Welcome to crazydating.net
Web Hosting - The Internet and How It Works
In one sense, detailing the statement in the title would require at least a book. In another sense, it can't be fully explained at all, since there's no central authority that designs or implements the highly distributed entity called The Internet.
But the basics can certainly be outlined, simply and briefly. And it's in the interest of any novice web site owner to have some idea of how their tree fits into that gigantic forest, full of complex paths, that is called the Internet.
The analogy to a forest is not far off. Every computer is a single plant, sometimes a little bush sometimes a mighty tree. A percentage, to be sure, are weeds we could do without. In networking terminology, the individual plants are called 'nodes' and each one has a domain name and IP address. Connecting those nodes are paths.
The Internet, taken in total, is just the collection of all those plants and the pieces that allow for their interconnections - all the nodes and the paths between them.
Servers and clients (desktop computers, laptops, PDAs, cell phones and more) make up the most visible parts of the Internet. They store information and programs that make the data accessible. But behind the scenes there are vitally important components - both hardware and software - that make the entire mesh possible and useful.
Though there's no single central authority, database, or computer that creates the World Wide Web, it's nonetheless true that not all computers are equal. There is a hierarchy. That hierarchy starts with a tree with many branches: the domain system.
Designators like .com, .net, .org, and so forth are familiar to everyone now. Those basic names are stored inside a relatively small number of specialized systems maintained by a few non-profit organizations. They form something called the TLD, the Top Level Domains. From there, company networks and others form what are called the Second Level Domains, such as Microsoft.com.
That's further sub-divided into www.Microsoft.com which is, technically, a sub-domain but is sometimes mis-named 'a host' or a domain. A host is the name for one specific computer. That host name may or may not be, for example, 'www' and usually isn't. The domain is the name without the 'www' in front. Finally, at the bottom of the pyramid, are the individual hosts (usually servers) that provide actual information and the means to share it.
Those hosts (along with other hardware and software that enable communication, such as routers) form a network. The set of all those networks taken together is the physical aspect of the Internet.
There are less obvious aspects, too, that are essential. When you click on a URL (Uniform Resource Locator, such as http://www.microsoft.com) on a web page, your browser sends a request through the Internet to connect and get data. That request, and the data that is returned from the request, is divided up into packets (chunks of data wrapped in routing and control information).
That's one of the reasons you will often see your web page getting painted on the screen one section at a time. When the packets take too long to get where they're supposed to go, that's a 'timeout'. Suppose you request a set of names that are stored in a database. Those names, let's suppose get stored in order. But the packets they get shoved into for delivery can arrive at your computer in any order. They're then reassembled and displayed.
All those packets can be directed to the proper place because they're associated with a specified IP address, a numeric identifier that designates a host (a computer that 'hosts' data). But those numbers are hard to remember and work with, so names are layered on top, the so-called domain names we started out discussing.
Imagine the postal system (the Internet). Each home (domain name) has an address (IP address). Those who live in them (programs) send and receive letters (packets). The letters contain news (database data, email messages, images) that's of interest to the residents.
The Internet is very much the same.
