Saturday, July 18, 2009
Internet Connection Technologies
The Internet is one of the most useful Web 2.o technology tools of our time. Many of us cannot imagine even going one day without accessing it. Although many use this technology, I wonder how many know how it actually works. Do most of the users even care how it works? For those who do, let me start with a basic description of how the Internet functions.
The main technology of the Internet is called packet switching. This task is implemented through TCP/IP data communication protocols. Historically speaking, the ARPANET was the first packet switching computer network. The Internet, as we know it today, was developed from this ARPANET. Vinton Cerf and Robert Kahn were in the group that developed ARPANET and went on to create the TCP/IP network standard in 1980.
TCP/IP is a combination of the IP application of the source and destination address of all packets. The TCP part takes a large piece of data and breaks it up into many small pieces. Once it arrives at the final destination, the TCP reassembles the information into the whole large data piece. Everything that happens on the Internet (e-mail, VoIP, web-browsing) uses this packet technology.
Although the first IP address system seemed to contain plenty of numbers, it is actually now strained from the explosion of users. As a result, several new solutions are being implemented. Some of the solutions are the use of VPNs to extend address space, migration to IPv6 which offers more IP addresses, and internal IP addresses. Many companies are now using the VPN technologies for remote employees, as well as, an internal IP address for all of their employees. Using the internal address allows for companies to use a private IP address and keep added control for security purposes.
When using the VPN method, it is important to have a proxy server. Proxy servers serve as firewalls, authentification of users, and a way to restrict Internet access. For example, some companies restrict the types of sites that their employees can access while at work. This is for security and filtering purposes.
Another way to distinguish destination addresses are through a domain name. The domain name has a number assigned to it which helps distinguish it's address. Registration is offered in the .COM, .NET, and .ORG domains. Some that have been added are .EDU, .GOV, .MIL, along with the more recent .BIZ, and .INFO. Assigning a domain name allows for an IP address to be used multiple times.
So what is needed to access this wonderful world of Internet from the comfort of your home besides a computer of some type? When access first became available to households, it was in the form of a dial-up connection. To achieve this connection, it was necessary to have a modem. The purpose of the modem was to work with the telephone service to change the analog to digital and then back to analog again. This dial-up service was the precursor to broadband. With broadband, the user is able to access the Internet while still having the use of their phone line. In contrast, dial-up service prohibited phone use while the Internet was being accessed. Although have constant access to the Internet is a convenience, there is a security risk for users as the ongoing Internet connection can allow unsecured information to go out on the Internet connection for others to grab. A popular form of broadband is Digital Subscriber Line (DSL). Cable broadband runs very similar to DSL except that availability may be an issue as it was not designed to do two-way traffic. This can be frustrating for users at times. In 2004, the cable modem had a lead over the DSL.
Wireless broadband has become very popular as users have multiple computers in their homes or want to have the use of their computer wherever they are. Hotels, coffee shops and even some doctor's offices have implemented this convenience in their businesses. This service requires an access device that connects to a broadband source. This source then allows access from any device with a wireless network adaptor. Again, security can be an issue as the user doesn't have control over the measures that have or have not been taken.
For many, it is hard to imagine life without the Internet and being able to access the Internet from any location. It will be interesting to see what the future holds for this Web 2.0 technology.
Subscribe to:
Post Comments (Atom)
Sorry, not computer related, but had to agree with you...
ReplyDeleteThank God for sisters!
Love ya!