Skip to main content

Internet Architectures

  • Chapter
  • First Online:
Internet Computing
  • 288 Accesses

Abstract

In order to explain how the Internet works, this chapter takes a closer look at the architecture that underlies the Internet, as well as at its architectural principles and mechanisms. After providing a brief overview of the Internet’s history, this chapter examines today’s core infrastructure and explains the role of Internet service providers (ISPs). In addition, the essential mechanisms enabling Internet communication are explained, namely the Internet Protocol (IP) suite, IP addresses, the domain name system (DNS), as well as IP packet routing and forwarding. This chapter also explains how large content providers, like Google, Amazon, and Netflix, provide Internet users all over the world with efficient and reliable services by utilizing specialized content delivery networks. The description of four emerging architectural concepts that extend the established Internet architecture with more efficient and/or effective ways of providing innovative Internet services (i.e., software-defined networking, network function virtualization, overlay networks, and information-centric networking) conclude this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 84.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A backbone network establishes interconnections between two or more separate networks by establishing a central data path between them (Piliouras and Terplan 1998).

References

  • Babay A, Danilov C, Lane J, Miskin-Amir M, Obenshain D, Schultz J, Stanton J, Tantillo T, Amir Y (2017) Structured overlay networks for a new generation of internet services. Paper presented at the international conference on distributed computing systems (ICDCS), Atlanta, GA, 5–8 June 2017

    Google Scholar 

  • Bagad VS, Dhotre IA (2009) Computer networks - II. Technical Publications, Pune, Maharashtra

    Google Scholar 

  • Baker FJ (2009) Core protocols in the internet protocol suite. IETF. https://tools.ietf.org/id/draft-baker-ietf-core-04.html. Accessed 23 June 2023

  • Bartolini N, Casalicchio E, Tucci S (2003) A walk through content delivery networks. Paper presented at the international workshop on modeling, analysis, and simulation of computer and telecommunication systems, Orlando, FL, 12–15 October 2003

    Google Scholar 

  • Baumann R, Heimlicher S, Strasser M, Weibel A (2007) A survey on routing metrics. Computer Engineering and Networks Laboratory, ETH-Zentrum. http://rainer.baumann.info/public/tik262.pdf. Accessed 23 June 2023

  • Bellman R (1958) On a routing problem. Q Appl Math 16(1):87–90

    Article  Google Scholar 

  • Benzekki K, El Fergougui A, Elalaoui AE (2017) Software-defined networking (SDN): a survey. Secur Commun Netw 9(18):5803–5833

    Article  Google Scholar 

  • Berners-Lee T, Bray T, Connolly D, Cotton P, Fielding R, Jeckle M, Lilley C, Mendelsohn N, Orchard D, Walsh N, Williams S (2004) Architecture of the World Wide Web, Volume One. W3C. https://www.w3.org/TR/webarch/. Accessed 23 June 2023

  • Braga R, Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX/OpenFlow. Paper presented at the IEEE Local Computer Network Conference, Denver, CO, 10-14 October 2010

    Google Scholar 

  • Cerf V, Kahn R (1974) A protocol for packet network interconnection. IEEE Trans Commun 22(5):637–648

    Article  Google Scholar 

  • Cerf V, Sunshine C (1974) Specification of internet transmission control program. https://tools.ietf.org/html/rfc675. Accessed 23 June 2023

  • Chandramouli R, Rose S (2006) Challenges in securing the domain name system. IEEE Comput Soc 4(1):84–87

    Google Scholar 

  • Chapin L (1992) Charter of the Internet Architecture Board (IAB). https://tools.ietf.org/html/rfc1358. Accessed 23 June 2023

  • Chiosi M, Clarke D, Willis P, Reid A, Feger J, Bugenhagen M, Khan W, Fargano M, Cui C, Deng H, Benitez J, Michel U, Damker H, Ogaki K, Matsuzaki T, Fukui M, Shimano K, Delisle D, Loudier Q, Kolias C, Guardini I, Demaria E, Minerva R, Manzalini A, López D, Salguero FJR, Ruhl F, Sen P (2012) Network functions virtualisation: an introduction, benefits, enablers, challenges & call for action. Paper presented at the SDN and OpenFlow World Congress, Darmstadt, 22–24 October 2012

    Google Scholar 

  • Cisco (2011) Content Delivery Network (CDN) Federations: how SPs can win the battle for content-hungry consumers. https://www.cisco.com/c/dam/en/us/products/collateral/video/videoscape-distribution-suite-service-broker/cdn_vds_sb_white_paper.pdf. Accessed 23 June 2023

  • Cisco (2018) Cisco visual networking index: forecast and trends, 2017–2022. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html. Accessed 23 June 2023

  • Comer D (2015) Computer networks and internets, 6th edn. Pearson Education Limited, London

    Google Scholar 

  • Cooper I, Tomlinson G (2001) Internet web replication and caching taxonomy. https://tools.ietf.org/html/rfc3040. Accessed 23 June 2023

  • Deering S, Hinden R (1995) Internet protocol, version 6 (IPv6): specification. https://tools.ietf.org/html/rfc1883. Accessed 23 June 2023

  • Deering S, Hinden R (1998) Internet protocol, version 6 (IPv6): specification. https://tools.ietf.org/html/rfc2460. Accessed 23 June 2023

  • Deering S, Hinden R (2017) Internet protocol, version 6 (IPv6) specification. https://tools.ietf.org/html/rfc8200. Accessed 23 June 2023

  • Dehling T, Sunyaev A (2014) Information security and privacy of patient-centered health IT services: what needs to be done? Paper presented at the 47th hawaii international conference on system Sciences, Waikoloa, HI, 6–9 January 2014

    Google Scholar 

  • Dijkstra EW (1959) A note on two problems in connexion with graphs. Numer Math 1(1):269–271

    Article  MathSciNet  Google Scholar 

  • Dougherty D, Truelove K, Shirky C, Dornfest R, Gonze L (2002) 2001 P2P networking overview: the emergent P2P platform of presence, identity, and edge resources. O’Reilly, Sebastopol, CA

    Google Scholar 

  • Duan Q, Toy M (2016) Virtualized software-defined networks and services. Artech House, London

    Google Scholar 

  • ETSI (2013) Network function virtualisation (NFV); Architectural framework. ETSI. https://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.01.01_60/gs_NFV002v010101p.pdf. Accessed 23 June 2023

  • ETSI (2018) Network functions virtualisation (NFV); Terminology for main concepts in NFV. https://www.etsi.org/deliver/etsi_gs/NFV/001_099/003/01.04.01_60/gs_NFV003v010401p.pdf. Accessed 23 June 2023

  • Falk A (2009) Definition of an Internet Research Task Force (IRTF) Document Stream. https://tools.ietf.org/html/rfc5743. Accessed 23 June 2023

  • Fall KR, Stevens RW (2011) TCP/IP illustrated, vol 1. Addison-Wesley, Ann Arbor, MI

    Google Scholar 

  • Ford LR, Fulkerson DR (1956) Maximal flow through a network. Can J Math 8(1):399–404

    Article  MathSciNet  Google Scholar 

  • Fotiou N, Nikander P, Trossen D, Polyzos GC (2010) Developing information networking further: from PSIRP to PURSUIT. Paper presented at the international conference on broadband communications, networks and systems, Athens, 25–27 October 2010

    Google Scholar 

  • Frazer KD, Inc MN, National Science Foundation (1996) NSFNET: a partnership for high-speed networking: final report, 1987-1995. Merit Network, Ann Arbor, MI

    Google Scholar 

  • Galán-Jiménez J, Gazo-Cervero A (2011) Overview and challenges of overlay networks: a survey. Int J Comput Sci Eng Surv 2(1):19–37

    Article  Google Scholar 

  • Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62(7):122–136

    Article  Google Scholar 

  • Gokhale AA (2005) Introduction to telecommunications. Thomson/Delmar Learning, Clifton Park, NY

    Google Scholar 

  • Google (2012) Inter-Datacenter WAN with centralized TE using SDN and OpenFlow. https://www.opennetworking.org/wp-content/uploads/2013/02/cs-googlesdn.pdf. Accessed 23 June 2023

  • Grance T, Hash J, Peck S, Smith J, Korow-Diks K (2008) Security guide for interconnecting information technology systems. NIST

    Google Scholar 

  • Hinden R, Deering S (2006) IP Version 6 addressing architecture. https://tools.ietf.org/html/rfc4291. Accessed 23 June 2023

  • Hofmann M, Leland RB (2005) Content networking: architecture, protocols, and practice. The Morgan Kaufmann series in networking. Morgan Kaufmann, San Francisco, CA

    Google Scholar 

  • Hornig C (1984) A standard for the transmission of IP datagrams over ethernet networks. https://tools.ietf.org/html/rfc894. Accessed 23 June 2023

  • Huang D, Wu H (2018) Mobile cloud computing: foundations and service models. Elsevier, Cambridge, MA

    Book  Google Scholar 

  • Hunt C (2002) TCP/IP network administration, 3rd edn. O’Reilly Media, Sebastopol, CA

    Google Scholar 

  • ICNRG (2018) Information-Centric Networking Research Group. https://irtf.org/icnrg. Accessed 23 June 2023

  • IETF (1989a) Requirements for Internet hosts – application and support. https://tools.ietf.org/html/rfc1123. Accessed 23 June 2023

  • IETF (1989b) Requirements for Internet hosts – communication layers. https://tools.ietf.org/html/rfc1122. Accessed 23 June 2023

  • IETF (2003) A model for content internetworking (CDI). https://tools.ietf.org/html/rfc3466. Accessed 23 June 2023

  • Information Sciences Institute (1981) Transmission control protocol. https://tools.ietf.org/html/rfc793. Accessed 23 June 2023

  • Jacobson V, Smetters D, Thornton J, Plass M, Briggs N, Braynard R (2009) Networking named content. Paper presented at the 5th international conference on emerging networking experiments and technologies, Rome, 1–4 December 2009

    Google Scholar 

  • Jordana J (2002) Governing telecommunications and the new information society in Europe. Edward Elgar Publishing, Cheltenham

    Book  Google Scholar 

  • Kozierok CM (2005) The TCP/IP guide: a comprehensive, Illustrated internet protocols reference. No Starch Press, San Francisco, CA

    Google Scholar 

  • Kutscher D, Eum S, Pentikousis K, Psaras I, Corujo D, Saucez D, Schmidt T, Waehlisch M (2016) Information-Centric Networking (ICN) Research Challenges. Internet Research Task Force (IRTF)

    Google Scholar 

  • Li J (2008) On peer-to-peer (P2P) content delivery. Peer Peer Netw Appl 1(1):45–63

    Article  MathSciNet  Google Scholar 

  • Little RG (2012) Software-defined networking is not OpenFlow, companies proclaim. https://searchnetworking.techtarget.com/news/2240158633/Software-defined-networking-is-not-OpenFlow-companies-proclaim. Accessed 23 June 2023

  • Little RG (2013) InCNTRE’s OpenFlow SDN testing lab works toward certified SDN product. https://searchnetworking.techtarget.com/news/2240186631/InCNTREs-OpenFlow-SDN-testing-lab-works-toward-certified-SDN-product. Accessed 23 June 2023

  • Malatras A (2015) State-of-the-art survey on P2P overlay networks in pervasive computing environments. J Netw Comput Appl 55(1):1–23

    Article  Google Scholar 

  • Mansfield KC, Antonakos JL (2009) Computer networking for LANS to WANS: hardware, software and security. Cengage Learning, Boston, MA

    Google Scholar 

  • Mills DL, Braun H (1987) The NSFNET backbone network. ACM SIGCOMM Comput Commun Rev 17(5):191–196

    Article  Google Scholar 

  • Mockapetris P (1983a) Domain names - concepts and facilities. https://tools.ietf.org/html/rfc882. Accessed 23 June 2023

  • Mockapetris P (1983b) Domain names - implementation and specification. https://tools.ietf.org/html/rfc883. Accessed 23 June 2023

  • NIST (2013) Security and privacy controls for federal information systems and organizations. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf. Accessed 23 June 2023

  • Norton WB (2011) The Internet peering playbook: connecting to the core of the Internet, 2nd edn. DrPeering Press, Palo Alto, CA

    Google Scholar 

  • Open Networking Foundation (2012) Software-defined networking: the new norm for networks. https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf. Accessed 23 June 2023

  • Pathan M, Buyya R, Vakali A (2008) Content delivery networks: state of the art, insights, and imperatives. In: Buyya R, Pathan M, Vakali A (eds) Content delivery networks, Lecture Notes Electrical Engineering, vol 9. Springer, Berlin, Heidelberg, pp 3–32

    Chapter  Google Scholar 

  • Piliouras TC, Terplan K (1998) Network design: management and technical perspectives. CRC Press, London

    Google Scholar 

  • Robinson D (2017) Content delivery networks: fundamentals, design, and evolution, 1st edn. Wiley, Hoboken, NJ

    Book  Google Scholar 

  • Saltzer JH, Reed DP, Clark DD (1984) End-to-end arguments in system design. ACM Trans Comput Syst 2(4):277–288

    Article  Google Scholar 

  • Savitz E (2012) Netflix shifts traffic to its own CDN; Akamai, Limelight Shrs Hit. https://www.forbes.com/sites/ericsavitz/2012/06/05/netflix-shifts-traffic-to-its-own-cdn-akamai-limelight-shrs-hit/. Accessed 23 June 2023

  • Sitaraman RK, Kasbekar M, Lichtenstein W, Jain M (2014) Overlay networks: an akamai perspective. In: Pathan M, Sitaraman RK, Robinson D (eds) Advanced content delivery, streaming, and cloud services, 1st edn. Wiley, Hoboken, NJ, pp 305–328

    Chapter  Google Scholar 

  • Stevenson A, Waite M (2011) Concise Oxford English Dictionary, 12th edn. Oxford University Press, New York, NY

    Google Scholar 

  • Stewart B (2000) CSNET – computer science network. https://www.livinginternet.com/i/ii_csnet. Accessed 23 June 2023

  • Stutzbach D, Zappala D, Rejaie R (2005) The scalability of swarming peer-to-peer content delivery. Paper presented at the international conference on research in networking, Waterloo, ON, 2-6 May 2005

    Google Scholar 

  • Subramanian S, Voruganti S (2016) Software-Defined Networking (SDN) with OpenStack. Packt Publishing, Birmingham

    Google Scholar 

  • Sunyaev A, Pflug J (2012) Risk evaluation and security analysis of the clinical area within the German electronic health information system. Heal Technol 2(2):123–135

    Article  Google Scholar 

  • Sunyaev A, Leimeister JM, Krcmar H (2010) Open security issues in German healthcare telematics. Paper presented at the 3rd international conference on health informatics (HealthInf), Valencia, 20-23 January 2010

    Google Scholar 

  • Tarkoma S, Ain M, Visala K (2009) The publish/subscribe Internet routing paradigm (PSIRP): designing the future Internet architecture. In: Tselentis G, Domingue J, Galis A et al (eds) A European research perspective. IOS Press, Amsterdam, pp 102–111

    Google Scholar 

  • W3C (2017) W3C MISSION. https://www.w3.org/Consortium/mission. Accessed 23 June 2023

  • Yaqub MA, Ahmed SH, Bouk SH, Kim D (2016) Information-centric networks (ICN). In: Ahmed SH, Bouk SH, Kim D (eds) Content-centric networks: an overview, applications and research challenges. Springer, Singapore, pp 19–33

    Chapter  Google Scholar 

Further Reading

  • Berners-Lee T, Bray T, Connolly D, Cotton P, Fielding R, Jeckle M, Lilley C, Mendelsohn N, Orchard D, Walsh N, Williams S (2004) Architecture of the World Wide Web, Volume One. W3C

    Google Scholar 

  • Comer D (2015) Computer networks and internets, 6th edn. Pearson Education Limited, London

    Google Scholar 

  • Hunt C (2002) TCP/IP network administration, 3rd edn. O’Reilly Media, Sebastopol, CA

    Google Scholar 

  • Mansfield KC, Antonakos JL (2009) Computer networking for LANS to WANS: hardware, software and security. Cengage Learning, Boston, MA

    Google Scholar 

  • Singh MP (2005) The practical handbook of Internet computing. CRC Press, Boca Raton, FL

    Google Scholar 

  • Tanenbaum AS, Van Steen M (2017) Distributed systems principles and paradigms. Prentice-Hall, Upper Sddle River, NJ

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sunyaev, A. (2024). Internet Architectures. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-61014-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-61014-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-61013-4

  • Online ISBN: 978-3-031-61014-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics