1994 (1994): North American Network Operators' Group (NANOG) established
Commercialization, privatization, broader access leads to the modern Internet:
1995 (1995): New Internet architecture with commercial ISPs connected at NAPs
1995 (1995): NSFNET decommissioned
1995 (1995): GOSIP updated to allow TCP/IP
1995 (1995): very high-speed Backbone Network Service (vBNS)
1995 (1995): IPv6 proposed
1996 (1996): AOL changes pricing model from hourly to monthly
1998 (1998): Internet Corporation for Assigned Names and Numbers (ICANN)
1999 (1999): IEEE 802.11b wireless networking
1999 (1999): Internet2/Abilene Network
1999 (1999): vBNS+ allows broader access
2000 (2000): Dot-com bubble bursts
2001 (2001): New top-level domain names activated
2001 (2001): Code Red I, Code Red II, and Nimda worms
2003 (2003): UN World Summit on the Information Society (WSIS) phase I
2003 (2003): National LambdaRail founded
2004 (2004): UN Working Group on Internet Governance (WGIG)
2005 (2005): UN WSIS phase II
2006 (2006): First meeting of the Internet Governance Forum
2010 (2010): First internationalized country code top-level domains registered
2012 (2012): ICANN begins accepting applications for new generic top-level domain names
2013 (2013): Montevideo Statement on the Future of Internet Cooperation
2014 (2014): NetMundial international Internet governance proposal
2016 (2016): ICANN contract with U.S. Dept. of Commerce ends, IANA oversight passes to the global Internet community on October 1st
Examples of Internet services:
1989 (1989): AOL dial-up service provider, email, instant messaging, and web browser
1990 (1990): IMDb Internet movie database
1994 (1994): Yahoo! web directory
1995 (1995): Amazon online retailer
1995 (1995): eBay online auction and shopping
1995 (1995): Craigslist classified advertisements
1995 (1995): AltaVista search engine
1996 (1996): Outlook (formerly Hotmail) free web-based e-mail
1996 (1996): RankDex search engine
1997 (1997): Google Search
1997 (1997): Babel Fish automatic translation
1998 (1998): Yahoo Groups (formerly Yahoo! Clubs)
1998 (1998): PayPal Internet payment system
1998 (1998): Rotten Tomatoes review aggregator
1999 (1999): 2ch Anonymous textboard
1999 (1999): i-mode mobile internet service
1999 (1999): Napster peer-to-peer file sharing
2000 (2000): Baidu search engine
2001 (2001): 2chan Anonymous imageboard
2001 (2001): BitTorrent peer-to-peer file sharing
2001 (2001): Wikipedia, the free encyclopedia
2003 (2003): LinkedIn business networking
2003 (2003): Myspace social networking site
2003 (2003): Skype Internet voice calls
2003 (2003): iTunes Store
2003 (2003): 4chan Anonymous imageboard
2003 (2003): The Pirate Bay, torrent file host
2004 (2004): Facebook social networking site
2004 (2004): Podcast media file series
2004 (2004): Flickr image hosting
2005 (2005): YouTube video sharing
2005 (2005): Reddit link voting
2005 (2005): Google Earth virtual globe
2006 (2006): Twitter microblogging
2007 (2007): WikiLeaks anonymous news and information leaks
2007 (2007): Google Street View
2007 (2007): Kindle, e-reader and virtual bookshop
2008 (2008): Amazon Elastic Compute Cloud (EC2)
2008 (2008): Dropbox cloud-based file hosting
2008 (2008): Encyclopedia of Life, a collaborative encyclopedia intended to document all living species
2008 (2008): Spotify, a DRM-based music streaming service
2009 (2009): Bing search engine
2009 (2009): Google Docs, Web-based word processor, spreadsheet, presentation, form, and data storage service
2009 (2009): Kickstarter, a threshold pledge system
2009 (2009): Bitcoin, a digital currency
2010 (2010): Instagram, photo sharing and social networking
2011 (2011): Google+, social networking
2011 (2011): Snapchat, photo sharing
2012 (2012): Coursera, massive open online courses
2016 (2016): TikTok, video sharing and social networking
The Open Systems Interconnection protocols are a family of information exchange standards developed jointly by the ISO and the ITU-T. The standardization process began in 1977.
While the seven-layer OSI model is often used as a reference for teaching and documentation,[2] the protocols originally conceived for the model did not gain popularity, and only X.400, X.500, and IS-IS have achieved lasting impact. The goal of an open-standard protocol suite instead has been met by the Internet protocol suite, maintained by the Internet Engineering Task Force (IETF).
Overview
[edit]
The OSI protocol stack is structured into seven conceptual layers. The layers form a hierarchy of functionality starting with the physical hardware components to the user interfaces at the software application level. Each layer receives information from the layer above, processes it and passes it down to the next layer. Each layer adds encapsulation information (header) to the incoming information before it is passed to the lower layer. Headers generally include address of source and destination, error control information, protocol identification and protocol parameters such as flow control options and sequence numbers.
Structuring and managing a multi-node network, including addressing, routing and traffic control
2
Data link
Frame
Transmission of data frames between two nodes connected by a physical layer
1
Physical
Bit, Symbol
Transmission and reception of raw bit streams over a physical medium
Layer 1: physical layer
[edit]
This layer deals with the physical plugs, sockets, electrical/optical specifications and the required line codes.
The physical layer includes the medium over which the digital signals are transmitted. It can be twisted pair, coaxial cable, optical fiber, wireless, or other transmission media.
Layer 2: data link layer
[edit]
The data link layer packages raw bits from the physical layer into frames (logical, structured packets for data). It is specified in ITU-T Rec. X.212 [ISO/IEC 8886], ITU-T Rec. X.222 and others. This layer is responsible for transferring frames from one host to another. It might perform error checking. This layer further consists of two sublayers: MAC and LLC.
Connection-Oriented Network Protocol (X.25) – ITU-T Rec. X.233 [ISO/IEC 8878]. This is the use of the X.25 protocol to provide the CONS.
Network Fast Byte Protocol – ISO/IEC 14700
End System to Intermediate System Routing Exchange Protocol (ES-IS) - ISO/IEC 9452 (reprinted in RFC 995).
Intermediate System to Intermediate System Intra-domain Routing Protocol (IS-IS) - ISO/IEC 10589 (reprinted in RFC 1142), later adapted for the TCP/IP model.
This level is in charge of transferring data between systems in a network, using network-layer addresses of machines to keep track of destinations and sources. This layer uses routers and switches to manage its traffic (control flow control, error check, routing etc.)
So here it takes all routing decisions, it deals with end to end data transmission.
The transport layer transfers data between source and destination processes. Generally, two connection modes are recognized, connection-oriented or connectionless. Connection-oriented service establishes a dedicated virtual circuit and offers various grades of guaranteed delivery, ensuring that data received is identical to data transmitted. Connectionless mode provides only best-effort service without the built-in ability to correct errors, which includes complete loss of data without notifying the data source of the failure. No logical connection, and no persistent state of the transaction exists between the endpoints, lending the connectionless mode low overhead and potentially better real-time performance for timing-critical applications such as voice and video transmissions.
The session layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, and half-duplex or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in application environments that use remote procedure calls.
This layer defines and encrypts/decrypts data types from the application layer. Protocols such as MIDI, MPEG, and GIF are presentation layer formats shared by different applications.