Basic information about the Internet. The structure of the Internet: basic principles of work

Internet is a World Wide Web in which information is stored on servers. Servers have their own addresses and are controlled by specialized programs. They allow you to send mail and files, search databases, etc. Information is exchanged between network servers via high-speed communication channels. Access of individual users to information resources of the Internet is usually carried out over the telephone network through a provider or corporate network. Some organization that has a modem pool for connecting with clients and accessing the World Wide Web acts as a provider. Note that corporate networks built on the principles of the Internet are called Intranet Internet architecture Consider a simplified scheme for building the Internet. Figure 1 shows the network architecture. Leased telephone lines, fiber optic and satellite communication channels are used as a high-speed data transmission line. Any organization to connect to lnternet uses a special computer called a gateway (gateway). It installs software that processes all messages passing through the gateway. Each gateway has its own IP address. If a message arrives addressed to the local network to which the gateway is connected, then it is transmitted to this local network. If the message is destined for another network, then it is passed on to the next gateway. Each gateway has information about all other gateways and networks. When a message is sent from a local network through a gateway to the Internet, then

Fig.1. Internet architecture

this selects the "fastest" path. Gateways exchange information about routing and network status with each other using a special gateway protocol. Some companies may act as a provider. Provider has its own gateway to the Internet and allows other companies and individuals to connect to the Web through this gateway. In addition to information about message routing, the gateway needs information about the parameters of the subnets connected to the larger network in order to correct message routes in case of failures in certain parts of the network. There are two types of gateways: internal and external. internal refers to gateways that are located on a small subnet and provide connectivity to a larger corporate network. These gateways communicate with each other using the Internal Gateway Protocol (IGP). External gateways are used in large networks like the Internet, their settings are constantly changing due to changes in small subnets. Communication between external gateways is carried out through the external gateway protocol EGP (Exterior Gateway Protocol).

User connection to the Internet can be carried out in different ways, differing in cost, convenience and scope of services provided. These methods are:

    e-mail (E-mail);

    teleconferences (UseNet);

    remote terminal emulation system (TelNet);

    search and transfer of binary files (FTP);

    search and transfer of text files using the menu system (Gopher);

    search and transmission of documents using hypertext links (WWW, or the World Wide Web).

The creation and development of these methods is connected historically. Each of them is characterized by its capabilities and differences in the organization of information exchange protocols. In the general case, a protocol is a set of instructions that regulate the operation of interconnected systems or objects in a network. E-mail (E-mail)- the easiest and most affordable way to access the Internet. It allows you to send any type of files (including texts, images, sound inserts) to email addresses anywhere in the world in a short period of time at any time of the day. To send a message, you only need to know the recipient's email address. The work of e-mail is based on the sequential transmission of information over the network from one mail server to another, until the message reaches the addressee. The advantages of e-mail include high efficiency and low cost. The disadvantage of e-mail is the limited volume of files sent. usenet designed as a text information exchange system. It allows all Internet users to participate in group discussions, called teleconferences, in which all sorts of problems are discussed. Now in the world there are more than 10 thousand teleconferences. The information sent in the teleconference becomes available to any network client who has applied to this newsgroup. Currently, teleconferencing allows you to transfer files of any type, including text, image and audio files. To work with teleconferences, the most commonly used tools are programs for viewing and editing Web documents. telnet is a protocol that allows you to use the resources of a remote computer. In other words, it is a protocol for remote terminal access on a network. In this case, we are talking about sending commands from a local computer to a remote computer on the network. FTP is a network protocol for working with any type of files: text and binary, which is an example of a system with a client-server architecture. An FTP server is installed on a remote computer in order to allow users to browse the file system and copy the required files. To implement communication via the FTP protocol, a program - an FTP server - must function on a remote computer system. The advantage of this protocol is the ability to transfer files of any type - texts, images, executable programs. The disadvantage of the FTP protocol is the need to know the location of the information being searched. Protocol gopher and the software that implements it provide users with the opportunity to work with information resources without knowing their location in advance. To get started using this protocol, it is enough to know the address of one Gopher server. In the future, the work is to select commands, presented in the form of simple and understandable menus. At the same time, the menu items of one server may contain links to the menus of other servers, which makes it easier to find the required information on the Internet. While working with the Gopher system, the client program does not maintain a permanent connection with the Gopher server, so network resources are spent more economically. WWW (World Web - World Wide Web) is the most modern means of organizing network resources. It is based on the hypertext representation of information. Hypertext- this is a text containing links to other parts of this document, to other documents, to objects of a non-textual nature (sound, image, video), as well as a system that allows you to read such text, track links, display pictures and play audio and video inserts. Hypertext with non-text components (sound, video) is called hypermedia. The ultimate goal of the WWW is to combine all network resources (files, texts, databases, server programs) into a single worldwide hypertext. The operation of the Internet is based on the use of a family of communication protocols - Data Transfer Control Protocol / Internet Protocol (Transmission Control Protocol / Internet Protocol - TCP/IP), which is used to transfer data over the WAN and many local area networks. TCP/IP is a family of protocols. It consists of protocols that can be divided by purpose into the following groups:

    transport protocols that control the transfer of data between two computers;

    routing protocols that handle data addressing and determine the shortest available paths to the destination;

    network address support protocols designed to identify a computer by its unique number or name;

    application protocols that provide access to all kinds of network services;

    gateway protocols that help transmit routing messages and network status information over the network, as well as process data for local area networks;

    other protocols that do not belong to the specified categories, but provide the client with the convenience of working on the network.

The TCP / IP architecture is based on the reference model, however, in it the first three layers of the OSI model are combined into one (Fig. 2).

ModelOSI

Application layer

Application layer

Presentation Layer

User network interface layer

transport layer

transport layer

network layer

Internet

Link layer

network interface

Physical layer

Physical layer

Fig.2. Reference Model Layers and TCP/IP Protocols

Any document or message is sent to the network from an application program (application layer). Then, through a modem and a telephone communication line (transport layer), the message enters the Internet node and then, using network programs (network interface), is transmitted to the communication line of global network nodes (physical layer). Programs of each level process the message or transmitted document in their own way, without knowing anything about its content. Network addresses On the Internet, each computer is assigned its own unique network address - an IP address, which is 32 bits long and consists of 4 parts of 8 bits. Each part can take values ​​from 0 to 255 and is separated from other parts by a dot. For example, 194.105.195.17 and 147.115.3.27 represent two IP addresses. A network address has two parts: a network address and a host address on that network. Under host refers to a computer connected to a network and providing various network services. This structure of the IP address allows computers on different networks to have the same addresses. For maximum flexibility, IP addresses are classified into classes A, B, C and allocated depending on the number of local networks and computers in them. These three classes of IP addresses determine the size of an organization's local area network. Depending on the class, a complete 32-bit address is broken down into 8-bit components in different ways. In this case, the first one to three bits at the beginning of the IP address identify the corresponding class. The structure of IP addresses is shown in Figure 3.

Fig.3. Structure of IP addresses

By the first number of the IP address, you can determine the type of class to which the organization belongs: Class A addresses - numbers from 0 to 127. Class B addresses - numbers from 128 to 191. Class C addresses - numbers from 192 to 223. Class A network address allows you to identify more than 16 million computers in the local network of the organization, but there can be no more than 128 local networks of this class. A class B network address allows for more local networks, but with fewer computers on the network itself. Finally, class C networks can have a maximum of 254 computers, but there can be over 2 million such networks. When a message is sent to the Internet, an IP address is used to indicate the sender and recipient. The client does not need to remember network addresses because the network uses domain names that are translated by the domain name system into IP addresses. Domain addressing Internet addresses are built according to the domain addressing system (domain name system, DNS). This means that the user's address consists of two parts: the user ID and the domain name, separated by the @ symbol

<идентификатор пользователя>@<название домена>

The user ID and domain name may consist of segments separated by a dot. It is allowed to use Latin letters, numbers and some other symbols in the address. For example:

Ivan. [email protected]

In the example, the user ID has two segments and the domain name has four. Typically, domain segments or subdomains form a hierarchical structure: the first subdomain on the left is usually the name of the computer that is assigned that address, the next one is the name of the organization where that computer is located, and the rightmost (top-level subdomain) is the abbreviation for the country. The address given means that it belongs to Ivan Kirillov, an employee of the law faculty of St. Petersburg University in Russia, who has a computer named mycomputer. User identifiers can be anything: full name and surname, initials, surname with initials, nicknames, as well as the names of organizations or departments. At the same time, one computer can have an arbitrary (limited by the allowed number of IP addresses) number of registered users with their addresses, or a user can have several addresses on the domain (one, for example, for personal correspondence, and the other for official). Moreover, it is possible to have several addresses on different computers. The top-level subdomain, denoting the country, usually consists of two letters: en-Russia, su- the territory of the republics of the former Soviet Union, ca- Canada, UK- Great Britain, ua- Ukraine, de- Germany, etc. In the USA, a different system is traditionally used. The top-level subdomain consists of three letters and indicates that the owner of the address belongs to one of the following classes: com - commercial organizations; edu - educational and scientific organizations; gov - government agencies; mil - military organizations; net - network administration; org - other organizations. In Russia, a second-level subdomain usually denotes the city or geographical region where this address is located, for example: msk - Moscow; spb - St. Petersburg; nsk - Novosibirsk; altai - Altai Territory. Note that in the UK, address subdomains arranged in reverse order.

Web document viewers

To work in the WWW on a computer, you must have a special program - browser(browser). A browser is an application program that interacts with the WWW and allows you to receive various documents from the network, view and edit their contents. Browsers provide the ability to work with documents containing textual and multimedia information. In addition, they support all the previously discussed methods and protocols for accessing the Internet. WWW documents usually contain hypertext (text with hyperlinks). Unlike plain text, documents on the Web contain commands that define their structure, including links to other documents. This allows the browser to format the document for display on the screen in accordance with the capabilities of a particular computer. Since the Internet uses heterogeneous hardware and software tools, a universal hypertext markup language - HTML (HyperText Markup Language) was adopted to develop Web pages. HTML includes a set of commands used to describe the structure of a document. With HTML, a document is broken down into the appropriate logical components: paragraphs, headings, lists, and so on. The specific formatting attributes of a document (body text and highlighted components) when viewing it are determined by the browser used. The most common browsers are:

    Mosaic for Windows

    cello program;

    Linx program;

  • Microsoft Internet Explorer (MSIE);

    Netscape Communicator.

Let us briefly consider their purpose and main features. The main focus will be on MSIE as one of the most popular browsers. Its latest version, 4.0, is distributed free of charge on the Internet by Microsoft and is included with Windows 98. Mosaic for Windows- one of the first viewers. It has a very simple graphical user interface and allows you to display formatted Web documents on the screen. Its disadvantage is the need to install additional software for working with graphic files, audio and video images, which is not included as standard with the browser. The program cello was developed as an alternative to Mosaic. Directly provides access to HTTP, Gopher, FTP servers, UseNet teleconferences, and also supports Telnet when using external client programs. The program has a very simple interface, which allows you to quickly learn how to work with it. The inconvenience of working with the browser is the small number of buttons on the control panel, so you constantly have to work with drop-down menus. The program Linx refers to the number of browsers with a text interface. Hypertext links are highlighted on the screen with a different color or inverted background and text colors. The advantage of this browser is the ability to quickly find textual information on the WWW using hypertext links. Viewed pages can be marked with bookmarks that can be created while working with the browser. Browser EINet WinWeb differs for the better in a small amount of main memory occupied during operation, good support for interactive forms, stable and reliable operation. The navigation mechanism is simple and user-friendly. There is a built-in tool for searching documents by keywords. Browser settings allow you to select the fonts and colors used when displaying documents and highlighting hyperlinks. Browser Internet Works allows you to work not only with WWW, but also with FTP and Gopher servers. The documents that the user works with can be presented at three levels. At the same time, the transition from page to page can occur both within the same level and between them, using the toolbar buttons and the ability to work in multi-window mode. Viewing a text document can occur while downloading media files in the background. It is possible to customize the interface by the user. The generally recognized leaders among programs for viewing and editing Web-documents - browsers Netscape Communicator and MicroSoft lnternet Explorer are the most convenient and multifunctional. They allow you to display on the screen any documents created in any operating environment and on any computer with a configuration that provides network operation.

