throbber

`
`APPLE 1005
`
`Illustrated by MICHAEL TROLLER
`
`APPLE 1005
`
`1
`
`

`

`
`
`2
`
`

`

`How the
`Internet
`Works
`Sixth Edition
`
`
`
`3
`
`

`

`
`
`4
`
`

`

`How the
`internet
`Works
`
`Sixth Edition
`
`Preston Gralla
`
`Ou’
`
`201 W. 103rd Street
`Indianapolis, IN 46290
`
`5
`
`

`

`6
`
`

`

`How the Internet Works, Sixth Edition
`Copyright © 2002 by Que
`
`Associate Publisher
`Acquisitions Editor
`Development Editor
`Managing Editor
`Project Editor
`Production Editors
`
`Indexer
`
`Technical Editor
`
`Illustrator
`
`Team Coordinator
`Page Layout
`
`Greg Wiegand
`Stephanie J. McComb
`Nicholas J. Goetz
`ThomasF. Hayes
`Karen S. Shields
`Megan Wade
`Amy Jay
`Erika Millen
`
`Chris Faust
`
`Michael Troller
`
`Sharry Lee Gregory
`Gloria Schurick
`
`All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means,
`electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent
`liability is assumed with respect to the use of the information contained herein. Although every precaution has been takenin
`the preparation of this book, the publisher and author assume no responsibility for errors or omissions, Noris anyliability
`assumed for damages resulting from the use ofthe information contained herein.
`International Standard Book Number: 0-7897-2582-7
`
`Library of Congress Catalog Card Number: 20-01087727
`Printed in the United States of America
`
`First Printing: September, 200!
`04
`03
`02 Ol
`43 24
`
`Trademarks
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Que
`cannotattest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of
`any trademark or service mark.
`Warning and Disclaimer
`Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied.
`Theinformation provided is on an “asis” basis. The author and the publisher shall have neitherliability nor responsibility to any
`person or entity with respect to any loss or damages arising from the information contained in this book.
`
`7
`
`

`

`
`
`Introduction
`
`Part |: Understanding the
`Internet’s Underlying
`Architecture
`|
`
`Chapter 1
`WhatIs the Internet?
`Chapter 2
`How Computer Networks Send Data
`Across the Internet
`
`Chapter3
`How TCP/IP Works
`Chapter 4
`Understanding the Internet’s Software
`Structure
`
`Chapter 5
`How Internet Addresses and
`Domains Work
`
`Chapter 6
`How Routers Work
`
`Chapter 7
`How Internet File Types Work
`
`4
`
`8
`
`12
`
`16
`
`20
`
`28
`
`32
`
`Chapter 13
`How You Connectto the Internet from
`Online Services
`Chapter 14
`Ilow Wireless and Palmtop Connections
`Work
`
`Chapter 15
`How Home Networks Work
`
`64
`
`68
`
`78
`
`Part 3: Communicating on
`the Internet
`
`84
`
`Chapter 16
`How E-mail Works
`
`Chapter 17
`How E-mail Spam Works
`Chapter 18
`How Newsgroups Work
`Chapter 18
`HowInternet Chat and Instant
`Messaging Work
`Chapter 20
`HowInternet Phone Calls Work
`
`88
`
`100
`
`106
`
`110
`
`116
`
`Part 2: Connecting to the
`Internet
`
`36
`
`Part 4: Using the World
`Wide Web
`
`122
`
`Chapter8
`How Computers Connect to
`the Internet
`Chapter 9
`Howa Modem Works
`Chapter 10
`How Internet/Television Connections
`Work
`Chapter 11
`How the Digital Subscriber Line (DSL)
`Works
`
`Chapter 12
`HowISDN Works
`
`40
`
`44
`
`48
`
`56
`
`60
`
`Chapter 21
`How Web Pages Work
`Chapter 22
`How Web Browsers Work
`Chapter 23
`How Markup Languages Work
`Chapter 24
`How Hypertext Works
`Chapter 25
`How URLs Work
`
`Chapter 26
`How Image MapsandInteractive
`Forms Work
`
`126
`
`134
`
`140
`
`148
`
`152
`
`156
`
`8
`
`

