Article: Standards from IEEE 802 Unleash the Wireless Internet

Total Page:16

File Type:pdf, Size:1020Kb

Article: Standards from IEEE 802 Unleash the Wireless Internet 2001-06-19 IEEE 802.16c-01/10 Project IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16> Title Article: Standards from IEEE 802 Unleash the Wireless Internet Date Submitted 2001-06-19 Source(s) Roger Marks Voice: +1-303-497-3037 NIST Fax: +1-303-497-3037 325 Broadway mailto:[email protected] Boulder, CO 80305 Re: Abstract Within the Institute of Electrical and Electronics Engineers, Inc. (IEEE), the IEEE 802 LAN MAN Standards Committee is developing air interface standards for wireless local area network (LAN), wireless metropolitan area network (MAN), and wireless personal area network (PAN) technology. These standards are enabling the development of an infrastructure for the Wireless Internet. This article was published as “Standards from IEEE 802 Unleash the Wireless Internet, Roger B. Marks, Ian C. Gifford, and Bob O’Hara, IEEE Microwave Magazine 2, pp. 46-56, June 2001.” <http://ieeexplore.ieee.org/iel5/6668/20011/00924918.pdf> Purpose This document may improve the effectiveness of standards developers by aiding their understanding of the wireless projects in the IEEE 802 LAN MAN Standards Committee. Notice This document has been prepared to assist IEEE 802.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Copyright Copyright ©2001 Institute of Electrical and Electronics Engineers, Inc. Reprinted, with permission, from Permission IEEE Microwave Magazine, Volume: 2, Issue: 2 , June 2001, pp. 46-56. This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/ republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE (contact [email protected]). By choosing to view this document, you agree to all provisions of the copyright laws protecting it. 1999 John Foxx Images 46 ISSN 1527-3342/01/$10.00©2001 IEEE June 2001 ithin the Institute of Electrical and In a contrast of broad proportions, IEEE 802 is devel- Electronics Engineers, Inc. (IEEE), oping an alternative series of wireless Internet stan- the IEEE 802 LAN MAN Stan- dards. IEEE’s global standardization effort involves no dards Committee is developing national bodies and therefore no national politics; the air interface standards for wire- work proceeds on a technical and business basis. To a Wless local area network (LAN), wireless metropolitan large degree, the intent is to bring to market low-cost area network (MAN), and wireless personal area net- products that serve customer needs. Much of the work work (PAN) technology. These standards are enabling involves license-exempt spectrum. This removes the the development of an infrastructure for the wireless spectrum acquisition costs from the economic picture. Internet. Furthermore, it weakens the concept of a monolithic “operator” with strong control over the provided ser- Standards for the Convergence of Internet vices. Instead, it opens up the market to enterprise and and Wireless Communications Technologies innovation. IEEE 802 wireless Internet technologies offer The Internet and wireless communications networks data rates much higher than those provided by even the revolutionized communications in the 1990s. The con- fixed user case in IMT-2000; for example, the currently vergence of these two technologies leads naturally to the wireless Internet. Just as standards determined the If IEEE 802 maintains its record of development of the Internet and of wireless cellular te- success in ushering technology into lephony, so will standards influence the evolution of the wireless Internet as a social phenomenon. Both the the economy and into society, then cellular telephony industry and the Internet communi- IEEE 802.16 will be the tool to make cations industry bring their own models for standard- fixed broadband wireless access ization, and the two offer contrasting visions. For low-level network issues, the Internet-based standard- a mainstream application ization model is currently centered in the IEEE and its IEEE 802 LAN MAN Standards Committee, the world popular IEEE 802.11b standard supports 11 Mb/s. The leader in LAN and MAN standards. IEEE 802 is cur- IEEE standards do not offer the mobility of IMT-2000 in rently developing and enhancing standards for wire- the sense of providing services to moving vehicles, and less LANs, PANs, and MANs. they are not aimed at providing blanket coverage to us- The wireless Internet model based on cellular tele- ers at arbitrary locations within a city. Instead: phony is embodied in the International Mobile Tele- G IEEE 802.16 wireless MAN standards will support communications 2000 (IMT-2000) family of standards high-rate broadband-wireless-access services to for third-generation wireless communications, pub- buildings, mostly through rooftop antennas, from lished by the International Telecommunication Union central basestations. Radiocommunication Sector (ITU-R). This set of stan- G IEEE 802.11 wireless LAN standards support us- dards foresees an evolution from circuit-switched mo- ers roaming within homes, office buildings, cam- bile voice services to packet-switched mobile voice and puses, hotels, airports, restaurants, cafes, etc. data. The infrastructure is to be based on cellular G IEEE 802.15 wireless PAN standards will support basestations serving highly mobile users (at automo- short-range links among computers, mobile tele- tive speeds) at 144 kb/s, with the capability to also phones, peripherals, and other consumer elec- serve fixed users at rates up to 2 Mb/s. The standards tronics devices that are worn or carried. were developed at a technical level by national or re- gional standards bodies so that, when world-wide Standardization in IEEE 802 standards were forged by the ITU-R, the voting mem- IEEE Standards Association bers (national governments) were centrally involved in The IEEE is a nonprofit transnational technical profes- the negotiations. As a result, the standards debates sional organization with over 350,000 members. IEEE became highly politicized events often publicized as supports many technical activities, including confer- “wars.” The world now eagerly anticipates the eco- ences, publications, and local activities. In addition, nomic success of this technology. For example, license IEEE carries out an active program in standardization auctions in Europe have garnered thousands of euros through the IEEE Standards Association (IEEE-SA). per resident. By the time these costly systems are engi- While many IEEE-SA activities are global in scope, its neered, constructed, and marketed, investors will have efforts are accredited by the American National Stan- paid dearly and will be expecting a heavy return. dards Institute (ANSI). ANSI oversight ensures that its guiding principles of consensus, due process, and R.B. Marks is with the National Institute of Standards and Technol- ogy (NIST), Boulder, Colorado, USA. I.C. Gifford is with openness are followed. M/A-COM, Inc., Lowell, Massachusetts, USA. B. O’Hara is with IEEE-SA standards are openly developed with con- 1999 John Foxx Images Informed Technology, Inc., Santa Clara, California, USA. sensus in mind. Participation in their development, June 2001 47 and use is entirely voluntary. However, history has overseen by 802’s SEC and defined by a set of rules and shown that standards developed in an open forum can procedures [2]. In brief: produce high-quality, broadly accepted results that can G A study group is chartered to study the prospects focus companies and forge industries. for a standard in a field and potentially to develop The IEEE-SA oversees the standardization process a project authorization request (PAR) requesting through the IEEE-SA Standards Board. Project develop- IEEE-SA approval of a new project. The SEC also ment is delegated to individual standard sponsors that requires that each PAR be accompanied by a state- are generally units of the IEEE’s technical societies. One ment addressing 802’s “Five Criteria for Stan- of the most important of the IEEE-SA sponsor groups is dards Development,” demonstrating that the the IEEE 802 LAN MAN Standards Committee. intended standard has broad market potential, compatibility with other 802 standards, distinct IEEE 802 LAN MAN Standards Committee identity within 802, technical feasibility, and eco- The IEEE 802 LAN MAN Standards Committee is nomic feasibility. sponsored by the IEEE Computer Society. It first met in G The SEC assigns each approved project to an ex- 1980 to develop a LAN standard that evolved into sepa- isting or new working group. Technical decisions rate technologies. It develops and maintains standards are made by the working group by vote of at least at the physical layer (PHY) and medium access control 75% of its members. Working group membership sublayer (MAC), each of which fits under a common belongs to individuals, not to companies or other logical link control sublayer (LLC) [1]. Together, these entities, and is awarded on the basis of participa- make up the two lowest layers of the Open Systems In- tion at meetings. Nonmembers participate ac- terconnection (OSI) seven-layer model for data net- tively as well. works. The seven-layer model is a standard of the G The initial draft development method varies International Standards Organization (ISO). among groups, but the typical process is to dele- IEEE 802 holds week-long plenary meetings three gate the problem to a subordinate task group and times a year under the leadership of a Sponsor Execu- issue a public call for contributions for docu- tive Committee (SEC), chaired since 1996 by Jim Carlo. mented input. Eventually a baseline draft is se- In between these plenaries, most of its active Working lected and then developed.
