Hawke. G.L. "The Internet and its role in the future The Electrical Engineering Handbook Ed. Richard C. Dorf Boca raton crc Press llc. 2000
Hawke, G.L. “The Internet and its Role in the Future” The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000
99 The Internet and Its Role in the future 99.1 Introduction 99.2 History he Internet Today Send/Receive Capacity .Login Password. The World wide Web Gary L. Hawke www, Web) University of Kansas 99.4 The Future 99.1 Introduction The creation of the computer rivals any invention in our history. The wide use of computers and their resultant affect on all communication is tied directly to their ability to contact and interface with each other. This ability to link computers together is the basis for all global success of computer usage. It is the key to sharing knowledge, The Internet is the adolescent offspring developed from the creation of a backbone connecting computers iter networks. These Local Area Networks(LANs) within internal locations can now be linked to other networks worldwide. The Internet, not really a place but a concept, is intended to connect global information resources. The value of the Internet is more than its ability to link computers and networks, its real value is in bringing information to any who need it. This chapter will attempt to give a broad overview of the Internet, condensing the major points of interest is a list of just a few publications the reader may wish to check for more in-depth information The rapid advances in technology and innovations in operating software make any published account of the Internet obsolete before they arrive in the reader's hands. As we look at the Internet as it exists today, we also try to take a glimpse at the future of this creation. There are, however, as many visions of the future as there are dreamers. So, with due respect to those who envision the developments and uses of the Internet in the years to come, here is a basic introduction. 99.2 History Early in the development of the mainframe computer, the creators realized these machines would have to be able to talk to each other for the technology to be of real meaning. They began by connecting one computer to another through direct cable hook-up, then to printers, and eventually they sought a means of connection outside their own building. The telephone system seemed like a logical choice. It was virtually everywhere. It was flexible, inexpensive, and one could simply dial up the location one wanted to reach. The modem was invented to send computer information over telephone lines instead of a direct wire connection. It provided the modulated( Mo)computer signal from one location and the demodulated (dem)to the other end of the connection. Protocols were developed that would translate the computer signal to telephone tones. Modems c 2000 by CRC Press LLC
© 2000 by CRC Press LLC 99 The Internet and Its Role in the Future 99.1 Introduction 99.2 History 99.3 The Internet Today Send/ReceiveCapacity • Login • Password • The World Wide Web (WWW, Web) 99.4 The Future 99.1 Introduction The creation of the computer rivals any invention in our history. The wide use of computers and their resultant affect on all communication is tied directly to their ability to contact and interface with each other. This ability to link computers together is the basis for all global success of computer usage.It is the key to sharing knowledge, data, conversation, and discovery on a global scale. The Internet is the adolescent offspring developed from the creation of a backbone connecting computers and computer networks. These Local Area Networks (LANs) within internal locations can now be linked to other networks worldwide. The Internet, not really a place but a concept, is intended to connect global information resources. The value of the Internet is more than its ability to link computers and networks, its real value is in bringing information to any who need it. This chapter will attempt to give a broad overview of the Internet, condensing the major points of interest into one short chapter. There are, of course, hundreds of books on the subject. At the end of the chapter there is a list of just a few publications the reader may wish to check for more in-depth information. The rapid advances in technology and innovations in operating software make any published account of the Internet obsolete before they arrive in the reader’s hands. As we look at the Internet as it exists today, we also try to take a glimpse at the future of this creation. There are, however, as many visions of the future as there are dreamers. So, with due respect to those who envision the developments and uses of the Internet in the years to come, here is a basic introduction. 99.2 History Early in the development of the mainframe computer, the creators realized these machines would have to be able to talk to each other for the technology to be of real meaning. They began by connecting one computer to another through direct cable hook-up, then to printers, and eventually they sought a means of connection outside their own building. The telephone system seemed like a logical choice. It was virtually everywhere. It was flexible, inexpensive, and one could simply dial up the location one wanted to reach. The modem was invented to send computer information over telephone lines instead of a direct wire connection. It provided the modulated (Mo) computer signal from one location and the demodulated (dem) to the other end of the connection. Protocols were developed that would translate the computer signal to telephone tones. Modems Gary L. Hawke University of Kansas
are limited by the speed at which they can make this translation. Later in the chapter, modem speeds and types will be discussed at greater length. Computers can speak with each other in various methods over telephone lines. Circuit switching is when one computer directly dials up another. As phone lines in and out of locations began to become"busy"at times, the multiplexing idea was born. This allows an electronic cue system where computers may line up to access the next available line when one computer is done. Various forms of multiplexing have been developed to hold the data to be transmitted until an outgoing line is available, then delivering it. This eliminates the leed for the entire computer waiting for a path. Other tasks can be undertaken while the outgoing data is in eo This same early system is still the main access to the Internet for businesses and personal use. It allows anyone ess to the Internet anywhere in the world that telephone service is available. This now includes cellular applications and even direct satellite transmission for extremely remote locations. The system works very well and is expanding on a local access basis. As the Cold War continued, the government began the search for a system that would be less vulnerable to damage or sabotage. The U.S. Advanced Research Projects Agency(ARPA) began to explore an alternate path for government, business, and research locations to interconnect. This national network would allow different operating systems the ability to talk to each other and to route this path in a multitude of connects. Thus, if one path was damaged, the system would seek another path to its destination. The packet system of transmitting, which divides the information into streams of small packets of information, each with an I D number for final assembly, was developed. This new network would allow scientists from around the country to connect to one another to further computer technology. The system would be able to share equipment, transfer data files, and use long distance login capabilities. However, according to one of its early developers, Vint Cerf, vice-president of the Corporation for National Research Initiatives, ..we didn,'t know that e-mail was important.we weren't even sure what it was at the time"Dern, 1994. This new network would be called ARPAnet Soon researchers at private companies and institutions of higher learning were cranking out new software protocols to allow computers access to this new highway. In 1969, the first three aRPanet participants were linked between Stanford University in Palo Alto, California, and the University of California at Los Angeles and the University of California at Santa Barbara. The system grew slowly for the first decade, a bit faster over the next 10 years, and exploded in the 1990s as protocols, access, and individual desk top computers increased o During these years many operating systems, high speed(including fiber optic)transmission lines,access oviders, and language protocols were developed. The Defense Advanced Research Projects Agency developee a protocol for network interconnection called Transmission Control Protocol/Internetworking Protocol (TCP/IP). In 1983 this protocol was adopted as the standard for what would later be called Internet. 99.3 The Internet Today Today the Internet is a conglomeration of a huge number of interconnected LANs around the world. These are a series of linked IPs, functioning on their own, but able to instantly connect with any other LAN likewise lected to the Internet. It also covers the thousands of personal computers at home or in the office. The Internet can also connect to a wide range of other networks, including privately operated ones like America On Line, Prodigy, and Compuserve, plus hundreds of other special networks now in use throughout the world of speed, capacity, and reliability begin to crop up. These will be discussed later in the dhaple. et problems All you need is their IP, email account, or Web site address. As more and more users access the Internet problems The operating system most used by computers on the Internet is Unix. This system was developed by AT&T Bell Labs. This system uses characters on a menu or command message to access files. For more detailed information on Unix see [ Dern, 1994] The Internet has four major services: (1)electronic mail(email),(2)telnet, (3)file transfer protocol(FTP), nd( 4)client/server connections. Discussion on each service follows 1. Email--Probably the most used process on the Internet, email is a text transfer of messages from one point to another. Email addresses will route a message anywhere in the world in seconds. Several email programs are in use, from free shared systems such as Elm, Pine, Mailx, and Eudora. Recently some e 2000 by CRC Press LLC
© 2000 by CRC Press LLC are limited by the speed at which they can make this translation. Later in the chapter, modem speeds and types will be discussed at greater length. Computers can speak with each other in various methods over telephone lines. Circuit switching is when one computer directly dials up another. As phone lines in and out of locations began to become “busy” at times, the multiplexing idea was born. This allows an electronic cue system where computers may line up to access the next available line when one computer is done. Various forms of multiplexing have been developed to hold the data to be transmitted until an outgoing line is available, then delivering it. This eliminates the need for the entire computer waiting for a path. Other tasks can be undertaken while the outgoing data is in the hold position. This same early system is still the main access to the Internet for businesses and personal use. It allows anyone access to the Internet anywhere in the world that telephone service is available. This now includes cellular applications and even direct satellite transmission for extremely remote locations. The system works very well and is expanding on a local access basis. As the Cold War continued, the government began the search for a system that would be less vulnerable to damage or sabotage. The U.S. Advanced Research Projects Agency (ARPA) began to explore an alternate path for government, business, and research locations to interconnect. This national network would allow different operating systems the ability to talk to each other and to route this path in a multitude of connects. Thus, if one path was damaged, the system would seek another path to its destination. The packet system of transmitting, which divides the information into streams of small packets of information, each with an I.D. number for final assembly, was developed. This new network would allow scientists from around the country to connect to one another to further computer technology. The system would be able to share equipment, transfer data files, and use long distance login capabilities. However, according to one of its early developers, Vint Cerf, vice-president of the Corporation for National Research Initiatives, “...we didn’t know that e-mail was important...we weren’t even sure what it was at the time” [Dern, 1994]. This new network would be called ARPAnet. Soon researchers at private companies and institutions of higher learning were cranking out new software protocols to allow computers access to this new highway. In 1969, the first three ARPAnet participants were linked between Stanford University in Palo Alto, California, and the University of California at Los Angeles and the University of California at Santa Barbara. The system grew slowly for the first decade, a bit faster over the next 10 years, and exploded in the 1990s as protocols, access, and individual desk top computers increased. During these years many operating systems, high speed (including fiber optic) transmission lines, access providers, and language protocols were developed. The Defense Advanced Research Projects Agency developed a protocol for network interconnection called Transmission Control Protocol/Internetworking Protocol (TCP/IP). In 1983 this protocol was adopted as the standard for what would later be called Internet. 99.3 The Internet Today Today the Internet is a conglomeration of a huge number of interconnected LANs around the world. These are a series of linked IPs, functioning on their own, but able to instantly connect with any other LAN likewise connected to the Internet. It also covers the thousands of personal computers at home or in the office. The Internet can also connect to a wide range of other networks, including privately operated ones like America On Line, Prodigy, and Compuserve, plus hundreds of other special networks now in use throughout the world. All you need is their IP, email account, or Web site address.As more and more users access the Internet problems of speed, capacity, and reliability begin to crop up. These will be discussed later in the chapter. The operating system most used by computers on the Internet is Unix. This system was developed by AT&T Bell Labs. This system uses characters on a menu or command message to access files. For more detailed information on Unix see [Dern, 1994]. The Internet has four major services: (1) electronic mail (email), (2) telnet, (3) file transfer protocol (FTP), and (4) client/server connections. Discussion on each service follows. 1. Email—Probably the most used process on the Internet, email is a text transfer of messages from one point to another. Email addresses will route a message anywhere in the world in seconds. Several email programs are in use, from free shared systems such as Elm, Pine, Mailx, and Eudora. Recently some
advanced features have been added to mail programs and many have been released at low cost Eudora Pro is an example. Email is a low-cost instant information carrier. It can be used internally or on the Internet and will continue to expand in usage. 2. Telnet--This program allows the user to log onto other computers in distant locations and to operate those computers from their own terminal, running systems or downloading data. This defines how omputers speak to each other for login applications. Of course, most computers require a password to be able to access their information. The use of telnet to open other computers has spawned a rash of hacking, which attempts to forge passwords for unauthorized access. These can be criminal acts and are the very situations seen on occasional newscasts! Telnet is available on a public domain basis and can operate with almost all computer hardware. 3. FTP-This allows you to transfer files from one computer to another or from one remote site to another remote site. The user has the ability to download files from shareware servers or from private files using a password for entry. FTP can download small files and huge databases. It is the primary method for those doing research or fact finding to acquire massive amounts of information in a very short time. as was mentioned previously, the time it takes to download files is directly related to the speed of your modem, or direct connection. This can take a very long time in the case of large files 4. Client/server--Much of the current use of the Internet is to share information. This can happen when one computer accesses another that operates separately and serves information to the client who has logged in. You request another computer to send files to you, the client. In the early days of the Internet, most of these were text files only. One such text-based browse is Lynx, developed at the University of ansas for exploration of the documents on the Internet and the World wide Web(www)Web, for short. www is a system for finding and accessing Internet resources. The Web's most innovative feature is the ability to "point and click"on a text word or graphic to hypertext link you to another Web site holding the information you request. This process allows you to move from one computer to the next hop-scotching across the globe to find the information you seek. By using hypertext-based protocol, the world is at your fingertips in an instant. The Lynx program is only text-based, but later developments brought graphics to the Web search vehicles. In order to search the vast reserves of information, browsers were developed. An early public domain browser, developed by the National Center for Supercomputing Applications, is Mosaic. Mosaic is all you need for Web site access. Later, Netscape Navigator was commercially developed with lots of bells and whistles for quick and easy access. There is a cost for Send/Receive Capacity Computers function using binary numbers. This series of 0 or 1 format exists at the smallest level as a bit. This digital system is transmitted over modems or direct connections in a series of 8-bit packets called bytes. Th number of bits per second that can be transmitted or received equates to the speed at which you can send receive information over the Internet. This bandwidth of the transmission line is expressed in bits per second, normally in metric form. Early computer connects were made at 56 bits per second(56 bps). As the speed of machine and systems proved, rates of transmission have increased to kilobits( kbs), megabits(mps), gigabits(gbs), and so on. Early modems operated at 14.4 kbs(14,000 bps), more modern modems function at 28.8 kbs(28, 800 bps) Higher capacity"pipelines"include Integrated Services Digital Network(ISDN) lines that can now be installed at home or business that operate at 56 kbs, direct Ethernet connections(a technology that can connect computers at a 10 Mbps). Higher capacity lines such as T-1(1.54 Mbs)and multiples of those, T-2, and T-3 lines are now being used for extremely high capacity systems. The T-1 and higher lines are very expensive to install and maintain but offer extremely quick Internet work speed Logi In order to begin the process of logging in, you will need an account of some kind. This is established through your service provider, which could be your own company or a commercial service such as Compuserve, America e 2000 by CRC Press LLC
© 2000 by CRC Press LLC advanced features have been added to mail programs and many have been released at low cost. Eudora Pro is an example. Email is a low-cost instant information carrier. It can be used internally or on the Internet and will continue to expand in usage. 2. Telnet—This program allows the user to log onto other computers in distant locations and to operate those computers from their own terminal, running systems or downloading data. This defines how computers speak to each other for login applications. Of course, most computers require a password to be able to access their information. The use of telnet to open other computers has spawned a rash of hacking, which attempts to forge passwords for unauthorized access. These can be criminal acts and are the very situations seen on occasional newscasts! Telnet is available on a public domain basis and can operate with almost all computer hardware. 3. FTP—This allows you to transfer files from one computer to another or from one remote site to another remote site. The user has the ability to download files from shareware servers or from private files using a password for entry. FTP can download small files and huge databases. It is the primary method for those doing research or fact finding to acquire massive amounts of information in a very short time. As was mentioned previously, the time it takes to download files is directly related to the speed of your modem, or direct connection. This can take a very long time in the case of large files. 4. Client/server—Much of the current use of the Internet is to share information. This can happen when one computer accesses another that operates separately and serves information to the client who has logged in. You request another computer to send files to you, the client. In the early days of the Internet, most of these were text files only. One such text-based browse is Lynx, developed at the University of Kansas for exploration of the documents on the Internet and the World Wide Web (www) Web, for short. WWW is a system for finding and accessing Internet resources. The Web’s most innovative feature is the ability to “point and click” on a text word or graphic to hypertext link you to another Web site holding the information you request. This process allows you to move from one computer to the next hop-scotching across the globe to find the information you seek. By using hypertext-based protocol, the world is at your fingertips in an instant. The Lynx program is only text-based, but later developments brought graphics to the Web search vehicles. In order to search the vast reserves of information, browsers were developed. An early public domain browser, developed by the National Center for Supercomputing Applications, is Mosaic. Mosaic is all you need for Web site access. Later, Netscape Navigator was commercially developed with lots of bells and whistles for quick and easy access. There is a cost for Netscape. Send/Receive Capacity Computers function using binary numbers. This series of 0 or 1 format exists at the smallest level as a bit. This digital system is transmitted over modems or direct connections in a series of 8-bit packets called bytes. The number of bits per second that can be transmitted or received equates to the speed at which you can send or receive information over the Internet. This bandwidth of the transmission line is expressed in bits per second, normally in metric form. Early computer connects were made at 56 bits per second (56 bps). As the speed of machine and systems improved, rates of transmission have increased to kilobits (kbs), megabits (mps), gigabits (gbs), and so on. Early modems operated at 14.4 kbs (14,000 bps), more modern modems function at 28.8 kbs (28,800 bps). Higher capacity “pipelines” include Integrated Services Digital Network (ISDN) lines that can now be installed at home or business that operate at 56 kbs, direct Ethernet connections (a technology that can connect computers at a 10 Mbps). Higher capacity lines such as T-1 (1.54 Mbs) and multiples of those, T-2, and T-3 lines are now being used for extremely high capacity systems. The T-1 and higher lines are very expensive to install and maintain but offer extremely quick Internet work speed. Login In order to begin the process of logging in, you will need an account of some kind. This is established through your service provider, which could be your own company or a commercial service such as Compuserve,America
on Line, etc. If you are operating your own system, you'll first need a tCp/ip plus a serial communications protocol such as a Serial Line Internet Protocol(SLIP), Point to Point Protocol(PPP), or the like. If you access one of these from your desktop computer you may start an email program, such as Eudora, without logging in to your multiuser account. Your mail will be downloaded to your desktop, where you can read it, print it, save it, or compose a new message. When you copy files from public acccess sites, your desktop system can bring them directly to it. You can also use the full desktop visual capabilities of your system when attaching to a Web site. If you are using a modem connection to another server/host, you'll need to check the speed. From Internet providers and accounts available you can select: full network sites dial in Ip telnet(long distance telephone service) public access accounts(terminal servers) commercial servers Email and Web sites are identified by an address On the Internet, address always refers to an electronic address. he form is Userid, the name selected by the user, followed by the character, followed by the computers name(all computers on the Internet have a specific name) Example: ghawke @ukans edu In this case"ukans"refers to the University of Kansas computer center. No spaces are used in the address. The information after the"@"refers to a domain. There can be any number of user names alike but each and every domain will have their own unique I fter the userid -@- and domain name, there can be one or more sub-domains. In the example above, the sub-domain is"edu"for educational institution. The sub-domains are listed with the most general information about the domain computer being further to the right or end of the address and the most specific name being to the immediate right of the domain name. Domains and their meanings are listed in Table 99.1 Password At this point of your login, you'll be asked to create a password. This password is the key to your account and the tighter you guard it, the more secure your system will be Common passwords are a combination of letter and number characters, usually eight or so in number. Obviously, these can be the subject of unauthorized usage. The more creative the password, the more secure it wil The World Wide Web( www, Web The www has more Internet locations than any other resource. It serves as a huge reference book for the world, with the added feature of hypertext links. Hypertext allows one to follow a topic line or reference idea TABLE 99.1 Organizational Top-Level Domains Meaning Cultural and entertainment entities Commercial organization Educational institution Businesses or firms Information services International organization networking organization Individual or personal nomenclature creational activity organizations Businesses offering goods to purchase www related activity organizations e 2000 by CRC Press LLC
© 2000 by CRC Press LLC on Line, etc. If you are operating your own system, you’ll first need a TCP/IP plus a serial communications protocol such as a Serial Line Internet Protocol (SLIP), Point to Point Protocol (PPP), or the like. If you access one of these from your desktop computer you may start an email program, such as Eudora, without logging in to your multiuser account. Your mail will be downloaded to your desktop, where you can read it, print it, save it, or compose a new message. When you copy files from public acccess sites, your desktop system can bring them directly to it. You can also use the full desktop visual capabilities of your system when attaching to a Web site. If you are using a modem connection to another server/host, you’ll need to check the speed. From Internet providers and accounts available you can select: • full network sites • dial in IP accounts • telnet (long distance telephone service) • public access accounts (terminal servers) • commercial servers Email and Web sites are identified by an address. On the Internet, address always refers to an electronic address. The form is Userid, the name selected by the user, followed by the @ character, followed by the computer’s name (all computers on the Internet have a specific name). Example: ghawke@ukans.edu In this case “ukans” refers to the University of Kansas computer center. No spaces are used in the address. The information after the “@” refers to a domain. There can be any number of user names alike but each and every domain will have their own unique name. After the userid –@– and domain name, there can be one or more sub-domains. In the example above, the sub-domain is “edu” for educational institution. The sub-domains are listed with the most general information about the domain computer being further to the right or end of the address and the most specific name being to the immediate right of the domain name. Domains and their meanings are listed in Table 99.1. Password At this point of your login, you’ll be asked to create a password. This password is the key to your account and the tighter you guard it, the more secure your system will be. Common passwords are a combination of letter and number characters, usually eight or so in number. Obviously, these can be the subject of unauthorized usage. The more creative the password, the more secure it will be. The World Wide Web (WWW, Web) The WWW has more Internet locations than any other resource. It serves as a huge reference book for the world, with the added feature of hypertext links . Hypertext allows one to follow a topic line or reference idea TABLE 99.1 Organizational Top-Level Domains Domain Meaning art Cultural and entertainment entities com Commercial organization edu Educational institution firm Businesses or firms gov Government info Information services int International organization mil U.S. military net Networking organization nom Individual or personal nomenclature org Non-profit organization rec Recreational activity organizations store Businesses offering goods to purchase web WWW related activity organizations