Microsoft Internet Explorer 4.0

According to various experts, this browser is almost superior in terms of ease of use and its functionality to Netscape Communicator. It consists of the following components:

    MSIE browser;

  • desktop update component;

    Outlook Express;

    Microsoft NetMeeting;

  • Front Page Express;

    task Manager.

MSIE Browser allows you to browse the Web from the Windows Explorer window, from the My Computer window, and even from the control panel. In this case, the page can be located on the Internet, on a corporate network, or on a computer's hard drive. The Windows Explorer panel takes the form of a Web page, which greatly simplifies the work and speeds up the process of finding the right sites. The browser allows you to set various levels of protection, such as preventing the display of unwanted information, for example, related to violence. You can protect your computer from potentially dangerous files and programs by setting different protection levels for different Internet zones. When shopping online, you can secure your credit card and shipping address with Microsoft Wallet, which is part of the Explorer. The most interesting information from the web can be sent directly to your desktop. To do this, you only need to subscribe to the desired channels. The channel is displayed as a shortcut on the desktop and is updated regularly by the content provider. For example, every morning you can receive the latest sports news. The user himself can create any channel.Desktop can be designed as a Web page with direct display of information that will be updated automatically. For example, you can place a news ticker from the Internet on your desktop. To open folders with files and launch programs, one click of the left mouse button is enough. To select an element, simply point to it with the mouse. Outlook Express is an Internet Explorer mail and news program that exchanges e-mail messages, reads and sends group news messages, and works with newsgroups. You can easily switch between mail folders, news servers and newsgroups. News is usually downloaded to a computer for later viewing offline, without wasting time connecting to the Internet. Microsoft NetMeeting allows you to hold conferences on the Web or local area network. This can use a network or a modem. During the conference, you can talk to your interlocutor via the Internet, and with a video image (if you have a video camera connected to your computer), as well as work in a common application. Microsoft Chat used to negotiate online in a special chat room. This uses comic book graphic format or plain text format. The user is given the opportunity to select a cartoon character that will represent him during negotiations with several people at once. With some of them you can talk secretly from the rest. FrontPage Express is used to create, edit and publish your own Web pages. It includes a set of templates with which you can create Web pages of any complexity with any number of links to other information sources. Task Manager serves for planning and execution of some standard procedures. It starts with Windows and runs in the background, executing given programs at specific times.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Similar Documents

    Means of information search in the Internet. Basic requirements and methods of information retrieval. Structure and characteristics of search services. Global search engines WWW (World Wide Web). Planning the search and collection of information on the Internet.

    abstract, added 02.11.2010

    The Internet is the core that provides communication between information networks belonging to various institutions. The absence of a single authoritarian figure in the global network. The structure and functioning of the World Wide Web. Security on the Internet. Email.

    presentation, added 01/30/2011

    Description and classification of modern information retrieval systems. hypertext documents. Overview and ratings of the world's major search engines. Development of an information retrieval system that demonstrates the mechanism for searching for information on the Internet.

    thesis, added 06/16/2015

    The essence and principle of operation of the global Internet. Search for information by parameters in the Google system. Specialized information retrieval systems: "KtoTam", "Tagoo", "Truveo", "Kinopoisk", "Catch-Umov". Appropriate use of search engines.

    presentation, added 02/16/2015

    The history of the emergence and development of the Internet, the features of its humanitarian and technical side. Application of the World Wide Web system - "World Wide Web". Key aspects of WWW-technology, the specifics of its use to create educational resources.

    abstract, added 03/26/2011

    Concept, structure and classification of information systems. Information retrieval systems. Historical prerequisites for the development of search engines. The concept of search engines. Features of search engines: the structure of the network, the structure of the work of search engines.

    term paper, added 03/28/2005

    Methods and tools for storing data on the World Wide Web. The concept and varieties of hypertext documents and graphic files. Principles of operation of search engines and rules for finding the necessary information. Characteristics of some search engines of the Web.

    term paper, added 04/18/2010

    Classification of computer networks. Purpose and features of the organization of local computer networks. Purpose and structure of the global Internet. Working with shared resources in the local network. Login and work on the Internet. Search for the given information.

    The basis for the organization of the Internet was the computer network of the US Department of Defense ARPANet (ARPA - Advanced Research Projects Agency), created in the early 70s to connect computers of scientific organizations, military institutions and defense industry enterprises. The network was built with the participation of the Pentagon as a closed infrastructure resistant to external influences, capable of surviving a nuclear attack, that is, great attention was paid to its reliability.

    Over time, the network lost its strategic importance; its main clients were individuals and non-state computer networks. The very name of the Internet (“between networks”) shows its purpose: the unification of individual local, regional and global networks into a single information space. The Internet ensures the exchange of information between all computers that are part of the networks connected to it. The type of computer and operating system does not matter.

    The creation of the Relcom computer network at the beginning of 1990 on the basis of the Kurchatov Institute of Atomic Energy laid the foundation for the Russian Internet. By the end of 1990, more than 30 local networks of various organizations were integrated into the network, which made it possible to officially register it and connect to the global network.

    At present, the Internet is a global, intercontinental network; it unites tens of millions of computers and local networks, and according to various estimates, from 100 to 250 million people use its services. The exact figure is unknown, since the network does not have a single control center and is not anyone's property - this is an important difference between the Internet and other computer networks.

    There is no president, no chief engineer, no official governing body on the Internet. Although presidents and other senior officials may have networks that are part of the Internet. In general, there is no single authoritarian figure on the Internet.

    The direction of the development of the Internet is determined by the "Internet Society" (ISOC - Internet Society). ISOC is a voluntary organization whose purpose is to promote the global exchange of information over the Internet. She appoints a council of elders that is responsible for the technical direction and direction of the Internet.

    The Council of Elders (IAB - Internet Architecture Board or "Council for the Architecture of the Internet") is a group of invited individuals who have volunteered to take part in its work. The Council meets regularly to approve standards and allocate resources (for example, addresses - more precisely, the IAB itself does not assign addresses, it sets the rules for assigning addresses). The Internet works because there are standard ways for computers and applications to communicate with each other. The presence of such standards allows you to easily connect computers manufactured by different companies. IAB is responsible for these standards, decides whether a particular standard is needed and what it should be. If there is a need for a new standard, the IAB reviews the problem, adopts that standard, and announces it over the network.

    Internet users can express their views on the organization of the Internet at meetings of the IETF (Internet Engineering Task Force). IETF is another public body; it meets regularly to discuss current technical and organizational problems of the Internet. If a problem of sufficient importance arises, the IETF forms a working group to look into it further. Anyone can attend IETF meetings and be members of working groups. Working groups perform many different functions - from issuing documentation and deciding how networks should interact with each other in specific situations, to changing the meaning of bits in a particular standard. The working group usually draws up a report. This can either be documentation provided to the public with recommendations that are not required to be followed, or a proposal that is sent to the IAB for adoption as a standard.

    When using the Internet, legal regulations must be respected. First of all, when sending something, including beats, across the state border, one should be guided by the laws governing exports, and first of all, the legal norms relating to intellectual property and licenses.

    The Internet is based on high-speed telecommunication backbone networks. Autonomous systems are connected to the backbone network through network access points NAP (Network Access Point), each of which already has its own administrative control, its own internal routing protocols. Examples of such autonomous systems are the EUNet network, covering the countries of Central Europe, the RUNet network, which unites Russian universities, etc. Autonomous networks are formed by service providers providing Internet access services (for example, Relcom, Peterlink, " Russia-On-Line”, etc.).

    The main cells of the Internet are local area networks. But there are also local computers that are independently connected to the Internet.

    Network or local computers directly connected to the Internet are called host computers (host - master).

    If some local network is connected to the Internet, then each workstation of this network also has access to the Internet through the host computer of the network.

    Each computer connected to the Internet has its own address, where it can be found by a subscriber from anywhere in the world.

    An important parameter is the speed of access to the Internet. It is determined by the capacity of communication channels between autonomous systems, within autonomous systems, and subscriber access channels to autonomous systems. For dial-up modem access, which is used by most individual personal computer users, this speed is low - from 19 Kbps to 56 Kbps; for access via dedicated telephone lines, typical for small LANs, this speed is in the range from 64 Kbps to 2 Mbps, and only for solid networks that organize interaction through fiber optic and satellite communication channels, the throughput exceeds 2 Mbps /With.

    Target: get acquainted with the structure and basic principles of the World Wide Web, with the basic protocols of the Internet and the addressing system.

    Architecture and principles of the Internet

    Global networks, covering millions of people, have completely changed the process of dissemination and perception of information.

    Global networks (Wide Area Network, WAN)- these are networks designed to combine individual computers and local networks located at a considerable distance (hundreds and thousands of kilometers) from each other. global networks unite users located all over the world using a wide variety of communication channels.

    Modern Internet- a very complex and high-tech system that allows the user to communicate with people located anywhere in the world, quickly and comfortably find any necessary information, publish for public information the data that he would like to communicate to the whole world.

    In fact, the Internet is not just a network - it is a structure that connects conventional networks. The Internet is a "network of networks".

    To describe today's Internet, it is useful to use a strict definition.

    In his book « TheMatrix :computerNetworksandConferencingSystemsworld wide » John Quaterman describes the Internet as "a metanet consisting of many networks that operate according to the protocols of the TCP / IP family, are united through gateways and use a single address space and namespace".

    On the Internet, there is no single point of subscription or registration, instead you contact a service provider who gives you access to the network through your local computer. The implications of such decentralization in terms of the availability of network resources are also significant. The data transmission medium on the Internet cannot be considered only as a network of wires or fiber optic lines. The digitized data is sent via routers , which connect networks and use complex algorithms to choose the best routes for information flows (Fig. 1).

    Unlike local networks, which have their own high-speed information transmission channels, global (as well as regional and, as a rule, corporate ) the network includes a communication subnet (in other words: a territorial communication network, an information transmission system), to which local networks, individual components and terminals (means of input and display of information) are connected (Fig. 2).

    The communication subnet consists of information transmission channels and communication nodes that are designed to transmit data over the network, select the optimal information transfer route, packet switching and implement a number of other functions using a computer (one or more) and the corresponding software available in the communication node. Computers used by client users are called workstations , and computers that are sources of network resources provided to users are called servers . This network structure is called nodal .

    Fig.1 Scheme of interaction on the Internet

    Internet is a global information system that:

    · is logically interconnected by the space of globally unique addresses based on the Internet protocol (IP);

    • capable of supporting communications using the transmission control protocol family - TCP/IP or its subsequent extensions/successors and/or other IP-compatible protocols;

    · provides, uses or makes available on a public or private basis high-level services built on top of the communication and other related infrastructure described here.

    Internet infrastructure(fig.2):

    1. backbone level (system of connected high-speed telecommunication servers).

    2. the level of networks and access points (large telecommunications networks) connected to the backbone.

    3. the level of regional and other networks.

    4.ISP - Internet Service Providers.

    5.users.

    To the technical resources of the Internet include computer nodes, routers, gateways, communication channels, etc.


    Fig. 2 Internet infrastructure

    The network architecture is based on multilevel message passing principle . The message is generated onthe top level of the model ISO/OSI .. Then (on transmission) it is afterconsistently passes all levels of the system to the lowest, where it is transmitted over the communication channel to the addressee. As you go through eachfrom the levels of the system, the message is transformed, divided into relatively short parts, which are supplied with additionalheadings providing similar levels of informationnor on the destination node. At this node, the message passes from the lower level to the upper one, stripping off the headers. As a result, the recipient receives the message in its original form.

    In territorial networks data exchange management implementis controlled by the top-level protocols of the model ISO/OSI . Regardless internal design of each specific top protocollevel, they are characterized by the presence of common functions: initialization of communication, transmission and reception of data, completion of the exchange. Every protocount has the means to identify any network workstationby name, network address, or both. Activizainformation exchange between interacting nodesis determined after the destination node is identified by the node initiatingdata exchange. The originating station sets one of the methods for organizing data exchange: datagram method or method communication sessions. The protocol provides the means to receive/transmitchi messages by addressee and source. In this case, usually overlayThere are restrictions on the length of messages.

    TCP/IP- internetworking technology

    The most common exchange control protocoldata is the TCP/IP protocol. The main difference between the network Internet from other networks lies precisely in its TCP / IP protocols, covercontaining a whole family of protocols for interaction between computersnetworks. TCP/IP is a technology of interconnection, Internet technology. Therefore r a global network that unites manynetworking with technologyTCP/IP, is called Internet.

    TCP/IP protocol is a family of softwarehigher level protocols that do not work with hardware prejerks. Technically, the TCP / IP protocol consists of two parts - IP and TCP.

    Protocol IP ( Internet Protocol - internet protocol) is the main protocol of the family, it implements the distribution of formations in IP -network and is performed at the third (network) level of the mod whether ISO/OSI. IP protocol provides datagram packet deliveryComrade, its main task is packet routing. He is not responsible for the reliability of information delivery, for its integrity, for the preservationthe order of the packet stream. Networks that use the protocol IP are called IP -networks. They work mainly on analog channels (i.e., to connect a computer to a network, you need IP mo dem) and are packet-switched networks. The package is called hereetsya datagram.

    High level protocol TCP ( transmission control protocol- transmission control protocol) works at the transport layer andpartially - at the session level. This is a protocol with the establishment of lological connection between sender and receiver. He obesmaintains session communication between two nodes with a guaranteed delivery of information, monitors the integrity of the transmission received information, preserves the order of the packet stream.

    For computers, the TCP / IP protocol is the same as the rules of timespeech for people. It is accepted as the official standard on the web. Internet , i.e. network technology TCP / IP has de facto become a technologey of the World Wide Web.

    A key part of the protocol is the packet routing scheme based on unique network addresses. Internet. Each work tea station, which is part of a local or global network, havingThere is a unique address, which includes two parts that definenetwork address and station address within the network. This scheme allows the send messages both within this network and to external networks.

    INTERNET ADDRESSING

    Basic protocols of the Internet

    The operation of the Internet is based on the use of families of communication protocols TCP/IP (transmissioncontrolProtocol/ InternetProtocol). TCP/IP is used to transmit data both on the global Internet and in many local networks.

    The name TCP/IP defines a family of network communication protocols. Protocol is a set of rules that all companies must adhere to in order to ensure the compatibility of their hardware and software. These rules guarantee the compatibility of manufactured hardware and software. In addition, TCP / IP is a guarantee that your personal computer can communicate over the Internet with any computer in the world that also works with TCP / IP. As long as certain standards are met, it does not matter who the software or hardware manufacturer is for the operation of the entire system. The ideology of open systems involves the use of standard hardware and software. TCP/IP is an open protocol and all specific information is published and can be freely used.

    The various services included in TCP/IP and the functions of this protocol family can be classified according to the type of tasks they perform. We will only mention the main protocols, since their total number is more than a dozen:

    · transport protocols- manage data transfer between two machines :

    · TCP/ IP(Transmission Control Protocol),

    · UDP(User Datagram Protocol);

    · routing protocols- handle data addressing, ensure the actual data transfer and determine the best paths for the packet to travel :

    · IP(Internet Protocol)

    · ICMP(Internet Control Message Protocol),

    · RIP(Routing Information Protocol)

    · and others;

    · network address support protocols- process data addressing, provide machine identification with a unique number and name :

    · DNS(Domain Name System),

    · ARP(Address Resolution Protocol)

    · and others;

    · application service protocols are programs that a user (or computer) uses to gain access to various services :

    · FTP(File Transfer Protocol),

    · TELNET,

    · http(HyperText Transfer Protocol)

    · NNTP(Net News Transfer Protocol)

    ·and others

    This includes transferring files between computers, remote terminal access to the system, transferring hypermedia information, etc.;

    · gateway protocols help transmit routing messages and network status information over the network, as well as process data for local networks :

    · EGP(Exterior Gateway Protocol),

    · GGP(Gateway-to-Gateway Protocol),

    · IGP(Interior Gateway Protocol);

    · other protocols- used to send e-mail messages, when working with directories and files on a remote computer, and so on :

    · SMTP(Simple Mail Transfer Protocol),

    · NFS(Network File System).

    IP-addressing

    Now let's take a closer look at the concept of an IP address.

    Every computer on the Internet (including any PC when it establishes a session connection with an ISP over a telephone line) has a unique address called IP-address.

    An IP address is 32 bits long and consists of four parts of 8 bits, named according to network terminology. octets (octets) . This means that each part of the IP address can take on a value between 0 and 255. The four parts are combined into a record in which each eight-bit value is separated by a dot. When we talk about a network address, we usually mean an IP address.

    If all 32 bits of an IP address were used, there would be over four billion possible addresses - more than enough for the future expansion of the Internet. However, some combinations of bits are reserved for special purposes, which reduces the number of potential addresses. In addition, 8-bit quads are grouped in special ways depending on the network type, so that the actual number of addresses is even smaller.

    With a concept IP addresses are a closely related concept host (host) . Some people simply equate the concept of a host with the concept of a computer connected to the Internet. In principle, this is true, but in general under the host refers to any device that uses the TCP/IP protocol to communicate with other equipment. That is, in addition to computers, these can be special network devices - routers (routers), hubs (habs) and others. These devices also have their own unique I P addresses, just like the computers of the users' network nodes.

    Any IP- the address consists of two parts: network addresses(network ID, Network ID ) and host addresses(host ID, Host ID ) in this network. Due to this structure, the IP addresses of computers on different networks can have the same numbers. But since the network addresses are different, these computers are uniquely identified and cannot be confused with each other.

    IP-addresses are allocated depending on the size of the organization and the type of its activities. If it's a small organization, then it probably has few computers (and therefore IP addresses) on its network. On the contrary, a large corporation may have thousands (or even more) of computers, united in many interconnected local area networks. For maximum flexibility IPAddresses are divided into classes: A, B and C. There are more classes D and E, but they are used for specific service purposes.

    So, three classes of IP addresses allow you to distribute them depending on the size of the organization's network. Since 32 bits is the legal total size of an IP address, the classes break the four 8-bit parts of the address into a network address and a host address, depending on the class.

    class network addressA determined by the first octet of the IP address (counted from left to right). The value of the first octet, which is in the range 1-126, is reserved for giant multinational corporations and the largest providers. Thus, in the world there can be only 126 large companies in class A, each of which can contain almost 17 million computers.

    ClassBuses The first 2 octets as the network address, the value of the first octet can be between 128-191. Each class B network can have about 65,000 computers, and the largest universities and other large organizations have such networks.

    Respectively, in classC the first three octets are already allocated for the network address, and the value of the first octet can be in the range of 192-223. These are the most common networks, their number can exceed more than two million, and the number of computers (hosts) in each network can be up to 254. a few bits are reserved at the beginning of the IP address to identify the class.

    If any The IP address is symbolically denoted as a set of octets w .x .y .z , then the structure for networks of various classes can be presented in Table 1.

    Whenever a message is sent to any host computer on the Internet, the IP address is used to indicate the address of the sender and recipient. Of course, users do not have to remember all the IP addresses themselves, as there is a special TCP / IP service called the Domain Name System (Domain Name System) for this.

    Table 1. Structure of IP addresses in networks of various classes

    Network class

    First octet value (W)

    Network number octets

    Host number octets

    Number of possible networks

    The number of hosts in such networks

    1-126

    x.y.z

    128(2 7)

    16777214(2 24)

    128-191

    w.x

    y.z

    16384(2 14)

    65536(2 16)

    192-223

    w.x.y

    2097151(2 21)

    254(2 8)

    The concept of a subnet mask

    To separate the network ID from the host ID, a special 32-bit number called the subnet mask is used. Outwardly, the subnet mask is exactly the same set of four octets separated by dots, like any IP address. Table 2 shows the default subnet mask values ​​for class A , B , C networks.

    Table 2. Subnet mask value (default)

    Network class

    Mask value in bits (binary representation)

    Mask value in decimal form

    11111111 00000000 00000000 00000000

    255.0.0.0

    11111111 11111111 00000000 00000000

    255.255.0,0

    11111111 11111111 1111111100000000

    255,255.255.0

    The mask is also used to logically divide large IP networks into a number of smaller subnets. Imagine, for example, that Siberian Federal University, which has a class B network, has 10 faculties and each of them has 200 computers (hosts). Using a subnet mask of 255.255.0.0, this network can be divided into 254 separate subnets with up to 254 hosts each.

    The default subnet mask values ​​are not the only possible ones. For example, the system administrator of a particular IP network might use a different subnet mask value to highlight just some of the bits in the host ID octet.

    How to registerIPyour organization's network?

    In fact, end users are not involved in this task, which falls on the shoulders of the system administrator of this organization. In turn, he is assisted in this by Internet providers, usually taking over all registration procedures in the relevant international organization, called InterNIC (networkinformationCenter). For example, Siberian Federal University wishes to receive an Internet e-mail address containing the string sfu -kras .ru . Such an identifier, including the company name, allows the email sender to identify the addressee's company.

    To obtain one of these unique identifiers, called a domain name, a company or ISP sends a request to the authority that controls Internet connectivity, the InterNIC. If InterNIC (or the body authorized by it for such registration in a given country) approves the company name, then it is added to the Internet database. Domain names must be unique to prevent errors. The concept of a domain and its role in addressing messages sent over the Internet will be discussed below. Additional information about InterNIC operation can be found by visiting the Internet page http://rs.internic.ru.

    DOMAIN NAME SYSTEM

    Domain names

    In addition to IP addresses, the so-called host domain name . Just like an IP address, this is a name is unique for each computer (host) connected to the Internet - only here words are used instead of numeric address values.

    In this case, the concept domain means a collection of Internet hosts grouped together in some way (for example, by territorial, when it comes to the domain of the state).

    Of course, the use of the host's domain name was only introduced to make it easier for users to remember the names of the computers they need. The computers themselves, for obvious reasons, do not need such a service and completely manage with IP addresses. But just imagine that instead of such sonorous names as, www. microsoft. com or www. ibm. com you would have to memorize sets of numbers, - 207.46.19.190 or 129.42.60.216 respectively.

    If we talk about the rules for compiling domain names, then there are no such strict restrictions on the number of component parts of the name and their meanings, as in the case of IP addresses. For example, if there is a host with the name khti, included in the domain of the Republic of Khakassia Khakassia, which, in turn, is part of the Russian domain en, then the domain name of such a computer will be khti. Khakassia. en. In general, the number of components of a domain name can be different and contain from one or more parts, for example, rage. mp3. apple. sda. org or www. en .

    Most often, a company's domain name consists of three components, the first part is the host name, the second is the company's domain name, and the last is the country domain name or the name of one of seven special domains that indicate the host belongs to an organization of a certain activity profile (see Table 1. ). So, if your company is called "KomLinc", then most often the company's Web server will be called www.komlinc.ru (if it is a Russian company), or, for example, www.komlinc.com if you asked the provider to register you in the main international domain of commercial organizations.

    The last part of the domain name is called the top-level domain identifier (for example, . en or . com). There are seven top-level domains established by InterNIC.

    Table1. International Top Level Domains

    domain name

    Domain Host Ownership

    ARPA

    Great-great... grandmother Internet, ARPANet (decaying)

    COM

    Commercial organizations (firms, companies, banks, etc.)

    GOV

    Government agencies and organizations

    EDU

    Educational institutions

    MIL

    Military establishments

    NET

    "Network" organizations that operate or operate the Internet

    ORG

    Organizations that do not fit into any of the above categories

    Historically, these seven default top-level domains indicate the fact of the geographic location of (belonging to) a host in the United States. Therefore, the International Committee InterNIC, along with the above top-level domains, allows the use of domains (special character combinations) to identify other countries in which the organization that owns this host is located.

    So, top-level domains are subdivided into organizational(see Table 1) and territorial. There are two-letter designations for all countries of the world: . en- for Russia (so far, the domain . su, uniting hosts on the territory of the republics of the former USSR), .sa- for Canada, . UK- for the UK, etc. They are usually used in place of one of the seven identifiers listed in Table 1 above.

    Territorial top-level domains:

    . ru (Russia) - Russia;

    Su (Soviet Union ) - countries of the former USSR, now a number of CIS states;

    UK (United Kingdom) ) - Great Britain;

    Ua (Ukraine) - Ukraine;

    Bg (Bulgaria) - Bulgaria;

    Hu (Hungary) - Hungary;

    De (Deutschland) ) - Germany, etc.

    A complete list of all domain names of states can be found on various servers on the Internet.

    Not all companies outside the US have country IDs. To some extent, the use of a country identifier or one of the seven US identifiers depends on when the company's domain name was registered. Thus, companies that have been connected to the Internet for a long time (when the number of registered organizations was relatively small) were given a three-letter identifier. Some corporations operating outside the US but registering a domain name through a US company choose whether or not to use a host country identifier. Today in Russia you can get a domain ID . com, for which you should discuss this issue with your Internet provider.

    HowworkserversDNS

    Now let's talk about how domain names are converted into computer-friendly IP addresses.

    Doing it domainNameSystem(DNS, Domain name system) a service provided by TCP/IP that helps in addressing messages. It is thanks to the work of DNS that you can not remember the IP address, but use a much simpler domain address. The DNS system translates a computer's symbolic domain name into an IP address by finding an entry in a distributed database (stored on thousands of computers) that matches that domain name. It is also worth noting that DNS servers in the Russian-language computer literature are often referred to as "name servers".

    Root zone name servers

    Although there are thousands of name servers in the world, there are nine name servers at the head of the entire DNS system, named root zone servers ( root zone servers ) . Root Zone Servers Named a. root_ server. net, b. root_ server. net and so on until i. root_ server. net. The first one is a. root_ server. net- acts as the primary Internet name server, managed from the InterNIC information center, which registers all domains that are included in several top-level domains. The rest of the name servers are secondary to it, but they all keep copies of the same files. Thanks to this, any of the servers in the root zone can replace and insure the others.

    These computers host information about nameserver hosts serving seven top-level domains: .com , .edu , .mil , .gov , .net , .org , and the special .arpa (Figure 1). Any one of these nine servers carries the same top level file as .uk (UK), .de (Germany), .jp (Japan) and so on.


    Rice. 1. Hierarchical structure of Internet domain names

    The root zone files contain all host computer names and IP -addresses of name servers for each subdomain included in the top-level domain. In other words, each root server has information about all top-level domains, and also knows the name of the host computer and IP - the address of at least one name server serving each of the secondary domains included in any top-level domain. For foreign country domains, the database stores information on name servers for each country. For example, in a certain domaincompany. comthe root zone files for a domain contain nameserver data for any address ending incompany. com.

    In addition to the root zone name servers, there are local name servers set in lower-level domains. The local name server caches a list of hosts it has recently looked up. This eliminates the need to constantly access the system DNS with queries about frequently used host computers. In addition, local nameservers are iterative, and the root zone servers are recursive. This means that the local name server will repeat the process of requesting information about other name servers until it receives a response.

    Root servers Internet at the top of the structure DNS , on the contrary, only issue pointers to the next level domains. Get to the end of the chain and get the required IP -address - local nameserver task. To solve it, it must descend the hierarchical structure, sequentially asking the local name servers for pointers to its lower levels.

    Lecture

    Us - USA;

    Ru - Russia;

    ua - Ukraine, etc.

    by type of organization:

    com - commercial organizations;

    edu - educational institutions;

    net - Internet service centers;

    int - international organizations;

    org - other organizations, etc.

    Zone owner.by - Open contact (www.ok.open.by)

    Provider - an organization that has a license to provide access to Internet services.

    RB providers: Open contact (www.ok.open.by)

    Belpak (www.beltelecom.by) and others.

    4.Search for information on the Internet.

    Searching for information on the Internet can be done using:

    · Site URLs;

    · links on open pages of sites;

    · information retrieval systems (IPS).

    Search relevancy is the degree to which search results match search queries.

    Types of IPS:

    · search engines (catalogues and search engines);

    · metasearch systems;

    · accelerated search programs.

    The IPS creates and maintains an up-to-date database of indexes containing links to Internet information resources. All user search queries are translated into formal queries to the index database. Search results are provided as a list of annotations with links to relevant Web pages.

    The search engine has a special program (an indexer robot) that scans all Internet sites and forms an index database. The search is performed using a query consisting of several keywords and, possibly, query language elements (+, -, ?, &, NOT, OR, etc.) The search can be simple or advanced, specifying the parameters of the search and output of results.

    The most common search engines:

    Rambler – www.rambler.ru

    Yandex – www.yandex.ru

    Google – www.google.com

    AltaVista – www.altavista.com

    All.by – www.all.by

    The catalog is a search engine with topic-separated annotations and links to Web resources. The search is performed through a sequence of refined topics. The index database is manually created by the catalog administrator.

    Most modern ISs are both directories and search engines.

    The most common directories:

    Yahoo – www.yahoo.com

    List – www.list.ru

    Constellation Internet - www.stars.ru

    Metasearch engines do not have their own database of indexes, but send user requests to several search engines and combine the results. For example www.search.com .

    Internet network

    1. History of the creation of the Internet

    After the Soviet Union launched an artificial Earth satellite in 1957, the US Department of Defense decided that America needed a reliable information transmission system in case of war. The US Advanced Research Projects Agency (ARPA) proposed to develop a computer network for this. The development of such a network was entrusted to the University of California at Los Angeles, Stanford Research Center, the University of Utah and the University of California at Santa Barbara. The computer network was named ARPANET (Advanced Research Projects Agency Network), and in 1969 the network united four of these scientific institutions as part of the project, all work was funded by the US Department of Defense. Then the ARPANET network began to actively grow and develop, scientists from different fields of science began to use it.

    The first ARPANET server was installed on September 1, 1969 at the University of California, Los Angeles. The Honeywell 516 computer had 12 KB of RAM.

    By 1971, the first program for sending e-mail over the network was developed, the program immediately became very popular. In 1973, the first foreign organizations from Great Britain and Norway were connected to the network via a transatlantic telephone cable, and the network became international.

    In the 1970s, the network was primarily used for sending email, and the first mailing lists, newsgroups, and bulletin boards appeared at the same time. However, at that time, the network could not yet easily interoperate with other networks built on other technical standards.

    By the end of the 1970s, data transfer protocols began to develop rapidly, which were standardized in 1982-83. Jon Postel played an active role in the development and standardization of network protocols. On January 1, 1983, the ARPANET switched from the NCP protocol to TCP / IP, which is still successfully used to combine (or, as they say, “layering”) networks. It was in 1983 that the term "Internet" was assigned to the ARPANET.

    In 1984, the Domain Name System (DNS) was developed.

    In 1984, the ARPANET had a serious rival, the US National Science Foundation (NSF) founded the vast inter-university network NSFNet (abbreviated from the English National Science Foundation Network), which was made up of smaller networks (including the then famous networks Usenet and Bitnet) and had much more bandwidth than the ARPANET. About 10,000 computers connected to this network in a year, the title of "Internet" began to gradually move to NSFNet.

    In 1988, the Internet Relay Chat (IRC) protocol was invented, making real-time communication (chat) possible on the Internet.

    In 1989, in Europe, within the walls of the European Council for Nuclear Research (fr. Conseil Européen pour la Recherche Nucléaire, CERN), the concept of the World Wide Web was born. It was proposed by the famous British scientist Tim Berners-Lee, who also developed the HTTP protocol, the HTML language and URL identifiers within two years.

    In 1990, the ARPANET ceased to exist, completely losing the competition to NSFNet. In the same year, the first connection to the Internet was recorded via a telephone line (the so-called "dialing" in English. Dialup access).

    In 1991, the World Wide Web went public on the Internet, and in 1993, the famous NCSA Mosaic web browser appeared. The World Wide Web has grown in popularity.

    Currently, the Internet is available not only through computer networks, but also through communication satellites, radio signal, cable TV, telephone, cellular communications, special fiber optic lines and electrical wires. The World Wide Web has become an integral part of life in developed and developing countries.

    Internet is a set of interconnected computer networks that use uniform agreed rules for data exchange between computers.

    The Internet is:

    Ø fast and convenient international means of communication;

    Ø public media;

    Ø a means of mass ordering goods and services;

    Ø a means of providing remote access to information sources;

    Ø world library;

    Ø email;

    Ø electronic bulletin boards and teleconferences;

    Ø means for entertainment.

    The Internet (as a whole) has no owner, although each network included in it is owned by some company, non-profit or government organization. There is also no special governing body that would control the entire operation of the Internet. Regional networks of various countries are financed and managed by their owners in their interests and in accordance with the laws of a particular state.

    3. TCP/IP protocols

    The Internet differs from other networks in its protocols, primarily in the TCP/IP protocols.

    Protocol - this is a set of rules that determines the nature of user interaction, the sequence of actions they perform when exchanging information.

    The term TCP/IP refers to everything related to the protocols for communication between computers on a network.

    The TCP/IP protocol got its name from two types of communication protocols:

    Ø Transmission Control Protocol (TCP);

    Ø Internet Protocol (IP).

    Protocol IP is responsible for finding a route (or routes) on the Internet from one computer to another through many intermediate networks, gateways and routers and transmitting blocks of data along these routes.

    Protocol TCP ensures reliable delivery, error-free and correct order of receiving transmitted data.

    The Internet uses a large number of other protocols, but this network is often called a TCP / IP network, since these two protocols are the most important.