yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

IP addresses and DNS | Internet 101 | Computer Science | Khan Academy


4m read
·Nov 11, 2024

Hi, my name is Paula, and I am a Software Engineer at Microsoft. Let's talk about how the internet works. My job relies on networks being able to talk with one another, but back in the 1970s, there was no standard method for this. It took the work of Vince Surf and Bob Kong to invent the internetworking protocol to make communication possible. This invention laid the groundwork for what we now call the internet.

The internet is a network of networks. It links billions of devices together all around the globe. So maybe you're connected with a laptop or a phone through Wi-Fi, but then that Wi-Fi connection connects to an internet service provider or ISP. That ISP connects you to billions and billions of devices around the world through hundreds of thousands of networks that are all interconnected.

One thing that most people do not appreciate is that the internet is really a design philosophy and an architecture expressed in a set of protocols. A protocol is a well-known set of rules and standards that, if all parties agree to use, will allow them to communicate without trouble. How the internet actually physically works is less important than the fact that this design philosophy has allowed the internet to adapt and absorb new communication technologies. This is because, in order for a new technology to use the internet in some fashion, it just needs to know which protocols to work with.

All the different devices on the internet have unique addresses. An address on the internet is just a number, similar to a phone number or a sort of street address that's unique to each computer or device at the edge of the network. This is similar to how most homes and businesses have a mailing address. You don't need to know a person to send them a letter in the mail, but you do need to know their address and how to write the address properly so the letter can be carried by the mail system to its destination.

The addressing system for computers on the internet is similar, and it forms part of one of the most important protocols used in internet communication, simply called the Internet Protocol, or IP. A computer's address, then, is called its IP address. Visiting a website is really just your computer asking another computer for information. Your computer sends a message to the other computer's IP address, and it also sends along its origin address so the other computer knows where to send its response.

You may have seen an IP address; it's just a bunch of numbers. These numbers are organized in a hierarchy, just like a home address has a country, a city, a street, and a house number. An IP address has many parts, just like all digital data. Each of these numbers is represented in bits. Traditional IP addresses are 32 bits long, with eight bits for each part of the address. The earlier numbers usually identify the country and regional network of the device. Then come the sub-networks and then finally the address of the specific device.

This version of IP addressing is called IPv4. It was designed in 1973 and widely adopted in the early '80s, and provides for more than 4 billion unique addresses for devices connecting to the internet. But the internet has turned out to be much more popular than even Vince Surf imagined, and 4 billion unique addresses won't be enough. We're now in the middle of a multi-year transition to a longer IP address format called IPv6, which uses 128 bits per address and provides over 340 quattuordecillion unique addresses. That's more than enough for every grain of sand on Earth to have its own IP address.

Most users never see or care about internet addresses. A system called the Domain Name System, or DNS, associates names like www.example.com with the corresponding addresses your computer uses. The DNS helps look up domain names and gets the associated IP address, which is used to connect your computer to the destination on the internet.

And it goes a little something like this:

“Hey, hi there! I want to go to www.code.org.”

“Yeah, I don't know the, uh, the IP address for that domain. Let me ask around. Hey, you know how to get to, uh, code.org?”

“Yeah! I got it right here. It's, uh, 174.12.141.20.”

“Oh, okay, great, thanks! Yeah, I'm going to, I'm going to write that down and save it for later in case I need it.”

“Hey, here's that address you wanted.”

“Awesome! Thank you!”

So how do we design a system for billions of devices to find any one of billions of different websites? There is no way one DNS server can handle all the requests from all devices. The answer is that the DNS servers are connected in a distributed hierarchy and are divided into zones, splitting up responsibility for the major domains such as .org, .doc, .net, etc.

DNS was originally created to be an open and public communication protocol for government and educational institutions. Because of its openness, DNS is susceptible to cyber attacks. An example attack is DNS spoofing; that's when a hacker taps into a DNS server and changes it to match a domain name with the wrong IP address. This lets the attacker send people to an imposter website. If this happens to you, you are vulnerable to more problems because you are using that fake website as if it is real.

The internet is huge and getting bigger every day, but the Domain Name System and Internet Protocol are designed to scale no matter how much the internet grows.

More Articles

View All
Worked example: Calculating mass percent | AP Chemistry | Khan Academy
So right over here, I have the molecular formula for glucose. And so let’s just say that I had a sample of pure glucose right over here. This is my little pile of glucose. I’m not even going to tell you its mass, but based on the molecular formula, can yo…
How Hidden Technology Transformed Bowling
A portion of this video was sponsored by Salesforce. This is the biggest, most in-depth video about bowling ever. How bowling balls are made, the best way to throw them, maximize strikes, how the lanes are oiled, what it takes to be a pro, and how this sp…
Conditions for valid confidence intervals | Confidence intervals | AP Statistics | Khan Academy
What we’re going to do in this video is dig a little bit deeper into confidence intervals. In other videos, we compute them; we even interpret them. But here we’re going to make sure that we are making the right assumptions so that we can have confidence …
Defending Marine Wildlife | Explorer
NARRATOR: It’s the Sam Simon and its crew that are confronting the issues here head on. Of course, their day was a bit frustrating when you see this overwhelming amount of nets that’s out there, that there’s still the fishermen going out and laying more n…
Trying to Forget | Badlands, Texas
Most of this little town here we call Terlingua is a large area, but we’re like family, you know? We grew up together. The trial and what transpired before it, the Jers, they don’t see that because they didn’t have any interaction like we did. So that’s w…
The View From Above | Stoic Exercises For Inner Peace
It’s funny to look at ourselves and see how we quarrel about the smallest things. Like the behavior of an annoying coworker during a meeting or the person who cuts us off in traffic. From my own experience, it’s very easy to get dragged along by a minor e…