Page 44 - Computing Book 7
P. 44
All About Cloud Class 7
3. The ISP server forwards the request to the country’s gateway. After receiving the user
request, the ISP transmits the following information to the country’s gateway:
• Web Page Request • User ID
• IP Address • ISP ID
4. The country gateway then searches a huge database of Internet addresses and finds the host
server which holds the required website, then sends that host server a request for the page.
The country gateway then transmits the following information to the centralized Internet
database.
• Web Page Request • User ID • IP Address
• ISP ID • Gateway ID
5. The host server sends the requested page back to the country gateway and similarly, the
country gateway sends the page back to the concerned ISP server.
6. Your ISP sends the page to your browser and you see it displayed on your screen.
Internet Functions:
The Internet is a worldwide network of computers linked together by telephone wires, satellite links
and other means. All computers on the Internet can be divided into two categories: servers and
browsers.
Servers are where most of the information on the Internet "lives". These are specialized computers
which store information, share information with other servers, and make this information available
to the general public.
ISP servers receive requests from browsers to view web pages, check email, etc. As each server
cannot hold all the information from the entire Internet, so in order to provide browsers with the
pages and files they ask for, ISP servers must connect to other Internet servers. This brings us to the
next common type of server: the "Host Server".
Communication Links:
The following communication links may be used to connect the ISP from a PC user:
1. Dialup connection
2. DSL Connection
3. Cable Net (Coaxial Cable)
4. Fibre-Optic
5. Satellite Links
Data and Network Security (WEP, WPA, WPA2)
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3
(WPA3) are three security protocols and security certification programs developed by the Wi-Fi
Alliance to secure wireless computer networks.
Different types of wireless security protocols were developed for home wireless networks
protection. Not only do the wireless security protocols prevent unwanted parties from connecting to
your wireless network, but also encrypt your private data sent over the airwaves.
The City School/Academics/Computing Curriculum/Class7/2020-2021 Page 43 of 95