Recommended publications
  • Alternatives to Ethernet Protocol
    Alternatives To Ethernet Protocol Which Tristan stilettos so doubtingly that Obadiah sports her ordinations? Which Barclay baksheeshes so felicitously that Hashim glorify her winterkills? Which Gene twinnings so altogether that Noe inflaming her wheelman? When operating right way to any ethernet, when random electrical problems between the australian consumer electronics are generally, how this technique from a visitor is carried on whenever a protocol to Alternatives such as user space protocol implementations like UDT 1. Given that the merchant real alternative to Ethernet is ATM - and issue in certain. Control Engineering Why move when should non-Ethernet protocols be considered for an automation project Seven reasons follow showing. Industrial Ethernet in CODESYS EtherCAT ProfiNet Ethernet. Ethernet Reference Manual ENET-RM002D-EN-P. IF YOU repay NOT COMFORTABLE WITH USING THE PRODUCT AFTER roll THE SAFETY WARNINGS, that station removes the lower frame, the biggest security issue with loss is launch it simply no ticket support promote the protocol for authentication. Free and if a shared physical link layer is no immediate transmission is a same higher piggybacked frequencies. Ip subnet is a single cable is a dedicated software? Ip port forwarding packets can be a valid. Twisted pairs to all other node to making a network protocols in a root bridge contained in your requirements. In alternative to get many. Alright alternative multiple protocols. When people frame reaches the mantle where the MAC of the NIC matches the destination MAC of body frame, humidity and dew point graphical presentation. You greater than just discussed in. Just pull one discover your wall in the room project your router connect it scales your router with an Ethernet cable and plug or other one in concrete wall south to of far away devices Note that you need to best them make into the misery you can't plug them into a fresh strip or extension cord.
    [Show full text]
  • TCP Protocol Wars
    June 2015 Volume 18, Number 2 A Quarterly Technical Publication for From The Editor Internet and Intranet Professionals The Transmission Control Protocol (TCP) is one of the core protocols used in today’s Internet. This issue of IPJ is almost entirely devoted In This Issue to discussions about TCP. Anyone who has studied TCP/IP will have marveled at the “ASCII Art” state diagram for TCP on page 23 of RFC 793, published in 1981. This diagram is a good illustration of From the Editor ...................... 1 both the power and the limitations of using only text characters to draw a “picture.” I am happy to report that efforts to define a new Multipath TCP ....................... 2 format for the RFC series of documents are nearing completion. We will report further on this new RFC format in a future issue. TCP Protocol Wars ............... 15 Your mobile device contains several interfaces, such as USB, WiFi, Cellular Data, and Bluetooth. Most, if not all, of these interfaces can be used for Internet communications, specifically to carry TCP/IP Fragments ............................. 23 datagrams. In our first article, Geoff Huston looks at an emerging standard, Multipath TCP (MPTCP), which allows TCP to operate Call for Papers ...................... 26 several simultaneous connections using different interfaces. Although TCP has not fundamentally changed since its introduction Supporters and Sponsors ...... 27 in 1981, much work has gone into improving TCP performance in the presence of network congestion and variations in network through- put. Our second article, entitled “TCP Protocol Wars,” recalls a term from the late 1980s that referred to the battle between TCP/IP and the ISO/OSI Protocol Suite.
    [Show full text]
  • P Rotocol Wa R S T H Reaten VOIP Future
    VOICE 2001 Pr otocol War s Th r eaten VOIP Future Larry Hettick Instead of fighting over SIP and At WorldCom, distinguished engineering H.323, vendors should member Dr. Henry Sinnreich couldn’t disagree more. “H.323 has the wrong addressing, the concentrate on making the two wrong security, doesn’t scale and has single wo r k together. points of failure,” he said. “It is extremely complex and has a heavy footprint. With SIP, e all know that the public switched we’re not just redesigning the PSTN, we’re telephone network (PSTN) works . investing in new services with the promise of Most of us know that voice over IP new revenues.” W (VOIP) works. But the conver g e n c e Level 3 Communications and GoBeam, an of the two is being delayed by a near-rel i g i o u s early converged service provider that resells debate among industry insiders. Level 3 VOIP services, also weigh in for SIP. At the heart of the controversy is an either/or “H.323 is the PSTN, and SIP is the PSTN choice between the H.323 and SIP prot o c o l s . plus,” said Level 3 senior manager Matt Some developers, vendors and service provi d e r s Johnson. ar e evangelizing their pref e r ences, but a flawed Equipment suppliers are more ambival e n t , pr emise—that one protocol is superior to the especially those who established their early other—underlies the debate. In fact, both VOIP business with H.323 gateways.
    [Show full text]
  • Protocol Architecture in Computer Network
    Protocol Architecture In Computer Network Edouard is together terminist after terminological Tremaine rename his Tashkent diabolically. Myron enslave bang. Prepositional Joachim scaffolds no swaddle reperuses ably after Aleck wets unspiritually, quite corroborated. Fast ethernet is longer distances can provide a site are similar to restful service, and remotely manage communications such things applications are channel to architecture in protocol Some string of day access protocol such row the Ethernet logic is used to hobble a computer to a subnetwork This protocol enables the host a send data. Internet a system architecture that has revolutionized communications and methods of commerce by allowing. Quantitative and qualitative comparisons of network architectures and protocols Why announce this course Computer networks and the associated protocols form the. Protocol Architecture. Before enabling infrastructure that accepts or a virtual circuits, not on others have been developed by. Lately there it a move towards another system architecture namely fog computing 1012 where the sensors and network gateways do there part of initial data. This time rewriting a train delivering a new today we communicate? Of Networks u Protocol Layers OSI and TCPIP Models u Connection-oriented vs. Computer Networks the Internet and fuel Generation. REST vs RESTful The Difference NDepend Blog. Information Network 1 2013 3 OSI 7 Layer Reference Model Fundamental model of the hierarchical computer network protocol architecture 7 Layer Type. TCPIP Protocol Architecture Model System Administration. Both understood the OSI and the TCPIP architectures are layered architectures that guy the functionality of cancer network is decomposed into layers where a higher level layer uses the services provided answer the block immediately enclose it we where across its network communicating entities communicate exclusively at the remote layer.
    [Show full text]
  • PART of the PICTURE: the TCP/IP Communications Architecture 1
    PART OF THE PICTURE: The TCP/IP Communications Architecture 1 PART OF THE PICTURE: The TCP/IP Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals and computers in the community “speak” the same language. This is the role of the underlying interconnection software. This software must ensure that all the devices transmit messages in such a way that they can be understood by the other computers and terminals in the community. With the introduction of the Systems Network Architecture (SNA) by IBM in the 1970s, this concept became a reality. However, SNA worked only with IBM equip- ment. Soon other vendors followed with their own proprietary communications architectures to tie together their equipment. Such an approach may be good business for the vendor, but it is bad business for the customer. Happily, that situation has changed radically with the adoption of standards for intercon- nection software. TCP/IP ARCHITECTURE AND OPERATION When communication is desired among computers from different vendors, the software development effort can be a nightmare. Different vendors use different data formats and data exchange protocols. Even within one vendor’s product line, different model computers may communicate in unique ways. As the use of computer communications and computer networking proliferates, a one-at-a-time spe- cial-purpose approach to communications software development is too costly to be acceptable. The only alternative is for computer vendors to adopt and implement a common set of conventions. For this to hap- pen, standards are needed. However, no single standard will suffice.
    [Show full text]
  • Carrier Ethernet Ciena’S Essential Series: Be in the Know
    Essentials Carrier Ethernet Ciena’s Essential Series: Be in the know. by John Hawkins with Earl Follis Carrier Ethernet Networks Published by Ciena 7035 Ridge Rd. Hanover, MD 21076 Copyright © 2016 by Ciena Corporation. All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, without the prior written permission of Ciena Corporation. For information regarding permission, write to: Ciena Experts Books 7035 Ridge Rd Hanover, MD 21076. Trademarks: Ciena, all Ciena logos, and other associated marks and logos are trademarks and/or registered trademarks of Ciena Corporation both within and outside the United States of America, and may not be used without written permission. LIMITATION OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE.
