Want To Know How The Internet Works? Learn All About It Right Now

Want To Know How The Internet Works? Learn All About It Right Now

·

6 min read

What is the Internet?

When we talk about the Internet, we often remember that it is "a computer network". We can even say yes, but to understand how the Internet gets to your home we will imagine that it is a small network connected to other (larger) networks of computers. Therefore, there is not an internet owner, nor a company that controls it, but rather a group of several interconnected networks. When we connect one computer to another, or when we connect multiple computers to each other, we create a local network. But in this way, computers only communicate with each other, without access to other computers outside your home or business, without access to other servers, as is possible when there is internet access. This external access occurs when your local network connects to another larger network - in this case, your Internet service provider - through TCP/IP technology, an Internet Protocol-based communication mode. This IP is the address of each of the points of a network, and each point of the network consists of a computer that, in turn, connects to other computers, forming a true "web of networks". On the other, websites and services accessed over the Internet are - in a simplified way - applications available on servers. And these servers are formed by large computers connected to the worldwide Internet network, each of them also identified by an IP address.

The Internet Path Now yes, let's understand which way the Internet takes to get to your house. This path goes through four main steps, always identified by an IP address: the Backbone, the access provider, the service provider, and the end user.

These backbones are points of the networks that make up the core of internet networks. These are key points of the Internet that distribute information based on TCP/IP technology across networks. There are few backbones around the world, and these are responsible for distributing worldwide access to the Internet network.

• Access provider From the backbones, the Internet moves on to a new stage when its signal reaches access providers – companies that hire the backbones signal to distribute to their users. Access providers are generally companies linked to the telecommunications industry, or even telephone companies themselves, which provide Internet access through plans agreed with their users. • Service provider This Internet data that will travel on the network requires a means for its transport to users, and it is the service providers companies responsible for this role. These companies receive the data from the access provider and distribute to users by various means, either by telephone line, fiber optic or radio (by wireless technology). In Nigeria, these companies should always be regulated by NCC and can be network service providers, telephone companies and telecommunications companies.

• End user This may seem like the final step of the path taken over the Internet, but it really isn't. Upon reaching the end user the Internet signal starts to repeat all the way again, but in reverse form, since you, as an end user, also send signals - with your requests - to the Internet. Data submitted by users is transported by the service provider, sent to the access provider, and arrives again at the backbone. From the backbone, the process again follows the same initial path to the next destination, which can be, for example, the CD file you are wanting to download, here in Nigeria.

When accessing the desired CD site, however, no one obviously knows the full IP address of the machine that hosts these files or websites. What we know is the address "www". These website addresses are based on DNS technology, which basically creates shortcuts between "www" addresses and IP addresses. Thus, you do not need to browse decorating addresses such as "192.168.200.45" to access your preferred website. Just know the address "www".

After accessing the site, by DNS, the address "www" will throw you to the IP address where it is hosted. Once this is done the site will receive your signal asking you to download the CD file, and this signal will be transported by your service provider to the access provider, which will take you to the backbone. Arriving at the contracted backbone, the signal should reach the server where the cd files you want to download are located, then the backbone of your provider will send a signal to the backbone of the Provider of the CD site, which will make the same path. In the end, the file will finally be transferred from there to your computer.

How Public and Private Key encryption works Public and private keys form the basis for Public Key cryptography, also known as Asymmetric Cryptography. In Public Key cryptography, each Public Key matches a single Private Key. Together, they are used to encrypt and decrypt messages. If you encrypt a message using a person's Public Key, they can only decode it using their matching Private Key.

The difference between public and private keys Public keys have been described by some as a company's address on the web: it's public and anyone can search for it and share it widely. In asymmetric encryption, public keys can be shared with everyone on the system. Once the sender has the Public Key, they use it to encrypt their message., each public key comes paired with a unique private key. Think of a private key as similar to the front door key of a business where only you have a copy. This defines one of the main differences between the two types of keys. The Private Key ensures that only you can pass through the front door. for encrypted messages use this private key to decrypt messages together, these keys help ensure the security of the data exchanged. A message encrypted with the Public Key cannot be decrypted without using the corresponding private key.

Public and private keys: an example Bob wants to send Alice an encrypted email. To do this, Bob takes Alice's Public Key and encrypts his message to her., Then when Alice receives the message, he takes the private key that only she knows to decrypt Bob's message. Although the attackers could try to compromise the server and read the message, they will not be able to because they lack the private key to decrypt the message. Only Alice will be able to decrypt the message, as she is the only one with the Private Key. And, when Alice wants to respond, she simply repeats the process, encrypting her message to Bob using Bob's Public Key.

Conclusion

The internet world can be very fascinating and as it continues to evolve, learning how it works becomes endless. We should not get stuck or confused trying to access its knowledge. There are numerous articles, blogs, communities to bring you out of the loop. Codeclannigeria is one of the many fascinating communities to help you get started on your internet journey. The community offers both newbies and pros alike a platform to learn, grow and connect. In a world that is so tech dependent. You shouldn’t be left out!