Pages

E-mail ( Electronic mail ) Basics of sending and receiving emails

E-mail has become a key part of the communications networks of most modern offices. It is one of the best application of a computer science. The most popular email is Gmail Data and massages can be transmitted from one computer to another using telephone lines, microwave links, communications satellites, or other telecommunications equipment. The same message can be sent to number of different addresses, forwarded and replied to. E-mail is send through company's own local area network and beyond, through a worldwide communication networks like Internet.

Working
Email services typically store messages at a central location called servers from where the messages can be downloaded by a receiver, after logging into his/ her mailbox (Inbox). The client or receiver of the email message, uses  typically a browser based application like GMail, Facebook, Twitter etc to open up and sign into his email box. ( All these e-mail services are free, you just have to register or sign up yourself and get started immediately). Thus  the message is routed to the destination using telephone cables, wireless network etc. With a subscription to a public e-mail network, an individual PC user needs only a modem and a telephone to send and receive text or vocal messages (Voice mail). Because of the huge amount of e-mail that can be generated, systems have been developed to  screen mail for individual users ( to prevent Spam Messages).

Various standards have been devised for exchange of emails.  Sites on the Internet adhere to one laid out in RFC 822, augmented by some RFCs that describe a machine-independent way of transferring special characters. Much thought also have been given recently to "multi-media mail", which deals with including pictures, music and sound and videos the e-mail messages. Another standard, X.400, has been defined by CCITT.

Basics of Sending and Receiving
To send and receive electronic-mail messages, or e-mail, over the internet, and to organize your messages, you need an e-mail account. You can get this through an Internet Service Provider ( ISP) in your area. These days companies like Google, Rediff, Facebook, Yahoo etc are providing free email accounts for personal and company use. You also need an e-mail client , an e-mail software ( which also you get free from above companies). Your e-mail client creates an inbox for you and also provides interface for composing and organizing ( delete, archive etc) your mail messages.

Whatever program you choose, you will typically need to set the SMTP server ( Only when you are using your personal client, no such headaches when you use GMAIL, HOTMAIL, YAHOO MAIL etc). This is your ISPs server , through which you send e-mail. Your ISP can tell you the name and address of your SMTP server.

How e-mail looks like
Each mail message you send or receive consists of two parts, the header and the body. The body is straightforward. This is where you write what you want to write in a letter. The header consists of address of the receiver , who should get the carbon copy, whether anything is attached to the mail message ( you can attach files as an attachment).

The email header contains From: and To: addresses and the subject and date of the message as well as other, sometime cryptic information. This information is in a standardized format because it must be interpreted by software responsible for routing the e-mail to the destination.

Th email body : It consists of Message you write. Sometimes the body will contain few other things. For example, if the e-mail has been forwarded or returned after being replied to, the beginning of the body will be the header of the forwarded or returned piece of mail. Also the body, will sometimes contain an attachment. With the advent of MIME, the multipurpose Internet mail extensions standards, the body of an e-mail message can even contain encoded pictures and audio.

People often append a "signature" to the body of their e-mail. This makes it easy for the recipient to find information on the sender, such as return e-mail address. A signature can be very useful because the From: address in the header can be garbled by some mail-forwarding software. This is especially true for people who send e-mail to the Internet via some other connected network or the UUCP data-transmission protocol.

Ethernet- | CSMA-CD | Topology | Cabling System | High speed Networking LAN

Ethernet is one of the most popular standards for connecting PCs to form a Local Area Network (LAN). Most ethernet systems are able to operate at upto 10 megabits per seconds (mbps), and newer systems are designed for 100 mbps speed. Ethernet defines both the types of network cable to be employed, and the signal levels and frequencies used.

Ethernet is the most widely used and installed LAN technology. Now specified in a standard, IEEE 8019.3, Ethernet was originally developed by Xerox and then developed further by Xerox, DEC, and Intel.

Installation:
An Ethernet LAN installation typically uses coaxial cable or special grades of twisted pair wires. The most commonly installed Ethernet systems are called 10BASE-T and provide transmission speeds upto 10Mbps.
The Access method used By Ethernet is CSMA/CD. Devices are connected to the cable and compete for access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol.

Topology
Early ethernet systems used a thick (about half a inch) coaxial cable which was tapped at intervals to send smaller cables to each computer. A popular development was the use of 'thin' cables looped to each computer in the system (Example of Ring Topology). A problem with this approach was that if the cable was broken at any point (and it often has to be, to allow computers to be moved) the whole system stopped working. The modern replacement or alternative for 'thin' ethernet is UTP (unscreened twisted pair). The network cable is a twisted pair of wires, connected using phone-type plugs and sockets. UTP systems require a hub, into which all the cables are connected.

In practice, the cable is still a chain between computers like the earlier thin wire, but the hub is able to deal with a cable being disconnected by re-routing internally. This makes the system more reliable, and tidier, in use.

Peer System
Ethernet is a peer system, i.e., all computers on the system have equal (networking) status. There is no 'master' unit which is responsible for deciding whose turn it is to transmit. Some means has to be found to ensure that two units do not try to transmit at the same time. The scheme adopted is called CSMA-CD, carrier sense, multiple access with collision detection. Carrier sense multiple access means that if it wants to transmit, a computer must check that no other unit is doing so. if the line is free, it starts transmission immediately, otherwise it waits before trying again.

Access Method (CSMA-CD):
Ethernet uses the CSMA/CD access method to share network media. The CSMA/CD protocol can be broken down as follows:
  1. CS (Carrier Sense) Before trnasmitting, listen for a signal; if none is found, it is okay to transmit.
  2. MA (Multiple Access) All computers share the same cable and signalling techniques.
  3. CD (Collission Detection) Detect collisions, wait, and retransmit.
Ethernet Cabling Systems
There are 4 commonly used Ethernet cabling systems, which are listed below:

Cabledescription
10Base5Also Known as RG-8 or Thicknet coaxial cable: carries signals up to 500 meters (1640 feet) at 50 ohms
10Base2Also known as RG-58 or Thinnet coaxial cable; carries signals upto 185 meters (607 feet) at 50 ohms.
10BaseTAlso known as twisted-pair; the most popular of all Ethernet Topologies, categories include 3.5, and 6 (UTP, or unshielded twisted pair) cable at up to 100Mbps speeds; carries signals up to 100 meters (330 feet)
100BaseTAlso Known as twisted-pair: uses category 5 for speeds upto 100Mbps and category 6 for speed upto 155 Mbps; carries signals up to 100 meters(330 ft)

High-Speed Networking
High speed networking designs are motivated by the limitations of existing network topologies. The basic concept has been to simply increase the data rate of the network. For example, 10-Mbit/sec Ethernet was improved tenfold with the standardization of Fast Ethernet (100 Mbits/sec). For technical reasons, increasing the data rate reduces the maximum station-to-station distance, so alternative schemes such as FDDI (Fiber Distributed Data Interface) are often employed as a backbone technology when long distance and high data rate are required, such as in campus environments. Fast Ethernet can fulfill backbone requirements as long as the network is usually within the confines of a single building.