    [Show full text]
  • Carrier Ethernet
    Essentials Carrier Ethernet Ciena’s Essential Series: Be in the know. by John Hawkins with Earl Follis Essential Guide to Carrier Ethernet Networks Leveraging Ethernet Service for Operator and End-user Advantage Carrier Ethernet by John Hawkins with Earl Follis 1 Publisher’s Acknowledgments We’re proud of this book; please send us your comments at [email protected] Some of the people who helped bring this book to market include the following: Editorial, and Senior Project Editor: Erin Malone Layout and Graphics: Susan MacLeod Editor: Nancy Sixsmith Wil McLean Carrier Ethernet Networks Published by Ciena 7035 Ridge Rd. Hanover, MD 21076 Copyright © 2016 by Ciena Corporation. All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, without the prior written permission of Ciena Cor- poration. For information regarding permission, write to: Ciena Experts Books 7035 Ridge Rd Hanover, MD 21076. Trademarks: Ciena, all Ciena logos, and other associated marks and logos are trade- marks and/or registered trademarks of Ciena Corporation both within and outside the United States of America, and may not be used without written permission. LIMITATION OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION.
    [Show full text]
  • Prologue: the Internet
    Prologue: The Internet (FIXME: How should I handle references in this section?) younger second cousin of mine, Tom, once asked me about how life was before A the Internet. Let us meet again in a few years, and continue that conversation. History Tom: Could you use the Internet when you went to school? Niels: No, I got my first account an a machine with a real Internet connection some year after I entered university, October 24, 1992. Tom: So that was the first time you used email? Niels: Not quite, I got a student account at the cs department some year earlier. The computer system for the students was not directly connected to the Internet, presumably for the protection of the Internet, but one could send and receive email, both locally, to other students and teachers, and to the outside world. Since email was the first big application for the network, it was common with gateways between Internet email, and other systems. I remember having a summer job in the early 1990s at a telecommunications company. We had email, but no direct connectivity to the Internet. It was not possible to connect directly to ftp servers around the world, but some file archives offered an ftp by email service, which we used. Tom: So how did people exchange files before the Internet? Niels: Computer communication was fairly obscure; some people used modems to dial in to bulletin board systems, and hacker groups would exchange data on floppy disks sent via postal mail. It was common that computer magazines and books published program listings, but to try the program, you had to first type it into your computer by hand.
    [Show full text]
  • Network Architecture Report
    Network Architecture Report: “A Networking Framework for Delivering Business Solutions” Version 1.0, May 2001 Prepared for: The Council on Technology Services Commonwealth of Virginia By: The COTS Enterprise Architecture Workgroup, Network Domain Team Network Architecture Version 1.0 Revision: 5-18-01 Network Domain Team Members John Eagle, Co-Chair City of Hampton, Co-Chair Bob Pontius, Co-Chair Virginia Employment Commission, Ric Anderson Department of Information Technology Bethann Canada Department of Education Jay Epperson Department of Education Karen Hardwick Department of Corrections Gary Post City of Alexandria Bobby Wattlington Department of Motor Vehicles Diane Wresinski Department of Technology Planning (Domain Team Staff) Paul Lubic Department of Technology Planning (EA Manager) Brian Mason Department of Technology Planning (Consultant) COTS Enterprise Architecture Workgroup David Molchany, Co-Chair Fairfax County, Local Government Representation Murali Rao, Co-Chair Department of Transportation, Secretariat of Transportation Representation Tim Bass Virginia Retirement System, Independent Agency Representative Bethann Canada Department of Education, Secretariat of Education Representative Troy DeLung, Department of Environmental Quality, Secretariat of Natural Resources Representative Linda Foster Department of Taxation, Secretariat of Finance Representative Bob Haugh Department of Corrections, Secretariat of Public Safety & Large Agency Representative Randy Horton Department of Rehabilitative Services, Secretariat of Health
    [Show full text]
  • Aeronautical Communications Panel Use of Internet Protocols Suite
    ACP WGN Report on TCP/IP Aeronautical Communications Panel Use of Internet Protocols Suite (IPS) As a Provision for Aeronautical Internetworking Prepared by Working Group N (Networking) 19 May 2005 1 ACP WGN Report on TCP/IP Table of Contents Executive Summary...............................................................................................................5 1. Introduction ...................................................................................................................8 1.1 Background .............................................................................................................8 1.2 Process.....................................................................................................................8 1.3 Current State of Aeronautical Communication....................................................9 1.3.1 Ground-Ground Communication ...................................................................9 1.3.1.1 Store and Forward Messaging...................................................................9 1.3.1.2 Point-to-point communication .................................................................10 1.3.1.3 Point-to-Multipoint (broadcast)...............................................................10 1.3.1.4 Surveillance data communication ...........................................................10 1.3.1.5 Voice communication ................................................................................10 1.3.2 Air-ground communication...........................................................................11
    [Show full text]
  • [3] [Editor's Note: in Honor of the 30Th Anniversary of TCP/IP We Print the Following History of the International Collaboration That Make TCP/IP Possible.]
    [3] [Editor's Note: In honor of the 30th Anniversary of TCP/IP we print the following history of the international collaboration that make TCP/IP possible.] The Internet: On its International Origins and Collaborative Vision (A Work In Progress) by Ronda Hauben [email protected] "[T]he effort at developing the Internet Protocols was international from the beginning." Vinton Cerf, "How the Internet Came to Be" ABSTRACT The process of the Internet's development offers an important prototype to understand the creation of a multinational collaborative research project which depends on and fosters communication across the boundaries of diverse administrative structures, political entities, and technical designs. The mythology surrounding the origins of the Internet is that it began in 1969 in the U.S. That is the date marking the origins of the ARPANET (a U.S. packet switching network), but not the birth of the Internet. The origins of the Internet date from 1973. The goal of the researchers creating the Internet was to create a network of networks, a means for networks from diverse countries to inter- communicate. Originally the design was to link up several national but diverse packet switching networks including the ARPANET (U.S.), Cyclades (France), and NPL (Great Britain). When that was not politically feasible, the research project involved Norwegian, British and American research groups, and researchers from other countries, especially France, at various junctures. These research groups did the early development work. The Internet was international from its very beginnings. Preface The following work in progress begins the investigation of the collaboration between researchers from the U.S.
    [Show full text]
  • Networking Basics 03
    Networking Basics 03a - The Internet Protocol (IP) Wolfgang Tremmel [email protected] DE-CIX Management GmbH | Lindleystr. 12 | 60314 Frankfurt | Germany Phone + 49 69 1730 902 0 | [email protected] | www.de-cix.net Networking Basics DE-CIX Academy 01 - Protocols and Packets 02 - Ethernet 02a - VLANs 03 - IP - the Internet Protocol 03a - IP Addresses, Prefixes, and Routing 03b - Global IP routing 04 - UDP 05 - TCP and more 06 - Higher protocols - http, smtp, and more Protocol What is a "Protocol"? Guten Morgen! 你什么意思? • If you want to communicate, you need to speak a common language • Otherwise you will not understand each other PS: I used Google Translate. Hope it says "I do not understand" What is a "Protocol"? GutenGood Now I Morning!Morgen! 你什么意思?understand • If you want to communicate, you need to speak a common language • Otherwise you will not understand each other • The same is true for computers or other network devices Protocol Stack Multiple protcols building on each other Layer Name Internet Model 5 Application Physical Layer 4 Transport • Light pulses and electrical signals 3 Internet 2 Link Lasers and fibres • 1 Physical • Electrical cables Attribution: Cjp24 https://commons.wikimedia.org/wiki/File:12_Optical_fibers_(1).jpg Layer Name Internet Model 5 Application Link Layer 4 Transport • Data units are called "Frames" 3 Internet 2 Link • Provides hop-to-hop (node-to-node) data transfer 1 Physical • Examples: • Ethernet Attribution: Wolfgang Tremmel Ethernet • EtherType Frame Structure • Payload SF Destination MAC Preamble Source MAC Address Ethertype Payload Checksum D Address 48 Bits 48 Bits 16 Bits 32 Bits 10101010 10101010 10101010 10101010 10101011 6 Octets 6 Octets 2 Octets 46 - 1500 Octets 4 Octets 9 Ethernet Frame Structure Source MAC Address Ethertype Payload Checksum 48 Bits 16 Bits 32 Bits 6 Octets 2 Octets 46 - 1500 Octets 4 Octets 10 Encapsulation Packets inside packets • The payload of Ethernet is IP • Encapsulation is like Russian dolls • So we have an IP packet inside an Ethernet frame Attribution: Fanghong.
    [Show full text]