Welcome to the World of the Internet!

In this chapter, we are going to explore the "backbone" of our modern world. You use the Internet every day to stream videos, chat with friends, and do your homework, but have you ever wondered how data actually travels from a server across the ocean into your phone screen?
Don't worry if this seems like a lot of information at first! We will break it down into simple pieces, using analogies that make sense.

Quick Review: What is the Internet?
The Internet is a network of networks. It is the physical infrastructure (the cables, routers, and satellites) that connects billions of devices globally. It is different from the World Wide Web, which is just one way of sharing information over that physical network!

1. IP Addresses: The Internet's Postal System

For one computer to talk to another, it needs to know exactly where that computer is. This is done using an IP Address (Internet Protocol Address).

IPv4 vs. IPv6

There are two types of IP addresses you need to know about: IPv4 and IPv6.

IPv4 (The Older Brother):
• Uses 32 bits.
• Written as four numbers separated by dots (e.g., 192.168.1.1).
• Each number is between 0 and 255.
Problem: It only allows for about 4.3 billion addresses. Since almost everyone has multiple devices now, we ran out of room!

IPv6 (The Modern Solution):
• Uses 128 bits.
• Written in hexadecimal (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
• It provides a massive number of addresses—enough for every grain of sand on Earth to have its own IP!

Did you know?
The number of possible addresses in IPv6 is \(2^{128}\). That is a number so large it has 39 digits!

Key Takeaway: Every device needs an IP address to be found. IPv4 is shorter but limited; IPv6 is longer and provides nearly infinite space.

2. Domain Names and the DNS

Computers love numbers (IP addresses), but humans love words. It’s much easier to remember google.com than 142.250.190.46. This is where Domain Names and the DNS come in.

What is the DNS?
The Domain Name System (DNS) is like the "Phonebook of the Internet." It translates a human-friendly domain name into a computer-friendly IP address.

How the DNS Works (Step-by-Step):

1. You type www.oxfordaqa.com into your browser.
2. Your computer sends a request to a DNS Server asking: "What is the IP for this name?"
3. The DNS server looks up the name in its database.
4. The DNS server sends the IP address (the "phone number") back to your computer.
5. Your computer uses that IP to connect directly to the web server.

Analogy: Imagine you want to visit a friend's house. You know their name (Domain Name), but your GPS needs their coordinates (IP Address). You call a directory (DNS) to get the coordinates before you start driving.

Key Takeaway: The DNS makes the Internet user-friendly by letting us use names instead of complex strings of numbers.

3. Client-Server and Peer-to-Peer Models

There are two main ways computers organize themselves on a network.

The Client-Server Model

In this model, there is a clear "boss."
The Server: A powerful computer that stores files or hosts a website. It waits for requests.
The Client: Your computer or phone. You "request" data from the server (like asking for a webpage).
Example: Watching Netflix. Netflix is the server; you are the client.

The Peer-to-Peer (P2P) Model

In this model, everyone is equal.
• There is no central server.
• Every computer (peer) acts as both a client and a server.
Example: BitTorrent or Skype. You download bits of a file from other users while simultaneously uploading bits to them.

Quick Comparison:
Client-Server: Easier to manage and backup, but if the server crashes, the whole system goes down.
P2P: Harder to manage, but very "robust"—if one computer leaves, the network keeps working.

Key Takeaway: Use Client-Server for centralized control (websites) and P2P for shared resources without a central boss.

4. The TCP/IP Protocol Stack

When data travels over the Internet, it isn't sent as one big chunk. It is broken into small Packets. To make sure these packets arrive safely, the Internet uses a "Stack" of rules called Protocols.

Memory Aid: All People Need Links
This helps you remember the four layers (from top to bottom):
1. Application Layer (All)
2. Transport Layer (People)
3. Network Layer (Need)
4. Link Layer (Links)

What happens at each layer?

1. Application Layer: This is where your software (like Chrome or Email) lives. It uses protocols like HTTP for web pages or SMTP for email.

2. Transport Layer: This layer breaks the data into packets. It adds a sequence number to each packet so the receiving computer knows how to put them back in the right order. It uses the TCP protocol.

3. Network Layer: This layer adds the IP addresses (sender and receiver). It acts like an envelope, writing the address on the outside so routers know where to send it.

4. Link Layer: This is the physical connection. It handles the actual electrical signals or radio waves (Wi-Fi/Ethernet) that move the data between your computer and the router.

Common Mistake to Avoid: Don't confuse the Network Layer with the Link Layer. The Network layer handles where the data is going (IP), while the Link layer handles the physical path (cables/Wi-Fi).

Key Takeaway: The TCP/IP stack ensures data is broken down, addressed correctly, and sent across the physical network reliably.

5. Keeping Things Safe: Firewalls and Proxies

The Internet can be a dangerous place. We use special tools to protect our private networks.

Firewalls

A Firewall acts as a security guard at the gate of your network. It examines every packet of data trying to enter or leave. If a packet doesn't meet certain security rules, the firewall blocks it.

Proxy Servers

A Proxy Server is a "middleman."
• Instead of your computer connecting directly to a website, you connect to the Proxy.
• The Proxy then connects to the website for you.
Why use one? It hides your IP address (privacy) and can "cache" (store) popular websites so they load faster for everyone else on the network.

Analogy: A firewall is like a bouncer at a club checking IDs. A proxy is like asking a friend to go into a shop to buy something for you so the shopkeeper doesn't see who you are.

Key Takeaway: Firewalls block unwanted traffic; Proxies act as an intermediary for privacy and speed.

Final Chapter Summary

1. IP Addresses: IPv4 (32-bit) and IPv6 (128-bit) identify devices.
2. DNS: Converts domain names (words) to IP addresses (numbers).
3. Models: Client-Server is centralized; P2P is decentralized.
4. TCP/IP Stack: Application, Transport, Network, and Link layers work together to move packets.
5. Security: Firewalls filter traffic, and Proxies act as middlemen.

You've reached the end of the Internet chapter notes! Keep practicing these terms, and you'll be an expert in no time.