Internet Service Concepts and TCP/IP
Internet Service Concepts
- The Internet, often called "the Net," is a global network of computer networks enabling users to access information from any computer with permission.
- Initiated by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969, it was initially known as ARPANET.
- The original purpose was to enable communication between research computers at different universities.
- A key design benefit was its ability to function even if parts were destroyed due to multiple routing directions.
- Today, the Internet is a public, cooperative, self-sustaining facility for hundreds of millions worldwide and has fueled social media and e-commerce growth.
- E-commerce, or online shopping, has emerged as a major application of the Internet.
- The Internet utilizes public telecommunication networks, distinguished by its use of Transmission Control Protocol/Internet Protocol (TCP/IP).
- Intranets and extranets are recent adaptations using TCP/IP.
- The Internet comprises network protocols and hardware.
- Protocols like TCP/IP are sets of rules for device communication; without these rules, communication would be impossible.
- Protocols translate text into electronic signals for transmission and back again.
- Hardware includes computers, smartphones, cables, satellites, radios, cell towers, routers, and servers.
Uses of the Internet
- Communication across distances, information sharing, and access to information are general uses.
- Specific uses include:
- Social media and content sharing
- E-mail, IRC, Internet telephony, instant messaging, and video conferencing
- Education via online programs, courses, and workshops
- Job searching for both employers and applicants, including social networking sites like LinkedIn
Basics of the Internet
- Developed by ARPA in 1969 named ARPANet.
- The primary aim was to connect university research labs.
- A secondary goal was to secure messages through rerouting in case of attacks or disasters.
Structure of the Internet
- Computers connected to the internet are part of a worldwide network, and each device has a unique address.
- Internet addresses are in the format "kkk.kkk.kkk.kkk" where each "kkk" ranges from 0-256. This is an IP address (Internet Protocol).
Internet Addresses (IP Addresses)
- An IP address is a unique address for each machine/device connected to the internet.
- Addresses are in the form "kkk.kkk.kkk.kkk", where each "kkk" ranges from 0 to 256.
- If a client connects through an Internet Service Provider (ISP), a temporary IP address is assigned for the session.
- If a client connects through a Local Area Network (LAN), a permanent IP address is likely assigned.
- The "Ping" program verifies internet connection on systems (available on Microsoft Windows and Unix OS).
Protocol Stacks and Packets
- Protocol stacks enable communication between devices on the internet by converting messages into electronic signals and vice versa.
- The TCP/IP protocol stack is primarily used for internet communication.
- Example:
- Sending the message “Hello Friend” from a computer with IP address 173.196.95.98 to another with IP address 162.194.60.98.
- The message is encrypted into a digital form for transmission and decrypted back to the original form upon arrival.
Communication Path Framework
- The message starts at the application layer and moves down the protocol stack.
- Large messages are broken into smaller chunks called Packets for stable data management.
- At the TCP/IP layer, the data packet is assigned a port number to identify the sending application.
- The IP layer provides the destination IP address for message delivery.
- The hardware layer converts the alphanumeric message into a digital signal for transmission.
- ISPs examine the recipient’s address and forward the packets through routers.
- Packets are reassembled into the original message at the destination computer after moving upwards through the stack, where unnecessary data (IP address, port number) is removed.
Infrastructure of the Network
- Describes how computers at different locations interact, how messages are sent, and how packets are transmitted and received.
- The ISP manages a pool of modems, handled by a device that contains data flow from the modem pool to a spine or specific line router, which can be linked to a port server for network connectivity and billing information.
- Packets pass through the phone framework and ISP equipment, then are redirected to the ISP’s mainline or infrastructure, which purchases bandwidth.
- From there, packets traverse many routers, backbones, unique lines, and other networks to reach the target device.
- The traceroute program (available on Microsoft Windows and Unix) traces the path of packets, printing all routers, computer systems, and other internet entities the packet travels through.
- Internet routers decide the further communication of packets.
What is TCP/IP?
- TCP/IP stands for Transmission Control Protocol/Internet Protocol; it's a suite of communication protocols used to interconnect network devices on the internet.
- TCP/IP is also used as a communications protocol in private computer networks (intranets or extranets).
- TCP/IP specifies how data is exchanged over the internet, including how it should be broken into packets, addressed, transmitted, routed, and received at the destination.
- TCP/IP requires little central management and is designed to make networks reliable with the ability to recover automatically from device failures.
- TCP defines how applications create communication channels across a network and manages how a message is assembled into smaller packets before transmission and reassembled at the destination.
- IP defines how to address and route each packet to ensure it reaches the right destination, with each gateway computer checking the IP address to forward the message.
Common TCP/IP protocols include
- Hypertext Transfer Protocol (HTTP): handles communication between a web server and a web browser.
- HTTP Secure: handles secure communication between a web server and a web browser.
- File Transfer Protocol: handles the transmission of files between computers.
How does TCP/IP work?
TCP/IP uses the client-server model, where a client is provided a service by a server in the network.
The TCP/IP suite of protocols is classified as stateless, meaning each client request is considered new and unrelated to previous requests, freeing up network paths.
The transport layer is stateful, transmitting a single message and maintaining the connection until all packets are received and reassembled.
The TCP/IP model differs slightly from the seven-layer Open Systems Interconnection (OSI) networking model.
Why is TCP/IP important?
- TCP/IP is nonproprietary and not controlled by any single company, allowing for easy modification.
- It is compatible with all operating systems (OSes), computer hardware, and networks.
- TCP/IP is highly scalable and can determine the most efficient path through the network.
Pros of TCP/IP
- Helps establish a connection between different types of computers.
- Works independently of the OS.
- Supports many routing protocols.
- Uses client-server architecture that is highly scalable.
- Can be operated independently.
- Is lightweight and doesn't place unnecessary strain on a network or computer.
Cons of TCP/IP
- Is complicated to set up and manage.
- The transport layer does not guarantee the delivery of packets.
- It is not easy to replace protocols in TCP/IP.
- Does not clearly separate the concepts of services, interfaces, and protocols, so it is unsuitable for describing new technologies in new networks.
- Is especially vulnerable to a synchronization attack, a type of denial-of-service attack. a bad actor uses TCP/IP.