`

`Chapter 27
`How Web Host Servers Work
`
`Chapter 28
`How Web Sites Work with Databases
`Chapter 29
`HowInternet-Based Software Works
`
`160
`
`164
`
`168
`
`Part 5: Using Common
`Internet Tools
`
`172
`
`Chapter 30
`How Tenet Works
`
`Chapter 31
`How FTP Downloading Works
`Chapter 32
`HowInternet Searching Works
`Chapter 33
`How Agents Work
`Chapter 34
`How Java, ActiveX, and JavaScript
`Work
`
`Chapter 35
`How CGIScripting Works
`
`176
`
`180
`
`186
`
`192
`
`196
`
`204
`
`Part 6: Enjoying
`Entertainment and
`Multimedia on the
`Internet
`208
`
`Chapter 36
`How Music and Audio Work on
`the Internet
`
`Chapter37
`How Napster and File Sharing Work
`Chapter 38
`How Video onthe Internet Works
`Chapter 39
`How Multicast IP and the MBone
`Work
`
`212
`
`220
`
`224
`
`232
`
`Chapter 40
`How Virtual Reality Works
`Chapter 41
`Animation on the Web
`
`236
`
`240
`
`Part 7: Shopping and Doing
`Business on the
`Internet
`
`248
`
`Chapter 42
`How Intranets Work
`
`Chapter 43
`Shopping on the Internet
`
`252
`
`258
`
`Part 8: Protecting Yourself
`onthe Internet
`268
`
`Chapter 44
`How Firewalls Work
`Chapter 45
`How Hackers Can Cripple the Internet
`and Attack Your PC
`
`Chapter 46
`How Viruses Work
`
`Chapter 47
`How Internet Sites Can Invade
`Your Privacy
`Chapter 48
`Cryptography, Privacy, and Digital
`Certificates
`
`Chapter 49
`Howthe FBI’s “Carnivore” Program
`Works
`
`Chapter 50
`Parental Controls on the Internet
`Glossary
`Index
`
`272
`
`280
`
`286
`
`292
`
`302
`
`308
`
`312
`316
`326
`
`9
`
`

`

`Acknowledgments
`|} 1Sbook,like the Internet, is a collaborative work. My name might be on the cover, but I am far
`from the only person involved in its creation.
`Development editor Nick Goetz managedto pull together all the elements of a complex project,all
`the while keeping a cool head, improvingtheillustrations, and offering cditorial insight and lelp. Aud
`acquisitions editor Stephanie McCombwas instrumental in getting the book off the ground, andas al-
`ways, was a pleasure to work with.
`Theillustrator for the book, Michael Troller, deserves much thanks. Not only did he create newil-
`lustrations from scratchspecifically for this book, he redid all the ones from past books and madethis
`edition a more coherent, richer, more visually pleasing experience.
`Thanksalso go to illustrators of past editions: Mina Reimer, Sarah Ishida, Shelly Norris, and Stephen
`Adams. And manythanksto the entire team at Que who produced the book, including Karen Shields,
`Megan Wade, AmyJay, Gloria Schurick, and Erika Millen.
`Thanksalso have to go to the many, many people | interviewed for this book. People from
`Quarterdeck Corporation, Chaco Communications, Progressive Networks, White Pine Software,
`Microsoft, Netscape, Headspace, SurfWatch Software, WebTV, Accrue, VDONet Corporation, America
`Online, Yahoo!, Hilgraeve, Fairmarket, eWallet, and Nuborn Technologies are only a few of the folks
`who gave their time to help me understand thenitty-gritty of how various Internet technologies work.
`Tim Smith from ZDNetoffered me vital help as well.
`I gleaned much information from the many FAQsand similar documents widely available on the
`Internet.I’d like to thank the anonymousauthors of those documents, whoevertheyare.
`Many thanks go to Chris Faust, the technical editor for the book, who did a superb job of ensuring
`that I always got the information right.
`Finally, big thanks have to go to my wife, Lydia. She put up with those occasional glassy-eyed looks
`that were replies to simple questions like, “Did you leave your keys in the refrigerator again?” Shealso
`endured my extreme absent-mindedness while | was figuring out ways to explain how firewalls, ISDN, or
`Web robots work when I should have been concentrating on more immediate matters.
`
`10
`
`10
`
`

