History of Internet

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What was the primary objective of J.C.R. Licklider's "Galactic Network" proposal?

  • To enable rapid data access for everyone through interconnected computers. (correct)
  • To establish a physical connection between Massachusetts and California.
  • To develop packet switching technology for improved network efficiency.
  • To create a network exclusively for military research and communication.

What key technological advancement did researchers identify as necessary following the initial ARPANET experiments?

  • Dial-up telephone lines.
  • Packet switching technology. (correct)
  • Time-sharing infrastructure.
  • Network Control Protocol (NCP).

What was the primary function of the Network Control Protocol (NCP) in the early ARPANET?

  • Translating domain names to IP addresses.
  • Enabling network users to develop applications. (correct)
  • Addressing and forwarding individual packets.
  • Providing flow control and error recovery for lost packets.

Which innovation introduced by a DARPA team led to the development of TCP/IP?

<p>The idea of open-architecture networking. (B)</p> Signup and view all the answers

What critical problem did the Domain Name System (DNS) solve as the Internet expanded?

<p>Translating domain names to IP addresses in a scalable manner. (D)</p> Signup and view all the answers

In the context of Internet architecture, how are network protocol functionalities typically organized?

<p>Into distinct layers. (C)</p> Signup and view all the answers

What advantages does a layered network architecture provide?

<p>Scalability, modularity, and flexibility. (B)</p> Signup and view all the answers

How many layers are there in the OSI model?

<p>Seven. (B)</p> Signup and view all the answers

In the Internet architecture model, which three OSI layers are combined into a single layer?

<p>Application, Presentation, and Session. (C)</p> Signup and view all the answers

Which of the following is a common protocol found at the Application Layer of the Internet architecture?

<p>HTTP. (A)</p> Signup and view all the answers

What is the primary role of the Presentation Layer in the OSI model?

<p>Formatting data for the application layer. (C)</p> Signup and view all the answers

What function does the Session Layer perform in a teleconference application?

<p>Tying together audio and video streams. (B)</p> Signup and view all the answers

Which of the following is a key service offered by the Transport Layer?

<p>Multiplexing and demultiplexing. (A)</p> Signup and view all the answers

What is the primary responsibility of the Network Layer?

<p>Moving datagrams from one Internet host to another. (C)</p> Signup and view all the answers

Which protocol is often referred to as "the glue" that binds the Internet together?

<p>IP. (B)</p> Signup and view all the answers

What is the primary function of the Data Link Layer?

<p>Moving frames from one node to the next. (D)</p> Signup and view all the answers

What is the role of the Physical Layer in the Internet architecture?

<p>Transferring bits within a frame between two nodes. (D)</p> Signup and view all the answers

In the context of network communication, what is encapsulation?

<p>Adding header information at each layer. (C)</p> Signup and view all the answers

According to the end-to-end principle, where should specific application-level functions ideally reside?

<p>At the endpoints of the communication system. (A)</p> Signup and view all the answers

Which of the following is an original goal that led to the end-to-end principle?

<p>Moving functions and services closer to the applications that use them. (A)</p> Signup and view all the answers

Why are firewalls considered a violation of the end-to-end principle?

<p>They are intermediate devices that can interfere with end-host communication. (C)</p> Signup and view all the answers

How do NAT boxes violate the end-to-end principle?

<p>They make hosts behind them not directly addressable from the public Internet. (D)</p> Signup and view all the answers

What architectural shape does the Internet protocol stack resemble?

<p>An hourglass. (A)</p> Signup and view all the answers

Why has it been difficult to replace the existing protocols at the waist of the protocol hourglass?

<p>Of backward compatiability concerns and the transport layer acting as an evolutionary shield. (D)</p> Signup and view all the answers

According to the Evolutionary Architecture model, what should network architects do to avoid ossification effects?

<p>Design the functionality of each layer so that the waist is wider consisting of protocols that offer non-overlapping but general services. (B)</p> Signup and view all the answers

What has been one consequence of the hourglass shape of the Internet?

<p>It has been a difficult and slow process to transition to IPv6, despite a shortage of IPv4 addresses. (A)</p> Signup and view all the answers

What is meant by "clean-slate design" in the context of Internet architecture?

<p>Rethinking the underlying assumptions and design decisions from scratch. (D)</p> Signup and view all the answers

What is a primary goal for redesigning Internet architecture to offer better accountability?

<p>Associate actions with responsible entity. (D)</p> Signup and view all the answers

What function do repeaters and hubs perform in a network?

<p>Delivering digital signals to connect different Ethernet segments. (D)</p> Signup and view all the answers

On which layer do bridges operate?

<p>Data Link Layer. (C)</p> Signup and view all the answers

What problem does the Spanning Tree Algorithm (STP) solve in bridged networks?

<p>Looping issues. (A)</p> Signup and view all the answers

Flashcards

Who is J.C.R. Licklider?

Proposed the concept of a global network where everyone could quickly access data through interconnected computers in 1962.

What is the ARPANET (1969)?

The first network connecting four nodes (UCLA, SRI, UCSB, Utah) to experiment with time-shared infrastructure and packet switching.

What is NCP?

The initial ARPANET host-to-host protocol, introduced in 1970, that allowed network users to start developing applications.

What is TCP/IP (1973)?

A new version of NCP for open-architecture networking; later split into IP for addressing and TCP for service features.

Signup and view all the flashcards

What is DNS (1983)?

Translates domain names to IP addresses using a scalable distributed mechanism.

Signup and view all the flashcards

What is layered architecture?

A network architecture where functionalities are divided into layers, each offering different services.

Signup and view all the flashcards

What are benefits of layered architecture?

Scalability, modularity, and flexibility to add or delete components, leading to cost-effective implementations.

Signup and view all the flashcards

What are the OSI model layers?

Application, presentation, session, transport, network, data link, and physical layers.

Signup and view all the flashcards

What are Internet protocol stack layers?

Application, transport, network, data link, and physical layers.

Signup and view all the flashcards

What is the application layer?

Combining the application, presentation, and session layers into a single layer in the Internet architecture model.

Signup and view all the flashcards

What protocols are used for the Application Layer?

The HTTP (web), SMTP (e-mail), FTP (file transfer), and DNS (domain name translation) protocols.

Signup and view all the flashcards

What does the session layer handle?

Responsible for managing the different transport streams that belong to the same session.

Signup and view all the flashcards

What is the transport layer's responsibility?

Responsible for the end-to-end communication between end hosts with protocols like TCP and UDP.

Signup and view all the flashcards

What does the network layer do?

Responsible for moving datagrams from one Internet host to another using IP.

Signup and view all the flashcards

What is the role of the data link layer?

Moves frames from one node to the next, offering services like reliable delivery over a single link.

Signup and view all the flashcards

What is facilitated by physical layer?

Facilitates interaction with hardware to transfer bits within a frame using protocols dependent on the link.

Signup and view all the flashcards

What is done during encapsulation?

Adds its own header information to the message from the layer above.

Signup and view all the flashcards

What is de-encapsulation?

It is stripped off at each layer at the receiving end.

Signup and view all the flashcards

What is the end-to-end principle?

The network core should be simple and minimal while end systems carry the intelligence.

Signup and view all the flashcards

What does the e2e principle suggest?

Suggests specific application-level functions should not be built into the lower levels of the system at the core of the network.

Signup and view all the flashcards

What are E2E violations?

Where firewalls and traffic filters operate.

Signup and view all the flashcards

What do NAT boxes do?

Help deal with the shortage of Internet addresses by assigning a single public IP address to the home router.

Signup and view all the flashcards

How NAT impacts hosts addressing?

These are not globally addressable or routable which violates the e2e principle.

Signup and view all the flashcards

What does Internet architecture look like?

The Internet protocol stack has a layered architecture that resembles an hourglass shape.

Signup and view all the flashcards

What is EvoArch Model?

Can help to study layered architectures and their evolution quantitatively.

Signup and view all the flashcards

How is a protocol stack modeled?

A protocol stack is modeled as a directed and acyclic network with L layers.

Signup and view all the flashcards

What do Repeaters and Hubs do?

Receives and forwards digital signals to connect different Ethernet segments.

Signup and view all the flashcards

Bridges and Switches Enable communication.

Enable communication between hosts that are not directly connected.

Signup and view all the flashcards

What does Spanning Tree Algorithm do?

Helps to prevent broadcast storms, by eliminating loops.

Signup and view all the flashcards

Study Notes

  • J.C.R. Licklider proposed the "Galactic Network" in 1962.

