Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

You Press 'Enter' on the Browser: What happens when..., #1
You Press 'Enter' on the Browser: What happens when..., #1
You Press 'Enter' on the Browser: What happens when..., #1
Ebook86 pages38 minutes

You Press 'Enter' on the Browser: What happens when..., #1

Rating: 0 out of 5 stars

()

Read preview

About this ebook

"What happens when...™" series explains the sequence of events that occur and some of the reasoning behind it. This first book in the series "you press the 'enter' key, de scribes from a software engineer's point of view, the steps in processing a request for a webpage, movie video, email, or photo gallery from the internet. This is book pro vides a concise but detailed explanation of the events from how the keyboard operates, how the operating system processes the keyboard input, how the request is constructed, how the request is routed through the internet, and a quick summary of what happens at the server side. A brief discussion of cybersecurity concerns and a brief discussion of networking is included.

LanguageEnglish
Release dateJan 8, 2025
ISBN9798230719618
You Press 'Enter' on the Browser: What happens when..., #1

Related to You Press 'Enter' on the Browser

Titles in the series (1)

View More

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for You Press 'Enter' on the Browser

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    You Press 'Enter' on the Browser - Dustin W. Morris

    The Hardware

    Software gets slower faster than hardware gets faster.

    – Niklaus Wirth

    A

    nd the magic begins, when we press the enter key.

    The keyboard consists of the following critical components:

    •  domed key sheet

    •  top conductive sheet

    •  middle spacer sheet

    •  bottom conductive sheet

    •  circuit card

    The top sheet has twelve conductive traces and the bottom sheet has eleven conductive traces printed on it (11*12 = 132 keys). The middle sheet separates the top and bottom conductive sheets so that when a key is press they make contact. The circuit card provides 3 volts of power to the bottom sheet. When a key is pressed, the rubber domed key sheet presses the top sheet between the spacer sheet and makes contact to the 3 volts on the bottom sheet. The circuit is complete and the power flows to the microprocessor on the circuit card of the keyboard.[3]

    For example, when R is pressed the bottom sheet trace 3 applies voltage to the top sheet trace 2. Every 65 ms, one of the bottom sheet traces is turned off. The microprocessor will see a pulsing every 65 ms on the key the trace that is pushed. The correlation between the bottom

    bottom sheet

    Figure I.1: Keyboard Matrix

    circuit pulse and the top circuit pulse uniquely identify the key that is pressed.

    The keyboard’s microprocessor converts the signal to a scan code that the computer’s keyboard controller understands.

    In modern computers, the keyboard controller is integrated with the USB (Universal Serial Bus) controller. The purpose of the keyboard controller is to raise a keyboard interrupt to allow the CPU (central processing unit) to handle the input. The exact key is binary encoded in the keyboard buffer memory until it is processed by the CPU.[5]

    The USB controller is based on a host/worker architecture capable of supporting 127 devices. When a new device, such as the keyboard, is connected, the host assigns a unique address to the device and queries it for information such as device type, manufacturer, and supported configurations. The host loads the appropriate driver for the device, allowing it to communicate with the operating system and applications. USB devices support different types of data transfer such as isochronous for audio and video streaming, bulk transfer for file transfers, and interrupt transfers for time-critical data transfers such as keyboard and mouse inputs. Similar to other networks described in the networking chapter, data is transferred in packets on USB lines that include the device address, endpoint number, error-checking information, and the data payload.

    II 

    The Operating System

    Operating systems are like underwear – Nobody really wants to look at them.

    – Bill Joy

    A

    nd now the OS (operating system) must deal with the interruption. The OS checks if any modifier keys such as Shift, Ctrl, or Alt are pressed. The OS then places the keyboard event which includes the generated characteror function(if a modifier was found) in the OS’s event queue. The operating system then dispatches the keyboard event to the active application. In this case, the browser is the active application.

    In the Linux

    Enjoying the preview?
    Page 1 of 1