The chapter begins by reminding us that the Internet is a collection of networks of various kinds. It was created in 1969 as a project of the Advanced Research Projects Agency (ARPA), which was part of the U.S. Department of Defense. The text states two goals of the project:
The legends about the reasons for the project refer to the Cold War and American fears of Soviet dominance. The reality is that there were only a handful of computers capable of doing large scale research computation, and ARPA wanted to make them accessible to researchers at more institutions.
The network was called the ARPANET when it was created.
The book asks who owns the Internet. The answer is complicated, because many parts are owned or managed by many entities. Different rules about its use vary from one country to another, but general rules and standards are written by an international committee the World Wide Web Consortium (W3C). Although their mission is mainly the web, that is big enough that they are seen as a central authority for things like the structure and use of web pages.
In general, all methods of connecting to a network can be classed as either wired or wireless.
A device needs some way to connect and to communicate to be on a network.
On page 57, the text provides some examples of wired and wireless connection methods.
As you can see from the examples above, the words wired and wireless each include multiple technologies, so knowing only that about a given system is not enough information to understand how it works. In this section, the text also discusses using a wireless modem, and gives the impression that it is a magical device to connect to cell data service. This is the same thing as the mobile broadband method listed above, and it is not magic. First, if you are not in an area where you have cellular data service, forget using it. Second, if you do not have a large data plan with your provider, use it sparingly or look for huge cell phone bills.
The author must have considered cost at this point, since the discussion moves on to Internet Service Providers (ISPs), and access plans. When they say plan, think contract and level of service. The text mentions that plans can be compared based on services, bandwidth, and speed, Guess what? Bandwidth and speed are the same thing. Electrons move across a wire at a constant speed. The question is how many of them are moving to you at once. That is bandwidth, and it is a measure of how long it will take to move a file of any size across the Internet to you.
The text is correct in explaining that a character, a letter or a number on a screen, fills about one byte. If you haven't heard, a byte is a basic unit of memory and of file size, partly because if what it can hold. Standard metric prefixes are used for larger units of memory and file space.
For the purists who know better, the units listed above are rounded off. Some people use these definitions, while others use more accurate definitions. A kilobyte is supposed to be 1024 bytes, but some vendors use the rounded figures to appear to give you more. In addition, bandwidth is traditionally measured in bits per second, not bytes. There are eight bits in a byte. So, if I told you your bandwidth was 8 Mbps, that means 8 Megabits per second, which means only 1 Megabyte per second, 1 MBps.
The text does a good job (figure 2-4) of displaying a simplified route from a home user to a cable switch box, to a central facility, to the Internet backbone, to the network where a requested resource exists. On the return trip to the requester, data may pass through different paths, but eventually gets back to the user in less time than it takes to explain it. In some cases, there may be no need to leave the system the user starts on: at Baker, your route may go very quickly to a server on the same network as your workstation, to open the Baker home page. On the other hand, your request may have to be sent to the opposite side of the world for the requested web page or document.
The text moves on to mention IP addresses. Let me try to fill in some of the gaps:
IP stands for Internet Protocol, which is one of the indispensable protocols (programs that use a set of rules on a network) that make the Internet work. The purpose of an IP address is to identify each unique node on a network. On an IP network, each device (node) is known as a host, and every host must have an address. The addresses we discuss first are actually IP version 4 addresses. (IPv6 addresses will be 16 bytes, or 128 bits long.)
IP version 4 addresses are numeric addresses, stored as four bytes, which is equal to 32 bits. For example: an IP v.4 address might be 10.45.17.122. Each of the four numbers is held on one byte.
Since the IP protocol was invented with networking in mind, IP addresses contain two parts: one part of the address identifies the network a host is on, and the other part identifies the host itself. Every network is assigned an address which could take up one, two, or three bytes, depending on the class of the network (A, B, or C). The remaining byte or bytes are typically used for hosts on networks. (It gets more complex: this is how we start.)
There are five address classes you need to know. The first three classes can be described by the number of bytes assigned to the network portion of their addresses:
Class D and E addresses use portions of the fourth byte as well for network addressing. You may wish to know that only class A, B, and C addresses are for general use. Class D addresses are for multicasting (messages to groups of machines), and class E addresses are for experimental use.
This is more than your book tells you, and it is only the beginning of the story. We should hit more on it in a later class.
The book also mentions that only geeks and nerds use addresses on the web. Most people prefer to use domain names when looking for a something on the Internet. The information needed to find a host on the Internet is too complex and too fluid to remember. Devices can be given new addresses for several reasons, so knowing yesterday's address may not work. When the Internet became too large for any single file to hold all the information (yes, that's how it worked in 1969), a new system was needed, so DNS was invented. Domain Name Service (DNS), also called Domain Name System, uses a hierarchy, a tree shaped structure that branches as you go down the tree.
These are several top-level domains:
Most countries have two letter domain names. Some, like Germany, are not intuitive until you remember what the country is called in the primary language spoken there.
The text moves quickly to obtaining a domain name. You can contact your ISP first, or you can shop around on the web to see who has a good price. Many registrars exist who can help you. A larger concern is where you might want to house your web pages. I decided to register my domain name through Yahoo, partly because the price was competitive, and partly because they let me write my web pages myself and upload them, as opposed to having to use some software of theirs that I might not like.
Domain names have existed for some time, which can mean that the one you would like to have is already taken by someone else. If it is in use by someone else, you usually have no choice: you must choose another name. On the other hand, if it is being held by a cybersquatter, someone who registered it in the hope of selling it for a high price, you could sue to get access to the name. It is less expensive to move on. This link takes you to a legal reference site that will provide more background.
The text briefly describes domain name resolution, the process in which you enter a domain name in a browser, it consults the DNS system, and the system replies with an IP address that the browser actually uses to access the web site. If that is so, then what was I talking about when I said you could get to Baker's web pages faster? The Internet is built from routers, devices that find a path to a resource. There are routers on Baker's network (and every network). These local routers would know about a resource on their own networks and would be able to connect to such a resource quickly, without having to ask routers on any other network for the information.
This takes us back to the World Wide Web. The text mentions that web pages may be static or dynamic. An example of a dynamic page is iGoogle, which is due to be shut down in a few weeks (it is presently early October, 2013). Google has provided this page as a free service to anyone interested in customizing a web page to include news, weather, blogs, and many other things. Google is shutting down the service this November. Is this a sign that dynamic pages are not successful? Maybe it is more a sign that a vendor makes more money by controlling a large part of what appears on a web page, customizing it for the viewer if there is a point to do so, like showing the viewer an ad for a service they are known to have shown interest in. On the other hand, Yahoo has a similar service called My Yahoo, which they seem to be continuing. Trying to pull over some users?
The text reintroduces browsers, and repeats some information from chapter one about web pages and servers. The term "home page" is mentioned, and we are warned that it has two meanings. This is true of many computer related concepts: people love to make up a new definition for something that already has two or three good ones already. So, today's word is home page:
Both definitions are correct, so you need to tell what someone means by the context in which such a term is used. Get used to it, you will run into this kind of thing a lot.
Page 62 (does your book match mine?) has a section at the bottom about safe browsing. You should consider some of these techniques to avoid problems.
Whether you use a tablet, a laptop, a desktop, or a smartphone, you should pay attention to what you are doing to avoid trouble. Different devices often change what browsers you can use. If you are in doubt, put the phone down, and use a better protected device.
The text explains that there is a difference between domain names and full addresses. An address is also called a URL, a Uniform Resource Locator, and it contains more information. Let me illustrate:
The text continues with background that would be most useful to someone who has never seen the web before. I find it hard to remember not knowing what a search engine was. I have yet to find a use for social networking. I will call your attention to the Secure IT feature at the top of page 70, listing some privacy and security risks associated with social networking sites.
The text continues with a discussion of common features found on web pages, such as:
Page 84 begins a discussion of email and related products, which leads into the topic of Communication. When you send an email or an instant message, and when you start a chat session, you typically know who your audience is.
This is different from putting up a web site, writing a blog, or typing your thoughts in a discussion forum. In these cases, you do not know who will be reading what you send out into the network. In fact, you don't know that about the email, messages, or chats either, because sending a signal out to the net is like any kind of publishing: you can't affect what happens to anything once it leaves your control.
That being the case, you should consider the advice on page 90 about Netiquette, a silly word that means Internet or network etiquette. Some thoughts are just conventions:
Some of the other ideas are for your protection and that of others: