yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

IP addresses and DNS | Internet 101 | Computer Science | Khan Academy


4m read
·Nov 11, 2024

Hi, my name is Paula, and I am a Software Engineer at Microsoft. Let's talk about how the internet works. My job relies on networks being able to talk with one another, but back in the 1970s, there was no standard method for this. It took the work of Vince Surf and Bob Kong to invent the internetworking protocol to make communication possible. This invention laid the groundwork for what we now call the internet.

The internet is a network of networks. It links billions of devices together all around the globe. So maybe you're connected with a laptop or a phone through Wi-Fi, but then that Wi-Fi connection connects to an internet service provider or ISP. That ISP connects you to billions and billions of devices around the world through hundreds of thousands of networks that are all interconnected.

One thing that most people do not appreciate is that the internet is really a design philosophy and an architecture expressed in a set of protocols. A protocol is a well-known set of rules and standards that, if all parties agree to use, will allow them to communicate without trouble. How the internet actually physically works is less important than the fact that this design philosophy has allowed the internet to adapt and absorb new communication technologies. This is because, in order for a new technology to use the internet in some fashion, it just needs to know which protocols to work with.

All the different devices on the internet have unique addresses. An address on the internet is just a number, similar to a phone number or a sort of street address that's unique to each computer or device at the edge of the network. This is similar to how most homes and businesses have a mailing address. You don't need to know a person to send them a letter in the mail, but you do need to know their address and how to write the address properly so the letter can be carried by the mail system to its destination.

The addressing system for computers on the internet is similar, and it forms part of one of the most important protocols used in internet communication, simply called the Internet Protocol, or IP. A computer's address, then, is called its IP address. Visiting a website is really just your computer asking another computer for information. Your computer sends a message to the other computer's IP address, and it also sends along its origin address so the other computer knows where to send its response.

You may have seen an IP address; it's just a bunch of numbers. These numbers are organized in a hierarchy, just like a home address has a country, a city, a street, and a house number. An IP address has many parts, just like all digital data. Each of these numbers is represented in bits. Traditional IP addresses are 32 bits long, with eight bits for each part of the address. The earlier numbers usually identify the country and regional network of the device. Then come the sub-networks and then finally the address of the specific device.

This version of IP addressing is called IPv4. It was designed in 1973 and widely adopted in the early '80s, and provides for more than 4 billion unique addresses for devices connecting to the internet. But the internet has turned out to be much more popular than even Vince Surf imagined, and 4 billion unique addresses won't be enough. We're now in the middle of a multi-year transition to a longer IP address format called IPv6, which uses 128 bits per address and provides over 340 quattuordecillion unique addresses. That's more than enough for every grain of sand on Earth to have its own IP address.

Most users never see or care about internet addresses. A system called the Domain Name System, or DNS, associates names like www.example.com with the corresponding addresses your computer uses. The DNS helps look up domain names and gets the associated IP address, which is used to connect your computer to the destination on the internet.

And it goes a little something like this:

“Hey, hi there! I want to go to www.code.org.”

“Yeah, I don't know the, uh, the IP address for that domain. Let me ask around. Hey, you know how to get to, uh, code.org?”

“Yeah! I got it right here. It's, uh, 174.12.141.20.”

“Oh, okay, great, thanks! Yeah, I'm going to, I'm going to write that down and save it for later in case I need it.”

“Hey, here's that address you wanted.”

“Awesome! Thank you!”

So how do we design a system for billions of devices to find any one of billions of different websites? There is no way one DNS server can handle all the requests from all devices. The answer is that the DNS servers are connected in a distributed hierarchy and are divided into zones, splitting up responsibility for the major domains such as .org, .doc, .net, etc.

DNS was originally created to be an open and public communication protocol for government and educational institutions. Because of its openness, DNS is susceptible to cyber attacks. An example attack is DNS spoofing; that's when a hacker taps into a DNS server and changes it to match a domain name with the wrong IP address. This lets the attacker send people to an imposter website. If this happens to you, you are vulnerable to more problems because you are using that fake website as if it is real.

The internet is huge and getting bigger every day, but the Domain Name System and Internet Protocol are designed to scale no matter how much the internet grows.

More Articles

View All
3 Reasons Why Nuclear Energy Is Awesome! 3/3
Three reasons why we should continue using nuclear energy. One: nuclear energy saves lives. In 2013, a study conducted by NASA found that nuclear energy has prevented around 1.8 million deaths. Even if you include the death tolls from Chernobyl and Fukus…
Sales pre-PMF should be done by the founders.
If you’re the founder of an early stage startup and you’re building a product that you’re hoping other businesses will buy, you are capable of selling it. That’s the good news. The bad news is that you’re probably the only person capable of selling your p…
Fishing Tips: Maximizing Your Outrigger | Wicked Tuna: Outer Banks
[Applause] [Music] [Applause] Hi, my name is Brittain Shak, and I’m captain of the Dogghouse. One of the things that is pretty vital to, uh, trolling to me, in order to get a spread, to get my bait spread out covering as much of the water column as possi…
How To Talk To Users | Startup School
Foreign [Music] My name is Gustav, and I work here at Y Combinator as a group partner. I’ve been here since 2017. Before YC, I was a practically to Airbnb and actually a YC founder back in 2007. Today, I’m going to talk about how to talk to your users an…
Dividing quadratics by linear expressions with remainders | Algebra 2 | Khan Academy
So if you’ve been watching these videos, you know that we have a lot of scenarios where people seem to be walking up to us on the street and asking us to do math problems, and I guess this will be no different. So let’s say someone walks up to you on the…
Brave New Words - Supt. Buffington, PhD, Tim Krieg, PhD, & Sal Khan
Hi everyone, s here from KH Academy and as some of you all know, I have released my second book, Brave New Words, about the future of AI in education and work. It’s available wherever you might buy your books. But as part of the research for that book, I …