Skip to main content

Introduction of First Internet Network

 Iam deva borde and Iam a hacker certified by star certifiction 

The Internet was not originally built to be what it is today. It was developed when computers 

were hugs  and so expensive to own that only university, big business and a few governments
had them. Originally, the the internet was designed to facilitate these massive computers to 
communication each other by sending information (mainly text) back and forth. with the internet,
the network began to take shape. It was only in 1969, the advanced Research Project Agency 
Network (ARPANET)-------the first computer network was built. 

                                                           The Internet gradually grew, until the emergency og personal computer in the 1980s, and then it became widespread. 


ABOUT ARPANET :

The ARPANET (an Advanced Research Projects Agency for Advanced Research Projects Agency Network) was the first wide-area packet-swithing network with distributed control and one of the first networks to implement the TCP protocol suite. Both technologies became the technical foundation of the Internet. The ARPANET was established by the  Advanced Research Projects Agency (ARPA) of the United States Department of Defense

Building on the ideas of J. C. R. Licklider initiated the ARPANET project in 1966 to enable access to remote computers. Taylor appointed Larry Roberts as program manager. Roberts made the key decisions about the network design. He incorporated Donald Davies’ concepts and designs for packet switching, and sought input from Paul Baran. ARPA awarded the contract to build the network to Bolt Beranek & Newman who developed the first protocol for the network. Roberts engaged Leonard Kleinrock at UCLA to develop mathematical methods for analyzing the packet network technology.

The first computers were connected in 1969 and the Network Control Program was implemented in remote login1970. Further software development enabled remo, file transfer and email. The network expanded rapidly and was declared operational in 1975 when control passed to the Defense Communications Agency.

Internetworking research in the early 1970s by Bob Kahn at DARPA and Vint at Stanford University and later DARPA led to the formulation of the Transmission Control Program, which incorporated concepts from the French CYCLADES  project directed by Louis Pouzin. As this work progressed, a protocol was developed by which multiple separate networks could be joined into a network of networks. Version 4 of TCP/IP was installed in the ARPANET for production use in January 1983 after the Department of Defense made it standard for all military computer networking.

Access to the ARPANET was expanded in 1981, when the National Science Foundation (NSF) funded theComputer Science Network (CSNET). In the early 1980s, the NSF funded the establishment of national supercomputing centers at several universities, and provided network access and network interconnectivity with TCP/IP over the NSFNET from 1986. The ARPANET project was formally decommissioned in 1990, after DARPA partnerships with the telecommunication and computer industry had paved the way for the widespread adoption of the Internet protocol suite as part of the private sector expansion and commercialization of a world-wide network, known as the Internet 



Comments

Post a Comment

Popular posts from this blog

Exploring Electronic Mail

Introduction   Email is the most commonly used mode of communication today. Information is communicated over email in different forms such as text, images, audio, and video. It is the main resource for business communication. As it has become an undetachable medium of communication, it attracts criminals or persons having malicious intent. Cybercriminals use email for sending spam, threats, phishing emails, propagating malicious software like viruses and worms, distributing illegitimate material like child pornography, and hoaxes, and using it for other criminal activities. Therefore, it is necessary to secure our email system and to identify criminals, collect evidence against them and bring them to justice in a court of law. Emails suffer from multiple threats and there are several tools available in the market for fighting such threats. To secure emails, we need a multi-pronged approach. Multiple safety measures need to be implemented to have a safe online experience. In this chapte

What is Cybersecurity....?

what is Cybersecurity..?   In simple term, cybersecurity is the protection of your cyber (or digital) assets or information system from attacks or unauthorised access that are aimed for exploitation. In other word, it means keeping everything  you to do online safe, so no one steals your financial and personal to use for their own gain. The panama Papers, yahoo hack and Ashley Madison data breaches are to name a few of the recent high profile cyber attacks which have caused a great deal of damage to organization and common people  The term 'cybersecurity' was coined in 1988 as a result of one of the first ever registered online virus: The Morris worm.  The worm caused many computers connected to the Internet at the time to slow down to the point that they wear unusable. more recently, cybersecurity has come to signify a form of protection      from attacks designed to paralyse websites, financial network and other computer systems; by flooding them with data from outside compu

Network Security Threats

Network Security Threats Introduction: Security plays a very critical role in safeguarding networks that are connecting more and more people every day. Information that is being exchanged between networked computers is very vulnerable to attacks. This increases the security challenges for network security  professionals to protect the information and  identity of users connected globally. Network  security is needed in almost every field  and includes small and large organizations,  governmental  entities, homes, and  even countries at large.  Over the last few years, it has been observed that there is a massive increase in hacking and other malicious activities. Moreover, many threats are being created for the sole purpose of acquiring the personal information of users. Therefore, it is important to use a security program that can provide complete proactive protection, i.e., it can safeguard you before you get infected. In this chapter, we look at the categories of network security th