A Brief History of the Internet

  • Licklider's vision was a network where everyone could quickly access data through interconnected computers.
  • Licklider led researchers at DARPA to experiment with connecting two computers.
  • Lawrence G. Roberts, an MIT researcher, connected computers in Massachusetts and California with a low-speed dial-up line.
  • The ARPANET was established in 1969.
  • Early experiments showed time-shared infrastructure worked, but researchers needed packet switching technology.
  • Roberts developed the first network, connecting four nodes by the end of 1969
  • The four nodes included UCLA, Stanford Research Institute, UCSB, and the University of Utah.
  • In 1970, the Network Control Protocol (NCP) was introduced as the initial ARPANET host-to-host protocol
  • NCP allowed network users to start developing applications.
  • Email was among the first applications, launching in 1972.
  • In 1973, a DARPA team led by Bob Kahn introduced open-architecture networking.
  • Open Architecture allows individual networks to be independently designed and developed based on specific needs.
  • Kahn collaborated with Vint Cerf at Stanford and presented the original TCP paper in 1973.
  • The Transmission Control Protocol / Internet Protocol (TCP/IP) was developed from open architecture networking idea
  • The first version of TCP was split into IP for addressing and forwarding packets, and TCP for service features like flow control.
  • Paul Mockapetris at USC introduced the Domain Name System (DNS) in 1983.
  • DNS translates domain names to IP addresses using a scalable, distributed mechanism since the Internet's scale was rapidly increasing.
  • Tim Berners-Lee led a team of researchers to introduce the World Wide Web (WWW) in 1990, it became one of the first and most popular applications

Internet Architecture Introduction

  • Current architectural design involves connecting hosts running the same applications but located on different types of networks.
  • Computer networks are complex systems built on multiple components with varying technologies and application types.
  • Network protocols organize protocols into layers to provide structure to the network architecture

Architecture, Layers, and Functionalities.

  • Functionalities in network architecture are implemented by dividing the architectural model into layers.
  • Each layer offers different services.
  • An analogy to explain layered architecture is the airline system. Purchasing a ticket, checking bags, going through gates, flying, and claiming baggage are different layers of the airline travel process.
  • Every layer implements some functionality, works based on the service provided by the layer below, and also provides some service to the layer that is above

Layering and Functionality

  • Advantages of layered architecture include scalability, modularity, and flexibility to add or delete components for cost-effective implementations.

The OSI Model

  • The Internet architecture follows a layered model.
  • Every layer provides some service to the layer above.
  • The seven-layered OSI (Open Systems Interconnection) model was proposed by the International Organization for Standardization (ISO).
  • The OSI model layers include application, presentation, session, transport, network, data link, and physical layers.
  • The Internet architecture model has five layers.
  • Application, presentation, and session layers are combined into a single application layer with sockets as the interface between application and transport layers.
  • The application developer designs the overall application functionality

Application, Presentation, and Session Layers

  • The application layer includes protocols such as HTTP (web), SMTP (e-mail), and FTP (file transfer).
  • The DNS protocol translates domain names to IP addresses.
  • Services offered by this layer depend on the application.
  • At the application layer, the packet of information is referred to as a message.
  • The presentation layer formats information received from the layer below and delivers it to the application layer.
  • Presentation layer functionalities include formatting video streams or translating integers between big endian and little endian.
  • There are no example protocols for the presentation layer.
  • The session layer manages different transport streams belonging to the same session between end-user application processes.
  • As an example the session layer ties together audio and video streams in a teleconference application.

Transport and Network Layer

  • The transport layer is responsible for end-to-end communication between end hosts using TCP and UDP protocols.
  • TCP offers a connection-oriented service, guaranteed delivery, flow control, and congestion control.
  • UDP provides a connectionless best-effort service without reliability, flow, or congestion control.
  • At the transport layer, a packet of information is called a segment.
  • In the network layer, the information packet is referred to as a datagram.
  • The network layer is responsible for moving datagrams from one Internet host to another.
  • The IP Protocol is the glue that binds the Internet together and must be run on all hosts/devices with a network layer.
  • IP protocol defines datagram fields and how hosts/routers use them so that the sent datagrams reach their destination.
  • Routing protocols determine the routes datagrams can take between sources and destinations.
  • In the data link layer, packets of information are referred to as frames.
  • Ethernet, PPP, and WiFi are Protocols used at the data link layer
  • The data link layer moves frames from one node to the next using network layer routing.
  • This layer offers services such as reliable delivery, covering data transmission across one link.
  • The reliable delivery service offered is different from the TCP protocol, which offers reliability from source host to destination.
  • The physical layer facilitates interaction with hardware, transferring bits within a frame between two nodes via a physical link.
  • Protocols depend on the link and transmission medium, like Ethernet which has twisted-pair copper wire, coaxial cable, etc.
  • At the physical layer, info is moved between two systems connected by a physical link and specifies how to send one bit.
  • Coaxial cable, fiber optics, and radio frequency transmitters are examples of physical layer transmission.

Layers Encapsulation

  • Layers and protocols communicate through encapsulation and de-encapsulation, referring to the data's physical path from sender to receiver.
  • The sending host sends an application layer message (M) to the transport layer.
  • The transport layer adds header information(Ht) to the application layer message, called a segment.
  • Added header info, segment, helps the receiving host direct the message to the correct application and determine if there were errors.
  • The segment gets forwarded to the network layer, which adds the network header information (Hn), and the combination is called a datagram.
  • The datagram encapsulates the segment and the added header gives source and destination addresses of end hosts.
  • The message at the link layer is called a frame, transmitted across the physical medium with its own header information (Hl).
  • At each layer the message is a combination of the payload from the layer above with the new appended header
  • At the receiving end, de-encapsulation reverses the process by stripping headers off each layer.
  • Intermediate layer-3 devices like routers, and layer-2 devices like switches may be part of Path between sender and receiver
  • Routers and layer-2 switches implement protocol stacks similarly to end-hosts.
  • Routers implement layers 1 to 3, and layer-2 switches implement layers 1 to 2.
  • The switch de-encapsulates data and encapsulates it again to send it forward to the next device.
  • End-hosts implement all five layers, while intermediate devices don't which makes the network edges smarter, and the core simple which is called end-to-end principle.

The End-to-End Principle

  • The end-to-end (e2e) principle suggests that specific application-level functions cannot be built into the network's lower levels or the core.
  • The network core should be simple and minimal, and the end systems (edges) should carry the intelligence.
  • Moving functions and services closer increases the application designer's autonomy to offer services specific to their application
  • The question of the matter, is that the higher-level protocol layers are more specific to a particular end-to-end service needed by a particular app
  • Where as the the lower level protocol are free to focus on the more minimal generic functions that benefit all different types of apps.
  • Violations of the e2e principle typically refer to cases where a functionality cannot be implemented entirely by the end hosts.
  • Examples of the E2E violation include firewalls and traffic filters, and NAT boxes

Violations of the End-to-End Principle and NAT Boxes

  • Firewalls are examples of E2E principle Violations, because they are operated as intermediate devices between end hosts and drop certain traffic.
  • Network Address Translation (NAT) boxes are also an E2E principle Violation.
  • NAT boxes enable for multiple devices in a home network to connect to the Internet, NAT-enabled home routers are commonly setup
  • An internet service provider typically assigns a single public IP address to a home router and specifically to the the globally network facing interface
  • The other NAT-enabled router interface facing the home network, is assigned an IP address belonging to a private subnet eg 10.0.0/24
  • Private and local IP addresses only have meaning to devices within that particular subnet.
  • Private networks are always behind a NAT, which enables for communication between the local hosts on local networks and public internet hosts
  • All the traffic leaving the house router to the public internet, uses the public facing interface of the NAT enabled router.
  • When the home router receives network traffic, it has as destination address the IP of the public facing interface and plays a translator using NAT translation talbe.
  • Translation table that provides mapping between public IP and private IP ranges, that belongs to the internal hosts.
  • The hosts behind NAT boxes are not publicly addressable or routable.
  • Due to the NAT configurations, not possible for others to create connections to these behind NAT boxes.
  • Tools include STUN (to discover NATs) and UDP hole punching (to establish bidirectional UDP connections).

The Hourglass Shape of Internet Architecture

  • The Internet protocol stack has a layered hourglass shape.
  • Multiple network-layer protocols competed with IPv4 in the early 1990s.
  • Innovations happen most frequently at the bottom and top layers.
  • A model called the Evolutionary Architecture model, or EvoArch, that can help to study layered architectures and their evolution in a quantitative manner can explain the hourglass shape.

Evolutionary Architecture Model

  • The EvoArch model considers an abstract model of the Internet's protocol stack components
  • A protocol stack represented as a directed and acyclic network with L layers.
  • Each network protocol is represented as a node.
  • Protocol dependencies are represented as directed edges.
  • If protocol at layer one uses servies from protocol W at layer I-1, then it is represented by by edge from W, to U
  • Substrates node represent S(u),the set of nodes that U, is using their service, every node has a substrate except bottom layer.
  • The outgoing edges from a node U, are U. products represented by P(U)
  • Each Layer associated probability S(I), which refer to as layer generality.
  • Node U at layer I+1 selects independently each node of layer I, with the substrate probability
  • As we move to higher layers, layer generality decreases and lower layers protocols are most general
  • For given of protocol node U, denoted the V(U), is recursively computed based on product U
  • If competition threshold, or C, is shared, a large percentage of U's product
  • In the the model, the most competive nodes are the U, nodes at that Layer
  • The competition among nodes increases intenseley, and protocl U dies if it has comp higher value
  • In the model protocol, one new basic birth place: New node is randomly assigned to the given layer.
  • Model with "Toy Network with Four Layers" is considered, the value of each node is at a circle, the probability is at the left

EvoArch iterations

  • A discrete-time model executed over rounds
    1. introduce new nodes
    1. placing randomly and examines by top to bottom
  • 3.connect nodes that we introduced choosing substrata by choosing generality from that layer 1-1, then the product is I.
    1. update each value to each layer I
    1. We examine each layer decrease based on its current value, and remove any nodes.
    1. Execution of the model is stopped.
  • Model implies for the internet architecture, and future interenet arch. and suggests survivial of the TCP/IP at the time

Implications for the Internet Architecture and future Internet architecture

  • EvoArch helps explain the survival of TCP/IP, because the TCP/IP stack wasn't competiting with telephone networks, because it handled differeent applications
  • TCP/IP used for FTP, email and telnet, it managed to grow and increase without being threatened with telephone network first appeared.
  • A large birth rate at a layer above the waist can cause death for the protocols at that waist. IF there are not chosen the substrates by the new nodes.
  • The transer layer acts as an evolutionary shield, as more ports appear, are unkilely by new TCp adn UDPs
  • Stability is added as new products are chosen and compete.
  • EvAOch model predicts future brands and evolution of the shapes, which will lead to ossificied protocols
  • The model suggests layer functionity and try to designers to each layer, wide and general service is not compete

What are some of the ramifications of the "hourglass shape of the internet"?

  • Technologies not designed for the internet can be modified and have versions to communicate
  • Trasitioning to IPV5 has been a slow process due to the internet structure
  • Internet infrastructure uses ipV4, and has high transition cost which is reflects narrow waste consequence

Architecture Redesign

  • Researchers believe is neccessary to rethink fundamentals and decisions in design, and that clear-state approach to that is necessary

The clean-slate design as a process

  • An important aspect of new approach through clean-slate,is test deployment at appropriate facitility.
  • A facitility is needed to function, with requriement infrastructure,and reackout users and traffic.
  • In this context, clean-slate needs to viewde as deployment, in new service, and deployment for commerical interenet.
  • It is possible to create enterily new network, and which may eventually remove current
  • Most conservatice "that we current interen tis beast"
  • ""radical outcome cna be what such experiment becoems bue preint future ineternet

Redesigning the Internet architecture to optimize for control and management

  • 4D, started a clean late desigin based: netowrk objecitves, view and direct control with function and compnonnet
  • In the 4 D deicison has network traffic, the direct over current operatison a no desioc loging hard in and elements
  • The is and the data desin technology to ever improve reliablity and platmrs
  • "Greenburg [ 2005 ]"

Redesigning the Internet architecture to offer better accountability

  • Researchers proposed network “accountability” and provides IP network
  • In order to establish foundation, against behaivos of the ability associated for each entity by the response
  • Also to the addressed and improvement that could come interent AIP account
  • The AIP is used tracing actions of misbehaving hosts.
  • Describes address in unique AD; AID for network by gloablity host

Interconnecting Hosts and Networks

  • Devices help provide connectivity between hosts in the same network
  • Repeaters and Hubs operate in L1 - provide connectivity between hosts and Ethernet segments.
  • Advantage: simple and inexpensive, plus arranged in hierarchy.
  • Disadvantage: hosts can be arranged through same devices, and can compete access in link
  • Bridges and L2 Switches enable communication between no directly host connected.
  • Operate is based in MAC addresses, and forward reach reach the appropriates.
  • Router and L3 switches = devices operaate on L2 Switch
  • These routers run through routing protocols on the next protocols

Learning Bridges

  • Bridge is a device that transfers frames from an input to one or multiple outputs, and doesn't have to receive traffic for the task.
  • Learnings bridges have population and maintance table, which contaitns forwarding table, consults table forwards ports.
  • This means forwarding only on spcesific ports versus ports that the network table needs.
  • Is conderes the for topolofy. if bridge table with source Hosta and destination, it is a needed to forwaf it

Looping Problem in Bridges and the Spanning Tree Algorithm

  • In the cases of using using bridges, its fails in networks and topologies, and bridges loop forever

  • Problem: that includes "loops and problems ",by running tree spam. represanting netwrok topologoy graph

  • Every node in the graph has unique graph ID.

  • Algorithm runs in “rounds” and sends each node to neighbors with ID in "rounds "

  • AT everey Round. each node in the table needs tthat has ever recie.

  • To see more details about this tooplgyy.

  • A node stops messaging config when. it receive that the indiciate a not root

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser