You Press 'Enter' on the Browser: What happens when..., #1
()
About this ebook
"What happens when...™" series explains the sequence of events that occur and some of the reasoning behind it. This first book in the series "you press the 'enter' key, de scribes from a software engineer's point of view, the steps in processing a request for a webpage, movie video, email, or photo gallery from the internet. This is book pro vides a concise but detailed explanation of the events from how the keyboard operates, how the operating system processes the keyboard input, how the request is constructed, how the request is routed through the internet, and a quick summary of what happens at the server side. A brief discussion of cybersecurity concerns and a brief discussion of networking is included.
Related to You Press 'Enter' on the Browser
Titles in the series (1)
You Press 'Enter' on the Browser: What happens when..., #1 Rating: 0 out of 5 stars0 ratings
Related ebooks
Computer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5Network Engineering - The Essential Handbook Rating: 0 out of 5 stars0 ratingsTop Networking Terms You Should Know Rating: 0 out of 5 stars0 ratingsSerial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems Rating: 4 out of 5 stars4/5Dictionary of Computing Rating: 0 out of 5 stars0 ratingsComputer for Kids: A Comprehensive Guide Rating: 0 out of 5 stars0 ratingsEmbedded Ethernet and Internet Complete Rating: 4 out of 5 stars4/5Human VS computer: World wide education (WWE) Rating: 0 out of 5 stars0 ratingsDigital Electronics, Computer Architecture and Microprocessor Design Principles Rating: 0 out of 5 stars0 ratingsGet Smart - Learn About Computers Rating: 0 out of 5 stars0 ratingsComputer for Kids: History of Computer Rating: 0 out of 5 stars0 ratingsNetwork Security Rating: 0 out of 5 stars0 ratingsWho Rules the Net?: Internet Governance and Jurisdiction Rating: 0 out of 5 stars0 ratingsThe Ultimate Guide to Mastering Technology Rating: 0 out of 5 stars0 ratingsComputer systems and networking for beginners Rating: 0 out of 5 stars0 ratings“Information Systems Unraveled: Exploring the Core Concepts”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsProfound Linux For Users Rating: 0 out of 5 stars0 ratingsHacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis Rating: 0 out of 5 stars0 ratingsProjects with IOTA Rating: 0 out of 5 stars0 ratingsComputer Knowledge Guide For All Competitive Exams Rating: 3 out of 5 stars3/5CompTIA Network+ (N10-009) Study Guide: Comprehensive Exam Preparation and Key Concepts for Network Professionals Rating: 0 out of 5 stars0 ratingsThe complete guide to Hardware Technician Terminology: A simplified guide Rating: 0 out of 5 stars0 ratingsESP32 Programming for the Internet of Things: JavaScript, AJAX, MQTT and WebSockets Solutions Rating: 5 out of 5 stars5/5CCNA Interview Questions You'll Most Likely Be Asked Rating: 0 out of 5 stars0 ratingsSteps to Technology: Terms and Concepts For Beginners Rating: 0 out of 5 stars0 ratingsEdge Computing: A Comprehensive Guide to Harnessing the Power of Edge Technology Rating: 0 out of 5 stars0 ratings
Internet & Web For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsThe $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Surveillance and Surveillance Detection: A CIA Insider's Guide Rating: 3 out of 5 stars3/5Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5JavaScript All-in-One For Dummies Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5Duly Noted: Extend Your Mind through Connected Notes Rating: 0 out of 5 stars0 ratingsBeginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratings
Reviews for You Press 'Enter' on the Browser
0 ratings0 reviews
Book preview
You Press 'Enter' on the Browser - Dustin W. Morris
I
The Hardware
Software gets slower faster than hardware gets faster.
– Niklaus Wirth
A
nd the magic begins, when we press the enter
key.
The keyboard consists of the following critical components:
• domed key sheet
• top conductive sheet
• middle spacer sheet
• bottom conductive sheet
• circuit card
The top sheet has twelve conductive traces and the bottom sheet has eleven conductive traces printed on it (11*12 = 132 keys). The middle sheet separates the top and bottom conductive sheets so that when a key is press they make contact. The circuit card provides 3 volts of power to the bottom sheet. When a key is pressed, the rubber domed key sheet presses the top sheet between the spacer sheet and makes contact to the 3 volts on the bottom sheet. The circuit is complete and the power flows to the microprocessor on the circuit card of the keyboard.[3]
For example, when R
is pressed the bottom sheet trace 3 applies voltage to the top sheet trace 2. Every 65 ms, one of the bottom sheet traces is turned off. The microprocessor will see a pulsing every 65 ms on the key the trace that is pushed. The correlation between the bottom
bottom sheet
Figure I.1: Keyboard Matrix
circuit pulse and the top circuit pulse uniquely identify the key that is pressed.
The keyboard’s microprocessor converts the signal to a scan code that the computer’s keyboard controller understands.
In modern computers, the keyboard controller is integrated with the USB (Universal Serial Bus) controller. The purpose of the keyboard controller is to raise a keyboard interrupt to allow the CPU (central processing unit) to handle the input. The exact key is binary encoded in the keyboard buffer memory until it is processed by the CPU.[5]
The USB controller is based on a host/worker architecture capable of supporting 127 devices. When a new device, such as the keyboard, is connected, the host assigns a unique address to the device and queries it for information such as device type, manufacturer, and supported configurations. The host loads the appropriate driver for the device, allowing it to communicate with the operating system and applications. USB devices support different types of data transfer such as isochronous for audio and video streaming, bulk transfer for file transfers, and interrupt transfers for time-critical data transfers such as keyboard and mouse inputs. Similar to other networks described in the networking chapter, data is transferred in packets on USB lines that include the device address, endpoint number, error-checking information, and the data payload.
II
The Operating System
Operating systems are like underwear – Nobody really wants to look at them.
– Bill Joy
A
nd now the OS (operating system) must deal with the interruption. The OS checks if any modifier keys such as Shift
, Ctrl
, or Alt
are pressed. The OS then places the keyboard event which includes the generated characteror function(if a modifier was found) in the OS’s event queue. The operating system then dispatches the keyboard event to the active application. In this case, the browser is the active application.
In the Linux