`

`aSSSere
`
`Tell Us What You Think!
`AS the readerof this book, you are our most importantcritic and commentator. We value your opinion
`and want to know what we’re doing right, what we could do better, what areas you’d like to see us pub-
`lish in, and any other words of wisdom you're willing to pass our way.
`As an associate publisher for Que, I welcome your comments. You can fax, e-mail, or write me di-
`rectly to let me know whatyoudid or didn’t like about this book—as well as what we can do to make
`our books stronger.
`Please note that I cannot help you with technical problemsrelated to the topic of this book, and
`that due to the high volumeof mail I receive, I might not be able to reply to every message.
`Whenyou write, please be sure to include this book’s title and authoras well as your name and
`phoneor fax number.I will carefully review your comments and share them with the author and editors
`who worked on the book.
`
`Fax:
`E-mail:
`Mail:
`
`317-581-4666
`feedback@quepublishing.com
`Greg Wiegand
`Associate Publisher
`Que
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`
`11
`
`11
`
`

`

`Introduction
`1. the course of cruising the World Wide Web andclicking a link, have you ever wondered,
`“How does that work?” Or perhaps this question popped into your mind while you were trans-
`ferring a file to your computer via FTP, or reading a newsgroup message, or when youfirst
`heard about technologies such as spam, cookies, and firewalls. Maybe you've wondered how
`a message sent from your computer travels through the vastness of cyberspace and ends up
`in the right e-mail box halfway across the world. Have you ever wanted to know howsearch
`tools find the exact piece of information you wantoutof the millions of pieces of information
`on the whole Internet? How canyoulisten to music and view animations while surfing the
`Web?
`
`This book is designed for everyone interested in the Internet. Its guiding principle is this:
`No matter how muchof a cyberpro you are—or how muchof a novice—there’s a lot you
`don’t understand aboutthe Internet. Here’s just one small example. I have a friend who has
`madehis living with companies involved with the Internet for many years. He’s a complete
`cyberpro wholives and breathes the Internet. One day, he almost whispered to me,“I don’t
`yy
`like to admit this, but ] don’t know whata proxy serveris. How does it work, anyway?
`
`He’s not alone. The Internet changes so quickly and the technology advancesso rapidly
`that it can seem almost impossible to keep up withallofit. If you're like just about everyone
`else involved in the Internet, your questionsare similar to those of my friend. You'll find your
`answers here.
`
`In Part 1, “Understanding the Internet’s Underlying Architecture,” I explain the underly-
`ing basics of the Internet: who runsit, how TCP/IP works, how to understand Internet
`addresses and domains, and similar topics, Here’s where you'll find out about things such as
`routers and how the client/server architecture underpins virtually every aspect of the Internet.
`
`Part 2, “Connecting to the Internet,” depicts the various ways you can connect your com-
`puter to the Internet. Here’s where toturnif you’re interested in any of the following topics:
`how a cable modem, a digital subscriber line (DSL), or ISDN works; how online services con-
`nect to the Internet; how you can connectby satellite to the Internet; how “palmtop” com-
`puters, such as 3COM’s Palm, can browse the Web; how a modem works; how you can access
`the Internet from your own home network; and a host of similar subjects.
`
`Part 3, “Communicating on the Internet,” covers every aspect of Internet communica-
`tions. It shows how e-mail and newsgroups work, how IRC chat works, what e-mail “spam” is
`and what you can do to preventit, how instant messaging works, and how you can use the
`Internet to make telephone calls anywhere in the world.
`
`12
`
`12
`
`

`

`Part 4, “Using the World Wide Web,” covers what has becomeby far the most popular
`part of the Internet—the World Wide Web. You'll learn virtually every aspect of how the
`Web works. It delves into how browsers work, how Web server software works, and how
`Hypertext Markup Language (HTML) works. This section also covers the ways in which the
`Web is becoming integrated directly into your computer, how Web pages are published and
`organized onasite, and every other aspect of the Webthatis likely to be of interest to you.
`
`Part 5, “Using Common Internet Tools,” takes a close look at common Internettools.
`Here’s the place to learn aboutbasic tools and services, such as telnet, and what happens
`when you use FTP to downloadafile to your computer. You'll also learn how search engines
`and search tools work. Andit’s the section of the book that covers cutting-edge Internet
`technology. You'll find out about how push technology works, how the Java and ActiveX pro-
`gramming languages work, how JavaScript works, how agentscansilently do your biddingfor
`you, and how the Common GatewayInterface (CGI) works, whichis a little-known butvital
`part of the Internet.
`
`Part 6, “Enjoying Entertainment and Multimedia on the Internet,” shows you how some
`of the most exciting parts of the Internet work—thevarious multimedia technologies.
`Whether you want to know howvirtual reality or animations work, how streaming video
`works, how videoconferencing works, or how similar technologies work, you'll find it all here.
`
`Part 7, “Shopping and Doing Business on the Internet,” covers intranets, how the
`Internet works with the outside world, and how you can shop online. You'll see how compa-
`nies use Internet technologies to build their own private networks, called intranets. And you'll
`take a close look at the underlying technologies that let you shop on the Web, which
`accounts for billions of dollars a yearin sales.
`Finally, Part 8, “Protecting Yourself on the Internet,” covers security concerns. It explains
`the controversial cookie technology that lets Web servers put bits of information on your
`hard disk and use that information to track you. It explains how the even-more controversial
`FBI system called Carnivore can in essence wiretap people’s use of the Internet to read their
`e-mail, watch their Web browsing, and more. This part also shows how firewalls work, how
`viruses can attack your computer, and how cryptosystemsallow confidential information to
`be sent across the Internet. It delves into how hackers cai attack Internet service providers
`(ISPs) using so-called “smurf attacks,” and how they can attack your computeras well. Andit
`covers the issue of pornography on the Internet and shows how parental-controlsoftware can
`prevent children from seeing objectionable material.
`
`So, come along and see how the vast Internet works. Even if you're a cyberpro (and espe-
`cially if you’re not), you'll find out a lot you never knew,
`
`13
`
`13
`
`

`

`PART | UNDERSTANDING THE INTERNET’S UNDERLYING ARCHITECTURE
`
`
`
`14
`
`14
`
`

`

`UNDERSTANDING
`THE INTERNET’S
`UNDERLYING
`ARCHITECTURE
`
`Chapter 1: WhatIs the Internet?
`+
`
`Chapter 2: How Computer Networks Send Data Across
`the Internet
`8
`
`Chapter 3: How TCP/IP Works
`12
`
`Chapter 4: Understanding the Internet’s Software Structure
`16
`
`Chapter 5: How Internet Addresses and Domains Work
`20
`
`Chapter 6: How Routers Work
`28
`
`Chapter 7: How Internet File Types Work
`32
`
`15
`
`

`

`
`
`POR thefirst time ever, the worldis at yourfingertips, From your computer, you can find
`information about anything you can nameor even imagine. You can communicate with
`people on the otherside of the world. You can set up a teleconference, tap into the resources
`of powerful computers anywhere on the globe, search through the world’s best libraries, and
`visit the world’s most amazing museums. You can watch videos, listen to music, and read spe-
`cial multimedia magazines. You can shop for almost anything you can name. You can do all
`this by tapping into the largest computer network in the world—theInternet.
`
`The Internetisn’t a single network;it is a vast, globe-spanning network of networks. No
`single person, group, or organization runs the Internet. Instead,it’s the purest formof elec-
`tronic democracy. The networks communicate with one anotherbased on certain protocols,
`such as the Transmission Control Protocol (TCP) and the Internet Protocol (IP). More and
`more networks and computers are being hooked up to the Internet every day. Tens of thou-
`sands of these networks exist, ranging from university networks to corporate local area net-
`worksto large online services such as America Online and CompuServe. Every time you tap
`into the Internet, your own computer becomes an extension of that network.
`
`Thefirst section of this book is spent defining the Internet. It also examines the architec-
`tures, protocols, and general concepts that makeitall possible.
`
`Chapter 1, “WhatIs the Internet?,” examines how the Internet runs. You’ll look at who
`pays for the high-speed data backbones that carry much of the Internet’s traffic and at the
`organizations that ensure that standardsare set for networks to follow so the Internet can run
`smoothly, You'll also look at the various types of networks connected to the Internet.
`
`Chapter 2, “How Computer Networks Send Data Across the Internet,” explains how
`informationtravels across the Internet and describes how hardware such as routers, repeaters,
`and bridges sends information among networks. It also shows howsmaller networks are
`grouped into larger regional networks—and how those large regional networks communicate
`among themselves.
`
`Chapter3, “How TCP/IP Works,” covers the Internet’s basic protocols for communica-
`tions. You'll learnalittle about basic Internet jargon, such as TCP/IP (short for Transmission
`Control Protocol and Internet Protocol), This chapter also explains how those protocols work
`and how special software such as Winsock enables personal computers to get onto a network
`originally designed for larger computers.
`
`Chapter 4, “Understanding the Internet’s Software Structure,” looks at the Internet's
`client/server architecture. Servers—also called hosts—are powerful computers that perform
`functions such as delivering information or Web pages, hosting databases, and handling
`e-mail. A client is your own computer and the software thatsits on it, such as a Web browser
`
`16
`
`16
`
`

`

`or piece of e-mail software. Clients request information from servers, which do the heavy-
`duty processing and then send the information back to the client, which displays the infor-
`mation.
`
`Chapter 5, “How Internet Addresses and Domains Work,” takes the mystery out of the
`Internet’s often confusing addressing scheme, You'll learn about Internet domains and
`addresses and will even be able to make sense of them. More than that, you'll learn how
`domainservers are capable of keeping track of all the locations on the Internet andtranslat-
`ing addresses such as www. zdnet.com into Internet IP addresses such as 134.54.56. 120.
`You'll also learn how some computersare assigned new IP addresses by special servers every
`time they connectto the Internet.
`
`Chapter 6, “How Routers Work,” details how the most basic piece of hardware on the
`Internet—a router—works. Routers are combinations of hardware and software that perform
`the job of ensuring thatall data is sent to the properdestination. Think of routers as traffic
`cops of the Internet. They use the IP addresses the nameservers havetranslated to route the
`data. Routers look at the addresses and then send the data to the next-closest router to the
`destination and so on,until the datais finally delivered. They use routing tables to determine
`how to route the traffic, and they can also adjust the routesas the traffic on the Internet
`changes,thus ensuring that the data is routed in the mostefficient way possible.
`Chapter 7, “How Internet File Types Work,” gives you an understanding of the most com-
`montypes offiles you’ll come across when you browse the Net. Compressedfiles, videofiles,
`graphicsfiles—you'll learn about almost every typeoffile you might encounter.
`Whether you’re a newbie or cyberpro, this section teaches you the basics of the Internet.
`
`17
`
`17
`
`

`

`CHAPTER What Is the
`i
`Internet?
`
`
`
`18
`
`

`

`ONE of the most frequently asked questions about the Internet is: Who runsit? The truth is that no cen-
`tralized managementofthe Internet exists. Instead, it is a collection of thousands of individual networks
`and organizations, each of which is run and paid for on its own. Each network cooperates with other net-
`worksto direct Internet traffic so that information can pass among them. Together, these networks and orga-
`nizations make up the wired world of the Internet. For networks and computers to cooperate in this way,
`however, a general agreement must take place about things such as Internet procedures and standards for
`protocols. These procedures and standardsare laid out in requests for comment (RFCs) that are agreed on by
`Internet users and organizations.
`A variety of groups guide the Internet’s growth by helping to establish standards and by educating people
`on the proper way to use the Internet. Perhaps the most importantis the Internet Society, a private, non-
`profit group. The Internet Society supports the work of the Internet Activities Board (LAB), which handles
`much of the Internet’s behind-the-scenes and architectural issues. The Internet Engineering Task Force
`(IETF)is responsible for overseeing how the Internet’s TCP/IP protocols evolve. For information about the
`IETE, go to www. ietf.org.(See Chapter 3, “How TCP/IP Works,” for details on TCP/IP protocols.)
`The World Wide Web Consortium (W3C) develops standards for the evolution ofthe fastest-growing
`part of the Internet, the World Wide Web(find it at ww.w3.org). The W3Cis an industry consortium run
`by the Laboratory for Computer Science at the Massachusetts Institute of Technology (MIT).
`Private companies oversee the registering of Internet domains, such as www. zdnet. com or
`Www. quepublishing.com. These companies, called registrars, all must cooperate with one another to
`ensure that only one person or company can owna particular domain andthat all the domains work prop-
`erly. The registrars compete with one anotheras well in allowing people and businesses to register domains.
`Registering a domain costs money, and the registrars compete on cost and on giving extra services to those
`who buy domains.
`Althoughall these types of organizations are important for holding together the Internet, at the heart of
`the Internet are individual local networks. These networks can be found in private companies, universities,
`governmentagencies, and online services. They are funded separately from each other and in a variety of
`manners, such as fees from users, corporate support, taxes, and grants. Many Internet service providers
`(ISPs), which provide Internet access for individuals, have networks as well. Individuals who wantto access
`the Internet pay ISPs a monthly connection rate, so in that sense, everyone who uses the Internet helps pay
`for it.
`
`The networks are connected in a variety of ways. For efficiency’s sake, local networks join in consortiums
`knownas regional networks. A varlety of leased lines connect regional and local networks. The lcased lines
`that connect networks can be as simple as a single telephoneline or as complex as a fiber-optic cable with
`microwave links and satellite transmissions.
`
`Private companies who make moneybyselling access to their lines build backbones, which are very high-
`capacity lines that carry enormous amountsofInternettraffic. Government agencies, such as NASA,and
`large private corporations pay for some of these backbones. The National Science Foundationalso pays for
`some backbones.
`
`19
`
`19
`
`

`

`- a
`
`.
`wy
`~
`e+TS ve
`uy
`2
`ie MN :
`- Sr
`- his
`{
`. 6
`PART | UNDERSTANDING THE INTERNET’S UNDERLYING ARCHITECTURE
`ae.
`How the Internet Can
`
`
`~
`es Together
`
`ae|
`
`Organization of networks Becausethe Internetis a loose organization of networks, no single group
`runsit or paysfor it all. Instead, many private organizations, universities, and government agencies pay
`for and run parts of It. They all work together in a democratic, loosely organizedalliance. Private organi-
`zations range from small, homegrown networks to. commercial online services, such as‘Ameriea Online
`and CompuServe,andprivate Internet service providers(ISPs) that sell access to the Internet.
`
`
`
`
`
`
`
`
`
`-
`; Ef
`
`a
`i
`

`
`Funding the Internet Through agencies such as the National Science
`Foundation, the federal government pays for some high-speed backbones that
`carry Internettraffic across the country and the world. The high-speed vBNS (very
`___ high-speed Backbone NetworkServices), for‘example, provides
`yer
`a high-speedinfrastructure for the research and education
`oP
`community by linking together supercomputer centers.
`Often, a large corporation or organization such as
`eA NASA provides backbonestolink sites across the
`.
`also fundedthe Internet2, a super-fast net-
`\ work that can transfer data at an
`<.
`“astounding 2.4 gigabits per second,
`\ yy
`~~"
`for use by universities. A numberof uni-
`\Y versities already are connected toit. When
`~ finished in 2003,it will link 140 universities.
`Eventually, the entire Internet might run at its speed.
`Se
`ail
`
`country or the world. The government has
`
`yy
`
`a
`

