• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Services » Internet Architecture
Next →
← Prev

Internet Architecture

By Dinesh Thakur

In the late 1960s, the US Department of Defense decides to make an extensive network from many small networks, all different, which begin to abound everywhere in North America. We had to find a way for these networks to coexist and give them outdoor visibility, the same for all users. Hence, InterNetwork (interline), abbreviated as the Internet, data this network of networks.

The Internet architecture is based on a simple idea: ask all networks to carry a single packet type, a specific format, the IP protocol. Besides, this IP packet must have an address defined with sufficient generality to identify each computer and terminals scattered throughout the world. This architecture is illustrated in Figure.

Architecture of Internet

The user who wishes to make on this internetwork must store its data in IP packets delivered to the first network to cross. This first network encapsulates the IP packet in its packet structure, package A, which circulates in this form until an exit door, where it is decapsulated to retrieve the IP packet. The IP address is examined to locate, thanks to a routing algorithm, the following network to cross, and so on until arriving at the destination terminal.

To complete the IP, the US Defense added the TCP protocol; specify the nature of the interface with the user. This protocol further determines how to transform a stream of bytes in an IP packet while ensuring the quality of transport of this IP packet. Both protocols, assembled under the TCP / IP abbreviation, are in the form of a layered architecture. They correspond to the packet level and message-level reference model.

The Internet model completed with a third layer called the application level, which includes different protocols for building Internet services. Email (SMTP), file transfer (FTP), the transfer of hypermedia pages, transfer of distributed databases (World Wide Web), etc., are some of these services. The figure shows the three layers of Internet architecture.

three layers of the Internet architecture

IP packets are independent of each other and are individually routed in the network by interconnecting devices, subnets, routers. The quality of service offered by IP is minimal and provides no detection of lost or possibility of error recovery packages.

TCP combines the functionality of the message-level reference model. It is a fairly complex protocol with many options for solving all packet loss problems in the lower levels. In particular, a lost fragment can be recovered by retransmission on the stream of bytes. TCP uses a connection-oriented mode.

The flexibility of the Internet architecture can sometimes be a default. The extent that global optimization of the network is carried out by sub-network subnet, by a succession of local optimizations. It does not allow a homogeneous function in different subnets traversed. Another essential feature of this architecture is to place the entire control system, to say, intelligence and control of the network, in the terminal machine, leaving virtually nothing in the network, at least in the current version, IPv4, the IP protocol. The control intelligence is in the TCP software on the PC connected to the network.

It is the TCP protocol that takes care of sending more or fewer packets according to network load. Precise control window the maximum number of unacknowledged fragments that may be issued. The TCP window control increases or decreases the traffic following the time required to complete a round trip. Over this time increases, Considering the more congested network, the transmission rate must decrease to counter saturation. In return, the infrastructure cost is meagre; no intelligence is not in the network. The service provided by the network of networks corresponds to a quality called the best effort, which means that the network does its best to carry the traffic. In other words, the service quality is not assured.

The new generation of IP, IPv6, introduces new features that make the network nodes smarter. The new generation of routers comes with QoS management algorithms, which allow them to provide transportation that can meet time constraints or packet loss. We expect the arrival of IPv6 for ten years, but it’s still IPv4 IP that governs the world. Because every new need is achievable with IPv6, IPv4 has been able to find the algorithms needed to do as well.

In IPv4, each new customer is treated the same way as those already connected, with resources being distributed equitably among all users. The resource allocation policies of telecom operator’s networks are different since, on these networks, a customer who already has a certain quality of service does not suffer any penalty because of the arrival of a new customer. As discussed, the now advocated solution in the Internet environment is to encourage customers with real-time requirements, using appropriate protocols, using priority levels.

The IP protocol for thirty years but remained almost confidential for twenty years before taking off, unless its properties resulted from the failure of the protocols directly related to the reference model, too many and often incompatible. The IP world growth comes from the simplicity of its protocol, with very few options, and it’s free.

You’ll also like:

  1. Internet – What is Internet?
  2. MIME (Multipurpose Internet Mail Extensions)
  3. IMAP4 (Internet message access protocol)
  4. (IP) Internet Protocol – What is Internet Protocol (IP)?
  5. Architecture of the GSM Network
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW