history of networking

Upload: ami-singh

Post on 07-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 History of Networking

    1/43

    History of Networking

    The existence of todays network is due to thecontinuous evolution in computer technology.

    The first computers built in the 1950s were very bulkyand expensive and intended only for Government orUniversity use. They were not intended for interactivework between business users, nor were they used inthe packet-processing mode. As a rule, they werebuilt on a mainframe basis - a powerful and reliableroom sized server with a universal purpose. Usersprepared punch cards containing data and programcommands then transferred them to the computerservice bureau. The operators then entered thesecards into the computer, and the users receivedresults after some waiting. The overall performance ofthis expensive process (called batch jobs) was crucialto the accurate performance of its users.

    In the beginning of the 1960s, simultaneously with thedecrease of the prices of processors, businesscomputerusage appeared, which took into accountthe interests of business needs and interactive multi-terminal systems for workload division. Several usersshared the mainframes resources at a time. Eachuser could work individually with the mainframethrough a terminal. The mainframes reaction timewas so quick that the user almost did not notice theparallel work with other users. With this concept, thecomputing capacity remained centralized, but some ofits functions became distributed. These multi-terminal

    http://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htm
  • 8/3/2019 History of Networking

    2/43

    systems became the ancestors of a new widelydeveloping technology, thin clients, through which allinformation processing is carried out by one powerful

    computer, and the actual input/output operationsperformed by terminal stations having a minimalconfiguration of hardware and software.

    In modern networks, the information processing isdivided between either clients or servers. This modelrefers to the client server relationship. The server is

    the one specialized powerful computer that providesthe information that the client computers require. Theclient is the computer initiating the inquiry. Thisconcept causes concern in relation to softwaresharing, as some OSs require that one computer hasto be the server, and all computers in the networkcalled the clients. In addition, peer-to-peer networksexist where computer can be both client and/or

    server.

    The multi-terminal systems become a first step on thepath of creating the modern network, however, therequirement that the terminals be connected withdistant computers has gradually appeared, and thecommunications through telephone networks nowcomes through modems. (Even though the originalmeaning of modem meant modulator/demodulator,which is not performed in a straight digital connection,the devices used in xDSL and cable access are stillcalled modems). The need for an automatic exchangeof data had appeared. This mechanism relied on an

    http://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htm
  • 8/3/2019 History of Networking

    3/43

    exchange offiles, synchronizing databases, andelectronic mail between computers, (with theexception of the computer acting as the connection

    terminal). The entire network services mentionedbecame traditional needs.

    In the beginning of the1970s there was a lull incomputer development, and then large-scaleintegrated circuits appeared. (Up to this time,individual processors for each task were the norm, i.e.

    a processor for math functions, a processor for logicfunctions, etc.) The low cost and high functionality ofthe new integrated chips resulted in the creation ofthe mini-computer, which became the real competitorto the mainframe. Ten mini-computers carried out atask in parallel faster then one mainframe and had ontop a lower overall cost.

    Users now begin to realize that they would like toaccept and transfer data with neighboring computers,which started the first stages of local networks.Companies thus began connecting users to eachother, creating the first Peer-to Peer LANs. LAN(Local Area Network) is a group of workstations,PDA's (Personal Digital Assistant), terminals, printers,and other devices, incorporated into sharing a high-speed data medium that covers a relatively smallgeographic area.

    http://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htmhttp://www.certiguide.com/apfr/cg_apfr_HistoryofNetworking.htm
  • 8/3/2019 History of Networking

    4/43

    Types of networks

    Different types of networks

    Different types of (private) networks are distinguished

    based on their size (in terms of the number of machines),

    their data transfer speed, and their reach. Private networks

    are networks that belong to a single organisation. There are

    usually said to be three categories of networks:

    LAN (local area network)

    MAN (metropolitan area network) WAN (wide area network)

    There are two other types of networks: TANs (Tiny Area

    Network), which are the same as LANs but smaller (2 to 3

    machines), and CANs (Campus Area Networks), which are

    the same as MANs (with bandwidth limited between each

    of the network's LANs).

    LAN

    LANstands forLocal Area Network. It's a group ofcomputers which all belong to the same organisation, and

    which are linked within a small geographic area using a

    network, and often the same technology (the most

    widespread being Ethernet).

    A local area network is a network in its simplest form. Datatransfer speeds over a local area network can reach up to 10

    Mbps (such as for an Ethernet network) and 1 Gbps (as

    with FDDI orGigabit Ethernet). A local area network can

    reach as many as 100, or even 1000, users.

    http://en.kioskea.net/contents/initiation/types.php3#LANhttp://en.kioskea.net/contents/initiation/types.php3#MANhttp://en.kioskea.net/contents/initiation/types.php3#WANhttp://en.kioskea.net/contents/technologies/ethernet.php3http://en.kioskea.net/contents/technologies/ethernet.php3http://en.kioskea.net/contents/technologies/fddi.php3http://en.kioskea.net/contents/technologies/ethernet.php3http://en.kioskea.net/contents/initiation/types.php3#LANhttp://en.kioskea.net/contents/initiation/types.php3#MANhttp://en.kioskea.net/contents/initiation/types.php3#WANhttp://en.kioskea.net/contents/technologies/ethernet.php3http://en.kioskea.net/contents/technologies/ethernet.php3http://en.kioskea.net/contents/technologies/fddi.php3http://en.kioskea.net/contents/technologies/ethernet.php3
  • 8/3/2019 History of Networking

    5/43

    By expanding the definition of a LAN to the services that it

    provides, two different operating modes can be defined:

    In a "peer-to-peer" network, in which communication

    is carried out from one computer to another, without acentral computer, and where each computer has the

    same role.

    in a "client/server" environment, in which a central

    computer provides network services to users.

    MANs

    MANs (Metropolitan Area Networks) connect multiplegeographically nearby LANs to one another (over an area

    of up to a few dozen kilometres) at high speeds. Thus, a

    MAN lets two remote nodes communicate as if they were

    part of the same local area network.

    A MAN is made from switches or routers connected to one

    another with high-speed links (usually fibre optic cables).

    WANs

    A WAN (Wide Area Network or extended network)

    connects multiple LANs to one another over great

    geographic distances.

    The speed available on a WAN varies depending on the

    cost of the connections (which increases with distance) and

    may be low.WANs operate using routers, which can "choose" the most

    appropriate path for data to take to reach a network node.

    The most well-known WAN is the Internet.

    http://en.kioskea.net/contents/initiation/peer.php3http://en.kioskea.net/contents/initiation/client.php3http://en.kioskea.net/contents/lan/routeurs.php3http://en.kioskea.net/contents/lan/routeurs.php3http://en.kioskea.net/contents/initiation/peer.php3http://en.kioskea.net/contents/initiation/client.php3http://en.kioskea.net/contents/lan/routeurs.php3http://en.kioskea.net/contents/lan/routeurs.php3
  • 8/3/2019 History of Networking

    6/43

    Diagram of different network topologies

    Diagram of different network topologies.

    In computer networking, topology refers to the layout of

    connected devices.

    Network topology is defined as the interconnection of thevarious elements (links, nodes, etc.) of a computer network.[1][2] Network Topologies can be physical or logical.

    Physical Topology means the physical design of a network

    including the devices, location and cable installation.

    Logical topology refers to the fact that how data actually

    transfers in a network as opposed to its physical design.

    Topology can be considered as a virtual shape or structureof a network. This shape actually does not correspond to

    the actual physical design of the devices on the computer

    network. The computers on the home network can be

    arranged in a circle shape but it does not necessarily mean

    http://en.wikipedia.org/wiki/Data_linkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Network_topology#cite_note-atis-1http://en.wikipedia.org/wiki/Topologyhttp://en.wikipedia.org/wiki/Logical_topologyhttp://en.wikipedia.org/wiki/File:NetworkTopologies.pnghttp://en.wikipedia.org/wiki/Data_linkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Network_topology#cite_note-atis-1http://en.wikipedia.org/wiki/Topologyhttp://en.wikipedia.org/wiki/Logical_topology
  • 8/3/2019 History of Networking

    7/43

    that it presents a ring topology.

    Any particular network topology is determined only by the

    graphical mapping of the configuration of physical and/or

    logical connections between nodes. The study of networktopology uses graph theory. Distances between nodes,

    physical interconnections, transmission rates, and/or signal

    types may differ in two networks and yet their topologies

    may be identical.

    A Local Area Network(LAN) is one example of a network

    that exhibits both a physical topology and a logical

    topology. Any given node in the LAN has one or more links

    to one or more nodes in the network and the mapping ofthese links and nodes in a graph results in a geometrical

    shape that may be used to describe the physical topology of

    the network. Likewise, the mapping of the data flow

    between the nodes in the network determines the logical

    topology of the network. The physical and logical

    topologies may or may not be identical in any particular

    network.

    Classification of network topologies

    There are also three basic categories of network topologies:

    Physical topologies

    Signal topologies

    Logical topologies

    The terms Signal topology and logical topology are often

    used interchangeably, though there is a subtle difference

    between the two

    http://en.wikipedia.org/wiki/Graph_theoryhttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://en.wikipedia.org/w/index.php?title=Signal_topology&action=edit&redlink=1http://en.wikipedia.org/wiki/Logical_topologyhttp://en.wikipedia.org/wiki/Graph_theoryhttp://en.wikipedia.org/wiki/Local_Area_Networkhttp://en.wikipedia.org/w/index.php?title=Signal_topology&action=edit&redlink=1http://en.wikipedia.org/wiki/Logical_topology
  • 8/3/2019 History of Networking

    8/43

    Physical topologies

    The mapping of the nodes of a network and the physical

    connections between them i.e., the layout ofwiring,

    cables, the locations of nodes, and the interconnectionsbetween the nodes and the cabling or wiring system[1].

    Classification of physical topologies

    Point-to-point

    The simplest topology is a permanent link between two

    endpoints (the line in the illustration above). Switched

    point-to-point topologies are the basic model ofconventional telephony. The value of a permanent point-to-

    point network is the value of guaranteed, or nearly so,

    communications between the two endpoints. The value of

    an on-demand point-to-point connection is proportional to

    the number of potential pairs of subscribers, and has been

    expressed as Metcalfe's Law.

    Permanent (dedicated)Easiest to understand, of the variations of point-to-

    point topology, is a point-to-point communications

    channel that appears, to the user, to be permanently

    associated with the two endpoints. Children's "tin-can

    telephone" is one example, with a microphone to a

    single public address speaker is another. These are

    examples ofphysical dedicatedchannels.Within many switched telecommunications systems, it

    is possible to establish a permanent circuit. One

    example might be a telephone in the lobby of a public

    building, which is programmed to ring only the

    number of a telephone dispatcher. "Nailing down" a

    http://en.wikipedia.org/wiki/Mappinghttp://en.wikipedia.org/wiki/Wiringhttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cablinghttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Point-to-point_(telecommunications)http://en.wikipedia.org/wiki/Telephonyhttp://en.wikipedia.org/wiki/Metcalfe's_Lawhttp://en.wikipedia.org/wiki/Channel_(communications)http://en.wikipedia.org/wiki/Channel_(communications)http://en.wikipedia.org/w/index.php?title=Switched_telecommunications_systems&action=edit&redlink=1http://en.wikipedia.org/wiki/Mappinghttp://en.wikipedia.org/wiki/Wiringhttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cablinghttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Point-to-point_(telecommunications)http://en.wikipedia.org/wiki/Telephonyhttp://en.wikipedia.org/wiki/Metcalfe's_Lawhttp://en.wikipedia.org/wiki/Channel_(communications)http://en.wikipedia.org/wiki/Channel_(communications)http://en.wikipedia.org/w/index.php?title=Switched_telecommunications_systems&action=edit&redlink=1
  • 8/3/2019 History of Networking

    9/43

    switched connection saves the cost of running a

    physical circuit between the two points. The resources

    in such a connection can be released when no longer

    needed, for example, a television circuit from a paraderoute back to the studio.

    Switched:

    Using circuit-switching orpacket-switching

    technologies, a point-to-point circuit can be set up

    dynamically, and dropped when no longer needed.

    This is the basic mode of conventional telephony.

    Bus TopologyIn local area networks where bus topology is used,

    each machine is connected to a single cable. Each

    computer or server is connected to the single bus cable

    through some kind of connector. A terminator is

    required at each end of the bus cable to prevent the

    signal from bouncing back and forth on the bus cable.

    A signal from the source travels in both directions toall machines connected on the bus cable until it finds

    the MAC address or IP address on the network that is

    the intended recipient. If the machine address does not

    match the intended address for the data, the machine

    ignores the data. Alternatively, if the data does match

    the machine address, the data is accepted. Since the

    bus topology consists of only one wire, it is rather

    inexpensive to implement when compared to other

    topologies. However, the low cost of implementing the

    technology is offset by the high cost of managing the

    network. Additionally, since only one cable is utilized,

    it can be the single point of failure. If the network

    http://en.wikipedia.org/wiki/Circuit-switchinghttp://en.wikipedia.org/wiki/Packet-switchinghttp://en.wikipedia.org/wiki/Circuit-switchinghttp://en.wikipedia.org/wiki/Packet-switching
  • 8/3/2019 History of Networking

    10/43

    cable breaks, the entire network will be down.

    Linear bus

    The type of network topology in which all of the

    nodes of the network are connected to a commontransmission medium which has exactly two endpoints

    (this is the 'bus', which is also commonly referred to as

    thebackbone, ortrunk) all data that is transmitted

    between nodes in the network is transmitted over this

    common transmission medium and is able to be

    received by all nodes in the network virtually

    simultaneously (disregardingpropagation delays)[1].

    Note: The two endpoints of the common transmissionmedium are normally terminated with a device called

    a terminatorthat exhibits the characteristic impedance

    of the transmission medium and which dissipates or

    absorbs the energy that remains in the signal to

    prevent the signal from being reflected or propagated

    back onto the transmission medium in the opposite

    direction, which would cause interference with anddegradation of the signals on the transmission medium

    (See Electrical termination).

    Distributed bus

    The type of network topology in which all of the

    nodes of the network are connected to a common

    transmission medium which has more than two

    endpoints that are created by adding branches to the

    main section of the transmission medium the

    physical distributed bus topology functions in exactly

    the same fashion as the physical linear bus topology

    (i.e., all nodes share a common transmission medium).

    Notes:

    http://en.wikipedia.org/wiki/Backbone_networkhttp://en.wikipedia.org/wiki/Trunk_(telecommunications)http://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Transmittedhttp://en.wikipedia.org/wiki/Receiver_(Information_Theory)http://en.wikipedia.org/wiki/Propagation_delayhttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Electrical_terminationhttp://en.wikipedia.org/wiki/Electrical_impedancehttp://en.wikipedia.org/wiki/Electrical_terminationhttp://en.wikipedia.org/wiki/Backbone_networkhttp://en.wikipedia.org/wiki/Trunk_(telecommunications)http://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Transmittedhttp://en.wikipedia.org/wiki/Receiver_(Information_Theory)http://en.wikipedia.org/wiki/Propagation_delayhttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Electrical_terminationhttp://en.wikipedia.org/wiki/Electrical_impedancehttp://en.wikipedia.org/wiki/Electrical_termination
  • 8/3/2019 History of Networking

    11/43

    1.) All of the endpoints of the common transmission

    medium are normally terminated with a device called

    a 'terminator' (see the note under linear bus).

    2.) The physical linear bus topology is sometimesconsidered to be a special case of the physical

    distributed bus topology i.e., a distributed bus with

    no branching segments.

    3.) The physical distributed bus topology is sometimes

    incorrectly referred to as a physical tree topology

    however, although the physical distributed bus

    topology resembles the physical tree topology, it

    differs from the physical tree topology in that there isno central node to which any other nodes are

    connected, since this hierarchical functionality is

    replaced by the common bus.

    Star topology

    In local area networks with a star topology, each network

    host is connected to a central hub. In contrast to the bus

    topology, the star topology connects each node to the hub

    with a point-to-point connection. All traffic that transverses

    http://en.wikipedia.org/wiki/Network_topology#linear_bus_notehttp://en.wikipedia.org/wiki/File:NetworkTopology-Star.pnghttp://en.wikipedia.org/wiki/File:NetworkTopology-Star.pnghttp://en.wikipedia.org/wiki/Network_topology#linear_bus_note
  • 8/3/2019 History of Networking

    12/43

    the network passes through the central hub. The hub acts as

    a signal booster or repeater. The star topology is considered

    the easiest topology to design and implement. An

    advantage of the star topology is the simplicity of addingadditional nodes. The primary disadvantage of the star

    topology is that the hub represents a single point of failure.

    Notes

    A point-to-point link (described above) is sometimes

    categorized as a special instance of the physical star

    topology therefore, the simplest type of network thatis based upon the physical star topology would consist

    of one node with a single point-to-point link to a

    second node, the choice of which node is the 'hub' and

    which node is the 'spoke' being arbitrary[1].

    After the special case of the point-to-point link, as in

    note 1.) above, the next simplest type of network that

    is based upon the physical star topology would consistof one central node the 'hub' with two separate

    point-to-point links to two peripheral nodes the

    'spokes'.

    Although most networks that are based upon the

    physical star topology are commonly implemented

    using a special device such as a hub orswitch as the

    central node (i.e., the 'hub' of the star), it is alsopossible to implement a network that is based upon the

    physical star topology using a computer or even a

    simple common connection point as the 'hub' or

    central node however, since many illustrations of the

    http://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Network_hubhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Network_topology#cite_note-Groth-0http://en.wikipedia.org/wiki/Network_hubhttp://en.wikipedia.org/wiki/Network_switch
  • 8/3/2019 History of Networking

    13/43

    physical star network topology depict the central node

    as one of these special devices, some confusion is

    possible, since this practice may lead to the

    misconception that a physical star network requiresthe central node to be one of these special devices,

    which is not true because a simple network consisting

    of three computers connected as in note 2.) above also

    has the topology of the physical star.

    Star networks may also be described as either

    broadcast multi-access ornonbroadcast multi-access

    (NBMA), depending on whether the technology of thenetwork either automatically propagates a signal at the

    hub to all spokes, or only addresses individual spokes

    with each communication.

    Extended star

    A type of network topology in which a network that is

    based upon the physical star topology has one or morerepeaters between the central node (the 'hub' of the star)

    and the peripheral or 'spoke' nodes, the repeaters being used

    to extend the maximum transmission distance of the point-

    to-point links between the central node and the peripheral

    nodes beyond that which is supported by the transmitter

    power of the central node or beyond that which is

    supported by the standard upon which the physical layer of

    the physical star network is based.

    If the repeaters in a network that is based upon the physical

    extended star topology are replaced with hubs or switches,

    then a hybrid network topology is created that is referred to

    as a physical hierarchical star topology, although some

    http://en.wikipedia.org/w/index.php?title=Broadcast_multi-access&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Nonbroadcast_multi-access&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Broadcast_multi-access&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Nonbroadcast_multi-access&action=edit&redlink=1
  • 8/3/2019 History of Networking

    14/43

    texts make no distinction between the two topologies.

    Distributed Star

    A type of network topology that is composed of individualnetworks that are based upon the physical star topology

    connected together in a linear fashion i.e., 'daisy-chained'

    with no central or top level connection point (e.g., two or

    more 'stacked' hubs, along with their associated star

    connected nodes or 'spokes').

    Ring topology

    Ring network topology

    In local area networks where the ring topology is used,

    each computer is connected to the network in a closed

    loop or ring. Each machine or computer has a uniqueaddress that is used for identification purposes. The

    signal passes through each machine or computer

    connected to the ring in one direction. Ring topologies

    typically utilize a token passing scheme, used to

    control access to the network. By utilizing this

    http://en.wikipedia.org/wiki/File:NetworkTopology-Ring.pnghttp://en.wikipedia.org/wiki/File:NetworkTopology-Ring.png
  • 8/3/2019 History of Networking

    15/43

    scheme, only one machine can transmit on the

    network at a time. The machines or computers

    connected to the ring act as signal boosters or

    repeaters which strengthen the signals that transversethe network. The primary disadvantage of ring

    topology is the failure of one machine will cause the

    entire network to fail

    Mesh topology

    The value of fully meshed networks is proportional to the

    exponent of the number of subscribers, assuming that

    communicating groups of any two endpoints, up to andincluding all the endpoints, is approximated by Reed's Law.

    Fully connected mesh topology

    Fully connected

    Note: The physical fully connected mesh topology is

    generally too costly and complex for practical

    networks, although the topology is used when there

    are only a small number of nodes to be interconnected.

    http://en.wikipedia.org/wiki/Reed's_Lawhttp://en.wikipedia.org/wiki/Fully-connected_networkhttp://en.wikipedia.org/wiki/File:NetworkTopology-FullyConnected.pnghttp://en.wikipedia.org/wiki/File:NetworkTopology-FullyConnected.pnghttp://en.wikipedia.org/wiki/Reed's_Lawhttp://en.wikipedia.org/wiki/Fully-connected_network
  • 8/3/2019 History of Networking

    16/43

    Partially connected mesh topology

    Partially connected

    The type of network topology in which some of the

    nodes of the network are connected to more than one

    other node in the network with a point-to-point link this makes it possible to take advantage of some of the

    redundancy that is provided by a physical fully

    connected mesh topology without the expense and

    complexity required for a connection between every

    node in the network.

    Note: In most practical networks that are based upon

    the physical partially connected mesh topology, all of

    the data that is transmitted between nodes in thenetwork takes the shortest path (or an approximation

    of the shortest path) between nodes, except in the case

    of a failure or break in one of the links, in which case

    the data takes an alternative path to the destination.

    This requires that the nodes of the network possess

    some type of logical 'routing' algorithm to determine

    the correct path to use at any particular time.Tree

    http://en.wikipedia.org/wiki/Tree_topologyhttp://en.wikipedia.org/wiki/File:NetworkTopology-Mesh.pnghttp://en.wikipedia.org/wiki/File:NetworkTopology-Mesh.pnghttp://en.wikipedia.org/wiki/Tree_topology
  • 8/3/2019 History of Networking

    17/43

    Tree network topology

    Also known as a hierarchical network.

    The type of network topology in which a central 'root' node

    (the top level of the hierarchy) is connected to one or more

    other nodes that are one level lower in the hierarchy (i.e.,

    the second level) with a point-to-point link between each of

    the second level nodes and the top level central 'root' node,

    while each of the second level nodes that are connected to

    the top level central 'root' node will also have one or more

    other nodes that are one level lower in the hierarchy (i.e.,

    the third level) connected to it, also with a point-to-point

    link, the top level central 'root' node being the only node

    that has no other node above it in the hierarchy (Thehierarchy of the tree is symmetrical.) Each node in the

    network having a specific fixed number, of nodes

    connected to it at the next lower level in the hierarchy, the

    number, being referred to as the 'branching factor' of the

    hierarchical tree.

    1.) A network that is based upon the physical

    hierarchical topology must have at least three levels inthe hierarchy of the tree, since a network with a

    central 'root' node and only one hierarchical level

    below it would exhibit the physical topology of a star.

    2.) A network that is based upon the physical

    hierarchical topology and with a branching factor of 1

    http://en.wikipedia.org/wiki/File:NetworkTopology-Tree.png
  • 8/3/2019 History of Networking

    18/43

    would be classified as a physical linear topology.

    3.) The branching factor, f, is independent of the total

    number of nodes in the network and, therefore, if the

    nodes in the network require ports for connection toother nodes the total number of ports per node may be

    kept low even though the total number of nodes is

    large this makes the effect of the cost of adding ports

    to each node totally dependent upon the branching

    factor and may therefore be kept as low as required

    without any effect upon the total number of nodes that

    are possible.

    4.) The total number of point-to-point links in anetwork that is based upon the physical hierarchical

    topology will be one less than the total number of

    nodes in the network.

    5.) If the nodes in a network that is based upon the

    physical hierarchical topology are required to perform

    any processing upon the data that is transmitted

    between nodes in the network, the nodes that are athigher levels in the hierarchy will be required to

    perform more processing operations on behalf of other

    nodes than the nodes that are lower in the hierarchy.

    Such a type of network topology is very useful and

    highly recommended.

    Signal topology

    The mapping of the actual connections between the nodes

    of a network, as evidenced by the path that the signals take

    when propagating between the nodes.

    Note: The term 'signal topology' is often used

  • 8/3/2019 History of Networking

    19/43

    synonymously with the term 'logical topology',

    however, some confusion may result from this practice

    in certain situations since, by definition, the term

    'logical topology' refers to the apparent path that thedata takes between nodes in a network while the term

    'signal topology' generally refers to the actual path that

    the signals (e.g., optical, electrical, electromagnetic,

    etc.) take when propagating between nodes.

    Logical topology

    The logical topology, in contrast to the "physical", is

    the way that the signals act on the network media, or

    the way that the data passes through the network fromone device to the next without regard to the physical

    interconnection of the devices. A network's logical

    topology is not necessarily the same as its physical

    topology. For example, twisted pair Ethernet is a

    logical bus topology in a physical star topology layout.

    While IBM's Token Ring is a logical ring topology, it

    is physically set up in a star topology.Email

    Electronic mail, most commonly abbreviated email, is a

    method of exchanging digital messages across the Internet

    or othercomputer networks. E-mail systems are based on a

    http://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/File:@@@.svghttp://en.wikipedia.org/wiki/File:@@@.svghttp://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_network
  • 8/3/2019 History of Networking

    20/43

    store-and-forward model in which e-mail server computer

    systems accept, forward, deliver and store messages on

    behalf of users, who only need to connect to the e-mail

    infrastructure, typically an e-mail server, with a network-enabled device for the duration of message submission or

    retrieval. Originally, e-mail was always transmitted directly

    from one user's device to another's, but because that

    required both computers to be online at the same time, this

    is rarely the case nowadays.

    An electronic mail message consists of two components,

    the message header, and the message body, which is the

    email's content. The message header contains controlinformation, including, minimally, an originator's email

    address and one or more recipient addresses. Usually

    additional information is added, such as a subject header

    field.

    Originally a text-only communications medium, email was

    extended to carry multi-media content attachments, which

    were standardized in with RFC 2045 through RFC 2049,collectively called, Multipurpose Internet Mail Extensions

    (MIME).

    The foundation for today's global Internet e-mail service

    was created in the early ARPANET and standards for

    encoding of messages were proposed as early as 1973

    (RFC 561). An e-mail sent in the early 1970s looked very

    similar to one sent on the Internet today. Conversion from

    the ARPANET to the Internet in the early 1980s produced

    the core of the current service.

    Network-based e-mail was initially exchanged on the

    ARPANET in extensions to the File Transfer Protocol

    (FTP), but is today carried by the Simple Mail Transfer

    http://en.wikipedia.org/wiki/Store-and-forwardhttp://en.wikipedia.org/wiki/Server_computerhttp://en.wikipedia.org/wiki/E-mail_serverhttp://en.wikipedia.org/wiki/Email_addresshttp://en.wikipedia.org/wiki/Email_addresshttp://tools.ietf.org/html/rfc2045http://tools.ietf.org/html/rfc2049http://en.wikipedia.org/wiki/Multipurpose_Internet_Mail_Extensionshttp://en.wikipedia.org/wiki/ARPANEThttp://tools.ietf.org/html/rfc561http://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Store-and-forwardhttp://en.wikipedia.org/wiki/Server_computerhttp://en.wikipedia.org/wiki/E-mail_serverhttp://en.wikipedia.org/wiki/Email_addresshttp://en.wikipedia.org/wiki/Email_addresshttp://tools.ietf.org/html/rfc2045http://tools.ietf.org/html/rfc2049http://en.wikipedia.org/wiki/Multipurpose_Internet_Mail_Extensionshttp://en.wikipedia.org/wiki/ARPANEThttp://tools.ietf.org/html/rfc561http://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
  • 8/3/2019 History of Networking

    21/43

    Protocol (SMTP), first published as Internet standard 10

    (RFC 821) in 1982. In the process of transporting e-mail

    messages between systems, SMTP communicates delivery

    parameters using a message envelope separately from themessage (header and body) itself.

    Origin

    Electronic mail predates the inception of the Internet, and

    was in fact a crucial tool in creating it.

    MIT first demonstrated the Compatible Time-Sharing

    System (CTSS) in 1961.[17] It allowed multiple users to loginto the IBM 7094[18] from remote dial-up terminals, and to

    store files online on disk. This new ability encouraged users

    to share information in new ways. E-mail started in 1965 as

    a way for multiple users of a time-sharingmainframe

    computerto communicate. Although the exact history is

    murky, among the first systems to have such a facility were

    SDC'sQ32 and MIT's CTSS.

    Host-based mail systems

    The original email systems allowed communication only

    between users who logged into the one host or

    "mainframe", but this could be hundreds or thousands of

    users within a company or university. By 1966 (or earlier, it

    is possible that the SAGE system had something similarsome time before), such systems allowed email between

    different companies as long as they ran compatible

    operating systems, but not to other dissimilar systems.

    Examples include BITNET, IBM PROFS, Digital

    http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Internet_standardhttp://tools.ietf.org/html/rfc821http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Massachusetts_Institute_of_Technologyhttp://en.wikipedia.org/wiki/Compatible_Time-Sharing_Systemhttp://en.wikipedia.org/wiki/Compatible_Time-Sharing_Systemhttp://en.wikipedia.org/wiki/E-mail#cite_note-16http://en.wikipedia.org/wiki/IBM_7094http://en.wikipedia.org/wiki/E-mail#cite_note-17http://en.wikipedia.org/wiki/E-mail#cite_note-17http://en.wikipedia.org/wiki/Time-sharinghttp://en.wikipedia.org/wiki/Mainframe_computerhttp://en.wikipedia.org/wiki/Mainframe_computerhttp://en.wikipedia.org/wiki/System_Development_Corporationhttp://en.wikipedia.org/wiki/Q32http://en.wikipedia.org/wiki/Semi_Automatic_Ground_Environmenthttp://en.wikipedia.org/wiki/BITNEThttp://en.wikipedia.org/wiki/IBM_PROFShttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Internet_standardhttp://tools.ietf.org/html/rfc821http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Massachusetts_Institute_of_Technologyhttp://en.wikipedia.org/wiki/Compatible_Time-Sharing_Systemhttp://en.wikipedia.org/wiki/Compatible_Time-Sharing_Systemhttp://en.wikipedia.org/wiki/E-mail#cite_note-16http://en.wikipedia.org/wiki/IBM_7094http://en.wikipedia.org/wiki/E-mail#cite_note-17http://en.wikipedia.org/wiki/Time-sharinghttp://en.wikipedia.org/wiki/Mainframe_computerhttp://en.wikipedia.org/wiki/Mainframe_computerhttp://en.wikipedia.org/wiki/System_Development_Corporationhttp://en.wikipedia.org/wiki/Q32http://en.wikipedia.org/wiki/Semi_Automatic_Ground_Environmenthttp://en.wikipedia.org/wiki/BITNEThttp://en.wikipedia.org/wiki/IBM_PROFShttp://en.wikipedia.org/wiki/Digital_Equipment_Corporation
  • 8/3/2019 History of Networking

    22/43

    Equipment CorporationALL-IN-1 and the original Unix

    mail.

    LAN-based mail systemsFrom the early 1980s networkedpersonal computers on

    LANs became increasingly important. Serverbased

    systems similar to the earlier mainframe systems

    developed, and again initially allowed communication only

    between users logged into the same server infrastructure,

    but these also could generally be linked between different

    companies as long as they ran the same email system and

    (proprietary) protocol.Examples include cc:Mail, WordPerfect Office, Microsoft

    Mail, Banyan VINES and Lotus Notes - with various

    vendors supplying gateway software to link these

    incompatible systems

    The rise of ARPANET mail

    The ARPANET computer networkmade a largecontribution to the development of e-mail. There is one

    report that indicates experimental inter-system e-mail

    transfers began shortly after its creation in 1969.[20]Ray

    Tomlinson is credited by some as having sent the first

    email, initiating the use of the "@" sign to separate the

    names of the user and the user's machine in 1971, when he

    sent a message from one Digital Equipment Corporation

    DEC-10 computer to another DEC-10. The two machines

    were placed next to each other.[21][22] The ARPANET

    significantly increased the popularity of e-mail, and it

    became the killer app of the ARPANET.

    Most other networks had their own email protocols and

    http://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/ALL-IN-1http://en.wikipedia.org/wiki/Mail_(Unix)http://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/LANhttp://en.wikipedia.org/wiki/Server_computerhttp://en.wikipedia.org/wiki/Cc:Mailhttp://en.wikipedia.org/wiki/WordPerfect_Officehttp://en.wikipedia.org/wiki/Microsoft_Mailhttp://en.wikipedia.org/wiki/Microsoft_Mailhttp://en.wikipedia.org/wiki/Banyan_VINEShttp://en.wikipedia.org/wiki/Lotus_Noteshttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/E-mail#cite_note-19http://en.wikipedia.org/wiki/Ray_Tomlinsonhttp://en.wikipedia.org/wiki/Ray_Tomlinsonhttp://en.wikipedia.org/wiki/At_signhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/DEC-10http://en.wikipedia.org/wiki/E-mail#cite_note-20http://en.wikipedia.org/wiki/E-mail#cite_note-21http://en.wikipedia.org/wiki/Killer_applicationhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/ALL-IN-1http://en.wikipedia.org/wiki/Mail_(Unix)http://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/LANhttp://en.wikipedia.org/wiki/Server_computerhttp://en.wikipedia.org/wiki/Cc:Mailhttp://en.wikipedia.org/wiki/WordPerfect_Officehttp://en.wikipedia.org/wiki/Microsoft_Mailhttp://en.wikipedia.org/wiki/Microsoft_Mailhttp://en.wikipedia.org/wiki/Banyan_VINEShttp://en.wikipedia.org/wiki/Lotus_Noteshttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/E-mail#cite_note-19http://en.wikipedia.org/wiki/Ray_Tomlinsonhttp://en.wikipedia.org/wiki/Ray_Tomlinsonhttp://en.wikipedia.org/wiki/At_signhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/DEC-10http://en.wikipedia.org/wiki/E-mail#cite_note-20http://en.wikipedia.org/wiki/E-mail#cite_note-21http://en.wikipedia.org/wiki/Killer_application
  • 8/3/2019 History of Networking

    23/43

    address formats; as the influence of the ARPANET and

    later the Internet grew, central sites often hosted email

    gateways that passed mail between the Internet and these

    other networks. Internet email addressing is stillcomplicated by the need to handle mail destined for these

    older networks. Some well-known examples of these were

    UUCP (mostly Unix computers), BITNET (mostly IBM

    and VAX mainframes at universities), FidoNet (personal

    computers), DECNET (various networks) and CSNET a

    forerunner ofNSFNet.

    Operation overviewThe diagram to the right shows a typical sequence of

    events[23] that takes place when Alice composes a message

    using hermail user agent (MUA). She enters the e-mail

    address of her correspondent, and hits the "send" button.

    1. Her MUA formats the message in e-mail format and

    uses the Simple Mail Transfer Protocol (SMTP) to

    send the message to the local mail transfer agent

    (MTA), in this case smtp.a.org, run by Alice's

    http://en.wikipedia.org/wiki/Email_addresshttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/UUCPhttp://en.wikipedia.org/wiki/BITNEThttp://en.wikipedia.org/wiki/FidoNethttp://en.wikipedia.org/wiki/CSNEThttp://en.wikipedia.org/wiki/NSFNethttp://en.wikipedia.org/wiki/E-mail#cite_note-22http://en.wikipedia.org/wiki/Placeholder_names_in_cryptographyhttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mail_addresshttp://en.wikipedia.org/wiki/E-mail_addresshttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Mail_transfer_agenthttp://en.wikipedia.org/wiki/File:Email.svghttp://en.wikipedia.org/wiki/Email_addresshttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/UUCPhttp://en.wikipedia.org/wiki/BITNEThttp://en.wikipedia.org/wiki/FidoNethttp://en.wikipedia.org/wiki/CSNEThttp://en.wikipedia.org/wiki/NSFNethttp://en.wikipedia.org/wiki/E-mail#cite_note-22http://en.wikipedia.org/wiki/Placeholder_names_in_cryptographyhttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mail_addresshttp://en.wikipedia.org/wiki/E-mail_addresshttp://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocolhttp://en.wikipedia.org/wiki/Mail_transfer_agent
  • 8/3/2019 History of Networking

    24/43

    internet service provider(ISP).

    2. The MTA looks at the destination address provided in

    the SMTP protocol (not from the message header), in

    this case [email protected]. An Internet e-mail address is a

    string of the form localpart@exampledomain.

    The part before the @ sign is the local partof theaddress, often the username of the recipient, and the

    part after the @ sign is a domain name or a fully

    qualified domain name. The MTA resolves a domain

    name to determine the fully qualified domain name of

    the mail exchange serverin the Domain Name System(DNS).

    3. The DNS serverfor the b.org domain, ns.b.org,

    responds with any MX records listing the mail

    exchange servers for that domain, in this case

    mx.b.org, a server run by Bob's ISP.

    4. smtp.a.org sends the message to mx.b.org

    using SMTP, which delivers it to the mailbox of theuserbob.

    5. Bob presses the "get mail" button in his MUA, which

    picks up the message using the Post Office Protocol

    (POP3).

    E-mail spoofingMain article: E-mail spoofing

    E-mail spoofing occurs when the header information of an

    email is altered to make the message appear to come from a

    known or trusted source. It is often used as a ruse to collect

    http://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Usernamehttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/Fully_qualified_domain_namehttp://en.wikipedia.org/wiki/Fully_qualified_domain_namehttp://en.wikipedia.org/wiki/Mail_exchange_serverhttp://en.wikipedia.org/wiki/Domain_Name_Systemhttp://en.wikipedia.org/wiki/DNS_serverhttp://en.wikipedia.org/wiki/MX_recordhttp://en.wikipedia.org/wiki/Email_Mailboxhttp://en.wikipedia.org/wiki/Post_Office_Protocolhttp://en.wikipedia.org/wiki/E-mail_spoofinghttp://en.wikipedia.org/wiki/E-mail_spoofinghttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Usernamehttp://en.wikipedia.org/wiki/Domain_namehttp://en.wikipedia.org/wiki/Fully_qualified_domain_namehttp://en.wikipedia.org/wiki/Fully_qualified_domain_namehttp://en.wikipedia.org/wiki/Mail_exchange_serverhttp://en.wikipedia.org/wiki/Domain_Name_Systemhttp://en.wikipedia.org/wiki/DNS_serverhttp://en.wikipedia.org/wiki/MX_recordhttp://en.wikipedia.org/wiki/Email_Mailboxhttp://en.wikipedia.org/wiki/Post_Office_Protocolhttp://en.wikipedia.org/wiki/E-mail_spoofinghttp://en.wikipedia.org/wiki/E-mail_spoofing
  • 8/3/2019 History of Networking

    25/43

    personal information.

    E-mail bombing

    E-mail bombing is the intentional sending of large volumesof messages to a target address. The overloading of the

    target email address can render it unusable and can even

    cause the mail server to crash.

    Privacy concerns

    Main article: e-mail privacy

    E-mail privacy, without some security precautions, can becompromised because:

    e-mail messages are generally not encrypted.

    e-mail messages have to go through intermediate

    computers before reaching their destination, meaning

    it is relatively easy for others to intercept and read

    messages.

    many Internet Service Providers (ISP) store copies ofe-mail messages on their mail servers before they are

    delivered. The backups of these can remain for up to

    several months on their server, despite deletion from

    the mailbox.

    the "Received:"-fields and other information in the e-

    mail can often identify the sender, preventing

    anonymous communication.

    There are cryptography applications that can serve as a

    remedy to one or more of the above. For example, Virtual

    Private Networks or the Tor anonymity networkcan be

    used to encrypt traffic from the user machine to a safer

    http://en.wikipedia.org/wiki/E-mail_bombhttp://en.wikipedia.org/wiki/E-mail_privacyhttp://en.wikipedia.org/wiki/Cryptographyhttp://en.wikipedia.org/wiki/Virtual_Private_Networkhttp://en.wikipedia.org/wiki/Virtual_Private_Networkhttp://en.wikipedia.org/wiki/Tor_(anonymity_network)http://en.wikipedia.org/wiki/E-mail_bombhttp://en.wikipedia.org/wiki/E-mail_privacyhttp://en.wikipedia.org/wiki/Cryptographyhttp://en.wikipedia.org/wiki/Virtual_Private_Networkhttp://en.wikipedia.org/wiki/Virtual_Private_Networkhttp://en.wikipedia.org/wiki/Tor_(anonymity_network)
  • 8/3/2019 History of Networking

    26/43

    network while GPG, PGP, SMEmail [43] , orS/MIME can

    be used forend-to-end message encryption, and SMTP

    STARTTLS or SMTP overTransport Layer

    Security/Secure Sockets Layer can be used to encryptcommunications for a single mail hop between the SMTP

    client and the SMTP server.

    Additionally, many mail user agents do not protect logins

    and passwords, making them easy to intercept by an

    attacker. Encrypted authentication schemes such as SASL

    prevent this.

    Finally, attached files share many of the same hazards as

    those found inpeer-to-peer filesharing. Attached files maycontain trojans orviruses.

    Tracking of sent mail

    The original SMTP mail service provides limited

    mechanisms for tracking a transmitted message, and none

    for verifying that it has been delivered or read. It requires

    that each mail server must either deliver it onward or returna failure notice (bounce message), but both software bugs

    and system failures can cause messages to be lost. To

    remedy this, the IETF introduced Delivery Status

    Notifications (delivery receipts) and Message Disposition

    Notifications (return receipts); however, these are not

    universally deployed in production.

    That sequence of events applies to the majority of e-mailusers. However, there are many alternative possibilities and

    complications to the e-mail system:

    Alice or Bob may use a client connected to a corporate

    e-mail system, such as IBMLotus Notes orMicrosoft

    http://en.wikipedia.org/wiki/GNU_Privacy_Guardhttp://en.wikipedia.org/wiki/Pretty_Good_Privacyhttp://en.wikipedia.org/wiki/E-mail#cite_note-42http://en.wikipedia.org/wiki/S/MIMEhttp://en.wikipedia.org/wiki/End-to-endhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Mail_user_agenthttp://en.wikipedia.org/wiki/Simple_Authentication_and_Security_Layerhttp://en.wikipedia.org/wiki/Peer-to-peerhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Delivery_Status_Notificationhttp://en.wikipedia.org/wiki/Delivery_Status_Notificationhttp://en.wikipedia.org/wiki/Return_receipt#E-mailhttp://en.wikipedia.org/wiki/Return_receipt#E-mailhttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/Lotus_Noteshttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/GNU_Privacy_Guardhttp://en.wikipedia.org/wiki/Pretty_Good_Privacyhttp://en.wikipedia.org/wiki/E-mail#cite_note-42http://en.wikipedia.org/wiki/S/MIMEhttp://en.wikipedia.org/wiki/End-to-endhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Mail_user_agenthttp://en.wikipedia.org/wiki/Simple_Authentication_and_Security_Layerhttp://en.wikipedia.org/wiki/Peer-to-peerhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Delivery_Status_Notificationhttp://en.wikipedia.org/wiki/Delivery_Status_Notificationhttp://en.wikipedia.org/wiki/Return_receipt#E-mailhttp://en.wikipedia.org/wiki/Return_receipt#E-mailhttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/Lotus_Noteshttp://en.wikipedia.org/wiki/Microsoft
  • 8/3/2019 History of Networking

    27/43

    Exchange. These systems often have their own

    internal e-mail format and their clients typically

    communicate with the e-mail server using a vendor-

    specific, proprietary protocol. The server sends orreceives e-mail via the Internet through the product's

    Internet mail gateway which also does any necessary

    reformatting. If Alice and Bob work for the same

    company, the entire transaction may happen

    completely within a single corporate e-mail system.

    Alice may not have a MUA on her computer but

    instead may connect to a webmail service. Alice's computer may run its own MTA, so avoiding

    the transfer at step 1.

    Bob may pick up his e-mail in many ways, for

    example using the Internet Message Access Protocol,

    by logging into mx.b.org and reading it directly, or

    by using a webmail service.

    Domains usually have several mail exchange serversso that they can continue to accept mail when the main

    mail exchange server is not available.

    E-mail messages are not secure ife-mail encryption is

    not used correctly.

    Many MTAs used to accept messages for any recipient on

    the Internet and do their best to deliver them. Such MTAs

    are called open mail relays. This was very important in theearly days of the Internet when network connections were

    unreliable. If an MTA couldn't reach the destination, it

    could at least deliver it to a relay closer to the destination.

    The relay stood a better chance of delivering the message at

    http://en.wikipedia.org/wiki/Microsoft_Exchange_Serverhttp://en.wikipedia.org/wiki/Webmailhttp://en.wikipedia.org/wiki/Internet_Message_Access_Protocolhttp://en.wikipedia.org/wiki/E-mail_encryptionhttp://en.wikipedia.org/wiki/Open_mail_relayhttp://en.wikipedia.org/wiki/Microsoft_Exchange_Serverhttp://en.wikipedia.org/wiki/Webmailhttp://en.wikipedia.org/wiki/Internet_Message_Access_Protocolhttp://en.wikipedia.org/wiki/E-mail_encryptionhttp://en.wikipedia.org/wiki/Open_mail_relay
  • 8/3/2019 History of Networking

    28/43

    a later time. However, this mechanism proved to be

    exploitable by people sending unsolicited bulk e-mail and

    as a consequence very few modern MTAs are open mail

    relays, and many MTAs don't accept messages from openmail relays because such messages are very likely to be

    spam.

    Message format

    The Internet e-mail message format is defined in RFC 5322

    and a series ofRFCs, RFC 2045 through RFC 2049,

    collectively called, Multipurpose Internet Mail Extensions,

    orMIME. Although as of July 13, 2005, RFC 2822 istechnically a proposed IETF standard and the MIME RFCs

    are draft IETF standards,[24] these documents are the

    standards for the format of Internet e-mail. Prior to the

    introduction ofRFC 2822 in 2001, the format described by

    RFC 822 was the standard for Internet e-mail for nearly 20

    years; it is still the official IETF standard. The IETF

    reserved the numbers 5321 and 5322 for the updatedversions ofRFC 2821 (SMTP) and RFC 2822, as it

    previously did with RFC 821 and RFC 822, honoring the

    extreme importance of these two RFCs. RFC 822 was

    published in 1982 and based on the earlierRFC 733

    (see[25]).

    Internet e-mail messages consist of two major sections:

    Header Structured into fields such as summary,sender, receiver, and other information about the e-

    mail.

    Body The message itself as unstructured text;

    sometimes containing a signature blockat the end.

    http://en.wikipedia.org/wiki/E-mail_spamhttp://tools.ietf.org/html/rfc5322http://en.wikipedia.org/wiki/Request_for_Commentshttp://tools.ietf.org/html/rfc2045http://tools.ietf.org/html/rfc2049http://en.wikipedia.org/wiki/Multipurpose_Internet_Mail_Extensionshttp://tools.ietf.org/html/rfc2822http://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/E-mail#cite_note-23http://tools.ietf.org/html/rfc2822http://tools.ietf.org/html/rfc822http://tools.ietf.org/html/rfc2821http://tools.ietf.org/html/rfc2822http://tools.ietf.org/html/rfc821http://tools.ietf.org/html/rfc822http://tools.ietf.org/html/rfc822http://tools.ietf.org/html/rfc733http://en.wikipedia.org/wiki/E-mail#cite_note-24http://en.wikipedia.org/wiki/Field_(computer_science)http://en.wikipedia.org/wiki/Signature_blockhttp://en.wikipedia.org/wiki/E-mail_spamhttp://tools.ietf.org/html/rfc5322http://en.wikipedia.org/wiki/Request_for_Commentshttp://tools.ietf.org/html/rfc2045http://tools.ietf.org/html/rfc2049http://en.wikipedia.org/wiki/Multipurpose_Internet_Mail_Extensionshttp://tools.ietf.org/html/rfc2822http://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/E-mail#cite_note-23http://tools.ietf.org/html/rfc2822http://tools.ietf.org/html/rfc822http://tools.ietf.org/html/rfc2821http://tools.ietf.org/html/rfc2822http://tools.ietf.org/html/rfc821http://tools.ietf.org/html/rfc822http://tools.ietf.org/html/rfc822http://tools.ietf.org/html/rfc733http://en.wikipedia.org/wiki/E-mail#cite_note-24http://en.wikipedia.org/wiki/Field_(computer_science)http://en.wikipedia.org/wiki/Signature_block
  • 8/3/2019 History of Networking

    29/43

    This is exactly the same as the body of a regular letter.

    The header is separated from the body by a blank line.

    Message header

    Each message has exactly one header, which is structured

    into fields. Each field has a name and a value. RFC 5322

    specifies the precise syntax.

    Informally, each line of text in the header that begins with a

    printable characterbegins a separate field. The field name

    starts in the first character of the line and ends before the

    separator character ":". The separator is then followed bythe field value (the "body" of the field). The value is

    continued onto subsequent lines if those lines have a space

    or tab as their first character. Field names and values are

    restricted to 7-bit ASCII characters. Non-ASCII values may

    be represented using MIME encoded words.

    Header fieldsThe message header should include at least the following

    fields:

    From: The e-mail address, and optionally the name ofthe author(s). In many e-mail clients not changeable

    except through changing account settings.

    To: The e-mail address(es), and optionally name(s) ofthe message's recipient(s). Indicates primary recipients(multiple allowed), for secondary recipients see Cc:

    and Bcc: below.

    Subject: A brief summary of the topic of the message.

    Certain abbreviations are commonly used in the

    http://en.wikipedia.org/wiki/Header_(computing)http://en.wikipedia.org/wiki/Field_(computer_science)http://tools.ietf.org/html/rfc5322http://en.wikipedia.org/wiki/ASCII#ASCII_printable_charactershttp://en.wikipedia.org/wiki/ASCIIhttp://en.wikipedia.org/wiki/MIME#Encoded-Wordhttp://en.wikipedia.org/wiki/E-mail_addresshttp://en.wikipedia.org/wiki/E-mail_subject_abbreviationshttp://en.wikipedia.org/wiki/Header_(computing)http://en.wikipedia.org/wiki/Field_(computer_science)http://tools.ietf.org/html/rfc5322http://en.wikipedia.org/wiki/ASCII#ASCII_printable_charactershttp://en.wikipedia.org/wiki/ASCIIhttp://en.wikipedia.org/wiki/MIME#Encoded-Wordhttp://en.wikipedia.org/wiki/E-mail_addresshttp://en.wikipedia.org/wiki/E-mail_subject_abbreviations
  • 8/3/2019 History of Networking

    30/43

    subject, including "RE:" and "FW:".

    Date: The local time and date when the message was

    written. Like theFrom: field, many email clients fill

    this in automatically when sending. The recipient'sclient may then display the time in the format and time

    zone local to him/her.

    Message-ID: Also an automatically generated field;

    used to prevent multiple delivery and for reference in

    In-Reply-To: (see below).

    Note that the To: field is not necessarily related to the

    addresses to which the message is delivered. The actualdelivery list is supplied separately to the transport protocol,

    SMTP, which may or may not originally have been

    extracted from the header content. The "To:" field is similar

    to the addressing at the top of a conventional letter which is

    delivered according to the address on the outer envelope.

    Also note that the "From:" field does not have to be the real

    sender of the e-mail message. One reason is that it is veryeasy to fake the "From:" field and let a message seem to be

    from any mail address. It is possible to digitally sign e-

    mail, which is much harder to fake, but such signatures

    require extra programming and often external programs to

    verify. Some ISPs do not relay e-mail claiming to come

    from a domain not hosted by them, but very few (if any)

    check to make sure that the person or even e-mail address

    named in the "From:" field is the one associated with theconnection. Some ISPs apply e-mail authentication systems

    to e-mail being sent through their MTA to allow other

    MTAs to detect forged spam that might appear to come

    from them.

    http://en.wikipedia.org/wiki/E-mail_subject_abbreviationshttp://en.wikipedia.org/wiki/SMTPhttp://en.wikipedia.org/wiki/Digital_signaturehttp://en.wikipedia.org/wiki/E-mail_authenticationhttp://en.wikipedia.org/wiki/E-mail_subject_abbreviationshttp://en.wikipedia.org/wiki/SMTPhttp://en.wikipedia.org/wiki/Digital_signaturehttp://en.wikipedia.org/wiki/E-mail_authentication
  • 8/3/2019 History of Networking

    31/43

    RFC 3864 describes registration procedures for message

    header fields at the IANA; it provides forpermanent and

    provisional message header field names, including also

    fields defined for MIME, netnews, and http, andreferencing relevant RFCs. Common header fields for

    email include:

    Bcc: Blind Carbon Copy; addresses added to the

    SMTP delivery list but not (usually) listed in the

    message data, remaining invisible to other recipients.

    Cc: Carbon copy; Many e-mail clients will mark e-

    mail in your inbox differently depending on whetheryou are in the To: or Cc: list.

    Content-Type: Information about how the message is

    to be displayed, usually a MIME type.

    In-Reply-To: Message-ID of the message that this is a

    reply to. Used to link related messages together.

    Precedence: commonly with values "bulk", "junk", or

    "list"; used to indicate that automated "vacation" or"out of office" responses should not be returned for

    this mail, e.g. to prevent vacation notices from being

    sent to all other subscribers of a mailinglist.

    Received: Tracking information generated by mail

    servers that have previously handled a message, in

    reverse order (last handler first).

    References: Message-ID of the message that this is a

    reply to, and the message-id of the message theprevious was reply a reply to, etc.

    Reply-To: Address that should be used to reply to the

    message.

    Sender: Address of the actual sender acting on behalf

    http://tools.ietf.org/html/rfc3864http://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authorityhttp://www.iana.org/assignments/message-headers/perm-headers.htmlhttp://www.iana.org/assignments/message-headers/prov-headers.htmlhttp://en.wikipedia.org/wiki/Blind_Carbon_Copyhttp://en.wikipedia.org/wiki/Carbon_copyhttp://en.wikipedia.org/wiki/Content-Typehttp://en.wikipedia.org/wiki/MIMEhttp://en.wikipedia.org/wiki/Message-IDhttp://en.wikipedia.org/wiki/Message-IDhttp://tools.ietf.org/html/rfc3864http://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authorityhttp://www.iana.org/assignments/message-headers/perm-headers.htmlhttp://www.iana.org/assignments/message-headers/prov-headers.htmlhttp://en.wikipedia.org/wiki/Blind_Carbon_Copyhttp://en.wikipedia.org/wiki/Carbon_copyhttp://en.wikipedia.org/wiki/Content-Typehttp://en.wikipedia.org/wiki/MIMEhttp://en.wikipedia.org/wiki/Message-IDhttp://en.wikipedia.org/wiki/Message-ID
  • 8/3/2019 History of Networking

    32/43

    of the author listed in the From: field (secretary, list

    manager, etc.).

    Message body

    Content encoding

    E-mail was originally designed for 7-bit ASCII.[26] Much e-

    mail software is 8-bit clean but must assume it will

    communicate with 7-bit servers and mail readers. The

    MIME standard introduced character set specifiers and two

    content transfer encodings to enable transmission of non-

    ASCII data: quoted printable for mostly 7 bit content with afew characters outside that range andbase64 for arbitrary

    binary data. The 8BITMIME extension was introduced to

    allow transmission of mail without the need for these

    encodings but many mail transport agents still do not

    support it fully. In some countries, several encoding

    schemes coexist; as the result, by default, the message in a

    non-Latin alphabet language appears in non-readable form(the only exception is coincidence, when the sender and

    receiver use the same encoding scheme). Therefore, for

    international character sets, Unicode is growing in

    popularity.

    Plain text and HTML

    Most modern graphic e-mail clients allow the use of eitherplain text orHTML for the message body at the option of

    the user. HTML e-mail messages often include an

    automatically-generated plain text copy as well, for

    compatibility reasons.

    http://en.wikipedia.org/wiki/ASCIIhttp://en.wikipedia.org/wiki/E-mail#cite_note-25http://en.wikipedia.org/wiki/8-bit_cleanhttp://en.wikipedia.org/wiki/MIMEhttp://en.wikipedia.org/wiki/Quoted_printablehttp://en.wikipedia.org/wiki/Base64http://en.wikipedia.org/wiki/8BITMIMEhttp://en.wikipedia.org/wiki/Mail_transport_agenthttp://en.wikipedia.org/wiki/Character_sethttp://en.wikipedia.org/wiki/Unicodehttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/Plain_texthttp://en.wikipedia.org/wiki/HTMLhttp://en.wikipedia.org/wiki/ASCIIhttp://en.wikipedia.org/wiki/E-mail#cite_note-25http://en.wikipedia.org/wiki/8-bit_cleanhttp://en.wikipedia.org/wiki/MIMEhttp://en.wikipedia.org/wiki/Quoted_printablehttp://en.wikipedia.org/wiki/Base64http://en.wikipedia.org/wiki/8BITMIMEhttp://en.wikipedia.org/wiki/Mail_transport_agenthttp://en.wikipedia.org/wiki/Character_sethttp://en.wikipedia.org/wiki/Unicodehttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/Plain_texthttp://en.wikipedia.org/wiki/HTML
  • 8/3/2019 History of Networking

    33/43

    Advantages of HTML include the ability to include in-line

    links and images, set apart previous messages inblock

    quotes, wrap naturally on any display, use emphasis such as

    underlines and italics, and change font styles.Disadvantages include the increased size of the email,

    privacy concerns about web bugs, abuse of HTML email as

    a vector forphishing attacks and the spread ofmalicious

    software.[27]

    Some web based Mailing lists recommend that all posts be

    made in plain-text[28][29] for all the above reasons, but also

    because they have a significant number of readers using

    text-basede-mail clients such as Mutt.Some Microsofte-mail clients allow rich formatting using

    RTF, but unless the recipient is guaranteed to have a

    compatible e-mail client this should be avoided.[30]

    In order to ensure that HTML sent in an email is rendered

    properly by the recipient's client software, an additional

    header must be specified when sending: "Content-type:

    text/html". Most email programs send this headerautomatically.

    http://en.wikipedia.org/wiki/Block_quotehttp://en.wikipedia.org/wiki/Block_quotehttp://en.wikipedia.org/wiki/Underlinehttp://en.wikipedia.org/wiki/Italicshttp://en.wikipedia.org/wiki/Fonthttp://en.wikipedia.org/wiki/Web_bughttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/E-mail#cite_note-26http://en.wikipedia.org/wiki/Mailing_listhttp://en.wikipedia.org/wiki/E-mail#cite_note-27http://en.wikipedia.org/wiki/E-mail#cite_note-28http://en.wikipedia.org/wiki/Text_user_interfacehttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/Mutt_(e-mail_client)http://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/Rich_Text_Formathttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mail#cite_note-29http://en.wikipedia.org/wiki/Block_quotehttp://en.wikipedia.org/wiki/Block_quotehttp://en.wikipedia.org/wiki/Underlinehttp://en.wikipedia.org/wiki/Italicshttp://en.wikipedia.org/wiki/Fonthttp://en.wikipedia.org/wiki/Web_bughttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/E-mail#cite_note-26http://en.wikipedia.org/wiki/Mailing_listhttp://en.wikipedia.org/wiki/E-mail#cite_note-27http://en.wikipedia.org/wiki/E-mail#cite_note-28http://en.wikipedia.org/wiki/Text_user_interfacehttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/Mutt_(e-mail_client)http://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/Rich_Text_Formathttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mail#cite_note-29
  • 8/3/2019 History of Networking

    34/43

    Internet

    '

    The Internet is a global system of interconnected computer

    networks that use the standard Internet Protocol Suite

    (TCP/IP) to serve billions of users worldwide. It is a

    network of networks that consists of millions of private,

    public, academic, business, and government networks of

    local to global scope that are linked by a broad array of

    electronic and optical networking technologies. TheInternet carries a vast array ofinformation resources and

    services, most notably the inter-linked hypertext documents

    of the World Wide Web (WWW) and the infrastructure to

    support electronic mail.

    Most traditional communications media, such as telephone

    http://en.wikipedia.org/wiki/Opte_Projecthttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/File:Internet_map_1024.jpghttp://en.wikipedia.org/wiki/Opte_Projecthttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/E-mail
  • 8/3/2019 History of Networking

    35/43

    and television services, are reshaped or redefined using the

    technologies of the Internet, giving rise to services such as

    Voice over Internet Protocol (VoIP) and IPTV. Newspaper

    publishing has been reshaped into Web sites,blogging, andweb feeds. The Internet has enabled or accelerated the

    creation of new forms of human interactions through

    instant messaging, Internet forums, and social networking

    sites.

    The origins of the Internet reach back to the 1960s when

    the United States funded research projects of its military

    agencies to build robust, fault-tolerant and distributed

    computer networks. This research and a period of civilianfunding of a new U.S.backbone by theNational Science

    Foundation spawned worldwide participation in the

    development of new networking technologies and led to the

    commercialization of an international network in the mid

    1990s, and resulted in the following popularization of

    countless applications in virtually every aspect of modern

    human life. As of 2009, an estimated quarter of Earth'spopulation uses the services of the Internet.

    The Internet has no centralized governance in either

    technological implementation or policies for access and

    usage; each constituent network sets its own standards.

    Only the overreaching definitions of the two principal name

    spaces in the Internet, the Internet Protocol address space

    and the Domain Name System, are directed by a maintainer

    organization, the Internet Corporation for Assigned Names

    and Numbers (ICANN). The technical underpinning and

    standardization of the core protocols (IPv4 and IPv6) is an

    activity of the Internet Engineering Task Force (IETF), a

    non-profit organization of loosely affiliated international

    http://en.wikipedia.org/wiki/Voice_over_Internet_Protocolhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Web_sitehttp://en.wikipedia.org/wiki/Blogginghttp://en.wikipedia.org/wiki/Web_feedhttp://en.wikipedia.org/wiki/Instant_messaginghttp://en.wikipedia.org/wiki/Internet_forumhttp://en.wikipedia.org/wiki/Social_network_servicehttp://en.wikipedia.org/wiki/Social_network_servicehttp://en.wikipedia.org/wiki/Network_backbonehttp://en.wikipedia.org/wiki/National_Science_Foundationhttp://en.wikipedia.org/wiki/National_Science_Foundationhttp://en.wikipedia.org/wiki/Commercializationhttp://en.wikipedia.org/wiki/Name_spacehttp://en.wikipedia.org/wiki/Name_spacehttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Domain_Name_Systemhttp://en.wikipedia.org/wiki/Internet_Corporation_for_Assigned_Names_and_Numbershttp://en.wikipedia.org/wiki/Internet_Corporation_for_Assigned_Names_and_Numbershttp://en.wikipedia.org/wiki/IPv4http://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Voice_over_Internet_Protocolhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Web_sitehttp://en.wikipedia.org/wiki/Blogginghttp://en.wikipedia.org/wiki/Web_feedhttp://en.wikipedia.org/wiki/Instant_messaginghttp://en.wikipedia.org/wiki/Internet_forumhttp://en.wikipedia.org/wiki/Social_network_servicehttp://en.wikipedia.org/wiki/Social_network_servicehttp://en.wikipedia.org/wiki/Network_backbonehttp://en.wikipedia.org/wiki/National_Science_Foundationhttp://en.wikipedia.org/wiki/National_Science_Foundationhttp://en.wikipedia.org/wiki/Commercializationhttp://en.wikipedia.org/wiki/Name_spacehttp://en.wikipedia.org/wiki/Name_spacehttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Domain_Name_Systemhttp://en.wikipedia.org/wiki/Internet_Corporation_for_Assigned_Names_and_Numbershttp://en.wikipedia.org/wiki/Internet_Corporation_for_Assigned_Names_and_Numbershttp://en.wikipedia.org/wiki/IPv4http://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internet_Engineering_Task_Force
  • 8/3/2019 History of Networking

    36/43

    participants that anyone may associate with by contributing

    technical expertise.

    History

    Main article: History of the Internet

    The USSR's launch ofSputnikspurred the United States to

    create the Advanced Research Projects Agency (ARPA or

    DARPA) in February 1958 to regain a technological lead.[2]

    [3] ARPA created the Information Processing Technology

    Office (IPTO) to further the research of the Semi AutomaticGround Environment (SAGE) program, which had

    networked country-wide radarsystems together for the first

    time. The IPTO's purpose was to find ways to address the

    US Military's concern about survivability of their

    communications networks, and as a first step interconnect

    their computers at the Pentagon, Cheyenne Mountain, and

    SAC HQ. J. C. R. Licklider, a promoter of universal

    networking, was selected to head the IPTO. Licklidermoved from the Psycho-Acoustic Laboratory at Harvard

    University to MIT in 1950, after becoming interested in

    information technology. At MIT, he served on a committee

    that established Lincoln Laboratory and worked on the

    SAGE project. In 1957 he became a Vice President at BBN,

    where he bought the first production PDP-1 computer and

    conducted the first public demonstration oftime-sharing.

    ProfessorLeonard Kleinrockwith one of the first

    ARPANET Interface Message Processors at UCLA

    http://en.wikipedia.org/wiki/History_of_the_Internethttp://en.wikipedia.org/wiki/Soviet_Unionhttp://en.wikipedia.org/wiki/Sputnikhttp://en.wikipedia.org/wiki/DARPAhttp://en.wikipedia.org/wiki/1958_in_sciencehttp://en.wikipedia.org/wiki/Internet#cite_note-1http://en.wikipedia.org/wiki/Internet#cite_note-2http://en.wikipedia.org/wiki/Information_Processing_Technology_Officehttp://en.wikipedia.org/wiki/Information_Processing_Technology_Officehttp://en.wikipedia.org/wiki/Semi_Automatic_Ground_Environmenthttp://en.wikipedia.org/wiki/Semi_Automatic_Ground_Environmenthttp://en.wikipedia.org/wiki/Radarhttp://en.wikipedia.org/wiki/J._C._R._Lickliderhttp://en.wikipedia.org/wiki/Harvard_Universityhttp://en.wikipedia.org/wiki/Harvard_Universityhttp://en.wikipedia.org/wiki/Massachusetts_Institute_of_Technologyhttp://en.wikipedia.org/wiki/1950_in_sciencehttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Lincoln_Laboratoryhttp://en.wikipedia.org/wiki/1957_in_sciencehttp://en.wikipedia.org/wiki/BBN_Technologieshttp://en.wikipedia.org/wiki/PDP-1http://en.wikipedia.org/wiki/Time-sharinghttp://en.wikipedia.org/wiki/Leonard_Kleinrockhttp://en.wikipedia.org/wiki/Interface_Message_Processorhttp://en.wikipedia.org/wiki/File:Leonard-Kleinrock-and-IMP1.pnghttp://en.wikipedia.org/wiki/History_of_the_Internethttp://en.wikipedia.org/wiki/Soviet_Unionhttp://en.wikipedia.org/wiki/Sputnikhttp://en.wikipedia.org/wiki/DARPAhttp://en.wikipedia.org/wiki/1958_in_sciencehttp://en.wikipedia.org/wiki/Internet#cite_note-1http://en.wikipedia.org/wiki/Internet#cite_note-2http://en.wikipedia.org/wiki/Information_Processing_Technology_Officehttp://en.wikipedia.org/wiki/Information_Processing_Technology_Officehttp://en.wikipedia.org/wiki/Semi_Automatic_Ground_Environmenthttp://en.wikipedia.org/wiki/Semi_Automatic_Ground_Environmenthttp://en.wikipedia.org/wiki/Radarhttp://en.wikipedia.org/wiki/J._C._R._Lickliderhttp://en.wikipedia.org/wiki/Harvard_Universityhttp://en.wikipedia.org/wiki/Harvard_Universityhttp://en.wikipedia.org/wiki/Massachusetts_Institute_of_Technologyhttp://en.wikipedia.org/wiki/1950_in_sciencehttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Lincoln_Laboratoryhttp://en.wikipedia.org/wiki/1957_in_sciencehttp://en.wikipedia.org/wiki/BBN_Technologieshttp://en.wikipedia.org/wiki/PDP-1http://en.wikipedia.org/wiki/Time-sharinghttp://en.wikipedia.org/wiki/Leonard_Kleinrockhttp://en.wikipedia.org/wiki/Interface_Message_Processor
  • 8/3/2019 History of Networking

    37/43

    At the IPTO, Licklider's successorIvan Sutherland in 1965

    got Lawrence Roberts to start a project to make a network,

    and Roberts based the technology on the work ofPaulBaran,[4] who had written an exhaustive study for the

    United States Air Force that recommendedpacket

    switching (opposed to circuit switching) to achieve better

    network robustness and disaster survivability. Roberts had

    worked at the MIT Lincoln Laboratory originally

    established to work on the design of the SAGE system.

    UCLA professorLeonard Kleinrockhad provided the

    theoretical foundations for packet networks in 1962, andlater, in the 1970s, forhierarchical routing, concepts which

    have been the underpinning of the development towards

    today's Internet.

    Sutherland's successorRobert Taylorconvinced Roberts to

    build on his early packet switching successes and come and

    be the IPTO Chief Scientist. Once there, Roberts prepared a

    report called Resource Sharing Computer Networks whichwas approved by Taylor in June 1968 and laid the

    foundation for the launch of the working ARPANET the

    following year.

    After much work, the first two nodes of what would

    become the ARPANET were interconnected between

    Kleinrock's Network Measurement Center at the UCLA's

    School of Engineering and Applied Science and Douglas

    Engelbart's NLS system at SRI International (SRI) in

    Menlo Park, California, on October 29, 1969. The third site

    on the ARPANET was the Culler-Fried Interactive

    Mathematics centre at the University of California at Santa

    Barbara, and the fourth was the University of Utah

    http://en.wikipedia.org/wiki/Ivan_Sutherlandhttp://en.wikipedia.org/wiki/Lawrence_Roberts_(scientist)http://en.wikipedia.org/wiki/Paul_Baranhttp://en.wikipedia.org/wiki/Paul_Baranhttp://en.wikipedia.org/wiki/Internet#cite_note-3http://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/Packet_switchinghttp://en.wikipedia.org/wiki/Packet_switchinghttp://en.wikipedia.org/wiki/Circuit_switchinghttp://en.wikipedia.org/wiki/MIT_Lincoln_Laboratoryhttp://en.wikipedia.org/wiki/Leonard_Kleinrockhttp://en.wikipedia.org/wiki/Hierarchical_routinghttp://en.wikipedia.org/wiki/Robert_Taylor_(computer_scientist)http://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/Henry_Samueli_School_of_Engineering_and_Applied_Sciencehttp://en.wikipedia.org/wiki/Henry_Samueli_School_of_Engineering_and_Applied_Sciencehttp://en.wikipedia.org/wiki/Douglas_Engelbarthttp://en.wikipedia.org/wiki/Douglas_Engelbarthttp://en.wikipedia.org/wiki/SRI_Internationalhttp://en.wikipedia.org/wiki/Menlo_Park,_Californiahttp://en.wikipedia.org/wiki/University_of_Utahhttp://en.wikipedia.org/wiki/Ivan_Sutherlandhttp://en.wikipedia.org/wiki/Lawrence_Roberts_(scientist)http://en.wikipedia.org/wiki/Paul_Baranhttp://en.wikipedia.org/wiki/Paul_Baranhttp://en.wikipedia.org/wiki/Internet#cite_note-3http://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/Packet_switchinghttp://en.wikipedia.org/wiki/Packet_switchinghttp://en.wikipedia.org/wiki/Circuit_switchinghttp://en.wikipedia.org/wiki/MIT_Lincoln_Laboratoryhttp://en.wikipedia.org/wiki/Leonard_Kleinrockhttp://en.wikipedia.org/wiki/Hierarchical_routinghttp://en.wikipedia.org/wiki/Robert_Taylor_(computer_scientist)http://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/Henry_Samueli_School_of_Engineering_and_Applied_Sciencehttp://en.wikipedia.org/wiki/Henry_Samueli_School_of_Engineering_and_Applied_Sciencehttp://en.wikipedia.org/wiki/Douglas_Engelbarthttp://en.wikipedia.org/wiki/Douglas_Engelbarthttp://en.wikipedia.org/wiki/SRI_Internationalhttp://en.wikipedia.org/wiki/Menlo_Park,_Californiahttp://en.wikipedia.org/wiki/University_of_Utah
  • 8/3/2019 History of Networking

    38/43

    Graphics Department. In an early sign of future growth,

    there were already fifteen sites connected to the young

    ARPANET by the end of 1971.

    The ARPANET was one of the "eve" networks of today'sInternet. In an independent development, Donald Davies at

    the UK National Physical Laboratory also discovered the

    concept of packet switching in the early 1960s, first giving

    a talk on the subject in 1965, after which the teams in the

    new field from two sides of the Atlantic ocean first became

    acquainted. It was actually Davies' coinage of the wording

    "packet" and "packet switching" that was adopted as the

    standard terminology. Davies also built a packet switchednetwork in the UK called the Mark I in 1970. [5]

    Following the demonstration that packet switching worked

    on the ARPANET, the British Post Office, Telenet,

    DATAPAC and TRANSPAC collaborated to create the first

    international packet-switched network service. In the UK,

    this was referred to as the International Packet Switched

    Service (IPSS), in 1978. The collection ofX.25-basednetworks grew from Europe and the US to cover Canada,

    Hong Kong and Australia by 1981. The X.25 packet

    switching standard was developed in the CCITT (now

    called ITU-T) around 1976.

    http://en.wikipedia.org/wiki/Donald_Davieshttp://en.wikipedia.org/wiki/National_Physical_Laboratory_(United_Kingdom)http://en.wikipedia.org/wiki/Internet#cite_note-4http://en.wikipedia.org/wiki/General_Post_Office_(United_Kingdom)http://en.wikipedia.org/wiki/Telenethttp://en.wikipedia.org/wiki/DATAPAChttp://en.wikipedia.org/wiki/International_Packet_Switched_Servicehttp://en.wikipedia.org/wiki/International_Packet_Switched_Servicehttp://en.wikipedia.org/wiki/1978_in_sciencehttp://en.wikipedia.org/wiki/X.25http://en.wikipedia.org/wiki/Hong_Konghttp://en.wikipedia.org/wiki/ITU-Thttp://en.wikipedia.org/wiki/Donald_Davieshttp://en.wikipedia.org/wiki/National_Physical_Laboratory_(United_Kingdom)http://en.wikipedia.org/wiki/Internet#cite_note-4http://en.wikipedia.org/wiki/General_Post_Office_(United_Kingdom)http://en.wikipedia.org/wiki/Telenethttp://en.wikipedia.org/wiki/DATAPAChttp://en.wikipedia.org/wiki/International_Packet_Switched_Servicehttp://en.wikipedia.org/wiki/International_Packet_Switched_Servicehttp://en.wikipedia.org/wiki/1978_in_sciencehttp://en.wikipedia.org/wiki/X.25http://en.wikipedia.org/wiki/Hong_Konghttp://en.wikipedia.org/wiki/ITU-T
  • 8/3/2019 History of Networking

    39/43

    A plaque commemorating the birth of the Internet at

    Stanford University

    X.25 was independent of the TCP/IP protocols that arose

    from the experimental work of DARPA on the ARPANET,

    Packet Radio Net and Packet Satellite Net during the same

    time period.

    The early ARPANET ran on theNetwork Control Program

    (NCP), a standard designed and first implemented in

    December 1970 by a team called the Network WorkingGroup (NWG) led by Steve Crocker. To respond to the

    network's rapid growth as more and more locations

    connected, Vinton Cerfand Robert Kahn developed the

    first description of the now widely used TCP protocols

    during 1973 and published a paper on the subject in May

    1974. Use of the term "Internet" to describe a single global

    TCP/IP networkoriginated in December 1974 with the

    publication ofRFC 675, the first full specification of TCP

    that was written by Vinton Cerf, Yogen Dalal and Carl

    Sunshine, then at Stanford University. During the next nine

    years, work proceeded to refine the protocols and to

    implement them on a wide range of operating systems. The

    http://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/Network_Control_Programhttp://en.wikipedia.org/wiki/Steve_Crockerhttp://en.wikipedia.org/wiki/Vinton_Cerfhttp://en.wikipedia.org/wiki/Bob_Kahnhttp://en.wikipedia.org/wiki/TCP/IP_networkhttp://tools.ietf.org/html/rfc675http://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/File:Birth_of_the_Internet.jpghttp://en.wikipedia.org/wiki/File:Birth_of_the_Internet.jpghttp://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/Network_Control_Programhttp://en.wikipedia.org/wiki/Steve_Crockerhttp://en.wikipedia.org/wiki/Vinton_Cerfhttp://en.wikipedia.org/wiki/Bob_Kahnhttp://en.wikipedia.org/wiki/TCP/IP_networkhttp://tools.ietf.org/html/rfc675http://en.wikipedia.org/wiki/Stanford_University
  • 8/3/2019 History of Networking

    40/43

    first TCP/IP-based wide-area network was operational by

    January 1, 1983 when all hosts on the ARPANET were

    switched over from the older NCP protocols. In 1985, the

    United States'National Science Foundation (NSF)commissioned the construction of theNSFNET, a