Internet.
Publié le 11/05/2013
Extrait du document
«
usually pays a fixed monthly fee for a dedicated connection.
In exchange, the company providing the connection agrees to relay data between the user’s computer andthe Internet.
Dial-up is the least expensive access technology, but it is also the least convenient.
To use dial-up access, a subscriber must have a telephone modem, a device thatconnects a computer to the telephone system and is capable of converting data into sounds and sounds back into data.
The user’s ISP provides software that controlsthe modem.
To access the Internet, the user opens the software application, which causes the dial-up modem to place a telephone call to the ISP.
A modem at the ISPanswers the call, and the two modems use audible tones to send data in both directions.
When one of the modems is given data to send, the modem converts the datafrom the digital values used by computers—numbers stored as a sequence of 1s and 0s—into tones.
The receiving side converts the tones back into digital values.Unlike dedicated access technologies, a dial-up modem does not use separate frequencies, so the telephone line cannot be used for regular telephone calls at the sametime a dial-up modem is sending data.
B How Information Travels Over the Internet
All information is transmitted across the Internet in small units of data called packets.
Software on the sending computer divides a large document into many packetsfor transmission; software on the receiving computer regroups incoming packets into the original document.
Similar to a postcard, each packet has two parts: a packetheader specifying the computer to which the packet should be delivered, and a packet payload containing the data being sent.
The header also specifies how the data inthe packet should be combined with the data in other packets by recording which piece of a document is contained in the packet.
A series of rules known as computer communication protocols specify how packet headers are formed and how packets are processed.
The set of protocols used for theInternet is named TCP/IP after the two most important protocols in the set: the Transmission Control Protocol and the Internet Protocol.
TCP/IP protocols enable theInternet to automatically detect and correct transmission problems.
For example, if any network or device malfunctions, protocols detect the failure and automaticallyfind an alternative path for packets in order to avoid the malfunction.
Protocol software also ensures that data arrives complete and intact.
If any packets are missing ordamaged, protocol software on the receiving computer requests that the source resend them.
Only when the data has arrived correctly does the protocol softwaremake it available to the receiving application program, and therefore to the user.
Hardware devices that connect networks in the Internet are called IP routers because they follow the IP protocol when forwarding packets.
A router examines theheader in each packet that arrives to determine the packet’s destination.
The router either delivers the packet to the destination computer across a local network orforwards the packet to another router that is closer to the final destination.
Thus, a packet travels from router to router as it passes through the Internet.
In somecases, a router can deliver packets across a local area wireless network, allowing desktop and laptop computers to access the Internet without the use of cables orwires.
Today’s business and home wireless local area networks (LANs), which operate according to a family of wireless protocols known as Wi-Fi, are fast enough todeliver Internet feeds as quickly as wired LANs.
Increasingly, cell phone and handheld computer users are also accessing the Internet through wireless cellular telephone networks.
Such wide area wireless access ismuch slower than high-capacity dedicated, or broadband, access, or dial-up access.
Also, handheld devices, equipped with much smaller screens and displays, are moredifficult to use than full-sized computers.
But with wide area wireless, users can access the Internet on the go and in places where access is otherwise impossible.Telephone companies are currently developing so-called 3G—for “third generation”—cellular networks that will provide wide area Internet access at DSL-like speeds.
See also Wireless Communications.
C Network Names and Addresses
To be connected to the Internet, a computer must be assigned a unique number, known as its IP (Internet Protocol) address.
Each packet sent over the Internetcontains the IP address of the computer to which it is being sent.
Intermediate routers use the address to determine how to forward the packet.
Users almost neverneed to enter or view IP addresses directly.
Instead, to make it easier for users, each computer is also assigned a domain name; protocol software automaticallytranslates domain names into IP addresses.
See also Domain Name System.
Users encounter domain names when they use applications such as the World Wide Web.
Each page of information on the Web is assigned a URL (Uniform ResourceLocator) that includes the domain name of the computer on which the page is located.
Other items in the URL give further details about the page.
For example, thestring http specifies that a browser should use the http protocol, one of many TCP/IP protocols, to fetch the item.
D Client/Server Architecture
Internet applications, such as the Web, are based on the concept of client/server architecture.
In a client/server architecture, some application programs act asinformation providers (servers), while other application programs act as information receivers (clients).
The client/server architecture is not one-to-one.
That is, a singleclient can access many different servers, and a single server can be accessed by a number of different clients.
Usually, a user runs a client application, such as a Webbrowser, that contacts one server at a time to obtain information.
Because it only needs to access one server at a time, client software can run on almost any computer,including small handheld devices such as personal organizers and cellular telephones.
To supply information to others, a computer must run a server application.Although server software can run on any computer, most companies choose large, powerful computers to run server software because the company expects manyclients to be in contact with its server at any given time.
A faster computer enables the server program to return information with less delay.
E Electronic Mail
Electronic mail, or e-mail, is a widely used Internet application that enables individuals or groups of individuals to quickly exchange messages, even if they are separatedby long distances.
A user creates an e-mail message and specifies a recipient using an e-mail address, which is a string consisting of the recipient’s login name followedby an @ (at) sign and then a domain name.
E-mail software transfers the message across the Internet to the recipient’s computer, where it is placed in the specifiedmailbox, a file on the hard drive.
The recipient uses an e-mail application to view and reply to the message, as well as to save or delete it.
Because e-mail is aconvenient and inexpensive form of communication, it has dramatically improved personal and business communications.
In its original form, e-mail could only be sent to recipients named by the sender, and only text messages could be sent.
E-mail has been extended in two ways, and isnow a much more powerful tool.
Software has been invented that can automatically propagate to multiple recipients a message sent to a single address.
Known as amail gateway or list server, such software allows individuals to join or leave a mail list at any time.
Such software can be used to create lists of individuals who willreceive announcements about a product or service or to create online discussion groups.
E-mail software has also been extended to allow the transfer of nontext documents, such as photographs and other images, executable computer programs, andprerecorded audio.
Such documents, appended to an e-mail message, are called attachments.
The standard used for encoding attachments is known as MultipurposeInternet Mail Extensions (MIME).
Because the Internet e-mail system only transfers printable text, MIME software encodes each document using printable letters anddigits before sending it and then decodes the item when e-mail arrives.
Most significantly, MIME allows a single message to contain multiple items, enabling a sender to.
»
↓↓↓ APERÇU DU DOCUMENT ↓↓↓
Liens utiles
- L'information à l'heure d'Internet
- Internet et réseaux sociaux
- Danger d'internet
- Internet, nous relie ou nous isole ?
- Communiquons-nous mieux avec internet et les réseaux sociaux ?