Unraveling the Mystery: A Comprehensive Guide to How the Internet Functions
Source: Intel, Cloudfare & CDW

Unraveling the Mystery: A Comprehensive Guide to How the Internet Functions

Before we dive into the world of the internet, let's start with the basics about what is a “network”? A network simply means a group of computers that talk to each other. They can send and receive information from each other. The internet is a massive network made up of many smaller networks all over the world. It connects billions of devices, from computers to smartphones, allowing us to share information and stay connected like never before.

The beauty of the internet lies in its vastness and diversity. With just a few clicks, you can access a wealth of information, ranging from educational courses on programming languages to reviews of the latest video games. It's a never-ending treasure trove of knowledge, entertainment, and endless possibilities.

Understanding Device Connectivity on the Internet

The internet is a fascinating network connecting devices from all around the world. Information travels quickly and efficiently through wires, cables, and even radio waves. Devices, like computers and servers, constantly connect and disconnect, making the internet a constantly evolving network. The way data is stored across multiple devices helps make it strong and able to handle any challenges that may come its way. Whether you're browsing websites or sending emails, the internet is a powerful tool and it's amazing to think about all the work that goes on behind the scenes to make it all possible.

Understanding the Inner Mechanics of the Internet

To truly comprehend how the internet operates, it's important to delve into the foundational elements of packets, protocols, and the physical infrastructure that make it all possible.

Packets

The internet works by transmitting data as packets, small segments of information transformed into bits for computer understanding. Routers and switches direct these packets to their intended destination. Reassembling these packets results in the information you requested, whether it's a web page, video or audio. The packet-based system enables efficient and reliable transfer of data across the internet. This is a critical aspect of how the internet operates.

Protocols

Just like how humans use a common language, like English, to communicate with people from other parts of the world, devices also need a common language to communicate with each other. This common language is provided by protocols, which are standardized ways of doing things that every device can understand, no matter where and how it was built.

Following are the few types of protocols with brief explanation:

  1. TCP/IP : This is responsible for sending packets and insuring those packets arrive in order.
  2. HTTP : One of the most familiar protocol which is responsible for formatting the websites and applications. It also the web browser and server to communicate.
  3. HTTPS : Similar to HTTP but the data sent between the browser and the server is encrypted.
  4. UDP : Similar to TCP but it doesn’t ensures that a connection is made between the application and the server. This is commonly used in video streaming.
  5. SFTP : Stands for Secure File Transfer Protocol and as it’s name suggests, used to securely transfer the file across the network.

Physical Infrastructure

Physical infrastructure of the internet refers to the hardware components that form the backbone of the internet, including routers, switches, web servers, and other networking devices. These components work together to transmit and route data, allowing people to connect and communicate online.

Let’s explain a few of them briefly:

  1. Router : A router is a networking device that directs data traffic between networks, determining the best path for the data to take, and connecting multiple networks together to enable communication.
  2. Switch : A switch is a piece of networking equipment that helps connect devices on a network and allows them to communicate with each other. It acts as a traffic controller, directing data between devices to ensure efficient and reliable communication.
  3. Servers : A server is a computer that provides access to shared resources and services to other devices on a network. It helps manage and distribute information and resources efficiently.

How these terms relate to the websites we access over the Internet

Here's how you access this article through LinkedIn or a web browser: A step-by-step breakdown of the process.

  1. DNS Query : The first thing include locating the IP address of the webpage we are trying to access, and this be done by a DNS query.
  2. TCP Handshake : Browser opens a connection with that IP address we have located through the DNS.
  3. TLS Handshake : Your browser also setup an encryption between the LinkedIN servers and the device you are using. So that the data becomes unreadable between the two endpoints.
  4. HTTP Request : Browser requested the content that you see on this page
  5. HTTP Response : LinkedIN server transferred the data in the form of JavaScript, HTML and CSS code, which later is broken down into packets like we have learnt earlier.

How we can stay safe on the internet

The internet opens up a vast world of opportunities for entertainment, information, and education, but it also presents various risks, including cyber threats, scams, and unreliable sources.

Here are some tips to stay safe while browsing the internet :

  1. Don’t share your personal information : Never share your personal information with a random stranger online such as Full Name, age, home or school address etc.
  2. Only connect with friends : Only connect with your friends or the people you know in real life.
  3. Use strong passwords : Avoid easily predictable passwords like personal information and pet names. Instead, create a combination of letters, numbers, and special characters for added security.
  4. Do not share passwords : Keep them confidential by not sharing them online or writing them down on paper. Consider using password management services.
  5. Manage Your Privacy Settings : Ensure that your social media accounts remain private by adjusting the settings to limit visibility to only those on your approved list.

To view or add a comment, sign in

More articles by Shaz Rehman

Insights from the community

Others also viewed

Explore topics