The typical strategy is to connect servers to backbone, where they can take advantage of the higher throughput. For example, a server connected to a 100-Mbit/sec backbone can simultaneously handle ten clients operating at 10 Mbits/sec with ease.

Pusing the bandwidth even further is Gigabit Ethernet, which operates at a data rare of 1,000 Mbits/sec. Its primary purpose is for use in network backbone or as a replacement for existing 100-Mbit/sec switches.

Still,pumping up the bandwidth is not always a complete solution. While Gigabit Ethrnet can improve backbone performance, local network traffic may still suffer from bottlenecks due to the shared nature of the LANs or the collisions caused under heavy traffic loads on Ethernet networks. Switching and Virtual Private Networking can provide a solution.

Related Ethernet Reads:
  • Gigabit Ethernet or Fast Ethernet.
  • FDDI (Fibre Distributed Data Interface).

Disadvantages of a network

We List below some of the Disadvantages of a networking
  • Crashes.  The biggest disadvantage is on a server based network. When the server crashes, work gets disrupted as all network resources and its benefits are lost. Unless proper precautions are taken to ensure regular backups, the lost may result in loss of days and even months of critical data and time.
  • Data Security. As all data resources are all pooled together in a  network, it is possible for unauthorised personnel to access classified information if network security is weak or poorly implemented.
  • Privacy. A network may also mean loss of privacy as anyone, especially your boss, with the right network privileges may be in a position to read your private e-mail or hook into your private chat session., thus breaching the privacy.
  • There are advantages and disadvantages of sharing a program like Microsoft Word. On the plus side it makes easier to keep Microsoft Office updated, because if you want to upgrade the software you need to update only one copy of office, the one which is located on the server. Its easier to configure as well as a network version of an application is less expensive than if you copy a new application on each computer system.
  • On the minus side, with so many users using a network to access a Program on the network, the network may get jammed, and the overall performance is poor.
Above were some of the disadvantages of setting up a computer network. But overall, the advantages of a networking are more than the disadvantages.

Related Posts

Advantages of networking

Here are some of the benifits of setting up a network
  • Sharing Files : Networks let you share information with other computers on the network. Depending on how you set your network, you an do this in one of two ways. The most direct way is to send a file directly from your computer to your friend's computer. The second way is to send your file to an intermediate resting place, where your friend can pick it up later, kind of like dropping a bag full of ransom money at a phone booth. A third way is to permanently store the file at that intermediate place, where both of you can get at the file whenever you want. One way or the other, the data travels to your friend's computer over the network cable.
  • Sharing Resources : This means that you can set up certain computer resources - like a disk drive or a printer - so that all of the computers on the network can access the. For example, the laser printer attached to server computer is a shared resource. That means that anyone on the network can use it. Without the network, the other computer members will have to buy their own laser printers.
  • Disk drives can be shared resources too. In fact, a disk drive must be set up as a shared resource in order to share files with other users. Suppose in a Network a Computer number 3 wants to share a file with the computer number-4, and a shared disk drive has been set up at computer number 2. All computer number 3 has to do is to copy its file to the shared drive on number 2 computer and tell the number 4 computer where the file is put. Then when the number 4 comes around, he can copy the file from number 2 to its own computer.
  • You can share other resources too, such as  CD-ROM devices (those new dangled devices that store gigabytes of data and are more useful to large clip-art libraries and encyclopedia) or modems (which let you access other computers that aren't on your network).
  • A network allows users to share resources with others on the network. This can be hardware related like a printer or a modem, or it can be software related like programs and databases, or work processors. System administrators in a server based network can configure or install new software on network computers remotely.
  • Sharing Programs. Sometimes its best to put programs that everybody uses on a shared disk on a computer, rather than keep separate copies of the programs on each person's computer. For example if you have 10 computer users who all uses Microsoft Word, you could either store Ten copies of a Microsoft Word on each computer or you can store a single copy on a central server computer in a network which each user can access. This also allows to just invest on one computer, the server, more than on other computers, resulting in overall lowering of cost of a network.
  • Backups. As all data is stored on a server , backing up critical data is a simple process.
  • Communication. The biggest benefit however, comes in the form of better communication-electronic mail and groupware applications. Through electronic mail or e-mail, members of a network can send messages and ensure safe delivery of data to other members, even when they are not there. Groupware applications allow users to work collectively on same document.
Above were some of the advantages of a network. This is by no means a comprehensive or a complete list, but just enough to give you an idea, on how useful it is to set up a computer network.

Networking : Basics of computer Network

A network is nothing more than two or more computers conneted together by a cable so that they can exchange information. WIth a computer network, all the computers in the office are hooked together with cables, install a special network adapter card (an electronic circuit card that goes inside your computer-ouch!) in each computer so you'll have a place to plug in the cable, set up and configure special network software to make the network work, and viola, you have a working network,

node : Every computer connected to the network is said to be on the network. The technical term for the computer that is on network is node.

online and offline : When a computer is turned on, using computer on and off button, and is able to access the network the computer is said to be online. On the other hand if a computer is unable to access the network despite connectd to it, is called offline. A computer can be offline for several reasons, it could be unplugged, it could be broken, the cable that connects computer to network is damaged, or there could be wad of gum jammed into the disk drive.

computer network : In general terms a computer network is an interconnection of various computer systems located at the same/different places. The interconnection is done through a communication link also known as the physical layer of the network and the link is such that it is totally transparent to the users of the network. The transparency of the communication link is brought about by the interfacing software known as protocols which enables a user in one location to freely access a computer system/database/process/software in another location.

However, if the computers in the network operate together as a single unit which to user appears as a single computer, albeit physically dispersed, then the complete system is more accurately described as a distributed system. Therefore, although, any interconnected set of computers is often conveniently referred to as "computer network", the use of the term often implies as interconected set of independent computers and not a distributed system. However, it may be useful when considering a distributed system to be able to recognize the particular type of network on which it is based.

Computer networks are collection of computers and intelligent periperal equipment (e.g., automatic teller machines and point-of-sale terminals equiped with microprocessors) that are inteconnected by telephone lines, microwave relays, and other high speed communication links for the purpose of exchanging data and sharing equipment. Networking has been developed on all levels, from local to international, in diverse sectors of society. Examples are networks used by government organizations for rapid retrieval of information form databases at central locations and those used by banks and retail merchants for the transfer of funds or credit verification. If telephone lines adopted for a computer network, each computer in the network must be connected to a telephone line via a ,modem (modulator/demodulator)

Modem  is a device which converts digital pulses from a computer into analog signals to be transmitted over telephone lines and vice versa. When a machine in a network communicates with another computer, both follow a predetermined potocol (i.e set of procedures), according to which data are exchanged.

LAN A local-area network (LAN)  is a communication network consisting of many computers (mostly personal computers and workstations) that are placed within a local area, such as single building or company.

Servers: Since mid-1980's , LANs have become widespread becuse personal computers and workstations are used extensively in offices, enabling individual users to run their specific programs easily and to have their own files at hand on floppy disks. Individual users can also share data or files on LAN as if the data or file reside on their respective computers; computers that are designed or used for this purpose are called servers.

Laser Printers and other peripheral rquipment also can be connected to a network for common use. Coaxial cables or fibre optic cables are popular communication lines because they provide fast data transmission and are easy to install within buildings. In the case of LANs, there are a few different protocols, such as Ethernet and Token Ring, developed by Xerox and IBM, respectively.

Network Components
The key network components and alternatives are:
  • Media: Twisted pair wire, coaxial cable, fibreoptics, Microwave, satellites, cellular radio, point to point transreceivers.
  • Processors: Modems, Multiplexers, concentrators, routers, bridges, gateways, Front-end processors, client and server computers.
  • Software: Communication software, Network operating system Netware, Slip or PPP, POP, smtp, MSN internet explorer or Netscape Navigator, middleware.
  • Channels: Analog/digital, switched/non-switched, circuit/message/packet switching, simplex/duplex, synchronous/ asynchronous, speed and baud rate.
  • Topology: Point-to-Point, multidrop, star, ring, mesh, Ethernet
  • Architecture: OSI, IEEE, ISDN, PSTN
Frankly, computer networks are a bit of pain to set up. So why bother? Because the benifits of having a network make the pain of setting one up bearable.

Related Posts:

Internet Summary- Internet in a Nutshell (Fact sheet / Cheatsheet)

Following fact sheet provides quick summary about Internet:
  • The Internet is a collection of more than 100,000 separate networks.
  • ARPANET (the early internet) began as a network with four nodes.
  • TCP/IP is the protocol suite for the Internet.
  • CSNET provided communication between networks ineligible to join ARPANET.
  • NSFNET provided communication between networks throughout the United States.
  • Local Internet Service Providers (ISPs) connect individual users to the Internet.
  • Regional Internet service providers connect local Internet service providers.
  • National service providers (NSPs) are backbone networks created and maintained by specialized companies.
  • A protocol is a set of rules that governs data communications; the key elements of a protocol as syntax, semantics and timing.
  • Standards are necessary to ensure that products from diffrent manufacturers can work together as expected.
  • The ISO, ITU-T, ANSI, IEEE, and EIA are some of the orgaizations involved in standards creation.
  • Forums are special-interest groups that quickly evaluate and standardize new technologies.
  • Two important forums are Frame Relay Forum and ATM Forum.
  • The FCC is a regulatory agency that regulates radio, television, and wire/cable communications.
  • A Request For Comment (RFC) is an idea or concept that is precursor to an Internet Standard.
  • An RFC is categorized as required, recommended, elective, limited use, or not recommended.
  • The Internet Society (ISOC) promotes research and other scholarly activities related to the Internet.
  • The Internet Architecture Board (IAB) is the technical advisor to the ISOC.
  • The Internet Engineering Task Force (IETF) is a forum of working groups responsible for identifying operational problems and proposing solutions to these problems.
  • The Internet Research Task Force (IRTF) is a form of working groups focusing on long-term research topics related to Internet protocols, applications, architecture, topology , and technology.
  • The Internet Corporation for Assigned Names and Numbers (ICANN), formerly known as IANA, is responsible for the management of Internet domain names and addresses.
  • The Network Information Center (NIC) is responsible for collecting and distributing information about TCP/IP protocols.
Above were Important Facts about Internet, The Cheat sheet showed about The Organisation and people who monitor and administers Internet, as well as about how Internet came into existence and evolved from ARPANET.

Internet Administration-Who Owns It

Nobody owns Internet. The Internet, with its roots primarily in the research domain, has evolved and gained a broader user base with significant commercial activity. Various groups taht coordinate Internet issues have guided this growth and development.

  • Internet Society (ISOC). http://www.isoc.org/ The Internet Society is an international, non profit organization formed in 1992 to provide support for the Internet standards process. ISOC accomplishes this through maintaining and supporting other Internet administrative bodies such as IAB, IETF, IRTF, and IANA. ISOC also promotes research and other scholarly activities relating to the Internet.
  • Internet Architecture Board (IAB). http://www.iab.org/  The Internet Architecture Board is the technical advisor ISOC. The main purposes of the IAB are to oversee the continuous development of the TCP/IP Protocol Suite and to serve in technical advisory capacity to research members of the Internet community. IAB accomplishes this through its two primary components, the Internet Engineering Task Force (IETF) and the Internet Research Task force (IRTF). Another responsibility of the IAB is the editorial management of the RFCs. IAB is also the external liaison between the Internet and other standards organizations and forums.
  • Internet Engineering Task Force (IETF). http://www.ietf.org/ The Internet Engineering Task Force is a forum of working groups managed by the Internet Engineering Steering Group (IESG). IETF is responsible for identifying operational problems and proposing solutions to these problems. IETF also develops and reviews specifications intended as Internet standards. The working groups are collected into areas, and each area concentrates on a specific topic. Currently nine areas have been defined, although this is by no means hard and fast number. The areas are: Applications, Internet Protocols, Routing, Operations, User Services, Network Management, Transport, Internet protocol next generation (IPng), and Security
  • Internet Research Task Force (IRTF). http://www.irtf.org/  The Internet Research Task Force (IRTF) is a forum of working groups managed by the Internet Research Steering Group (IRSG). IRTF focuses on long-term research topics related to Internet protocols, applications, architecture, and technology.
  • Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN). http://www.icann.org/  The Internet Assigned Numbers Authority (IANA), supported by the U.S. government, was responsible for the management of Internet domain names and addresses until October 1998. At that time the Internet Corporation for Assigned Names and Numbers (ICANN), aprivate nonprofit corporation managed by an international board, assumed IANA operations.
  • Network Information Center (NIC). The NIC is responsible for collecting and distributing information about TCP/IP protocols.
Above were the main organisations that administers Internet.

Related Posts:

Internet Standards, RFC and Maturity Levels

An Internet Standard  is as thoroughly tested specification that is useful to and adhered to by those who work with the Internet. It is a formalized regulation that must be followed. There is a strict procedure by which a specification attains Internet standard status. A specification begins as an Internet draft. An Internet draft is a working document ( a work in progress) with no official status and a six-month lifetime. Upon recommendation from the Internet authorities, a draft may be published as a Request for Comment (RFC). Each RFC is edited, assigned a number, and made available to all interested parties.

RFCs go through maturity levels and are categorized according to their requirement level.

Maturity Levels
An RFC, during its lifetime, falls into one of six maturity levels: proposed standard, draft standard, Internet standard, historic, experimental, and Informational.

  • Proposed Standard. A proposed standard is a specification that is stable, well understood, and of sufficient interest to the internet communityAt this level, the specification is usually tested and implemented by several different programs.
  • Draft Standard. A proposed standard is elevated to draft standard status after atleast two successful independent and interoperable implementations. Barring difficulties, a draft standard, with modifications if specific problems are encountered, normally becomes an internet standard.
  • Internet Standard. A draft standard reaches Internet standard after demonstrations of successful implementation.
  • Historic. The Historic RFCs are significant from a historical perspective. They either have been superseded by later specifications or have never passed the necessary maturity levels to become an internet standard.
  • Experimental. An RFC classified as experimental describes work related to an experimental situation that does not affect the operation of the internet. Such an RFC should not be implemented in any functional Internet service.
  • Informational. An RFC classified as informational contains general, historical, or tutorial information related to the Internet. It is usually written by someone in a non-Internet organization, such as a vendor.
RFC Requirement Levels
RFCs are classified into 5 Requirement Levels: required, recommended, elective, limited use and not recommended.

  • Required. An RFC is labeled required if it must be implemented by all Internet systems to achieve minimum conformance. For example, IP and ICMP are required protocols.
  • Recommended. An RFC labeled recommended is not required for minimum conformance; it is recommended because of its usefulness. For example, FTP and TELNET are recommended protocols.
  • Elective. An RFC labeled elective is not required and not recommended. However, a system can use it for its own benefit.
  • Limited Use. An RFC labeled limited use should be used only in limited situations. Most of the experimental RFCs fall under this category.
  • Not recommended. An RFC labeled not recommended is inappropriate for general use. Normally a historic (obsolete) RFC may fall under this category.
RFCs can be found at http://www.faqs.org/rfcs

Related Post

Topology- definition and types of topology

A Topology of the network defines the manner in which the network devices are arranged and connected to each other in a network. It defines the shape of communication network. There are five common types of network Topologies.
  1. Bus Topology
  2. Ring Topology
  3. Star Topology
  4. Tree Topology
  5. Mesh Topology
Bus Topology/ Linear Topology
In a bus topology a single main cable connects each node (computers) which allows single line of computers accessing it from end-to-end. each node is connected to two others except those in end. The network operating system keeps track of  a unique electronic address for each node in the network, and manages the flow of data based on this addressing scheme. This topology is often found in a client / server systems, where one of the machines on the network is designated as file server.

In linear bus topology, all computers are connected by a single length of cabling with a terminator at each end. the bus topology is the simplest and most widely used network design.
Bus networks are the most common LANs. they have no switches, and in their simplest form, no repeaters, but simply share a common linear communication medium. Each station requires a tap (hardware for attachment to the medium), which must be capable of delivering the signal to all stations in the bus.
 The data is sent in packets, and each station hears all the transmissions, picking up those addressed to it.

Advantages of Bus Topology
  • Most bus networks have the advantage of being passive i.e all the active components are in the stations or nodes, and a failure affects only that one node.
  • It does not require all the computers to be up and running in order for network to function.
Disadvantages of Bus Topology
  • Because single cable is dedicated to all the computers the performance can suffer at time because of heavy traffic.
  • There is a distance limitation in bus topology. After certain length of cable the  performance of the Bus network degrades.
Ring Topology/ Circular Topology
In ring topology the computers are arranged in a circle. Data travels around the ring in one direction, with each devise on the ring acting as a repeater. Ring Networks typically use a Token Passing Protocol.
The layout is similar to linear bus, except that the nodes are connected in a circle using cable segments. In this layout, each node is connected to only two others. Each node passes information along to the next, until it reaches at its intended destination.
The ring topology is usually found in  peer-to-peer (PCs connected in pairs) networks, in which each machine manages both information processing and distribution of data files.

In ring topology type LAN architecture a series of devices are connected to one another by unidirectional transmission links to form a single closed loop. Both token ring/ IEEE 8019.5 and FDDI networks implement a ring topology.

Advantages of ring topology
  • Performance is good because each portion of cabling system is handling the data flow between two nodes (machines) only.
  • They do not have distance limitations as in Bus topology (difference between Bus and ring topology).
  • They can take advantages of fiber optic cables to speed up the performance, because only two machines are involved in packet exchange at a time.
Disadvantages of Ring Topology
  • Since all the nodes or computers are involved in data transfer, the failure of single node can bring whole network to the halt.
  • The ring control mechanism required to determine as to who should start up the ring, to determine that the packets are not corrupt, and to prevent the same packet to go around the ring because of network fault. Some Ring LANs need to deploy special computer to monitor this issue.
STAR Topology
In Star Topology, all the cables run from the computers to a central location, where they are connected by a hub. Hub is a device used to extend a network so that additional work stations can be attached.

In Star topology each node is connected to single centrally located server, using its own dedicated segment of cable. A star topology is a LAN architecture in which endpoints on the network are connected to a common central hub, or switch, by dedicated links. In this topology each node is connected to a centralised switch by a dedicated physical link. The switch provides a path between any two devices wishing to communicate, either physically in a circuit switch or logically in a packet switch.

Advantages Of star topology
  • This topology has the advantage of minimum data traffic along the cables (node to server only)., thus providing optimum performance.
  • The main advantage of star LAN are that the access to the network i.e decision on when a station can or cannot transmit, is under central control.
Disadvantages of Star Topology
  • Because single central machine must coordinate all communications, this topology requires an extremely powerful server. Hence Star Topology is expensive.
  • Speed is generally limited and central switch is an obvious potential source of catastrophic failure i.e if centralised server fails, whole topology fails.
Tree Topology
This is a network topology containing zero or more nodes/computers linked together in a hierarchical fashion. The topmost node is called the root. The root may have zero or more child nodes, connected by edges (links); the root is the parent root to its children. Each node can have in turn zero or more nodes of its own. Nodes sharing the same parents is called siblings. Every node in the tree has exactly one parent node (except root which has no parents), and all nodes in the tree are descendants of the root node. These relationships ensure that there is one and only one path from one node to any other node in the tree.
 A tree topology LAN architecture is identical to BUS topology network, except that branches with multiple nodes are possible in this case.
The advantages and disadvantages of Tree topology are same as that of Bus Topology.

Mesh Topology/ Graph Topology
In this topology, two or more nodes are connected together in an arbitrary fashion. Any two nodes in a Mesh or Graph may or may not be connected by a link. Not all the nodes need to be connected in a graph, but if the path can be traced between any two nodes, the graph is a connected one.
A Mesh Topology is a Mixture of BUS topology, STAR Topology, Ring and Tree Topology, with no restriction of connection among all the nodes in a network.

What is DNS- facts about DNS

Summary of DNS
  • Domain name system (DNS) is a client-server application that identifies each host on the internet with a unique user-friendly name.
  • DNS organizes the name space in a hierarchichal structure to decentralize the responsibilities involved in naming.
  • DNS can be pictured as an inverted hierarchical tree structure with one root noed at the top and a maximum of 128 levels.
  • Each node in the tree has a domain name.
  • A domain is defined as any subtree of the domain name space.
  • The name space information is distributed among DNS servers. Each server has jurisdiction over its zone.
  • A root server's zone is the entire DNS tree.
  • A primary server creates, maintains, and updates information about its zone.
  • A secondary server gets itsinformation form the primary server.
  • The domain name space is divided into three sections: generic domains, country domains, and inverse domain.
  • There are seven generic domains, each specifying the organization type.
  • Each country domain specifies a country.
  • The inverse domain finds a domain name for the given IP address. This is called adress-to-name resolution.
  • Name servers, computers that run the DNS server program, are organized in a hierarchy.
  • The DNS Client, called a resolver, maps a name to an address or an address to a name.
  • In recursive resolution, the client sends its request to a server that eventually returns a response.
  • In iterative resolution, the client may send its request to multiple servers before getting an answer.
  • Caching is a method whereby an answer to a query is stored in memory (for a limited time) for easy access to future requests.
  • A fully qualified domain name (FQDN) is a domain name consisting of names begining with the host and going back through each level to the root node.
  • A partially qualified domain name (PQDN) is a domain name that does not include all the levels between the host and the root node.
  • There are two types of DNS messages: queries and responses.
  • There are two types of DNS records: question records and resource records.
  • DNS uses an offset pointer for duplicated domain name information in its messages.
  • Dynamic DNS (DDNS) automatically updates the DNS master file.
  • DNS uses the services of UDP for messages of less than 512 bytes; otherwise; TCP is used.
Above were some of the most important facts about the Domain name.

DNS Messages Format

DNS has two types of messages: query and response. Both types have the same format. The query message consists of a header and the question records; the response message consisits of a header, question records, answer records, authoritative records, and additional records.

Header
 Both query and response messages have the same header format with some fields set to zero for the query messages. the header is 12 byte and its format is as follows:

Identificationflags
Number of question recordsNumber of answer records(All os in query message
Number of authoritative records(All os in query message)Number of additional records(All os in query message)
The header fields are as follows:
  • Identification.  16 bit field used by the client to match the response with the query. The client uses ientification number each time it sends a query. the server duplicates this number in response.
  • Flags. 16 bit field consisting of other subfields as shown below.
  1. QR (query/response). If set (1) means message is a response , if 0 it means message type is query.
  2. OpCode. 4-bit defines type of query or response (0-standard, 1-inverse, 2-server status required).
  3. AA (authoritative answer). (1-bit and used inly in response message. Set (1)-means Authoritative server).
  4. TC (truncated) . if set means value of 1, means messgae was more than 512 bytes and is truncated.
  5. RD (recursion desired). A 1-bit field, when set means client desires reursive answer. It is repeated in both request and response.
  6. RA (recursion available). 1-bit, and it is set only in response message to indiacate that recursion is available.
  7. Reserved. A 3-bit subfield set to 000.
  8. rCode. A 4-bit field which shows the status of error in the response. Of course, only an authoritative server can make such judgement.
Values of rCode:
  1. 0 - No error
  2. 1 - Format error.
  3. 2 - Problem at name server.
  4. 3 - Domain reference problem.
  5. 4 - Quert type not supported.
  6. 5 - Administratively prohibited.
  7. 6-15 - Reserved
  • Number of Question Records. This is a16-bit field consisting of number of queries in question section of message.
  • Number of Answer Records. This is a 16-bit field containing the number of answer records in the answer section of response message. Its value is 0in the query message.
  • Number of authoritative records. A sixteen bit field which tells the number of authoritative records in the authoritative section of the response message. Its value is zero in the query message.
  • Number of additional records. This is a 16 bit fieldcontaining the number of additional recordsin the additional section of the response message.
Question Section
 This is a section consisting of one or more question records. It is present on both query and response messsages

Answer Section
This is section consisting of one or more resource records. It is present only in response messages. This section includes answer from the server to the client (resolver).

Authoritative Section
 This section is also contained only in response messages of DNS, and gives information about domain names regarding authoritative servers for the query.

Additional Information Section
 This section provides additional information to help the resolver and present only in response part of DNS message format.

This was discussion about the format of DNS message. We discussed about various sections of Domain Name System message format like header, question section, answer section, authoritative section, and Additional infor mation section of Domain Name System (DNS) messages.

Domain name-address resolution

Mapping a domain name to a physical IP address or an IP address to a domain name is called name-address resolution.

Resolver
DNS is designed as a client-server application. A host needs to map an address to a name or a name to an address calls a DNS client called resolver. The resolver accesses the closest DNS server with a mapping request. If the server has the information, it satisfies the resolver; otherwise, it either refers the resolver to other servers or asks other servers to provide the information.
After the resolver recieves the mapping, it interprets the response to see if it is a real resolution or an error, and finally delivers the result to the process that requested it.

Mapping Domain names to Addresses
Most of the time, the resolver gives a domain name to the server and asks for the corresponding address. In this case, the server checks the generic domains or the country domains to find the mapping.

If  the domain name is from the genric domains section, the resolver receives a domain name such as "chal.atc.fhda.edu.". The query is sent by the resolver to local DNS server for resolution. If the local server cannot resolve the query, it either refers the resolver to other servers or asks other servers directly.

If the domain name is from the country domains section, the resolver receives a domain name such as "ch.fhda.cu.ca.us.". The procedure is the same.

Mapping Addresses to Names
A client can send an IP address to a server to be mappedto a domain name. As mentioned before, this is called a PTR query. To answer queries of this kind, DNS uses the inverse domain. However, in the request, the IP address should be reversed and two labels, in-addr and arpa, should be appended to create a domain acceptable by inverse domain section. For example, If the resolver receives the Ip address 132.34.45.121, the resolver first inverts the address and then adds the two labels before sending. The domain name sent is "121.45.34.132.in-addr.arpa." , which is received by local DNS and resolved.

Recursive Resolution
The client (resolver) an ask for a recursive answer from a name server. This means that the resolver expects the server to supply the final answer. If the server is the authority for the domain name, it checks its database and responds. If the server is not the authority, it sends the request to yet another server. When the query is finally resolved, the response levels back until itfinally reaches the requesting client.

Iterative Resolution
 If the client does not ask for a recursiveanswer, the mapping can be done iteratively. If the server is an authority for the name, it sends the answer. If it is not, it returns(to the client) the IP address of the server that it thinks can resolve the query. The client is responsible for repeating the query to this second server. If the newly addressed server can resolve the problem, it answers the query with the IP address; otherwiese, it returns the IP address of a new server to the client. Now the client must repeat the query to the third server. thi sprocess is called iterative  because theclient repeats the same query to multiple servers.

Domain Name Caching (Cached Version of Page)
Each time a server recieves a query from a name that is not in its domain, it needs to search its database for a server IP address. Reduction of this search time would increase efficiency. DNS handles this with a mechanism called caching.  When a server asks for a mapping from another server and receives the response, it stores this information in its cache memory before sending it to the client. If the same or another client asks for the same mapping, it can check its cache memory and resolve the problem. However,to inform the client that response is coming from the cache memory and not from an authitative source, the server marks the response as unauthoritative.

 Caching speeds up resolution, but it can also be problematic. If a server cache a mapping for a long time, it may send an outdated mapping to the client. To counter this, two techniques are used. First, the authoritative server always adds a piece of information to the mapping called time-to-live (TTL). It defines the time in seconds that the reciever server can cache the information. After that time, the mapping is invalid and any query must be sent again to the authoritative server. Second, DNS requires that each server keeps a TTL counter for each mapping it caches. The cache memory must be searched periodically and those mappings with an expired TTL must be purged.

That was the discussion on Name-address resolution in DNS, Iterative and recursive resolution of domain addresses. We also learned about Caching and Domain name mappings, & TTL. Hope you have enjoyed reading the article.

Related Post
  • DNS Messages and Their Format
  • DNS In the Internet.
  • Domain Name Space.
  • Domain Name Systen (DNS)

DNS In the Internet Domain

DNS is a protocol that can be used in different platforms. in the Internet, the Domain name space is divided into three different sections: generic domains, country domains, and inverse domain.

Generic Domain
The generic domain define registered hosts according to their generic behavior. Each node in the tree defines a domain, which is an index to the domain name space database.

First level in generic domain section allows seven possible three-character labels (or extensions). These labels describes the organization types as listed:
LabelDescription
.comCommercial organizations
.eduEducational Institutions
.govGovernment Institutions
.intInternational organizations
.MilMilitary groups
.netNetwork support centers
.orgNonprofit organizations

recently a few more first-level domain names heve been approved:

LabelDescription
.aeroAirlines and aerospace companies
.bizBusiness or firms (similar to ".com")
.coopCooperative Business Organization
.infoInformation service providers
.museumMuseums and other non profit organizations
.namePersonal names (individuals)
.orgNonprofit organizations
.proProfessional Individual organizations

Country Domain:
The country domain uses the same format as generic domains but uses two-character country abbreviations (eg., .us fro United States, .in for India), in place of three-character organizational abbreviations at the foiat level. Second-Level labels can be organizational, or they can be more specific, national designations. The United States, For example, uses state abbreviations as a subdivision of us (e.g., .ca.us.).

Inverse Domain
The inverse domain is used to map an address to a name. This may happen,, for example, when as server has received a request from client to do a task. Whereas the server has a file that contains a list of authorized clients, the serve lists only the Ip address of the client (extracted from received IP packet). To determine if the client is on the authorized list, it can ask its resolver to send a query to the DNS server and ask for a maping of address to name.
This type of query is called an inverse or pointer (PTR) query. To handle a pointer query, the inverse domain is added to the domain name space with the first-level node called arpa ( for historical reasons). the second level is also one single node named in-addr (for inverse address). The rest of the domain defines IP addresses.

The servers that handle the inverse domains are also hierarchichal. this means the netid part of the address should be at higher level than the subnetid part, and the subnetid part higher than the hostid part. In this way, a server serving the whole site is at a higher level than the servers serving each subnet. this configuration makes the domain look inverted when compared to a gneric or country domain.

Example of Inverse Domain
To follow the convention of reading the domain names from the bottom to the top, an IP address such as 132.34.45.121 9a class B address with netid 132.34) is read as 121.45.34.132.inaddr.arpa.

Related Post:




DNS Server and Name Space distribution

The information contained in the domain name space should be stored. However, it is not efficient as well as unreliable to store information on a single computer system. Inefficient because requests for all over the world would put heavy load on a system. It is not reliable because any failiure makes the data unavailable.

DNS Servers
The solution of above problem is to distribute the information among many computers called DNS Servers. One way to do this is to divide the whole name space into many domains based on the first level. In other words, we let the root stand alone and create as many domains (subtrees) as there are first-level nodes. Because a domain created this way could be very large, DNS allows domains to be divided further into smaller domains (subdomains). Each server can be responsible (authoritative) for either a large or small domain. In other words, we have a hierarchy of servers in the same way that we have a hierarchy of names.

Zone
What a server is responsible for or has authority over it is called a zone. If a server accepts responsibility for a domain and does not divide the domain into smaller domains (subdomains), the "domain" and the 'zone" refers to the same thing. the server makes a database called a zone file and keeps all the information for every noe under that domain. However, if a server divides its domain into subdomains and delegates part of its authority to other servers, "domain" and "zone" refer to different things. The information about the nodes in the subdomains is stored in the servers at the lower levels, with the original server keeping some sort of reference to these lower-level servers. Of course the original server does not free itself from responsibility totally: It still has a zone, but the detailed information is kept by lower level servers.

A server can also dividepart of its domain and delegate responsibility but still keep part of domain for itself. In this case, its zone is made of detailed information for the part of the domain that is not delegated  and references to those parts that are delegated.

Root Server
A root server is a server whose zone consists of whole tree. A root server usually does not store any information abotdomains but delegates its authority to other servers , keeping references to those servers. Currently there are more than 13 root serverscovering th whole domain space. The servers are distributed all around the world.

Primary and Secondary Servers
DNS defines two types of servers, primary and secondary. A primary server is a server taht stores the file about the zone for whih it is an authority. It is responsible for creating, maintaining, and updating the zone file. It store sthe zone file on a local disk.

A secondary server is a server that transfers the complete information about a zone from another server (primary or secondary) and stores the file on its local disk. the secondary server neither creates nor updates the zone files. If udating is required, it must be done by primary server, which sends the updated version to secondary.

The primary and secondary servers are both authoritative for the zone they serve. The idea is not to put the seconadary server at alower level of authority but to create redundancy for data so that if one server fails, the other can continue serving clients. Note also that a server can be a primary server for a specific zone and a secondary server for another zone

Zone Transfer
A primary server loads all information from the disk file; the secondary DNS Server loads all information from the primary server. When the primary DNS server downloads information from the secondary, it is called zone transfer.

Related Posts:
  • Domain Name Space
  • DNS In The Internet

Domain Name Space

Thousands of Domain names are required to be arranged in a Hierarchical structure for proper administration and Domain name space is devised for this purpose. Technically, in is this design the domain names are arranged in an inberted-tree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127. Whereas the root glues the whole tree together, each level of tree defines a hierarchical level.

Domain Name
Each node in the tree has a domain name. A full domain name is a sequence of labels separated by dots (.). the domain names are always read from the the node upto the root.

Label
Each node in the Domain name space tree has a label, which is a string with a maximium of 63 characters. The root label is a null string (empty string). DNS requires that children of a node (nodes that branch from the same node) have different labels, which guarentees the uniqueness of domain names.

Domain
A domain is a subtree of the domain name space. The name of the domain is the domain name of the node at the top of the subtree. A domain may itself be divided into domains (or subdomains as they are sometimes called).

The Domain can be broadly classified as one of two types:
  • Fully Qualified Domain Name (FQDN).
  • Partially Qualified Domain Name (PQDN)
Fully Qualified Domain Name
If a label is terminated by a null string, it is called a fully qualified domain name (FQDN). An FQDN is a domain name that contains th full name of the host. It contains all the labels, from most specific to the most general, that uniquely defines the name of the host. For example, the domain name
challenger.atc.fhda.edu.
is the FQDN of a computer named challenger and installed at the Advanced Technology Center (ATC) at De Anza College. A DNS server can only match and FQDN to an address. Note that the name msut end iwth a null label (string), but because null here means nothing, the label ends with a Dot (.).

Partially Qualified Domain Name (PQDN)
If a label is not terminated by a null string, it is called Partially Qualified Domain Name (PQDN). A PQDN strats from anode, but it does not reach the root. It is used when the name to be resolved belongs to the same site as the client. Here the resolver can supply the missing part, called the suffix to create an FQDN. For example, if a user at the fhda.edu site wants to get the IP address of Challenger computer, he or she can define the partial name
challenger

The DNS Client adds the suffix atc.fhda.edu. before passing the address to the DNS server.
The DNS Client normally holds a list of suffices. This suffix is added when the user defines an FQDN.

Related Posts:
  • DNS Servers and Distribution Of Name Space
  • DNS in the Internet.

Domain Name System (DNS)

To identify any entity, a computer or any other resource like printer or a website hosted on a server, connected to an Internet, the Domain Name System is used. Each resource connected to the network is assigned a unique IP address to identify it. This uniquely identifies the connection of a host to the Internet. However, people prefer to use names instead of addresses. Just imagine If you have to type 192.168.010.010, instead of your website name to access it. Not only it will be difficult to remember but also is difficult to maintain. There for a mapping system is created to convert physical IP addresses to a more convenient Logical Names. This system is called Domain Name System (DNS). The logical name for a website is called Domain Name.

When Internet was small, mapping was done using a host file. The host wile had only two columns comprising name and address. Every host could store host file on a disk and update it periodically from a master host file. When a program or a user wanted to map a name to an address, the host consulted the host file and found the mapping.

Today, however, it is impossible to have one single host file to relate every address with a name and vice versa. the host file would be too large to store in every host. In addition, it would be impossible to update all the host files in the world every time there is a change.

One solution would be to store the entire host file in a single computer and allow access to this centralized information to every computer that needs mapping. But we know that this would create a  huge amount of traffic on the IInternet.
Another solution, the one used today, is to divide this huge amount of information into smaller parts and store each part on a different computer. In this method, the host that needs mapping can contact the closest computer (in a data center) holding the mapping information.

Name Space
To be unambiguous, the names assigned to the resources (machines and websites), should be carefully selected from a name space with complete control over the binding between the names and IP addresses. In other words, the names should be unique because addresses are unique. A name space that maps each address to a unique name an be organized i two ways: flat and hierarchical.

Flat Name Space
In a Flat name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. The names may or may not have a common section; if they do, it has no meaning. the main disadvantage of a flat name space is that it cannot be used in large system such as the Internet because it must be centrally controlled to avoid ambiguity and duplication.

Hierarchical Name Space
In a Hierarchical name space, each name is made up of several parts. the first part can define the nature of organization, the second part can define the name of an organization, the third part can define departments in an organization, and so on. In this case, the authority to control and assign the namespaces can be decentralized. A central authority can assign the part of the name that defines the nature of organization and the name of the organization. The responsibility of rest of the name can be given to organization itself. The organization can add suffixes (or prefixes) to the name to define its host or resources.
The management of the organization need not to worry that the prefix chosen for a host is taken by another oorganization because, even if part of an address is the same, the whole address is different. For example, assume two colleges and company calls one of their computers challenger. The first college is given a name by central authority such as fhda.edu, the second college is given the name berkeley.edu , and the company is given the name smart.com. When each of these organizations add the name challenger to the name they have already been given, the end result is three distinguishable names: challenger.fhda.edu, challenger.berkeley.edu, and challenger.smart.com. The names are unique without the need to be assigned by a central authority. The central authority controls only the part of the name, not the whole.

Related Post:
  • Domain Name Space

Protocols and Standards, Organizations, Forums

Network Protocols and Standards, that is what I will be describing in this article. First we define protocol, which is synonymous with "rule". Then we discuss standards, which are agreed-upon rules.

Protocols
In computer networks, communication occurs between entities in different systems. An entity is anything capable of sending or receiving information. However, two entities cannot simply send bit streams to each other and expect to be understood. For communication to occur, the entities must agree on a protocol.
A protocol is a set of  rules that governs data communication. A protocol defines what is communicated, how it is communicated and what is communicated. The Key elements of a protocol are syntax, semantics and timing.
  • Syntax. Syntax refers to the structure or format of the data, meaning the order in which they are presented. For example, a simple protocol might expect the first 8 bits of data to be the address of the sender, the second 8 bits to the address of the receiver, and the rest of the stream to the message itself.
  • Semantics. Semantics refers to the meaning of each section of bits. How is a particular pattern to be interpreted, and what action is to be taken based on that interpretation? For example, does an address identify the route to be taken or the final destination of the message?
  • Timing. Timing refers to two characteristics: when data should be sent and how fast it can be sent. For example, if a sender produces data at 100 Megabits per second (Mbps) but the receiver can process data at only 1 Mbps, the transmission will overload the receiver and data will be largely lost.
Standards
Standards are essential in creating and maintaining an open and competitive market for equipment manufacturers and also in guaranteeing national and international interoperability of data and telecommunications technology and processes. They provide guidelines to manufacturers, vendors, government agencies, and other service providers to ensure the kind of interconnectivity necessary in today's marketplace and in international communication.
Data communication standards fall into two categories: de facto ( meaning "by fact" or "by convention") and de jure (meaning "by law" and "by regulation").
  • De facto. Standards that have not been approved by an organized body but have been adopted as standards through widespread use are de facto standards. De facto standards are often established originally by manufacturers that seek to define the functionality of a new product or technology.
  • De jure. De jure standards are those that have been legislated by an oficially recognized body.

Standards and Organizations
standards are developed through cooperation of standards creation committees, forums and government regulatory agencies. Some of the standards establishment Organizations are:
  • International Standards Organisation (ISO) http://www.iso.org/
  • International Telecommuniations Union-Telecommunication Standards Sector (ITU-T). http://www.itu.int/ITU-T  
  • American National Standard Institute (ANSI).
  • Institute of Electrical and Electronics Engineers (IEEE). http://www.ieee.gov/
  • Electronic Industries Association (EIA).

Forums
Telecommunications technology development is moving faster than the ability of standards committee to ratify standards. Standards committees are procedural bodies and by nature slow moving. to accommodate the need fro working models and agreements  and to facilitate the standardization process, many special-interest groups have developed forums made up of representatives from interested corporations. The forums work with universities and users to test, evaluate and standardize new technologies.  By concentrating their efforts on a particular technology, the forums are able to speed acceptance and use of those technologies in the telecommunications community. The forums present their  conclusions to the standards bodies. Some important forums for the telecommunications industry include the following:
  • Frame Relay Forum. The Frame Relay Forum was formed by digital equipment Corporation, Northern Telecom, Cisco, and StrataCom to promote the acceptance and implementation of frame relay. Today, it has around 40 members representing North America, Europe, and the Pacific rim. Issues under Review include flow control. encapsulation, translation, and multicasting. the forum's results are submitted to the ISO.
  • ATM Forum. http://www.atmforum.com/ The ATM Forum provides acceptance and use of Asynchronous Transfer Mode (ATM) technology. The ATM Forum is made up of Customer Premises Equipment (e.g., PBX systems ) vendors and Central Office (e.g., telephone exchange) providers. It is concerned with the standardization of service to ensure interoperability.

