yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

IP addresses and DNS | Internet 101 | Computer Science | Khan Academy


4m read
·Nov 11, 2024

Hi, my name is Paula, and I am a Software Engineer at Microsoft. Let's talk about how the internet works. My job relies on networks being able to talk with one another, but back in the 1970s, there was no standard method for this. It took the work of Vince Surf and Bob Kong to invent the internetworking protocol to make communication possible. This invention laid the groundwork for what we now call the internet.

The internet is a network of networks. It links billions of devices together all around the globe. So maybe you're connected with a laptop or a phone through Wi-Fi, but then that Wi-Fi connection connects to an internet service provider or ISP. That ISP connects you to billions and billions of devices around the world through hundreds of thousands of networks that are all interconnected.

One thing that most people do not appreciate is that the internet is really a design philosophy and an architecture expressed in a set of protocols. A protocol is a well-known set of rules and standards that, if all parties agree to use, will allow them to communicate without trouble. How the internet actually physically works is less important than the fact that this design philosophy has allowed the internet to adapt and absorb new communication technologies. This is because, in order for a new technology to use the internet in some fashion, it just needs to know which protocols to work with.

All the different devices on the internet have unique addresses. An address on the internet is just a number, similar to a phone number or a sort of street address that's unique to each computer or device at the edge of the network. This is similar to how most homes and businesses have a mailing address. You don't need to know a person to send them a letter in the mail, but you do need to know their address and how to write the address properly so the letter can be carried by the mail system to its destination.

The addressing system for computers on the internet is similar, and it forms part of one of the most important protocols used in internet communication, simply called the Internet Protocol, or IP. A computer's address, then, is called its IP address. Visiting a website is really just your computer asking another computer for information. Your computer sends a message to the other computer's IP address, and it also sends along its origin address so the other computer knows where to send its response.

You may have seen an IP address; it's just a bunch of numbers. These numbers are organized in a hierarchy, just like a home address has a country, a city, a street, and a house number. An IP address has many parts, just like all digital data. Each of these numbers is represented in bits. Traditional IP addresses are 32 bits long, with eight bits for each part of the address. The earlier numbers usually identify the country and regional network of the device. Then come the sub-networks and then finally the address of the specific device.

This version of IP addressing is called IPv4. It was designed in 1973 and widely adopted in the early '80s, and provides for more than 4 billion unique addresses for devices connecting to the internet. But the internet has turned out to be much more popular than even Vince Surf imagined, and 4 billion unique addresses won't be enough. We're now in the middle of a multi-year transition to a longer IP address format called IPv6, which uses 128 bits per address and provides over 340 quattuordecillion unique addresses. That's more than enough for every grain of sand on Earth to have its own IP address.

Most users never see or care about internet addresses. A system called the Domain Name System, or DNS, associates names like www.example.com with the corresponding addresses your computer uses. The DNS helps look up domain names and gets the associated IP address, which is used to connect your computer to the destination on the internet.

And it goes a little something like this:

“Hey, hi there! I want to go to www.code.org.”

“Yeah, I don't know the, uh, the IP address for that domain. Let me ask around. Hey, you know how to get to, uh, code.org?”

“Yeah! I got it right here. It's, uh, 174.12.141.20.”

“Oh, okay, great, thanks! Yeah, I'm going to, I'm going to write that down and save it for later in case I need it.”

“Hey, here's that address you wanted.”

“Awesome! Thank you!”

So how do we design a system for billions of devices to find any one of billions of different websites? There is no way one DNS server can handle all the requests from all devices. The answer is that the DNS servers are connected in a distributed hierarchy and are divided into zones, splitting up responsibility for the major domains such as .org, .doc, .net, etc.

DNS was originally created to be an open and public communication protocol for government and educational institutions. Because of its openness, DNS is susceptible to cyber attacks. An example attack is DNS spoofing; that's when a hacker taps into a DNS server and changes it to match a domain name with the wrong IP address. This lets the attacker send people to an imposter website. If this happens to you, you are vulnerable to more problems because you are using that fake website as if it is real.

The internet is huge and getting bigger every day, but the Domain Name System and Internet Protocol are designed to scale no matter how much the internet grows.

More Articles

View All
Crypto Will Be The 12th Sector of The S&P! | Bitcoin 2022
[Music] It’s pretty chaotic here on the first day because nobody knows where to go. There’s 50,000 people showing. The first day probably about 250,000 by the time this is over, and it’s really going to be big this year because there’s so many institution…
Exclude | Vocabulary | Khan Academy
Hey wordsmiths! I would never dare leave you feeling left out, so I want to warn you that the word we’re discussing in this video is “exclude.” Exclude is a verb; it means to keep someone or something out, to prevent access. It can have a bad connotation …
Into the Wilderness: Trapping a Wolf | Life Below Zero
♪ [Ricko] We have to hunt and kill to survive. Just like the animals out here. ♪ ♪ ♪ ♪ Most likely the wolves came along and hamstringed it, or they’re right around here somewhere. I’m traveling along with my snow machine, looking for a place to do some w…
Comparing animal and plant cells | Cells and organisms | Middle school biology | Khan Academy
So, let’s play a game of spot the difference. Now, if you were asked to spot the difference between these two pictures, you’d probably laugh and say that’s too easy because it’s obvious that this picture of a lion on the left is nowhere close to looking …
THE JUMP BATTLE!!!
Dude, I got an idea! I challenged you to a jump off. A jump off? What the heck’s a jump off? There’s not much to it! Watch this. The [Music] bucket. Is that all there is to a jump off? Wheelbarrow! Yeah, you think you’re something? How about this? Two …
Sam Altman's Whale AMA
The best thing from I learned from program is how to start a startup. I think it’s one of the biggest superpowers in the world today. Before I met Paul, I thought it was impossible. Now I think it’s really hard, but still possible. I hope to teach other p…