Events of copyright infringement The Events of Copyright Infringement: Innocent People Infringing Accidentally Copyright infringement is in the news a lot lately – it’s hard to miss stories about kids being carted off to jail or seriously fined for downloading music or movies off the internet. I’ve even heard about a lady was fined for tens of thousands of dollars because of the events of copyright infringement – her grandson downloading music, and she couldn’t prove it wasn’t her. The events of copyright infringement are complicated – and not easy to define. Surfing the internet has its advantages and disadvantages, that’s for sure. We’re able to find useful information quickly, but how close are we pertaining to copyright laws? Do we even know what is and is not acceptable? A couple of the more pertinent questions have been asked below: If you hear a great new band, and then download a song from MySpace, is that legal or not? The events of copyright infringement are not only limited by Kazaa, Morpheus, or some other file sharing peer to peer (P2P) service. If you download a song - no matter if you’re on a website or a MySpace page - and it isn’t coming from the artist themselves, you may want to think about downloading it. Chances are, if it’s not coming from them, you can’t have it – unless it is under a Creative Commons License. Creative Commons gives the exact ways in which you can use the license – and many times those are completely free and legal to download – so make sure you check if it’s under a CC License. If I’m writing a paper, or article, and I want to quote another website, can I? First of all, did you know the minute you write or create something, you hold the copyright to it? ESPECIALLY if you’re writing it online – it’s very easy to track things in the internet page. So, if you’re writing a blog, all the things you’ve written (no matter good or bad) are there permanently, thanks to archive.org, and you can review last versions of your web pages. Sometimes, people we can use – rather heavily – someone else’s work in our own, and think we’re small and anonymous. That no one will notice by the time you get it down – you’re just ‘borrowing’ it. Before you begin quoting anyone’s website – from CNN to your local neighborhood hardware store – you need to ask the person who holds the copyright if you can. Usually, they’ll let you if you attribute to them. Depending who you talk to, you’ll either have to pay royalties or license rights to republish. If you don’t ask before you quote, you’re beginning the events of copyright infringement and you are opening yourself up for a lawsuit. As you can see, the events of copyright infringement can begin at any time, beginning with normal ‘everyday’ activities. It’s just as easy to infringe on as it is to be infringed upon. Make sure you check your copyright using CopyScape or some other service, and you can check your work against other works on the internet, and make sure that you’re not infringing someone or vice versa. In this day it’s easy to protect yourself from getting infringed upon, and the events of copyright infringement are easy to track. It’s easy for innocent people to get caught in copyright infringement, like children they didn’t know what they could and couldn’t do. Make sure, in all you do, that you’re striving to do the best you can, and you’ll be certain not to fall victim to your own infringing demons. Check Download.com for the Best Free Security Software Around With viruses, spyware, adware and hackers threatening on every corner of the internet, it is essential that especially internet users protect their PCs as best as they can to not loose their files or even their whole PC. Buying security software at a local computer store can be very expensive, but protecting the PC does not necessarily have to cost private persons anything at all. Just by checking what for example download.com has available, computer users might be able to save as much as 50-100 Dollars and still be able to protect their PCs adequately. One part of the web page called antivirus, firewall and spyware offers different links to downloads from companies that help protect PCs from any harm. Most of the programs offered on the web page are free for download. Some of the programs are antivirus software, which generally will scan the PC according to your settings for example once a day. When the software finds a virus in any of the files on the PC it will put out a virus alarm in form of a message box. The PC users then have to decide in which way the PC should be cleaned. Some antivirus software will offer to delete the file, others save it in what is called a virus vault, where the virus cannot attack other files on the PC, while others clean the file if it is cleanable. Other programs offered on the page are firewalls. Firewalls protect the Pc from any attacks form the internet, such as hackers hacking into your PC, Trojan horses, viruses and more entering the PC is not possible, when a firewall is used and set to the proper security setting. Using a firewall is a good idea for any PC, but it is important to know that the way the firewall works it might also cause a few problems with software on the Pc that enters the Internet. Therefore firewalls need to be configured right to have a smooth running and protected PC. Many of the firewalls offered on this page are free for download, but generally most PCs have a built in firewall in their operating system that just needs to be activated or configured. The third major kind of protection software one can download form this website is spy or ad-aware detection. Spy and ad-aware are programs that are malicious for the PC user. These kind of malicious little programs are installed without the users proper knowledge and intercept or partially take control of the interactions of the PC with the internet without the users consent. Spywares do not just monitor the internet interactions, as the name suggests, it also collects personal information, can install additional software that will take over the control of the browser activity, accessing websites that will allow for example viruses to enter the PC. Spyware is also often called privacy-invasive software and something a PC as well as a user needs to be protected from. The download page does not only offer many of these programs for free, it will also offer patches and update files for these programs. Even though many of the companies offer the continuous automatic update to protect a PC from new viruses and other malware, some PC users prefer not to have an automatic update and download their own updates whenever they deem necessary. Whichever way one likes to update the PC, it is most important of all to know that PCs need to be protected and users do not need to spend tons of money in order to do so. Free programs available for download on download.com will give a PC similar protection and keep files and identity safe. |