`(: aa x
`
`
`
`
`Regional networks
`Regional networks provide
`and maintain Internet access
`within a geographic area.
`Regional nets can consist of
`smaller networks and organi-
`_zations within the area that
`have banded togetherto
`providebetter service.
`
`
`
`Registrars™ Private companiescalled
`Internet registrars are responsible for
`registering Internet domains, such as
`www. zdnet.com, to people and. businesses.
`Until recently,,a quasi-public company
`called the InterNIC had‘sole responsibility
`for doing this, but other registrars can
`now register domainsas well. a
`—
`
`4
`
`Supercomputer
`Center
`
`
`
`20
`
`20
`
`

`

`provi
`
`|
`
`
`
`ies are
`
`aS
`
`Internet:
`
`architectural recommendations that eo
`
`
` jice
`ISPssell peopleMont
`connectionsto the |
`ternet
`They run theirown seg- ~ Si
`
`mentsof theInternet anda
`
`also might supply long- |
`Internet
`distance connections
`
`Service
`|v
`called Papeete
`
`
`Provider
`Telephone compa
`
`~ another sourceof long-
`
`istance connections for
`
`
`nternet.
` F\;
`
`e@
`|
`Society
`
` Internet Society The Internet
`yen
`“x
`Society is a private nonprofit organiza- SS Sy Ae ais
`tion
`that makes rechholosiea and
`aM
`
`paren to the Internet, such as how
`
`TCP/IP.and otherInternet protocols
`|
`should work. This body guides hae
`InterNIC The InterNIC is responsible for
`
`
`
`
`direction of the Internet and its growth.
`maintaining the domains registered through
`ma
`registries. It tracks the connections
`\
`betweenInternet addresses, such as
`BS
`
`
`
`-
`
`)
`i
`
`oy
`2
`
`125\34.24.21, and domain names,
`such as ww.zdnet.com.
`
`
`
`21
`
`21
`
`

`

`
`
`CHAPTER How Computer
`2?
`Networks Send
`Data Across
`the Interne
`
`A
`
`22
`
`22
`
`

`

`you might take for granted that when you sendapiece of information across the Internet, it will always
`reach its intended destination. However, the process of sending that information is remarkably complex.
`Whenyou send information across the Internet, the Transmission Control Protocol (TCP)—the language
`computers use when communicating over the Internet—first breaks the information up into packets, smaller
`blocks of information that also contain a variety of data that helps the packets travel across the Internet.
`Your computer sends those packets to your local network, Internet service provider (ISP), or online service.
`From there, the packets travel through manylevels of networks, computers, and communicationslines
`before they reach their final destinations, which might be across town or around the world. A variety of
`hardware processes those packets and routes them to their proper destinations. This hardware is designed to
`transmit data between networks and makes up muchofthe glue that holds the Internet together. Five of the
`most important pieces of hardware are hubs, bridges, gateways, repeaters, and routers.
`Hubs are important because they link groups of computers to one another and let computers communi-
`cate with each other. Bridges link local area networks (LANs) with one another. They enable data destined
`for another LAN to be sent there, while keeping local data inside its own network. Gateways are similar to
`bridges, but they also translate data from one type of network to another.
`Whendatatravels across the Internet,it often crosses great distances, which can be a problem because
`the signal sending the data can weaken overthe distance. To solve the problem, repeaters amplify the data at
`intervals so the signal doesn't weaken.
`Routers play a key role in managing Internet traffic. Their job is to ensure the packets alwaysarrive at
`the proper destination. If data is being transferred among computers that are on the same LAN, routers
`often aren’t necessary because the network itself can handle its internaltraffic. Routers come into play when
`the data is sent between two different networks. Routers examine packets to determine their destinations.
`They take into account the volumeof activity on the Internet, and they send the packet to another router
`that is closer to the packet's final destination. For more information on routers see Chapter 6, “How Routers
`Work.”
`
`All this hardware connects the many networks that make up the Internet. At the most local level of net-
`works are corporate local area networks. Midlevel networks hook these LANstogether using high-speed
`telephone lines, ethernet, and microwavelinks, A regional network is a midlevel network in a geographic
`area. A wide area network (WAN) is another type of midlevel network. A WAN consists of an organization
`with many networkedsites linked together.
`
`Whena packettravels from a computer on a LAN in a midlevel network to a computer somewhereelse
`on the midlevel network, a router (or a series of routers) sends the packet to its proper destination. However,
`if the destination lies outside the midlevel network, the packet is sent to a network access point (NAP),
`whereit is sent across the country or the world on a backbone. High-speed backbones such as the vVBNS
`(very high-speed Backbone Network Services) can transmit enormous amounts of data—155 megabits (mil-
`lions of bits) per second (Mbps). Even faster backbones are being built that will transmit data at an astonish-
`ing 9.6 billion bits per second.
`
`23
`
`23
`
`

`

`
`
`ow Netw
`
`to the Interne
`
`
`iy
`
`—
`—
`
`Dial Up
`
`t.
`
`~~
`
`.
`
`{
`
`You get onto the Internet through a LAN at
`your homeorplace of businessin one of two
`ways. You can dial into a large computer con-
`nected to the Internet via an online service ora
`dial-in Internet service provider (ISP), or you can
`use anothertype of Internet service, such as a
`cable modem. Ethernet networks and token-ring
`networks are two types of networksthat
`
` can be connected to the Internet. Token-
`
`ring networks pass data in tokens from
`computer to computer in a ring or star
`configuration. In Ethernet networks,
`the data goes from a server
`to a computer on the
`
`Satellite
`
`
`Link
`
`Ethernet Network [o>
`——
`
`OF
`
`Server
`
`Token-Ring Network
`
`.
`ez
`Ty
`
`By, /
`
`id
`network.
`oS. a
`
`>ile
`F
`
`X
`a
`
`iter you're connected
`
`
`and you want to-send or
`
`your @2a
`receive information;
`requests anddata are
`a
`
`handled by routers on the #
`Internet. Routers perform *
`
`mostof the workof direct-
`ing traffic on the Internet.
`They examine the packets of data that travel acrossthe Internet to
`see where the data is headed. Based on the data’s destination, the
`packet is routed in the mostefficient way—generally to another
`router, which in turn sends the packet to the next router, and so on.
`Routers also connect networksto each other.
`
`E The data can be transferred between networks in a numberof ways. Dedicated telephonelines can transmit
`data at 56Kbps (kilobits per second). An increasing number of T1 leased telephone lines carry data between
`networks. A T1 link can carry data at 1.544Mbps. Higher-speed T3 links, which can carry data at 44.746Mbps,
`are being usedas well. If you dial into an ISP from home, you might connect at a lower speed than at your
`office, where you might have higher-speed connections such as a T1 or 56Kbpsline. However, a variety of
`high-speed options are available for connecting to the Internet at home, such as cable modemsor high-
`speed Digital Subscriber Line (DSL) connections.
`
`24
`
`24
`
`

`

`
` CHAPTER 2HOWCOMPUTER
`
`4|A variety of other methods transfer J
`
`
`data between networks. Satellites can
`be used to send and receive informa-
`tion, as can fiber-optic cables, spe-
`cial Integrated Services Digital
`Network (ISDN) telephone
`lines, and high-speed
`
`Satellite
`
`DSL connections.
`Link
` GB The networksin a particular geo-
`
`graphic area are connected into a
`large regional network. Routers
`pass information within that <>
`area from network to network
`
`ys,
`
`
`
`
`
`Gg Regional networks are connected to one anothervia
`high-speed backbones—connections that can send
`
`data at extremely high speeds. Whendatais sent from
`one regional network to another,it is first sent to a net-
`
`
`work access point (NAP). The NAP then routes the data
`
`to high-speed backbones, such as vBNS, which can
`transmit data at 155Mbps. The data is then sent
`along the backbone to another regional net-
`
`work.Finally, itis passed toaspecific
`
`network and computer within that
`regional network.
`
`
`
`25
`
`25
`
`

`

`
`
`cee How TCP/IP
`3
`Works
`
`
`
`26
`
`26
`
`

`

`A seemingly simple set of ideas makesit possible for computers and networksall over the world to share
`information and me

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket