the maximum.
AT

1
header payload trailer
P

time
A P T

• header + trailer carry control information for


switching (the source and the final destination
addresses, etc.)
Inside the packet switching router
Packet Switching continue…
• Packet Switching avoids delays.
• To avoid long delays, network technologies
limit the amount of data that a computer can
transfer on each turn – Packet Switching (1960)
• The unit of data that can be transferred at
one time is called a packet.
Packet Switching continue…
• A packet switching system permits multiple
pairs of computers to communicate across a
shared network with minimal delay because
• it divides each conversation into small
packets and arranges for the computers that
share a network to take turns sending
packets.
Packet Switching continue…
• Because packet switching systems adapt
instantly as computers become ready to
send data or others finish sending data, each
computer receives a fair share of network
resources at any given time.
Packet Switching continue…
• Like most computer network, the Internet is
a packet switching system.
• Internet hardware includes physical wires
shared among multiple users.
• Packet switching allows many
communications to proceed simultaneously,
without requiring an application to wait for
all other communication to complete.
Packet Switching continue…
• As a consequence, whenever a user
transfers data across the Internet, network
software on the sending machine divides
the data into packets, and network software
on the receiving machine must reassemble
the packets to produce the data.
• All data is transferred across the Internet in
packets. Packets from many machines
traverse the Internet at the same time.
Packet Switching
Advantages
» Security
» Bandwidth used to full potential
» Devices of different speeds can communicate
» Not affected by line failure (redirects signal)
» Availability – no waiting for a direct
connection to become available
» During a crisis or disaster, when the public
telephone network might stop working, e-
mails and texts can still be sent via packet
switching
Packet Switching
Disadvantages
» Under heavy use there can be a delay
» Data packets can get lost or become
corrupted
» Protocols are needed for a reliable transfer
» Not so good for some types data streams (e.g.
real-time video streams can lose frames due
to the way packets arrive out of sequence)
• http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switching_flash.html
• http://www.webopedia.com/TERM/P/packet_switching.html
Example
C
out of order 3
3

2
D

1
B
2

2
3
1
2 2
3

3
in order
2

2
1
1

2
1

3
1
2

3
3
1 1
E
2
A
3
Delays in datagram networks
Delays in datagram networks

host 1 node 1 node 2 host 2

transmission time

Waiting Time
Total Delay

Waiting Time

time
Advantages
• Line efficiency
– Single node to node link can be shared by many packets
over time

• Packets are accepted even when network is busy


– Delivery may slow down
• Priorities can be used
Disadvantages

– Excessive congestion: packet delay and high loss

– Packet header overhead

– Provides no transparency to a user


ISPs and Network Connections
• Internet Service Providers(ISPs) and Fees.
– A company that provides Internet Access and Services is
known as an ISP.
• ISP charges for its services.
– A charge for using the Internet.
– A charge for a physical connection to the Internet
• Types of Billing.
– Flat rate per month – independent of the number of
minutes a customer uses the service, but charges more for
transfers large volume of data.
– Charges for the connection, for dedicated connection.
– More for connections capable of transferring larger
volume of data.
Addresses on the Web:IP Addressing
• Each computer on the internet does have a
unique identification number, called an IP
(Internet Protocol) address.
• Each part of the address is a number ranging
from 0 to 255, and each part is separated from
the previous part by period,
• For example, 106.29.242.17
IP Addressing
• The combination of the four IP address parts
provides 4.2 billion possible addresses (256 x
256 x 256 x 256).
• Members of various Internet task forces are
working to develop an alternate addressing
system that will accommodate the projected
growth.
• However, all of their working solutions require
extensive hardware and software changes
throughout the Internet.
Internet Protocol
• IPv4
• The Internet Protocol version 4 (IPv4) is the
delivery mechanism used by the TCP/IP
protocols.
• IPv4 is an unreliable and connectionless datagram
protocol-a best-effort delivery service. The term
best-effort means that IPv4 provides no error
control or flow control.
• IPv4 is also a connectionless protocol for a
packet-switching network that uses the datagram
approach
79
Logical Addressing
• IPv4
• An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for
example, a computer or a router) to the Internet.
• The Internet addresses are 32 bits in length; this gives us a
maximum of 232 addresses. These addresses are referred to
as IPv4 (IP version 4) addresses or simply IP addresses.
• IPv4 addresses are unique. They are unique in the sense
that each address defines one, and only one, connection to
the Internet.
• Two devices on the Internet can never have the same
address at the same time.
80
Logical Addressing
Note

An IPv4 address is 32 bits long.

The IPv4 addresses are unique


and universal.

81
Logical Addressing
• Address Space
• A protocol such as IPv4 that defines addresses has
an address space. An address space is the total
number of addresses used by the protocol.
• If a protocol uses N bits to define an address, the
address space is 2N because each bit can have two
different values (0 or 1) and N bits can have 2N
values.
• IPv4 uses 32-bit addresses, which means that the
address space is 232 or 4,294,967,296 (more than
482 billion).
Logical Addressing
• Notations
• There are two prevalent notations to show an IPv4
address: binary notation and dotted decimal notation.
• Binary Notation
• In binary notation, the IPv4 address is displayed as
32 bits. Each octet is often referred to as a byte.
• So it is common to hear an IPv4 address referred to
as a 32-bit address or a 4-byte address.
• The following is an example of an IPv4 address in
binary notation:
• 01110101 10010101 00011101 00000010
83
Logical Addressing
• Dotted-Decimal Notation
• To make the IPv4 address more compact and
easier to read, Internet addresses are usually
written in decimal form with a decimal point
(dot) separating the bytes. The following is the
dotted~decimal notation of the above address:
117.149.29.2

84
Logical Addressing
Figure 19.1 Dotted-decimal notation and binary notation for an IPv4 address

85
Logical Addressing
• Example 19.1
• Change the following IPv4 addresses from binary
notation to dotted-decimal notation.
• a. 10000001 00001011 00001011 11101111
• b. 11000001 10000011 00011011 11111111
• Solution
• We replace each group of 8 bits with its equivalent
decimal number and add dots for separation.
• a. 129.11.11.239
• b. 193.131.27.255
86
Logical Addressing
• Find the error, if any, in the following IPv4 addresses.

Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal
notation is not allowed.
87
Logical Addressing
• Classful Addressing
• IPv4 addressing, at its inception, used the concept of
classes. This architecture is called classful addressing.
• In classful addressing, the address space is divided into
five classes: A, B, C, D, and E. Each class occupies
some part of the address space
• We can find the class of an address when given the
address in binary notation or dotted-decimal notation.
• If the address is given in binary notation, the first few
bits can immediately tell us the class of the address. If
the address is given in decimal-dotted notation, the first
byte defines the class.
88
Logical Addressing
• Figure 19.2 Finding the classes in binary and dotted-decimal notation

89
Internet Protocol
• Datagram
• Packets in the IPv4 layer are called datagrams.
• A datagram is a variable-length packet
consisting of two parts: header and data.
• The header is 20 to 60 bytes in length and
contains information essential to routing and
delivery.
• It is customary in TCP/IP to show the header in
4-byte sections.
90
Internet Protocol
• Figure 20.4 Position of IPv4 in TCP/IP protocol suite

91
Internet Protocol
• IPv4 is an unreliable and connectionless
datagram protocol-a best-effort delivery
service. The term best-effort means that IPv4
provides no error control or flow control.
• If reliability is important, IPv4 must be paired
with a reliable protocol such as TCP.
• IPv4 is also a connectionless protocol for a
packet-switching network that uses. the
datagram approach

92
Internet Protocol
• Datagram
• Packets in the IPv4 layer are called datagrams.
• A datagram is a variable-length packet consisting
of two parts: header and data.
• The header is 20 to 60 bytes in length and contains
information essential to routing and delivery. It is
customary in TCP/IP to show the header in 4-byte
sections.
• Version (VER). This 4-bit field defines the version
of the IPv4 protocol. Currently the version is 4.
93
Internet Protocol
• Header length (HLEN). This 4-bit field defines
the total length of the datagram header in 4-
byte words.
• This field is needed because the length of the
header is variable (between 20 and 60 bytes).
• Services. IETF has changed the interpretation
and name of this 8-bit field. This field,
previously called service type, is now called
differentiated services.

94
IP Packet Header

Do not fragment ! Pointer to this fragment Total Length of the IP packet


in the datagram in terms in terms of number of bytes.
IP Header Length in More fragments of 8-byte units.
terms of 32-bit words !

Identifies each datagram from others.


All fragments of a datagram must have the same
unique Identification number. 95
Internet Protocol
2. Total length. This is a In-bit field that defines
the total length (header plus data) of the IPv4
datagram in bytes.
• The total length field defines the total length of
the datagram including the header.
• Time to live. A datagram has a limited lifetime
in its travel through an internet.
• Protocol. This 8-bit field defines the higher-
level protocol that uses the services of the IPv4
layer.
96
Internet Protocol
• An IPv4 datagram can encapsulate data from
several higher-level protocols such as TCP,
UDP, ICMP, and IGMP. This field specifies the
final destination protocol to which the IPv4
datagram is delivered.

97
Internet Protocol

98
Internet Protocol
• Checksum. The checksum concept and its
calculation.
• Source address. This 32-bit field defines the IPv4
address of the source. This field must remain
unchanged during the time the IPv4 datagram
travels from the source host to the destination host.
• Destination address. This 32-bit field defines the
IPv4 address of the destination.
• This field must remain unchanged during the time
the IPv4 datagram travels from the source host to
the
99
destination host.
Internet Protocol
• Fragmentation
• A datagram can travel through different networks.
Each router decapsulates the IPv4 datagram from
the frame it receives, processes it, and then
encapsulates it in another frame.
• The format and size of the received frame depend
on the protocol used by the physical network
through which the frame has just traveled.
• The format and size of the sent frame depend on
the protocol used by the physical network through
which
100
the frame is going to travel.
Internet Protocol
• Figure 20.9 Maximum transfer unit (MTU)

101
Internet Protocol
• IPv6
• The next-generation IP, or IPv6, has some advantages
over IPv4 that can be summarized as follows:
• Larger address space. An IPv6 address is 128 bits long.
Compared with the 32-bit address of IPv4, this is a
huge (296) increase in the address space.
• Better header format. IPv6 uses a new header format in
which options are separated from the base header and
inserted, when needed, between the base header and
the upper-layer data.
• This simplifies and speeds up the routing process
because most of the options do not need to be checked
102
by routers.
Internet Protocol
• New options. IPv6 has new options to allow for additional
functionalities.
• Allowance for extension. IPv6 is designed to allow the
extension of the protocol if required by new technologies or
applications.
• Support for resource allocation. In IPv6, the type-of-service
field has been removed, but a mechanism (called low label)
has been added to enable the source to request special
handling of the packet. This mechanism can be used to
support traffic such as real-time audio and video.
• Support for more security. The encryption and
authentication options in IPv6 provide confidentiality and
integrity of the packet.
103
Internet Protocol
• Packet Format
• Each packet is composed of a mandatory base
header followed by the payload. The payload
consists of two parts: optional extension
headers and data from an upper layer.
• The base header occupies 40 bytes, whereas the
extension headers and data from the upper layer
contain up to 65,535 bytes ofinformation.

104
Internet Protocol
• Figure 20.15 IPv6 datagram header and payload

105
Internet Protocol
• Figure 20.16 Format of an IPv6 datagram

106
Internet Protocol
• Version. This 4-bit field defines the version
number of the IP. For IPv6, the value is 6.
• Priority. The 4-bit priority field defines the
priority of the packet with respect to traffic
congestion.
• Flow label. The flow label is a 3-byte (24-bit)
field that is designed to provide special
handling for a particular flow of data.
• Payload length. The 2-byte payload length field
defines the length of the IP datagram excluding
the
107 base header.
Internet Protocol
• Next header. The next header is an 8-bit field defining the header
that follows the base header in the datagram. The next header is
either one of the optional extension headers used by IP or the
header of an encapsulated packet such as UDP or TCP. Each
extension header also contains this field. Note that this field in
version 4 is called the protocol.
• Hop limit. This 8-bit hop limit field serves the same purpose as the
TIL field in IPv4.
• Source address. The source address field is a 16-byte (128-bit)
Internet address that identifies the original source of the datagram.
• Destination address. The destination address field is a 16-byte
(128-bit) Internet address that usually identifies the final
destination of the datagram. However, if source routing is used,
this field contains the address of the next router.
108
Domain Name Addressing
• Most web browsers do not use the IP address to locate
Web sites and individual pages.
• They use domain name addressing.
• A domain name is a unique name associated with a
specific IP address by a program that runs on an
Internet host computer.
• The program, which coordinates the IP addresses and
domain names for all computers attached to it, is called
DNS (Domain Name System ) software.
• The host computer that runs this software is called a
domain name server.
Domain Name Addressing
• Domain names can include any number of parts separated by
periods, however most domain names currently in use have only
three or four parts.
• Domain names follow hierarchical model that you can follow
from top to bottom if you read the name from the right to the
left.
• For example, the domain name gsb.uchicago.edu is the
computer connected to the Internet at the Graduate School of
Business (gsb), which is an academic unit of the University of
Chicago (uchicago), which is an educational institution (edu).
• No other computer on the Internet has the same domain name.
Uniform Resource Locators
• The IP address and the domain name each identify a particular
computer on the Internet.
• However, they do not indicate where a Web page’s HTML
document resides on that computer.
• To identify a Web pages exact location, Web browsers rely on
Uniform Resource Locator (URL).
• URL is a four-part addressing scheme that tells the Web
browser:
 What transfer protocol to use for transporting the file
 The domain name of the computer on which the file resides
 The pathname of the folder or directory on the computer on
which the file resides
 The name of the file
Structure of a Uniform Resource Locators

protocol pathname

http://www.chicagosymphony.org/civicconcerts/index.htm

Domain name filename

http => Hypertext Transfer Protocol


HTTP
• The transfer protocol is the set of rules that the
computers use to move files from one computer to
another on the Internet.
• The most common transfer protocol used on the
Internet is the Hypertext Transfer Protocol
(HTTP).
• Two other protocols that you can use on the
Internet are the File Transfer Protocol (FTP) and
the Telnet Protocol
How to find information on the Web?
• A number of search tools have been developed and
available to you on certain Web sites that provide
search services to help you find information.
• Examples:
 Yahoo  www.yahoo.com
 Excite  www.excite.com
 Lycos  www.lycos.com
 AltaVista  www.alta-vista.com
 MSN WebSearch  www.search.msn.com
How to find information on the Web?
• You can find information by two basic means.
• Search by Topic and Search by keywords.
• Some search services offer both methods, others only
one.
• Yahoo offers both.
 Search by Topic
You can navigate through topic lists
 Search by keywords
You can navigate by entering a keyword or phase into
a search text box.

Potrebbero piacerti anche