Regulatory Agencies
All communications technology is subject to regulation by government agencies such as Federal Communication Commission in the United States. The purpose of these agencies is to protect the public interest by regulating radio, television, and wire/cable communications.

  • Federal Communications Commission (FCC). http://www.fcc.gov/  The Federal Communications Commission (FCC) has authority over interstate and international commerce as it relates to communications.

Related Post:
  • Internet Standards

Internet-History,Timeline and important events, ARPANET

ARPANET
In the mid-1960s, mainframe computers used in research organizations were unable to communicate with each other because of different manufacturers. The Advanced Research Projects Agency (ARPA) in the Department of Defence (DOD) was interested in finding the way the computers could connect to each other so that research work could be shared among researchers , thereby reducing costs and duplication of effort.

In 1967, at an Associate for Computing Machinery (ACM) meeting, ARPA presented its ideas for ARPANET, a small network of connected computers. The idea was that each host computer (not necessarily from same manufacturer) would be attached to a specialized computer, called an interface message processor (IMP). The IMPs, in turn, would be connected to each other. Each IMP had to be able to communicate with other IMPs as well as with its own attached host.

By 1969, ARPANET was a reality. Four nodes, at the University of California at Santa Barbara (UCSB), Stanford Research Institute (SRI), and the University of UTAH were connected via the IMPs to form a Network. Software called Network Control Protocol (NCP) provided communication between the hosts.

Birth of the Internet (Timeline)
In 1972, Vint Cerf and Bob Kahn, both of them who were part of core ARPANET group, collaborated on what they called Internetting Project. They wanted to link different networks together so that a host on one network can communicate with a host on a second different network. There were many problems to overcome: diverse packet sizes, diverse interfaces, and diverse transmission rates, as well as different reliability requirements. Cerf and Kahn devised the idea of a device called gateway to serve as the intermediary hardware to transfer packets from one network to another.

Cerf and Kahn's landmark 1973 paper outlined the protocols to achieve end-to-end delivery of packets. This was a new version of NCP ( network control protocol). This paper on Transmission control Protocol (TCP) included concepts such as encapsulation, the datagram, and the functions of a gateway. A radical idea was the transfer of responsibility for error correction from IMP to the host Machine. Around this Time the responsibility of the ARPANET was handed over to the Defence Communication Agency (DCA).

In October 1977, an internet consisting of three different networks ( ARPANET, packet radio, and packet satellite) was successfully demonstrated. Communication between networks was now possible.

Shortly thereafter, the authorities made a decison to split TCP into two protocols:  Transmission Control Protocol (TCP) and Internetworking Protocol (IP). IP would handle datagram routing while TCP would be responsible for higher level functions such as segmentation, reassembly, and error detection. The internetworking protocol became known as TCP/IP.

In 1981, under a DARBA contract, UC Berkely modified the UNIX operating system to include TCP/IP. this inclusion of network software along with a popular operating system did much to further the popularity of networking. The open (non-manufacturer-specific) implementation of Berkeley UNIX gave every manufacturer a working code base on which they could build their products.

In 1983, authorities abolished the original ARPANET protocols, and TCP/IP became the official protocol for the ARPANET. Those who wanted to use the Internet to access a computer on a different network had to be running TCP/IP.

MILNET
In 1983, ARPANET was split into two networks: MILNET for military users and ARPANET for non military users.

CSNET
Another milestone in Internet History was the creation of CSNET in 1981. CSNET was a network sponsored by national science foundation (NSF). The network was coneived by universities that were ineligible to join ARPANET due to an absence of defense ties to DARPA. CSNET was a less expensive network; there were no redundant links and the transmission rate was slower. It featured connections to ARPANET and Telnet, the first commercial packet data service.
By the middle, 1980s, most U.S. universities with computer science departments were part of CSNET. Other institutions and companies were also forming their own networks and using TCP/IP to interconnect. The term Internet, originally associated with government-funded connected networks, now referred to the connected networks using TCP/IP protocols.

NSFNET
With the success of CSNET, the NSF, in 1986, sponsored NSFNET, a backbone that connected five supercomputer centres located throughout the United States. Community networks were allowed access to this backbone, a T1 line with a 1.544 Mbps data rate, thus providing connectivity throughout the United States.
In 1990, ARPANET was officially retired and replaced by NSFNET. In 1995, NSFNET reverted back to its original concept of research network.

ANSNET
In 1991, the U.S government decided taht NSFNET was not capable of supporting the rapidly increasing Internet traffic. Three companies, IBM, Merit, and MCI, filled the void by forming a nonprofit organization called Advanced Network and Services (ANS) to build a new, high-speed Internet backbone called ANSNET

The Internet today is not a simple architecture. It is made up of many wide and local area networks (WANs and LANs) joined by connecting devices and switching stations (nodes). The Internet is continuously evolving and many new users are added each day. today most end users who want Internet connection use the services of Internet Service Providers (ISPs). There are International Service Providers, National Service Providers (SprintLink, PSINet, UUNet Technology, AGIS, and Internet MCI providing Internet at network access points NAPs), regional service providers and local service providers.


For your help here is the complete summary and list of important events of Internet History/Timeline
  • 1969. Four Node ARPANET established.
  • 1970. ARPA hosts implement NCP.
  • 1973. Development of TCP/IP suite begins.
  • 1977. An Internet tested using TCP/IP.
  • 1978. UNIX distributed to academic/research sites.
  • 1981. CSNET established.
  • 1983. TCP/IP becomes the official protocol for ARPANET.
  • 1983. MILNET was Born.
  • 1986. NSFNET established.
  • 1990. ARPANET decommissioned and replaced by NSFNET.
  • 1995. NSFNET goes back to being a research network.
  • 1995. Companies known as Internet Service Providers (ISPs) started

Related Post:

Network-Internet,What it is? Definition and Brief History

A network is a group of connected, communicating devices such as computers and printers. An internet (not lowercase i ) is two or more networks that can communicate with each other. The network has a certain Architecture called Topology of the network

The most notable internet is called Internet (uppercase I ), a collaboration of more than hundreds of thousand of interconnected networks. Private individuals as well as various organizations such as government agencies, schools, research facilities, corporations, and libraries in more than 100 countries use Internet. Millions of people are users. Yet this extraordinary communication system came into being in 1969.

The Internet has revolutionized many aspects of our daily lives. It has affected the way we do business as well as the way we spend our leisure time. Count the ways you have used the internet recently. Perhaps you have sent an electronic mail (email) to a business associate, paid a utility bill, read a newspaper from a distant city, or looked up a local movie schedule - all by using the internet. Or, may be you have researched a medical topic, booked a hotel reservation, chatted with a fellow Trekkie, or comparison-shopped for a car.

The internet is a communication system taht has brought a wealth of information to our fingertips and organized it for our use. The internet is a structured, organized system. Before we discuss how it works and its relationship to TCP/IP, we first give a brief history of the Internet and important events in internet history .

Related Post:
Birth of Internet, How it was conceived
Network Topology