Professional Documents
Culture Documents
Internet
Internet
computer hosts able to seamlessly communicate - usually through the Internet Protocol (IP) and services Enterprise Internet: An Internet within an organization Public Data Internet: Internet: Internet services made available to the public The Internet: Internet: More than 2,00,000 Internets connected together
Professional communities of all kinds - especially research and development organizations Business enterprises which specialize in providing or collecting information General public via local access providers and gateways to commercial public e-mail carriers and other kinds of networks
An international means for sharing information and encouraging development of internetrelated infrastructure and use around the world Members consists of individuals and organizations - commercial, governmental, and non-profit
e-mail:isoc@isoc.org
regional ISP
company network
Whats a protocol?
network protocols: all communication activity in Internet governed by protocols protocols define:
format and order of msgs sent and received among network entities, and actions taken on msgs transmission and receipt
Whats a protocol?
a human protocol and a computer network protocol:
Hi Hi
What is the time? TCP connection req. TCP connection reply.
Get http://www.cs.uml.edu/index.html
2:00 time
<file>
Usenet Newsgroups
Usenet is an informal network of computers that allows you to post and read messages in newsgroups that focus on specific topics.
GOPHER
Gopher also allows you to access files on the Internet. Because gopher sites do not allow graphical displays or hypertext linking, most of them are already replaced by World Wide Web sites.
IP
Ethernet(CSMA/CD) L2- DATALINK Layer PPP Network Hardware L1- PHYSICAL Layer
flow control:
sender won t overwhelm receiver
congestion control:
senders slow down sending rate when network congested
UDP - User Datagram Protocol Internet s connectionless service unreliable data transfer no flow control no congestion control
client/server model
client host requests, receives service from server e.g., WWW client (browser)/ server; email client/server
peer-peer model:
host interactions are symmetric
e.g.: teleconferencing
Types of Connection
SLIP AND PPP ACCOUNTS
All ISPs offer access to the Internet through SLIP or PPP accounts. These accounts allow you to achieve a temporary dial-up direct connection to the Internet using TCP/IP software with your computer. The speed of this kind of connection is determined by your modem speed as well as the speed at which the ISP is connected to the backbone of the Internet.
Types of Connection
INTEGRATED SERVICES DIGITAL NETWORK (ISDN) ACCOUNTS
ISDN connections achieve a permanent direct connection to the Internet through a digital telephone line. ISDN connections allow your computer to communicate at speeds up to 64000 and 128000 bps. To establish an ISDN connection one must obtain the appropriate hardware, request ISDN service (if available) from DOT, and find a local ISP that provides ISDN accounts
Types of Connection
LEASED LINE CONNECTIONS
High-speed dedicated telephone lines between your computer and an ISP can range from 14,400 bps to high speed lines that transfer 2 MBPS. Because these connections are expensive to set up and maintain, they are more often used by companies and organizations running LANs than they are by individuals. When the server on a LAN has a dedicated Internet connection, all computers on the LAN have access to all Internet resources.
INTERNET ADDRESSES
Every computer that is directly connected to the Internet has a unique Internet address. This address can be expressed as a numeric Internet Protocol (IP) address or an alphanumeric host address. Both address formats contain several parts, which are separated by dots or periods, that identify the general and specific locations of a computer.
IP ADDRESSES
Computers use IP addresses (e.g., 35.8.2.61) to identify and communicate with each other. These addresses contain four separate numbers that represent the general to specific location of a computer as you read them from left to right. You may sometimes see IP addresses but will rarely need to use them.
TCP/IP Addressing
0 7bit 10 14bit 110 21 bit 1110 28bit Multicast Address Network ID Host ID 8bit Class D 16bit Class C 24bit Class B Class A
nic.in
HOST ADDRESSES
Host addresses (e.g., burrow.cl.msu.edu) contain a combination of letters and numbers that comprise up to five parts, or domains. From left to right, these domains identify the specific to general location of a computer. The most general, or top-level, domain is located at the far right of the host address. Top-level domain names can be organizational or geographical. Geographical top-level domains are two-letter codes that represent the countries where resources are located. The geographical code for the United States, us, is rarely used. Other geographical domains include:
CH - Switzerland, e.g., swissinfo.ch CA - Canada, e.g., utoronto.ca DE - Germany, e.g., fu-berlin.de UK - United Kingdom, e.g., bbc.co.uk
HOST ADDRESSES
Organizational top-level domains are used for resources that are located within the United States and identify the types of organizations that run the computers where resources are located. These include:
GOV - government, e.g., whitehouse.gov EDU - educational, e.g., ncsu.edu COM - commercial, e.g., apple.com MIL - military, e.g., army.mil NET - networks, e.g., sura.net ORG - non-profit organizations, e.g., nypl.org
HOST ADDRESSES
As you move to the left, the next domain in the address represents the name of the organization, agency, company, etc., where the resource is maintained. For example:
The White House - whitehouse.gov New York Public Library - nypl.org North Carolina State University - ncsu.edu Southeastern University Research Association sura.net
Moving further left in the address, the next one or two domains represent the name of the computer on which the resource is stored. These names are selected by the systems operator at each location.
brownvm.brown.edu amu.up.nic.in
EMAIL ADDRESSES
When a person has an email account on a particular computer, he or she also has a username. A person's email address is the username followed by @ (the at sign), followed by the host address for the computer where the email account is located. For example, president@whitehouse.gov is the email address for the President of the United States at the White House.
IPv6 Internet 2
What is IPv6
IPv6 is the new version of the Internet Protocol. It should replace progressively the current IPv4 routing protocol which is responsible for interconnecting the gateways of the thousands of networks across the worldwide Internet.
Advantages :
I. Expanded Routing and Addressing Capabilities
II. Path control through Anycast Address III. Header Format Simplification IV. Improved Support for Options V. Quality-of-Service Capabilities VI. Authentication and Privacy Capabilities
IPng increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy and a much greater number of addressable nodes, and simpler auto-configuration of addresses. The scalability of multicast routing is improved by adding a "scope" field to multicast addresses.
IPng includes the definition of extensions which provide support for authentication, data integrity, and confidentiality. This is included as a basic element of IPng and will be included in all implementations.
Tunneling:
Carrying IPv6 packets over IPv4
Tunneling is used to carry IPv6 packets across IPv4 routed network areas. One of the requirements for tunneling is that the begin and endpoints of the tunnel are IPv6/IPv4-nodes with IPv4 compatible IPv6 addresses.
Internet 2: What is it ?
Internet2 is a collaborative effort by over 120 U.S. universities to develop advanced Internet technology and applications vital to the research and education missions of higher education. Internet2 is a project of the University Corporation for Advanced Internet Development (UCAID) and is working with industry and the federal government.
for learningware and applications related to its delivery and use in distributed instruction.
Virtual Laboratory
: A heterogeneous, distributed
problem solving environment that enables a group of researchers located around the world to work together on a common set of projects.
Network devices
Network Routers Network Gateways
Networks Routers
A router connects two or more different networks ( owned by the same organisation or different oraganisation ) When a packet arrives at the router it looks at the destination to see whether it is on one of the networks attached to it, or else it is passed to the default network.
A B default route Router
Network Gateways
A gateway has a function similar to a router but it connects networks that use different transmission mechanisms A gateway can also connect networks that use different protocols, such as TCP/IP with X.25 .
SMTP (Simple Mail Transfer Protocol) IMAP (Interactive Mail Access Protocol) POP (Post Office Protocol) UUCP (Unix to Unix Copy Protocol)
is a store-and-forward protocol. With POP, the dial-up IP user obtains an account on a system with dedicated connection (POP Server) and then connects this system with their own machine (POP Client) and transfers mail for the client.
Apart from the normal mail transactions, it is also possible to have access to other Internet tools like archie, ftp and gopher through email. The email facility may also be used more effectively by harnessing the world of mailing lists, discussion groups or LISTSERVs on almost any subject.
The growth of Internet is not a fluke or a fad, but the consequence of unleashing the power of individual creativity.
Internet is a cooperative environment and has social as well as technical aspects. It is the responsibility of all the users to ensure trust of the community :-)