public key
public and can be shared widely (encryption)
private key
should be known only to the owner (decryption)
how does internet transfer data?
Data sent over the internet is called a message, but before messages get sent, they're broken up into tinier parts called packets. These messages and packets travel from one source to the next using Internet Protocol (IP) and Transport Control Protocol (TCP)
sender computer
router(with IP address)
TCP
Router (with IP address)
receiver computer (both have HTTP and IP addresses)
symmetric encryption
use the same key for both encryption and decryption
asymmetric encryption
use the different key for encryption and decryption, using private and public keys
internet
general
net wold of independent but connected devices
email, mobile apps, text, file transfers
world wide web
uses HTML (Hyper text markup language)
interpreted by HTTP (hypertext transfer protocol)
browser to browser limited
cloud
computer farms
tens of thousands of computers work together on a problem
bit
single unit of data that can only have one of two values. We usually represent the two values as 0 (off) and 1 (on)
byte
eight bits
binary sequence
also called a bitstream) is a string of ones and zeros
bandwidth
the maximum amount of data that can be sent in a fixed amount of time, in bits per second
redundant network
multiple pathways among its physical connections to create redundancy.
open protocols
data is transmitted by it
standardize communication, so all data is sent by the same rules for sending and receiving the data
router
a computer that passes information from one network to another
connection points between networks
ISP (Internet Service Provider)
Internet Service Provider
provide the Internet to different communities
typically within a large organization (such as a university), the Internet connections are provided by the organization itself
Path
sequence of directly connected computing devices that connect a sender to a receiver
Routing
process of finding a path from sender to receiver
Scalability
ability of the Internet to keep working as it grows
Redundancy
inclusion of back-up elements in case one part fails
Fault Tolerance
ability of a system to work around problems
Protocol
set of rules that specify the behavior of a system
IP address
32 bits
a unique number assigned to each device on a computer network
packet
a small chunk of any kind of data (text, numbers, lists, etc.) and metadata (information about the data) that is passed through the Internet as a data stream
packet switching
the Internet sends short bursts of information, not long continuous strings
IP
(Internet Protocol) The routers at every connection point on the Internet run IP, which transmits packets from one IP address to another
lets your computer pretend it has a direct connection to another computer.
TCP
(Transmission Control Protocol) The computers (including servers) at the two endpoints of a communication run TCP, which guarantees that packets arrive successfully.
lets your computer pretend it has a reliable connection to the other computer.
domain name
a human-readable way
hierarchy
an arrangement with the biggest category at the top and subcategories below, like a triangle of locating an Internet site
domain name system (DNS)
an Internet protocol for translating domain names to IP addresses