yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

IP addresses and DNS | Internet 101 | Computer Science | Khan Academy


4m read
·Nov 11, 2024

Hi, my name is Paula, and I am a Software Engineer at Microsoft. Let's talk about how the internet works. My job relies on networks being able to talk with one another, but back in the 1970s, there was no standard method for this. It took the work of Vince Surf and Bob Kong to invent the internetworking protocol to make communication possible. This invention laid the groundwork for what we now call the internet.

The internet is a network of networks. It links billions of devices together all around the globe. So maybe you're connected with a laptop or a phone through Wi-Fi, but then that Wi-Fi connection connects to an internet service provider or ISP. That ISP connects you to billions and billions of devices around the world through hundreds of thousands of networks that are all interconnected.

One thing that most people do not appreciate is that the internet is really a design philosophy and an architecture expressed in a set of protocols. A protocol is a well-known set of rules and standards that, if all parties agree to use, will allow them to communicate without trouble. How the internet actually physically works is less important than the fact that this design philosophy has allowed the internet to adapt and absorb new communication technologies. This is because, in order for a new technology to use the internet in some fashion, it just needs to know which protocols to work with.

All the different devices on the internet have unique addresses. An address on the internet is just a number, similar to a phone number or a sort of street address that's unique to each computer or device at the edge of the network. This is similar to how most homes and businesses have a mailing address. You don't need to know a person to send them a letter in the mail, but you do need to know their address and how to write the address properly so the letter can be carried by the mail system to its destination.

The addressing system for computers on the internet is similar, and it forms part of one of the most important protocols used in internet communication, simply called the Internet Protocol, or IP. A computer's address, then, is called its IP address. Visiting a website is really just your computer asking another computer for information. Your computer sends a message to the other computer's IP address, and it also sends along its origin address so the other computer knows where to send its response.

You may have seen an IP address; it's just a bunch of numbers. These numbers are organized in a hierarchy, just like a home address has a country, a city, a street, and a house number. An IP address has many parts, just like all digital data. Each of these numbers is represented in bits. Traditional IP addresses are 32 bits long, with eight bits for each part of the address. The earlier numbers usually identify the country and regional network of the device. Then come the sub-networks and then finally the address of the specific device.

This version of IP addressing is called IPv4. It was designed in 1973 and widely adopted in the early '80s, and provides for more than 4 billion unique addresses for devices connecting to the internet. But the internet has turned out to be much more popular than even Vince Surf imagined, and 4 billion unique addresses won't be enough. We're now in the middle of a multi-year transition to a longer IP address format called IPv6, which uses 128 bits per address and provides over 340 quattuordecillion unique addresses. That's more than enough for every grain of sand on Earth to have its own IP address.

Most users never see or care about internet addresses. A system called the Domain Name System, or DNS, associates names like www.example.com with the corresponding addresses your computer uses. The DNS helps look up domain names and gets the associated IP address, which is used to connect your computer to the destination on the internet.

And it goes a little something like this:

“Hey, hi there! I want to go to www.code.org.”

“Yeah, I don't know the, uh, the IP address for that domain. Let me ask around. Hey, you know how to get to, uh, code.org?”

“Yeah! I got it right here. It's, uh, 174.12.141.20.”

“Oh, okay, great, thanks! Yeah, I'm going to, I'm going to write that down and save it for later in case I need it.”

“Hey, here's that address you wanted.”

“Awesome! Thank you!”

So how do we design a system for billions of devices to find any one of billions of different websites? There is no way one DNS server can handle all the requests from all devices. The answer is that the DNS servers are connected in a distributed hierarchy and are divided into zones, splitting up responsibility for the major domains such as .org, .doc, .net, etc.

DNS was originally created to be an open and public communication protocol for government and educational institutions. Because of its openness, DNS is susceptible to cyber attacks. An example attack is DNS spoofing; that's when a hacker taps into a DNS server and changes it to match a domain name with the wrong IP address. This lets the attacker send people to an imposter website. If this happens to you, you are vulnerable to more problems because you are using that fake website as if it is real.

The internet is huge and getting bigger every day, but the Domain Name System and Internet Protocol are designed to scale no matter how much the internet grows.

More Articles

View All
THE POWER OF YOUR GUT INSTINCT AND HOW TO USE IT | STOICISM INSIGHTS
Welcome back to Stoicism Insights, where we embark on a journey of self-discovery and wisdom. Today we’re delving into the depths of intuition and Stoic philosophy, uncovering secrets that will transform the way you navigate life’s challenges. Join me as …
Living a Life on Ice | Continent 7: Antarctica
Visibility’s dance a 15 or 20. Lisa’s this: if a man says lying, smile! And when you dress or just hit hunky Dan and white until we’ve brought a good clearance in the weather, it’s you could move. We’ll touch base in sorrow. All right, I’m Tom Arnold. I’…
Determining if a function is invertible | Mathematics III | High School Math | Khan Academy
[Voiceover] “F is a finite function whose domain is the letters a to e. The following table lists the output for each input in f’s domain.” So if x is equal to a, then if we input a into our function, then we output -6. f of a is -6. We input b, we get …
Curvature formula, part 3
So continuing on with where we were in the last video, um, we’re looking for this unit tangent vector function given the parameterization. So the specific example that I have is a function that parameterizes a circle with radius capital R, but I also kin…
Bill Ackman on Starting His Own Hedge Fund at 26 and Activist Investing
To put this in context, you were mid-20s and I had just gotten—I just started as a rookie professor two years before. So, Bill, at the time, was trying to set up an interesting business, which ultimately became Gotham Partners. So, for those of you who ar…
Making a house out of mud bricks. (Real life minecraft) - Smarter Every Day 18
Here are Smarter Every Day, we’ve decided to change the format and make learning very very serious. And by serious I mean… [Thump, splash] - Seriously awesome! [Crowd yells] [Crowd laughs] (Destin) Alright, today we’re gonna learn about mud in Africa. Th…