Internet
Internet
PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Thu, 13 Dec 2012 05:08:40 UTC
Contents
Articles
Overview
Internet History of the Internet World Wide Web History of the World Wide Web 1 1 17 42 54 61 61 62 71 73 75 76 77 88 91 95 111 119 119 121 132 151 170 174 182 192 197 197 203 221 223
Today's Internet
"Internet" or "internet"? Internet Protocol Suite Internet access Broadband Internet access Languages used on the Internet List of countries by number of Internet subscriptions List of countries by number of broadband Internet subscriptions Internet governance
Common uses
Timeline of popular Internet services Email Web content File sharing
Search Blogging Microblogging Social networking Remote access Collaborative software Internet phone Internet radio Internet television
228 236 250 253 273 273 283 297 302 308 308 312 325 332 372 372 380 386 388 391 403 403
Social impact
Sociology of the Internet Internet censorship Internet censorship circumvention Internet censorship by country
Organizations
Internet Corporation for Assigned Names and Numbers Internet Society Internet Architecture Board Internet Engineering Task Force Internet Governance Forum
People
Internet pioneers
References
Article Sources and Contributors Image Sources, Licenses and Contributors 416 428
Article Licenses
License 434
Overview
Internet
The Internet (or internet) is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email. Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV). Newspaper, book and other print publishing are adapting to Web site technology, or are reshaped into blogging and web feeds. The Internet has enabled and accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries. The origins of the Internet reach back to research of the 1960s, commissioned by the United States government to build robust, fault-tolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of June 2012, more than 2.4 billion peoplenearly a third of the world's human populationhave used the services of the Internet.[1] The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.
Terminology
Internet is a short form of the technical term internetwork,[2] the result of interconnecting computer networks with special gateways or routers. Historically the word has been used, uncapitalized, as a verb and adjective since 1883 to refer to interconnected motions. It was also used from 1974 before the Internet, uncapitalized, as a verb meaning to connect together, especially for networks.[3] The Internet is also often referred to as the Net. The Internet, referring to the specific entire global system of IP networks, is a proper noun and written with an initial capital letter. In the media and common use it is often not capitalized: "the internet". Some guides specify that the word should be capitalized as a noun but not capitalized as an adjective.[4] The terms Internet and World Wide Web are often used interchangeably in everyday speech; it is common to speak of going on the Internet when invoking a browser to view Web pages. However, the Internet is a particular global computer network connecting millions of computing devices; the World Wide Web is just one of many services
Internet running on the Internet. The Web is a collection of interconnected documents (Web pages) and other resources, linked by hyperlinks and URLs.[5] In addition to the Web, a multitude of other services are implemented over the Internet, including e-mail, file transfer, remote computer control, newsgroups, and online games. Web (and other) services can be implemented on any intranet, accessible to network users.
History
Research into packet switching started in the early 1960s and packet switched networks such as Mark I at NPL in the UK,[6] ARPANET, CYCLADES,[7][8] Merit Network,[9] Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks thanks to the work of British scientist Donald Davies whose ground-breaking work on Packet Switching was essential to the system.[10] The first two nodes of what would become the ARPANET were interconnected between Leonard Kleinrock's Network Measurement Center at the UCLA's School of Engineering and Applied Science and Douglas Engelbart's NLS Professor Leonard Kleinrock with system at SRI International (SRI) in Menlo Park, California, on 29 October the first ARPANET Interface 1969.[11] The third site on the ARPANET was the Culler-Fried Interactive Message Processors at UCLA Mathematics center at the University of California at Santa Barbara, and the fourth was the University of Utah Graphics Department. In an early sign of future growth, there were already fifteen sites connected to the young ARPANET by the end of 1971.[12][13] These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing. Early international collaborations on ARPANET were sparse. For various political reasons, European developers were concerned with developing the X.25 networks.[14] Notable exceptions were the Norwegian Seismic Array (NORSAR) in June 1973,[15] followed in 1973 by Sweden with satellite links to the Tanum Earth Station and Peter T. Kirstein's research group in the UK, initially at the Institute of Computer Science, University of London and later at University College London. In December 1974, RFC 675 Specification of Internet Transmission Control Program, by Vinton Cerf, Yogen Dalal, and Carl Sunshine, used the term internet, as a shorthand for internetworking; later RFCs repeat this use, so the word started out as an adjective rather than the noun it is today.[16] Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET). In 1982, the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
TCP/IP network access expanded again in 1986 when the National Science Foundation Network (NSFNET) provided access to supercomputer sites in the United States from research and education organizations, first at 56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s.[17] Commercial internet service providers (ISPs) began to emerge in the late 1980s and early 1990s. The ARPANET was decommissioned in 1990. The Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.[18] The Internet started a rapid expansion to Europe and Australia in the mid to late 1980s[19][20] and to Asia in the late 1980s and early 1990s.[21]
Internet
Since the mid-1990s the Internet has had a tremendous impact on culture and commerce, including the rise of near instant communication by email, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web[22] with its discussion forums, blogs, social networking, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.[23]
During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%.[24] This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary open nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network.[25] As of 31 March 2011, the estimated total number of Internet users was 2.095billion (30.2% of world population).[26] It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way telecommunication, by 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.[27]
This NeXT Computer was used by Sir Tim Berners-Lee at CERN and became the world's first Web server.
Technology
Protocols
The communications infrastructure of the Internet consists of its hardware components and a system of software layers that control various aspects of the architecture. While the hardware can often be used to support other software systems, it is the design and the rigorous standardization process of the software architecture that characterizes the Internet and provides the foundation for its scalability and success. The responsibility for the architectural design of the Internet software systems has been delegated to the As the user data is processed down through the protocol stack, each layer adds an Internet Engineering Task Force (IETF).[28] encapsulation at the sending host. Data is transmitted "over the wire" at the link The IETF conducts standard-setting work level, left to right. The encapsulation stack procedure is reversed by the receiving groups, open to any individual, about the host. Intermediate relays remove and add a new link encapsulation for retransmission, and inspect the IP layer for routing purposes. various aspects of Internet architecture. Resulting discussions and final standards are published in a series of publications, each called a Request for Comments (RFC), freely available on the IETF web site. The principal methods of networking that enable the Internet are contained in specially designated RFCs that constitute the Internet Standards. Other less rigorous documents are simply informative, experimental, or historical, or document the best current practices (BCP) when implementing Internet technologies.
Internet The Internet standards describe a framework known as the Internet protocol suite. This is a model architecture that divides methods into a layered system of protocols (RFC 1122, RFC 1123). The layers correspond to the environment or scope in which their services operate. At the top is the application layer, the space for the application-specific networking methods used in software applications, e.g., a web browser program. Below this top layer, the transport layer connects applications on different hosts via the network (e.g., clientserver model) with appropriate data exchange methods. Underlying these layers are the core networking technologies, consisting of two layers. The internet layer enables computers to identify and locate each other via Internet Protocol (IP) addresses, and allows them to connect to one another via intermediate (transit) networks. Last, at the bottom of the architecture, is a software layer, the link layer, that provides connectivity between hosts on the same local network link, such as a local area network (LAN) or a dial-up connection. The model, also known as TCP/IP, is designed to be independent of the underlying hardware, which the model therefore does not concern itself with in any detail. Other models have been developed, such as the Open Systems Interconnection (OSI) model, but they are not compatible in the details of description or implementation; many similarities exist and the TCP/IP protocols are usually included in the discussion of OSI networking. The most prominent component of the Internet model is the Internet Protocol (IP), which provides addressing systems (IP addresses) for computers on the Internet. IP enables internetworking and in essence establishes the Internet itself. IP Version 4 (IPv4) is the initial version used on the first generation of today's Internet and is still in dominant use. It was designed to address up to ~4.3billion (109) Internet hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion, which entered its final stage in 2011,[29] when the global address allocation pool was exhausted. A new protocol version, IPv6, was developed in the mid-1990s, which provides vastly larger addressing capabilities and more efficient routing of Internet traffic. IPv6 is currently in growing deployment around the world, since Internet address registries (RIRs) began to urge all resource managers to plan rapid adoption and conversion.[30] IPv6 is not interoperable with IPv4. In essence, it establishes a parallel version of the Internet not directly accessible with IPv4 software. This means software upgrades or translator facilities are necessary for networking devices that need to communicate on both networks. Most modern computer operating systems already support both versions of the Internet Protocol. Network infrastructures, however, are still lagging in this development. Aside from the complex array of physical connections that make up its infrastructure, the Internet is facilitated by bi- or multi-lateral commercial contracts (e.g., peering agreements), and by technical specifications or protocols that describe how to exchange data over the network. Indeed, the Internet is defined by its interconnections and routing policies.
Routing
Internet Service Providers connect customers (thought of at the "bottom" of the routing hierarchy) to customers of other ISPs. At the "top" of the routing hierarchy are ten or so Tier 1 networks, large telecommunication companies which exchange traffic directly "across" to all other Tier 1 networks via unpaid peering agreements. Tier 2 networks buy Internet transit from other ISP to reach at least some parties on the global
Internet packet routing is accomplished among various tiers of Internet Service Providers.
Internet Internet, though they may also engage in unpaid peering (especially for local partners of a similar size). ISPs can use a single "upstream" provider for connectivity, or use multihoming to provide protection from problems with individual links. Internet exchange points create physical connections between multiple ISPs, often hosted in buildings owned by independent third parties. Computers and routers use routing tables to direct IP packets among locally connected machines. Tables can be constructed manually or automatically via DHCP for an individual computer or a routing protocol for routers themselves. In single-homed situations, a default route usually points "up" toward an ISP providing transit. Higher-level ISPs use the Border Gateway Protocol to sort out paths to any given range of IP addresses across the complex connections of the global Internet. Academic institutions, large companies, governments, and other organizations can perform the same role as ISPs, engaging in peering and purchasing transit on behalf of their internal networks of individual computers. Research networks tend to interconnect into large subnetworks such as GEANT, GLORIAD, Internet2, and the UK's national research and education network, JANET. These in turn are built around smaller networks (see the list of academic computer network organizations). Not all computer networks are connected to the Internet. For example, some classified United States websites are only accessible from separate secure networks.
General structure
The Internet structure and its usage characteristics have been studied extensively. It has been determined that both the Internet IP routing structure and hypertext links of the World Wide Web are examples of scale-free networks.[31] Many computer scientists describe the Internet as a "prime example of a large-scale, highly engineered, yet highly complex system".[32] The Internet is heterogeneous; for instance, data transfer rates and physical characteristics of connections vary widely. The Internet exhibits "emergent phenomena" that depend on its large-scale organization. For example, data transfer rates exhibit temporal self-similarity. The principles of the routing and addressing methods for traffic in the Internet reach back to their origins in the 1960s when the eventual scale and popularity of the network could not be anticipated. Thus, the possibility of developing alternative structures is investigated.[33] The Internet structure was found to be highly robust[34] to random failures and very vulnerable to high degree attacks.[35]
Governance
The Internet is a globally distributed network comprising many voluntarily interconnected autonomous networks. It operates without a central governing body. However, to maintain interoperability, all technical and policy aspects of the underlying core infrastructure and the principal name spaces are administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN is the authority that coordinates the assignment of unique identifiers for use on the Internet, including domain names, Internet Protocol (IP) addresses, application port ICANN headquarters in Marina Del Rey, numbers in the transport protocols, and many other parameters. California, United States Globally unified name spaces, in which names and numbers are uniquely assigned, are essential for the global reach of the Internet. ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. The government of the United States continues to have the primary role in approving changes to the DNS root zone that lies at the heart of the domain name system.[36] ICANN's role in coordinating the assignment of unique identifiers distinguishes it as perhaps the only central
Internet coordinating body on the global Internet. On 16 November 2005, the World Summit on the Information Society, held in Tunis, established the Internet Governance Forum (IGF) to discuss Internet-related issues.
Modern uses
The Internet allows greater flexibility in working hours and location, especially with the spread of unmetered high-speed connections. The Internet can be accessed almost anywhere by numerous means, including through mobile Internet devices. Mobile phones, datacards, handheld game consoles and cellular routers allow users to connect to the Internet wirelessly. Within the limitations imposed by small screens and other limited facilities of such pocket-sized devices, the services of the Internet, including email and the web, may be available. Service providers may restrict the services offered and mobile data charges may be significantly higher than other access methods. Educational material at all levels from pre-school to post-doctoral is available from websites. Examples range from CBeebies, through school and high-school revision guides and virtual universities, to access to top-end scholarly literature through the likes of Google Scholar. For distance education, help with homework and other assignments, self-guided learning, whiling away spare time, or just looking up more detail on an interesting fact, it has never been easier for people to access educational information at any level from anywhere. The Internet in general and the World Wide Web in particular are important enablers of both formal and informal education. The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier, with the help of collaborative software. Not only can a group cheaply communicate and share ideas but the wide reach of the Internet allows such groups more easily to form. An example of this is the free software movement, which has produced, among other things, Linux, Mozilla Firefox, and OpenOffice.org. Internet chat, whether using an IRC chat room, an instant messaging system, or a social networking website, allows colleagues to stay in touch in a very convenient way while working at their computers during the day. Messages can be exchanged even more quickly and conveniently than via email. These systems may allow files to be exchanged, drawings and images to be shared, or voice and video contact between team members. Content management systems allow collaborating teams to work on shared sets of documents simultaneously without accidentally destroying each other's work. Business and project teams can share calendars as well as documents and other information. Such collaboration occurs in a wide variety of areas including scientific research, software development, conference planning, political activism and creative writing. Social and political collaboration is also becoming more widespread as both Internet access and computer literacy spread. The Internet allows computer users to remotely access other computers and information stores easily, wherever they may be. They may do this with or without computer security, i.e. authentication and encryption technologies, depending on the requirements. This is encouraging new ways of working from home, collaboration and information sharing in many industries. An accountant sitting at home can audit the books of a company based in another country, on a server situated in a third country that is remotely maintained by IT specialists in a fourth. These accounts could have been created by home-working bookkeepers, in other remote locations, based on information emailed to them from offices all over the world. Some of these things were possible before the widespread use of the Internet, but the cost of private leased lines would have made many of them infeasible in practice. An office worker away from their desk, perhaps on the other side of the world on a business trip or a holiday, can access their emails, access their data using cloud computing, or open a remote desktop session into their office PC using a secure Virtual Private Network (VPN) connection on the Internet. This can give the worker complete access to all of their normal files and data, including email and other applications, while away from the office. It has been referred to among system administrators as the Virtual Private Nightmare,[37] because it extends the secure perimeter of a corporate network into remote locations and its employees' homes.
Internet
Services
World Wide Web
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous. The World Wide Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs). URIs symbolically identify services, servers, and other databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web, but it is only one of the hundreds of communication protocols used on the Internet. Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data. World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via hyperlinks embedded in the documents. These documents may also contain any combination of computer data, including graphics, sounds, text, video, multimedia and interactive content that runs while the user is interacting with the page. Client-side software can include animations, games, office applications and scientific demonstrations. Through keyword-driven Internet research using search engines like Yahoo! and Google, users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale. The Web has also enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available. Publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition, however. Many individuals and some companies and groups use web logs or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result. One example of this practice is Microsoft, whose product developers publish their personal blogs in order to pique the public's interest in their work. Collections of personal web pages published by large service providers remain popular, and have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities have existed since the early days of the Web, newer offerings from, for example, Facebook and Twitter currently have large followings. These operations often brand themselves as social network services rather than simply as web page hosts. Advertising on popular web pages can be lucrative, and e-commerce or the sale of products and services directly via the Web continues to grow. When the Web began in the 1990s, a typical web page was stored in completed form on a web server, formatted in HTML, ready to be sent to a user's browser in response to a request. Over time, the process of creating and serving web pages has become more automated and more dynamic. Websites are often created using content management or wiki software with, initially, very little content. Contributors to these systems, who may be paid staff, members of a club or other organization or members of the public, fill underlying databases with content using editing pages designed for that purpose, while casual visitors view and read this content in its final HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors.
Internet
Communication
Email is an important communications service available on the Internet. The concept of sending electronic text messages between parties in a way analogous to mailing letters or memos predates the creation of the Internet. Pictures, documents and other files are sent as email attachments. Emails can be cc-ed to multiple email addresses. Internet telephony is another common communications service made possible by the creation of the Internet. VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all Internet communication. The idea began in the early 1990s with walkie-talkie-like voice applications for personal computers. In recent years many VoIP systems have become as easy to use and as convenient as a normal telephone. The benefit is that, as the Internet carries the voice traffic, VoIP can be free or cost much less than a traditional telephone call, especially over long distances and especially for those with always-on Internet connections such as cable or ADSL. VoIP is maturing into a competitive alternative to traditional telephone service. Interoperability between different providers has improved and the ability to call or receive a call from a traditional telephone is available. Simple, inexpensive VoIP network adapters are available that eliminate the need for a personal computer. Voice quality can still vary from call to call, but is often equal to and can even exceed that of traditional calls. Remaining problems for VoIP include emergency telephone number dialing and reliability. Currently, a few VoIP providers provide an emergency service, but it is not universally available. Traditional phones are line-powered and operate during a power failure; VoIP does not do so without a backup power source for the phone equipment and the Internet access devices. VoIP has also become increasingly popular for gaming applications, as a form of communication between players. Popular VoIP clients for gaming include Ventrilo and Teamspeak. Wii, PlayStation 3, and Xbox 360 also offer VoIP chat features.
Data transfer
File sharing is an example of transferring large amounts of data across the Internet. A computer file can be emailed to customers, colleagues and friends as an attachment. It can be uploaded to a website or FTP server for easy download by others. It can be put into a "shared location" or onto a file server for instant use by colleagues. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-to-peer networks. In any of these cases, access to the file may be controlled by user authentication, the transit of the file over the Internet may be obscured by encryption, and money may change hands for access to the file. The price can be paid by the remote charging of funds from, for example, a credit card whose details are also passed usually fully encrypted across the Internet. The origin and authenticity of the file received may be checked by digital signatures or by MD5 or other message digests. These simple features of the Internet, over a worldwide basis, are changing the production, sale, and distribution of anything that can be reduced to a computer file for transmission. This includes all manner of print publications, software products, news, music, film, video, photography, graphics and the other arts. This in turn has caused seismic shifts in each of the existing industries that previously controlled the production and distribution of these products. Streaming media is the real-time delivery of digital media for the immediate consumption or enjoyment by end users. Many radio and television broadcasters provide Internet feeds of their live audio and video productions. They may also allow time-shift viewing or listening such as Preview, Classic Clips and Listen Again features. These providers have been joined by a range of pure Internet "broadcasters" who never had on-air licenses. This means that an Internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way as was previously possible only with a television or radio receiver. The range of available types of content is much wider, from specialized technical webcasts to on-demand popular multimedia services. Podcasting is a variation on this theme, where usually audio material is downloaded and played back on a computer or shifted to a portable media player to be listened to on the move. These techniques using simple equipment allow anybody, with little censorship or licensing control, to broadcast audio-visual material worldwide.
Internet Digital media streaming increases the demand for network bandwidth. For example, standard image quality needs 1 Mbit/s link speed for SD 480p, HD 720p quality requires 2.5 Mbit/s, and the top-of-the-line HDX quality needs 4.5 Mbit/s for 1080p.[38] Webcams are a low-cost extension of this phenomenon. While some webcams can give full-frame-rate video, the picture either is usually small or updates slowly. Internet users can watch animals around an African waterhole, ships in the Panama Canal, traffic at a local roundabout or monitor their own premises, live and in real time. Video chat rooms and video conferencing are also popular with many uses being found for personal webcams, with and without two-way sound. YouTube was founded on 15 February 2005 and is now the leading website for free streaming video with a vast number of users. It uses a flash-based web player to stream and show video files. Registered users may upload an unlimited amount of video and build their own personal profile. YouTube claims that its users watch hundreds of millions, and upload hundreds of thousands of videos daily.[39]
Access
Common methods of Internet access in homes include dial-up, landline broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite and 3G/4G technology cell phones. Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels now also have public terminals, though these are usually fee-based. These terminals are widely accessed for various usage like ticket booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and therefore can do so to the Internet itself. Hotspots providing such access include Wi-Fi cafes, where would-be users need to bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services covering large city areas are in place in London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be accessed from such places as a park bench.[40] Apart from Wi-Fi, there have been experiments with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular phone networks, and fixed wireless services. High-end mobile phones such as smartphones in general come with Internet access through the phone network. Web browsers such as Opera are available on these advanced handsets, which can also run a wide variety of other Internet software. More mobile phones have Internet access than PCs, though this is not as widely used.[41] An Internet access provider and protocol matrix differentiates the methods used to get online. An Internet blackout or outage can be caused by local signaling interruptions. Disruptions of submarine communications cables may cause blackouts or slowdowns to large areas, such as in the 2008 submarine cable disruption. Less-developed countries are more vulnerable due to a small number of high-capacity links. Land cables are also vulnerable, as in 2011 when a woman digging for scrap metal severed most connectivity for the nation of Armenia.[42] Internet blackouts affecting almost entire countries can be achieved by governments as a form of Internet censorship, as in the blockage of the Internet in Egypt, whereby approximately 93%[43] of networks were without access in 2011 in an attempt to stop mobilization for anti-government protests.[44]
Internet
10
Users
Overall Internet usage has seen tremendous growth. From 2000 to 2009, the number of Internet users globally rose from 394 million to 1.858 billion.[48] By 2010, 22 percent of the world's population had access to computers with 1 billion Google searches every day, 300 million Internet users reading blogs, and 2 billion videos viewed daily on YouTube.[49] The prevalent language for communication on the Internet has been English. This may be a result of the origin of the Internet, as well as the language's role as a lingua franca. Early computer systems were limited to the characters in the American Standard Code for Information Interchange (ASCII), a subset of the Latin alphabet.
Internet users per 100 inhabitantsSource: International Telecommunication UnionITU "Internet users per 100 inhabitants 20012011", International Telecommunications Union, Geneva. Retrieved 4 April 2012
After English (27%), the most requested languages on the World Wide Web are Chinese (23%), Spanish (8%), Japanese (5%), Portuguese and German (4% each), Arabic, French and Russian (3% each), and Korean (2%).[50] By region, 42% of the world's Internet users are based in Asia, 24% in Europe, 14% in North America, 10% in Latin America and the Caribbean taken together, 6% in Africa, 3% in the Middle East and 1% Languages used on the InternetInternet users by language "Number of Internet Users by in Australia/Oceania.[51] The Internet's Language", Internet World Stats, Miniwatts Marketing Group, 31 May 2011. Retrieved technologies have developed enough in 22 April 2012 recent years, especially in the use of Unicode, that good facilities are available for development and communication in the world's widely used languages. However, some glitches such as mojibake (incorrect display of some languages' characters) still remain.
Internet
11
In an American study in 2005, the percentage of men using the Internet was very slightly ahead of the percentage of women, although this difference reversed in those under 30. Men logged on more often, spent more time online, and were more likely to be broadband users, whereas women tended to make more use of opportunities to communicate (such as email). Men were more likely to use the Internet to pay bills, participate in auctions, and for recreation such as downloading music and videos. Men and women were equally likely to use the Internet for shopping and banking.[52] More recent studies Languages used on the InternetWebsite content languages "Usage of content languages for websites". W3Techs.com. . Retrieved 30 December 2011. indicate that in 2008, women significantly outnumbered men on most social networking sites, such as Facebook and Myspace, although the ratios varied with age.[53] In addition, women watched more streaming content, whereas men downloaded more.[54] In terms of blogs, men were more likely to blog in the first place; among those who blog, men were more likely to have a professional blog, whereas women were more likely to have a personal blog.[55]
Social impact
The Internet has enabled entirely new forms of social interaction, activities, and organizing, thanks to its basic features such as widespread usability and access. In the first decade of the 21st century, the first generation is raised with widespread availability of Internet connectivity, bringing consequences and concerns in areas such as personal privacy and identity, and distribution of copyrighted materials. These "digital natives" face a variety of challenges that were not present for prior generations.
Internet for the sharing of ideas. The internet pornography and online gambling industries have taken advantage of the World Wide Web, and often provide a significant source of advertising revenue for other websites.[56] Although many governments have attempted to restrict both industries' use of the Internet, in general this has failed to stop their widespread popularity.[57] Another area of leisure activity on the Internet is multiplayer gaming.[58] This form of recreation creates communities, where people of all ages and origins enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. While online gaming has been around since the 1970s, modern modes of online gaming began with subscription services such as GameSpy and MPlayer.[59] Non-subscribers were limited to certain types of game play or certain games. Many people use the Internet to access and download music, movies and other works for their enjoyment and relaxation. Free and fee-based services exist for all of these activities, using centralized servers and distributed peer-to-peer technologies. Some of these sources exercise more care with respect to the original artists' copyrights than others. Internet usage has been correlated to users' loneliness.[60] Lonely people tend to use the Internet as an outlet for their feelings and to share their stories with others, such as in the "I am lonely will anyone speak to me" thread. Cybersectarianism is a new organizational form which involves: "highly dispersed small groups of practitioners that may remain largely anonymous within the larger social context and operate in relative secrecy, while still linked remotely to a larger network of believers who share a set of practices and texts, and often a common devotion to a particular leader. Overseas supporters provide funding and support; domestic practitioners distribute tracts, participate in acts of resistance, and share information on the internal situation with outsiders. Collectively, members and practitioners of such sects construct viable virtual communities of faith, exchanging personal testimonies and engaging in collective study via email, on-line chat rooms and web-based message boards."[61] Cyberslacking can become a drain on corporate resources; the average UK employee spent 57 minutes a day surfing the Web while at work, according to a 2003 study by Peninsula Business Services.[62] Internet addiction disorder is excessive computer use that interferes with daily life. Psychologist Nicolas Carr believe that Internet use has other effects on individuals, for instance improving skills of scan-reading and interfering with the deep thinking that leads to true creativity.[63]
12
Internet Internet, Berdal also notes how "self-protective measures" are put in place by those threatened by it: If we consider Chinas attempts to filter "unsuitable material" from the Internet, most of us would agree that this resembles a self-protective measure by the system against the growing civic potentials of the Internet. Nevertheless, both types represent limitations to "peripheral capacities". Thus, the Chinese government tries to prevent communicative power to build up and unleash (as the 1989 Tiananmen Square uprising suggests, the government may find it wise to install "upstream measures"). Even though limited, the Internet is proving to be an empowering tool also to the Chinese periphery: Analysts believe that Internet petitions have influenced policy implementation in favour of the publics online-articulated will ...[67]
13
Philanthropy
The spread of low-cost internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites such as DonorsChoose and GlobalGiving allow small-scale donors to direct funds to individual projects of their choice. A popular twist on internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations which post stories and updates on behalf of the borrowers. Lenders can contribute as little as $25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves.[68][69] However, the recent spread of low cost Internet access in developing countries has made genuine international person-to-person philanthropy increasingly feasible. In 2009 the US-based nonprofit Zidisha tapped into this trend to offer the first person-to-person microfinance platform to link lenders and borrowers across international borders without intermediaries. Members can fund loans for as little as a dollar, which the borrowers then use to develop business activities that improve their families' incomes while repaying loans to the members with interest. Borrowers access the internet via public cybercafes, donated laptops in village schools, and even smart phones, then create their own profile pages through which they share photos and information about themselves and their businesses. As they repay their loans, borrowers continue to share updates and dialogue with lenders via their profile pages. This direct web-based connection allows members themselves to take on many of the communication and recording tasks traditionally performed by local organizations, bypassing geographic barriers and dramatically reducing the cost of microfinance services to the entrepreneurs.[70]
Censorship
Some governments, such as those of Burma, Iran, North Korea, the Mainland China, Saudi Arabia, and the United Arab Emirates restrict what people in their countries can access on the Internet, especially political and religious content. This is accomplished through software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention.[71] In Norway, Denmark, Finland, and Sweden, major Internet service providers have voluntarily, possibly to avoid such an arrangement being turned into law, agreed to restrict access to sites listed by authorities. While this list of forbidden URLs is supposed to contain addresses of only known child pornography sites, the content of the list is secret.[72] Many countries, including the United States, have enacted laws against the possession or distribution of certain material, such as child pornography, via the Internet, but do not mandate filtering software. There are many free and commercially available software programs, called content-control software, with which a user can choose to block offensive websites on individual computers or networks, in order to limit a child's access to pornographic materials or depiction of violence.
Internet
14
References
[1] "World Stats" (http:/ / www. internetworldstats. com/ stats. htm). Internet World Stats. Miniwatts Marketing Group. June 30, 2012. . [2] "Internet, n." (http:/ / dictionary. oed. com/ cgi/ entry/ 00304286). Oxford English Dictionary (Draft ed.). March 2009. . Retrieved 26 October 2010. "Shortened < INTERNETWORK n., perhaps influenced by similar words in -net" [3] Oxford English Dictionary, 2md ed., gives ninteenth-century use and pre-Internet verb use] [4] "7.76 Terms like 'web' and 'Internet'" (http:/ / www. chicagomanualofstyle. org/ 16/ ch07/ ch07_sec076. html?para=), Chicago Manual of Style, University of Chicago, 16th edition [5] "Links" (http:/ / www. w3. org/ TR/ html401/ struct/ links. html#h-12. 1). HTML 4.01 Specification. World Wide Web Consortium. HTML 4.01 Specification. . Retrieved 13 August 2008. "[T]he link (or hyperlink, or Web link) [is] the basic hypertext construct. A link is a connection from one Web resource to another. Although a simple concept, the link has been one of the primary forces driving the success of the Web." [6] Celebrating 40 years of the net (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 8331253. stm), by Mark Ward, Technology correspondent, BBC News, 29 October 2009 [7] "A Technical History of CYCLADES" (http:/ / www. cs. utexas. edu/ users/ chris/ think/ Cyclades/ index. shtml), Technical Histories of the Internet & other Network Protocols, Computer Science Department, University of Texas Austin, 11 June 2002 [8] "The Cyclades Experience: Results and Impacts" (http:/ / www. informatik. uni-trier. de/ ~ley/ db/ conf/ ifip/ ifip1977. html#Zimmermann77), Zimmermann, H., Proc. IFIP'77 Congress, Toronto, August 1977, pp. 465469 [9] A Chronicle of Merit's Early History (http:/ / www. merit. edu/ about/ history/ article. php), John Mulcahy, 1989, Merit Network, Ann Arbor, Michigan [10] "A Technical History of National Physical Laboratories (NPL) Network Architecture" (http:/ / www. cs. utexas. edu/ users/ chris/ think/ NPL/ index. shtml), Technical Histories of the Internet & other Network Protocols, Computer Science Department, University of Texas Austin, 11 June 2002 [11] "Roads and Crossroads of Internet History" (http:/ / www. netvalley. com/ intval. html) by Gregory Gromov. 1995 [12] Hafner, Katie (1998). Where Wizards Stay Up Late: The Origins Of The Internet. Simon & Schuster. ISBN0-684-83267-4. [13] Ronda Hauben (2001). From the ARPANET to the Internet (http:/ / www. columbia. edu/ ~rh120/ other/ tcpdigest_paper. txt). . Retrieved 28 May 2009. [14] "Events in British Telecomms History" (http:/ / web. archive. org/ web/ 20030405153523/ http:/ / www. sigtel. com/ tel_hist_brief. html). Events in British TelecommsHistory. Archived from the original (http:/ / www. sigtel. com/ tel_hist_brief. html) on 5 April 2003. . Retrieved 25 November 2005. [15] "NORSAR and the Internet" (http:/ / web. archive. org/ web/ 20110724063000/ http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx). NORSAR. Archived from the original (http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx) on 24 July 2011. . [16] Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff (2003). A Brief History of Internet (http:/ / www. isoc. org/ internet/ history/ brief. shtml). . Retrieved 28 May 2009. [17] NSFNET: A Partnership for High-Speed Networking, Final Report 1987-1995 (http:/ / www. merit. edu/ about/ history/ pdf/ NSFNET_final. pdf), Karen D. Frazer, Merit Network, Inc., 1995 [18] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [19] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [20] Rseaux IP Europens (RIPE) [21] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved 25 December 2005. [22] How the web went world wide (http:/ / news. bbc. co. uk/ 2/ hi/ science/ nature/ 5242252. stm), Mark Ward, Technology Correspondent, BBC News. Retrieved 24 January 2011 [23] "Brazil, Russia, India and China to Lead Internet Growth Through 2011" (http:/ / clickz. com/ showPage. html?page=3626274). Clickz.com. . Retrieved 28 May 2009. [24] Coffman, K. G; Odlyzko, A. M. (2 October 1998) (PDF). The size and growth rate of the Internet (http:/ / www. dtc. umn. edu/ ~odlyzko/ doc/ internet. size. pdf). AT&T Labs. . Retrieved 21 May 2007. [25] Comer, Douglas (2006). The Internet book. Prentice Hall. p.64. ISBN0-13-233553-0. [26] "World Internet Users and Population Stats" (http:/ / www. internetworldstats. com/ stats. htm). Internet World Stats. Miniwatts Marketing Group. 22 June 2011. . Retrieved 23 June 2011. [27] "The Worlds Technological Capacity to Store, Communicate, and Compute Information" (http:/ / www. sciencemag. org/ content/ suppl/ 2011/ 02/ 08/ science. 1200970. DC1/ Hilbert-SOM. pdf), Martin Hilbert and Priscila Lpez (April 2011), Science, 332(6025), 6065. [28] "IETF Home Page" (http:/ / www. ietf. org/ ). Ietf.org. . Retrieved 20 June 2009. [29] Huston, Geoff. "IPv4 Address Report, daily generated" (http:/ / www. potaroo. net/ tools/ ipv4/ index. html). . Retrieved 20 May 2009. [30] "Notice of Internet Protocol version 4 (IPv4) Address Depletion" (https:/ / www. arin. net/ knowledge/ about_resources/ ceo_letter. pdf) (PDF). . Retrieved 7 August 2009.
Internet
[31] A. L. Barabasi, R. Albert; Barabsi, Albert-Lszl (2002). "Statistical mechanics of complex networks" (http:/ / rmp. aps. org/ abstract/ RMP/ v74/ i1/ p47_1). Rev. Mod. Phys 74: 4794. doi:10.1103/RevModPhys.74.47. . [32] Walter Willinger, Ramesh Govindan, Sugih Jamin, Vern Paxson, and Scott Shenker (2002). Scaling phenomena in the Internet (http:/ / www. pnas. org/ cgi/ content/ full/ 99/ suppl_1/ 2573), in Proceedings of the National Academy of Sciences, 99, suppl. 1, 25732580 [33] Jesdanun, Anick (16 April 2007). "Internet Makeover? Some argue it's time" (http:/ / seattletimes. nwsource. com/ html/ businesstechnology/ 2003667811_btrebuildnet16. html). Seattletimes.nwsource.com. . Retrieved 8 August 2011. [34] R. Cohen, K. Erez, D. ben-Avraham, S. Havlin (2000). "Resilience of the Internet to random breakdowns" (http:/ / havlin. biu. ac. il/ Publications. php?keyword=Resilience+ of+ the+ Internet+ to+ random+ breakdowns& year=*& match=all). Phys. Rev. Lett 85: 4625. . [35] R. Cohen, K. Erez, D. ben-Avraham, S. Havlin; Erez, K; Ben-Avraham, D; Havlin, S (2001). "Breakdown of the Internet under intentional attack" (http:/ / havlin. biu. ac. il/ Publications. php?keyword=Breakdown+ of+ the+ Internet+ under+ intentional+ attack& year=*& match=all). Phys. Rev. Lett 86 (16): 36825. doi:10.1103/PhysRevLett.86.3682. PMID11328053. . [36] "Bush administration annexes internet" (http:/ / www. theregister. co. uk/ 2005/ 07/ 01/ bush_net_policy/ ), Kieren McCarthy, The Register, 1 July 2005 [37] "The Virtual Private Nightmare: VPN" (http:/ / librenix. com/ ?inode=5013). Librenix. 4 August 2004. . Retrieved 21 July 2010. [38] Morrison, Geoff (18 November 2010). "What to know before buying a 'connected' TV Technology & science Tech and gadgets Tech Holiday Guide" (http:/ / www. msnbc. msn. com/ id/ 40241749/ ns/ technology_and_science-tech_and_gadgets). MSNBC. . Retrieved 8 August 2011. [39] "YouTube Fact Sheet" (http:/ / www. webcitation. org/ 5qyMMarNd). YouTube, LLC. Archived from the original (http:/ / www. youtube. com/ t/ fact_sheet) on 4 July 2010. . Retrieved 20 January 2009. [40] Pasternak, Sean B. (7 March 2006). "Toronto Hydro to Install Wireless Network in Downtown Toronto" (http:/ / www. bloomberg. com/ apps/ news?pid=10000082& sid=aQ0ZfhMa4XGQ& refer=canada). Bloomberg. . Retrieved 8 August 2011. [41] "By 2013, mobile phones will overtake PCs as the most common Web access device worldwide", according a forecast in "Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond" (http:/ / www. gartner. com/ it/ page. jsp?id=1278413), Gartner, Inc., 13 January 2010 [42] "Georgian woman cuts off web access to whole of Armenia" (http:/ / www. guardian. co. uk/ world/ 2011/ apr/ 06/ georgian-woman-cuts-web-access). The Guardian. 6 April 2011. . Retrieved 11 April 2012. [43] Cowie, James. "Egypt Leaves the Internet" (http:/ / www. renesys. com/ blog/ 2011/ 01/ egypt-leaves-the-internet. shtml). Renesys. Archived (http:/ / www. webcitation. org/ 5w51j0pga) from the original on 28 January 2011. . Retrieved 28 January 2011. [44] "Egypt severs internet connection amid growing unrest" (http:/ / www. bbc. co. uk/ news/ technology-12306041). BBC News. 28 January 2011. . [45] "Internet users per 100 inhabitants 20012011" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2011/ Internet_users_01-11. xls), International Telecommunications Union, Geneva. Retrieved 4 April 2012 [46] "Number of Internet Users by Language" (http:/ / www. internetworldstats. com/ stats7. htm), Internet World Stats, Miniwatts Marketing Group, 31 May 2011. Retrieved 22 April 2012 [47] "Usage of content languages for websites" (http:/ / w3techs. com/ technologies/ overview/ content_language/ all). W3Techs.com. . Retrieved 30 December 2011. [48] Internet users graphs (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ ), Market Information and Statistics, International Telecommunications Union [49] "Google Earth demonstrates how technology benefits RI`s civil society, govt" (http:/ / www. antaranews. com/ en/ news/ 71940/ google-earth-demonstrates-how-technology-benefits-ris-civil-society-govt). Antara News. 2011-05-26. . Retrieved 2012-11-19. [50] Internet World Stats (http:/ / www. internetworldstats. com/ stats7. htm), updated for 30 June 2010. Retrieved 20 February 2011. [51] World Internet Usage Statistics News and Population Stats (http:/ / www. internetworldstats. com/ stats. htm) updated for 30 June 2010. Retrieved 20 February 2011. [52] How men and women use the Internet Pew Research Center 28 December 2005 [53] "Rapleaf Study on Social Network Users" (http:/ / business. rapleaf. com/ company_press_2008_07_29. html). . [54] "Women Ahead Of Men In Online Tv, Dvr, Games, And Social Media." (http:/ / www. entrepreneur. com/ tradejournals/ article/ 178175272. html). Entrepreneur.com. 1 May 2008. . Retrieved 8 August 2011. [55] "Technorati's State of the Blogosphere" (http:/ / technorati. com/ blogging/ state-of-the-blogosphere/ ). Technorati. . Retrieved 8 August 2011. [56] "Internet Pornography Statistics" (http:/ / internet-filter-review. toptenreviews. com/ internet-pornography-statistics. html), Jerry Ropelato, Top Ten Reviews, 2006 [57] "Do It Yourself! Amateur Porn Stars Make Bank" (http:/ / abcnews. go. com/ Business/ SmallBiz/ story?id=4151592), Russell Goldman, ABC News, 22 January 2008 [58] "Top Online Game Trends of the Decade" (http:/ / internetgames. about. com/ od/ gamingnews/ a/ trendsdecade. htm), Dave Spohn, About.com, 15 December 2009 [59] "Internet Game Timeline: 1963 2004" (http:/ / internetgames. about. com/ od/ gamingnews/ a/ timeline. htm), Dave Spohn, About.com, 2 June 2011 [60] Carole Hughes, Boston College. "The Relationship Between Internet Use and Loneliness Among College Students" (https:/ / www2. bc. edu/ ~hughesc/ abstract. html). Boston College. . Retrieved 11 August 2011.
15
Internet
[61] Patricia M. Thornton, "The New Cybersects: Resistance and Repression in the Reform era. In Elizabeth Perry and Mark Selden, eds., Chinese Society: Change, Conflict and Resistance (second edition) (London and New York: Routledge, 2003), pp. 14950. [62] "Net abuse hits small city firms" (http:/ / www. scotsman. com/ news/ net-abuse-hits-small-city-firms-1-892163). The Scotsman (Edinburgh). 11 September 2003. . Retrieved 7 August 2009. [63] The Shallows: What the Internet Is Doing to Our Brains (http:/ / www. theshallowsbook. com/ nicholascarr/ Nicholas_Carrs_The_Shallows. html), Nicholas Carr, W. W. Norton, 7 June 2010, 276 pp., ISBN 0-393-07222-3, ISBN 978-0-393-07222-8 [64] "The Arab Uprising's Cascading Effects" (http:/ / www. miller-mccune. com/ politics/ the-cascading-effects-of-the-arab-spring-28575/ ). Miller-mccune.com. 23 February 2011. . Retrieved 27 February 2011. [65] The Role of the Internet in Democratic Transition: Case Study of the Arab Spring (http:/ / www. etd. ceu. hu/ 2011/ chokoshvili_davit. pdf), Davit Chokoshvili, Master's Thesis, June 2011 [66] Kirkpatrick, David D. (9 February 2011). "Wired and Shrewd, Young Egyptians Guide Revolt" (http:/ / www. nytimes. com/ 2011/ 02/ 10/ world/ middleeast/ 10youth. html). The New York Times. . [67] Berdal, S.R.B. (2004) (PDF), Public deliberation on the Web: A Habermasian inquiry into online discourse (http:/ / www. duo. uio. no/ publ/ informatikk/ 2004/ 20535/ SimonBerdal. pdf), Oslo: University of Oslo, [68] Kiva Is Not Quite What It Seems (http:/ / blogs. cgdev. org/ open_book/ 2009/ 10/ kiva-is-not-quite-what-it-seems. php), by David Roodman, Center for Global Development, 2 October 2009, as accessed 2 & 16 January 2010 [69] Confusion on Where Money Lent via Kiva Goes (http:/ / www. nytimes. com/ 2009/ 11/ 09/ business/ global/ 09kiva. html?_r=1& scp=1& sq=Kiva& st=cse), by Stephanie Strom, in The New York Times, 8 November 2009, as accessed 2 & 16 January 2010 [70] "Zidisha Set to "Expand" in Peer-to-Peer Microfinance", Microfinance Focus, Feb 2010 (http:/ / www. microfinancefocus. com/ news/ 2010/ 02/ 07/ zidisha-set-to-expand-in-peer-to-peer-microfinance-julia-kurnia/ ) [71] Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=12187), Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain (eds), MIT Press, April 2010, ISBN 0-262-51435-4, ISBN 978-0-262-51435-4 [72] "Finland censors anti-censorship site" (http:/ / www. theregister. co. uk/ 2008/ 02/ 18/ finnish_policy_censor_activist/ ). The Register. 18 February 2008. . Retrieved 19 February 2008.
16
External links
Organizations
The Internet Society (http://www.isoc.org/) Berkman Center for Internet and Society (http://cyber.law.harvard.edu/) European Commission Information Society (http://ec.europa.eu/information_society/index_en.htm) Living Internet (http://www.livinginternet.com/), Internet history and related information, including information from many creators of the Internet
Internet "The Internet spreads its tentacles" (http://www.sciencenews.org/view/generic/id/8651/description/ Mapping_a_Medusa_The_Internet_spreads_its_tentacles), Julie Rehmeyer, Science News, Vol. 171, No. 25, pp.387388, 23 June 2007 Internet (http://www.routledge.com/books/details/9780415352277/), Lorenzo Cantoni & Stefano Tardini, Routledge, 2006, ISBN 978-0-203-69888-4
17
18
1961 First packet-switching papers 1966 Merit Network founded 1966 ARPANET planning starts 1969 ARPANET carries its first packets 1970 Mark I network at NPL (UK) 1970 Network Information Center (NIC) 1971 Merit Network's packet-switched network operational 1971 Tymnet packet-switched network 1972 Internet Assigned Numbers Authority (IANA) established 1973 CYCLADES network demonstrated 1974 Telenet packet-switched network 1976 X.25 protocol approved 1978 Minitel introduced 1979 Internet Activities Board (IAB) 1980 USENET news using UUCP 1980 Ethernet standard introduced 1981 BITNET established Len Kleinrock and the first Interface Message [1] Processor.
1981 Computer Science Network (CSNET) 1982 TCP/IP protocol suite formalized 1982 Simple Mail Transfer Protocol (SMTP) 1983 Domain Name System (DNS) 1983 MILNET split off from ARPANET 1985 First .COM domain name registered 1986 NSFNET with 56 kbit/s links 1986 Internet Engineering Task Force (IETF) 1987 UUNET founded 1988 NSFNET upgraded to 1.5 Mbit/s (T1) 1988 OSI Reference Model released 1988 Morris worm 1989 Border Gateway Protocol (BGP) 1989 PSINet founded, allows commercial traffic 1989 Federal Internet Exchanges (FIXes) 1990 GOSIP (without TCP/IP) 1990 ARPANET decommissioned 1990 Advanced Network and Services (ANS) 1990 UUNET/Alternet allows commercial traffic 1990 Archie search engine 1991 Wide area information server (WAIS) 1991 Gopher 1991 Commercial Internet eXchange (CIX) 1991 ANS CO+RE allows commercial traffic 1991 World Wide Web (WWW) 1992 NSFNET upgraded to 45 Mbit/s (T3)
19
1995 New Internet architecture with commercial ISPs connected at NAPs 1995 NSFNET decommissioned 1995 GOSIP updated to allow TCP/IP 1995 very high-speed Backbone Network Service (vBNS) 1995 IPv6 proposed 1998 Internet Corporation for Assigned Names and Numbers (ICANN) 1999 IEEE 802.11b wireless networking 1999 Internet2/Abilene Network 1999 vBNS+ allows broader access 2000 Dot-com bubble bursts 2001 New top-level domain names activated 2001 Code Red I, Code Red II, and Nimda worms 2003 National LambdaRail founded 2006 First meeting of the Internet Governance Forum 2010 First internationalized country code top-level domains registered 2012 ICANN begins accepting applications for new generic top-level domain names Examples of popular Internet services: 1990 IMDb Internet movie database 1995 Amazon.com online retailer 1995 eBay online auction and shopping 1995 Craigslist classified advertisements 1996 Hotmail free web-based e-mail 1997 Babel Fish automatic translation 1998 Google Search 1998 Yahoo! Clubs (now Yahoo! Groups) 1998 PayPal Internet payment system 1999 Napster peer-to-peer file sharing 2001 BitTorrent peer-to-peer file sharing 2001 Wikipedia, the free encyclopedia 2003 LinkedIn business networking 2003 Myspace social networking site 2003 Skype Internet voice calls 2003 iTunes Store 2003 4Chan Anonymous image-based bulletin board 2004 Facebook social networking site 2004 Podcast media file series 2004 Flickr image hosting 2005 YouTube video sharing 2005 Google Earth virtual globe 2006 Twitter microblogging 2007 WikiLeaks anonymous news and information leaks
20
Precursors
The Internet has precursors that date back to the 19th century, especially the telegraph system, more than a century before the digital Internet became widely used in the second half of the 1990s. The concept of data communication transmitting data between two different places, connected via some kind of electromagnetic medium, such as radio or an electrical wire predates the introduction of the first computers. Such communication systems were typically limited to point to point communication between two end devices. Telegraph systems and telex machines can be considered early precursors of this kind of communication. Fundamental theoretical work in data transmission and information theory was developed by Claude Shannon, Harry Nyquist, and Ralph Hartley, during the early 20th century. Early computers used the technology available at the time to allow communication between the central processing unit and remote terminals. As the technology evolved, new systems were devised to allow communication over longer distances (for terminals) or with higher speed (for interconnection of local devices) that were necessary for the mainframe computer model. Using these technologies it was possible to exchange data (such as files) between remote computers. However, the point to point communication model was limited, as it did not allow for direct communication between any two arbitrary systems; a physical link was necessary. The technology was also deemed as inherently unsafe for strategic and military use, because there were no alternative paths for the communication in case of an enemy attack.
History of the Internet obvious what to do (But I don't want to do it): If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPAnet." Robert W.Taylor, co-writer with Licklider of "The Computer as a Communications Device", in an interview with The New York Times,[3] Although he left the IPTO in 1964, five years before the ARPANET went live, it was his vision of universal networking that provided the impetus that led his successors such as Lawrence Roberts and Robert Taylor to further the ARPANET development. Licklider later returned to lead the IPTO in 1973 for two years.[4]
21
Packet switching
At the tip of the problem lay the issue of connecting separate physical networks to form one logical network. During the 1960s, Paul Baran (RAND Corporation), produced a study of survivable networks for the US military. Information transmitted across Baran's network would be divided into what he called 'message-blocks'. Independently, Donald Davies (National Physical Laboratory, UK), proposed and developed a similar network based on what he called packet-switching, the term that would ultimately be adopted. Leonard Kleinrock (MIT) developed mathematical theory behind this technology. Packet-switching provides better bandwidth utilization and response times than the traditional circuit-switching technology used for telephony, particularly on resource-limited interconnection links.[5] Packet switching is a rapid store-and-forward networking design that divides messages up into arbitrary packets, with routing decisions made per-packet. Early networks used message switched systems that required rigid routing structures prone to single point of failure. This led Tommy Krash and Paul Baran's U.S. military funded research to focus on using message-blocks to include network redundancy.[6] The widespread urban legend that the Internet was designed to resist nuclear attack likely arose as a result of Baran's earlier work on packet switching, which did focus on redundancy in the face of a nuclear "holocaust."[7][8]
History of the Internet used today for proposing and distributing Internet Protocols and Systems. RFC 1, entitled "Host Software", was written by Steve Crocker from the University of California, Los Angeles, and published on April 7, 1969. These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing. International collaborations on ARPANET were sparse. For various political reasons, European developers were concerned with developing the X.25 networks. Notable exceptions were the Norwegian Seismic Array (NORSAR) in 1972, followed in 1973 by Sweden with satellite links to the Tanum Earth Station and Peter Kirstein's research group in the UK, initially at the Institute of Computer Science, London University and later at University College London.[12]
22
NPL
In 1965, Donald Davies of the National Physical Laboratory (United Kingdom) proposed a national data network based on packet-switching. The proposal was not taken up nationally, but by 1970 he had designed and built the Mark I packet-switched network to meet the needs of the multidisciplinary laboratory and prove the technology under operational conditions.[13] By 1976 12 computers and 75 terminal devices were attached and more were added until the network was replaced in 1986.
Merit Network
The Merit Network[14] was formed in 1966 as the Michigan Educational Research Information Triad to explore computer networking between three of Michigan's public universities as a means to help the state's educational and economic development.[15] With initial support from the State of Michigan and the National Science Foundation (NSF), the packet-switched network was first demonstrated in December 1971 when an interactive host to host connection was made between the IBM mainframe computer systems at the University of Michigan in Ann Arbor and Wayne State University in Detroit.[16] In October 1972 connections to the CDC mainframe at Michigan State University in East Lansing completed the triad. Over the next several years in addition to host to host interactive connections the network was enhanced to support terminal to host connections, host to host batch connections (remote job submission, remote printing, batch file transfer), interactive file transfer, gateways to the Tymnet and Telenet public data networks, X.25 host attachments, gateways to X.25 data networks, Ethernet attached hosts, and eventually TCP/IP and additional public universities in Michigan join the network.[16][17] All of this set the stage for Merit's role in the NSFNET project starting in the mid-1980s.
CYCLADES
The CYCLADES packet switching network was a French research network designed and directed by Louis Pouzin. First demonstrated in 1973, it was developed to explore alternatives to the initial ARPANET design and to support network research generally. It was the first network to make the hosts responsible for the reliable delivery of data, rather than the network itself, using unreliable datagrams and associated end-to-end protocol mechanisms.[18][19]
History of the Internet Unlike ARPANET, X.25 was commonly available for business use. Telenet offered its Telemail electronic mail service, which was also targeted to enterprise use rather than the general email system of the ARPANET. The first public dial-in networks used asynchronous TTY terminal protocols to reach a concentrator operated in the public network. Some networks, such as CompuServe, used X.25 to multiplex the terminal sessions into their packet-switched backbones, while others, such as Tymnet, used proprietary protocols. In 1979, CompuServe became the first service to offer electronic mail capabilities and technical support to personal computer users. The company broke new ground again in 1980 as the first to offer real-time chat with its CB Simulator. Other major dial-in networks were America Online (AOL) and Prodigy that also provided communications, content, and entertainment features. Many bulletin board system (BBS) networks also provided on-line access, such as FidoNet which was popular amongst hobbyist computer users, many of them hackers and amateur radio operators.
23
24 With the role of the network reduced to the bare minimum, it became possible to join almost any networks together, no matter what their characteristics were, thereby solving Kahn's initial problem. DARPA agreed to fund development of prototype software, and after several years of work, the first demonstration of a gateway between the Packet Radio network in the SF Bay area and the ARPANET was conducted by the Stanford Research Institute. On November 22, 1977 a three network demonstration was conducted including the ARPANET, the Packet Radio Network and the Atlantic Packet Satellite network.[24][25]
Stemming from the first specifications of TCP in 1974, TCP/IP emerged in mid-late 1978 in nearly final form. By 1981, the associated standards were published as RFCs 791, 792 and 793 and adopted for use. DARPA sponsored or encouraged the development of TCP/IP implementations for many operating systems and then scheduled a migration of all hosts on all of its packet networks to TCP/IP. On January 1, 1983, known as flag day, TCP/IP protocols became the only approved protocol on the ARPANET, replacing the earlier NCP protocol.[26]
A Stanford Research Institute packet radio van, site of the first three-way internetworked transmission.
ARPANET to the federal wide area networks: MILNET, NSI, ESNet, CSNET, and NSFNET
After the ARPANET had been up and running for several years, ARPA looked for another agency to hand off the network to; ARPA's primary mission was funding cutting edge research and development, not running a communications utility. Eventually, in July 1975, the network had been turned over to the Defense Communications Agency, also part of the Department of Defense. In 1983, the U.S. military portion of the ARPANET was broken off as a separate network, the MILNET. MILNET subsequently became the unclassified but military-only NIPRNET, in parallel with the BBN Technologies TCP/IP internet map early 1986 SECRET-level SIPRNET and JWICS for TOP SECRET and above. NIPRNET does have controlled security gateways to the public Internet. The networks based on the ARPANET were government funded and therefore restricted to noncommercial uses such as research; unrelated commercial use was strictly forbidden. This initially restricted connections to military sites and universities. During the 1980s, the connections expanded to more educational institutions, and even to a growing number of companies such as Digital Equipment Corporation and Hewlett-Packard, which were participating in research projects or providing services to those who were. Several other branches of the U.S. government, the National Aeronautics and Space Agency (NASA), the National Science Foundation (NSF), and the Department of Energy (DOE) became heavily involved in Internet research and started development of a successor to ARPANET. In the mid 1980s, all three of these branches developed the first
History of the Internet Wide Area Networks based on TCP/IP. NASA developed the NASA Science Network, NSF developed CSNET and DOE evolved the Energy Sciences Network or ESNet. NASA developed the TCP/IP based NASA Science Network (NSN) in the mid 1980s, connecting space scientists to data and information stored anywhere in the world. In 1989, the DECnet-based Space Physics Analysis Network (SPAN) and the TCP/IP-based NASA Science Network (NSN) were brought together at NASA Ames Research Center creating the first multiprotocol wide area network called the NASA Science Internet, or NSI. NSI was established to provide a totally T3 NSFNET Backbone, c. 1992 integrated communications infrastructure to the NASA scientific community for the advancement of earth, space and life sciences. As a high-speed, multiprotocol, international network, NSI provided connectivity to over 20,000 scientists across all seven continents. In 1981 NSF supported the development of the Computer Science Network (CSNET). CSNET connected with ARPANET using TCP/IP, and ran TCP/IP over X.25, but it also supported departments without sophisticated network connections, using automated dial-up mail exchange. Its experience with CSNET lead NSF to use TCP/IP when it created NSFNET, a 56kbit/s backbone established in 1986, that connected the NSF supported supercomputing centers and regional research and education networks in the United States.[27] However, use of NSFNET was not limited to supercomputer users and the 56kbit/s network quickly became overloaded. NSFNET was upgraded to 1.5Mbit/s in 1988. The existence of NSFNET and the creation of Federal Internet Exchanges (FIXes) allowed the ARPANET to be decommissioned in 1990. NSFNET was expanded and upgraded to 45Mbit/s in 1991, and was decommissioned in 1995 when it was replaced by backbones operated by several commercial Internet Service Providers.
25
History of the Internet away from the centric architecture which ARPANET had emphasized. In 1994, Classless Inter-Domain Routing was introduced to support better conservation of address space which allowed use of route aggregation to decrease the size of routing tables.[32]
26
27
At the beginning of the 1990s, African countries relied upon X.25 IPSS and 2400 baud modem UUCP links for international and internetwork computer communications.
List of countries by number of Internet usersInternet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union. "Percentage of Individuals using the Internet 2000-2010", International Telecommunications Union, accessed 16 April 2012
In August 1995, InfoMail Uganda, Ltd., a privately held firm in Kampala now known as InfoCom, and NSN Network Services of Avon, Colorado, sold in 1997 and now known as Clear Channel Satellite, established Africa's first native TCP/IP high-speed satellite Internet services. The data connection was originally carried by a C-Band RSCC Russian satellite which connected InfoMail's Kampala offices directly to NSN's MAE-West point of presence using a private network from NSN's leased ground station in New Jersey. InfoCom's first satellite connection was just 64 kbit/s, serving a Sun host computer and twelve US Robotics dial-up modems. In 1996 a USAID funded project, the Leland initiative [36], started work on developing full Internet connectivity for the continent. Guinea, Mozambique, Madagascar and Rwanda gained satellite earth stations in 1997, followed by Cte d'Ivoire and Benin in 1998. Africa is building an Internet infrastructure. AfriNIC, headquartered in Mauritius, manages IP address allocation for the continent. As do the other Internet regions, there is an operational forum, the Internet Community of Operational Networking Specialists.[37] There are a wide range of programs both to provide high-performance transmission plant, and the western and southern coasts have undersea optical cable. High-speed cables join North Africa and the Horn of Africa to intercontinental cable systems. Undersea cable development is slower for East Africa; the original joint effort between New Partnership for Africa's Development (NEPAD) and the East Africa Submarine System (Eassy) has broken off and may become two efforts.[38] Asia and Oceania The Asia Pacific Network Information Centre (APNIC), headquartered in Australia, manages IP address allocation for the continent. APNIC sponsors an operational forum, the Asia-Pacific Regional Internet Conference on Operational Technologies (APRICOT).[39] In 1991, the People's Republic of China saw its first TCP/IP college network, Tsinghua University's TUNET. The PRC went on to make its first global Internet connection in 1994, between the Beijing Electro-Spectrometer Collaboration and Stanford University's Linear Accelerator Center. However, China went on to implement its own digital divide by implementing a country-wide content filter.[40]
History of the Internet Latin America As with the other regions, the Latin American and Caribbean Internet Addresses Registry (LACNIC) manages the IP address space and other resources for its area. LACNIC, headquartered in Uruguay, operates DNS root, reverse DNS, and other key services.
28
29
Internet governance
As a globally distributed network of voluntarily interconnected autonomous networks, the Internet operates without a central governing body. It has no centralized governance for either technology or policies, and each constituent network chooses what technologies and protocols it will deploy from the voluntary technical standards that are developed by the Internet Engineering Task Force (IETF).[54] However, throughout its entire history, the Internet system has had an "Internet Assigned Numbers Authority" (IANA) for the allocation and assignment of various technical identifiers needed for the operation of the Internet.[55] The Internet Corporation for Assigned Names and Numbers (ICANN) provides oversight and coordination for two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System.
History of the Internet awarded the administration and maintenance of DDN-NIC (managed by SRI up until this point) to Government Systems, Inc., who subcontracted it to the small private-sector Network Solutions, Inc.[56][57] The increasing cultural diversity of the Internet also posed administrative challenges for centralized management of the IP addresses. In October 1992, the Internet Engineering Task Force (IETF) published RFC 1366,[58] which described the "growth of the Internet and its increasing globalization" and set out the basis for an evolution of the IP registry process, based on a regionally distributed registry model. This document stressed the need for a single Internet number registry to exist in each geographical region of the world (which would be of "continental dimensions"). Registries would be "unbiased and widely recognized by network providers and subscribers" within their region. The RIPE Network Coordination Centre (RIPE NCC) was established as the first RIR in May 1992. The second RIR, the Asia Pacific Network Information Centre (APNIC), was established in Tokyo in 1993, as a pilot project of the Asia Pacific Networking Group.[59] Since at this point in history most of the growth on the Internet was coming from non-military sources, it was decided that the Department of Defense would no longer fund registration services outside of the .mil TLD. In 1993 the U.S. National Science Foundation, after a competitive bidding process in 1992, created the InterNIC to manage the allocations of addresses and management of the address databases, and awarded the contract to three organizations. Registration Services would be provided by Network Solutions; Directory and Database Services would be provided by AT&T; and Information Services would be provided by General Atomics.[60] Over time, after consultation with the IANA, the IETF, RIPE NCC, APNIC, and the Federal Networking Council (FNC), the decision was made to separate the management of domain names from the management of IP numbers.[59] Following the examples of RIPE NCC and APNIC, it was recommended that management of IP address space then administered by the InterNIC should be under the control of those that use it, specifically the ISPs, end-user organizations, corporate entities, universities, and individuals. As a result, the American Registry for Internet Numbers (ARIN) was established as in December 1997, as an independent, not-for-profit corporation by direction of the National Science Foundation and became the third Regional Internet Registry.[61] In 1998 both the IANA and remaining DNS-related InterNIC functions were reorganized under the control of ICANN, a California non-profit corporation contracted by the United States Department of Commerce to manage a number of Internet-related tasks. As these tasks involved technical coordination for two principal Internet name spaces (DNS names and IP addresses) created by the IETF, ICANN also signed a memorandum of understanding with the IAB to define the technical work to be carried out by the Internet Assigned Numbers Authority.[62] The management of Internet address space remained with the regional Internet registries, which collectively were defined as a supporting organization within the ICANN structure.[63] ICANN provides central coordination for the DNS system, including policy coordination for the split registry / registrar system, with competition among registry service providers to serve each top-level-domain and multiple competing registrars offering DNS services to end-users.
30
History of the Internet was introduced at the fifth IETF meeting in February 1987. The seventh IETF meeting in July 1987 was the first meeting with more than 100 attendees. In 1992, the Internet Society, a professional membership society, was formed and IETF began to operate under it as an independent international standards body. The first IETF meeting outside of the United States was held in Amsterdam, The Netherlands, in July 1993. Today the IETF meets three times a year and attendnce is often about 1,300 people, but has been as high as 2,000 upon occasion. Typically one in three IETF meetings are held in Europe or Asia. The number of non-US attendees is roughly 50%, even at meetings held in the United States.[64] The IETF is unusual in that it exists as a collection of happenings, but is not a corporation and has no board of directors, no members, and no dues. The closest thing there is to being an IETF member is being on the IETF or a Working Group mailing list. IETF volunteers come from all over the world and from many different parts of the Internet community. The IETF works closely with and under the supervision of the Internet Engineering Steering Group (IESG)[66] and the Internet Architecture Board (IAB).[67] The Internet Research Task Force (IRTF) and the Internet Research Steering Group (IRSG), peer activities to the IETF and IESG under the general supervision of the IAB, focus on longer term research issues.[64][68] Request for Comments Request for Comments (RFCs) are the main documentation for the work of the IAB, IESG, IETF, and IRTF. RFC 1, "Host Software", was written by Steve Crocker at UCLA in April 1969, well before the IETF was created. Originally they were technical memos documenting aspects of ARPANET development and were edited by the late Jon Postel, the first RFC Editor.[64][69] RFCs cover a wide range of information from proposed standards, draft standards, full standards, best practices, experimental protocols, history, and other informational topics.[70] RFCs can be written by individuals or informal groups of individuals, but many are the product of a more formal Working Group. Drafts are submitted to the IESG either by individuals or by the Working Group Chair. An RFC Editor, appointed by the IAB, separate from IANA, and working in conjunction with the IESG, receives drafts from the IESG and edits, formats, and publishes them. Once an RFC is published, it is never revised. If the standard it describes changes or its information becomes obsolete, the revised standard or updated information will be re-published as a new RFC that "obsoletes" the original.[64][69]
31
32
History of the Internet download items such as the earlier Linux versions using the slow dial-up connections available at the time. After the popularization of the Web and the HTTP protocol such tools were slowly abandoned.
33
34
Search engines
Even before the World Wide Web, there were search engines that attempted to organize the Internet. The first of these was the Archie search engine from McGill University in 1990, followed in 1991 by WAIS and Gopher. All three of those systems predated the invention of the World Wide Web but all continued to index the Web and the rest of the Internet for several years after the Web appeared. There are still Gopher servers as of 2006, although there are a great many more web servers. As the Web grew, search engines and Web directories were created to track pages on the Web and allow people to find things. The first full-text Web search engine was WebCrawler in 1994. Before WebCrawler, only Web page titles were searched. Another early search engine, Lycos, was created in 1993 as a university project, and was the first to achieve commercial success. During the late 1990s, both Web directories and Web search engines were popularYahoo! (founded 1994) and Altavista (founded 1995) were the respective industry leaders. By August 2001, the directory model had begun to give way to search engines, tracking the rise of Google (founded 1998), which had developed new approaches to relevancy ranking. Directory features, while still commonly available, became after-thoughts to search engines. Database size, which had been a significant marketing feature through the early 2000s, was similarly displaced by emphasis on relevancy ranking, the methods by which search engines attempt to sort the best results first. Relevancy ranking first became a major issue circa 1996, when it became apparent that it was impractical to review full lists of results. Consequently, algorithms for relevancy ranking have continuously improved. Google's PageRank method for ordering the results has received the most press, but all major search engines continually refine their ranking methodologies with a view toward improving the ordering of results. As of 2006, search engine rankings are more important than ever, so much so that an industry has developed ("search engine optimizers", or "SEO") to help web-developers improve their search ranking, and an entire body of case law has developed around matters that affect search engine rankings, such as use of trademarks in metatags. The sale of search rankings by some search engines has also created controversy among librarians and consumer advocates.[96] On June 3, 2009, Microsoft launched its new search engine, Bing.[97] The following month Microsoft and Yahoo! announced a deal in which Bing would power Yahoo! Search.[98]
File sharing
Resource or file sharing has been an important activity on computer networks from well before the Internet was established and was supported in a variety of ways including bulletin board systems (1978), Usenet (1980), Kermit (1981), and many others. The File Transfer Protocol (FTP) for use on the Internet was standardized in 1985 and is still in use today.[99] A variety of tools were developed to aid the use of FTP by helping users discover files they might want to transfer, including the Wide Area Information Server (WAIS) in 1991, Gopher in 1991, Archie in 1991, Veronica in 1992, Jughead in 1993, Internet Relay Chat (IRC) in 1988, and eventually the World Wide Web (WWW) in 1991 with Web directories and Web search engines. In 1999 Napster became the first peer-to-peer file sharing system.[100] Napster used a central server for indexing and peer discovery, but the storage and transfer of files was decentralized. A variety of peer-to-peer file sharing programs and services with different levels of decentralization and anonymity followed, including: Gnutella, eDonkey2000, and Freenet in 2000, FastTrack, Kazaa, Limewire, and BitTorrent in 2001, and Poisoned in 2003.[101] All of these tools are general purpose and can be used to share a wide variety of content, but sharing of music files, software, and later movies and videos are major uses.[102] And while some of this sharing is legal, large portions are not. Lawsuits and other legal actions caused Napster in 2001, eDonkey2000 in 2005, Kazza in 2006, and Limewire in 2010 to shutdown or refocus their efforts.[103][104] The Pirate Bay, founded in Sweden in 2003, continues despite a trial and appeal in 2009 and 2010 that resulted in jail terms and large fines for several of its founders.[105] File sharing remains contentious and controversial with charges of theft of intellectual property on the one hand and charges of censorship on the other.[106][107]
35
Dot-com bubble
Suddenly the low price of reaching millions worldwide, and the possibility of selling to or hearing from those people at the same moment when they were reached, promised to overturn established business dogma in advertising, mail-order sales, customer relationship management, and many more areas. The web was a new killer appit could bring together unrelated buyers and sellers in seamless and low-cost ways. Entrepreneurs around the world developed new business models, and ran to their nearest venture capitalist. While some of the new entrepreneurs had experience in business and economics, the majority were simply people with ideas, and did not manage the capital influx prudently. Additionally, many dot-com business plans were predicated on the assumption that by using the Internet, they would bypass the distribution channels of existing businesses and therefore not have to compete with them; when the established businesses with strong existing brands developed their own Internet presence, these hopes were shattered, and the newcomers were left attempting to break into markets dominated by larger, more established businesses. Many did not have the ability to do so. The dot-com bubble burst in March 2000, with the technology heavy NASDAQ Composite index peaking at 5,048.62 on March 10[108] (5,132.52 intraday), more than double its value just a year before. By 2001, the bubble's deflation was running full speed. A majority of the dot-coms had ceased trading, after having burnt through their venture capital and IPO capital, often without ever making a profit. But despite this, the Internet continues to grow, driven by commerce, ever greater amounts of online information and knowledge and social networking.
36
Historiography
Some concerns have been raised over the historiography of the Internet's development. Specifically that it is hard to find documentation of much of the Internet's development, for several reasons, including a lack of centralized documentation for much of the early developments that led to the Internet. "The Arpanet period is somewhat well documented because the corporation in charge BBN left a physical record. Moving into the NSFNET era, it became an extraordinarily decentralized process. The record exists in people's basements, in closets. [...] So much of what happened was done verbally and on the basis of individual trust." Doug Gale (2007)[112]
References
[1] Leonard Kleinrock (2005). The history of the Internet (http:/ / www. lk. cs. ucla. edu/ personal_history. html). . Retrieved May 28, 2009. [2] J. C. R. Licklider (1960). Man-Computer Symbiosis. [3] "An Internet Pioneer Ponders the Next Revolution" (http:/ / partners. nytimes. com/ library/ tech/ 99/ 12/ biztech/ articles/ 122099outlook-bobb. html?Partner=Snap). An Internet Pioneer Ponders the Next Revolution. December20,1999. . Retrieved November 25, 2005. [4] Licklider and the Universal Network (http:/ / www. livinginternet. com/ i/ ii_licklider. htm) [5] Ruthfield, Scott (September 1995). "The Internet's History and Development From Wartime Tool to the Fish-Cam" (http:/ / dl. acm. org/ citation. cfm?id=332198. 332202& coll=portal& dl=ACM). Crossroads 2 (1): pp.24. doi:10.1145/332198.332202. Archived (http:/ / web. archive. org/ web/ 20071018045734/ http:/ / www. acm. org/ crossroads/ xrds2-1/ inet-history. html) from the original on October 18, 2007. . Retrieved July 25, 2012. [6] "About Rand" (http:/ / www. rand. org/ about/ history/ baran. html). Paul Baran and the Origins of the Internet. . Retrieved July 25, 2012. [7] Baran, Paul (May 27, 1960) (PDF). Reliable Digital Communications Using Unreliable Network Repeater Nodes (http:/ / www. rand. org/ content/ dam/ rand/ pubs/ papers/ 2008/ P1995. pdf). The RAND Corporation. p.1. . Retrieved July 25, 2012. [8] Johna Till Johnson (June 7, 2004). "'Net was born of economic necessity, not fear" (http:/ / www. networkworld. com/ columnists/ 2004/ 0607johnson. html). . Retrieved July 25, 2012. [9] Gromov, Gregory (1995). "Roads and Crossroads of Internet History" (http:/ / www. netvalley. com/ intval. html). . [10] Hafner, Katie (1998). Where Wizards Stay Up Late: The Origins Of The Internet. Simon & Schuster. ISBN0-684-83267-4. [11] Ronda Hauben (2001). From the ARPANET to the Internet (http:/ / www. columbia. edu/ ~rh120/ other/ tcpdigest_paper. txt). . Retrieved May 28, 2009. [12] "NORSAR and the Internet" (http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx). NORSAR. . Retrieved June 5, 2009. [13] Ward, Mark (October 29, 2009). "Celebrating 40 years of the net" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 8331253. stm). BBC News. .
37
38
39
40
Further reading
Abbate, Janet. Inventing the Internet (http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=4633), Cambridge: MIT Press, 1999. Bemer, Bob, "A History of Source Concepts for the Internet/Web" (http://web.archive.org/web/ 20041216124504/www.bobbemer.com/CONCEPTS.HTM) Campbell-Kelly, Martin; Aspray, William. Computer: A History of the Information Machine. New York: BasicBooks, 1996. Clark, D. (1988). "The Design Philosophy of the DARPA Internet Protocols" (http://www.cs.princeton.edu/ ~jrex/teaching/spring2005/reading/clark88.pdf). SIGCOMM '88 Symposium proceedings on Communications architectures and protocols (ACM): 106114. doi:10.1145/52324.52336. ISBN0897912799. Retrieved 2011-10-16. Graham, Ian S. The HTML Sourcebook: The Complete Guide to HTML. New York: John Wiley and Sons, 1995. Krol, Ed. Hitchhiker's Guide to the Internet, 1987. Krol, Ed. Whole Internet User's Guide and Catalog. O'Reilly & Associates, 1992. Scientific American Special Issue on Communications, Computers, and Networks, September 1991.
External links
Thomas Greene, Larry James Landweber, George Strawn (2003). A Brief History of NSF and the Internet (http:// www.nsf.gov/od/lpa/news/03/fsnsf_internet.htm). National Science Foundation. Retrieved May 28, 2009. Robert H Zakon. "Hobbes' Internet Timeline v10.1" (http://www.zakon.org/robert/internet/timeline/). Retrieved July 23, 2010. "Principal Figures in the Development of the Internet and the World Wide Web" (http://www.unc.edu/depts/ jomc/academics/dri/pioneers2d.html). University of North Carolina. Retrieved July 3, 2006. "Internet History Timeline" (http://www.computerhistory.org/exhibits/internet_history/). Computer History Museum. Retrieved November 25, 2005. Marcus Kazmierczak (September 24, 1997). "Internet History" (http://web.archive.org/web/20051031200142/ http://www.mkaz.com/ebeab/history/). Archived from the original (http://www.mkaz.com/ebeab/history/) on October 31, 2005. Retrieved November 25, 2005. Harri K. Salminen. "History of the Internet" (http://www.nic.funet.fi/index/FUNET/history/internet/en/ etusivu-en.html). Heureka Science Center, Finland. Retrieved June 11, 2008. "Histories of the Internet" (http://www.isoc.org/internet/history/). Internet Society. Retrieved December 1, 2007. "Living Internet" (http://www.livinginternet.com/i/ii.htm). Retrieved January 1, 2009. Internet History with input from many of the people who helped invent the Internet (http://www.livinginternet.com/tcomments.htm) "Voice of America: Overhearing the Internet" (http://www.eff.org/Net_culture/overhearing_the_internet. article.txt), Robert Wright, The New Republic, September 13, 1993 "How the Internet Came to Be" (http://www.netvalley.com/archives/mirrors/cerf-how-inet.html), by Vinton Cerf, 1993 "Cybertelecom :: Internet History" (http://www.cybertelecom.org/notes/internet_history.htm), focusing on the governmental, legal, and policy history of the Internet "History of the Internet" (http://vimeo.com/2696386?pg=embed&sec=2696386), an animated documentary from 2009 explaining the inventions from time-sharing to filesharing, from Arpanet to Internet "The Roads and Crossroads of Internet History" (http://www.netvalley.com/intval1.html), by Gregory R. Gromov The History of the Internet According to Itself: A Synthesis of Online Internet Histories Available at the Turn of the Century (http://members.cox.net/opfer/Internet.htm), Steven E. Opfer, 1999
History of the Internet "Fool Us Once Shame on YouFool Us Twice Shame on Us: What We Can Learn from the Privatizations of the Internet Backbone Network and the Domain Name System" (http://digitalcommons.law.wustl.edu/lawreview/ vol79/iss1/2), Jay P. Kesan and Rajiv C. Shah, Washington University Law Review, Volume 79, Issue 1 (2001) "How It All Started" (http://www.w3.org/2004/Talks/w3c10-HowItAllStarted/) (slides), Tim Berners-Lee, W3C, December 2004 "A Little History of the World Wide Web: from 1945 to 1995" (http://www.w3.org/History.html), Dan Connolly, W3C, 2000 "The World Wide Web: Past, Present and Future" (http://www.w3.org/People/Berners-Lee/1996/ppf.html), Tim Berners-Lee, August 1996
41
42
The Web's logo designed by Robert Cailliau Inventor Company Availability Tim Berners-Lee CERN Worldwide [1]
The World Wide Web (abbreviated as WWW or W3,[2] commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. Using concepts from his earlier hypertext systems like ENQUIRE, British engineer, computer scientist and at that time employee of CERN, Sir Tim Berners-Lee, now Director of the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At CERN, a European research organisation near Geneva situated on Swiss and French soil,[3] Berners-Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use hypertext "to link and access information of various kinds as a web of nodes in which the user can browse at will",[4] and they publicly introduced the project in December of the same year.[5]
History
In the May 1970 issue of Popular Science magazine, Arthur C. Clarke predicted that satellites would someday "bring the accumulated knowledge of the world to your fingertips" using a console that would combine the functionality of the Xerox, telephone, television and a small computer, allowing data transfer and video conferencing around the globe.[6] In March 1989, Tim Berners-Lee wrote a proposal that referenced ENQUIRE, a database and software project he had built in 1980, and described a more elaborate information management system.[7] With help from Robert Cailliau, he published a more formal proposal (on 12 November 1990) to build a "Hypertext project" called
The NeXT Computer used by Berners-Lee. The handwritten label declares, "This machine is a server. DO NOT POWER IT DOWN!!"
World Wide Web "WorldWideWeb" (one word, also "W3") as a "web" of "hypertext documents" to be viewed by "browsers" using a clientserver architecture.[4] This proposal estimated that a read-only web would be developed within three months and that it would take six months to achieve "the creation of new links and new material by readers, [so that] authorship becomes universal" as well as "the automatic notification of a reader when new material of interest to him/her has become available." While the read-only goal was met, accessible authorship of web content took longer to mature, with the wiki concept, blogs, Web 2.0 and RSS/Atom.[8] The proposal was modeled after the Dynatext SGML reader by Electronic Book Technology, a spin-off from the Institute for Research in Information and Scholarship at Brown University. The Dynatext system, licensed by CERN, was technically advanced and was a key player in the extension of SGML ISO 8879:1986 to Hypermedia within HyTime, but it was considered too expensive and had an inappropriate licensing policy for use in the general high energy physics community, namely a fee for each document and each document alteration. A NeXT Computer was used by Berners-Lee as the world's first web server and also to write the first web browser, WorldWideWeb, in 1990. By Christmas 1990, Berners-Lee had built all the tools necessary for a working Web:[9] the first web browser (which was a web editor as well); the first web server; and the first web pages,[10] which described the project itself. On 6 August 1991, he posted a short summary of the World Wide Web project on the alt.hypertext newsgroup.[11] This date also marked the debut of the Web as a publicly available The CERN datacenter in 2010 housing some service on the Internet. Many newsmedia have reported that the first WWW servers photo on the web was uploaded by Berners-Lee in 1992, an image of the CERN house band Les Horribles Cernettes taken by Silvano de Gennaro; Gennaro has disclaimed this story, writing that media were "totally distorting our words for the sake of cheap sensationalism."[12] The first server outside Europe was set up at the Stanford Linear Accelerator Center (SLAC) in Palo Alto, California, to host the SPIRES-HEP database. Accounts differ substantially as to the date of this event. The World Wide Web Consortium says December 1992,[13] whereas SLAC itself claims 1991.[14][15] This is supported by a W3C document titled A Little History of the World Wide Web.[16] The crucial underlying concept of hypertext originated with older projects from the 1960s, such as the Hypertext Editing System (HES) at Brown University, Ted Nelson's Project Xanadu, and Douglas Engelbart's oN-Line System (NLS). Both Nelson and Engelbart were in turn inspired by Vannevar Bush's microfilm-based "memex", which was described in the 1945 essay "As We May Think".
[17]
43
Berners-Lee's breakthrough was to marry hypertext to the Internet. In his book Weaving The Web, he explains that he had repeatedly suggested that a marriage between the two technologies was possible to members of both technical communities, but when no one took up his invitation, he finally tackled the project himself. In the process, he developed three essential technologies: 1. a system of globally unique identifiers for resources on the Web and elsewhere, the Universal Document Identifier (UDI), later known as Uniform Resource Locator (URL) and Uniform Resource Identifier (URI); 2. the publishing language HyperText Markup Language (HTML); 3. the Hypertext Transfer Protocol (HTTP).[18] The World Wide Web had a number of differences from other hypertext systems that were then available. The Web required only unidirectional links rather than bidirectional ones. This made it possible for someone to link to another resource without action by the owner of that resource. It also significantly reduced the difficulty of implementing web servers and browsers (in comparison to earlier systems), but in turn presented the chronic problem of link rot. Unlike predecessors such as HyperCard, the World Wide Web was non-proprietary, making it possible to develop
World Wide Web servers and clients independently and to add extensions without licensing restrictions. On 30 April 1993, CERN announced that the World Wide Web would be free to anyone, with no fees due.[19] Coming two months after the announcement that the server implementation of the Gopher protocol was no longer free to use, this produced a rapid shift away from Gopher and towards the Web. An early popular web browser was ViolaWWW for Unix and the X Windowing System. Scholars generally agree that a turning point for the World Wide Web began with the introduction[20] of the Mosaic web browser[21] in 1993, a graphical browser developed by a team at the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign (NCSA-UIUC), led by Marc Andreessen. Funding for Mosaic came from the U.S. High-Performance Computing and Communications Initiative and the High Performance Computing and Communication Act of 1991, one of several computing developments initiated by U.S. Senator Al Gore.[22] Prior to the release of Mosaic, Robert Cailliau, Jean-Franois Abramatic of graphics were not commonly mixed with text in web pages and the IBM, and Tim Berners-Lee at the 10th Web's popularity was less than older protocols in use over the Internet, anniversary of the World Wide Web Consortium. such as Gopher and Wide Area Information Servers (WAIS). Mosaic's graphical user interface allowed the Web to become, by far, the most popular Internet protocol. The World Wide Web Consortium (W3C) was founded by Tim Berners-Lee after he left the European Organization for Nuclear Research (CERN) in October 1994. It was founded at the Massachusetts Institute of Technology Laboratory for Computer Science (MIT/LCS) with support from the Defense Advanced Research Projects Agency (DARPA), which had pioneered the Internet; a year later, a second site was founded at INRIA (a French national computer research lab) with support from the European Commission DG InfSo; and in 1996, a third continental site was created in Japan at Keio University. By the end of 1994, while the total number of websites was still minute compared to present standards, quite a number of notable websites were already active, many of which are the precursors or inspiration for today's most popular services. Connected by the existing Internet, other websites were created around the world, adding international standards for domain names and HTML. Since then, Berners-Lee has played an active role in guiding the development of web standards (such as the markup languages in which web pages are composed), and in recent years has advocated his vision of a Semantic Web. The World Wide Web enabled the spread of information over the Internet through an easy-to-use and flexible format. It thus played an important role in popularizing use of the Internet.[23] Although the two terms are sometimes conflated in popular use, World Wide Web is not synonymous with Internet.[24] The Web is a collection of documents and both client and server software using Internet protocols such as TCP/IP and HTTP. Tim Berners-Lee was knighted in 2004 by Queen Elizabeth II for his contribution to the World Wide Web.
44
Function
The terms Internet and World Wide Web are often used in everyday speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The Internet is a global system of interconnected computer networks. In contrast, the Web is one of the services that runs on the Internet. It is a collection of text documents and other resources, linked by hyperlinks and URLs, usually accessed by web browsers from web servers. In short, the Web can be thought of as an application "running" on the Internet.[25] Viewing a web page on the World Wide Web normally begins either by typing the URL of the page into a web browser or by following a hyperlink to that page or resource. The web browser then initiates a series of communication messages, behind the scenes, in order to fetch and display it. As an example, consider accessing a page with the URL http://example.org/wiki/World_Wide_Web .
World Wide Web First, the browser resolves the server-name portion of the URL (example.org) into an Internet Protocol address using the globally distributed database known as the Domain Name System (DNS); this lookup returns an IP address such as 208.80.152.2. The browser then requests the resource by sending an HTTP request across the Internet to the computer at that particular address. It makes the request to a particular application port in the underlying Internet Protocol Suite so that the computer receiving the request can distinguish an HTTP request from other network protocols it may be servicing such as e-mail delivery; the HTTP protocol normally uses port 80. The content of the HTTP request can be as simple as the two lines of text GET /wiki/World_Wide_Web HTTP/1.1 Host: example.org The computer receiving the HTTP request delivers it to web server software listening for requests on port 80. If the web server can fulfill the request it sends an HTTP response back to the browser indicating success, which can be as simple as HTTP/1.0 200 OK Content-Type: text/html; charset=UTF-8 followed by the content of the requested page. The Hypertext Markup Language for a basic web page looks like <html> <head> <title>Example.org The World Wide Web</title> </head> <body> <p>The World Wide Web, abbreviated as WWW and commonly known ...</p> </body> </html> The web browser parses the HTML, interpreting the markup (<title>, <p> for paragraph, and such) that surrounds the words in order to draw the text on the screen. Many web pages use HTML to reference the URLs of other resources such as images, other embedded media, scripts that affect page behavior, and Cascading Style Sheets that affect page layout. The browser will make additional HTTP requests to the web server for these other Internet media types. As it receives their content from the web server, the browser progressively renders the page onto the screen as specified by its HTML and these additional resources.
45
46
Linking
Most web pages contain hyperlinks to other related pages and perhaps to downloadable files, source documents, definitions and other web resources. In the underlying HTML, a hyperlink looks like <a href="http://example.org/wiki/Main_Page">Example.org, a free encyclopedia</a> Such a collection of useful, related resources, interconnected via hypertext links is dubbed a web of information. Publication on the Internet created what Tim Berners-Lee first called the WorldWideWeb (in its original CamelCase, which was subsequently discarded) in November 1990.[4] The hyperlink structure of the WWW is described by the webgraph: the nodes of the webgraph correspond to the web pages (or URLs) the directed edges between them to the hyperlinks.
Graphic representation of a minute fraction of the Over time, many web resources pointed to by hyperlinks disappear, WWW, demonstrating hyperlinks relocate, or are replaced with different content. This makes hyperlinks obsolete, a phenomenon referred to in some circles as link rot and the hyperlinks affected by it are often called dead links. The ephemeral nature of the Web has prompted many efforts to archive web sites. The Internet Archive, active since 1996, is the best known of such efforts.
WWW prefix
Many domain names used for the World Wide Web begin with www because of the long-standing practice of naming Internet hosts (servers) according to the services they provide. The hostname for a web server is often www, in the same way that it may be ftp for an FTP server, and news or nntp for a USENET news server. These host names appear as Domain Name System or [domain name server](DNS) subdomain names, as in www.example.com. The use of 'www' as a subdomain name is not required by any technical or policy standard and many web sites do not use it; indeed, the first ever web server was called nxoc01.cern.ch.[28] According to Paolo Palazzi,[29] who worked at CERN along with Tim Berners-Lee, the popular use of 'www' subdomain was accidental; the World Wide Web project page was intended to be published at www.cern.ch while info.cern.ch was intended to be the CERN home page, however the dns records were never switched, and the practice of prepending 'www' to an institution's website domain name was subsequently copied. Many established websites still use 'www', or they invent other subdomain names such as 'www2', 'secure', etc. Many such web servers are set up so that both the domain root (e.g., example.com) and the www subdomain (e.g., www.example.com) refer to the same site; others require one form or the other, or they may map to different web sites. The use of a subdomain name is useful for load balancing incoming web traffic by creating a CNAME record that points to a cluster of web servers. Since, currently, only a subdomain can be used in a CNAME, the same result
World Wide Web cannot be achieved by using the bare domain root. When a user submits an incomplete domain name to a web browser in its address bar input field, some web browsers automatically try adding the prefix "www" to the beginning of it and possibly ".com", ".org" and ".net" at the end, depending on what might be missing. For example, entering 'microsoft' may be transformed to http://www.microsoft.com/ and 'openoffice' to http://www.openoffice.org. This feature started appearing in early versions of Mozilla Firefox, when it still had the working title 'Firebird' in early 2003, from an earlier practice in browsers such as Lynx.[30] It is reported that Microsoft was granted a US patent for the same idea in 2008, but only for mobile devices.[31] In English, www is usually read as double-u double-u double-u. Some users pronounce it dub-dub-dub, particularly in New Zealand. Stephen Fry, in his "Podgrammes" series of podcasts, pronouncing it wuh wuh wuh. The English writer Douglas Adams once quipped in The Independent on Sunday (1999): "The World Wide Web is the only thing I know of whose shortened form takes three times longer to say than what it's short for". In Mandarin Chinese, World Wide Web is commonly translated via a phono-semantic matching to wn wi wng ( ), which satisfies www and literally means "myriad dimensional net",[32] a translation that very appropriately reflects the design concept and proliferation of the World Wide Web. Tim Berners-Lee's web-space states that World Wide Web is officially spelled as three separate words, each capitalised, with no intervening hyphens.[33] Use of the www prefix is declining as Web 2.0 web applications seek to brand their domain names and make them easily pronounceable.[34] As the mobile web grows in popularity, services like Gmail.com, MySpace.com, Facebook.com, Bebo.com and Twitter.com are most often discussed without adding www to the domain (or, indeed, the .com).
47
Web servers
The primary function of a web server is to deliver web pages on the request to clients. This means delivery of HTML documents and any additional content that may be included by a document, such as images, style sheets and scripts.
Privacy
Every time a web page is requested from a web server the server can identify, and usually it logs, the IP address from which the request arrived. Equally, unless set not to do so, most web browsers record the web pages that have been requested and viewed in a history feature, and usually cache much of the content locally. Unless HTTPS encryption is used, web requests and responses travel in plain text across the internet and they can be viewed, recorded and cached by intermediate systems. When a web page asks for, and the user supplies, personally identifiable information such as their real name, address, e-mail address, etc., then a connection can be made between the current web traffic and that individual. If the website uses HTTP cookies, username and password authentication, or other tracking techniques, then it will be able to relate other web visits, before and after, to the identifiable information provided. In this way it is possible for a web-based organisation to develop and build a profile of the individual people who use its site or sites. It may be able to build a record for an individual that includes information about their leisure activities, their shopping
World Wide Web interests, their profession, and other aspects of their demographic profile. These profiles are obviously of potential interest to marketeers, advertisers and others. Depending on the website's terms and conditions and the local laws that apply information from these profiles may be sold, shared, or passed to other organisations without the user being informed. For many ordinary people, this means little more than some unexpected e-mails in their in-box, or some uncannily relevant advertising on a future web page. For others, it can mean that time spent indulging an unusual interest can result in a deluge of further targeted marketing that may be unwelcome. Law enforcement, counter terrorism and espionage agencies can also identify, target and track individuals based on what appear to be their interests or proclivities on the web. Social networking sites make a point of trying to get the user to truthfully expose their real names, interests and locations. This makes the social networking experience more realistic and therefore engaging for all their users. On the other hand, photographs uploaded and unguarded statements made will be identified to the individual, who may regret some decisions to publish these data. Employers, schools, parents and other relatives may be influenced by aspects of social networking profiles that the posting individual did not intend for these audiences. On-line bullies may make use of personal information to harass or stalk users. Modern social networking websites allow fine grained control of the privacy settings for each individual posting, but these can be complex and not easy to find or use, especially for beginners.[35] Photographs and videos posted onto websites have caused particular problems, as they can add a person's face to an on-line profile. With modern and potential facial recognition technology, it may then be possible to relate that face with other, previously anonymous, images, events and scenarios that have been imaged elsewhere. Because of image caching, mirroring and straightforward copying, it is difficult to imagine that an image, once published onto the World Wide Web, can ever actually or totally be removed.
48
Intellectual property
The intellectual property rights for any creative work initially rests with its creator. Web users who want to publish their work onto the World Wide Web, however, need to be aware of the details of the way they do it. If artwork, photographs, writings, poems, or technical innovations are published by their creator onto a privately owned web server, then they may choose the copyright and other conditions freely themselves. This is unusual though; more commonly work is uploaded to web sites and servers that are owned by other organizations. It depends upon the terms and conditions of the site or service provider to what extent the original owner automatically signs over rights to their work by the choice of destination and by the act of uploading. Many users of the web erroneously assume that everything they may find on line is freely available to them as if it was in the public domain. This is almost never the case, unless the web site publishing the work clearly states that it is. On the other hand, content owners are aware of this widespread belief, and expect that sooner or later almost everything that is published will probably be used in some capacity somewhere without their permission. Many publishers therefore embed visible or invisible digital watermarks in their media files, sometimes charging users to receive unmarked copies for legitimate use. Digital rights management includes forms of access control technology that further limit the use of digital content even after it has been bought or downloaded.
Security
The Web has become criminals' preferred pathway for spreading malware. Cybercrime carried out on the Web can include identity theft, fraud, espionage and intelligence gathering.[] Web-based vulnerabilities now outnumber traditional computer security concerns,[36][37] and as measured by Google, about one in ten web pages may contain malicious code.[38] Most Web-based attacks take place on legitimate websites, and most, as measured by Sophos, are hosted in the United States, China and Russia.[39] The most common of all malware threats is SQL injection attacks against websites.[40] Through HTML and URIs the Web was vulnerable to attacks like cross-site scripting (XSS) that came with the introduction of JavaScript[41] and were exacerbated to some degree by Web 2.0 and Ajax web design
World Wide Web that favors the use of scripts.[42] Today by one estimate, 70% of all websites are open to XSS attacks on their users.[43] Proposed solutions vary to extremes. Large security vendors like McAfee already design governance and compliance suites to meet post-9/11 regulations,[44] and some, like Finjan have recommended active real-time inspection of code and all content regardless of its source.[45] Some have argued that for enterprise to see security as a business opportunity rather than a cost center,[46] "ubiquitous, always-on digital rights management" enforced in the infrastructure by a handful of organizations must replace the hundreds of companies that today secure data and networks.[47] Jonathan Zittrain has said users sharing responsibility for computing safety is far preferable to locking down the Internet.[48]
49
Standards
Many formal standards and other technical specifications and software define the operation of different aspects of the World Wide Web, the Internet, and computer information exchange. Many of the documents are the work of the World Wide Web Consortium (W3C), headed by Berners-Lee, but some are produced by the Internet Engineering Task Force (IETF) and other organizations. Usually, when web standards are discussed, the following publications are seen as foundational: Recommendations for markup languages, especially HTML and XHTML, from the W3C. These define the structure and interpretation of hypertext documents. Recommendations for stylesheets, especially CSS, from the W3C. Standards for ECMAScript (usually in the form of JavaScript), from Ecma International. Recommendations for the Document Object Model, from W3C. Additional publications provide definitions of other essential technologies for the World Wide Web, including, but not limited to, the following: Uniform Resource Identifier (URI), which is a universal system for referencing resources on the Internet, such as hypertext documents and images. URIs, often called URLs, are defined by the IETF's RFC 3986 / STD 66: Uniform Resource Identifier (URI): Generic Syntax, as well as its predecessors and numerous URI scheme-defining RFCs; HyperText Transfer Protocol (HTTP), especially as defined by RFC 2616: HTTP/1.1 and RFC 2617: HTTP Authentication, which specify how the browser and server authenticate each other.
Accessibility
There are methods available for accessing the web in alternative mediums and formats, so as to enable use by individuals with disabilities. These disabilities may be visual, auditory, physical, speech related, cognitive, neurological, or some combination therin. Accessibility features also help others with temporary disabilities like a broken arm or the aging population as their abilities change.[49] The Web is used for receiving information as well as providing information and interacting with society. The World Wide Web Consortium claims it essential that the Web be accessible in order to provide equal access and equal opportunity to people with disabilities.[50] Tim Berners-Lee once noted, "The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect."[49] Many countries regulate web accessibility as a requirement for websites.[51] International cooperation in the W3C Web Accessibility Initiative led to simple guidelines that web content authors as well as software developers can use to make the Web accessible to persons who may or may not be using assistive technology.[49][52]
50
Internationalization
The W3C Internationalization Activity assures that web technology will work in all languages, scripts, and cultures.[53] Beginning in 2004 or 2005, Unicode gained ground and eventually in December 2007 surpassed both ASCII and Western European as the Web's most frequently used character encoding.[54] Originally RFC 3986 allowed resources to be identified by URI in a subset of US-ASCII. RFC 3987 allows more charactersany character in the Universal Character Setand now a resource can be identified by IRI in any language.[55]
Statistics
Between 2005 and 2010, the number of Web users doubled, and was expected to surpass two billion in 2010.[56] Early studies in 1998 and 1999 estimating the size of the web using capture/recapture methods showed that much of the web was not indexed by search engines and the web was much larger than expected.[57][58] According to a 2001 study, there were a massive number, over 550 billion, of documents on the Web, mostly in the invisible Web, or Deep Web.[59] A 2002 survey of 2,024 million Web pages[60] determined that by far the most Web content was in English: 56.4%; next were pages in German (7.7%), French (5.6%), and Japanese (4.9%). A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005.[61] As of March 2009, the indexable web contains at least 25.21 billion pages.[62] On 25 July 2008, Google software engineers Jesse Alpert and Nissan Hajaj announced that Google Search had discovered one trillion unique URLs.[63] As of May 2009, over 109.5 million domains operated.[64] Of these 74% were commercial or other sites operating in the .com generic top-level domain.[64] Statistics measuring a website's popularity are usually based either on the number of page views or on associated server 'hits' (file requests) that it receives.
Speed issues
Frustration over congestion issues in the Internet infrastructure and the high latency that results in slow browsing has led to a pejorative name for the World Wide Web: the World Wide Wait.[65] Speeding up the Internet is an ongoing discussion over the use of peering and QoS technologies. Other solutions to reduce the congestion can be found at W3C.[66] Guidelines for Web response times are:[67] 0.1 second (one tenth of a second). Ideal response time. The user does not sense any interruption. 1 second. Highest acceptable response time. Download times above 1 second interrupt the user experience. 10 seconds. Unacceptable response time. The user experience is interrupted and the user is likely to leave the site or system.
Caching
If a user revisits a Web page after only a short interval, the page data may not need to be re-obtained from the source Web server. Almost all web browsers cache recently obtained data, usually on the local hard drive. HTTP requests sent by a browser will usually ask only for data that has changed since the last download. If the locally cached data are still current, they will be reused. Caching helps reduce the amount of Web traffic on the Internet. The decision about expiration is made independently for each downloaded file, whether image, stylesheet, JavaScript, HTML, or other resource. Thus even on sites with highly dynamic content, many of the basic resources need to be refreshed only occasionally. Web site designers find it worthwhile to collate resources such as CSS data and JavaScript into a few site-wide files so that they can be cached efficiently. This helps reduce page download times and lowers demands on the Web server. There are other components of the Internet that can cache Web content. Corporate and academic firewalls often cache Web resources requested by one user for the benefit of all. (See also caching proxy server.) Some search
World Wide Web engines also store cached content from websites. Apart from the facilities built into Web servers that can determine when files have been updated and so need to be re-sent, designers of dynamically generated Web pages can control the HTTP headers sent back to requesting users, so that transient or sensitive pages are not cached. Internet banking and news sites frequently use this facility. Data requested with an HTTP 'GET' is likely to be cached if other conditions are met; data obtained in response to a 'POST' is assumed to depend on the data that was POSTed and so is not cached.
51
References
[1] Quittner, Joshua (29 March 1999). "Tim Berners Lee Time 100 People of the Century" (http:/ / www. time. com/ time/ magazine/ article/ 0,9171,990627,00. html). Time Magazine. . Retrieved 17 May 2010. "He wove the World Wide Web and created a mass medium for the 21st century. The World Wide Web is Berners-Lee's alone. He designed it. He loosed it on the world. And he more than anyone else has fought to keep it open, nonproprietary and free. ." [2] "World Wide Web Consortium" (http:/ / www. w3. org/ ). . "The World Wide Web Consortium (W3C)..." [3] Le Web a t invent... en France ! Le Point (http:/ / www. lepoint. fr/ technologie/ le-web-a-ete-invente-en-france-31-01-2012-1425943_58. php) [4] "Berners-Lee, Tim; Cailliau, Robert (12 November 1990). "WorldWideWeb: Proposal for a hypertexts Project" (http:/ / w3. org/ Proposal. html). . Retrieved 27 July 2009. [5] Berners-Lee, Tim. "Pre-W3C Web and Internet Background" (http:/ / w3. org/ 2004/ Talks/ w3c10-HowItAllStarted/ ?n=15). World Wide Web Consortium. . Retrieved 21 April 2009. [6] von Braun, Wernher (May 1970). "TV Broadcast Satellite" (http:/ / www. popsci. com/ archive-viewer?id=8QAAAAAAMBAJ& pg=66& query=a+ c+ clarke). Popular Science: 6566. . Retrieved 12 January 2011. [7] Berners-Lee, Tim (March 1989). "Information Management: A Proposal" (http:/ / w3. org/ History/ 1989/ proposal. html). W3C. . Retrieved 27 July 2009. [8] "Tim Berners-Lee's original World Wide Web browser" (http:/ / info. cern. ch/ NextBrowser. html). . "With recent phenomena like blogs and wikis, the web is beginning to develop the kind of collaborative nature that its inventor envisaged from the start." [9] "Tim Berners-Lee: client" (http:/ / w3. org/ People/ Berners-Lee/ WorldWideWeb). W3.org. . Retrieved 27 July 2009. [10] "First Web pages" (http:/ / w3. org/ History/ 19921103-hypertext/ hypertext/ WWW/ TheProject. html). W3.org. . Retrieved 27 July 2009. [11] "Short summary of the World Wide Web project" (http:/ / groups. google. com/ group/ alt. hypertext/ msg/ 395f282a67a1916c). Google. 6 August 1991. . Retrieved 27 July 2009. [12] "Silvano de Gennaro disclaims 'the first photo on the web'" (http:/ / musiclub. web. cern. ch/ MusiClub/ bands/ cernettes/ disclaimer. html). . Retrieved 27 July 2012. "If you read well our website, it says that it was, to our knowledge, the 'first photo of a band'. Dozens of media are totally distorting our words for the sake of cheap sensationalism. Nobody knows which was the first photo on the web." [13] "W3C timeline" (http:/ / w3. org/ 2005/ 01/ timelines/ timeline-2500x998. png). . Retrieved 30 March 2010. [14] "About SPIRES" (http:/ / slac. stanford. edu/ spires/ about/ ). . Retrieved 30 March 2010. [15] "The Early World Wide Web at SLAC" (http:/ / www. slac. stanford. edu/ history/ earlyweb/ history. shtml). . [16] "A Little History of the World Wide Web" (http:/ / www. w3. org/ History. html). . [17] Conklin, Jeff (1987), IEEE Computer 20 (9): 1741 [18] "Inventor of the Week Archive: The World Wide Web" (http:/ / web. mit. edu/ invent/ iow/ berners-lee. html). Massachusetts Institute of Technology: MIT School of Engineering. . Retrieved 23 July 2009. [19] "Ten Years Public Domain for the Original Web Software" (http:/ / tenyears-www. web. cern. ch/ tenyears-www/ Welcome. html). Tenyears-www.web.cern.ch. 30 April 2003. . Retrieved 27 July 2009. [20] "Mosaic Web Browser History NCSA, Marc Andreessen, Eric Bina" (http:/ / livinginternet. com/ w/ wi_mosaic. htm). Livinginternet.com. . Retrieved 27 July 2009. [21] "NCSA Mosaic September 10, 1993 Demo" (http:/ / totic. org/ nscp/ demodoc/ demo. html). Totic.org. . Retrieved 27 July 2009. [22] "Vice President Al Gore's ENIAC Anniversary Speech" (http:/ / cs. washington. edu/ homes/ lazowska/ faculty. lecture/ innovation/ gore. html). Cs.washington.edu. 14 February 1996. . Retrieved 27 July 2009. [23] "Internet legal definition of Internet" (http:/ / legal-dictionary. thefreedictionary. com/ Internet). West's Encyclopedia of American Law, edition 2. Free Online Law Dictionary. 15 July 2009. . Retrieved 25 November 2008. [24] "WWW (World Wide Web) Definition" (http:/ / techterms. com/ definition/ www). TechTerms. . Retrieved 19 February 2010. [25] "The W3C Technology Stack" (http:/ / www. w3. org/ Consortium/ technology). World Wide Web Consortium. . Retrieved 21 April 2009. [26] Hamilton, Naomi (31 July 2008). "The A-Z of Programming Languages: JavaScript" (http:/ / computerworld. com. au/ article/ 255293/ -z_programming_languages_javascript). Computerworld. IDG. . Retrieved 12 May 2009. [27] Buntin, Seth (23 September 2008). "jQuery Polling plugin" (http:/ / buntin. org/ 2008/ sep/ 23/ jquery-polling-plugin/ ). . Retrieved 2009-08-22. [28] Berners-Lee, Tim. "Frequently asked questions by the Press" (http:/ / w3. org/ People/ Berners-Lee/ FAQ. html). W3C. . Retrieved 27 July 2009. [29] Palazzi, P (2011) 'The Early Days of the WWW at CERN' (http:/ / soft-shake. ch/ 2011/ en/ conference/ sessions. html?key=earlydays)
52
53
Further reading
Niels Brgger, ed. Web History (2010) 362 pages; Historical perspective on the World Wide Web, including issues of culture, content, and preservation. Fielding, R.; Gettys, J.; Mogul, J.; Frystyk, H.; Masinter, L.; Leach, P.; Berners-Lee, T. (June 1999). Hypertext Transfer Protocol HTTP/1.1 (ftp://ftp.isi.edu/in-notes/rfc2616.txt). Request For Comments 2616. Information Sciences Institute. Berners-Lee, Tim; Bray, Tim; Connolly, Dan; Cotton, Paul; Fielding, Roy; Jeckle, Mario; Lilley, Chris; Mendelsohn, Noah; Orchard, David; Walsh, Norman; Williams, Stuart (15 December 2004). Architecture of the World Wide Web, Volume One (http://www.w3.org/TR/webarch/). Version 20041215. W3C. Polo, Luciano (2003). "World Wide Web Technology Architecture: A Conceptual Analysis" (http://newdevices. com/publicaciones/www/). New Devices. Retrieved 31 July 2005. Skau, H.O. (March 1990). "The World Wide Web and Health Information" (http://newdevices.com/ publicaciones/www/). New Devices. Retrieved 1989.
External links
Early archive of the first Web site (http://www.w3.org/History/19921103-hypertext/hypertext/WWW/) Internet Statistics: Growth and Usage of the Web and the Internet (http://www.mit.edu/people/mkgray/net/) Living Internet (http://www.livinginternet.com/w/w.htm) A comprehensive history of the Internet, including the World Wide Web. Web Design and Development (http://www.dmoz.org/Computers/Internet/Web_Design_and_Development/) at the Open Directory Project World Wide Web Consortium (W3C) (http://www.w3.org/) W3C Recommendations Reduce "World Wide Wait" (http://www.w3.org/Protocols/NL-PerfNote.html) World Wide Web Size (http://www.worldwidewebsize.com/) Daily estimated size of the World Wide Web. Antonio A. Casilli, Some Elements for a Sociology of Online Interactions (http://cle.ens-lyon.fr/40528325/0/ fiche___pagelibre/) The Erds Webgraph Server (http://web-graph.org/) offers weekly updated graph representation of a constantly increasing fraction of the WWW.
54
Today, the Web and the Internet allow connectivity from literally everywhere on eartheven ships at sea and in outer space.
The concept of a home-based global information system goes at least as far back as "A Logic Named Joe", a 1946 short story by Murray Leinster, in which computer terminals, called "logics," were in every home. Although the computer system in the story is centralized, the story captures some of the feeling of the ubiquitous information explosion driven by the Web.
History of the World Wide Web Mesh,[5] The Information Mine (turned down as it abbreviates to TIM, the WWW's creator's name) or Mine of Information (turned down because it abbreviates to MOI which is "Me" in French), but settled on World Wide Web.[6] He found an enthusiastic collaborator in Robert Cailliau, who rewrote the proposal (published on November 12, 1990) and sought resources within CERN. Berners-Lee and Cailliau pitched their ideas to the European Conference on Hypertext Technology in September 1990, but found no vendors who could appreciate their vision of marrying hypertext with the Internet. By Christmas 1990, Berners-Lee had built all the tools necessary for a working Web: the HyperText Transfer Protocol (HTTP) 0.9 [7], the HyperText Markup Language (HTML), the first Robert Cailliau, Jean-Franois Abramatic and Tim Berners-Lee at Web browser (named WorldWideWeb, which the 10th anniversary of the WWW Consortium. was also a Web editor), the first HTTP server software (later known as CERN httpd), the first web server (http:/ / info. cern. ch), and the first Web pages that described the project itself. The browser could access Usenet newsgroups and FTP files as well. However, it could run only on the NeXT; Nicola Pellow therefore created a simple text browser that could run on almost any computer called the Line Mode Browser.[8] To encourage use within CERN, Bernd Pollermann put the CERN telephone directory on the web previously users had to log onto the mainframe in order to look up phone numbers.[8] According to Tim Berners-Lee, the Web was mainly invented in the Building 31 at CERN ( 461357N 60242E ) but also at home, in the two houses he lived in during that time (one in France, one in Switzerland).[9] On August 6, 1991,[10] Berners-Lee posted a short summary of the World Wide Web project on the alt.hypertext newsgroup.[11] This date also marked the debut of the Web as a publicly available service on the Internet. The WorldWideWeb (WWW) project aims to allow all links to be made to any information anywhere. [...] The WWW project was started to allow high energy physicists to share data, news, and documentation. We are very interested in spreading the web to other areas, and having gateway servers for other data. Collaborators welcome!" from Tim Berners-Lee's first message Paul Kunz from the Stanford Linear Accelerator Center visited CERN in September 1991, and was captivated by the Web. He brought the NeXT software back to SLAC, where librarian Louise Addis adapted it for the VM/CMS operating system on the IBM mainframe as a way to display SLACs catalog of online documents;[8] this was the first web server outside of Europe and the first in North America.[12] An early CERN-related contribution to the Web was the parody band Les Horribles Cernettes, whose promotional image is believed to be among the Web's first five pictures.[13]
55
56
Early browsers
The turning point for the World Wide Web was the introduction[14] of the Mosaic web browser[15] in 1993, a graphical browser developed by a team at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign (UIUC), led by Marc Andreessen. Funding for Mosaic came from the High-Performance Computing and Communications Initiative, a funding program initiated by then-Senator Al Gore's High Performance Computing and Communication Act of 1991 also known as the Gore Bill.[16] Remarkably the first Mosaic Browser lacked a "back button" which was proposed in 1992-3 by the same individual who invented the concept of clickable text documents. The request was emailed from the University of Texas computing facility. The browser was intended to be an editor and not simply a viewer, but was to work with computer generated hyper text lists called "search engines". The origins of Mosaic had begun in 1992. In November 1992, the NCSA at the University of Illinois (UIUC) established a website. In December 1992, Andreessen and Eric Bina, students attending UIUC and working at the NCSA, began work on Mosaic. They released an X Window browser in February 1993. It gained popularity due to its strong support of integrated multimedia, and the authors rapid response to user bug reports and recommendations for new features. The first Microsoft Windows browser was Cello, written by Thomas R. Bruce for the Legal Information Institute at Cornell Law School to provide legal information, since more lawyers had more access to Windows than to Unix. Cello was released in June 1993.[8] After graduation from UIUC, Andreessen and James H. Clark, former CEO of Silicon Graphics, met and formed Mosaic Communications Corporation to develop the Mosaic browser commercially. The company changed its name to Netscape in April 1994, and the browser was developed further as Netscape Navigator.
57
Web organization
In May 1994 the first International WWW Conference, organized by Robert Cailliau,[17][18] was held at CERN;[19] the conference has been held every year since. In April 1993 CERN had agreed that anyone could use the Web protocol and code royalty-free; this was in part a reaction to the perturbation caused by the University of Minnesota announcing that it would begin charging license fees for its implementation of the Gopher protocol. In September 1994, Berners-Lee founded the World Wide Web Consortium (W3C) at the Massachusetts Institute of Technology with support from the Defense Advanced Research Projects Agency (DARPA) and the European Commission. It comprised various companies that were willing to create standards and recommendations to improve the quality of the Web. Berners-Lee made the Web available freely, with no patent and no royalties due. The W3C decided that their standards must be based on royalty-free technology, so they can be easily adopted by anyone. By the end of 1994, while the total number of websites was still minute compared to present standards, quite a number of notable websites were already active, many of which are the precursors or inspiring examples of today's most popular services.
58
Web 2.0
Beginning in 2002, new ideas for sharing and exchanging content ad hoc, such as Weblogs and RSS, rapidly gained acceptance on the Web. This new model for information exchange, primarily featuring DIY user-edited and generated websites, was coined Web 2.0. The Web 2.0 boom saw many new service-oriented startups catering to a new, democratized Web. Some believe it will be followed by the full realization of a Semantic Web. Tim Berners-Lee originally expressed the vision of the Semantic Web as follows:[20] I have a dream for the Web [in which computers] become capable of analyzing all the data on the Web the content, links, and transactions between people and computers. A Semantic Web, which should make this possible, has yet to emerge, but when it does, the day-to-day mechanisms of trade, bureaucracy and our daily lives will be handled by machines talking to machines. The intelligent agents people have touted for ages will finally materialize. Tim Berners-Lee, 1999 Predictably, as the World Wide Web became easier to query, attained a higher degree of usability, and shed its esoteric reputation, it gained a sense of organization and unsophistication which opened the floodgates and ushered in a rapid period of popularization. New sites such as Wikipedia and its sister projects proved revolutionary in executing the User edited content concept. In 2005, 3 ex-PayPal employees formed a video viewing website called YouTube. Only a year later, YouTube was proven the most quickly popularized website in history, and even started a new concept of user-submitted content in major events, as in the CNN-YouTube Presidential Debates. The popularity of YouTube, Facebook, etc., combined with the increasing availability and affordability of high-speed connections has made video content far more common on all kinds of websites. Many video-content hosting and creation sites provide an easy means for their videos to be embedded on third party websites without payment or permission. This combination of more user-created or edited content, and easy means of sharing content, such as via RSS widgets and video embedding, has led to many sites with a typical "Web 2.0" feel. They have articles with embedded video, user-submitted comments below the article, and RSS boxes to the side, listing some of the latest articles from other sites. Continued extension of the World Wide Web has focused on connecting devices to the Internet, coined Intelligent Device Management. As Internet connectivity becomes ubiquitous, manufacturers have started to leverage the expanded computing power of their devices to enhance their usability and capability. Through Internet connectivity, manufacturers are now able to interact with the devices they have sold and shipped to their customers, and customers are able to interact with the manufacturer (and other providers) to access new content. Lending credence to the idea of the ubiquity of the web, Web 2.0 has found a place in the global English lexicon. On June 10, 2009 the Global Language Monitor declared it to be the one-millionth English word.[21]
59
References
Robert Cailliau, James Gillies, How the Web Was Born: The Story of the World Wide Web, ISBN 978-0-19-286207-5, Oxford University Press (Jan 1, 2000) Tim Berners-Lee with Mark Fischetti, Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor, ISBN 978-0-06-251586-5, HarperSanFrancisco, 1999 978-0-06-251587-X (pbk.), HarperSanFrancisco, 2000 Andrew Herman, The World Wide Web and Contemporary Cultural Theory : Magic, Metaphor, Power, ISBN 978-0-415-92502-0, Routledge, 1st Edition (June 2000) History of computer by Ahmad Abubakar Umar 2010
Footnotes
[1] Berners-Lee, Tim. "Frequently asked questions - Start of the web: Influences" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#Influences). World Wide Web Consortium. . Retrieved 22 July 2010. [2] Berners-Lee, Tim. "Frequently asked questions - Why the //, #, etc?" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#etc). World Wide Web Consortium. . Retrieved 22 July 2010. [3] A Short History of Internet Protocols at CERN (http:/ / ben. home. cern. ch/ ben/ TCPHIST. html) by Ben Segal. 1995 [4] The Next Crossroad of Web History (http:/ / www. netvalley. com/ intvalnext. html) by Gregory Gromov [5] Berners-Lee, Tim (May 1990). "Information Management: A Proposal" (http:/ / www. w3. org/ History/ 1989/ proposal. html). World Wide Web Consortium. . Retrieved 24 August 2010. [6] Tim Berners-Lee, Weaving the Web, HarperCollins, 2000, p.23 [7] http:/ / www. w3. org/ Protocols/ HTTP/ AsImplemented. html [8] Berners-Lee, Tim (ca 1993/1994). "A Brief History of the Web" (http:/ / www. w3. org/ DesignIssues/ TimBook-old/ History. html). World Wide Web Consortium. . Retrieved 17 August 2010. [9] (http:/ / davidgalbraith. org/ uncategorized/ the-exact-location-where-the-web-was-invented/ 2343/ ) Tim Berners-Lee's account of the exact locations at CERN where the Web was invented [10] How the web went world wide (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 5242252. stm), Mark Ward, Technology Correspondent, BBC News. Retrieved 24 January 2011 [11] Berners-Lee, Tim. "Qualifiers on Hypertext links... - alt.hypertext" (http:/ / groups. google. com/ group/ alt. hypertext/ tree/ browse_frm/ thread/ 7824e490ea164c06/ f61c1ef93d2a8398?rnum=1& hl=en& q=group:alt. hypertext+ author:Tim+ author:Berners-Lee& _done=/ group/ alt. hypertext/ browse_frm/ thread/ 7824e490ea164c06/ f61c1ef93d2a8398?tvc=1& q=group:alt. hypertext+ author:Tim+ author:Berners-Lee& hl=en& #doc_06dad279804cb3ba). . Retrieved 11 July 2012. [12] Tim Berners-Lee, Weaving the Web, HarperCollins, 2000, p.46 [13] Heather McCabe (1999-02-09). "Grrl Geeks Rock Out" (http:/ / www. wired. com/ news/ culture/ 0,1294,17821,00. html). Wired magazine. . [14] Mosaic Web Browser History NCSA, Marc Andreessen, Eric Bina (http:/ / www. livinginternet. com/ w/ wi_mosaic. htm) [15] NCSA Mosaic September 10, 1993 Demo (http:/ / www. totic. org/ nscp/ demodoc/ demo. html) [16] Vice President Al Gore's ENIAC Anniversary Speech (http:/ / www. cs. washington. edu/ homes/ lazowska/ faculty. lecture/ innovation/ gore. html). [17] Robert Cailliau (21 July 2010). "A Short History of the Web" (http:/ / www. netvalley. com/ archives/ mirrors/ robert_cailliau_speech. htm). NetValley. . Retrieved 21 July 2010. [18] Tim Berners-Lee. "Frequently asked questions - Robert Cailliau's role" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#Cailliau). World Wide Web Consortium. . Retrieved 22 July 2010. [19] "IW3C2 - Past and Future Conferences" (http:/ / www. iw3c2. org/ conferences). International World Wide Web Conferences Steering Committee. 2010-05-02. . Retrieved 16 May 2010. [20] Berners-Lee, Tim; Fischetti, Mark (1999). Weaving the Web. HarperSanFrancisco. chapter 12. ISBN978-0-06-251587-2. [21] "'Millionth English Word' declared". NEWS.BBC.co.uk (http:/ / news. bbc. co. uk/ 1/ hi/ world/ americas/ 8092549. stm)
60
External links
First World Web site (http://info.cern.ch/) The World Wide Web History Project (http://www.webhistory.org/home.html) Important Events in the History of the World Wide Web (http://internet-browser-review.toptenreviews.com/ important-events-in-the-history-of-the-world-wide-web.html) Internet History (http://www.computerhistory.org/internet_history/), Computer History Museum
61
References
[1] Leiner, Barry M. et al. (2003-12-10). ""Origins of the Internet" in A Brief History of the Internet version 3.32" (http:/ / www. isoc. org/ internet/ history/ brief. shtml#Origins). The Internet Society. . Retrieved 2007-11-03. [2] Licklider, J. C. R. (23 April 1963). "Topics for Discussion at the Forthcoming Meeting, Memorandum For: Members and Affiliates of the Intergalactic Computer Network" (http:/ / www. kurzweilai. net/ articles/ art0366. html?printable=1). Washington, D.C.: Advanced Research Projects Agency, via KurzweilAI.net. . Retrieved 2007-11-03.
Further reading
Jones, Steve (2003). Encyclopedia of New Media (http://books.google.com/books?id=26NyHREJwP8C& pg=PT253). Sage Publications, via Google Books limited preview. p.287. ISBN0-7619-2382-9. Retrieved 2007-11-03. Page, Dan and Cynthia Lee (1999). "Looking Back at Start of a Revolution" (http://web.archive.org/web/ 20071224090235/http://www.today.ucla.edu/1999/990928looking.html). UCLA Today (The Regents of the University of California (UC Regents)). Archived from the original (http://www.today.ucla.edu/1999/ 990928looking.html) on 2007-12-24. Retrieved 2007-11-03. Hauben, Ronda (19 March 2001). "Draft for Comment 1.001, "The Information Processing Techniques Office and the Birth of the Internet"" (http://www.columbia.edu/~rh120/other/misc/lick101.doc) (Microsoft Word). Retrieved 2007-11-03.
ARPANET
62
ARPANET
ARPANET
Type of network data Location Protocols Established Funding Current status USA NCP, TCP/IP 1969 DARPA defunct, superseded by NSFNET in 1990
The Advanced Research Projects Agency Network (ARPANET) was the world's first operational packet switching network and the progenitor of what was to become the global Internet. The network was initially funded by the Advanced Research Projects Agency (ARPA, later DARPA) within the U.S. Department of Defense for use by its projects at universities and research laboratories in the US. The packet switching of the ARPANET was based on designs by British scientist Donald Davies[1][2] and Lawrence Roberts of the Lincoln Laboratory.[3]
History
Packet switching, today the dominant basis for data communications worldwide, was a new concept at the time of the conception of the ARPANET. Prior to the advent of packet switching, both voice and data communications had been based on the idea of circuit switching, as in the traditional telephone circuit, wherein each telephone call is allocated a dedicated, end to end, electronic connection between the two communicating stations. Such stations might be telephones or computers. The (temporarily) dedicated line is typically composed of many intermediary lines which are assembled into a chain that stretches all the way from the originating station to the destination station. With packet switching, a data system could use a single communications link to communicate with more than one machine by collecting data into datagrams and transmitting these as packets onto the attached network link, as soon as the link becomes idle. Thus, not only can the link be shared, much as a single post box can be used to post letters to different destinations, but each packet can be routed independently of other packets.[4] The earliest ideas for a computer network intended to allow general communications among computer users were formulated by computer scientist J. C. R. Licklider, of Bolt, Beranek and Newman (BBN), in August 1962, in memoranda discussing his concept for an "Intergalactic Computer Network". Those ideas contained almost everything that composes the contemporary Internet. In October 1963, Licklider was appointed head of the Behavioral Sciences and Command and Control programs at the Defense Department's Advanced Research Projects Agency ARPA (the initial ARPANET acronym). He then convinced Ivan Sutherland and Bob Taylor that this computer network concept was very important and merited development, although Licklider left ARPA before any
ARPANET contracts were let that worked on this concept.[5] Ivan Sutherland and Bob Taylor continued their interest in creating such a computer communications network, in part, to allow ARPA-sponsored researchers at various corporate and academic locales to put to use the computers ARPA was providing them, and, in part, to make new software and other computer science results quickly and widely available.[6] In his office, Taylor had three computer terminals, each connected to separate computers, which ARPA was funding: the first, for the System Development Corporation (SDC) Q-32, in Santa Monica; the second, for Project Genie, at the University of California, Berkeley; and the third, for Multics, at MIT. Taylor recalls the circumstance: "For each of these three terminals, I had three different sets of user commands. So, if I was talking online with someone at S.D.C., and I wanted to talk to someone I knew at Berkeley, or M.I.T., about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. I said, "Oh Man!", it's obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go. That idea is the ARPANET".[7] Somewhat contemporaneously, several other people had (mostly independently) worked out the aspects of "packet switching", with the first public demonstration presented by the National Physical Laboratory (NPL), on 5 August 1968, in the United Kingdom.[8]
63
Creation
By mid-1968, Taylor had prepared a complete plan for a computer network, and, after ARPA's approval, a Request for Quotation (RFQ) was sent to 140 potential bidders. Most computer science companies regarded the ARPATaylor proposal as outlandish, and only twelve submitted bids to build the network; of the twelve, ARPA regarded only four as top-rank contractors. At year's end, ARPA considered only two contractors, and awarded the contract to build the network to BBN Technologies on 7 April 1969. The initial, seven-man BBN team were much aided by the technical specificity of their response to the ARPA RFQ and thus quickly produced the first working computers. This team was led by Frank Heart. The BBN-proposed network closely followed Taylor's ARPA plan: a network composed of small computers called Interface Message Processors (IMPs), that functioned as gateways (today called routers) interconnecting local resources. At each site, the IMPs performed store-and-forward packet switching functions, Len Kleinrock and the first Interface Message and were interconnected with modems that were connected to [9] Processor. leased lines, initially running at 50kbit/second. The host computers were connected to the IMPs via custom serial communication interfaces. The system, including the hardware and the packet switching software, was designed and installed in nine months.[10] The first-generation IMPs were initially built by BBN Technologies using a rugged computer version of the Honeywell DDP-516 computer configured with 24kB of expandable core memory, and a 16-channel Direct Multiplex Control (DMC) direct memory access unit.[11] The DMC established custom interfaces with each of the host computers and modems. In addition to the front-panel lamps, the DDP-516 computer also features a special set of 24 indicator-lamps showing the status of the IMP communication channels. Each IMP could support up to four local hosts, and could communicate with up to six remote IMPs via leased lines.
ARPANET
64
ARPANET deployed
The initial ARPANET consisted of four IMPs:[15] University of California, Los Angeles (UCLA), where Leonard Kleinrock had established a Network Measurement Center, with an SDS Sigma 7 being the first computer attached to it; The Stanford Research Institute's Augmentation Research Center, where Douglas Engelbart had created the ground-breaking NLS system, a very important early hypertext system (with the SDS 940 that ran NLS, named "Genie", being the first host attached);
Historical document: First ARPANET IMP log: the first message ever sent via the ARPANET, 10:30pm, 29 October 1969. This IMP Log excerpt, kept at UCLA, describes setting up a message transmission from the UCLA SDS Sigma 7 Host computer to the SRI SDS 940 Host computer
University of California, Santa Barbara (UCSB), with the Culler-Fried Interactive Mathematics Center's IBM 360/75, running OS/MVT being the machine attached; The University of Utah's Computer Science Department, where Ivan Sutherland had moved, running a DEC PDP-10 operating on TENEX. The first message on the ARPANET was sent by UCLA student programmer Charley Kline, at 10:30pm on 29 October 1969, from Boelter Hall 3420.[16] Kline transmitted from the university's SDS Sigma 7 Host computer to the Stanford Research Institute's SDS 940 Host computer. The message text was the word login; the l and the o letters
ARPANET were transmitted, but the system then crashed. Hence, the literal first message over the ARPANET was lo. About an hour later, having recovered from the crash, the SDS Sigma 7 computer effected a full login. The first permanent ARPANET link was established on 21 November 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute. By 5 December 1969, the entire four-node network was established.[17]
65
Technology
Support for inter-IMP circuits of up to 230.4 kbit/s was added in 1970, although considerations of cost and IMP processing power meant this capability was not actively used. 1971 saw the start of the use of the non-ruggedized (and therefore significantly lighter) Honeywell 316 as an IMP. It could also be configured as a Terminal Interface Processor (TIP), which provided terminal server support for up to 63 ASCII serial terminals through a multi-line controller in place of one of the hosts.[21] The 316 featured a greater degree of integration than the 516, which made it less expensive and easier to maintain. The 316 was configured with 40 kB of core memory for a TIP. The size of core memory was later increased, to 32 kB for the IMPs, and 56 kB for TIPs, in 1973. In 1975, BBN introduced IMP software running on the Pluribus multi-processor. These appeared in a small number of sites. In 1981, BBN introduced IMP software running on its own C/30 processor product. In 1983, TCP/IP protocols replaced NCP as the ARPANET's principal protocol, and the ARPANET then became one subnet of the early Internet.[22][23]
ARPANET
66
ARPANET
67
Network applications
NCP provided a standard set of network services that could be shared by several applications running on a single host computer. This led to the evolution of application protocols that operated, more or less, independently of the underlying network service. When the ARPANET migrated to the Internet protocols in 1983, the major application protocols migrated with it. E-mail: In 1971, Ray Tomlinson, of BBN sent the first network e-mail (RFC 524, RFC 561).[30] By 1973, e-mail constituted 75 percent of ARPANET traffic. File transfer: By 1973, the File Transfer Protocol (FTP) specification had been defined (RFC 354) and implemented, enabling file transfers over the ARPANET. Voice traffic: The Network Voice Protocol (NVP) specifications were defined in 1977 (RFC 741), then implemented, but, because of technical shortcomings, conference calls over the ARPANET never worked well; the contemporary Voice over Internet Protocol (packet voice) was decades away.
Post-ARPANET
In Let the Great World Spin: A Novel, published in 2009 but set in 1974 and written by Colum McCann, a character named The Kid and others use ARPANET from a Palo Alto computer to dial phone booths in New York City to hear descriptions of Philippe Petit's tight rope walk between the World Trade Center Towers. In Metal Gear Solid 3: Snake Eater, a character named Sigint takes part in the development of ARPANET after the events depicted in the game. The Doctor Who Past Doctor Adventures novel Blue Box, written in 2003 but set in 1981, includes a character predicting that by the year 2000 there will be four hundred machines connected to ARPANET. There is an electronic music artist known as Arpanet, Gerald Donald, one of the members of Drexciya. The artist's 2002 album Wireless Internet features commentary on the expansion of the internet via wireless communication, with songs such as NTT DoCoMo, dedicated to the mobile communications giant based in Japan. In numerous The X-Files episodes ARPANET is referenced and usually hacked into by The Lone Gunmen. This is most noticeable in the episode "Unusual Suspects". Thomas Pynchon's 2009 novel Inherent Vice, set in southern California circa 1970, contains a character who accesses the "ARPAnet" throughout the course of the book. The viral marketing campaign for the video game Resistance 2 features a website similar in design and purpose to ARPANET, called SRPANET.
ARPANET
68
References
[1] http:/ / www. thocp. net/ biographies/ davies_donald. htm [2] http:/ / www. internethalloffame. org/ inductees/ donald-davies [3] "Lawrence Roberts Manages The ARPANET Program" (http:/ / www. livinginternet. com/ i/ ii_roberts. htm). Living Internet.com. . Retrieved 6 November 2008. [4] "Packet Switching History" (http:/ / www. livinginternet. com/ i/ iw_packet_inv. htm), Living Internet, retrieved 26 August 2012 [5] "J.C.R. Licklider And The Universal Network" (http:/ / www. livinginternet. com/ i/ ii_licklider. htm), Living Internet [6] "IPTO Information Processing Techniques Office" (http:/ / www. livinginternet. com/ i/ ii_ipto. htm), Living Internet [7] John Markoff (20 December 1999). "An Internet Pioneer Ponders the Next Revolution" (http:/ / partners. nytimes. com/ library/ tech/ 99/ 12/ biztech/ articles/ 122099outlook-bobb. html). The New York Times. Archived (http:/ / web. archive. org/ web/ 20080922095019/ http:/ / partners. nytimes. com/ library/ tech/ 99/ 12/ biztech/ articles/ 122099outlook-bobb. html) from the original on 22 September 2008. . Retrieved 20 September 2008. [8] "The accelerator of the modern age" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 7541123. stm). BBC News. 5 August 2008. Archived (http:/ / web. archive. org/ web/ 20090610082212/ http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 7541123. stm) from the original on 10 June 2009. . Retrieved 19 May 2009. [9] Leonard Kleinrock (2005). The history of the Internet (http:/ / www. lk. cs. ucla. edu/ personal_history. html). . Retrieved May 28, 2009. [10] "IMP Interface Message Processor" (http:/ / www. livinginternet. com/ i/ ii_imp. htm), Living Internet [11] Wise, Adrian. "Honeywell DDP-516" (http:/ / www. old-computers. com/ museum/ computer. asp?c=551). Old-Computers.com. . Retrieved 21 September 2008. [12] "A Brief History of the Internet" (http:/ / www. isoc. org/ internet/ history/ brief. shtml). Internet Society. Archived (http:/ / web. archive. org/ web/ 20080918213304/ http:/ / www. isoc. org/ internet/ history/ brief. shtml) from the original on 18 September 2008. . Retrieved 20 September 2008. [13] "Charles Herzfeld on ARPANET and Computers" (http:/ / inventors. about. com/ library/ inventors/ bl_Charles_Herzfeld. htm). About.com. . Retrieved 21 December 2008. [14] Brand, Stewart (March 2001). "Founding Father" (http:/ / www. wired. com/ wired/ archive/ 9. 03/ baran. html). Wired (9.03). . Retrieved 31 December 2011. [15] "ARPANET The First Internet" (http:/ / www. livinginternet. com/ i/ ii_arpanet. htm), Living Internet [16] Jessica Savio (1 April 2011). "Browsing history: A heritage site is being set up in Boelter Hall 3420, the room the first Internet message originated in" (http:/ / www. dailybruin. com/ index. php/ article/ 2011/ 04/ browsing_history). Daily Bruin (UCLA). . [17] Chris Sutton (2 September 2004). "Internet Began 35 Years Ago at UCLA with First Message Ever Sent Between Two Computers" (http:/ / web. archive. org/ web/ 20080308120314/ http:/ / www. engineer. ucla. edu/ stories/ 2004/ Internet35. htm). UCLA. Archived from the original (http:/ / www. engineer. ucla. edu/ stories/ 2004/ Internet35. htm) on 8 March 2008. . [18] "NORSAR and the Internet" (http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx). NORSAR (Norway Seismic Array Research). . Retrieved 25 August 2012. [19] Fritz E. Froehlich; Allen Kent (1990). "ARPANET, the Defense Data Network, and Internet" (http:/ / books. google. com/ books?id=gaRBTHdUKmgC& pg=PA341). The Froehlich/Kent Encyclopedia of Telecommunications. 1. CRC Press. pp.341375. ISBN978-0-8247-2900-4. . [20] Stacy, Christopher C. (7 September 1982). Getting Started Computing at the AI Lab (http:/ / independent. academia. edu/ ChristopherStacy/ Papers/ 1464820/ Getting_Started_Computing_at_the_AI_Lab). AI Lab, Massachusetts Institute of Technology. pp.9. . [21] Kirstein, Peter T. (JulySeptember 2009). "The Early Days of the Arpanet" (http:/ / muse. jhu. edu/ journals/ ahc/ summary/ v031/ 31. 3. kirstein. html). IEEE Annals of the History of Computing 31 (3): 67. ISSN1058-6180. . [22] "NCP Network Control Program" (http:/ / www. livinginternet. com/ i/ ii_ncp. htm), Living Internet [23] "TCP/IP Internet Protocol" (http:/ / www. livinginternet. com/ i/ ii_tcpip. htm), Living Internet [24] "NSFNET National Science Foundation Network" (http:/ / www. livinginternet. com/ i/ ii_nsfnet. htm), Living Internet [25] A History of the ARPANET: The First Decade (http:/ / www. dtic. mil/ cgi-bin/ GetTRDoc?Location=U2& doc=GetTRDoc. pdf& AD=ADA115440) (Report). Arlington, VA: Bolt, Beranek & Newman Inc.. 1 April 1981. p. 132. . section 2.3.4 [26] Abbate, Janet (11 June 1999). Inventing the Internet. Cambridge, MA: MIT Press. ASINB003VPWY6E. ISBN0262011727. [27] "Milestones:Birthplace of the Internet, 1969" (http:/ / www. ieeeghn. org/ wiki/ index. php/ Milestones:Birthplace_of_the_Internet,_1969). IEEE Global History Network. IEEE. . Retrieved 4 August 2011. [28] "Milestones:Inception of the ARPANET, 1969" (http:/ / www. ieeeghn. org/ wiki/ index. php/ Milestones:Inception_of_the_ARPANET,_1969). IEEE Global History Network. IEEE. . Retrieved 4 August 2011. [29] Interface Message Processor: Specifications for the Interconnection of a Host and an IMP (http:/ / www. bitsavers. org/ pdf/ bbn/ imp/ BBN1822_Jan1976. pdf), Report No. 1822, Bolt Beranek and Newman, Inc. (BBN) [30] Tomlinson, Ray. "The First Network Email" (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html). BBN. . Retrieved 6 March 2012. [31] http:/ / documentary. operationreality. org/ 2011/ 08/ 27/ computer-networks-the-heralds-of-resource-sharing [32] "Scenario" (http:/ / www. imdb. com/ title/ tt0789851/ ), Benson, Season 6, Episode 132 of 158, American Broadcasting Company (ABC), Witt/Thomas/Harris Productions, 22 February 1985
ARPANET
69
Further reading
Norberg, Arthur L.; O'Neill, Judy E. (1996). Transforming Computer Technology: Information Processing for the Pentagon, 19621982. Johns Hopkins University. pp.153196. ISBN978-0801863691. A History of the ARPANET: The First Decade (http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2& doc=GetTRDoc.pdf&AD=ADA115440) (Report). Arlington, VA: Bolt, Beranek & Newman Inc.. 1 April 1981. Hafner, Katie; Lyon, Matthew (1996). Where Wizards Stay Up Late: The Origins of the Internet. Simon and Schuster. ISBN0-7434-6837-6. Abbate, Janet (11 June 1999). Inventing the Internet. Cambridge, MA: MIT Press. pp.36111. ASINB003VPWY6E. ISBN0262011727. Banks, Michael A. (2008). On the Way to the Web: The Secret History of the Internet and Its Founders. APress/Springer Verlag. ISBN1-4302-0869-4. Salus, Peter H. (1 May 1995). Casting the Net: from ARPANET to Internet and Beyond. Addison-Wesley. ISBN978-0201876741. Waldrop, M. Mitchell (23 August 2001). The Dream Machine: J. C. R. Licklider and the Revolution That Made Computing Personal. New York: Viking. ASINB00008MNVW. ISBN0670899763. "The Computer History Museum, SRI International, and BBN Celebrate the 40th Anniversary of First ARPANET Transmission" (http://www.computerhistory.org/press/museum-celebrates-arpanet-anniversary.html). Computer History Museum. 27 October 2009.
Oral histories
"Oral history interview with Robert E. Kahn" (http://purl.umn.edu/107387). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 15 May 2008. Focuses on Kahn's role in the development of computer networking from 1967 through the early 1980s. Beginning with his work at Bolt Beranek and Newman (BBN), Kahn discusses his involvement as the ARPANET proposal was being written and then implemented, and his role in the public demonstration of the ARPANET. The interview continues into Kahn's involvement with networking when he moves to IPTO in 1972, where he was responsible for the administrative and technical evolution of the ARPANET, including programs in packet radio, the development of a new network protocol (TCP/IP), and the switch to TCP/IP to connect multiple networks. "Oral history interview with Vinton Cerf" (http://purl.umn.edu/107214). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 1 July 2008. Cerf describes his involvement with the ARPA network, and his relationships with Bolt Beranek and Newman, Robert Kahn, Lawrence Roberts, and the Network Working Group. "Oral history interview with Paul Baran" (http://purl.umn.edu/107101). University of Minnesota, Minneapolis: Charles Babbage Institute. 5 March 1990. Retrieved 1 July 2008. Baran describes his work at RAND, and discusses his interaction with the group at ARPA who were responsible for the later development of the ARPANET. "Oral history interview with Leonard Kleinrock" (http://purl.umn.edu/107411). University of Minnesota, Minneapolis: Charles Babbage Institute. 3 April 1990. Retrieved 1 July 2008. Kleinrock discusses his work on the ARPANET. "Oral history interview with Larry Roberts" (http://purl.umn.edu/107608). University of Minnesota, Minneapolis: Charles Babbage Institute. 4 April 1989. Retrieved 1 July 2008. "Oral history interview with Stephen Lukasik" (http://purl.umn.edu/107446). University of Minnesota, Minneapolis: Charles Babbage Institute. 17 October 1991. Retrieved 1 July 2008. Lukasik discusses his tenure at the Advanced Research Projects Agency (ARPA), the development of computer networks and the ARPANET.
ARPANET
70
External links
"ARPANET Maps 1969 to 1977" (http://som.csudh.edu/cis/lpress/history/arpamaps/). California State University, Dominguez Hills (CSUDH). 4 January 1978. Retrieved 17 May 2012. Walden, David C. (February 2003). "Looking back at the ARPANET effort, 34 years later" (http://www. livinginternet.com/i/ii_imp_walden.htm). Living Internet. East Sandwich, Massachusetts: livinginternet.com. Retrieved 17 August 2005. "Images of ARPANET from 1964 onwards" (http://www.computerhistory.org/exhibits/internet_history/). The Computer History Museum. Retrieved 29 August 2004. Timeline. "Paul Baran and the Origins of the Internet" (http://www.rand.org/about/history/baran.html). RAND Corporation. Retrieved 3 September 2005. Kleinrock, Leonard. "The Day the Infant Internet Uttered its First Words" (http://www.lk.cs.ucla.edu/ internet_first_words.html). UCLA. Retrieved 11 November 2004. Personal anecdote of the first message ever sent over the ARPANET "Doug Engelbart's Role in ARPANET History" (http://www.dougengelbart.org/firsts/internet.html). 2008. Retrieved 3 September 2009. "Internet Milestones: Timeline of Notable Internet Pioneers and Contributions" (http://www.juliantrubin.com/ schooldirectory/internet_milestones_pioneers.html). Retrieved 6 January 2012. Timeline.
ARPANET Waldrop, Mitch (April 2008). "DARPA and the Internet Revolution" (http://www.darpa.mil/WorkArea/ DownloadAsset.aspx?id=2554). 50 years of Bridging the Gap. DARPA. pp.7885. Retrieved 26 August 2012.
71
CSNET
The Computer Science Network (CSNET) was a computer network that began operation in 1981 in the United States.[1] Its purpose was to extend networking benefits, for computer science departments at academic and research institutions that could not be directly connected to ARPANET, due to funding or authorization limitations. It played a significant role in spreading awareness of, and access to, national networking and was a major milestone on the path to development of the global Internet. CSNET was funded by the National Science Foundation for an initial three-year period from 1981 to 1984.
History
Lawrence Landweber at the University of Wisconsin-Madison prepared the original CSNET proposal, on behalf of a consortium of universities (Georgia Tech, University of Minnesota, University of New Mexico, Oklahoma University, Purdue University, University of California-Berkeley, University of Utah, University of Virginia, University of Washington, University of Wisconsin, and Yale University). The US National Science Foundation (NSF) requested a review from David J. Farber at the University of Delaware. Farber assigned the task to his graduate student Dave Crocker who was already active in the development of electronic mail.[2] The project was deemed interesting but in need of significant refinement. The proposal eventually gained the support of Vinton Cerf and DARPA. In 1980, the NSF awarded $5 million to launch the network. It was an unusually large project for the NSF at the time.[3] A stipulation for the award of the contract was that the network needed to become self-sufficient by 1986.[1] The first management team consisted of Landweber (University of Wisconsin), Farber (University of Delaware), Peter J. Denning (Purdue University), Anthony Hearn (RAND Corporation), and Bill Kern from the NSF.[4] Once CSNET was fully operational, the systems and ongoing network operations were transferred to Bolt Beranek and Newman (BBN) of Cambridge, Massachusetts by 1984.[5] By 1981, three sites were connected: University of Delaware, Princeton University, and Purdue University. By 1982, 24 sites were connected expanding to 84 sites by 1984, including one in Israel. Soon thereafter, connections were established to computer science departments in Australia, Canada, France, Germany, Korea, and Japan. CSNET eventually connected more than 180 institutions.[6] One of the earliest experiments in free software distribution on a network, netlib, was available on CSNET.[7] CSNET was a forerunner of the National Science Foundation Network (NSFNet) which eventually became a backbone of the Internet. CSNET operated autonomously until 1989, when it merged with Bitnet to form the Corporation for Research and Educational Networking (CREN). By 1991, the success of the NSFNET and NSF-sponsored regional networks had rendered the CSNET services redundant, and the CSNET network was shut down in October 1991.[8]
CSNET
72
Components
The CSNET project had three primary components: an email relaying service (Delaware and RAND), a name service (Wisconsin), and TCP/IP-over-X.25 tunnelling technology (Purdue). Initial access was with email relaying, through gateways at Delaware and RAND, over dial-up telephone or X.29/X.25 terminal emulation. Eventually CSNET access added TCP/IP, including running over X.25.[9] The email relaying service was called Phonenet, after the telephone-specific channel of the MMDF software developed by Crocker. The CSNET name service allowed manual and automated email address lookup based on various user attributes, such as name, title, or institution.[10] The X.25 tunneling allowed an institution to connect directly to the ARPANET via a commercial X.25 service (Telenet), by which the institution's TCP/IP traffic would be tunneled to a CSNET computer that acted as a relay between the ARPANET and the commercial X.25 networks. CSNET also developed dialup-on-demand (Dialup IP) software to automatically initiate or disconnect SLIP sessions as needed to remote locations.[11] CSNET was developed on Digital Equipment Corporation (DEC) VAX-11 systems using BSD Unix, but it grew to support a variety of hardware and operating system platforms.
Recognition
At the July 2009 Internet Engineering Task Force meeting in Stockholm, Sweden, the Internet Society recognized the pioneering contribution of CSNET by honoring it with the Jonathan B. Postel Service Award. Crocker accepted the award on behalf of Landweber and the other principal investigators.[12] A recording of the award presentation and acceptance is available.[13]
References
[1] "The InternetFrom Modest Beginnings" (http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ modest. htm). NSF website. . Retrieved September 30, 2011. [2] Dave Crocker (August 18, 2008). "Impact of Email Work at The Rand Corporation in the mid-1970s" (http:/ / bbiw. net/ articles/ rand-email. pdf). . Retrieved September 30, 2011. [3] Douglas Comer (October 1983). "History and overview of CSNET". Communications (Association of Computing Machinery) 26 (10). doi:10.1145/358413.358423. [4] Peter J. Denning; Anthony Hearn; C. William Kern (April 1983). "History and overview of CSNET" (http:/ / www. isoc. org/ internet/ history/ documents/ Comm83. pdf). Proceedings of the symposium on Communications Architectures & Protocols (SIGCOMM, Association of Computing Machinery) 13 (2). doi:10.1145/1035237.1035267. ISBN0-89791-089-3. . [5] Rick Adrion (October 5, 1983). "CSNET Transition Plan Bulletin #1" (http:/ / www. rfc-editor. org/ in-notes/ museum/ csnet-transition-bulletin. n1. 1). email message. National Science Foundation. . Retrieved September 30, 2011. [6] CSNET History (http:/ / www. livinginternet. com/ i/ ii_csnet. htm) [7] Jack J. Dongarra; Eric Grosse (May 1987). "Distribution of mathematical software via electronic mail". Communications (Association of Computing Machinery) 30 (5). doi:10.1145/22899.22904. [8] CSNET-CIC Shutdown Notice (ftp:/ / athos. rutgers. edu/ resource-guide/ chapter6/ section6-6. txt) [9] Craig Partridge; Leo Lanzillo (Feb 1989). "Implementation of Dial-up IP for UNIX Systems". Proceedings of the 1989 Winter USENIX Technical Conference (USENIX Association). [10] Larry Landweber; Michael Litzkow; D. Neuhengen; Marvin Solomon (April 1983). "Architecture of the CSNET name server". Proceedings of the symposium on Communications Architectures & Protocols (SIGCOMM, Association of Computing Machinery) 13 (2). doi:10.1145/1035237.1035268. ISBN0-89791-089-3. [11] Dialup IP 2.0 README (ftp:/ / ftp. isy. liu. se/ pub/ misc/ dialup2. 0. README) [12] "Trailblazing CSNET Network Receives 2009 Jonathan B. Postel Service Award" (http:/ / isoc. org/ wp/ newsletter/ ?p=1098). News release (Internet Society). July 29, 2009. . Retrieved September 30, 2011. [13] Lynn St. Amour, Dave Crocker (July 29, 2009). "Postel Award to CSNET" (http:/ / bbiw. net/ misc/ IETF75-ISOC-Postel-CSNet. mp3). Audio recording. . Retrieved September 30, 2011.
CSNET
73
External links
Living Internet: CSNet (http://livinginternet.com/i/ii_csnet.htm) Exploring the Internet: Round Three, Madison (http://museum.media.org/eti/RoundThree08.html)
ENQUIRE
ENQUIRE
Inventor Tim Berners-Lee
ENQUIRE was a software project written in 1980 by Tim Berners-Lee at CERN,[2] which was the predecessor to the World Wide Web.[2][3][4] It was a simple hypertext program[4] that had some of the same ideas as the Web and the Semantic Web but was different in several important ways. According to Berners-Lee, the name was inspired by a book entitled Enquire Within Upon Everything.[2][3][5]
The conditions
At that time approximately 10,000 people were working at CERN with different hardware, software and individual requirements. Much work was done by email and file interchange.[4] The scientists needed to keep track of different things[3] and different projects became involved with each other.[2] Berners-Lee started to work for 6 months on 23 June 1980 at CERN while he developed ENQUIRE.[6] The requirements for setting up a new system were compatibility with different networks, disk formats, data formats, and character encoding schemes, which made any attempt to transfer information between dissimilar systems a daunting and generally impractical task.[7] The different hypertext-systems before ENQUIRE were not passing these requirements i.e. Memex and NLS.[7]
Difference to HyperCard
ENQUIRE was similar to Apple's HyperCard which also lacked clickable text and was not "hypertext", but ENQUIRE lacked an image system.[1] The advantage was that it was portable and ran different systems.[1]
ENQUIRE
74
Relationship Inverse Relationship made includes uses describes was made by is part of is used by described by
ENQUIRE was closer to a modern wiki than to a web site: database, though a closed system (all of the data could be taken as a workable whole)[2] bidirectional hyperlinks (in Wikipedia and MediaWiki, this is approximated by the What links here feature). This bidirectionality allows ideas, notes, etc. to link to each other without the author being aware of this. In a way, they (or, at least, their relationships) get a life of their own.[4][8] direct editing of the server (like wikis and CMS/blogs)[2] ease of compositing, particularly when it comes to hyperlinking.[2] The World Wide Web was created to unify the different existing systems at CERN like ENQUIRE, the CERNDOC, VMS/Notes and the USENET.[1]
Technical
The application ran on terminal with plaintext 24x80.[4] The first version was able to hyperlink between files.[2] ENQUIRE was written in the Pascal programming language and implemented on a Norsk Data NORD-10 under SINTRAN III,[2][6][4][8][9] and version 2 was later ported to MS-DOS and to VAX/VMS.[2][4]
References
[1] Berners-Lee, Tim (May 1990). "Information Management: A Proposal" (http:/ / www. w3. org/ History/ 1989/ proposal. html). World Wide Web Consortium. . Retrieved 25 August 2010. [2] Berners-Lee, Tim. "Frequently asked questions Start of the web: Influences" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#Influences). World Wide Web Consortium. . Retrieved 22 July 2010. [3] Jeffery, Simon; Fenn, Chris; Smith, Bobbie; Coumbe, John (23 October 2009). "A people's history of the internet: from Arpanet in 1969 to today" (http:/ / www. guardian. co. uk/ technology/ interactive/ 2009/ oct/ 23/ internet-arpanet) (Flash). London: The Guardian. pp.See 1980. . Retrieved 7 January 2010. [4] Berners-Lee, Tim (ca. 1993/1994). "A Brief History of the Web" (http:/ / www. w3. org/ DesignIssues/ TimBook-old/ History. html). World Wide Web Consortium. . Retrieved 24 August 2010. [5] Finkelstein, Prof. Anthony (15 August 2003). "ENQUIRE WITHIN UPON EVERYTHING" (http:/ / www. open2. net/ ictportal/ app/ comp_life/ future1. htm). ICT Portal. BBC. . Retrieved 7 January 2010.
ENQUIRE
[6] "History of the Web" (http:/ / www. w3c. rl. ac. uk/ primers/ history/ origins. htm). Oxford Brookes University. 2002. . Retrieved 20 November 2010. [7] Berners-Lee, Tim (August 1996). "The World Wide Web: Past, Present and Future" (http:/ / www. w3. org/ People/ Berners-Lee/ 1996/ ppf. htm). World Wide Web Consortium. . Retrieved 25 August 2010. [8] Cailliau, Robert (1995). "A Little History of the World Wide Web" (http:/ / www. w3. org/ History. html). World Wide Web Consortium. . Retrieved 25 July 2010. [9] Palmer, Sean B.; Berners-Lee, Tim (February/March 2001). "Enquire Manual In HyperText" (http:/ / infomesh. net/ 2001/ enquire/ manual/ #editorial). . Retrieved 30 August 2010.
75
Further reading
Berners-Lee, Tim (2000). Weaving the web. The original design and ultimate destiny of the World Wide Web. New York: Harper Business.
External links
ENQUIRE Manual (http://infomesh.net/2001/enquire/manual/) scanned images of the Enquire Manual from 1980 (http://www.w3.org/History/1980/Enquire/scaled/)
IPPS
The International Packet Switched Service (IPSS) was created in 1978 by a collaboration between the United Kingdom's General Post Office, Western Union International and the United States' Tymnet. This network grew from Europe and the USA to cover Canada, Hong Kong and Australia by 1981, and by the 1990s it provided a worldwide networking infrastructure. Companies and individual users could connect in to the network, via a PSS (Packet Switch Stream) modem, or an X.25 PAD (Packet Assembler/Disassembler), and a dedicated PSS line, and use it to connect to a variety of online databases and mainframe systems. There was a choice of about three different speeds of PSS lines, although a faster line was more costly to rent. By 1984 British Telecomm had joined the PSS global network and was providing IPSS services to customers. Companies including Dynatech, were providers of Interconnectivity and infrastructure devices including line drivers, modems, self configuring modems, 4port, 8port and 16port PADs, and Switches. These were physical boxes delivering full impmentation of x.25, x.28, x.29, x3 protocols with physical connectivity conforming to RS232 synchronous connectivity specification. In 1988 the IPSS directory listed approximately 800 global sites available for connection via X.25
MILNET
76
MILNET
In computer networking, MILNET (Military Network) was the name given to the part of the ARPANET internetwork designated for unclassified United States Department of Defense traffic. MILNET was split off from the ARPANET in 1983: the ARPANET remained in service for the academic research community, but direct connectivity between the networks was severed for security reasons. Gateways relayed electronic mail between the two networks. BBN Technologies built and managed both the MILNET and the ARPANET and the two networks used very similar technology. It is also known as "Military Net." During the 1980s the MILNET expanded to become the Defense Data Network, a worldwide set of military networks running at different security levels. In the 1990s, MILNET became the NIPRNET.
References
NFSNET
77
NFSNET
NSFNET
Commercial? No Type of network Data Location Operator Protocols Established Funding Current status Website USA Merit Network with IBM, MCI, the State of Michigan, and later ANS TCP/IP and OSI 1985 National Science Foundation Decommissioned April 30, 1995, superseded by the commercial Internet NSFNET history
[1]
The National Science Foundation Network (NSFNET) was a program of coordinated, evolving projects sponsored by the National Science Foundation (NSF) beginning in 1985 to promote advanced research and education networking in the United States.[2] NSFNET was also the name given to several nationwide backbone networks that were constructed to support NSF's networking initiatives from 1985-1995. Initially created to link researchers to the nation's NSF-funded supercomputing centers, through further public funding and private industry partnerships it developed into a major part of the Internet backbone.
History
Following the deployment of the Computer Science Network (CSNET), a network that provided Internet services to academic computer science departments, in 1981, the U.S. National Science Foundation (NSF) aimed to create an academic research network facilitating access by researchers to the supercomputing centers funded by NSF in the United States.[3] In 1985, NSF began funding the creation of five new supercomputing centers: the John von Neumann Computing Center at Princeton University, the San Diego Supercomputer Center (SDSC) on the campus of the University of California, San Diego (UCSD), the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, the Cornell Theory Center at Cornell University, and the Pittsburgh Supercomputing Center (PSC), a joint effort of Carnegie Mellon University, the University of Pittsburgh, and Westinghouse. Also in 1985, under the leadership of Dennis Jennings, the NSF established the National Science Foundation Network (NSFNET). NSFNET was to be a general-purpose research network, a hub to connect the five supercomputing centers along with the NSF-funded National Center for Atmospheric Research (NCAR) to each other and to the regional research and education networks that would in turn connect campus networks. Using this three tier network architecture NSFNET would provide access between the supercomputer centers and other sites over the backbone network at no cost to the centers or to the regional networks using the open TCP/IP protocols initially deployed successfully on the ARPANET.
NFSNET
78
As a result of a November 1987 NSF award to the Merit Network, a networking consortium by public universities in Michigan, the original 56-kbit/s network was expanded to include 13 nodes interconnected at 1.5 Mbit/s (T1) by July 1988. The backbone nodes used routers based on a collection of nine IBM RT systems running AOS, IBM's version of Berkeley UNIX. Under its cooperative agreement with NSF the Merit Network was the lead organization in a partnership that included IBM, MCI, and the State of Michigan. Merit provided overall project coordination, network design and engineering, a Network Operations Center (NOC), and information services to assist the regional networks. IBM provided equipment, software development, installation, maintenance and operations support. MCI provided the T1 data circuits at reduced rates. The state of Michigan provided funding for facilities and personnel. Eric M. Aupperle, Merit's President, was the NSFNET Project Director, and Hans-Werner Braun was Co-Principal Investigator.
NSFNET Traffic 1991, NSFNET backbone nodes are shown at the top, regional networks below, traffic volume is depicted from purple (zero bytes) to white (100 billion bytes), visualization by NCSA using traffic data provided by the Merit Network.
NFSNET From 1987 to 1994 Merit organized a series of "Regional-Techs" meetings, where technical staff from the regional networks met to discuss operational issues of common concern with each other and the Merit engineering staff. During this period, but separate from its support for the NSFNET backbone, NSF funded: the NSF Connections Program that helped colleges and universities obtain or upgrade connections to regional networks; regional networks to obtain or upgrade equipment and data communications circuits; the NNSC, and successor Network Information Services Manager (aka InterNIC) information help desks;[8] the International Connections Manager (ICM), a task performed by Sprint, that encouraged connections between the NSFNET backbone and international research and education networks; and various ad hoc grants to organizations such as the Federation of American Research Networks (FARNET). The NSFNET became the principal Internet backbone starting in approximately 1988, when in addition to the five NSF supercomputer centers it included connectivity to the regional networks BARRNet, Merit/MichNet, MIDnet, NCAR, NorthWestNet, NYSERNet, JVNCNet, SESQUINET, SURAnet, and Westnet, which in turn connected about 170 additional networks to the NSFNET.[9] Three new nodes were added as part of the upgrade to T3: NEARNET in Cambridge, Massachusetts; Argone National Laboratory outside of Chicago; and SURAnet in Atlanta, Georgia.[10] NSFNET connected to other federal government networks including the NASA Science Internet, the Energy Science Network (ESNET), and others. Connections were also established to international research and education networks, first to France and Canada, then to NordUnet serving Denmark, Finland, Iceland, Norway, and Sweden, to Mexico, and many others. Two Federal Internet Exchanges (FIXes) were established in June 1989[11] under the auspices of the Federal Engineering Planning Group (FEPG). FIX East, at the University of Maryland in College Park and FIX West, at the NASA Ames Research Center in Mountain View, California. The existence of NSFNET and the FIXes allowed the ARPANET to be phased out in mid-1990.[12] Starting in August 1990 the NSFNET backbone supported the OSI Connectionless Network Protocol (CLNP) in addition to TCP/IP.[13] However, CLNP usage remained low when compared to TCP/IP. Traffic on the network continued its rapid growth, doubling every seven months. Projections indicated that the T1 backbone would become overloaded sometime in 1990. A critical routing technology, Border Gateway Protocol (BGP), originated during this period of Internet history. BGP allowed routers on the NSFNET backbone to differentiate routes originally learned via multiple paths. Prior to BGP, interconnection between IP network was inherently hierarchical, and careful planning was needed to avoid routing loops.[14] BGP turned the Internet into a meshed topology, moving away from the centric architecture which the ARPANET emphasized.
79
NFSNET
80
During 1991 the backbone was upgraded to 45 Mbit/s (T3) transmission speed and expanded to interconnect 16 nodes. The routers on the upgraded backbone were based on an IBM RS/6000 workstation running UNIX. Core nodes were located at MCI facilities with end nodes at the connected regional networks and supercomputing centers. Completed in November 1991, the transition from T1 to T3 did not go as smoothly as the transition from 56K to T1, took longer than planned, and as a result there was at times serious congestion on the overloaded T1 backbone. Following the transition to T3, portions of the T1 backbone were left in place to act as a backup for the new T3 backbone.
In anticipation of the T3 upgrade and the approaching end of the 5-year NSFNET cooperative agreement, in September 1990 Merit, IBM, and MCI formed Advanced Network and Services (ANS), a new non-profit corporation with a more broadly based Board of Directors than the Michigan based Merit Network. Under its cooperative agreement with NSF, Merit remained ultimately responsible for the operation of NSFNET, but subcontracted much of the engineering and operations work to ANS. Both IBM and MCI made substantial new financial and other commitments to help support the new venture. Allan Weis left IBM to become ANS's first President and Managing Director. Douglas Van Houweling, former Chair of the Merit Network Board and Vice Provost for Information Technology at the University of Michigan, was Chairman of the ANS Board of Directors. The new T3 backbone was named ANSNet and provided the physical infrastructure used by Merit to deliver the NSFNET Backbone Service.
Regional networks
In addition to the five NSF supercomputer centers, NSFNET provided connectivity to eleven regional networks and through these networks to many smaller regional and campus networks. The NSFNET regional networks were:[10][15] BARRNet, the Bay Area Regional Research Network in Palo Alto, California; CERFNET, California Education and Research Federation Network in San Diego, California, serving California and Nevada; CICNet, the Committee on Institutional Cooperation Network via the Merit Network in Ann Arbor, Michigan and later as part of the T3 upgrade via Argonne National Laboratory outside of Chicago, serving the Big Ten Universities and the University of Chicago in Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin; Merit/MichNet in Ann Arbor, Michigan serving Michigan, formed in 1966, still in operation as of 2012;[16] MIDnet in Lincoln, Nebraska serving Arkansas, Iowa, Kansas, Missouri, Nebraska, Oklahoma, and South Dakota; NEARNET, the New England Academic and Research Network in Cambridge, Massachusetts, added as part of the upgrade to T3, serving Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island, and Vermont, established in late 1988, operated by BBN under contract to MIT, BBN assumed responsibility for NEARNET on 1 July 1993;[17] NorthWestNet in Seattle, Washington, serving Alaska, Idaho, Montana, North Dakota, Oregon, and Washington, founded in 1987;[18] NYSERNet, New York State Education and Research Network in Ithaca, New York; JVNCNet, the John von Neumann National Supercomputer Center Network in Princeton, New Jersey, serving Delaware and New Jersey;
NFSNET SESQUINET, the Sesquicentennial Network in Houston, Texas, founded during the 150th anniversary of the State of Texas; SURAnet, the Southeastern Universities Research Association network in College Park, Maryland and later as part of the T3 upgrade in Atlanta, Georgia serving Alabama, Florida, Georgia, Kentucky, Louisiana, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, and West Virginia, sold to BBN in 1994; and Westnet in Salt Lake City, Utah and Boulder, Colorado, serving Arizona, Colorado, New Mexico, Utah, and Wyoming.
81
Commercial traffic
The NSF's appropriations act authorized NSF to "foster and support the development and use of computer and other scientific and engineering methods and technologies, primarily for research and education in the sciences and engineering." This allowed NSF to support NSFNET and related networking initiatives, but only to the extent that that support was "primarily for research and education in the sciences and engineering."[19] And this in turn was taken to mean that use of NSFNET for commercial purposes was not allowed.
The NSFNET Backbone Services Acceptable Use Policy June 1992
[20]
General Principle
NSFNET Backbone services are provided to support open research and education in and among US research and instructional institutions, plus research arms of for-profit firms when engaged in open scholarly communication and research. Use for other purposes is not acceptable.
Unacceptable Uses
Use for for-profit activities, unless covered by the General Principle or as a specifically acceptable use. Extensive use for private or personal business.
This statement applies to use of the NSFNET Backbone only. NSF expects that connecting networks will formulate their own use policies. The NSF Division of Networking and Communications Research and Infrastructure will resolve any questions about this Policy or its interpretation.
NFSNET
82
NFSNET that any excess revenues recovered above the cost of carrying the commercial traffic would be placed into an infrastructure pool to be distributed by an allocation committee broadly representative of the networking community to enhance and extend national and regional networking infrastructure and support. For a time ANS CO+RE refused to connect to the CIX and the CIX refused to purchase a connection to ANS CO+RE. In May 1992 Mitch Kapor and Al Weis forged an agreement where ANS would connect to the CIX as a "trial" with the ability to disconnect at a moment's notice and without the need to join the CIX as a member.[27] This compromise resolved things for a time, but later the CIX started to block access from regional networks that had not paid the $10,000 fee to become members of the CIX.[28]
83
NFSNET
84
After the transition, network traffic was carried on any of several commercial backbone networks, internetMCI, PSINet, SprintLink, ANSNet, and others. Traffic between networks was exchanged at four Network Access Points or NAPs. The NAPs were located in New York (actually New Jersey), Washington, D.C., Chicago, and San Jose and run by Sprint, MFS Datanet, Ameritech, and Pacific Bell.[31] The NAPs were the forerunners of modern Internet exchange points.
NSF's very high speed Backbone Network The former NSFNET regional networks could connect to any of the Service (vBNS) new backbone networks or directly to the NAPs, but in either case they would need to pay for their own connections. NSF provided some funding for the NAPs and interim funding to help the regional networks make the transition, but did not fund the new backbone networks directly.
To help ensure the stability of the Internet during and immediately after the transition from NSFNET, NSF conducted a solicitation to select a Routing Arbiter (RA) and ultimately made a joint award to the Merit Network and USC's Information Science Institute to act as the RA. To continue its promotion of advanced networking technology the NSF conducted a solicitation to create a very high-speed Backbone Network Service (vBNS) that, like NSFNET before it, would focus on providing service to the research and education community. MCI won this award and created a 155 M-bit/sec (OC3c) and later a 622 M-bit/sec (OC12c) and 2.5 G-bit/sec (OC48c) ATM network to carry TCP/IP traffic primarily between the supercomputing centers and their users. NSF support[32] was available to organizations that could demonstrate a need for very high speed networking capabilities and wished to connect to the vBNS or to the Abilene Network, the high speed network operated by the University Corporation for Advanced Internet Development (UCAID, aka Internet2).[33] At the February 1994 regional techs meeting in San Diego, the group revised its charter[34] to include a broader base of network service providers, and subsequently adopted North American Network Operators' Group (NANOG) as its new name. Elise Gerich and Mark Knopper were the founders of NANOG and its first coordinators, followed by Bill Norton, Craig Labovitz, and Susan Harris.[35]
Controversy
For much of the period from 1987 to 1995, following the opening up of the Internet through NSFNET and in particular after the creation of the for-profit ANS CO+RE in May 1991, some Internet stakeholders[36] were concerned over the effects of privatization and the manner in which ANS, IBM, and MCI received a perceived competitive advantage in leveraging federal research money to gain ground in fields in which other companies allegedly were more competitive. The Cook Report on the Internet,[37] which still exists, evolved as one of its largest critics. Other writers, such as Chetly Zarko, a University of Michigan alumnus and freelance investigative writer, offered their own critiques.[38] On March 12, 1992 the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, held a hearing to review the management of NSFNET.[21] Witnesses at the hearing were asked to focus on the agreement(s) that NSF put in place for the operation of the NSFNET backbone, the foundation's plan for recompetition of those agreements, and to help the subcommittee explore whether the NSF's policies provided a level playing field for network service providers, ensured that the network was responsive to user needs, and provided for effective network management. The subcommittee heard from seven witnesses, asked them a number of questions, and received written statements from all seven as well as from three others. At the end of the hearing, speaking to the two witnesses from NSF, Dr. Nico Habermann, Assistant NSF Director for the Computer and Information Science and Engineering Directorate (CISE), and Dr. Stephen Wolff, Director of NSF's Division of Networking &
NFSNET Communications Research & Infrastructure (DNCRI), Representative Boucher, Chairman of the subcommittee, said: " I think you should be very proud of what you have accomplished. Even those who have some constructive criticism of the way that the network is presently managed acknowledge at the outset that you have done a terrific job in accomplishing the goal of this NSFNET, and its user-ship is enormously up, its cost to the users has come down, and you certainly have our congratulations for that excellent success." Subsequently the subcommittee drafted legislation, becoming law on October 23, 1992, which authorized the National Science Foundation to foster and support access by the research and education communities to computer networks which may be used substantially for purposes in addition to research and education in the sciences and engineering, if the additional uses will tend to increase the overall capabilities of the networks to support such research and education activities (that is to say, commercial traffic).[39] This legislation allowed, but did not require, NSF to repeal or modify its existing NSFNET Acceptable Use Policy (AUP)[20] which restricted network use to activities in support of research and education.[23] The hearing also led to a request from Rep. Boucher asking the NSF Inspector General to conduct a review of NSF's administration of NSFNET. The NSF Office of the Inspector General released its report on March 23, 1993.[26] The report concluded by: stating that "[i]n general we were favorably impressed with the NSFNET program and staff"; finding no serious problems with the administration, management, and use of the NSFNET Backbone Service; complimenting the NSFNET partners, saying that "the exchange of views among NSF, the NSFNET provider (Merit/ANS), and the users of NSFNET [via a bulletin board system], is truly remarkable in a program of the federal government"; and making 17 "recommendations to correct certain deficiencies and strengthen the upcoming re-solicitation."
85
References
[1] http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ launch. htm [2] NSFNET: The Partnership That Changed The World (http:/ / www. nsfnet-legacy. org/ ), Web site for an event held to celebrate the NSFNET, November 2007 [3] The Internet - changing the way we communicate (http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ internet. htm), the National Science Foundation's Internet history [4] The Merit Network, Inc. is an independent non-profit 501(c)(3) corporation governed by Michigan's public universities. Merit receives administrative services under an agreement with the University of Michigan. [5] (http:/ / www. mail-archive. com/ list@ifwp. org/ msg08868. html) [6] RFC 1118: The Hitchhikers Guide to the Internet (http:/ / tools. ietf. org/ html/ rfc1118), E. Krol, September 1989 [7] NSF 87-37: Project Solicitation for Management and Operation of the NSFNET Backbone Network, June 15, 1987. [8] InterNIC Review Paper (http:/ / www. codeontheroad. com/ papers/ InterNIC. Review. pdf) [9] NSFNET - National Science Foundation Network (http:/ / www. livinginternet. com/ i/ ii_nsfnet. htm) in the history section of the Living Internet (http:/ / www. livinginternet. com/ ) [10] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [11] Profile: At Home's Milo Medin (http:/ / www. wired. com/ science/ discoveries/ news/ 1999/ 01/ 17425), Wired, January 20, 1999 [12] "The Technology Timetable" (https:/ / babel. hathitrust. org/ cgi/ pt?seq=1& view=image& size=100& id=mdp. 39015035356347& u=1& num=40), Link Letter, Volume 7, No. 1 (July 1994), p.8, Merit/NSFNET Information Services, Merit Network, Ann Arbor [13] Link Letter (http:/ / babel. hathitrust. org/ cgi/ pt?id=mdp. 39015035356347;page=root;view=image;size=100;seq=1;num=1), Volume 4, No. 3 (Sept/Oct 1991), p. 1, NSFNET Information Services, Merit Network, Inc., Ann Arbor [14] "coprorations using BGP for advertising prefixes in mid-1990s" (http:/ / seclists. org/ nanog/ 2011/ May/ 478), e-mail to the NANOG list from Jessica Yu, 13 May 2011 [15] "NSFNET: The Community" (http:/ / www. nsfnet-legacy. org/ archives/ 06--Community. pdf), panel presentation slides, Doug Gale moderator, NSFNET: The Partnership That Changed The World, 29 November 2007 [16] "MeritWho, What, and Why, Part One: The Early Years, 1964-1983" (http:/ / www. merit. edu/ about/ history/ pdf/ MeritHistory. pdf), Eric M. Aupperle, Merit Network, Inc., in Library Hi Tech, vol. 16, No. 1 (1998) [17] "BBN to operate NEARnet" (http:/ / web. mit. edu/ newsoffice/ 1993/ bbn-0714. html), MIT News, 14 July 1993
NFSNET
[18] "About NorthWestNet" (http:/ / www. gutenberg. org/ files/ 40/ 40-ps. ps), NorthWestNet User Services Internet Resource Guide, NorthWestNet Academic Computing Consortium, Inc., 24 March 1992 accessed 3 July 2012 [19] March 16, 1992 memo from Mariam Leder, NSF Assistant General Counsel to Steven Wolff, Division Director, NSF DNCRI (included at page 128 of Management of NSFNET (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false), a transcript of the March 12, 1992 hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, Second Session, Hon. Rick Boucher, subcommittee chairman, presiding) [20] NSFNET Acceptable Use Policy (AUP) (http:/ / www. cybertelecom. org/ notes/ nsfnet. htm#aup), c. 1992 [21] Management of NSFNET (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false), a transcript of the March 12, 1992 hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, Second Session, Hon. Rick Boucher, subcommittee chairman, presiding [22] " I would dearly love to be able to exchange electronic mail with my son in college in Minnesota, but I feel that is probably not acceptable ", Steve Wolff, NSF DNCRI Director, speaking as a witness during the March 12, 1992 Management of NSFNET Congressional Hearing (page 124) (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false) [23] Even after the appropriations act was amended in 1992 to give NSF more flexibility with regard to commercial traffic, NSF never felt that it could entirely do away with the AUP and its restrictions on commercial traffic, see the response to Recommendation 5 in NSF's response to the Inspector General's review (a April 19, 1993 memo from Frederick Bernthal, Acting Director, to Linda Sundro, Inspector General, that is included at the end of Review of NSFNET (http:/ / www. nsf. gov/ pubs/ stis1993/ oig9301/ oig9301. txt), Office of the Inspector General, National Science Foundation, 23 March 1993) [24] R. Adams UUNET/NSFNET interconnection email (http:/ / www. interesting-people. org/ archives/ interesting-people/ 200912/ msg00032. html) [25] The Commercial Internet eXchange Association Router Agreement (http:/ / www. farooqhussain. org/ projects/ CIX Router Timeline_0905. pdf), c. 2000 [26] Review of NSFNET (http:/ / www. nsf. gov/ pubs/ stis1993/ oig9301/ oig9301. txt), Office of the Inspector General, National Science Foundation, 23 March 1993 [27] "ANS CO+RE and CIX Agree to Interconnect" (http:/ / w2. eff. org/ effector/ effect02. 10), EFFector Online, Issue 2.10, June 9, 1992, Electronic Frontier Foundation, ISSN: 1062-9424 [28] A series of e-mail messages that talk about various aspects of the CIX as seen from MichNet, the regional network operated by Merit in the State of Michigan: 1June1992 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1992-06/ msg00019. html), 29June1992 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1992-06/ msg00015. html), 29Sep1992 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1992-09/ msg00021. html), 4Jan1994 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-01/ msg00000. html), 6Jan1994 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-01/ msg00011. html), and 10Jan1994 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-01/ msg00016. html) [29] NSF Solicitation 93-52 (http:/ / w2. eff. org/ Infrastructure/ Govt_docs/ nsf_nren. rfp) - Network Access Point Manager, Routing Arbiter, Regional Network Providers, and Very High Speed Backbone Network Services Provider for NSFNET and the NREN(SM) Program, May 6, 1993 [30] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris, Ph.D., and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [31] E-mail regarding Network Access Points from Steve Wolff (NSF) to the com-priv list (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-03/ msg00001. html), sent 13:51 EST 2 March 1994 [32] NSF Program Solicitation 01-73: High Performance Network Connections for Science and Engineering Research (HPNC) (http:/ / www. nsf. gov/ publications/ pub_summ. jsp?ods_key=nsf0173), Advanced Networking Infrastructure and Research Program, Directorate for Computer and Information Science and Engineering, National Science Foundation, February 16, 2001, 16 pp. [33] E-mail regarding the launch of Internet2's Abillene network (http:/ / www. merit. edu/ mail. archives/ mjts/ 1999-02/ msg00024. html), Merit Joint Technical Staff, 25 February 1999 [34] Original 1994 NANOG Charter (http:/ / www. nanog. org/ governance/ charter/ 1994charter. php) [35] NANOG FAQ (http:/ / www. nanog. org/ about/ faq/ ) [36] Performance Systems International (PSI), AlterNet, Commercial Internet Exchange Association (CIX), Electronic Frontier Foundation (EFF), Gordon Cook, among others, see Cyber Telecom's Web page on "Internet History :: NSFNET" (http:/ / www. cybertelecom. org/ notes/ nsfnet. htm) [37] The Cook Report on the Internet (http:/ / www. cookreport. com) [38] "A Critical Look at the University of Michigan's Role in the 1987 Merit Agreement" (http:/ / www. cookreport. com/ index. php?option=com_content& view=article& id=216:310& catid=53:1995& Itemid=63), Chetly Zarko in The Cook Report on the Internet, January 1995, pp. 9-17 [39] Scientific and Advanced-Technology Act of 1992 (http:/ / thomas. loc. gov/ cgi-bin/ bdquery/ z?d102:S. 1146:), Public Law No: 102-476, 43 U.S.C. 1862(g)
86
NFSNET
87
External links
The Internet - the Launch of NSFNET (http://www.nsf.gov/about/history/nsf0050/internet/launch.htm), National Science Foundation NSFNET: A Partnership for High-Speed Networking, Final Report 1987-1995 (http://www.merit.edu/about/ history/pdf/NSFNET_final.pdf), Karen D. Frazer, Merit Network, Inc., 1995 NSF and the Birth of the Internet (http://www.nsf.gov/news/special_reports/nsf-net/), National Science Foundation, December 2007 NSFNET notes, summary, photos, reflections, and a video (http://hpwren.ucsd.edu/~hwb/NSFNET/), from Hans-Werner Braun, Co-Principal Investigator for the NSFNET Project at Merit Network, and later, Research Scientist at the University of California San Diego, and Adjunct Professor at San Diego State University "Fool Us Once Shame on YouFool Us Twice Shame on Us: What We Can Learn from the Privatizations of the Internet Backbone Network and the Domain Name System" (http://digitalcommons.law.wustl.edu/lawreview/ vol79/iss1/2), Jay P. Kesan and Rajiv C. Shah, Washington University Law Review, Volume 79, Issue 1 (2001) "The Rise of the Internet" (http://www.ibm.com/ibm100/us/en/icons/internetrise/), one of IBMs 100 Icons of Progress (http://www.ibm.com/ibm100/us/en/icons/), by Stephen Grillo, February 11, 2011, highlights IBM's contribution to NSFNET as part of its celebration of IBM's centennial year (http://www.ibm.com/ ibm100/us/en/) Merit Network: A history (http://www.merit.edu/about/history/) NSFNET Link Letter Archive (http://www.nic.funet.fi/pub/netinfo/NSFNET/Linkletter/), April 1988 (Vol. 1 No. 1) to July 1994 (Vol. 7 No. 1), text only, a web and FTP site provided by the Finnish IT center for science (http://www.csc.fi/english) Full copies of volumes 4-7, 1991-1994 (http://hdl.handle.net/2027/mdp.39015035356347) are also available from the Hathi Trust Digital Library Reflection on NSFNet (http://www.universalsubtitles.org/es/videos/ap3npBCf4nir/info/reflection-on-nsfnet/ )
TELENET
88
TELENET
Telenet was a commercial packet switched network which went into service in 1974.[1] It was the first packet-switched network service that was available to the general public.[2] Various commercial and government interests paid monthly fees for dedicated lines connecting their computers and local networks to this backbone network. Free public dialup access to Telenet, for those who wished to access these systems, was provided in hundreds of cities throughout the United States. The original founding company, Telenet Inc., was established by Bolt Beranek and Newman (BBN) and recruited Larry Roberts (former head of the ARPANet) as President of the company, and Barry Wessler. GTE acquired Telenet in 1979.[3] It was later acquired by Sprint and called "Sprintnet". Sprint migrated customers from Telenet to the modern-day Sprintlink[4] IP network, one of many networks composing today's Internet. Telenet had its first offices in downtown Washington DC, then moved to McLean, Virginia. It was acquired by GTE while in McLean, and then moved offices in Reston, Virginia. Under the various names, the company operated a public network, and also sold its packet switching equipment to other carriers and to large enterprise networks.
History
After establishing "value added carriers" was legalized in the U.S., Bolt Beranek and Newman (BBN) who were the private contractors for ARPANET set out to create a private sector version. In January 1975, Telenet Communications Corporation announced that they had acquired the necessary venture capital after a two year quest, and on August 16 of the same year they began operating the first public packet-switching network.[5] [6]
Coverage
Originally, the public network had switching nodes in seven US cities:[7] Washington, D.C. (network operations center as well as switching) Boston, Massachusetts New York, New York Chicago, Illinois Dallas, Texas San Francisco, California Los Angeles, California
The switching nodes were fed by Telenet Access Controller (TAC) terminal concentrators both colocated and remote from the switches. By 1980, there were over 1000 switches in the public network. At that time, the next largest network using Telenet switches was that of Southern Bell, which had approximately 250 switches.
TELENET Originally, the switching tables could not be altered separately from the main executable code, and topology updates had to be made by deliberately crashing the switch code and forcing a reboot from the network management center. Improvements in the software allowed new tables to be loaded, but the network never used dynamic routing protocols. Multiple static routes, on a switch-by-switch basis, could be defined for fault tolerance. Network management functions continued to run on Prime minicomputers. Its X.25 host interface was the first in the industry and Telenet helped standardize X.25 in the CCITT.
89
Computer Access
Computers supporting the X.25 protocol could connect directly to switching centers. These connections ranged from 2.4 to 56 kbit/s.
PC Pursuit
In the late 1980s, Telenet offered a service called PC Pursuit. For a flat monthly fee, customers could dial into the Telenet network in one city, then dial out on the modems in another city to access bulletin board systems and other services. PC Pursuit was popular among computer hobbyists because it sidestepped long-distance charges. In this sense, PC Pursuit was similar to the Internet. Cities accessible by PC Pursuit
City Code Area Code(s) AZPHO CAGLE CALAN CODEN CTHAR FLMIA GAATL ILCHI MABOS MIDET MNMIN 602 818 213 303 203 305 404 312, 815 617 313 612 City Phoenix, Arizona Glendale, California Los Angeles, California Denver, Colorado Hartford, Connecticut Miami, Florida Atlanta, Georgia Chicago, Illinois Boston, Massachusetts Detroit, Michigan Minneapolis, Minnesota
TELENET
90
NCRTP NJNEW NYNYO OHCLV ORPOR PAPHI TXDAL TXHOU WIMIL 919 201 212, 718 216 503 215 214, 817 713 414 Research Triangle Park, North Carolina Newark, New Jersey New York City Cleveland, Ohio Portland, Oregon Philadelphia, Pennsylvania Dallas, Texas Houston, Texas Milwaukee, Wisconsin
References
[1] C. J. P. Moschovitis, H. Poole, T. Schuyler, T. M. Senft, History of the Internet: A Chronology, 1843 to the Present, p. 79-80 (The Moschovitis Group, Inc 1999) [2] Stephen Segaller, NERDS 2.0.1: A Brief History of the Internet, p. 115 (TV Books Publisher 1998) [3] Robert Cannon. "Industry :: Genuity" (http:/ / www. cybertelecom. org/ industry/ genuity. htm). Cybertelecom. . Retrieved 2011-12-21. [4] "Sprintlink.net" (http:/ / www. sprintlink. net/ ). Sprintlink.net. . Retrieved 2011-12-21. [5] "Electronic post for switching data." Timothy Johnson. New Scientist. May 13, 1976 [6] Mathison, S.L. Roberts, L.G. ; Walker, P.M., The history of telenet and the commercialization of packet switching in the U.S. (http:/ / ieeexplore. ieee. org/ xpl/ articleDetails. jsp?arnumber=6194380), Communications Magazine, IEEE, May 2012 [7] Telenet inaugurates service (http:/ / portal. acm. org/ citation. cfm?id=1015671. 1015674& coll=GUIDE& dl=GUIDE& CFID=31545796& CFTOKEN=18757936),ACM Computer Communications Review, Stuart L. Mathison, 1975 [8] Byars, S. J.; Carr, WN (31 January), "Patent Bus Interface" (http:/ / patft. uspto. gov/ netacgi/ nph-Parser?Sect1=PTO2& Sect2=HITOFF& u=/ netahtml/ PTO/ search-adv. htm& r=8& f=G& l=50& d=PTXT& p=1& p=1& S1=908056& OS=908056& RS=908056), US Patent 4,802,161 (U.S. Patent and Trademark Office), , retrieved 2007-09-18
UUCP
91
UUCP
UUCP is an abbreviation of Unix-to-Unix Copy.[1] The term generally refers to a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, a command named uucp is one of the programs in the suite; it provides a user interface for requesting file copy operations. The UUCP suite also includes uux (user interface for remote command execution), uucico (the communication program that performs the file transfers), uustat (reports statistics on recent activity), uuxqt (execute commands sent from remote machines), and uuname (reports the UUCP name of the local system). Although UUCP was originally developed on Unix and is most closely associated with Unix-like systems, UUCP implementations exist for several non-Unix-like operating systems, including Microsoft's MS-DOS, Digital's VAX/VMS, Commodore's AmigaOS, classic Mac OS, and even CP/M.
Technology
UUCP can use several different types of physical connections and link layer protocols, but was most commonly used over dial-up connections. Before the widespread availability of Internet connectivity, computers were only connected by smaller private networks within a company or organization. They were also often equipped with modems so they could be used remotely from character-mode terminals via dial-up lines. UUCP uses the computers' modems to dial out to other computers, establishing temporary, point-to-point links between them. Each system in a UUCP network has a list of neighbor systems, with phone numbers, login names and passwords, etc. When work (file transfer or command execution requests) is queued for a neighbor system, the uucico program typically calls that system to process the work. The uucico program can also poll its neighbors periodically to check for work queued on their side; this permits neighbors without dial-out capability to participate. Today, UUCP is rarely used over dial-up links, but is occasionally used over TCP/IP.[2][3] One example of the current use of UUCP is in the retail industry by Epicor CRS Retail Systems [4] for transferring batch files between corporate and store systems via TCP and dial-up on SCO OpenServer, Red Hat Linux, and Microsoft Windows (with Cygwin). The number of systems involved, as of early 2006, ran between 1500 and 2000 sites across 60 enterprises. UUCP's longevity can be attributed to its low/zero cost, extensive logging, native failover to dialup, and persistent queue management.
History
UUCP was originally written at AT&T Bell Laboratories by Mike Lesk. By 1978 it was in use on 82 UNIX machines inside the Bell system, primarily for software distribution. It was released in 1979 as part of Version 7 Unix.[5] The original UUCP was rewritten by AT&T researchers Peter Honeyman, David A. Nowitz, and Brian E. Redman. The rewrite is referred to as HDB or HoneyDanBer uucp, which was later enhanced, bug fixed, and repackaged as BNU UUCP ("Basic Network Utilities"). Each of these versions was distributed as proprietary software, which inspired Ian Lance Taylor to write a new free software version from scratch in 1991.[6] Taylor UUCP was released under the GNU General Public License and became the most stable and bug free version. In particular, Taylor UUCP addressed security holes which allowed some of the original internet worms to remotely execute unexpected shell commands. Taylor UUCP also incorporates features of all previous versions of UUCP, allowing it to communicate with any other version with the greatest level of compatibility and even use similar config file formats from other versions. UUCP was also implemented for non-UNIX operating systems, most-notably MS-DOS systems. Packages such as UUSLAVE/GNUUCP (John Gilmore, Garry Paxinos, Tim Pozar), UUPC (Drew Derbyshire) and FSUUCP (Christopher Ambler of IODesign), brought early Internet connectivity to personal computers, expanding the
UUCP network beyond the interconnected university systems. FSUUCP formed the basis for many BBS packages such as Galacticomm's Major BBS and Mustang Software's Wildcat! BBS to connect to the UUCP network and exchange email and Usenet traffic. As an example, UFGATE (John Galvin, Garry Paxinos, Tim Pozar) was a package that provided a gateway between networks running Fidonet and UUCP protocols. FSUUCP was notable for being the only other implementation of Taylor's enhanced 'i' protocol, a significant improvement over the standard 'g' protocol used by most UUCP implementations.
92
Bang path
An email address of this form was known as a bang path. Bang paths of eight to ten machines (or hops) were not uncommon in 1981, and late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. Some hosts went so far as to try to "rewrite" the path, sending mail via "faster" routesthis practice tended to be frowned upon. The "pseudo-domain" ending .uucp was sometimes used to designate a hostname as being reachable by UUCP networking, although this was never formally in the Internet root as a top-level domain. This would not have made sense anyway, because the DNS system is only appropriate for hosts reachable directly by TCP/IP. Additionally, uucp as a community administers itself and does not mesh well with the administration methods and regulations governing the DNS; .uucp works where it needs to; some hosts punt mail out of SMTP queue into uucp queues on gateway machines if a .uucp address is recognized on an incoming SMTP connection Usenet traffic was originally transmitted over the UUCP protocol using bang paths. These are still in use within Usenet message format Path header lines. They now have only an informational purpose, and are not used for routing, although they can be used to ensure that loops do not occur. In general, this form of e-mail address has now been superseded by the "@ notation", even by sites still using UUCP.
UUCP The UUCP Mapping Project was a volunteer, largely successful effort to build a map of the connections between machines that were open mail relays and establish a managed namespace. Each system administrator would submit, by e-mail, a list of the systems to which theirs would connect, along with a ranking for each such connection. These submitted map entries were processed by an automatic program that combined them into a single set of files describing all connections in the network. These files were then published monthly in a newsgroup dedicated to this purpose. The UUCP map files could then be used by software such as "pathalias" to compute the best route path from one machine to another for mail, and to supply this route automatically. The UUCP maps also listed contact information for the sites, and so gave sites seeking to join UUCPNET an easy way to find prospective neighbors.
93
Remote commands
uux is remote command execution over UUCP. The uux command is used to execute a command on a remote system, or to execute a command on the local system using files from remote systems. The command is run by the uucico daemon which is not instant.
Decline
UUCP usage began to die out with the rise of ISPs offering inexpensive SLIP and PPP services. The UUCP Mapping Project was formally shut down late in 2000. The UUCP protocol has now mostly been replaced by the Internet TCP/IP based protocols SMTP for mail and NNTP Usenet news. In July 2012, Dutch Internet provider XS4ALL closed down its UUCP service, claiming it was "probably one of the last providers in the world that still offered it"; it still had 13 users at that time, and new users had been refused for several years already.[7]
UUCP
94
References
[1] (pdf) UNIX(TM) TIME-SHARING SYSTEM: UNIX PROGRAMMERS MANUAL, Seventh Edition, Volume 1 (http:/ / cm. bell-labs. com/ 7thEdMan/ v7vol1. pdf). Murray Hill, New Jersey: Bell Telephone Laboratories, Incorporated. January 1979. . Retrieved 2011-07-13. [2] Ian Lance Taylor (June 2003). "UUCP 'f' Protocol" (http:/ / www. airs. com/ ian/ uucp-doc/ uucp_7. html#SEC99). . Retrieved 2008-08-04. [3] Fabien Penso. "UUCPssh" (http:/ / uucpssh. org/ ). . Retrieved 2009-08-09 [dead as on 2010-01-07]. [4] http:/ / www. epicor. com/ www/ products/ retail/ RetailSolutions. htm [5] Version 7 Unix manual: "UUCP Implementation Description" by D. A. Nowitz, and "A Dial-Up Network of UNIX Systems" by D. A. Nowitz and M. E. Lesk (http:/ / cm. bell-labs. com/ 7thEdMan/ v7vol2b. pdf) [6] Ian Lance Taylor (September 1991). "Beta release of new UUCP package available" (http:/ / groups. google. com/ group/ comp. mail. uucp/ browse_thread/ thread/ a59ccd63afcade57). . Retrieved 2009-01-19. [7] Goodbye to UUCP (https:/ / blog. xs4all. nl/ 2012/ 07/ 30/ afscheid-van-uucp/ ), XS4ALL blog. (Dutch) [8] Randolph Bentson (August 1995). "Linux Goes To Sea" (http:/ / www. linuxjournal. com/ article/ 1111). . Retrieved 2009-02-21.
External links
Using & Managing UUCP. Ed Ravin, Tim O'Reilly, Dale Doughtery, and Grace Todino. 1996, O'Reilly & Associates, Inc. ISBN 1-56592-153-4 Mark Horton (1986). RFC 976: UUCP Mail Interchange Format Standard. Internet Engineering Task Force Requests for Comment. UUCP Internals Frequently Asked Questions (http://www.faqs.org/faqs/uucp-internals/) Setting up Taylor UUCP + qmail on FreeBSD 5.1 (http://ece.iisc.ernet.in/FAQ) Taylor UUCP (http://www.airs.com/ian/uucp.html) is a GPL licensed UUCP package. Taylor UUCP Documentation (http://www.airs.com/ian/uucp-doc/uucp.html) useful information about UUCP in general and various uucp protocols. The UUCP Project: History (http://www.uucp.org/history/) The UUCP Mapping Project (http://www.uucp.org/uumap/) UUHECNET - Hobbyist UUCP network that offers free feeds (http://www.uuhec.net/)
USENET
95
USENET
Usenet is a worldwide distributed Internet discussion system. It was developed from the general purpose UUCP architecture of the same name. Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980.[1] Users read and post messages (called articles or posts, and collectively termed news) to one or more categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects, and is the precursor to the various Internet forums that are widely used today. Usenet can be superficially regarded as a hybrid between email and web forums. Discussions are threaded, with modern news reader software, as with web forums and BBSes, though posts are stored on the server sequentially.
One notable difference between a BBS or web forum and Usenet is the absence of a central server and dedicated administrator. Usenet is distributed among a large, constantly changing conglomeration of servers that store and forward messages to one another in so-called news feeds. Individual users may read messages from and post messages to a local server operated by a commercial usenet provider, their Internet service provider, university, or employer.
A diagram of Usenet servers and clients. The blue, green, and red dots on the servers represent the groups they carry. Arrows between servers indicate newsgroup group exchanges (feeds). Arrows between clients and servers indicate that a user is subscribed to a certain group and reads or submits articles.
Introduction
Usenet is one of the oldest computer network communications systems still in widespread use. It was conceived in 1979 and publicly established in 1980 at the University of North Carolina at Chapel Hill and Duke University,[1] over a decade before the World Wide Web was developed and the general public got access to the Internet. It was originally built on the "poor man's ARPANET," employing UUCP as its transport protocol to offer mail and file transfers, as well as announcements through the newly developed news software such as A News. The name Usenet emphasized its creators' hope that the USENIX organization would take an active role in its operation.[2] The articles that users post to Usenet are organized into topical categories called newsgroups, which are themselves logically organized into hierarchies of subjects. For instance, [news:sci.math sci.math] and [news:sci.physics sci.physics] are within the sci hierarchy, for science. When a user subscribes to a newsgroup, the news client software keeps track of which articles that user has read.[3] In most newsgroups, the majority of the articles are responses to some other article. The set of articles which can be traced to one single non-reply article is called a thread. Most modern newsreaders display the articles arranged into threads and subthreads. When a user posts an article, it is initially only available on that user's news server. Each news server talks to one or more other servers (its "newsfeeds") and exchanges articles with them. In this fashion, the article is copied from server to server and (if all goes well) eventually reaches every server in the network. The later peer-to-peer networks operate on a similar principle; but for Usenet it is normally the sender, rather than the receiver, who initiates transfers. Some have noted that this seems an inefficient protocol in the era of abundant high-speed network access.
USENET Usenet was designed under conditions when networks were much slower, and not always available. Many sites on the original Usenet network would connect only once or twice a day to batch-transfer messages in and out.[4] Usenet has significant cultural importance in the networked world, having given rise to, or popularized, many widely recognized concepts and terms such as "FAQ" and "spam".[5] The format and transmission of Usenet articles is similar to that of Internet e-mail messages. The difference between the two is that Usenet articles can be read by any user whose news server carries the group to which the message was posted, as opposed to email messages which have one or more specific recipients.[6] Today, Usenet has diminished in importance with respect to Internet forums, blogs and mailing lists. Usenet differs from such media in several ways: Usenet requires no personal registration with the group concerned; information need not be stored on a remote server; archives are always available; and reading the messages requires not a mail or web client, but a news client. The groups in alt.binaries are still widely used for data transfer.
96
Newsreaders
Newsgroups are typically accessed with newsreaders: applications that allow users to read and reply to postings in newsgroups. These applications act as clients to one or more news servers. Newsreaders are available for all major operating systems.[7] Modern mail clients or "communication suites" commonly also have an integrated newsreader. Often, however, these integrated clients are of low quality, compared to standalone newsreaders, and incorrectly implement Usenet protocols, standards and conventions. Many of these integrated clients, for example the one in Microsoft's Outlook Express, are disliked by purists because of their misbehavior.[8] With the rise of the World Wide Web (WWW), web front-ends (web2news) have become more common. Web front ends have lowered the technical entry barrier requirements to that of one application and no Usenet NNTP server account. There are numerous websites now offering web based gateways to Usenet groups, although some people have begun filtering messages made by some of the web interfaces for one reason or another.[9][10] Google Groups[11] is one such web based front end and some web browsers can access Google Groups via news: protocol links directly.[12]
USENET
97
Technical details
Usenet is a set of protocols for generating, storing and retrieving news "articles" (which resemble Internet mail messages) and for exchanging them among a readership which is potentially widely distributed. These protocols most commonly use a flooding algorithm which propagates copies throughout a network of participating servers. Whenever a message reaches a server, that server forwards the message to all its network neighbors that haven't yet seen the article. Only one copy of a message is stored per server, and each server makes it available on demand to the (typically local) readers able to access that server. The collection of Usenet servers has thus a certain peer-to-peer character in that they share resources by exchanging them, the granularity of exchange however is on a different scale than a modern peer-to-peer system and this characteristic excludes the actual users of the system who connect to the news servers with a typical client-server application, much like an email reader. RFC 850 was the first formal specification of the messages exchanged by Usenet servers. It was superseded by RFC 1036 and subsequently by RFC 5536 and RFC 5537. In cases where unsuitable content has been posted, Usenet has support for automated removal of a posting from the whole network by creating a cancel message, although due to a lack of authentication and resultant abuse, this capability is frequently disabled. Copyright holders may still request the manual deletion of infringing material using the provisions of World Intellectual Property Organization treaty implementations, such as the United States Online Copyright Infringement Liability Limitation Act. On the Internet, Usenet is transported via the Network News Transfer Protocol (NNTP) on TCP Port 119 for standard, unprotected connections and on TCP port 563 for SSL encrypted connections which is offered only by a few sites.
USENET
98
Organization
The major set of worldwide newsgroups is contained within nine hierarchies, eight of which are operated under consensual guidelines that govern their administration and naming. The current Big Eight are: comp.* computer-related discussions (comp.software, comp.sys.amiga) humanities.* fine arts, literature, and philosophy (humanities.classics, humanities.design.misc) misc.* miscellaneous topics (misc.education, misc.forsale, misc.kids) news.* discussions and announcements about news (meaning Usenet, not current events) (news.groups, news.admin) rec.* recreation and entertainment (rec.music, rec.arts.movies) sci.* science related discussions (sci.psychology, sci.research) soc.* social discussions (soc.college.org, soc.culture.african) talk.* talk about various controversial topics (talk.religion, talk.politics, talk.origins) See also the Great Renaming. The alt.* hierarchy is not subject to the procedures controlling groups in the Big Eight, and it is as a result less organized. Groups in the alt.* hierarchy tend to be more specialized or specificfor example, there might be a newsgroup under the Big Eight which contains discussions about children's books, but a group in the alt hierarchy may be dedicated to one specific author of children's books. Binaries are posted in alt.binaries.*, making it the largest of all the hierarchies. Many other hierarchies of newsgroups are distributed alongside these. Regional and language-specific hierarchies such as japan.*, malta.* and ne.* serve specific countries and regions such as Japan, Malta and New England. Companies and projects administer their own hierarchies to discuss their products and offer community technical support, such as the historical gnu.* hierarchy from the Free Software Foundation. Microsoft closed its newsserver in June 2010, providing support for its products over forums now.[17] Some users prefer to use the term "Usenet" to refer only to the Big Eight hierarchies; others include alt as well. The more general term "netnews" incorporates the entire medium, including private organizational news systems. Informal sub-hierarchy conventions also exist. *.answers are typically moderated cross-post groups for FAQs. An FAQ would be posted within one group and a cross post to the *.answers group at the head of the hierarchy seen by some as a refining of information in that news group. Some subgroups are recursiveto the point of some silliness in alt.*.
USENET
99
Binary content
Usenet was originally created to distribute text content encoded in the 7-bit ASCII character set. With the help of programs that encode 8-bit values into ASCII, it became practical to distribute binary files as content. Binary posts, due to their size and often-dubious copyright status, were in time restricted to specific newsgroups, making it easier for administrators to allow or disallow the traffic.
A visual example of the many complex steps required to prepare data to be uploaded to Usenet newsgroups. These steps must be done again in reverse to download data from Usenet.
The oldest widely used encoding method for binary content is uuencode, from the Unix UUCP package. In the late 1980s, Usenet articles were often limited to 60,000 characters, and larger hard limits exist today. Files are therefore commonly split into sections that require reassembly by the reader. With the header extensions and the Base64 and Quoted-Printable MIME encodings, there was a new generation of binary transport. In practice, MIME has seen increased adoption in text messages, but it is avoided for most binary attachments. Some operating systems with metadata attached to files use specialized encoding formats. For Mac OS, both Binhex and special MIME types are used. Other lesser known encoding systems that may have been used at one time were BTOA, XX encoding, BOO, and USR encoding. In an attempt to reduce file transfer times, an informal file encoding known as yEnc was introduced in 2001. It achieves about a 30% reduction in data transferred by assuming that most 8-bit characters can safely be transferred across the network without first encoding into the 7-bit ASCII space. The standard method of uploading binary content to Usenet is to first archive the files into RAR archives (for large files usually in 15 MB, 50 MB or 100 MB parts) then create Parchive files. Parity files are used to recreate missing data. This is needed often, as not every part of the files reaches a server. These are all then encoded into yEnc and uploaded to the selected binary groups.
USENET Binary retention time Each newsgroup is generally allocated a certain amount of storage space for post content. When this storage has been filled, each time a new post arrives, old posts are deleted to make room for the new content. If the network bandwidth available to a server is high but the storage allocation is small, it is possible for a huge flood of incoming content to overflow the allocation and push out everything that was in the group before it. If the flood is large enough, the beginning of the flood will begin to be deleted even before the last part of the flood has been posted. Binary newsgroups are only able to function reliably if there is sufficient This is a list of some of the biggest binary groups. With 1317+ days retention, the storage allocated to a group to allow (binary) Usenet storage (which binsearch.info indexes) is more than 9 petabytes (9000 [18] readers enough time to download all terabytes). parts of a binary posting before it is flushed out of the group's storage allocation. This was at one time how posting of undesired content was countered; the newsgroup would be flooded with random garbage data posts, of sufficient quantity to push out all the content to be suppressed. This has been compensated by service providers allocating enough storage to retain everything posted each day, including such spam floods, without deleting anything. The average length of time that posts are able to stay in the group before being deleted is commonly called the retention time. Generally the larger Usenet servers have enough capacity to archive several years of binary content even when flooded with new data at the maximum daily speed available. A good binaries service provider must not only accommodate users of fast connections (3 megabit) but also users of slow connections (256 kilobit or less) who need more time to download content over a period of several days or weeks. Major NSPs have a retention time of more than 4 years.[19] This results in more than 9 petabytes (9000 terabytes) of storage. [20] In part because of such long retention times, as well as growing Internet upload speeds, Usenet is also used by individual users to store backup data in a practice called Usenet backup, or uBackup.[21] While commercial providers offer more easy to use online backup services, storing data on Usenet is free of charge (although access to Usenet itself may not be). The method requires the user to manually select, prepare and upload the data. Because anyone can potentially download the backup files, the data is typically encrypted. After the files are uploaded, the uploader does not have any control over them; the files are automatically copied to all Usenet providers, so there will be multiple copies of it spread over different geographical locations around the world desirable in a backup scheme.
100
USENET Legal issues While binary newsgroups can be used to distribute completely legal user-created works, open-source software, and public domain material, some binary groups are used to illegally distribute commercial software, copyrighted media, and obscene material. ISP-operated Usenet servers frequently block access to all alt.binaries.* groups to both reduce network traffic and to avoid related legal issues. Commercial Usenet service providers claim to operate as a telecommunications service, and assert that they are not responsible for the user-posted binary content transferred via their equipment. In the United States, Usenet providers can qualify for protection under the DMCA Safe Harbor regulations, provided that they establish a mechanism to comply with and respond to takedown notices from copyright holders.[22] Removal of copyrighted content from the entire Usenet network is a nearly impossible task, due to the rapid propagation between servers and the retention done by each server. Petitioning a Usenet provider for removal only removes it from that one server's retention cache, but not any others. It is possible for a special post cancellation message to be distributed to remove it from all servers, but many providers ignore cancel messages by standard policy, because they can be easily falsified and submitted by anyone.[23][24] For a takedown petition to be most effective across the whole network, it would have to be issued to the origin server to which the content has been posted, before it has been propagated to other servers. Removal of the content at this early stage would prevent further propagation, but with modern high speed links, content can be propagated as fast as it arrives, allowing no time for content review and takedown issuance by copyright holders.[25] Establishing the identity of the person posting illegal content is equally difficult due to the trust-based design of the network. Like SMTP email, servers generally assume the header and origin information in a post is true and accurate. However, as in SMTP email, Usenet post headers are easily falsified so as to obscure the true identity and location of the message source.[26] In this manner, Usenet is significantly different from modern P2P services; most P2P users distributing content are typically immediately identifiable to all other users by their network address, but the origin information for a Usenet posting can be completely obscured and unobtainable once it has propagated past the original server.[27] Also unlike modern P2P services, the identity of the downloaders is hidden from view. On P2P services a downloader is identifiable to all others by their network address. On Usenet, the downloader connects directly to a server, and only the server knows the address of who is connecting to it. Some Usenet providers do keep usage logs, but not all make this logged information casually available to outside parties such as the Recording Industry Association of America.[28][29]
101
History
Newsgroup experiments first occurred in 1979. Tom Truscott and Jim Ellis of Duke University came up with the idea as a replacement for a local announcement program, and established a link with nearby University of North Carolina using Bourne shell scripts written by Steve Bellovin. The public release of news was in the form of conventional compiled software, written by Steve Daniel and Truscott.[30] In 1980, Usenet was connected to ARPANET through UC Berkeley which had connections to both Usenet and ARPANET. Michael Horton, the graduate student that set up the connection, began feeding mailing lists from the ARPANET into Usenet with the fa identifier. As a result, the number of people on Usenet increased dramatically; however, it was still a while longer before Usenet users could contribute to ARPANET.[31] After 32 years, the Usenet news service link at the University of North Carolina at Chapel Hill (news.unc.edu) was finally retired on February 4, 2011.
USENET
102
Network
UUCP networks spread quickly due to the lower costs involved, and the ability to use existing leased lines, X.25 links or even ARPANET connections. By 1983, the number of UUCP hosts had grown to 550, nearly doubling to 940 in 1984.[32] As the mesh of UUCP hosts rapidly expanded, it became desirable to distinguish the Usenet subset from the overall network. A vote was taken at the 1982 USENIX conference to choose a new name. The name Usenet was retained, but it was established that it only applied to news.[33] The name UUCPNET became the common name for the overall network. In addition to UUCP, early Usenet traffic was also exchanged with Fidonet and other dial-up BBS networks. Widespread use of Usenet by the BBS community was facilitated by the introduction of UUCP feeds made possible by MS-DOS implementations of UUCP such as UFGATE (UUCP to FidoNet Gateway), FSUUCP and UUPC. The Network News Transfer Protocol, or NNTP, was introduced in 1985 to distribute Usenet articles over TCP/IP as a more flexible alternative to informal Internet transfers of UUCP traffic. Since the Internet boom of the 1990s, almost all Usenet distribution is over NNTP.[34]
Software
Early versions of Usenet used Duke's A News software. Soon, at UC Berkeley, Matt Glickman and Mark Horton produced an improved version called B News. With a message format that offered compatibility with Internet mail and improved performance, it became the dominant server software. C News, developed by Geoff Collyer and Henry Spencer at the University of Toronto, was comparable to B News in features but offered considerably faster processing. In the early 1990s, InterNetNews by Rich Salz was developed to take advantage of the continuous message flow made possible by NNTP versus the batched store-and-forward design of UUCP. Since that time INN development has continued, and other news server software has also been developed.[35]
Public venue
Usenet was the initial Internet community and the place for many of the most important public developments in the commercial Internet. It was the place where Tim Berners-Lee announced the launch of the World Wide Web,[36] where Linus Torvalds announced the Linux project,[37] and where Marc Andreessen announced the creation of the Mosaic browser and the introduction of the image tag,[38] which revolutionized the World Wide Web by turning it into a graphical medium.
USENET explained that when pornographers and software pirates began putting large files on Usenet, by the late 1990s this caused Usenet disk space and traffic to increase. Internet service providers allocated space to Usenet libraries, and Internet service providers questioned why they needed to host space for pornography and pirated software. Segan said that the hosting of porn and pirated software was "likely when Usenet became truly doomed" and "[i]t's the porn that's putting nails in Usenet's coffin." AOL discontinued Usenet access in 2005. When the State of New York opened an investigation on child pornographers who used Usenet, many ISPs dropped all Usenet access or access to the alt. hierarchy. Segan concluded "It's hard to completely kill off something as totally decentralized as Usenet; as long as two servers agree to share the NNTP protocol, it'll continue on in some fashion. But the Usenet I mourn is long gone[...]"[41] In response, John Biggs of TechCrunch said "Is Usenet dead, as Sascha posits? I dont think so. As long as there are folks who think a command line is better than a mouse, the original text-only social network will live on." Biggs added that while many Internet service providers terminated access, "the real pros know where to go to get their angst-filled, nit-picking, obsessive fix."[42] In May 2010, Duke University, whose implementation had kicked off Usenet more than 30 years earlier, decommissioned its Usenet server, citing low usage and rising costs.[43][44]
103
USENET
104
Daily Volume
Date
Source Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com
4.5 GB 1996-12 9 GB 1997-07 12 GB 1998-01 26 GB 1999-01 82 GB 2000-01 181 GB 2001-01 257 GB 2002-01 492 GB 2003-01 969 GB 2004-01
1.34 TB 2005-01-01 Octanews.net 1.30 TB 2005-01-01 Newsreader.com 1.81 TB 2005-02-28 Octanews.net 1.87 TB 2005-03-08 Newsreader.com 2.00 TB 2005-03-11 Various sources 2.27 TB 2006-01 2.95 TB 2007-01 3.07 TB 2008-01 Altopia.com Altopia.com Altopia.com
3.80 TB 2008-04-16 Newsdemon.com 4.60 TB 2008-11-01 Giganews.com 4.65 TB 2009-01 6.00 TB 2009-12 5.42 TB 2010-01 8.00 TB 2010-09 7.52 TB 2011-01 8.25 TB 2011-10 9.29 TB 2012-01 Altopia.com Newsdemon.com Altopia.com Newsdemon.com Altopia.com Thecubenet.com Altopia.com
In 2008, Verizon Communications, Time Warner Cable and Sprint Nextel signed an agreement with Attorney General of New York Andrew Cuomo to shut down access to sources of child pornography.[47] Time Warner Cable stopped offering access to Usenet. Verizon reduced its access to the "Big 8" hierarchies. Sprint stopped access to the alt.* hierarchies. AT&T stopped access to the alt.binaries.* hierarchies. Cuomo never specifically named Usenet in his anti-child pornography campaign. David DeJean of PC World said that some worry that the ISPs used Cuomo's campaign as an excuse to end portions of Usenet access, as it is costly for the Internet service providers and not in high demand by customers. In 2008 AOL, which no longer offered Usenet access, and the four providers that responded to the Cuomo campaign were the five largest Internet service providers in the United States; they had more than 50% of the U.S. ISP marketshare.[48] On June 8, 2009, AT&T announced that it would no longer provide access to the Usenet service as of July 15, 2009.[49]
USENET AOL announced that it would discontinue its integrated Usenet service in early 2005, citing the growing popularity of weblogs, chat forums and on-line conferencing.[50] The AOL community had a tremendous role in popularizing Usenet some 11 years earlier.[51] In August, 2009, Verizon announced that it would discontinue access to Usenet on September 30, 2009.[52][53] JANET(UK) announced it will discontinue Usenet service, effective July 31, 2010, citing Google Groups as an alternative.[54] Microsoft announced that it would discontinue support for its public newsgroups (msnews.microsoft.com) from June 1, 2010, offering web forums as an alternative.[55] Primary reasons cited for the discontinuance of Usenet service by general ISPs include the decline in volume of actual readers due to competition from blogs, along with cost and liability concerns of increasing proportion of traffic devoted to file-sharing and spam on unused or discontinued groups.[56][57] Some ISPs did not include pressure from Attorney General of New York Andrew Cuomo's aggressive campaign against child pornography as one of their reasons for dropping Usenet feeds as part of their services.[58] ISPs Cox and Atlantic Communications resisted the 2008 trend but both did eventually drop their respective Usenet feeds in 2010.[59][60][61]
105
Archives
Public archives of Usenet articles have existed since the early days of Usenet, such as the system created by Kenneth Almquist in late 1982.[62] Distributed archiving of Usenet posts was suggested in November 1982 by Scott Orshan, who proposed that "Every site should keep all the articles it posted, forever."[63] Also in November of that year, Rick Adams responded to a post asking "Has anyone archived netnews, or does anyone plan to?"[64] by stating that he was, "afraid to admit it, but I started archiving most 'useful' newsgroups as of September 18."[65] In June 1982, Gregory G. Woodbury proposed an "automatic access to archives" system that consisted of "automatic answering of fixed-format messages to a special mail recipient on specified machines." [66] In 1985, two news archiving systems and one RFC were posted to the Internet. The first system, called keepnews, by Mark M. Swenson of The University of Arizona, was described as "a program that attempts to provide a sane way of extracting and keeping information that comes over Usenet." The main advantage of this system was to allow users to mark articles as worthwhile to retain.[67] The second system, YA News Archiver by Chuq Von Rospach, was similar to keepnews, but was "designed to work with much larger archives where the wonderful quadratic search time feature of the Unix ... becomes a real problem."[68] Von Rospach in early 1985 posted a detailed RFC for "archiving and accessing usenet articles with keyword lookup." This RFC described a program that could "generate and maintain an archive of Usenet articles and allow looking up articles based on the article-id, subject lines, or keywords pulled out of the article itself." Also included was C code for the internal data structure of the system.[69] The desire to have a fulltext search index of archived news articles is not new either, one such request having been made in April 1991 by Alex Martelli who sought to "build some sort of keyword index for [the news archive]."[70] In early May, Mr. Martelli posted a summary of his responses to Usenet, noting that the "most popular suggestion award must definitely go to 'lq-text' package, by Liam Quin, recently posted in alt.sources."[71] Today, the archiving of Usenet has led to a fear of loss of privacy.[72] An archive simplifies ways to profile people. This has partly been countered with the introduction of the X-No-Archive: Yes header, which is itself controversial.[73]
USENET
106
References
[1] From Usenet to CoWebs: interacting with social information spaces, Christopher Lueg, Danyel Fisher, Springer (2003), ISBN 1-85233-532-7, ISBN 978-1-85233-532-8 [2] "Invitation to a General Access UNIX Network (http:/ / www. newsdemon. com/ first-official-announcement-usenet. php)", James Ellis and Tom Truscott, in First Official Announcement of USENET, NewsDemon (K&L Technologies, Inc), 1979 [3] Lehnert, Wendy G.; Kopec, Richard (2007). Web 101. Addison Wesley. p. 291. [4] "Store And Forward Communication: UUCP and FidoNet" (http:/ / www. cs. cmu. edu/ ~dga/ 15-849/ store_and_forward. html). Archived (http:/ / archive. is/ 20120630/ http:/ / www. cs. cmu. edu/ ~dga/ 15-849/ store_and_forward. html) from the original on 2012-06-30. .. Carnegie Mellon School of Computer Science. [5] "USENET Newsgroup Terms - SPAM" (http:/ / www. newsdemon. com/ usenet_term_spam. php). Archived (http:/ / archive. is/ 20120915/ http:/ / www. newsdemon. com/ usenet_term_spam. php) from the original on 2012-09-15. . [6] Kozierok, Charles M. (2005). The TCP/IP guide: a comprehensive, illustrated Internet protocols reference. No Starch Press. p. 1401. [7] "Open Directory Usenet Clients" (http:/ / www. dmoz. org/ Computers/ Software/ Internet/ Clients/ Usenet/ ). Dmoz.org. October 9, 2008. Archived (http:/ / archive. is/ 20120730/ http:/ / www. dmoz. org/ Computers/ Software/ Internet/ Clients/ Usenet/ ) from the original on 2012-07-30. . Retrieved December 14, 2010. [8] Jain, Dominik (July 30, 2006). "OE-QuoteFix Description" (http:/ / home. in. tum. de/ ~jain/ software/ oe-quotefix/ ). Archived (http:/ / archive. is/ 20120921/ http:/ / home. in. tum. de/ ~jain/ software/ oe-quotefix/ ) from the original on 2012-09-21. . Retrieved June 4, 2007. [9] "Improve-Usenet" (http:/ / improve-usenet. org). October 13, 2008. Archived (http:/ / archive. is/ 20120713/ http:/ / improve-usenet. org) from the original on 2012-07-13. . [10] "Improve-Usenet Comments" (http:/ / web. archive. org/ web/ 20080426174022/ http:/ / improve-usenet. org/ voices1. html). October 13, 2008. Archived from the original (http:/ / improve-usenet. org/ voices1. html) on April 26, 2008. . Retrieved June 29, 2009. [11] "Google Groups" (http:/ / groups. google. com/ ). Groups.google.com. Archived (http:/ / archive. is/ 20120525/ http:/ / groups. google. com/ ) from the original on 2012-05-25. . Retrieved December 14, 2010. [12] "News: links to Google Groups" (http:/ / mykzilla. blogspot. com/ 2008/ 11/ news-links-to-google-groups. html). Archived (http:/ / archive. is/ 20120712/ http:/ / mykzilla. blogspot. com/ 2008/ 11/ news-links-to-google-groups. html) from the original on 2012-07-12. . [13] "Who can force the moderators to obey the group charter?" (http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#Who_can_force_the_moderators_to_obey_the_group_charter. 3F). Big-8.org. Archived (http:/ / archive. is/ 20120804/ http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#Who_can_force_the_moderators_to_obey_the_group_charter. 3F) from the original on 2012-08-04. . Retrieved December 14, 2010. [14] "How does a group change moderators?" (http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#How_does_a_group_change_moderators. 3F). Big-8.org. Archived (http:/ / archive. is/ 20120719/ http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#How_does_a_group_change_moderators. 3F) from the original on 2012-07-19. . Retrieved December 14, 2010. [15] "Early Usenet Newsgroup Hierarchies" (http:/ / www. livinginternet. com/ u/ ui_early. htm). Livinginternet.com. October 25, 1990. Archived (http:/ / archive. is/ 20120921/ http:/ / www. livinginternet. com/ u/ ui_early. htm) from the original on 2012-09-21. . Retrieved December 14, 2010. [16] "How to Create a New Big-8 Newsgroup" (http:/ / www. big-8. org/ wiki/ How_to_Create_a_New_Big-8_Newsgroup). Big-8.org. July 7, 2010. Archived (http:/ / archive. is/ 20120722/ http:/ / www. big-8. org/ wiki/ How_to_Create_a_New_Big-8_Newsgroup) from the original on 2012-07-22. . Retrieved December 14, 2010. [17] Microsoft Responds to the Evolution of Communities (http:/ / www. microsoft. com/ communities/ newsgroups/ default. mspx), Announcement, undated. "Microsoft hitting 'unsubscribe' on newsgroups" (http:/ / news. cnet. com/ 8301-13860_3-20004109-56. html). Archived (http:/ / archive. is/ 20120712/ http:/ / news. cnet. com/ 8301-13860_3-20004109-56. html) from the original on 2012-07-12. ., CNET, May 4, 2010.
USENET
[18] "Usenet storage is more than 9 [[petabyte|petabytes (https:/ / www. binsearch. info/ groupinfo. php)] (9000 terabytes)"]. binsearch.info. Archived (http:/ / archive. is/ 20120921/ https:/ / www. binsearch. info/ groupinfo. php) from the original on 2012-09-21. . Retrieved June 5, 2012. [19] "Giganews FAQ - How long are articles available?" (http:/ / www. giganews. com/ faq. html#q0. 4). Giganews.com. Archived (http:/ / archive. is/ 20120904/ http:/ / www. giganews. com/ faq. html#q0. 4) from the original on 2012-09-04. . Retrieved October 23, 2012. [20] "9 petabyte of usenet storage on giganews.com" (http:/ / www. giganews. com/ blog/ 2011/ 05/ announcing-1000-days-retention-prize. html). giganews.com. Archived (http:/ / archive. is/ 20120921/ http:/ / www. giganews. com/ blog/ 2011/ 05/ announcing-1000-days-retention-prize. html) from the original on 2012-09-21. . Retrieved February 14, 2012. [21] "usenet backup (uBackup)" (http:/ / www. wikihow. com/ Backup-Your-Data-on-Usenet-(Ubackup)). Wikihow.com. Archived (http:/ / archive. is/ 20120918/ http:/ / www. wikihow. com/ Backup-Your-Data-on-Usenet-(Ubackup)) from the original on 2012-09-18. . Retrieved February 14, 2012. [22] "The [[Supernews_(Usenet_provider) SuperNews (http:/ / www. supernews. com/ docs/ dmca. html)] DMCA notifications page shows a typical example of Usenet provider DMCA takedown compliance."]. Archived (http:/ / archive. is/ 20120910/ http:/ / www. supernews. com/ docs/ dmca. html) from the original on 2012-09-10. . [23] "Cancel Messages FAQ" (http:/ / web. archive. org/ web/ 20071212175002/ http:/ / www. killfile. org/ faqs/ cancel. html). Archived from the original (http:/ / wiki. killfile. org/ projects/ usenet/ faqs/ cancel/ ) on December 12, 2007. . Retrieved June 29, 2009. "...Until authenticated cancels catch on, there are no options to avoid forged cancels and allow unforged ones..." [24] Microsoft knowledgebase article stating that many servers ignore cancel messages "Support.microsoft.com" (http:/ / support. microsoft. com/ kb/ q164420/ ). Archived (http:/ / archive. is/ 20120719/ http:/ / support. microsoft. com/ kb/ q164420/ ) from the original on 2012-07-19. . [25] "Microsoft Word - Surmacz.doc" (http:/ / www. measurement. sk/ 2005/ S1/ Surmacz. pdf) (PDF). . Retrieved December 14, 2010. [26] ...every part of a Usenet post may be forged apart from the left most portion of the "Path:" header... "By-users.co.uk" (http:/ / www. by-users. co. uk/ faqs/ email/ headers/ ). Archived (http:/ / archive. is/ 20120723/ http:/ / www. by-users. co. uk/ faqs/ email/ headers/ ) from the original on 2012-07-23. . [27] "[email protected] Better living through forgery (news:S)". [news:news.admin.misc news.admin.misc]. 1995-06-10. Retrieved June 08 2012. [28] "Giganews Privacy Policy" (http:/ / www. giganews. com/ legal/ privacy. html). Giganews.com. Archived (http:/ / archive. is/ 20120731/ http:/ / www. giganews. com/ legal/ privacy. html) from the original on 2012-07-31. . Retrieved December 14, 2010. [29] "Logging Policy" (http:/ / aioe. org/ index. php?logging-policy). Aioe.org. June 9, 2005. Archived (http:/ / archive. is/ 20120708/ http:/ / aioe. org/ index. php?logging-policy) from the original on 2012-07-08. . Retrieved December 14, 2010. [30] LaQuey, Tracy (1990). The User's directory of computer networks. Digital Press. p. 386. [31] Hauben, Michael and Hauben, Rhonda. Netizens: On the History and Impact of Usenet and the Internet, On the Early Days of Usenet: The Roots of the Cooperative Online Culture. First Monday vol. 3 num.August 8, 3 1998 [32] Haddadi, H. (2006). "Network Traffic Inference Using Sampled Statistics." University College London. [33] Horton, Mark (December 11, 1990). "Arachnet" (http:/ / communication. ucsd. edu/ bjones/ Usenet. Hist/ Nethist/ 0111. html). Archived (http:/ / archive. is/ 20120921/ http:/ / communication. ucsd. edu/ bjones/ Usenet. Hist/ Nethist/ 0111. html) from the original on 2012-09-21. . Retrieved June 4, 2007. [34] Huston, Geoff (1999). ISP survival guide: strategies for running a competitive ISP. Wiley. p. 439. [35] "Unix/Linux news servers" (http:/ / www. newsreaders. com/ unix/ servers. html). Newsreaders.com. Archived (http:/ / archive. is/ 20120905/ http:/ / www. newsreaders. com/ unix/ servers. html) from the original on 2012-09-05. . Retrieved December 14, 2010. [36] Tim Berners-Lee (August 6, 1991). "@cernvax.cern.ch WorldWideWeb: Summary (news:6487)". lt.hypertext alt.hypertext (news:a). Retrieved June 4, 2007. [37] Torvalds, Linus. "[email protected] What would you like to see most in minix? (news:1991A)". [news:comp.os.minix comp.os.minix]. Retrieved September 9, 2006. [38] Marc Andreessen (March 15, 1993). "[email protected] NCSA Mosaic for X 0.10 available. (news:MARCA. 93Ma)". [news:comp.infosystems.gopher, comp.infosystems.wais, comp.infosystems, alt.hypertext, comp.windows.x comp.infosystems.gopher, comp.infosystems.wais, comp.infosystems, alt.hypertext, comp.windows.x]. Retrieved June 4, 2007. [39] Kaltenbach, Susan (2000-12). "The Evolution of the Online Discourse Community" (http:/ / noonuniverse. com/ Linked_work/ online_discourse. pdf). . ""Verb Doubling: Doubling a verb may change its semantics, Soundalike Slang: Punning jargon, The -P convention: A LISPy way to form questions, Overgeneralization: Standard abuses of grammar, Spoken Inarticulations: Sighing and <*sigh*&rt;ing, Anthropomorphization: online components were named "Homunculi," daemons," etc., and there were also "confused" programs. Comparatives: Standard comparatives for design quality"" [40] Campbell, K.K. (October 1, 1994). "Chatting With Martha Siegel of the Internet's Infamous Canter & Siegel" (http:/ / web. archive. org/ web/ 20071125201904/ http:/ / w2. eff. org/ legal/ cases/ Canter_Siegel/ c-and-s_summary. article). Electronic Frontier Foundation. Archived from the original (http:/ / w2. eff. org/ legal/ cases/ Canter_Siegel/ c-and-s_summary. article) on November 25, 2007. . Retrieved September 24, 2010. [41] Sascha Segan (July 31, 2008). "R.I.P Usenet: 1980-2008" (http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp). PC Magazine: p.2. Archived (http:/ / archive. is/ 20120909/ http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp) from the original on 2012-09-09. . Retrieved May 8, 2011.
107
USENET
[42] " "Reports of Usenet's Death Are Greatly Exaggerated" (http:/ / techcrunch. com/ 2008/ 08/ 01/ the-reports-of-usenets-death-are-greatly-exaggerated/ ). Archived (http:/ / archive. is/ 20120716/ http:/ / techcrunch. com/ 2008/ 08/ 01/ the-reports-of-usenets-death-are-greatly-exaggerated/ ) from the original on 2012-07-16. .." TechCrunch. August 1, 2008. Retrieved on May 8, 2011. [43] Cara Bonnett (May 17, 2010). "A Piece of Internet History" (http:/ / news. duke. edu/ 2010/ 05/ usenet. html). Duke Today. Archived (http:/ / archive. is/ 20120711/ http:/ / news. duke. edu/ 2010/ 05/ usenet. html) from the original on 2012-07-11. . Retrieved May 24, 2010. [44] Andrew Orlowski (May 20, 2010). "Usenet's home shuts down today" (http:/ / www. theregister. co. uk/ 2010/ 05/ 20/ usenet_duke_server/ ). The Register. Archived (http:/ / archive. is/ 20120921/ http:/ / www. theregister. co. uk/ 2010/ 05/ 20/ usenet_duke_server/ ) from the original on 2012-09-21. . Retrieved May 24, 2010. [45] "Top 100 text newsgroups by postings" (http:/ / www. newsadmin. com/ top100tmsgs. asp). NewsAdmin. Archived (http:/ / archive. is/ 20120905/ http:/ / www. newsadmin. com/ top100tmsgs. asp) from the original on 2012-09-05. . Retrieved December 14, 2010. [46] "Top 100 binary newsgroups by postings" (http:/ / www. newsadmin. com/ top100bmsgs. asp). NewsAdmin. Archived (http:/ / archive. is/ 20120904/ http:/ / www. newsadmin. com/ top100bmsgs. asp) from the original on 2012-09-04. . Retrieved December 14, 2010. [47] Rosencrance, Lisa. " "3 top ISPs to block access to sources of child porn" (http:/ / www. computerworld. com/ action/ article. do?command=viewArticleBasic& articleId=9095778). Archived (http:/ / archive. is/ 20120722/ http:/ / www. computerworld. com/ action/ article. do?command=viewArticleBasic& articleId=9095778) from the original on 2012-07-22. .." Computer World. June 8, 2008. Retrieved on April 30, 2009. [48] DeJean, David. "Usenet: Not Dead Yet." PC World. Tuesday October 7, 2008. "2" (http:/ / www. pcworld. com/ businesscenter/ article/ 151989-2/ usenet_not_dead_yet. html). Archived (http:/ / archive. is/ 20120921/ http:/ / www. pcworld. com/ businesscenter/ article/ 151989-2/ usenet_not_dead_yet. html) from the original on 2012-09-21. .. Retrieved on April 30, 2009. [49] "ATT Announces Discontinuation of USENET Newsgroup Services" (http:/ / www. newsdemon. com/ blog/ 2009/ 06/ 09/ att-announces-discontinuation-of-usenet-newsgroup-services/ ). NewsDemon. June 9, 2009. Archived (http:/ / archive. is/ 20120921/ http:/ / www. newsdemon. com/ blog/ 2009/ 06/ 09/ att-announces-discontinuation-of-usenet-newsgroup-services/ ) from the original on 2012-09-21. . Retrieved June 18, 2009. [50] Hu, Jim. " "AOL shutting down newsgroups" (http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html). Archived (http:/ / archive. is/ 20120723/ http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html) from the original on 2012-07-23. .." CNet. January 25, 2005. Retrieved on May 1, 2009. [51] "AOL Pulls Plug on Newsgroup Service" (http:/ / www. betanews. com/ article/ AOL-Pulls-Plug-on-Newsgroup-Service/ 1106664611). Betanews.com. Archived (http:/ / archive. is/ 20120722/ http:/ / www. betanews. com/ article/ AOL-Pulls-Plug-on-Newsgroup-Service/ 1106664611) from the original on 2012-07-22. . Retrieved December 14, 2010. [52] Bode, Karl. " "Verizon To Discontinue Newsgroups September 30" (http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227). Archived (http:/ / archive. is/ 20120731/ http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227) from the original on 2012-07-31. .". DSLReports. August 31, 2009. Retrieved on October 24, 2009. [53] " "Verizon Newsgroup Service Has Been Discontinued" (http:/ / www22. verizon. com/ ResidentialHelp/ HighSpeed/ General Support/ Top Questions/ QuestionsOne/ 125159. htm). Archived (http:/ / archive. is/ 20120921/ http:/ / www22. verizon. com/ ResidentialHelp/ HighSpeed/ General+ Support/ Top+ Questions/ QuestionsOne/ 125159. htm) from the original on 2012-09-21. ." Verizon Central Support. Retrieved on October 24, 2009. [54] Ukerna.ac.uk (http:/ / www. ukerna. ac. uk/ services/ news/ index. html) [55] "Microsoft Responds to the Evolution of Communities" (http:/ / www. microsoft. com/ communities/ newsgroups/ default. mspx#EV). microsoft.com. Archived (http:/ / archive. is/ 20120904/ http:/ / www. microsoft. com/ communities/ newsgroups/ default. mspx#EV) from the original on 2012-09-04. . Retrieved September 1, 2011. [56] "AOL shutting down newsgroups" (http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html). cnet.com/. January 25, 2005. Archived (http:/ / archive. is/ 20120723/ http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html) from the original on 2012-07-23. . Retrieved September 1, 2011. [57] "Verizon To Discontinue Newsgroups" (http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227). dslreports.com. August 31, 2009. Archived (http:/ / archive. is/ 20120731/ http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227) from the original on 2012-07-31. . Retrieved September 1, 2011. [58] "The Comcast Newsgroups Service Discontinued" (http:/ / www. dslreports. com/ forum/ r21120658-The-Comcast-Newsgroups-Service-Discontinued). dslreports.com. dslreports.com. Archived (http:/ / archive. is/ 20120731/ http:/ / www. dslreports. com/ forum/ r21120658-The-Comcast-Newsgroups-Service-Discontinued) from the original on 2012-07-31. . Retrieved September 1, 2011. [59] "Cox to Drop Free Usenet Service June 30th" (http:/ / www. zeropaid. com/ news/ 88729/ cox-to-drop-free-usenet-service-june-30th/ ). Zeropaid.com. April 22, 2010. Archived (http:/ / archive. is/ 20120921/ http:/ / www. zeropaid. com/ news/ 88729/ cox-to-drop-free-usenet-service-june-30th/ ) from the original on 2012-09-21. . Retrieved September 3, 2011. [60] "Cox Discontinues Usenet, Starting In June" (http:/ / news. slashdot. org/ story/ 10/ 04/ 21/ 210224/ Cox-Discontinues-Usenet-Starting-In-June). Geeknet, Inc. April 21, 2010. Archived (http:/ / archive. is/ 20120921/ http:/ / news. slashdot. org/ story/ 10/ 04/ 21/ 210224/ Cox-Discontinues-Usenet-Starting-In-June) from the original on 2012-09-21. . Retrieved September 1, 2011.
108
USENET
[61] "Cox Communications and Atlantic Broadband Discontinue Usenet Access" (http:/ / www. thundernews. com/ blog/ tag/ isp/ ). thundernews.com. April 27, 2010. Archived (http:/ / archive. is/ 20120912/ http:/ / www. thundernews. com/ blog/ tag/ isp/ ) from the original on 2012-09-12. . Retrieved September 1, 2011. [62] "How to obtain back news items". December 21, 1982. bnews.spanky.138. [63] "Distributed archiving of netnews" (http:/ / groups. google. com/ group/ net. news/ msg/ e8145eace8aa0529?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120708/ http:/ / groups. google. com/ group/ net. news/ msg/ e8145eace8aa0529?dmode=source& output=gplain) from the original on 2012-07-08. . Retrieved December 14, 2010. [64] "Archive of netnews" (http:/ / groups. google. com/ group/ net. news/ msg/ a9ad42b15688b910?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120724/ http:/ / groups. google. com/ group/ net. news/ msg/ a9ad42b15688b910?dmode=source& output=gplain) from the original on 2012-07-24. . Retrieved December 14, 2010. [65] "Re: Archive of netnews" (http:/ / groups. google. com/ group/ net. news/ msg/ 87c9160730b36989?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120715/ http:/ / groups. google. com/ group/ net. news/ msg/ 87c9160730b36989?dmode=source& output=gplain) from the original on 2012-07-15. . Retrieved December 14, 2010. [66] "Automatic access to archives" (http:/ / groups. google. com/ group/ net. general/ msg/ a377e12ab1a829ff?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120712/ http:/ / groups. google. com/ group/ net. general/ msg/ a377e12ab1a829ff?dmode=source& output=gplain) from the original on 2012-07-12. . Retrieved December 14, 2010. [67] "keepnews -- A Usenet news archival system" (http:/ / groups. google. com/ group/ net. sources/ msg/ 737d29fd3af2d5ae?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120717/ http:/ / groups. google. com/ group/ net. sources/ msg/ 737d29fd3af2d5ae?dmode=source& output=gplain) from the original on 2012-07-17. . Retrieved December 14, 2010. [68] "YA News Archiver" (http:/ / groups. google. com/ group/ net. sources/ msg/ d5c0cec804f745dd?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120709/ http:/ / groups. google. com/ group/ net. sources/ msg/ d5c0cec804f745dd?dmode=source& output=gplain) from the original on 2012-07-09. . Retrieved December 14, 2010. [69] "RFC usenet article archive program with keyword lookup" (http:/ / groups. google. com/ group/ net. news/ msg/ f26190057834ed87?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120715/ http:/ / groups. google. com/ group/ net. news/ msg/ f26190057834ed87?dmode=source& output=gplain) from the original on 2012-07-15. . Retrieved December 14, 2010. [70] "Looking for fulltext indexing software for archived news" (http:/ / groups. google. com/ group/ news. software. nn/ msg/ 16381a7e3fd611d4?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120921/ http:/ / groups. google. com/ group/ news. software. nn/ msg/ 16381a7e3fd611d4?dmode=source& output=gplain) from the original on 2012-09-21. . Retrieved December 14, 2010. [71] "Summary: search for fulltext indexing software for archived news" (http:/ / groups. google. com/ group/ news. software. nn/ msg/ f503efa9034f1c1d?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120708/ http:/ / groups. google. com/ group/ news. software. nn/ msg/ f503efa9034f1c1d?dmode=source& output=gplain) from the original on 2012-07-08. . Retrieved December 14, 2010. [72] Segan, Sascha (January 1, 1970). "R.I.P Usenet: 1980-2008 - Usenet's Decline - Columns by PC Magazine" (http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp). Pcmag.com. Archived (http:/ / archive. is/ 20120909/ http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp) from the original on 2012-09-09. . Retrieved December 14, 2010. [73] Strawbridge, Matthew (2006). Netiquette: Internet Etiquette in the Age of the Blog. Software Reference. p. 53. [74] Cullen, Drew (February 12, 2001). "Google saves Deja.com Usenet service" (http:/ / www. theregister. co. uk/ 2001/ 02/ 12/ google_saves_deja_com_usenet/ ). Archived (http:/ / archive. is/ 20120921/ http:/ / www. theregister. co. uk/ 2001/ 02/ 12/ google_saves_deja_com_usenet/ ) from the original on 2012-09-21. .. The Register. [75] Wiseman, David. "Magi's NetNews Archive Involvement" (http:/ / www. csd. uwo. ca/ ~magi/ personal/ usenet. html), csd.uwo.ca [76] Mieszkowski, Katharine. " "The Geeks Who Saved Usenet" (http:/ / archive. salon. com/ tech/ feature/ 2002/ 01/ 07/ saving_usenet/ index. html). Archived (http:/ / archive. is/ 20120710/ http:/ / archive. salon. com/ tech/ feature/ 2002/ 01/ 07/ saving_usenet/ index. html) from the original on 2012-07-10. .", archive.salon.com (January 7, 2002). [77] Feldman, Ian. ""Usenet on a CD-ROM, no longer a fable"" (http:/ / db. tidbits. com/ article/ 3229). Archived (http:/ / archive. is/ 20120707/ http:/ / db. tidbits. com/ article/ 3229) from the original on 2012-07-07. ., "TidBITS" (February 10, 1992) [78] " "Google Groups Archive Information" (http:/ / groups. google. com/ group/ news. admin. misc/ msg/ 6dec509043e7b3c7?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120709/ http:/ / groups. google. com/ group/ news. admin. misc/ msg/ 6dec509043e7b3c7?dmode=source& output=gplain) from the original on 2012-07-09. ." (December 21, 2001)
109
USENET
110
Further reading
Bruce Jones, archiver (1997). USENET History mailing list archive (http://communication.ucsd.edu/bjones/ Usenet.Hist/Nethist/index.html) covering 19901997. communication.ucsd.edu Michael Hauben, Ronda Hauben, and Thomas Truscott (April 27, 1997). Netizens: On the History and Impact of Usenet and the Internet (Perspectives). Wiley-IEEE Computer Society P. ISBN0-8186-7706-6. Bryan Pfaffenberger (December 31, 1994). The USENET Book: Finding, Using, and Surviving Newsgroups on the Internet. Addison Wesley. ISBN0-201-40978-X. Kate Gregory, Jim Mann, Tim Parker, and Noel Estabrook (June 1995). Using Usenet Newsgroups. Que. ISBN0-7897-0134-0. Mark Harrison (July 1995). The USENET Handbook (Nutshell Handbook). O'Reilly. ISBN1-56592-101-1. Henry Spencer, David Lawrence (January 1998). Managing Usenet. O'Reilly. ISBN1-56592-198-4. Don Rittner (June 1997). Rittner's Field Guide to Usenet. MNS Publishing. ISBN0-937666-50-5. Konstan, J., Miller, B., Maltz, D., Herlocker, J., Gordon, L., and Riedl, J. (March 1997). "GroupLens: applying collaborative filtering to Usenet news" (http://portal.acm.org/citation.cfm?doid=245108.245126). Communications of the ACM 40 (3): 7787. doi:10.1145/245108.245126. Retrieved June 29, 2009. Miller, B., Riedl, J., and Konstan, J. (January 1997). "Experiences with GroupLens: Making Usenet useful again" (http://www.grouplens.org/papers/pdf/usenix97.pdf). Proceedings of the 1997 Usenix Winter Technical Conference. "20 Year Usenet Timeline" (http://www.google.com/googlegroups/archive_announce_20.html). Google. Retrieved June 27, 2006. "Web 2.0, Meet Usenet 1.0" (http://www.linux-mag.com/id/2675/). Linux Magazine. Retrieved February 13, 2007. Schwartz, Randal (June 15, 2006). "Web 2.0, Meet Usenet 1.0" (http://www.linux-mag.com/id/2675/). Retrieved June 4, 2007. Kleiner, Dmytri; Wyrick, Brian (January 29, 2007). "InfoEnclosure 2.0" (http://www.metamute.org/ InfoEnclosure-2.0). Retrieved June 4, 2007.
External links
Usenet information, software, and service providers (http://www.dmoz.org/Computers/Usenet/) at the Open Directory Project Usenet servers (http://www.dmoz.org/Computers/Software/Internet/Servers/Usenet/) at the Open Directory Project Public News Servers (http://www.dmoz.org/Computers/Usenet/Public_News_Servers/) at the Open Directory Project IETF working group USEFOR (http://tools.ietf.org/wg/usefor/) (USEnet article FORmat), tools.ietf.org son-of-1036 (http://purl.net/xyzzy/home/test/son-of-1.036) (287 KB, historical RFC 1036 bis draft), purl.net A-News Archive (http://quux.org:70/Archives/usenet-a-news/): Early Usenet news articles: 1981 to 1982., quux.org UTZoo Archive (http://www.skrenta.com/rt/utzoo-usenet/): 2,000,000 articles from early 1980s to July 1991 "Netscan" (http://web.archive.org/web/*/http://netscan.research.microsoft.com). Archived from the original (http://research.microsoft.com/en-us/groups/scg/) on June 29, 2009. Social Accounting Reporting Tool Living Internet (http://www.livinginternet.com/u/u.htm) A comprehensive history of the Internet, including Usenet. livinginternet.com Usenet Glossary (http://www.harley.com/usenet/usenet-tutorial/glossary.html) A comprehensive list of Usenet terminology
USENET "Big 8 Management Board" (http://web.archive.org/web/20080130015435/http://www.big-8.org/). Archived from the original (http://big-8.org/) on January 30, 2008. Group creation and maintenance in the Big 8 hierarchies. Michael Hauben (Fall 1992). "The Evolution Of Usenet News: The Poor Man's Arpanet" (http://www. virtualschool.edu/mon/Internet/HaubenEvolutionNetnews.html). Retrieved May 24, 2010. "Giganews Deconstructs Cuomo's Child Porn 'Crackdown'" (http://www.dslreports.com/shownews/ Giganews-Deconstructs-Cuomos-Child-Porn-Crackdown-98446). Retrieved September 1, 2011. "Latest Child Porn Fight Mostly Empty Rhetoric" (http://www.dslreports.com/shownews/96203). Retrieved September 1, 2011. "N.Y. AG says AOL will curb access to Usenet. It already did" (http://news.cnet.com/ 8301-13578_3-9988278-38.html?hhTest=1=rss&subj=news&tag=2547-1_3-0-20). Retrieved September 1, 2011. "Analysis of Cuomo Crusade shows little results." (http://www.giganews.com/blog/2008/09/ clearing-air-usenet-abuse-eliminating.html). Retrieved September 1, 2011.
111
X.25
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication. An X.25 WAN consists of packet-switching exchange (PSE) nodes as the networking hardware, and leased lines, plain old telephone service connections or ISDN connections as physical links. X.25 is a family of protocols that was popular during the 1980s with telecommunications companies and in financial transaction systems such as automated teller machines. X.25 was originally defined by the International Telegraph and Telephone Consultative Committee (CCITT, now ITU-T) in a series of drafts[1] and finalized in a publication known as The Orange Book in 1976.[2]
While X.25 has been, to a large extent, replaced by less complex protocols, especially the Internet protocol (IP), the service is still used and available in niche and legacy applications.
History
X.25 is one of the oldest packet-switched services available. It was developed before the OSI Reference Model.[3] The protocol suite is designed as three conceptual layers, which correspond closely to the lower three layers of the seven-layer OSI model.[4] It also supports functionality not found in the OSI network layer.[5][6] X.25 was developed in the ITU-T (formerly CCITT) Study Group VII based upon a number of emerging data network projects.[7] Various updates and additions were worked into the standard, eventually recorded in the ITU series of technical books describing the telecommunication systems. These books were published every fourth year with different-colored covers. The X.25 specification is only part of the larger set of X-Series[8] specifications on public data networks.[9]
X.25 The public data network was the common name given to the international collection of X.25 providers. Their combined network had large global coverage during the 1980s and into the 1990s.[10] Publicly-accessible X.25 networks (Compuserve, Tymnet, Euronet, PSS, Datapac, Datanet 1 and Telenet) were set up in most countries during the 1970s and 80s, to lower the cost of accessing various online services. Beginning in the early 1990s in North America, use of X.25 networks (predominated by Telenet and Tymnet)[10] began being replaced with Frame Relay service offered by national telephone companies.[11] Most systems that required X.25 now utilize TCP/IP, however it is possible to transport X.25 over IP when necessary [12] X.25 networks are still in use throughout the world. A variant called AX.25 is also used widely by amateur packet radio. Racal Paknet, now known as Widanet, is still in operation in many regions of the world, running on an X.25 protocol base. In some countries, like the Netherlands or Germany, it is possible to use a stripped version of X.25 via the D-channel of an ISDN-2 (or ISDN BRI) connection for low volume applications such as point-of-sale terminals; but, the future of this service in the Netherlands is uncertain. Additionally X.25 is still under heavy use in the aeronautical business (especially in the Asian region) even though a transition to modern protocols like X.400 is without option as X.25 hardware becomes increasingly rare and costly. As recently as March 2006, the National Airspace Data Interchange Network has used X.25 to interconnect remote airfields with Air Route Traffic Control Centers. France is one of the only countries that still has a commercial end-user service known as Minitel which is based on Videotex which in turn runs on X.25. In 2002 Minitel had about 9 million users, and in 2011 it still accounts for about 2 million users in France though France Tlcom has announced it will completely shut down the service by 30 June 2012.[13]
112
Architecture
The general concept of X.25 was to create a universal and global packet-switched network. Much of the X.25 system is a description of the rigorous error correction needed to achieve this, as well as more efficient sharing of capital-intensive physical resources. The X.25 specification defines only the interface between a subscriber (DTE) and an X.25 network (DCE). X.75, a very similar protocol to X.25, defines the interface between two X.25 networks to allow connections to traverse two or more networks. X.25 does not specify how the network operates internallymany X.25 network implementations used something very similar to X.25 or X.75 internally, but others used quite different protocols internally. The ISO equivalent protocol to X.25, ISO 8208, is compatible with X.25, but additionally includes provision for two X.25 DTEs to be directly connected to each other with no network in between. By separating the Packet-Layer Protocol, ISO 8208 permits operation over additional networks such as ISO 8802 LLC2 (ISO LAN) and the OSI data link layer.[14] X.25 originally defined three basic protocol levels or architectural layers. In the original specifications these were referred to as levels and also had a level number, whereas all ITU-T X.25 recommendations and ISO 8208 standards released after 1984 refer to them as layers.[15] The layer numbers were dropped to avoid confusion with the OSI Model layers.[1] Physical layer: This layer specifies the physical, electrical, functional and procedural characteristics to control the physical link between a DTE and a DCE. Common implementations use X.21, EIA-232, EIA-449 or other serial protocols. Data link layer: The data link layer consists of the link access procedure for data interchange on the link between a DTE and a DCE. In its implementation, the Link Access Procedure, Balanced (LAPB) is a data link protocol that manages a communication session and controls the packet framing. It is a bit-oriented protocol that provides error correction and orderly delivery.
X.25 Packet layer: This layer defined a packet-layer protocol for exchanging control and user data packets to form a packet-switching network based on virtual calls, according to the Packet Layer Protocol. The X.25 model was based on the traditional telephony concept of establishing reliable circuits through a shared network, but using software to create "virtual calls" through the network. These calls interconnect "data terminal equipment" (DTE) providing endpoints to users, which looked like point-to-point connections. Each endpoint can establish many separate virtual calls to different endpoints. For a brief period, the specification also included a connectionless datagram service, but this was dropped in the next revision. The "fast select with restricted response facility" is intermediate between full call establishment and connectionless communication. It is widely used in query-response transaction applications involving a single request and response limited to 128 bytes of data carried each way. The data is carried in an extended call request packet and the response is carried in an extended field of the call reject packet, with a connection never being fully established. Closely related to the X.25 protocol are the protocols to connect asynchronous devices (such as dumb terminals and printers) to an X.25 network: X.3, X.28 and X.29. This functionality was performed using a Packet Assembler/Disassembler or PAD (also known as a Triple-X device, referring to the three protocols used).
113
Having connected to the PAD, the dumb-terminal user tells the PAD which host to connect to, by giving a phone-number-like address in the X.121 address format (or by giving a host name, if the service provider allows for names that map to X.121 addresses). The PAD then places an X.25 call to the host, establishing a virtual call. Note that X.25 provides for virtual calls, so appears to be a circuit switched network, even though in fact the data itself is packet switched internally, similar to the way TCP provides connections even though the underlying data is packet switched. Two X.25 hosts could, of course, call one another directly; no PAD is involved in this case. In theory, it doesn't matter whether the X.25 caller and X.25 destination are both connected to the same carrier, but in practice it was not always possible to make calls from one carrier to another.
X.25 For the purpose of flow-control, a sliding window protocol is used with the default window size of 2. The acknowledgements may have either local or end to end significance. A D bit (Data Delivery bit) in each data packet indicates if the sender requires end to end acknowledgement. When D=1, it means that the acknowledgement has end to end significance and must take place only after the remote DTE has acknowledged receipt of the data. When D=0, the network is permitted (but not required) to acknowledge before the remote DTE has acknowledged or even received the data. While the PAD function defined by X.28 and X.29 specifically supported asynchronous character terminals, PAD equivalents were developed to support a wide range of proprietary intelligent communications devices, such as those for IBM System Network Architecture (SNA).
114
Error control
Error recovery procedures at the packet layer assume that the data link layer is responsible for retransmitting data received in error. Packet layer error handling focuses on resynchronizing the information flow in calls, as well as clearing calls that have gone into unrecoverable states: Level 3 Reset packets, which re-initializes the flow on a virtual call (but does not break the virtual call) Restart packet, which clears down all virtual calls on the data link and resets all permanent virtual circuits on the data link
VC may be established using X.121 addresses. The X.121 address consists of a three-digit data country code (DCC) plus a network digit, together forming the four-digit data network identification code (DNIC), followed by the national terminal number (NTN) of at most ten digits. Note the use of a single network digit, seemingly allowing for only 10 network carriers per country, but some countries are assigned more than one DCC to avoid this limitation. Networks often used fewer than the full NTN digits for routing, and made the spare digits available to the subscriber (sometimes called the sub-address) where they could be used to identify applications or for further routing on the subscribers networks. NSAP addressing facility was added in the X.25(1984) revision of the specification, and this enabled X.25 to better meet the requirements of OSI Connection Oriented Network Service (CONS).[19] Public X.25 networks were not required to make use of NSAP addressing, but, to support OSI CONS, were required to carry the NSAP addresses and other ITU-T specified DTE facilities transparently from DTE to DTE.[20] Later revisions allowed multiple addresses in addition to X.121 addresses to be carried on the same DTE-DCE interface: Telex addressing (F.69), PSTN addressing (E.163), ISDN addressing (E.164), Internet Protocol addresses (IANA ICP), and local IEEE 802.2 MAC addresses.[21] PVCs are permanently established in the network and therefore do not require the use of addresses for call setup. PVCs are identified at the subscriber interface by their logical channel identifier (see below). However, in practice not many of the national X.25 networks supported PVCs.
X.25 One DTE-DCE interface to an X.25 network has a maximum of 4095 logical channels on which it is allowed to establish virtual calls and permanent virtual circuits,[22] although networks are not expected to support a full 4095 virtual circuits.[23] For identifying the channel to which a packet is associated, each packet contains a 12 bit logical channel identifier made up of an 8-bit logical channel number and a 4-bit logical channel group number.[22] Logical channel identifiers remain assigned to a virtual circuit for the duration of the connection.[22] Logical channel identifiers identify a specific logical channel between the DTE (subscriber appliance) and the DCE (network), and only has local significance on the link between the subscriber and the network. The other end of the connection at the remote DTE is likely to have assigned a different logical channel identifier. The range of possible logical channels is split into 4 groups: channels assigned to permanent virtual circuits, assigned to incoming virtual calls, two-way (incoming or outgoing) virtual calls, and outgoing virtual calls.[24] (Directions refer to the direction of virtual call initiation as viewed by the DTEthey all carry data in both directions.)[25] The ranges allowed a subscriber to be configured to handle significantly differing numbers of calls in each direction while reserving some channels for calls in one direction. All International networks are required to implement support for permanent virtual circuits, two-way logical channels and one-way logical channels outgoing; one-way logical channels incoming is an additional optional facility.[26] DTE-DCE interfaces are not required to support more than one logical channel.[24] Logical channel identifier zero will not be assigned to a permanent virtual circuit or virtual call.[27] The logical channel identifier of zero is used for packets which don't relate to a specific virtual circuit (e.g. packet layer restart, registration, and diagnostic packets).
115
Billing
In public networks, X.25 was typically billed as a flat monthly service fee depending on link speed, and then a price-per-segment on top of this.[28] Link speeds varied, typically from 2400 bit/s up to 2 Mbit/s, although speeds above 64 kbit/s were uncommon in the public networks. A segment was 64 bytes of data (rounded up, with no carry-over between packets),[29] charged to the caller[30] (or callee in the case of reverse charged calls, where supported).[31] Calls invoking the Fast Select facility (allowing 128 bytes of data in call request, call confirmation and call clearing phases)[32] would generally attract an extra charge, as might use of some of the other X.25 facilities. PVCs would have a monthly rental charge and a lower price-per-segment than VCs, making them cheaper only where large volumes of data are passed.
Call setup and Clearing Incoming Call Call Connected Clear Indication Clear Confirmation Data and Interrupt Data Interrupt Interrupt Confirmation Flow Control and Reset RR RNR REJ Reset Indication Reset Confirmation
X.25
116
Restart Restart Indication Restart Confirmation Diagnostic Registration Diagnostic Registration Confirmation Registration Request Restart Request Restart Confirmation X X X X
X.25 details
The network may allow the selection of the maximal length in range 16 to 4096 octets (2n values only) per virtual circuit by negotiation as part of the call setup procedure. The maximal length may be different at the two ends of the virtual circuit. Data terminal equipment constructs control packets which are encapsulated into data packets. The packets are sent to the data circuit-terminating equipment, using LAPB Protocol. Data circuit-terminating equipment strips the layer-2 headers in order to encapsulate packets to the internal network protocol.
X.25 facilities
X.25 provides a set of user facilities defined and described in ITU-T Recommendation X.2.[33] The X.2 user facilities fall into five categories: essential facilities; additional facilities; conditional facilities; mandatory facilities; and, optional facilities.
X.25 also provides X.25 and ITU-T specified DTE optional user facilities defined and described in ITU-T Recommendation X.7.[34] The X.7 optional user facilities fall into four categories of user facilities that require: subscription only; subscription followed by dynamic invocation; subscription or dynamic invocation; and, dynamic invocation only.
The X.25 Recommendation allows many options for each network to choose when deciding which features to support and how certain operations are performed. This means each network needs to publish its own document giving the specification of its X.25 implementation, and most networks required DTE appliance manufacturers to
X.25 undertake protocol conformance testing, which included testing for strict adherence and enforcement of their network specific options. (Network operators were particularly concerned about the possibility of a badly behaving or misconfigured DTE appliance taking out parts of the network and affecting other subscribers.) Therefore, subscriber's DTE appliances have to be configured to match the specification of the particular network to which they are connecting. Most of these were sufficiently different to prevent interworking if the subscriber didn't configure their appliance correctly or the appliance manufacturer didn't include specific support for that network. In spite of protocol conformance testing, this often lead to interworking problems when initially attaching an appliance to a network. In addition to the CCITT/ITU-T versions of the protocol, four editions of ISO/IEC 8208 exist:[37] ISO/IEC 8208 : 1987, First Edition, compatible with X.25 (1980) and (1984) ISO/IEC 8208 : 1990, Second Edition, compatible with 1st Ed. and X.25 (1988). ISO/IEC 8208 : 1995, Third Edition, compatible with 2nd Ed. and X.25 (1993). ISO/IEC 8208 : 2000, Fourth Edition, compatible with 3rd Ed. and X.25 (1996).
117
References
[1] CCITT, Study Group VII, Draft Recommendation X-25, March 1976 [2] History of X.25, CCITT Plenary Assemblies and Book Colors (http:/ / www. itu. int/ ITU-T/ studygroups/ com17/ history. html) [3] (Friend et al. 1988, p.242) [4] (Friend et al. 1988, p.243) [5] ITU-T Recommendation X.28 (http:/ / www. itu. int/ rec/ T-REC-X. 28/ en/ ). [6] ITU-T Recommendation X.3 (http:/ / www. itu. int/ rec/ T-REC-X. 3/ en/ ). [7] "X.25 Virtual Circuits Transpac in France Pre-Internet Data Networking" (http:/ / remi. despres. free. fr/ Publications/ X25-TPC. html). . [8] X-Series recommendations (http:/ / www. itu. int/ rec/ T-REC-X/ en/ ) [9] (Friend et al. 1988, p.230) [10] (Schatt 1991, p.200). [11] (Schatt 1991, p.207). [12] Running X.25 over tcpip using Cisco routers (http:/ / www. techrepublic. com/ article/ running-x25-over-tcpip-on-cisco-routers/ 1056023), 1 Februari 2001, visited 4 April 2011 [13] (French) Presse, Agence France (21 July 2011). "Le Minitel disparatra en juin 2012 [Minitel will disappear in June 2012]" (http:/ / www. lefigaro. fr/ flash-actu/ 2011/ 07/ 21/ 97001-20110721FILWWW00446-le-minitel-disparaitra-en-juin-2012. php) (in French). Le Figaro. . [14] ISO 8208:2000 [15] ISO 8208, Annex B. [16] ITU-T Recommendation X.25 (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), G.3.2 Called address extension facility, pp. 141142. [17] ITU-T Recommendation X.223 (http:/ / www. itu. int/ rec/ T-REC-X. 223/ en/ ), Appendix II. [18] ITU-T Recommendation X.7 (04/2004) (http:/ / www. itu. int/ rec/ T-REC-X. 7-200404-I/ en/ ), pp. 1718. [19] ITU-T Recommendation X.223 (http:/ / www. itu. int/ rec/ T-REC-X. 223/ en/ ). [20] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), Annex G, p. 140. [21] ITU-T Recommendation X.213 (http:/ / www. itu. int/ rec/ T-REC-X. 213-200110-I/ en/ ), Annex A. [22] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), p. 45. [23] ITU-T Recommendation X.283 (12/97) (http:/ / www. itu. int/ rec/ T-REC-X. 283-199712-I/ en/ ), p. 42. [24] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), Annex A, pp. 119120. [25] ISO/IEC 8208 : 2000, Fourth Edition, p. 61. [26] ITU-T Recommendation X.2 (03/2000) (http:/ / www. itu. int/ rec/ T-REC-X. 2-200003-I/ en/ ), p. 4. [27] ISO/IEC 8208 : 2000, Fourth Edition, 3.7.1, p. 7. [28] ITU-T Recommendation D.11 (03/91) (http:/ / www. itu. int/ rec/ T-REC-D. 11-199103-I/ en/ ), p. 2. [29] ITU-T Recommendation D.12 (11/88) (http:/ / www. itu. int/ rec/ T-REC-D. 12-198811-I/ en/ ), p. 1. [30] ITU-T Recommendation X.7 (04/2004) (http:/ / www. itu. int/ rec/ T-REC-X. 7-200404-I/ en/ ), p. 42. [31] ITU-T Recommendation D.11 (03/91) (http:/ / www. itu. int/ rec/ T-REC-D. 11-199103-I/ en/ ), p. 3. [32] ITU-T Recommendation X.7 (04/2004) (http:/ / www. itu. int/ rec/ T-REC-X. 7-200404-I/ en/ ), p. 38. [33] ITU-T Recommendation X.2 (http:/ / www. itu. int/ rec/ T-REC-X. 2/ en/ ) [34] ITU-T Recommendation X.7 (http:/ / www. itu. int/ rec/ T-REC-X. 7/ en/ ) [35] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), Summary, p. v. [36] ISO/IEC 8208 : 2000, Fourth Edition, Section 1: Scope, p. 1.
X.25
[37] [38] [39] [40] ISO/IEC 8208 : 2000, Fourth Edition, Annex C. ITU-T Recommendation X.25 (http:/ / www. itu. int/ rec/ T-REC-X. 25/ en/ ). ITU-T Recommendation X.25 (1993) White Book (http:/ / www. itu. int/ rec/ T-REC-X. 25-199303-S/ en/ ) ITU-T Recommendation X.25 (1996) Grey Book (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ )
118
Further reading
Computer Communications, lecture notes by Prof. Chaim Ziegler PhD, Brooklyn College Motorola Codex (1992). The Basics Book of X.25 Packet Switching. The Basics Book Series (2nd ed.). Reading, MA: Addison-Wesley. ISBN0-201-56369-X. Deasington, Richard (1985). X.25 Explained. Computer Communications and Networking (2nd ed.). Chichester UK: Ellis Horwood. ISBN978-0-85312-626-3. Friend, George E.; Fike, John L.; Baker, H. Charles; Bellamy, John C. (1988). Understanding Data Communications (2nd ed.). Indianapolis: Howard W. Sams & Company. ISBN0-672-27270-9. Pooch, Udo W.; William H. Greene, Gary G. Moss (1983). Telecommunications and Networking. Boston: Little, Brown and Company. ISBN0-316-71498-4. Schatt, Stan (1991). Linking LANs: A Micro Manager's Guide. McGraw-Hill. ISBN0-8306-3755-9. Thorpe, Nicolas M.; Ross, Derek (1992). X.25 Made Easy. Prentice Hall. ISBN0-13-972183-5.
External links
Recommendation X.25 (10/96) (http://www.itu.int/rec/T-REC-X.25/en) at ITU-T Cisco X.25 Reference (http://www.cisco.com/en/US/docs/internetworking/technology/handbook/X25. html) An X.25 Networking Guide with comparisons to TCP/IP (http://www.farsite.com/X.25/X.25_info/X.25. htm) X.25 Directory & Informational Resource (http://softtechinfo.com/network/x25.html) RFCs and other resources by Open Directory (http://search.dmoz.org/cgi-bin/search?search=X.25)
119
Today's Internet
"Internet" or "internet"?
Publishers have different conventions regarding the capitalization of "Internet" or "internet", when referring to the Internet/internet, as distinct from generic internets, or internetworks. Since the widespread deployment of the Internet Protocol Suite in the early 1980s, the Internet standards-setting bodies and technical infrastructure organizations, such as the Internet Engineering Task Force (IETF), the Internet Society, the Internet Corporation for Assigned Names and Numbers (ICANN), the World Wide Web Consortium, and others, have consistently spelled the name of the world-wide network, the Internet, with an initial capital letter and treated it as a proper noun in the English language. Before the transformation of the ARPANET into the modern Internet, the term internet in its lower case spelling was a common short form of the term internetwork, and this spelling and use may still be found in discussions of networking. Many publications today disregard the historical development and use the term in its common noun spelling, arguing that it has become a generic medium of communication.
"Internet" or "internet"?
120
Usage examples
Examples of media publications and news outlets that capitalize the term include The New York Times, the Associated Press, Time, and The Times of India. In addition, many peer-reviewed journals and professional publications such as Communications of the ACM capitalize "Internet," and this style guideline is also specified by the American Psychological Association in its electronic media spelling guide. The Modern Language Association's MLA Handbook does not specifically mention capitalization of Internet, but its consistent practice is to capitalize it.[8] More recently, a significant number of publications have switched to not capitalizing the noun internet. Among them are The Economist, the Financial Times, The Times, the Guardian, the Observer[9] and the Sydney Morning Herald. As of 2011, most publications using "internet" appear to be located outside of North America, but the gap is closing. Wired News, an American news source, adopted the lower-case spelling in 2004.[10] Around April 2010, CNN shifted its house style to adopt the lowercase spelling. As Internet connectivity has expanded, it has started to be seen as a service similar to television, radio, and telephone, and the word has come to be used in this way (e.g. "I have the internet at home" and "I found it on the internet").
References
[1] RFC 871 (1982) "The 'network' composed of the concatenation of such subnets is sometimes called 'a catenet,' though more oftenand less picturesquelymerely 'an internet.'" [2] RFC 872 (1982) "[TCP's] next most significant property is that it is designed to operate in a 'catenet' (also known as the, or an, 'internet')" [3] The form first occurring in the RFC series is "internetworking protocol," RFC 604: "Four of the reserved link numbers are hereby assigned for experimental use in the testing of an internetworking protocol." The first use of "internet" is in RFC 675, in the form "internet packet". [4] Schwartz, John (29 December 2002). "Who Owns the Internet? You and i Do" (http:/ / www. nytimes. com/ 2002/ 12/ 29/ weekinreview/ 29SCHW. html). The New York Times. . Retrieved 2009-04-19. "Allan M. Siegal, a co-author of The New York Times Manual of Style and Usage and an assistant managing editor at the newspaper, said that 'there is some virtue in the theory' that Internet is becoming a generic term, 'and it would not be surprising to see the lowercase usage eclipse the uppercase within a few years.'" [5] Wilbers, Stephen (13 September 1999). "Errors put a wall between you and your readers". Orange County Register (Santa Ana, California): p.c.20. "If you like being ahead of the game, you might prefer to spell Internet and Web as internet and web, but according to standard usage they should be capitalized. Keep in mind, however, that commonly used proper nouns sometimes lose their capital letters over time and that Internet and Web may someday go the way of the french fry." [6] E.g. "MIT Libraries House Style" (http:/ / libstaff. mit. edu/ publications/ housestyle. html). MIT Libraries Staff Web. Last updated 14 August 2008. . Retrieved 2009-04-19. [7] Donovan, Melissa (16 November 2007). "Capitalization" (http:/ / www. writingforward. com/ grammar/ capitalization). Writing Forward. . Retrieved 2009-04-19. [8] MLA Handbook for Writers of Research Papers (Seventh Edition ed.). New York: Modern Language Association of America. 2009. ISBN9781603290241. [9] "Guardian and Observer style guide" (http:/ / www. guardian. co. uk/ styleguide/ i#id-3026449). Guardian News and Media Limited. . Retrieved 2008-04-19. "internet, net, web, world wide web. See websites." [10] Long, Tony (16 August 2004). "It's Just the 'internet' Now" (http:/ / www. wired. com/ culture/ lifestyle/ news/ 2004/ 08/ 64596). Wired. . Retrieved 2009-04-19. "... what the internet is: another medium for delivering and receiving information."
"Internet" or "internet"?
121
External links
Internet, Web, and Other Post-Watergate Concerns (http://www.chicagomanualofstyle.org/CMS_FAQ/ InternetWebandOtherPost-WatergateConcerns/InternetWebandOtherPost-WatergateConcerns16.html), The Chicago Manual of Style
The TCP/IP model and related protocols are maintained by the Internet Engineering Task Force (IETF).
History
Early research
The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the early 1970s. After initiating the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and Diagram of the first internetworked connection recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET. By the summer of 1973, Kahn and Cerf had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and, instead of the network being responsible for reliability, as in the ARPANET, the
122
hosts became responsible. Cerf credits Hubert Zimmerman and Louis Pouzin, designer of the CYCLADES network, with important influences on this design. The network's design included the recognition it should provide only the functions of efficiently transmitting and routing traffic between end nodes and that all other intelligence should be located at the edge of the network, in the end nodes. Using a simple design, it became possible to connect almost any network to the ARPANET, irrespective of their A Stanford Research Institute packet radio van, local characteristics, thereby solving Kahn's initial problem. One site of the first three-way internetworked transmission. popular expression is that TCP/IP, the eventual product of Cerf and Kahn's work, will run over "two tin cans and a string." As a joke, the IP over Avian Carriers formal protocol specification was created and successfully tested. A computer called a router is provided with an interface to each network. It forwards packets back and forth between them.[3] Originally a router was called gateway, but the term was changed to avoid confusion with other types of gateways.
Specification
From 1973 to 1974, Cerf's networking research group at Stanford worked out details of the idea, resulting in the first TCP specification.[4] A significant technical influence was the early networking work at Xerox PARC, which produced the PARC Universal Packet protocol suite, much of which existed around that time. DARPA then contracted with BBN Technologies, Stanford University, and the University College London to develop operational versions of the protocol on different hardware platforms. Four versions were developed: TCP v1, TCP v2, TCP v3 and IP v3, and TCP/IP v4. The last protocol is still in use today. In 1975, a two-network TCP/IP communications test was performed between Stanford and University College London (UCL). In November, 1977, a three-network TCP/IP test was conducted between sites in the US, the UK, and Norway. Several other TCP/IP prototypes were developed at multiple research centers between 1978 and 1983. The migration of the ARPANET to TCP/IP was officially completed on flag day January 1, 1983, when the new protocols were permanently activated.[5]
Adoption
In March 1982, the US Department of Defense declared TCP/IP as the standard for all military computer networking.[6] In 1985, the Internet Architecture Board held a three-day workshop on TCP/IP for the computer industry, attended by 250 vendor representatives, promoting the protocol and leading to its increasing commercial use. In 1985, the first Interop conference was held, focusing on network interoperability via further adoption of TCP/IP. It was founded by Dan Lynch, an early Internet activist. From the beginning, it was attended by large corporations, such as IBM and DEC. Interoperability conferences have been held every year since then. Every year from 1985 through 1993, the number of attendees tripled. IBM, ATT and DEC were the first major corporations to adopt TCP/IP, despite having competing internal protocols (SNA, XNS, etc.). In IBM, from 1984, Barry Appelman's group did TCP/IP development. (Appelman later moved to AOL to be the head of all its development efforts.) They navigated the corporate politics to get a stream of TCP/IP products for various IBM systems, including MVS, VM, and OS/2. At the same time, several smaller companies began offering TCP/IP stacks for DOS and MS Windows, such as the company FTP Software, and the Wollongong Group.[7] The first VM/CMS TCP/IP stack came from the University of Wisconsin.[8]
Internet Protocol Suite Back then, most of these TCP/IP stacks were written single-handedly by a few talented programmers. For example, John Romkey of FTP Software was the author of the MIT PC/IP package.[9] John Romkey's PC/IP implementation was the first IBM PC TCP/IP stack. Jay Elinsky and Oleg Vishnepolsky of IBM Research wrote TCP/IP stacks for VM/CMS and OS/2, respectively.[10] The spread of TCP/IP was fueled further in June 1989, when AT&T agreed to put into the public domain the TCP/IP code developed for UNIX. Various vendors, including IBM, included this code in their own TCP/IP stacks. Many companies sold TCP/IP stacks for Windows until Microsoft released its own TCP/IP stack in Windows 95. This event was a little late in the evolution of the Internet, but it cemented TCP/IP's dominance over other protocols, which eventually disappeared. These protocols included IBM's SNA, OSI, Microsoft's native NetBIOS, and Xerox' XNS.
123
124
Two Internet hosts connected via two routers and the corresponding layers used at each hop. The application on each host executes read and write operations as if the processes were directly connected to each other by some kind of data pipe. Every other detail of the communication is hidden from each process. The underlying mechanisms that transmit data between the host computers are located in the lower protocol layers.
Encapsulation of application data descending through the layers described in RFC 1122
Internet Protocol Suite architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture." RFC 1122, entitled Host Requirements, is structured in paragraphs referring to layers, but the document refers to many other architectural principles not emphasizing layering. It loosely defines a four-layer model, with the layers having names, not numbers, as follows: Application layer (process-to-process): This is the scope within which applications create user data and communicate this data to other processes or applications on another or the same host. The communications partners are often called peers. This is where the "higher level" protocols such as SMTP, FTP, SSH, HTTP, etc. operate. Transport layer (host-to-host): The transport layer constitutes the networking regime between two network hosts, either on the local network or on remote networks separated by routers. The transport layer provides a uniform networking interface that hides the actual topology (layout) of the underlying network connections. This is where flow-control, error-correction, and connection protocols exist, such as TCP. This layer deals with opening and maintaining connections between Internet hosts. Internet layer (internetworking): The internet layer has the task of exchanging datagrams across network boundaries. It is therefore also referred to as the layer that establishes internetworking, indeed, it defines and establishes the Internet. This layer defines the addressing and routing structures used for the TCP/IP protocol suite. The primary protocol in this scope is the Internet Protocol, which defines IP addresses. Its function in routing is to transport datagrams to the next IP router that has the connectivity to a network closer to the final data destination. Link layer: This layer defines the networking methods within the scope of the local network link on which hosts communicate without intervening routers. This layer describes the protocols used to describe the local network topology and the interfaces needed to effect transmission of Internet layer datagrams to next-neighbor hosts. (cf. the OSI data link layer). The Internet protocol suite and the layered protocol stack design were in use before the OSI model was established. Since then, the TCP/IP model has been compared with the OSI model in books and classrooms, which often results in confusion because the two models use different assumptions, including about the relative importance of strict layering. This abstraction also allows upper layers to provide services that the lower layers cannot, or choose not, to provide. Again, the original OSI model was extended to include connectionless services (OSIRM CL).[15] For example, IP is not designed to be reliable and is a best effort delivery protocol. This means that all transport layer implementations must choose whether or not to provide reliability and to what degree. UDP provides data integrity (via a checksum) but does not guarantee delivery; TCP provides both data integrity and delivery guarantee (by retransmitting until the receiver acknowledges the reception of the packet). This model lacks the formalism of the OSI model and associated documents, but the IETF does not use a formal model and does not consider this a limitation, as in the comment by David D. Clark, "We reject: kings, presidents and voting. We believe in: rough consensus and running code." Criticisms of this model, which have been made with respect to the OSI model, often do not consider ISO's later extensions to that model. 1. For multiaccess links with their own addressing systems (e.g. Ethernet) an address mapping protocol is needed. Such protocols can be considered to be below IP but above the existing link system. While the IETF does not use the terminology, this is a subnetwork dependent convergence facility according to an extension to the OSI model, the internal organization of the network layer (IONL).[16] 2. ICMP & IGMP operate on top of IP but do not transport data like UDP or TCP. Again, this functionality exists as layer management extensions to the OSI model, in its Management Framework (OSIRM MF) [17]
125
Internet Protocol Suite 3. The SSL/TLS library operates above the transport layer (uses TCP) but below application protocols. Again, there was no intention, on the part of the designers of these protocols, to comply with OSI architecture. 4. The link is treated like a black box here. This is fine for discussing IP (since the whole point of IP is it will run over virtually anything). The IETF explicitly does not intend to discuss transmission systems, which is a less academic but practical alternative to the OSI model. The following is a description of each layer in the TCP/IP networking model starting from the lowest level.
126
Link layer
The link layer is the networking scope of the local network connection to which a host is attached. This regime is called the link in Internet literature. This is the lowest component layer of the Internet protocols, as TCP/IP is designed to be hardware independent. As a result TCP/IP is able to be implemented on top of virtually any hardware networking technology. The link layer is used to move packets between the Internet layer interfaces of two different hosts on the same link. The processes of transmitting and receiving packets on a given link can be controlled both in the software device driver for the network card, as well as on firmware or specialized chipsets. These will perform data link functions such as adding a packet header to prepare it for transmission, then actually transmit the frame over a physical medium. The TCP/IP model includes specifications of translating the network addressing methods used in the Internet Protocol to data link addressing, such as Media Access Control (MAC), however all other aspects below that level are implicitly assumed to exist in the link layer, but are not explicitly defined. This is also the layer where packets may be selected to be sent over a virtual private network or other networking tunnel. In this scenario, the link layer data may be considered application data which traverses another instantiation of the IP stack for transmission or reception over another IP connection. Such a connection, or virtual link, may be established with a transport protocol or even an application scope protocol that serves as a tunnel in the link layer of the protocol stack. Thus, the TCP/IP model does not dictate a strict hierarchical encapsulation sequence.
Internet layer
The internet layer has the responsibility of sending packets across potentially multiple networks. Internetworking requires sending data from the source network to the destination network. This process is called routing.[18] In the Internet protocol suite, the Internet Protocol performs two basic functions: Host addressing and identification: This is accomplished with a hierarchical addressing system (see IP address). Packet routing: This is the basic task of sending packets of data (datagrams) from source to destination by sending them to the next network node (router) closer to the final destination. The internet layer is not only agnostic of application data structures at the transport layer, but it also does not distinguish between operation of the various transport layer protocols. So, IP can carry data for a variety of different upper layer protocols. These protocols are each identified by a unique protocol number: for example, Internet Control Message Protocol (ICMP) and Internet Group Management Protocol (IGMP) are protocols 1 and 2, respectively. Some of the protocols carried by IP, such as ICMP (used to transmit diagnostic information about IP transmission) and IGMP (used to manage IP Multicast data) are layered on top of IP but perform internetworking functions. This illustrates the differences in the architecture of the TCP/IP stack of the Internet and the OSI model. The internet layer only provides an unreliable datagram transmission facility between hosts located on potentially different IP networks by forwarding the transport layer datagrams to an appropriate next-hop router for further relaying to its destination. With this functionality, the internet layer makes possible internetworking, the interworking of different IP networks, and it essentially establishes the Internet. The Internet Protocol is the principal component of the internet layer, and it defines two addressing systems to identify network hosts computers, and to
Internet Protocol Suite locate them on the network. The original address system of the ARPANET and its successor, the Internet, is Internet Protocol version 4 (IPv4). It uses a 32-bit IP address and is therefore capable of identifying approximately four billion hosts. This limitation was eliminated by the standardization of Internet Protocol version 6 (IPv6) in 1998, and beginning production implementations in approximately 2006.
127
Transport layer
The transport layer establishes host-to-host connectivity, meaning it handles the details of data transmission that are independent of the structure of user data and the logistics of exchanging information for any particular specific purpose. Its responsibility includes end-to-end message transfer independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing (port numbers). End to end message transmission or connecting applications at the transport layer can be categorized as either connection-oriented, implemented in TCP, or connectionless, implemented in UDP. The transport layer can be thought of as a transport mechanism, e.g., a vehicle with the responsibility to make sure that its contents (passengers/goods) reach their destination safely and soundly, unless another protocol layer is responsible for safe delivery. The layer simply establishes a basic data channel that an application uses in its task-specific data exchange. For this purpose the layer establishes the concept of the port, a numbered logical construct allocated specifically for each of the communication channels an application needs. For many types of services, these port numbers have been standardized so that client computers may address specific services of a server computer without the involvement of service announcements or directory services. Since IP provides only a best effort delivery, the transport layer is the first layer of the TCP/IP stack to offer reliability. IP can run over a reliable data link protocol such as the High-Level Data Link Control (HDLC). For example, the TCP is a connection-oriented protocol that addresses numerous reliability issues to provide a reliable byte stream: data arrives in-order data has minimal error (i.e. correctness) duplicate data is discarded lost/discarded packets are resent includes traffic congestion control
The newer Stream Control Transmission Protocol (SCTP) is also a reliable, connection-oriented transport mechanism. It is message-stream-oriented not byte-stream-oriented like TCP and provides multiple streams multiplexed over a single connection. It also provides multi-homing support, in which a connection end can be represented by multiple IP addresses (representing multiple physical interfaces), such that if one fails, the connection is not interrupted. It was developed initially for telephony applications (to transport SS7 over IP), but can also be used for other applications. User Datagram Protocol is a connectionless datagram protocol. Like IP, it is a best effort, "unreliable" protocol. Reliability is addressed through error detection using a weak checksum algorithm. UDP is typically used for applications such as streaming media (audio, video, Voice over IP etc.) where on-time arrival is more important than reliability, or for simple query/response applications like DNS lookups, where the overhead of setting up a reliable connection is disproportionately large. Real-time Transport Protocol (RTP) is a datagram protocol that is designed for real-time data such as streaming audio and video. The applications at any given network address are distinguished by their TCP or UDP port. By convention certain well known ports are associated with specific applications. (See List of TCP and UDP port numbers.)
128
Application layer
The application layer contains the higher-level protocols used by most applications for network communication. Examples of application layer protocols include the File Transfer Protocol (FTP) and the Simple Mail Transfer Protocol (SMTP).[19] Data coded according to application layer protocols are then encapsulated into one or (occasionally) more transport layer protocols (such as TCP or UDP), which in turn use lower layer protocols to effect actual data transfer. Since the IP stack defines no layers between the application and transport layers, the application layer must include any protocols that act like the OSI's presentation and session layer protocols. This is usually done through libraries. Application layer protocols generally treat the transport layer (and lower) protocols as black boxes which provide a stable network connection across which to communicate, although the applications are usually aware of key qualities of the transport layer connection such as the end point IP addresses and port numbers. As noted above, layers are not necessarily clearly defined in the Internet protocol suite. Application layer protocols are most often associated with clientserver applications, and the commoner servers have specific ports assigned to them by the IANA: HTTP has port 80; Telnet has port 23; etc. Clients, on the other hand, tend to use ephemeral ports, i.e. port numbers assigned at random from a range set aside for the purpose. Transport and lower level layers are largely unconcerned with the specifics of application layer protocols. Routers and switches do not typically "look inside" the encapsulated traffic to see what kind of application protocol it represents, rather they just provide a conduit for it. However, some firewall and bandwidth throttling applications do try to determine what's inside, as with the Resource Reservation Protocol (RSVP). It's also sometimes necessary for Network Address Translation (NAT) facilities to take account of the needs of particular application layer protocols. (NAT allows hosts on private networks to communicate with the outside world via a single visible IP address using port forwarding, and is an almost ubiquitous feature of modern domestic broadband routers).
Five layers
Five layers
"Internet model"
"Internet model"
Application
Application
Application
Application
Application
Application/Process
Transport
Transport
Transport
Transport
Transport
Host-to-host
Transport
Internet Link
Physical
Physical
Physical
Physical
Internet Protocol Suite Some of the networking models are from textbooks, which are secondary sources that may contravene the intent of RFC 1122 and other IETF primary sources.[27]
129
Implementations
No specific hardware or software implementation is required by the protocols or the layered model, so there are many. Most computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP implementation. A minimally acceptable implementation includes the following protocols, listed from most essential to least essential: IP, ARP, ICMP, UDP, TCP and sometimes IGMP. In principle, it is possible to support only one transport protocol, such as UDP, but this is rarely done, because it limits usage of the whole implementation. IPv6, beyond its own version of ARP (NDP), ICMP (ICMPv6) and IGMP (IGMPv6), has some additional required functions, and often is accompanied by an integrated IPSec security layer. Other protocols could be easily added later (possibly being implemented entirely in userspace), such as DNS for resolving domain names to IP addresses, or DHCP for automatically configuring network interfaces. Normally, application programmers are concerned only with interfaces in the application layer and often also in the transport layer, while the layers below are services provided by the TCP/IP stack in the operating system. Most IP
Internet Protocol Suite implementations are accessible to programmers through sockets and APIs. Unique implementations include Lightweight TCP/IP, an open source stack designed for embedded systems, and KA9Q NOS, a stack and associated protocols for amateur packet radio systems and personal computers connected via serial lines. Microcontroller firmware in the network adapter typically handles link issues, supported by driver software in the operational system. Non-programmable analog and digital electronics are normally in charge of the physical components below the link layer, typically using an application-specific integrated circuit (ASIC) chipset for each network interface or other physical standard. High-performance routers are to a large extent based on fast non-programmable digital electronics, carrying out link level switching.
130
References
[1] [2] [3] [4] [5] [6] RFC 1122, Requirements for Internet Hosts Communication Layers, R. Braden (ed.), October 1989 RFC 1123, Requirements for Internet Hosts Application and Support, R. Braden (ed.), October 1989 RFC 1812, Requirements for IP Version 4 Routers, F. Baker (June 1995) RFC 675, Specification of Internet Transmission Control Protocol, V. Cerf et al. (December 1974) Internet History (http:/ / www. livinginternet. com/ i/ ii. htm) Ronda Hauben. "From the ARPANET to the Internet" (http:/ / www. columbia. edu/ ~rh120/ other/ tcpdigest_paper. txt). TCP Digest (UUCP). . Retrieved 2007-07-05.
[7] Wollongong (http:/ / support. microsoft. com/ kb/ 108007) [8] A Short History of Internet Protocols at CERN (http:/ / www. weblab. isti. cnr. it/ education/ ssfs/ lezioni/ slides/ archives/ cern. htm) [9] About | "romkey" (http:/ / www. romkey. com/ about/ ) [10] Barry Appelman [11] Architectural Principles of the Internet (ftp:/ / ftp. rfc-editor. org/ in-notes/ rfc1958. txt), RFC 1958, B. Carpenter, June 1996 [12] Rethinking the design of the Internet: The end to end arguments vs. the brave new world (http:/ / www. csd. uoc. gr/ ~hy558/ papers/ Rethinking_2001. pdf), Marjory S. Blumenthal, David D. Clark, August 2001 [13] p.23 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Jon Postel Editor (http:/ / www. ietf. org/ rfc/ rfc0791. txt?number=791) [14] Requirements for Internet Hosts -- Communication Layers p.13 October 1989 R. Braden, Editor (http:/ / tools. ietf. org/ html/ rfc1122#page-12) [15] [ OSI: Reference Model Addendum 1: Connectionless-mode Transmission,ISO7498/AD1],ISO7498/AD1, May 1986 [16] Information processing systems -- Open Systems Interconnection -- Internal organization of the Network Layer (http:/ / www. iso. org/ iso/ home/ store/ catalogue_tc/ catalogue_detail. htm?csnumber=16011), ISO 8648:1988. [17] Information processing systems -- Open Systems Interconnection -- Basic Reference Model -- Part 4: Management framework (http:/ / www. iso. org/ iso/ home/ store/ catalogue_tc/ catalogue_detail. htm?csnumber=14258), ISO 7498-4:1989. [18] IP Packet Structure (http:/ / www. comsci. us/ datacom/ ippacket. html) [19] TCP/IP Illustrated: the protocols (http:/ / www. kohala. com/ start/ tcpipiv1. html), ISBN 0-201-63346-9, W. Richard Stevens, February 1994 [20] James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, 2008, ISBN 0-321-49770-8 (http:/ / www. pearsonhighered. com/ educator/ academic/ product/ 0,,0321497708,00+ en-USS_01DBC. html) [21] Behrouz A. Forouzan, Data Communications and Networking, 2003 (http:/ / books. google. com/ books?id=U3Gcf65Pu9IC& printsec=frontcover& dq=forouzan+ "computer+ networks"& ei=RPZ9SOCvMofctAO02di0AQ& hl=en& sig=ACfU3U2Hh_n83pPtf5uCreCih0HnWvNcxg#PPA29,M1) [22] Douglas E. Comer, Internetworking with TCP/IP: Principles, Protocols and Architecture, Pearson Prentice Hall 2005, ISBN 0-13-187671-6 (http:/ / books. google. com/ books?id=jonyuTASbWAC& pg=PA155& hl=sv& source=gbs_toc_r& cad=0_0& sig=ACfU3U18gHAia1pU_Pxn-rhkCnH1v70M6Q#PPA161,M1) [23] Charles M. Kozierok, "The TCP/IP Guide", No Starch Press 2005 (http:/ / books. google. com/ books?id=Pm4RgYV2w4YC& pg=PA131& dq="TCP/ IP+ model+ layers"& lr=& hl=sv& sig=ACfU3U3ofMwYAbZfGz1BmAXc2oNNFC2b8A#PPA129,M1) [24] William Stallings, Data and Computer Communications, Prentice Hall 2006, ISBN 0-13-243310-9 (http:/ / books. google. com/ books?id=c_AWmhkovR0C& pg=PA35& dq="internet+ layer"+ "network+ access+ layer"& ei=-O99SI3EJo32sgOQpPThDw& hl=en& sig=ACfU3U38aXznzeAnQdbLcPFXfCgxAd4lFg) [25] Andrew S. Tanenbaum, Computer Networks, Prentice Hall 2002, ISBN 0-13-066102-3 (http:/ / books. google. com/ books?id=Pd-z64SJRBAC& pg=PA42& vq=internet+ layer& dq=networks& hl=sv& source=gbs_search_s& sig=ACfU3U3DHANeIz0sOsd5NK4VXSrgNFYVAw#PPA42,M1) [26] Mark Dye, Mark A. Dye, Wendell, Network Fundamentals: CCNA Exploration Companion Guide, 2007, ISBN 1-58713-208-7
131
Further reading
Douglas E. Comer. Internetworking with TCP/IP - Principles, Protocols and Architecture. ISBN 86-7991-142-9 Joseph G. Davies and Thomas F. Lee. Microsoft Windows Server 2003 TCP/IP Protocols and Services. ISBN 0-7356-1291-9 Forouzan, Behrouz A. (2003). TCP/IP Protocol Suite (2nd ed.). McGraw-Hill. ISBN0-07-246060-1. Craig Hunt TCP/IP Network Administration. O'Reilly (1998) ISBN 1-56592-322-7 Maufer, Thomas A. (1999). IP Fundamentals. Prentice Hall. ISBN0-13-975483-0. Ian McLean. Windows(R) 2000 TCP/IP Black Book. ISBN 1-57610-687-X Ajit Mungale Pro .NET 1.1 Network Programming. ISBN 1-59059-345-6 W. Richard Stevens. TCP/IP Illustrated, Volume 1: The Protocols. ISBN 0-201-63346-9 W. Richard Stevens and Gary R. Wright. TCP/IP Illustrated, Volume 2: The Implementation. ISBN 0-201-63354-X W. Richard Stevens. TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols. ISBN 0-201-63495-3 Andrew S. Tanenbaum. Computer Networks. ISBN 0-13-066102-3 Clark, D. (1988). "The Design Philosophy of the DARPA Internet Protocols" (http://www.cs.princeton.edu/ ~jrex/teaching/spring2005/reading/clark88.pdf). SIGCOMM '88 Symposium proceedings on Communications architectures and protocols (ACM): 106114. doi:10.1145/52324.52336. Retrieved 2011-10-16.
External links
Internet History (http://www.livinginternet.com/i/ii.htm)Pages on Robert Kahn, Vinton Cerf, and TCP/IP (reviewed by Cerf and Kahn). RFC 675 (http://www.ietf.org/rfc/rfc0675.txt) - Specification of Internet Transmission Control Program, December 1974 Version TCP/IP State Transition Diagram (http://www.night-ray.com/TCPIP_State_Transition_Diagram.pdf) (PDF) RFC 1180 A TCP/IP Tutorial - from the Internet Engineering Task Force (January 1991) TCP/IP FAQ (http://www.itprc.com/tcpipfaq/) The TCP/IP Guide (http://www.tcpipguide.com/free/) - A comprehensive look at the protocols and the procedures/processes involved A Study of the ARPANET TCP/IP Digest (http://www.columbia.edu/~rh120/other/tcpdigest_paper.txt) TCP/IP Sequence Diagrams (http://www.eventhelix.com/RealtimeMantra/Networking/) The Internet in Practice (http://www.searchandgo.com/articles/internet/internet-practice-4.php) TCP/IP - Directory & Informational Resource (http://softtechinfo.com/network/tcpip.html) Daryl's TCP/IP Primer (http://www.ipprimer.com/) - Intro to TCP/IP LAN administration, conversational style Introduction to TCP/IP (http://www.linux-tutorial.info/MContent-142) TCP/IP commands from command prompt (http://blog.webgk.com/2007/10/ dns-tcpip-commands-from-command-prompt.html) cIPS (http://sourceforge.net/projects/cipsuite/) Robust TCP/IP stack for embedded devices without an Operating System
Internet access
132
Internet access
Internet access is the means by which individual terminals, computers, mobile devices, and local area networks are connected to the global Internet. Internet access is usually sold by Internet Service Providers (ISPs) that use many different technologies offering a wide range of data rates to the end user. Consumer use first became popular through dial-up connections in the 1980s and 1990s. By the first decade of the 21st century, many consumers had switched away from dial-up to dedicated connections, most Internet access products were being marketed using the term "broadband", and broadband penetration was being treated as a key economic indicator.[1][2]
History
The Internet began as a network funded by the U.S. government to support projects within the government and at universities and research laboratories in the US - but grew over time to include most of the world's large universities and the research arms of many technology companies.[3][4][5] Use by a wider audience only came in 1995 when restrictions on the use of the Internet to carry commercial traffic were lifted.[6] In the early to mid-1980s, most Internet access was from personal computers and workstations directly connected to local area networks or from dial-up connections using modems and analog telephone lines. LANs typically operated at 10 Mbit/s and grew to support 100 and 1000 Mbit/s, while modem data rates grew from 1200 and 2400 bit/s in the 1980s, to 28 and 56 kbit/s by the mid to late 1990s. Initially dial-up connections were made from terminals or computers running terminal emulation software to terminal servers on LANs. These dial-up connections did not support end-to-end use of the Internet protocols and only provided terminal to host connections. The introduction of network access servers (NASs) supporting the Serial Line Internet Protocol (SLIP) and later the Point-to-point protocol (PPP) extended the Internet protocols and made the full range of Internet services available to dial-up users, subject only to limitations imposed by the lower data rates available using dial-up. Broadband Internet access, often shortened to just broadband and also known as high-speed Internet access, are services that provide bit-rates considerably higher than that available using a 56 kbit/s modem. In the U.S. National Broadband Plan of 2009, the Federal Communications Commission (FCC) defined broadband access as "Internet access that is always on and faster than the traditional dial-up access",[7] although the FCC has defined it differently through the years.[8] The term broadband was originally a reference to multi-frequency communication, as opposed to narrowband or baseband. Broadband is now a marketing term that telephone, cable, and other companies use to sell their more expensive higher data rate products.[9] Most broadband services provide a continuous "always on" connection; there is no dial-in process required, and it does not hog phone lines.[10] Broadband provides improved access to Internet services such as: Faster world wide web browsing Faster downloading of documents, photographs, videos, and other large files Telephony, radio, television, and videoconferencing Virtual private networks and remote system administration Online gaming, especially massively multiplayer online role-playing games which are interaction-intensive
In the 1990s, the National Information Infrastructure initiative in the U.S. made broadband Internet access a public policy issue.[11] In 2000, most Internet access to homes was provided using dial-up, while many businesses and schools were using broadband connections. In 2000 there were just under 150 million dial-up subscriptions in the 34 OECD countries[1] and fewer than 20 million broadband subscriptions. By 2004, broadband had grown and dial-up had declined so that the number of subscriptions were roughly equal at 130 million each. In 2010, in the OECD countries, over 90% of the Internet access subscriptions used broadband, broadband had grown to more than 300 million subscriptions, and dial-up subscriptions had declined to fewer than 30 million.[12]
Internet access The broadband technologies in widest use are ADSL and cable Internet access. Newer technologies include VDSL and optical fibre extended closer to the subscriber in both telephone and cable plants. Fibre-optic communication, while only recently being used in premises and to the curb schemes, has played a crucial role in enabling broadband Internet access by making transmission of information at very high data rates over longer distances much more cost-effective than copper wire technology. In areas not served by ADSL or cable, some community organizations and local governments are installing Wi-Fi networks. Wireless and satellite Internet are often used in rural, undeveloped, or other hard to serve areas where wired Internet is not readily available. Newer technologies being deployed for fixed (stationary) and mobile broadband access include WiMAX, LTE, and fixed wireless, e.g., Motorola Canopy. Starting in roughly 2006, mobile broadband access is increasingly available at the consumer level using "3G" and "4G" technologies such as HSPA, EV-DO, HSPA+, and LTE.
133
Availability
In addition to access from home, school, and the workplace Internet access may be available from public places such as libraries and Internet cafes, where computers with Internet connections are available. Some libraries provide stations for connecting users' laptops to local area networks (LANs). Wireless Internet access points are available in public places such as airport halls, in some cases just for brief use while standing. Some access points may also provide coin operated computers. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels also have public terminals, usually fee based. Coffee shops, shopping malls, and other venues increasingly offer wireless access to computer networks, referred to as hotspots, for users who bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. And Mobile broadband access allows smart phones and other digital devices to connect to the Internet from any location from which a mobile phone call can be made.
Data rates
Data rate units (SI) Unit Kilobit per second Megabit/s Gigabit/s Terabit/s Petabit/s Unit Kilobyte per second (103) Megabyte/s (106) (103) (106) (109) Symbol Bits kbit/s Mbit/s Gbit/s 1,000 bit/s 1,000 kbit/s 1,000 Mbit/s 1,000 Gbit/s 1,000 Tbit/s Bytes 125 bytes/s 125 kB/s 125 MB/s 125 GB/s 125 TB/s Bytes 1,000 bytes/s 1,000 kB/s
Internet access
134
Gigabyte/s Terabyte/s Petabyte/s GB/s 8,000 Mbit/s 1,000 MB/s 8,000 Gbit/s 1,000 GB/s 8,000 Tbit/s 1,000 TB/s
(109)
The bit rates for dial-up modems range from as little as 110 bit/s in the late 1950s, to a maximum of from 33 to 64 kbit/s (V.90 and V.92) in the late 1990s. Dial-up connections generally require the dedicated use of a telephone line. Data compression can boost the effective bit rate for a dial-up modem connection to from 220 (V.42bis) to 320 (V.44) kbit/s.[13] However, the effectiveness of data compression is quite variable, depending on the type of data being sent, the condition of the telephone line, and a number of other factors. In reality, the overall data rate rarely exceeds 150 kbit/s.[14] Broadband technologies supply considerably higher bit rates than dial-up, generally without disrupting regular telephone use. Various minimum data rates and maximum latencies have been used in definitions of broadband, ranging from 64kbit/s up to 4.0Mbit/s.[15] In 1988 the CCITT standards body defined "broadband service" as requiring transmission channels capable of supporting bit rates greater than the primary rate which ranged from about 1.5 to 2Mbit/s.[16] A 2006 Organization for Economic Co-operation and Development (OECD) report defined broadband as having download data transfer rates equal to or faster than 256kbit/s.[1] And in 2010 the U.S. Federal Communications Commission (FCC) defined "Basic Broadband" as data transmission speeds of at least 4 Mbit/s downstream (from the Internet to the users computer) and 1Mbit/s upstream (from the users computer to the Internet).[17] The trend is to raise the threshold of the broadband definition as higher data rate services become available.[18] The higher data rate dial-up modems and many broadband services are "asymmetric"supporting much higher data rates for download (toward the user) than for upload (toward the Internet). Data rates, including those given in this article, are usually defined and advertised in terms of the maximum or peak download rate. In practice, these maximum data rates are not always reliably available to the customer.[19] Actual end-to-end data rates can be lower due to a number of factors.[20] Physical link quality can vary with distance and for wireless access with terrain, weather, building construction, antenna placement, and interference from other radio sources. Network bottlenecks may exist at points anywhere on the path from the end-user to the remote server or service being used and not just on the first or last link providing Internet access to the end-user. Users may share access over a common network infrastructure. Since most users do not use their full connection capacity all of the time, this aggregation strategy (known as contended service) usually works well and users can burst to their full data rate at least for brief periods. However, peer-to-peer (P2P) file sharing and high quality streaming video can require high data rates for extended periods, which violates these assumptions and can cause a service to become oversubscribed, resulting in congestion and poor performance. The TCP protocol includes flow-control mechanisms that automatically throttle back on the bandwidth being used during periods of network congestion. This is fair in the sense that all users that experience congestion receive less bandwidth, but it can be frustrating for customers and a major problem for ISPs. In some cases the amount of bandwidth actually available may fall below the threshold required to support a particular service such as video conferencing or streaming live videoeffectively making the service unavailable. When traffic is particularly heavy, an ISP can deliberately throttle back the bandwidth available to classes of users or for particular services. This is known as traffic shaping and careful use can ensure a better quality of service for time critical services even on extremely busy networks. However, overuse can lead to concerns about fairness and network neutrality or even charges of censorship, when some types of traffic are severely or completely blocked.
Internet access
135
Technologies
Access technologies generally use a modem, which converts digital data to analog for transmission over analog networks such as the telephone and cable networks.[10]
Dial-up access
Dial-up access uses a modem and a phone call placed over the public switched telephone network (PSTN) to connect to a pool of modems operated by an ISP. The modem converts a computer's digital signal into an analog signal that travels over a phone line's local loop until it reaches a telephone company's switching facilities or central office (CO) where it is switched to another phone line that connects to another modem at the remote end of the connection.[22] Operating on a single channel, a dial-up connection monopolizes the phone line and is one of the slowest methods of accessing the Internet. Dial-up is often the only form of Internet access available in rural areas as it requires no new infrastructure beyond the already existing telephone network, to connect to the Internet. Typically, dial-up connections do not exceed a speed of 56 kbit/s, as they are primarily made using modems that operate at a maximum data rate of 56 kbit/s downstream (towards the end user) and 34 or 48 kbit/s upstream (toward the global Internet).[10]
Broadband access
The term broadband includes a broad range of technologies, all of which provide higher data rate access to the Internet. These technologies use wires or fiber optic cables in contrast to wireless broadband described later. Multilink dial-up Multilink dial-up provides increased bandwidth by bonding two or more dial-up connections together and treating them as a single data channel.[23] It requires two or more modems, phone lines, and dial-up accounts, as well as an ISP that supports multilinking - and of course any line and data charges are also doubled. This inverse multiplexing option was briefly popular with some high-end users before ISDN, DSL and other technologies became available. Diamond and other vendors created special modems to support multilinking.[24]
Internet access Integrated Services Digital Network (ISDN) Integrated Services Digital Network (ISDN), a switched telephone service capable of transporting voice and digital data, is one of the oldest Internet access methods. ISDN has been used for voice, video conferencing, and broadband data applications. ISDN was very popular in Europe, but less common in North America. Its use peaked in the late 1990s before the availability of DSL and cable modem technologies.[25] Basic rate ISDN, known as ISDN-BRI, has two 64 kbit/s "bearer" or "B" channels. These channels can be used separately for voice or data calls or bonded together to provide a 128kbit/s service. Multiple ISDN-BRI lines can be bonded together to provide data rates above 128 kbit/s. Primary rate ISDN, known as ISDN-PRI, has 23 bearer channels (64 kbit/s each) for a combined data rate of 1.5Mbit/s (US standard). An ISDN E1 (European standard) line has 30 bearer channels and a combined data rate of 1.9Mbit/s. Leased lines Leased lines are dedicated lines used primarily by ISPs, business, and other large enterprises to connect LANs and campus networks to the Internet using the existing infrastructure of the public telephone network or other providers. Delivered using wire, optical fiber, and radio, leased lines are used to provide Internet access directly as well as the building blocks from which several other forms of Internet access are created.[26] T-carrier technology dates to 1957 and provides data rates that range from 56 and 64 kbit/s (DS0) to 1.5 Mbit/s (DS1 or T1), to 45 Mbit/s (DS3 or T3). A T1 line carries 24 voice or data channels (24 DS0s), so customers may use some channels for data and others for voice traffic or use all 24 channels for clear channel data. A DS3 (T3) line carries 28 DS1 (T1) channels. Fractional T1 lines are also available in multiples of a DS0 to provide data rates between 56 and 1,500 kbit/s. T-carrier lines require special termination equipment that may be separate from or integrated into a router or switch and which may be purchased or leased from an ISP.[27] In Japan the equivalent standard is J1/J3. In Europe, a slightly different standard, E-carrier, provides 32 user channels (64 kbit/s) on an E1 (2.0 Mbit/s) and 512 user channels or 16 E1s on an E3 (34.4 Mbit/s). Synchronous Optical Networking (SONET, in the U.S. and Canada) and Synchronous Digital Hierarchy (SDH, in the rest of the world) are the standard multiplexing protocols used to carry high data rate digital bit streams over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs). At lower transmission rates data can also be transferred via an electrical interface. The basic unit of framing is an OC-3c (optical) or STS-3c (electrical) which carries 155.520 Mbit/s. Thus an OC-3c will carry three OC-1 (51.84 Mbit/s) payloads each of which has enough capacity to include a full DS3. Higher data rates are delivered in OC-3c multiples of four providing OC-12c (622.080 Mbit/s), OC-48c (2.488 Gbit/s), OC-192c (9.953 Gbit/s), and OC-768c (39.813 Gbit/s). The "c" at the end of the OC labels stands for "concatenated" and indicates a single data stream rather than several multiplexed data streams.[26] The 1, 10, 40, and 100 Gigabit Ethernet (GbE, 10GbE, 40GbE, and 100GbE) IEEE standards (802.3) allow digital data to be delivered over copper wiring at distances to 100 m and over optical fiber at distances to 40km.[28] Cable Internet access Cable Internet or cable modem access provides Internet access via Hybrid Fiber Coaxial wiring originally developed to carry television signals. Either fiber-optic or coaxial copper cable may connect a node to a customer's location at a connection known as a cable drop. In a cable modem termination system, all nodes for cable subscribers in a neighborhood connect to a cable company's central office, known as the "head end." The cable company then connects to the Internet using a variety of means usually fiber optic cable or digital satellite and microwave transmissions.[29] Like DSL, broadband cable provides a continuous connection with an ISP. Downstream, the direction toward the user, bit rates can be as much as 400Mbit/s for business connections, and 100Mbit/s for residential service in some countries. Upstream traffic, originating at the user, ranges from 384kbit/s to more than 20Mbit/s. Broadband cable access tends to service fewer business customers because existing
136
Internet access television cable networks tend to service residential buildings and commercial buildings do not always include wiring for coaxial cable networks.[30] In addition, because broadband cable subscribers share the same local line, communications may be intercepted by neighboring subscribers. Cable networks regularly provide encryption schemes for data traveling to and from customers, but these schemes may be thwarted.[29] Digital subscriber line (DSL, ADSL, SDSL, and VDSL)
DSL technologies Standard ADSL ANSI T1.413 Issue 2 ITU G.992.1 (G.DMT) ITU G.992.2 (G.Lite) ITU G.992.3 ITU G.992.4 ITU G.992.3 Annex J ITU G.992.3 Annex L
137
ADSL2
ADSL2+ ITU G.992.5 ITU G.992.5 Annex M HDSL HDSL2 IDSL MSDSL PDSL RADSL SDSL SHDSL UDSL VDSL VDSL2 ITU G.993.1 ITU G.993.2 ITU G.991.2 ITU G.991.1
Digital Subscriber Line (DSL) service provides a connection to the Internet through the telephone network. Unlike dial-up, DSL can operate using a single phone line without preventing normal use of the telephone line for voice phone calls. DSL uses the high frequencies, while the low (audible) frequencies of the line are left free for regular telephone communication.[10] These frequency bands are subsequently separated by filters installed at the customer's premises. DSL originally stood for "digital subscriber loop". In telecommunications marketing, the term digital subscriber line is widely understood to mean Asymmetric Digital Subscriber Line (ADSL), the most commonly installed variety of DSL. The data throughput of consumer DSL services typically ranges from 256kbit/s to 20Mbit/s in the direction to the customer (downstream), depending on DSL technology, line conditions, and service-level implementation. In ADSL, the data throughput in the upstream direction, (i.e. in the direction to the service provider) is lower than that in the downstream direction (i.e. to the customer), hence the designation of asymmetric.[31] With a symmetric digital subscriber line (SDSL), the downstream and upstream data rates are equal.[32] Very-high-bit-rate digital subscriber line (VDSL or VHDSL, ITU G.993.1)[33] is a digital subscriber line (DSL) standard approved in 2001 that provides data rates up to 52 Mbit/s downstream and 16 Mbit/s upstream over copper wires[34] and up to 85 Mbit/s down- and upstream on coaxial cable.[35] VDSL is capable of supporting applications
Internet access such as high-definition television, as well as telephone services (voice over IP) and general Internet access, over a single physical connection. VDSL2 (ITU-T G.993.2) is a second-generation version and an enhancement of VDSL.[36] Approved in February 2006, it is able to provide data rates exceeding 100 Mbit/s simultaneously in both the upstream and downstream directions. However, the maximum data rate is achieved at a range of about 300 meters and performance degrades as distance and loop attenuation increases. DSL Rings DSL Rings (DSLR) or Bonded DSL Rings is a ring topology that uses DSL technology over existing copper telephone wires to provide data rates of up to 400Mbit/s.[37] Fiber to the home Fiber-to-the-home (FTTH) is one member of the Fiber-to-the-x (FTTx) family that includes Fiber-to-the-building or basement (FTTB), Fiber-to-the-premises (FTTP), Fiber-to-the-desk (FTTD), Fiber-to-the-curb (FTTC), and Fiber-to-the-node (FTTN).[38] These methods all bring data closer to the end user on optical fibers. The differences between the methods have mostly to do with just how close to the end user the delivery on fiber comes. All of these delivery methods are similar to hybrid fiber-coaxial (HFC) systems used to provide cable Internet access. The use of optical fiber offers much higher data rates over relatively longer distances. Most high-capacity Internet and cable television backbones already use fiber optic technology, with data switched to other technologies (DSL, cable, POTS) for final delivery to customers.[39] Australia has already begun rolling out its National Broadband Network across the country using fiber-optic cables to 93 percent of Australian homes, schools, and businesses.[40] Similar efforts are underway in Italy, Canada, India, and many other countries (see Fiber to the premises by country).,[41][42][43][44] Power-line Internet Power-line Internet, also known as Broadband over power lines (BPL), carries Internet data on a conductor that is also used for electric power transmission. Because of the extensive power line infrastructure already in place, this technology can provide people in rural and low population areas access the Internet with little cost in terms of new transmission equipment, cables, or wires. Data rates are asymmetric and generally range from 256 kbit/s to 2.7 Mbit/s.[45] Because these systems use parts of the radio spectrum allocated to other over-the-air communication services, interference between the services is a limiting factor in the introduction of power-line Internet systems. The IEEE P1901 standard specifies that all powerline protocols must detect existing usage and avoid interfering with it.[45] Power-line Internet has developed faster in Europe than in the U.S. due to a historical difference in power system design philosophies. Data signals cannot pass through the step-down transformers used and so a repeater must be installed on each transformer.[45] In the U.S. a transformer serves a small clusters of from one to a few houses. In Europe, it is more common for a somewhat larger transformer to service larger clusters of from 10 to 100 houses. Thus a typical U.S. city requires an order of magnitude more repeaters than in a comparable European city.[46] ATM and Frame Relay Asynchronous Transfer Mode (ATM) and Frame Relay are wide area networking standards that can be used to provide Internet access directly or as building blocks of other access technologies. For example many DSL implementations use an ATM layer over the low-level bitstream layer to enable a number of different technologies over the same link. Customer LANs are typically connected to an ATM switch or a Frame Relay node using leased lines at a wide range of data rates.[47][48]
138
Internet access While still widely used, with the advent of Ethernet over optical fiber, MPLS, VPNs and broadband services such as cable modem and DSL, ATM and Frame Relay no longer play the prominent role they once did.
139
Wireless ISP Wireless ISPs typically employ low-cost 802.11 Wi-Fi radio systems to link up remote locations over great distances, but may use other higher-power radio communications systems as well. Traditional 802.11b is an unlicensed omnidirectional service designed to span between 100 and 150 meters (300 to 500ft). By focusing the radio signal using a directional antenna 802.11b can operate reliably over a distance of many kilometres (miles), although the technology's line-of-sight requirements hamper connectivity in areas with hilly or heavily foliated terrain. In addition, compared to hard-wired connectivity, there are security risks (unless robust security protocols are enabled); data rates are significantly slower (2 to 50 times slower); and the network can be less stable, due to interference from other wireless devices and networks, weather and line-of-sight problems.[53] Rural Wireless-ISP installations are typically not commercial in nature and are instead a patchwork of systems built up by hobbyists mounting antennas on radio masts and towers, agricultural storage silos, very tall trees, or whatever other tall objects are available. There are currently a number of companies that provide this service.[54] Motorola Canopy and other proprietary technologies offer wireless access to rural and other markets that are hard to reach using Wi-Fi or WiMAX.
140
WiMAX (Worldwide Interoperability for Microwave Access) is a set of interoperable implementations of the IEEE 802.16 family of wireless-network standards certified by the WiMAX Forum. WiMAX enables "the delivery of last mile wireless broadband access as an alternative to cable and DSL".[55] The original IEEE 802.16 standard, now called "Fixed WiMAX", was published in 2001 and provided 30 to 40 megabit-per-second data rates.[56] Mobility support was added in 2005. A 2011 update provides data rates up to 1 Gbit/s for fixed stations. WiMax offers a metropolitan area network with a signal radius of about 50km (30 miles), far surpassing the 30-metre (100-foot) wireless range of a conventional Wi-Fi local area network (LAN). WiMAX signals also penetrate building walls much more effectively than Wi-Fi. Satellite broadband Satellites can provide fixed, portable, and mobile Internet access. It is among the most expensive forms of broadband Internet access, but may be the only choice available in remote areas.[57] Data rates range from 2 kbit/s to 1 Gbit/s downstream and from 2 kbit/s to 10 Mbit/s upstream. Satellite communication typically requires a clear line of sight, will not work well through trees and other vegetation, is adversely affected by moisture, rain, and snow (known as rain fade), and may require a fairly large, carefully aimed, directional antenna. Satellites in geostationary Earth orbit (GEO) operate in a fixed position Satellite Internet access via VSAT in Ghana 35,786km (22,236 miles) above the earth's equator. Even at the speed of light (about 300,000km/s or 186,000 miles per second), it takes a quarter of a second for a radio signal to travel from the earth to the satellite and back. When other switching and routing delays are added and the delays are doubled to allow for a full round-trip transmission, the total delay can be 0.75 to 1.25 seconds. This latency is large when compared to other forms of Internet access with typical latencies that range from 0.015 to 0.2 seconds. Long latencies can make some applications, such as video conferencing, voice over IP, multiplayer games, and remote control of equipment, that require a real-time response impracticable via satellite. TCP tuning and TCP acceleration techniques can mitigate some of these problems. GEO satellites do not cover the earth's polar regions.[58] HughesNet and ViaSat are GEO systems. Satellites in Low Earth orbit (LEO, below 2000km or 1243 miles) and Medium earth orbit (MEO, between 2000 and 35,786km or 1,243 and 22,236 miles) are less common, operate at lower altitudes, and are not fixed in their position above the earth. Lower altitudes allow lower latencies and make real-time interactive Internet applications feasible. LEO systems include Globalstar and Iridium. The O3b Satellite Constellation is a proposed MEO system with a latency of 125 ms. COMMStellation is a LEO system, scheduled for launch in 2015, that is expected to have a latency of just 7ms.
Internet access Mobile broadband Mobile broadband is the marketing term for wireless Internet access delivered through mobile phone towers to computers, mobile phones (called "cell phones" in North America and South Africa), and other digital devices using portable modems. Some mobile services allow more than one device to be connected to the Internet using a single cellular connection using a process called tethering. The modem may be built into laptop computers, tablets, mobile phones, and other devices, added to some devices using PC cards, USB modems, and USB sticks or dongles, or separate wireless modems can be used.[59] Roughly every ten years new mobile phone technology and infrastructure involving a change in the fundamental nature of the service, non-backwards-compatible transmission technology, higher peak data rates, new frequency bands, wider channel frequency bandwidth in Hertz becomes available. These transitions are referred to as generations:
Second generation (2G) from 1991: first mobile data services GSM CSD (2G): 9.6 kbit/s GSM GPRS (2.5G): 56 to 115 kbit/s GSM EDGE (2.75G): up to 237 kbit/s Third generation (3G) from 2001: UMTS W-CDMA: 0.4 Mbit/s down and up UMTS HSPA: 14.4 Mbit/s down; 5.8 Mbit/s up UMTS TDD: 16 Mbit/s down and up CDMA2000 1xRTT: 0.3 Mbit/s down; 0.15 Mbit/s up CDMA2000 EV-DO: 2.5 to 4.9 Mbit/s down; 0.15 to 1.8 up GSM EDGE-Evolution: 1.6 Mbit/s down; 0.5 Mbit/s up Fourth generation (4G) from 2006: HSPA+: 21 to 672 Mbit/s down; 5.8 to 168 Mbit/s up Mobile WiMAX (802.16): 37 to 365 Mbit/s down; 17 to 376 Mbit/s up LTE: 100 to 300 Mbit/s down; 50 to 75 Mbit/s up LTE-Advanced: 100 Mbit/s moving at higher speeds to 1 Gbit/s not moving or moving at low speeds MBWA: (802.20): 80 Mbit/s
141
The download (to the user) and upload (to the Internet) data rates given above are peak or maximum rates and end users will typically experience lower data rates. WiMAX (described in more detail above) was originally developed to deliver fixed wireless service with wireless mobility added in 2005. CDMA2000 EV-DO and MBWA (Mobile Broadband Wireless Access) are no longer being actively developed. In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage.[60] Local Multipoint Distribution Service Local Multipoint Distribution Service (LMDS) is a broadband wireless access technology that uses microwave signals operating between 26GHz and 29GHz.[61] Originally designed for digital television transmission (DTV), it is conceived as a fixed wireless, point-to-multipoint technology for utilization in the last mile. Data rates range from 64 kbit/s to 155 Mbit/s.[62] Distance is typically limited to about 1.5 miles (2.4km), but links of up to 5 miles (8km) from the base station are possible in some circumstances.[63] LMDS has been surpassed in both technological and commercial potential by the LTE and WiMAX standards.
Pricing
Dial-up users pay the costs for making local or long distance phone calls, usually pay a monthly subscription fee, and may be subject to additional per minute or traffic based charges, and connect time limits by their ISP. Though less common today than in the past, some dial-up access is offered for "free" in return for watching banner ads as part of the dial-up service. NetZero, BlueLight, Juno, Freenet (NZ), and Free-nets are examples of services providing free access. Some Wireless community networks continue the tradition of providing free Internet access.
Internet access Fixed broadband Internet access is often sold under an "unlimited" or flat rate pricing model, with price determined by the maximum data rate chosen by the customer, rather than a per minute or traffic based charge. Per minute and traffic based charges and traffic caps are common for mobile broadband Internet access. With increased consumer demand for streaming content such as video on demand and peer-to-peer file sharing, demand for bandwidth has increased rapidly and for some ISPs the flat rate pricing model may become unsustainable. However, with fixed costs estimated to represent 80-90% of the cost of providing broadband service, the marginal cost to carry additional traffic is low. Most ISPs do not disclose their costs, but the cost to transmit a gigabyte of data in 2011 was estimated to be about $0.03.[64] Some ISPs estimate that about 5% of their users consume about 50% of the total bandwidth.[65] To ensure these high-bandwidth users do not slow down the network for everyone, some ISPs are considering, are experimenting with, or have implemented combinations of traffic based pricing, time of day or "peak" and "off peak" pricing, and bandwidth or traffic caps.[66][67] In Canada, Rogers Hi-Speed Internet and Bell Canada have imposed bandwidth caps.[65] Time Warner experimented with usage-based pricing in Beaumont, Texas.[68] An effort by Time Warner to expand usage-based pricing into the Rochester, New York area met with public resistance, however, and was abandoned.[69]
142
World population 6.5 billion 7 billion Not using the Internetb Using the Internetb Users in the developing worldb Users in the developed worldb Users in Chinab
a
Internet users by region 2006b Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a
Internet access Access to the Internet grew from an estimated 10 million people in 1993, to almost 40 million in 1995, to 670 million in 2002, and to 2.45 billion in 2011.[60] With market saturation, growth in the number of Internet users is slowing in industrialized countries, but continues in Asia,[70] Africa, Latin America, the Caribbean, and the Middle East. There were roughly 0.6 billion fixed broadband subscribers and almost 1.2 billion mobile broadband subscribers in 2011.[71] In developed countries people frequently use both fixed and mobile broadband networks. In developing countries mobile broadband is often the only access method available.[60]
143
Digital Divide
Despite its tremendous growth, Internet access is not distributed equally within or between [60][72] countries. The digital divide refers to the gap between people with effective access to information and communications technology (ICT), and those with very limited or no access. The gap between people with Internet access and those without is one of many aspects of the List of countries by number of Internet usersInternet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union. digital divide.[73] Whether someone has access to the Internet can depend greatly on financial status, geographical location as well as government policies. Low-income, rural, and minority populations have received special scrutiny as the technological "have-nots."[74] Government policies play a tremendous role in bringing Internet access to or limiting access for underserved groups, regions, and countries. For example in Pakistan, which is pursuing an aggressive IT policy aimed at boosting its drive for economic modernization, the number of Internet users grew from 133,900 (0.1% of the population) in 2000 to 31 million (17.6% of the population) in 2011.[75] In countries such as North Korea and Cuba there is relatively little access to the Internet due to the governments' fear of political instability that might accompany the benefits of access to the global Internet.[76] The U.S. trade embargo is another barrier limiting Internet access in Cuba.[77] In the United States, billions of dollars has been invested in efforts to narrow the digital divide and bring Internet access to more people in low-income and rural areas of the United States. The Obama administration has continued this commitment to narrowing the digital divide through the use of stimulus funding.[74] The National Center for Education Statistics reported that 98% of all U.S. classroom computers had Internet access in 2008 with roughly one computer with Internet access available for every three students. The percentage and ratio of students to computers was the same for rural schools (98% and 1 computer for every 2.9 students).[78] Access to computers is a dominant factor in determining the level of Internet access. In 2011, in developing countries, 25% of households had a computer and 20% had Internet access, while in developed countries the figures were 74% of households had a computer and 71% had Internet access.[60] When buying computers was legalized in Cuba in 2007, the private ownership of computers soared (there were 630,000 computers available on the island in 2008, a 23% increase over 2007).[79][80] Internet access has changed the way in which many people think and has become an integral part of peoples economic, political, and social lives. Providing Internet access to more people in the world allow will them to take advantage of the political, social, economic, educational, and career opportunities available over the Internet.[72] Several of the 67 principles adopted at the World Summit on the Information Society convened by the United
Internet access Nations in Geneva in 2003, directly address the digital divide.[81] To promote economic development and a reduction of the digital divide, national broadband plans have been and are being developed to increase the availability of affordable high-speed Internet access throughout the world.
144
Rural access
One of the great challenges for Internet access in general and for broadband access in particular is to provide service to potential customers in areas of low population density, such as to farmers, ranchers, and small towns. In cities where the population density is high, it is easier for a service provider to recover equipment costs, but each rural customer may require expensive equipment to get connected. While 66% of Americans had an Internet connection in 2010, that figure was only 50% in rural areas, according to the Pew Internet & American Life Project.[82] Virgin Media advertised over 100 towns across the United Kingdom "from Cwmbran to Clydebank" that have access to their 100Mbit/s service.[19] Wireless Internet Service Provider (WISPs) are rapidly becoming a popular broadband option for rural areas.[83] The technology's line-of-sight requirements may hamper connectivity in some areas with hilly and heavily foliated terrain. However, the Tegola project, a successful pilot in remote Scotland, demonstrates that wireless can be a viable option.[84] The Broadband for Rural Nova Scotia initiative is the first program in North America to guarantee access to "100% of civic addresses" in a region. It is based on Motorola Canopy technology. As of November 2011, under 1000 households have reported access problems. Deployment of a new cell network by one Canopy provider (Eastlink) was expected to provide the alternative of 3G/4G service, possibly at a special unmetered rate, for areas harder to serve by Canopy.[85]
Internet access electronically transmitted information.[90] Spain: Starting in 2011, Telefnica, the former state monopoly that holds the country's "universal service" contract, has to guarantee to offer "reasonably" priced broadband of at least one megabyte per second throughout Spain.[91] In December 2003, the World Summit on the Information Society (WSIS) was convened under the auspice of the United Nations. After lengthy negotiations between governments, businesses and civil society representatives the WSIS Declaration of Principles was adopted reaffirming the importance of the Information Society to maintaining and strengthening human rights:[] [92] 1. We, the representatives of the peoples of the world, assembled in Geneva from 1012 December 2003 for the first phase of the World Summit on the Information Society, declare our common desire and commitment to build a people-centred, inclusive and development-oriented Information Society, where everyone can create, access, utilize and share information and knowledge, enabling individuals, communities and peoples to achieve their full potential in promoting their sustainable development and improving their quality of life, premised on the purposes and principles of the Charter of the United Nations and respecting fully and upholding the Universal Declaration of Human Rights. 3. We reaffirm the universality, indivisibility, interdependence and interrelation of all human rights and fundamental freedoms, including the right to development, as enshrined in the Vienna Declaration. We also reaffirm that democracy, sustainable development, and respect for human rights and fundamental freedoms as well as good governance at all levels are interdependent and mutually reinforcing. We further resolve to strengthen the rule of law in international as in national affairs. The WSIS Declaration of Principles makes specific reference to the importance of the right to freedom of expression in the "Information Society" in stating: 4. We reaffirm, as an essential foundation of the Information Society, and as outlined in Article 19 of the Universal Declaration of Human Rights, that everyone has the right to freedom of opinion and expression; that this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Communication is a fundamental social process, a basic human need and the foundation of all social organisation. It is central to the Information Society. Everyone, everywhere should have the opportunity to participate and no one should be excluded from the benefits of the Information Society offers."[92] A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[93] conducted for the BBC World Service between 30 November 2009 and 7 February 2010 found that almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right.[94] 50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion.[95] The 88 recommendations made by the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression in a May 2011 report to the Human Rights Council of the United Nations General Assembly include several that bear on the question of the right to Internet access:[96] 67. Unlike any other medium, the Internet enables individuals to seek, receive and impart information and ideas of all kinds instantaneously and inexpensively across national borders. By vastly expanding the capacity of individuals to enjoy their right to freedom of opinion and expression, which is an enabler of other human rights, the Internet boosts economic, social and political development, and contributes to the progress of humankind as a whole. In this regard, the Special Rapporteur encourages other Special Procedures mandate holders to engage on the issue of the Internet with respect to their particular mandates. 78. While blocking and filtering measures deny users access to specific content on the Internet, States have also taken measures to cut off access to the Internet entirely. The Special Rapporteur considers cutting off users from Internet access, regardless of the justification provided, including on the grounds of violating
145
Internet access intellectual property rights law, to be disproportionate and thus a violation of article 19, paragraph 3, of the International Covenant on Civil and Political Rights. 79. The Special Rapporteur calls upon all States to ensure that Internet access is maintained at all times, including during times of political unrest. 85. Given that the Internet has become an indispensable tool for realizing a range of human rights, combating inequality, and accelerating development and human progress, ensuring universal access to the Internet should be a priority for all States. Each State should thus develop a concrete and effective policy, in consultation with individuals from all sections of society, including the private sector and relevant Government ministries, to make the Internet widely available, accessible and affordable to all segments of population. These statements, opinions, and recommendations have led to the suggestion that Internet access itself is or should become a fundamental human right.[97][98]
146
Internet access
147
References
[1] The 34 OECD countries are: Australia, Austria, Belgium, Canada, Chile, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. OECD members (http:/ / www. oecd. org/ pages/ 0,3417,en_36734052_36761800_1_1_1_1_1,00. html), accessed 31 April 2012 [2] "OECD Broadband Report Questioned" (http:/ / www. websiteoptimization. com/ bw/ 0705/ ). Website Optimization. . Retrieved June 6, 2009. [3] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [4] Rseaux IP Europens (RIPE) [5] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved 25 December 2005. [6] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [7] "What is Broadband?" (http:/ / www. broadband. gov/ about_broadband. html/ ). The National Broadband Plan. US Federal Communications Commission. . Retrieved July 15, 2011. [8] "Inquiry Concerning the Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion, and Possible Steps to Accelerate Such Deployment Pursuant to Section 706 of the Telecommunications Act of 1996, as Amended by the Broadband Data Improvement Act" (http:/ / transition. fcc. gov/ Daily_Releases/ Daily_Business/ 2010/ db0806/ FCC-10-148A1. pdf). GN Docket No. 10-159, FCC-10-148A1. Federal Communications Commission. August 6, 2010. . Retrieved July 12, 2011. [9] Naveen Bisht; James Connor. "Broadband to the Home: Trends and Issues" (http:/ / books. google. com/ books?id=ipmF3npkMngC& pg=PA1). Broadband Services, Applications, and Networks: Enabling Technologies and Business Models. International Engineering Consortium. p.1. ISBN978-1-931695-24-4. . [10] "How Broadband Works" (http:/ / www. explainthatstuff. com/ howbroadbandworks. html), Chris Woodford, Explain that Stuff, 20 August 2008. Retrieved 19 January. [11] Jeffrey A. Hart; Robert R. Reed; Franois Bar (November 1992). "The building of the internet: Implications for the future of broadband networks". Telecommunications Policy 16 (8): 666689. doi:10.1016/0308-5961(92)90061-S. [12] The Future of the Internet Economy: A Statistical Profile (http:/ / www. oecd. org/ dataoecd/ 24/ 5/ 48255770. pdf), Organization for Economic Co-Operation and Development (OECD), June 2011 [13] Willdig, Karl; Patrik Chen (August 1994). "What You Need to Know about Modems" (http:/ / fndcg0. fnal. gov/ Net/ modm8-94. txt). . Retrieved 2008-03-02. [14] Mitronov, Pavel (2001-06-29). "Modem compression: V.44 against V.42bis" (http:/ / www. digit-life. com/ articles/ compressv44vsv42bis/ ). Digit-Life.com. . Retrieved 2008-03-02. [15] "Birth of Broadband" (http:/ / www. itu. int/ osg/ spu/ publications/ birthofbroadband/ faq. html). ITU. September 2003. . Retrieved July 12, 2011. [16] "Recommendation I.113, Vocabulary of Terms for Broadband aspects of ISDN" (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 113-199706-I!!PDF-E). ITU-T. June 1997 (originally 1988). . Retrieved 19 July 2011. [17] "Sixth Broadband Deployment Report" (http:/ / hraunfoss. fcc. gov/ edocs_public/ attachmatch/ FCC-10-129A1. pdf). FCC. . Retrieved July 23, 2010. [18] Patel, Nilay (March 19, 2008). "FCC redefines "broadband" to mean 768kbit/s, "fast" to mean "kinda slow"" (http:/ / www. engadget. com/ 2008/ 03/ 19/ fcc-redefines-broadband-to-mean-768kbps-fast-to-mean-kinda/ ). Engadget. . Retrieved June 6, 2009. [19] "Virgin Medias ultrafast 100Mb broadband now available to over four million UK homes" (http:/ / mediacentre. virginmedia. com/ Stories/ Virgin-Media-s-ultrafast-100Mb-broadband-now-available-to-over-four-million-UK-homes-211c. aspx). News release. Virgin Media. June 10, 2011. . Retrieved August 18, 2011. [20] Tom Phillips (August 25, 2010). "'Misleading' BT broadband ad banned" (http:/ / www. metro. co. uk/ tech/ 839014-misleading-bt-broadband-ad-banned). UK Metro. . Retrieved July 24, 2011. [21] Gary A. Donahue (June 2007). Network Warrior (http:/ / shop. oreilly. com/ product/ 9780596101510. do). O'Reilly. p.600. ISBN0-596-10151-1. . [22] Dean, Tamara (2010). Network+ Guide to Networks, 5th Ed. [23] "Bonding: 112K, 168K, and beyond " (http:/ / www. 56k. com/ reports/ bonding. shtml), 56K.com [24] "Diamond 56k Shotgun Modem" (http:/ / www. maximumpc. com/ article/ features/ top_tech_blunders_10_products_massively_failed), maximumpc.com [25] William Stallings (1999). ISDN and Broadband ISDN with Frame Relay and ATM (http:/ / www. pearsonhighered. com/ educator/ product/ ISDN-and-Broadband-ISDN-with-Frame-Relay-and-ATM-4E/ 9780139737442. page) (4th ed.). Prentice Hall. p.542. ISBN0139737448. . [26] Telecommunications and Data Communications Handbook (http:/ / www. wiley. com/ WileyCDA/ WileyTitle/ productCd-0470396075. html), Ray Horak, 2nd edition, Wiley-Interscience, 2008, 791 p., ISBN 0-470-39607-5 [27] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . pp 312-315.
Internet access
[28] "IEEE 802.3 Ethernet Working Group" (http:/ / www. ieee802. org/ 3/ ), web page, IEEE 802 LAN/MAN Standards Committee, accessed 8 May 2012 [29] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . p 322. [30] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . p 323. [31] "ADSL Theory" (http:/ / whirlpool. net. au/ wiki/ ?tag=ADSL_Theory), Australian broadband news and information, Whirlpool, accessed 3 May 2012 [32] "SDSL" (http:/ / docwiki. cisco. com/ wiki/ Digital_Subscriber_Line#SDSL), Internetworking Technology Handbook, Cisco DocWiki, 17 December 2009, accessed 3 May 2012 [33] "KPN starts VDSL trials" (http:/ / www. kpn. com/ artikel. htm?contentid=2895). KPN. . [34] "VDSL Speed" (http:/ / computer. howstuffworks. com/ vdsl2. htm). HowStuffWorks. . [35] "Industrial VDSL Ethernet Extender Over Coaxial Cable, ED3331" (http:/ / www. etherwan. com/ Product/ ViewProduct. asp?View=64). EtherWAN. . [36] "New ITU Standard Delivers 10x ADSL Speeds: Vendors applaud landmark agreement on VDSL2" (http:/ / www. itu. int/ newsroom/ press_releases/ 2005/ 06. html). News release (International Telecommunication Union). 27 May 2005. . Retrieved 22 September 2011. [37] Sturgeon, Jamie (October 18, 2010). "A smarter route to high-speed Net" (http:/ / www. financialpost. com/ entrepreneur/ smarter+ route+ high+ speed/ 3687154/ story. html). FP Entrepreneur (National Post). . Retrieved January 7, 2011. [38] "FTTH Council - Definition of Terms" (http:/ / ftthcouncil. eu/ documents/ Reports/ FTTH-Definitions-Revision_January_2009. pdf). FTTH Council. January 9, 2009. . Retrieved September 1, 2011. [39] "FTTx Primer" (http:/ / www. fiopt. com/ primer. php), Fiopt Communication Services (Calgary), July 2008 [40] "Big gig: NBN to be 10 times faster" (http:/ / www. abc. net. au/ news/ 2010-08-12/ big-gig-nbn-to-be-10-times-faster/ 941408), Emma Rodgers, ABC News, Australian Broadcasting Corporation, 12 August 2010 [41] "Italy gets fiber back on track" (http:/ / www. telecomseurope. net/ content/ italy-gets-fiber-back-track), Michael Carroll, TelecomsEMEA.net, 20 September 2010 [42] "Pirelli Broadband Solutions, the technology partner of fastweb network Ngan" (http:/ / www. freevoipcallsolution. com/ 2010/ 08/ pirelli-broadband-solutions-technology. html), 2 August 2010 [43] "Telecom Italia rolls out 100 Mbps FTTH services in Catania" (http:/ / www. fiercetelecom. com/ story/ telecom-italia-rolls-out-100-mbps-ftth-services-catania/ 2010-11-03?utm_medium=rss& utm_source=rss), Sean Buckley, FierceTelecom, 3 November 2010 [44] "SaskTel Announces 2011 Network Investment and Fiber to the Premises Program" (http:/ / www. sasktel. com/ about-us/ news/ 2011-news-releases/ sasktel-announces-2011-network-investment-and-fiber-to-the-premises. html), SaskTel, Saskatchewan Telecommunications Holding Corporation, 5 April 2011 [45] "How Broadband Over Powerlines Works" (http:/ / computer. howstuffworks. com/ bpl. htm), Robert Valdes, How Stuff Works, accessed 5 May 2012 [46] "North American versus European distribution systems" (http:/ / electrical-engineering-portal. com/ north-american-versus-european-distribution-systems), Edvard, Technical articles, Electrical Engineering Portal, 17 November 2011 [47] B-ISDN asynchronous transfer mode functional characteristics (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 150-199902-I!!PDF-E& type=items), ITU-T Recommendation I.150, February 1999, International Telecommunications Union [48] "Frame Relay" (http:/ / searchenterprisewan. techtarget. com/ definition/ frame-relay), Margaret Rouse, TechTarget, September 2005 [49] "Wi-Fi (wireless networking technology)" (http:/ / www. britannica. com/ EBchecked/ topic/ 1473553/ Wi-Fi). Encyclopdia Britannica. . Retrieved 2010-02-03. [50] Lemstra, Wolter; Hayes, Vic; Groenewegen, John (2010), The Innovation Journey of Wi-Fi: The Road To Global Success, Cambridge University Press, ISBN0-521-19971-9. [51] Discover and Learn (http:/ / www. wi-fi. org/ discover-and-learn), The Wi-Fi Alliance, , retrieved 6 May 2012. [52] "802.11n Delivers Better Range" (http:/ / www. wi-fiplanet. com/ tutorials/ article. php/ 3680781). Wi-Fi Planet. 2007-05-31. . [53] Joshua Bardwell; Devin Akin (2005). Certified Wireless Network Administrator Official Study Guide (http:/ / books. google. com/ books?id=QnMunBGVDuMC& printsec=frontcover& dq=cwna+ official+ study+ guide& hl=en& ei=EJaXTpSaFMPSiALTu4HCDQ& sa=X& oi=book_result& ct=result& resnum=1& ved=0CDAQ6AEwAA#v=onepage& q& f=false) (Third ed.). McGraw-Hill. p.418. ISBN978-0-07-225538-6. . [54] "Member Directory" (http:/ / www. wispa. org/ member-directory), Wireless Internet Service Providers Association (WISPA), accessed 5 May 2012 [55] "WiMax Forum - Technology" (http:/ / www. wimaxforum. org/ technology/ ). . Retrieved 2008-07-22. [56] Carl Weinschenk (April 16, 2010). "Speeding Up WiMax". IT Business Edge. "Today the initial WiMax system is designed to provide 30 to 40 megabit-per-second data rates." [57] "Internet in the Sky" (http:/ / iml. jou. ufl. edu/ projects/ Fall99/ Coffey/ ), D.J. Coffey, accessed 8 May 2012 [58] "How does satellite Internet operate?" (http:/ / computer. howstuffworks. com/ question606. htm), How Stuff Works, Retrieved 5 March 2009.
148
Internet access
[59] Mustafa Ergen (2009). Mobile Broadband: including WiMAX and LTE (http:/ / www. springerlink. com/ content/ 978-0-387-68189-4). Springer Science+Business Media. ISBN978-0-387-68189-4. . [60] "The World in 2011: ITC Facts and Figures" (http:/ / www. itu. int/ ITU-D/ ict/ facts/ 2011/ material/ ICTFactsFigures2011. pdf), International Telecommunications Unions (ITU), Geneva, 2011 [61] "Local Multipoint Distribution Service (LDMS)" (http:/ / www. cse. wustl. edu/ ~jain/ cis788-99/ ftp/ lmds/ index. html), Vinod Tipparaju, November 23, 1999 [62] "LMDS: Broadband Out of Thin Air " (http:/ / www. angelfire. com/ nd/ ramdinchacha/ DEC00. html), Niraj K Gupta, from My Cell, Voice & Data, December 2000 [63] "Review and Analysis of Local Multipoint Distribution System (LMDS) to Deliver Voice, Data, Internet, and Video Services" (http:/ / www. ijest. info/ docs/ IJEST09-01-01. pdf), S.S. Riaz Ahamed, International Journal of Engineering Science and Technology, Vol. 1(1), October 2009, pp. 1-7 [64] "What is a fair price for Internet service?" (http:/ / www. theglobeandmail. com/ news/ technology/ gadgets-and-gear/ hugh-thompson/ what-is-a-fair-price-for-internet-service/ article1890596/ ), Hugh Thompson, Globe and Mail (Toronto), 1 February 2011 [65] Hansell, Saul (January 17, 2008). "Time Warner: Download Too Much and You Might Pay $30 a Movie" (http:/ / bits. blogs. nytimes. com/ 2008/ 01/ 17/ time-warner-download-too-much-and-you-might-pay-30-a-movie/ ?ref=technology). The New York Times. . Retrieved June 6, 2009. [66] "On- and Off-Peak Quotas" (http:/ / www. comparebroadband. com. au/ article_64_On--and-Off-Peak-Quotas. htm), Compare Broadband, 12 July 2009 [67] Cauley, Leslie (April 20, 2008). "Comcast opens up about how it manages traffic" (http:/ / abcnews. go. com/ Technology/ Story?id=4692338& page=1). ABC News. . Retrieved June 6, 2009. [68] Lowry, Tom (March 31, 2009). "Time Warner Cable Expands Internet Usage Pricing" (http:/ / www. businessweek. com/ technology/ content/ mar2009/ tc20090331_726397. htm?campaign_id=rss_daily). BusinessWeek. . Retrieved June 6, 2009. [69] Axelbank, Evan (April 16, 2009). "Time Warner Drops Internet Plan" (http:/ / rochesterhomepage. net/ fulltext?nxd_id=85011). Rochester Homepage. . Retrieved December 6, 2010. [70] "The lives of Asian youth" (http:/ / www. synovate. com/ changeagent/ index. php/ site/ full_story/ the_lives_of_asian_youth/ ), Change Agent, August 2005 [71] Giga.com (http:/ / gigaom. com/ 2010/ 07/ 09/ worldwide-broadband-subscribers/ ) Nearly Half a Billion Broadband Subscribers [72] Amir Hatem Ali, A. (2011). "The power of social media in developing nations" (http:/ / harvardhrj. com/ wp-content/ uploads/ 2009/ 09/ 185-220. pdf), Human Rights Journal, Harvard Law School, Vol. 24, Issue 1 (2011), pp. 185-219 [73] Wattal, S.; Yili Hong; Mandviwalla, M.; Jain, A., "Technology Diffusion in the Society: Analyzing Digital Divide in the Context of Social Class (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=5718600)", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), pp.1-10, 47 January 2011, ISBN 978-0-7695-4282-9 [74] McCollum, S., "Getting Past the 'Digital Divide'" (http:/ / www. tolerance. org/ magazine/ number-39-spring-2011/ getting-past-digital-divide), Teaching Tolerance, No. 39 (Spring 2011), pp. 46-49, and Education Digest, Vol. 77 No. 2 (October 2011), pp. 52-55 [75] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union, March 2010. Accessed on 21 October 2011. [76] Zeller Jr, Tom (October 23, 2006). "LINK BY LINK; The Internet Black Hole That Is North Korea" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9E0CEEDF173FF930A15753C1A9609C8B63& n=Top/ Reference/ Times Topics/ People/ K/ Kim Jong Il). The New York Times. . Retrieved May 5, 2010. [77] The state of the Internet in Cuba, January 2011 (http:/ / som. csudh. edu/ fac/ lpress/ cuba/ chapters/ lpdraft2. docx), Larry Press, Professor of Information Systems at California State University, January 2011 [78] "Table 108: Number and internet access of instructional computers and rooms in public schools, by selected school characteristics: Selected years, 1995 through 2008" (http:/ / nces. ed. gov/ programs/ digest/ d10/ tables/ dt10_108. asp), 2010 Tables and Figures, National Center for Education Statistics, U.S. Department of Education, August 2010, accessed 28 April 2012 [79] "Changes in Cuba: From Fidel to Raul Castro" (http:/ / books. google. com/ books?id=Q2qQZfkOCNsC& pg=PA114& lpg=PA114& dq=Private+ ownership+ of+ computers+ in+ Cuba& source=bl& ots=bKMn5ZraA6& sig=8CcYmtODxcyXSr9LxtjatH_vkdE& hl=en& ei=ydWPTuKbLcaWtweR_qCNDA& sa=X& oi=book_result& ct=result& resnum=4& ved=0CDAQ6AEwAw#v=onepage& q=Private ownership computers& f=false), Perceptions of Cuba: Canadian and American policies in comparative perspective, Lana Wylie, University of Toronto Press Incorporated, 2010, p. 114, ISBN 978-1-4426-4061-0 [80] "Cuba to keep internet limits" (http:/ / www. allbusiness. com/ media-telecommunications/ internet-www/ 11795551-1. html). Agence France-Presse (AFP). 9 February 2009. . [81] "Declaration of Principles" (http:/ / www. itu. int/ wsis/ docs/ geneva/ official/ dop. html), WSIS-03/GENEVA/DOC/4-E, World Summit on the Information Society, Geneva, 12 December 2003 [82] Scott, Aaron (August 11, 2011). "Trends in broadband adoption" (http:/ / www. pewinternet. org/ Reports/ 2010/ Home-Broadband-2010/ Part-1/ Broadband-adoption-among-African-Americans-grew-significantly-between-2009-and-2010. aspx). Home Broadband 2010. Pew Internet & American Life Project. . Retrieved December 23, 2011. [83] Wireless World: Wi-Fi now in rural areas (http:/ / www. physorg. com/ news71497509. html) July 7, 2006
149
Internet access
[84] "Tegola project linking Skye, Knoydart and Loch Hourne" (http:/ / www. tegola. org. uk). . Retrieved 2010-03-16. [85] "Broadband for Rural Nova Scotia" (http:/ / www. gov. ns. ca/ econ/ broadband/ ), Economic and Rural Development, Nova Soctia, Canada, access 27 April 2012 [86] "Judgement 12790 of the Supreme Court" (http:/ / 200. 91. 68. 20/ pj/ scij/ busqueda/ jurisprudencia/ jur_texto_sentencia. asp?nValor2=483874& tem1=013141& param7=0& lResultado=3& nValor1=1& strTipM=T& strLib=LIB), File 09-013141-0007-CO, 30 July 2010. ( English translation (http:/ / www. google. com/ translate_c?langpair=en& u=http:/ / 200. 91. 68. 20/ pj/ scij/ busqueda/ jurisprudencia/ jur_texto_sentencia. asp?nValor2=483874& tem1=013141& param7=0& lResultado=3& nValor1=1& strTipM=T& strLib=LIB)) [87] "Estonia, where being wired is a human right" (http:/ / www. csmonitor. com/ 2003/ 0701/ p07s01-woeu. html), Colin Woodard, Christian Science Monitor, 1 July 2003 [88] "Finland makes 1Mb broadband access a legal right" (http:/ / news. cnet. com/ 8301-17939_109-10374831-2. html), Don Reisinger, CNet News, 14 October 2009 [89] "Top French Court Declares Internet Access 'Basic Human Right'" (http:/ / www. foxnews. com/ story/ 0,2933,525993,00. html). London Times (Fox News). 12 June 2009. . [90] Constitution of Greece As revised by the parliamentary resolution of May 27th 2008 of the VIIIth Revisionary Parliament (http:/ / www. hellenicparliament. gr/ UserFiles/ f3c70a23-7696-49db-9148-f24dce6a27c8/ 001-156 aggliko. pdf), English language translation, Hellenic Parliament [91] Sarah Morris (17 November 2009). "Spain govt to guarantee legal right to broadband" (http:/ / www. reuters. com/ article/ idUSLH61554320091117). Reuters. . [92] Klang, Mathias; Murray, Andrew (2005). Human Rights in the Digital Age (http:/ / www. psypress. com/ 9781904385318). Routledge. p.1. . [93] For the BBC poll Internet users are those who used the Internet within the previous six months. [94] "BBC Internet Poll: Detailed Findings" (http:/ / news. bbc. co. uk/ 1/ shared/ bsp/ hi/ pdfs/ 08_03_10_BBC_internet_poll. pdf), BBC World Service, 8 March 2010 [95] "Internet access is 'a fundamental right'" (http:/ / news. bbc. co. uk/ 2/ hi/ 8548190. stm), BBC News, 8 March 2010 [96] "VI. Conclusions and recommendations" (http:/ / www2. ohchr. org/ english/ bodies/ hrcouncil/ docs/ 17session/ A. HRC. 17. 27_en. pdf), Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, Human Rights Council, Seventeenth session Agenda item 3, United Nations General Assembly, 16 May 2011 [97] "Can the Internet be a Human Right?" (http:/ / www. du. edu/ gsis/ hrhw/ volumes/ 2004/ best-2004. pdf), Michael L. Best, Human rights & Human Welfare, Vol. 4 (2004) [98] Kravets, David (June 3, 2011). "U.N. Report Declares Internet Access a Human Right" (http:/ / www. wired. com/ threatlevel/ 2011/ 06/ internet-a-human-right/ ). Wired. . [99] Measuring the Resilience of the Global Internet Infrastructure System (http:/ / www. stevens-tech. edu/ csr/ fileadmin/ csr/ Publications/ Omer_Measuring_the_Resilience_of_the_Global_Internet__Infrastructure. pdf), 2009 3rd Annual IEEE Systems Conference, 156-162. [100] Inference of Network-Service Disruption upon Natural Disasters (http:/ / users. ece. gatech. edu/ ~jic/ katrina. pdf), accessed 12/05/12. [101] Impact of Hurricane Katrina on Internet Infrastructure (http:/ / www. renesys. com/ tech/ presentations/ pdf/ Renesys-Katrina-Report-9sep2005. pdf), Renesys Report, 9 September 2005, accessed 12/05/2012. [102] Cisco trucks help restore internet after disasters (http:/ / abclocal. go. com/ kgo/ story?section=news/ business& id=8867345), ABC News report, 30 October 2012, accessed 12/05/2012. [103] Taiwans Earthquake and Tsunami Caused Internet accesss Interference (http:/ / www. telkom. co. id/ media-corner/ press-release/ taiwan-s-earthquake-and-tsunami-caused-internet-access-s-interference. html), Telkom Indonesia Press Release, 27 December 2006, accessed 12/05/2012. [104] Impact of Taiwan Earthquake on Internet Access (http:/ / www. ust. hk/ itsc/ channel/ 2007feb/ earthquake. html), Choy, C. (2007). Channel, The Hong Kong University of Science & Technology, 46. Accessed 12/05/2012. [105] Understanding and Mitigating Catastrophic Disruption and Attack (http:/ / www. noblis. org/ NewsPublications/ Publications/ TechnicalPublications/ SigmaJournal/ Documents/ Sigma_RE_UnderstandingAndMitigating. pdf), Masi, D., Smith E., Fischer M. Telecommunications and Cybersecurity, Noblis. Accessed 12/05/2012. [106] Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region (http:/ / aws. amazon. com/ message/ 65648/ ), AWS message, 29 April 2011, accessed 12/05/2012. [107] [ https:/ / aws. amazon. com/ message/ 67457/ Summary of the AWS Service Event in the US East Region], AWS message, 2 July 2012, accessed 12/05/2012. [108] AWS is down: Why the sky is falling (http:/ / justinsb. posterous. com/ aws-down-why-the-sky-is-falling), justinsb's posterous, 21 April 2011, accessed 12/05/2012. [109] Amazon Web Services June 2012 Outage Explained (http:/ / cloud-computing-today. com/ 2012/ 06/ 18/ amazon-web-services-june-2012-outage-explained/ ), Cloud Computing Today, 18 June 2012, accessed 12/05/2012. [110] Will Natural Disasters Kill the Cloud? (http:/ / crashcloud. com/ will-natural-disasters-kill-cloud/ ), CrashCloud, 21 August 2012, accessed 12/05/2012.
150
Internet access
151
External links
European broadband (http://ec.europa.eu/information_society/eeurope/i2010/digital_divide/index_en. htm#European_broadband_portal) Corporate vs. Community Internet (http://www.alternet.org/story/22216/), AlterNet, June 14, 2005, - on the clash between US cities' attempts to expand municipal broadband and corporate attempts to defend their markets Broadband data (http://www.google.com/publicdata/directory#!q=broadband), from Google public data US National Broadband Maps (http://broadbandmap.gov)
History
The Internet began as a network funded by the U.S. government to support projects within the government and at universities and research laboratories in the US - but grew over time to include most of the world's large universities and the research arms of many technology companies.[3][4][5] Use by a wider audience only came in 1995 when restrictions on the use of the Internet to carry commercial traffic were lifted.[6] In the early to mid-1980s, most Internet access was from personal computers and workstations directly connected to local area networks or from dial-up connections using modems and analog telephone lines. LANs typically operated at 10 Mbit/s and grew to support 100 and 1000 Mbit/s, while modem data rates grew from 1200 and 2400 bit/s in the 1980s, to 28 and 56 kbit/s by the mid to late 1990s. Initially dial-up connections were made from terminals or computers running terminal emulation software to terminal servers on LANs. These dial-up connections did not support end-to-end use of the Internet protocols and only provided terminal to host connections. The introduction of network access servers (NASs) supporting the Serial Line Internet Protocol (SLIP) and later the Point-to-point protocol (PPP) extended the Internet protocols and made the full range of Internet services available to dial-up users, subject only to limitations imposed by the lower data rates available using dial-up. Broadband Internet access, often shortened to just broadband and also known as high-speed Internet access, are services that provide bit-rates considerably higher than that available using a 56 kbit/s modem. In the U.S. National Broadband Plan of 2009, the Federal Communications Commission (FCC) defined broadband access as "Internet access that is always on and faster than the traditional dial-up access",[7] although the FCC has defined it differently through the years.[8] The term broadband was originally a reference to multi-frequency communication, as opposed to narrowband or baseband. Broadband is now a marketing term that telephone, cable, and other companies use to sell their more expensive higher data rate products.[9] Most broadband services provide a continuous "always on" connection; there is no dial-in process required, and it does not hog phone lines.[10] Broadband provides improved access to Internet services such as: Faster world wide web browsing Faster downloading of documents, photographs, videos, and other large files Telephony, radio, television, and videoconferencing Virtual private networks and remote system administration Online gaming, especially massively multiplayer online role-playing games which are interaction-intensive
Broadband Internet access In the 1990s, the National Information Infrastructure initiative in the U.S. made broadband Internet access a public policy issue.[11] In 2000, most Internet access to homes was provided using dial-up, while many businesses and schools were using broadband connections. In 2000 there were just under 150 million dial-up subscriptions in the 34 OECD countries[1] and fewer than 20 million broadband subscriptions. By 2004, broadband had grown and dial-up had declined so that the number of subscriptions were roughly equal at 130 million each. In 2010, in the OECD countries, over 90% of the Internet access subscriptions used broadband, broadband had grown to more than 300 million subscriptions, and dial-up subscriptions had declined to fewer than 30 million.[12] The broadband technologies in widest use are ADSL and cable Internet access. Newer technologies include VDSL and optical fibre extended closer to the subscriber in both telephone and cable plants. Fibre-optic communication, while only recently being used in premises and to the curb schemes, has played a crucial role in enabling broadband Internet access by making transmission of information at very high data rates over longer distances much more cost-effective than copper wire technology. In areas not served by ADSL or cable, some community organizations and local governments are installing Wi-Fi networks. Wireless and satellite Internet are often used in rural, undeveloped, or other hard to serve areas where wired Internet is not readily available. Newer technologies being deployed for fixed (stationary) and mobile broadband access include WiMAX, LTE, and fixed wireless, e.g., Motorola Canopy. Starting in roughly 2006, mobile broadband access is increasingly available at the consumer level using "3G" and "4G" technologies such as HSPA, EV-DO, HSPA+, and LTE.
152
Availability
In addition to access from home, school, and the workplace Internet access may be available from public places such as libraries and Internet cafes, where computers with Internet connections are available. Some libraries provide stations for connecting users' laptops to local area networks (LANs). Wireless Internet access points are available in public places such as airport halls, in some cases just for brief use while standing. Some access points may also provide coin operated computers. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels also have public terminals, usually fee based. Coffee shops, shopping malls, and other venues increasingly offer wireless access to computer networks, referred to as hotspots, for users who bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. And Mobile broadband access allows smart phones and other digital devices to connect to the Internet from any location from which a mobile phone call can be made.
Data rates
153
8,000 Mbit/s 1,000 MB/s 8,000 Gbit/s 1,000 GB/s 8,000 Tbit/s 1,000 TB/s
The bit rates for dial-up modems range from as little as 110 bit/s in the late 1950s, to a maximum of from 33 to 64 kbit/s (V.90 and V.92) in the late 1990s. Dial-up connections generally require the dedicated use of a telephone line. Data compression can boost the effective bit rate for a dial-up modem connection to from 220 (V.42bis) to 320 (V.44) kbit/s.[13] However, the effectiveness of data compression is quite variable, depending on the type of data being sent, the condition of the telephone line, and a number of other factors. In reality, the overall data rate rarely exceeds 150 kbit/s.[14] Broadband technologies supply considerably higher bit rates than dial-up, generally without disrupting regular telephone use. Various minimum data rates and maximum latencies have been used in definitions of broadband, ranging from 64kbit/s up to 4.0Mbit/s.[15] In 1988 the CCITT standards body defined "broadband service" as requiring transmission channels capable of supporting bit rates greater than the primary rate which ranged from about 1.5 to 2Mbit/s.[16] A 2006 Organization for Economic Co-operation and Development (OECD) report defined broadband as having download data transfer rates equal to or faster than 256kbit/s.[1] And in 2010 the U.S. Federal Communications Commission (FCC) defined "Basic Broadband" as data transmission speeds of at least 4 Mbit/s downstream (from the Internet to the users computer) and 1Mbit/s upstream (from the users computer to the Internet).[17] The trend is to raise the threshold of the broadband definition as higher data rate services become available.[18] The higher data rate dial-up modems and many broadband services are "asymmetric"supporting much higher data rates for download (toward the user) than for upload (toward the Internet). Data rates, including those given in this article, are usually defined and advertised in terms of the maximum or peak download rate. In practice, these maximum data rates are not always reliably available to the customer.[19] Actual end-to-end data rates can be lower due to a number of factors.[20] Physical link quality can vary with distance and for wireless access with terrain, weather, building construction, antenna placement, and interference from other radio sources. Network bottlenecks may exist at points anywhere on the path from the end-user to the remote server or service being used and not just on the first or last link providing Internet access to the end-user. Users may share access over a common network infrastructure. Since most users do not use their full connection capacity all of the time, this aggregation strategy (known as contended service) usually works well and users can burst to their full data rate at least for brief periods. However, peer-to-peer (P2P) file sharing and high quality
Broadband Internet access streaming video can require high data rates for extended periods, which violates these assumptions and can cause a service to become oversubscribed, resulting in congestion and poor performance. The TCP protocol includes flow-control mechanisms that automatically throttle back on the bandwidth being used during periods of network congestion. This is fair in the sense that all users that experience congestion receive less bandwidth, but it can be frustrating for customers and a major problem for ISPs. In some cases the amount of bandwidth actually available may fall below the threshold required to support a particular service such as video conferencing or streaming live videoeffectively making the service unavailable. When traffic is particularly heavy, an ISP can deliberately throttle back the bandwidth available to classes of users or for particular services. This is known as traffic shaping and careful use can ensure a better quality of service for time critical services even on extremely busy networks. However, overuse can lead to concerns about fairness and network neutrality or even charges of censorship, when some types of traffic are severely or completely blocked.
154
Technologies
Access technologies generally use a modem, which converts digital data to analog for transmission over analog networks such as the telephone and cable networks.[10]
Dial-up access
Dial-up access uses a modem and a phone call placed over the public switched telephone network (PSTN) to connect to a pool of modems operated by an ISP. The modem converts a computer's digital signal into an analog signal that travels over a phone line's local loop until it reaches a telephone company's switching facilities or central office (CO) where it is switched to another phone line that connects to another modem at the remote end of the connection.[22] Operating on a single channel, a dial-up connection monopolizes the phone line and is one of the slowest methods of accessing the Internet. Dial-up is often the only form of Internet access available in rural areas as it requires no new infrastructure beyond the already existing telephone network, to connect to the Internet. Typically, dial-up connections do not exceed a speed of 56 kbit/s, as they are primarily made using modems that operate at a maximum data rate of 56 kbit/s downstream (towards the end user) and 34 or 48 kbit/s upstream (toward the global Internet).[10]
155
Broadband access
The term broadband includes a broad range of technologies, all of which provide higher data rate access to the Internet. These technologies use wires or fiber optic cables in contrast to wireless broadband described later. Multilink dial-up Multilink dial-up provides increased bandwidth by bonding two or more dial-up connections together and treating them as a single data channel.[23] It requires two or more modems, phone lines, and dial-up accounts, as well as an ISP that supports multilinking - and of course any line and data charges are also doubled. This inverse multiplexing option was briefly popular with some high-end users before ISDN, DSL and other technologies became available. Diamond and other vendors created special modems to support multilinking.[24] Integrated Services Digital Network (ISDN) Integrated Services Digital Network (ISDN), a switched telephone service capable of transporting voice and digital data, is one of the oldest Internet access methods. ISDN has been used for voice, video conferencing, and broadband data applications. ISDN was very popular in Europe, but less common in North America. Its use peaked in the late 1990s before the availability of DSL and cable modem technologies.[25] Basic rate ISDN, known as ISDN-BRI, has two 64 kbit/s "bearer" or "B" channels. These channels can be used separately for voice or data calls or bonded together to provide a 128kbit/s service. Multiple ISDN-BRI lines can be bonded together to provide data rates above 128 kbit/s. Primary rate ISDN, known as ISDN-PRI, has 23 bearer channels (64 kbit/s each) for a combined data rate of 1.5Mbit/s (US standard). An ISDN E1 (European standard) line has 30 bearer channels and a combined data rate of 1.9Mbit/s. Leased lines Leased lines are dedicated lines used primarily by ISPs, business, and other large enterprises to connect LANs and campus networks to the Internet using the existing infrastructure of the public telephone network or other providers. Delivered using wire, optical fiber, and radio, leased lines are used to provide Internet access directly as well as the building blocks from which several other forms of Internet access are created.[26] T-carrier technology dates to 1957 and provides data rates that range from 56 and 64 kbit/s (DS0) to 1.5 Mbit/s (DS1 or T1), to 45 Mbit/s (DS3 or T3). A T1 line carries 24 voice or data channels (24 DS0s), so customers may use some channels for data and others for voice traffic or use all 24 channels for clear channel data. A DS3 (T3) line carries 28 DS1 (T1) channels. Fractional T1 lines are also available in multiples of a DS0 to provide data rates between 56 and 1,500 kbit/s. T-carrier lines require special termination equipment that may be separate from or integrated into a router or switch and which may be purchased or leased from an ISP.[27] In Japan the equivalent standard is J1/J3. In Europe, a slightly different standard, E-carrier, provides 32 user channels (64 kbit/s) on an E1 (2.0 Mbit/s) and 512 user channels or 16 E1s on an E3 (34.4 Mbit/s). Synchronous Optical Networking (SONET, in the U.S. and Canada) and Synchronous Digital Hierarchy (SDH, in the rest of the world) are the standard multiplexing protocols used to carry high data rate digital bit streams over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs). At lower transmission rates data can also be transferred via an electrical interface. The basic unit of framing is an OC-3c (optical) or STS-3c (electrical) which carries 155.520 Mbit/s. Thus an OC-3c will carry three OC-1 (51.84 Mbit/s) payloads each of which has enough capacity to include a full DS3. Higher data rates are delivered in OC-3c multiples of four providing OC-12c (622.080 Mbit/s), OC-48c (2.488 Gbit/s), OC-192c (9.953 Gbit/s), and OC-768c (39.813 Gbit/s). The "c" at the end of the OC labels stands for "concatenated" and indicates a single data stream rather than several multiplexed data streams.[26] The 1, 10, 40, and 100 Gigabit Ethernet (GbE, 10GbE, 40GbE, and 100GbE) IEEE standards (802.3) allow digital data to be delivered over copper wiring at distances to 100 m and over optical fiber at distances to 40km.[28]
Broadband Internet access Cable Internet access Cable Internet or cable modem access provides Internet access via Hybrid Fiber Coaxial wiring originally developed to carry television signals. Either fiber-optic or coaxial copper cable may connect a node to a customer's location at a connection known as a cable drop. In a cable modem termination system, all nodes for cable subscribers in a neighborhood connect to a cable company's central office, known as the "head end." The cable company then connects to the Internet using a variety of means usually fiber optic cable or digital satellite and microwave transmissions.[29] Like DSL, broadband cable provides a continuous connection with an ISP. Downstream, the direction toward the user, bit rates can be as much as 400Mbit/s for business connections, and 100Mbit/s for residential service in some countries. Upstream traffic, originating at the user, ranges from 384kbit/s to more than 20Mbit/s. Broadband cable access tends to service fewer business customers because existing television cable networks tend to service residential buildings and commercial buildings do not always include wiring for coaxial cable networks.[30] In addition, because broadband cable subscribers share the same local line, communications may be intercepted by neighboring subscribers. Cable networks regularly provide encryption schemes for data traveling to and from customers, but these schemes may be thwarted.[29] Digital subscriber line (DSL, ADSL, SDSL, and VDSL)
DSL technologies Standard ADSL ANSI T1.413 Issue 2 ITU G.992.1 (G.DMT) ITU G.992.2 (G.Lite) ITU G.992.3 ITU G.992.4 ITU G.992.3 Annex J ITU G.992.3 Annex L
156
ADSL2
ADSL2+ ITU G.992.5 ITU G.992.5 Annex M HDSL HDSL2 IDSL MSDSL PDSL RADSL SDSL SHDSL UDSL VDSL VDSL2 ITU G.993.1 ITU G.993.2 ITU G.991.2 ITU G.991.1
Digital Subscriber Line (DSL) service provides a connection to the Internet through the telephone network. Unlike dial-up, DSL can operate using a single phone line without preventing normal use of the telephone line for voice phone calls. DSL uses the high frequencies, while the low (audible) frequencies of the line are left free for regular telephone communication.[10] These frequency bands are subsequently separated by filters installed at the customer's premises.
Broadband Internet access DSL originally stood for "digital subscriber loop". In telecommunications marketing, the term digital subscriber line is widely understood to mean Asymmetric Digital Subscriber Line (ADSL), the most commonly installed variety of DSL. The data throughput of consumer DSL services typically ranges from 256kbit/s to 20Mbit/s in the direction to the customer (downstream), depending on DSL technology, line conditions, and service-level implementation. In ADSL, the data throughput in the upstream direction, (i.e. in the direction to the service provider) is lower than that in the downstream direction (i.e. to the customer), hence the designation of asymmetric.[31] With a symmetric digital subscriber line (SDSL), the downstream and upstream data rates are equal.[32] Very-high-bit-rate digital subscriber line (VDSL or VHDSL, ITU G.993.1)[33] is a digital subscriber line (DSL) standard approved in 2001 that provides data rates up to 52 Mbit/s downstream and 16 Mbit/s upstream over copper wires[34] and up to 85 Mbit/s down- and upstream on coaxial cable.[35] VDSL is capable of supporting applications such as high-definition television, as well as telephone services (voice over IP) and general Internet access, over a single physical connection. VDSL2 (ITU-T G.993.2) is a second-generation version and an enhancement of VDSL.[36] Approved in February 2006, it is able to provide data rates exceeding 100 Mbit/s simultaneously in both the upstream and downstream directions. However, the maximum data rate is achieved at a range of about 300 meters and performance degrades as distance and loop attenuation increases. DSL Rings DSL Rings (DSLR) or Bonded DSL Rings is a ring topology that uses DSL technology over existing copper telephone wires to provide data rates of up to 400Mbit/s.[37] Fiber to the home Fiber-to-the-home (FTTH) is one member of the Fiber-to-the-x (FTTx) family that includes Fiber-to-the-building or basement (FTTB), Fiber-to-the-premises (FTTP), Fiber-to-the-desk (FTTD), Fiber-to-the-curb (FTTC), and Fiber-to-the-node (FTTN).[38] These methods all bring data closer to the end user on optical fibers. The differences between the methods have mostly to do with just how close to the end user the delivery on fiber comes. All of these delivery methods are similar to hybrid fiber-coaxial (HFC) systems used to provide cable Internet access. The use of optical fiber offers much higher data rates over relatively longer distances. Most high-capacity Internet and cable television backbones already use fiber optic technology, with data switched to other technologies (DSL, cable, POTS) for final delivery to customers.[39] Australia has already begun rolling out its National Broadband Network across the country using fiber-optic cables to 93 percent of Australian homes, schools, and businesses.[40] Similar efforts are underway in Italy, Canada, India, and many other countries (see Fiber to the premises by country).,[41][42][43][44] Power-line Internet Power-line Internet, also known as Broadband over power lines (BPL), carries Internet data on a conductor that is also used for electric power transmission. Because of the extensive power line infrastructure already in place, this technology can provide people in rural and low population areas access the Internet with little cost in terms of new transmission equipment, cables, or wires. Data rates are asymmetric and generally range from 256 kbit/s to 2.7 Mbit/s.[45] Because these systems use parts of the radio spectrum allocated to other over-the-air communication services, interference between the services is a limiting factor in the introduction of power-line Internet systems. The IEEE P1901 standard specifies that all powerline protocols must detect existing usage and avoid interfering with it.[45] Power-line Internet has developed faster in Europe than in the U.S. due to a historical difference in power system design philosophies. Data signals cannot pass through the step-down transformers used and so a repeater must be installed on each transformer.[45] In the U.S. a transformer serves a small clusters of from one to a few houses. In
157
Broadband Internet access Europe, it is more common for a somewhat larger transformer to service larger clusters of from 10 to 100 houses. Thus a typical U.S. city requires an order of magnitude more repeaters than in a comparable European city.[46] ATM and Frame Relay Asynchronous Transfer Mode (ATM) and Frame Relay are wide area networking standards that can be used to provide Internet access directly or as building blocks of other access technologies. For example many DSL implementations use an ATM layer over the low-level bitstream layer to enable a number of different technologies over the same link. Customer LANs are typically connected to an ATM switch or a Frame Relay node using leased lines at a wide range of data rates.[47][48] While still widely used, with the advent of Ethernet over optical fiber, MPLS, VPNs and broadband services such as cable modem and DSL, ATM and Frame Relay no longer play the prominent role they once did.
158
Wireless ISP Wireless ISPs typically employ low-cost 802.11 Wi-Fi radio systems to link up remote locations over great distances, but may use other higher-power radio communications systems as well. Traditional 802.11b is an unlicensed omnidirectional service designed to span between 100 and 150 meters (300 to 500ft). By focusing the radio signal using a directional antenna 802.11b can operate reliably over a distance of many kilometres (miles), although the technology's line-of-sight requirements hamper connectivity in areas with hilly or heavily foliated terrain. In addition, compared to hard-wired connectivity, there are security risks (unless robust security protocols are enabled); data rates are significantly slower (2 to 50 times slower); and the network can be less stable, due to interference from other wireless devices and networks, weather and line-of-sight problems.[53] Rural Wireless-ISP installations are typically not commercial in nature and are instead a patchwork of systems built up by hobbyists mounting antennas on radio masts and towers, agricultural storage silos, very tall trees, or whatever other tall objects are available. There are currently a number of companies that provide this service.[54] Motorola Canopy and other proprietary technologies offer wireless access to rural and other markets that are hard to reach using Wi-Fi or WiMAX.
159
WiMAX (Worldwide Interoperability for Microwave Access) is a set of interoperable implementations of the IEEE 802.16 family of wireless-network standards certified by the WiMAX Forum. WiMAX enables "the delivery of last mile wireless broadband access as an alternative to cable and DSL".[55] The original IEEE 802.16 standard, now called "Fixed WiMAX", was published in 2001 and provided 30 to 40 megabit-per-second data rates.[56] Mobility support was added in 2005. A 2011 update provides data rates up to 1 Gbit/s for fixed stations. WiMax offers a metropolitan area network with a signal radius of about 50km (30 miles), far surpassing the 30-metre (100-foot) wireless range of a conventional Wi-Fi local area network (LAN). WiMAX signals also penetrate building walls much more effectively than Wi-Fi. Satellite broadband Satellites can provide fixed, portable, and mobile Internet access. It is among the most expensive forms of broadband Internet access, but may be the only choice available in remote areas.[57] Data rates range from 2 kbit/s to 1 Gbit/s downstream and from 2 kbit/s to 10 Mbit/s upstream. Satellite communication typically requires a clear line of sight, will not work well through trees and other vegetation, is adversely affected by moisture, rain, and snow (known as rain fade), and may require a fairly large, carefully aimed, directional antenna. Satellites in geostationary Earth orbit (GEO) operate in a fixed position Satellite Internet access via VSAT in Ghana 35,786km (22,236 miles) above the earth's equator. Even at the speed of light (about 300,000km/s or 186,000 miles per second), it takes a quarter of a second for a radio signal to travel from the earth to the satellite and back. When other switching and routing delays are added and the delays are doubled to allow for a full round-trip transmission, the total delay can be 0.75 to 1.25 seconds. This latency is large when compared to other forms of Internet access with typical latencies that range from 0.015 to 0.2 seconds. Long latencies can make some applications, such as video conferencing, voice over IP, multiplayer games, and remote control of equipment, that require a real-time response impracticable via satellite. TCP tuning and TCP acceleration techniques can mitigate some of these problems. GEO satellites do not cover the earth's polar regions.[58] HughesNet and ViaSat are GEO systems. Satellites in Low Earth orbit (LEO, below 2000km or 1243 miles) and Medium earth orbit (MEO, between 2000 and 35,786km or 1,243 and 22,236 miles) are less common, operate at lower altitudes, and are not fixed in their position above the earth. Lower altitudes allow lower latencies and make real-time interactive Internet applications feasible. LEO systems include Globalstar and Iridium. The O3b Satellite Constellation is a proposed MEO system with a latency of 125 ms. COMMStellation is a LEO system, scheduled for launch in 2015, that is expected to have a latency of just 7ms.
Broadband Internet access Mobile broadband Mobile broadband is the marketing term for wireless Internet access delivered through mobile phone towers to computers, mobile phones (called "cell phones" in North America and South Africa), and other digital devices using portable modems. Some mobile services allow more than one device to be connected to the Internet using a single cellular connection using a process called tethering. The modem may be built into laptop computers, tablets, mobile phones, and other devices, added to some devices using PC cards, USB modems, and USB sticks or dongles, or separate wireless modems can be used.[59] Roughly every ten years new mobile phone technology and infrastructure involving a change in the fundamental nature of the service, non-backwards-compatible transmission technology, higher peak data rates, new frequency bands, wider channel frequency bandwidth in Hertz becomes available. These transitions are referred to as generations:
Second generation (2G) from 1991: first mobile data services GSM CSD (2G): 9.6 kbit/s GSM GPRS (2.5G): 56 to 115 kbit/s GSM EDGE (2.75G): up to 237 kbit/s Third generation (3G) from 2001: UMTS W-CDMA: 0.4 Mbit/s down and up UMTS HSPA: 14.4 Mbit/s down; 5.8 Mbit/s up UMTS TDD: 16 Mbit/s down and up CDMA2000 1xRTT: 0.3 Mbit/s down; 0.15 Mbit/s up CDMA2000 EV-DO: 2.5 to 4.9 Mbit/s down; 0.15 to 1.8 up GSM EDGE-Evolution: 1.6 Mbit/s down; 0.5 Mbit/s up Fourth generation (4G) from 2006: HSPA+: 21 to 672 Mbit/s down; 5.8 to 168 Mbit/s up Mobile WiMAX (802.16): 37 to 365 Mbit/s down; 17 to 376 Mbit/s up LTE: 100 to 300 Mbit/s down; 50 to 75 Mbit/s up LTE-Advanced: 100 Mbit/s moving at higher speeds to 1 Gbit/s not moving or moving at low speeds MBWA: (802.20): 80 Mbit/s
160
The download (to the user) and upload (to the Internet) data rates given above are peak or maximum rates and end users will typically experience lower data rates. WiMAX (described in more detail above) was originally developed to deliver fixed wireless service with wireless mobility added in 2005. CDMA2000 EV-DO and MBWA (Mobile Broadband Wireless Access) are no longer being actively developed. In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage.[60] Local Multipoint Distribution Service Local Multipoint Distribution Service (LMDS) is a broadband wireless access technology that uses microwave signals operating between 26GHz and 29GHz.[61] Originally designed for digital television transmission (DTV), it is conceived as a fixed wireless, point-to-multipoint technology for utilization in the last mile. Data rates range from 64 kbit/s to 155 Mbit/s.[62] Distance is typically limited to about 1.5 miles (2.4km), but links of up to 5 miles (8km) from the base station are possible in some circumstances.[63] LMDS has been surpassed in both technological and commercial potential by the LTE and WiMAX standards.
Pricing
Dial-up users pay the costs for making local or long distance phone calls, usually pay a monthly subscription fee, and may be subject to additional per minute or traffic based charges, and connect time limits by their ISP. Though less common today than in the past, some dial-up access is offered for "free" in return for watching banner ads as part of the dial-up service. NetZero, BlueLight, Juno, Freenet (NZ), and Free-nets are examples of services providing free access. Some Wireless community networks continue the tradition of providing free Internet access.
Broadband Internet access Fixed broadband Internet access is often sold under an "unlimited" or flat rate pricing model, with price determined by the maximum data rate chosen by the customer, rather than a per minute or traffic based charge. Per minute and traffic based charges and traffic caps are common for mobile broadband Internet access. With increased consumer demand for streaming content such as video on demand and peer-to-peer file sharing, demand for bandwidth has increased rapidly and for some ISPs the flat rate pricing model may become unsustainable. However, with fixed costs estimated to represent 80-90% of the cost of providing broadband service, the marginal cost to carry additional traffic is low. Most ISPs do not disclose their costs, but the cost to transmit a gigabyte of data in 2011 was estimated to be about $0.03.[64] Some ISPs estimate that about 5% of their users consume about 50% of the total bandwidth.[65] To ensure these high-bandwidth users do not slow down the network for everyone, some ISPs are considering, are experimenting with, or have implemented combinations of traffic based pricing, time of day or "peak" and "off peak" pricing, and bandwidth or traffic caps.[66][67] In Canada, Rogers Hi-Speed Internet and Bell Canada have imposed bandwidth caps.[65] Time Warner experimented with usage-based pricing in Beaumont, Texas.[68] An effort by Time Warner to expand usage-based pricing into the Rochester, New York area met with public resistance, however, and was abandoned.[69]
161
World population 6.5 billion 7 billion Not using the Internetb Using the Internetb Users in the developing worldb Users in the developed worldb Users in Chinab
a
Internet users by region 2006b Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a
Broadband Internet access Access to the Internet grew from an estimated 10 million people in 1993, to almost 40 million in 1995, to 670 million in 2002, and to 2.45 billion in 2011.[60] With market saturation, growth in the number of Internet users is slowing in industrialized countries, but continues in Asia,[70] Africa, Latin America, the Caribbean, and the Middle East. There were roughly 0.6 billion fixed broadband subscribers and almost 1.2 billion mobile broadband subscribers in 2011.[71] In developed countries people frequently use both fixed and mobile broadband networks. In developing countries mobile broadband is often the only access method available.[60]
162
Digital Divide
Despite its tremendous growth, Internet access is not distributed equally within or between [60][72] countries. The digital divide refers to the gap between people with effective access to information and communications technology (ICT), and those with very limited or no access. The gap between people with Internet access and those without is one of many aspects of the List of countries by number of Internet usersInternet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union. digital divide.[73] Whether someone has access to the Internet can depend greatly on financial status, geographical location as well as government policies. Low-income, rural, and minority populations have received special scrutiny as the technological "have-nots."[74] Government policies play a tremendous role in bringing Internet access to or limiting access for underserved groups, regions, and countries. For example in Pakistan, which is pursuing an aggressive IT policy aimed at boosting its drive for economic modernization, the number of Internet users grew from 133,900 (0.1% of the population) in 2000 to 31 million (17.6% of the population) in 2011.[75] In countries such as North Korea and Cuba there is relatively little access to the Internet due to the governments' fear of political instability that might accompany the benefits of access to the global Internet.[76] The U.S. trade embargo is another barrier limiting Internet access in Cuba.[77] In the United States, billions of dollars has been invested in efforts to narrow the digital divide and bring Internet access to more people in low-income and rural areas of the United States. The Obama administration has continued this commitment to narrowing the digital divide through the use of stimulus funding.[74] The National Center for Education Statistics reported that 98% of all U.S. classroom computers had Internet access in 2008 with roughly one computer with Internet access available for every three students. The percentage and ratio of students to computers was the same for rural schools (98% and 1 computer for every 2.9 students).[78] Access to computers is a dominant factor in determining the level of Internet access. In 2011, in developing countries, 25% of households had a computer and 20% had Internet access, while in developed countries the figures were 74% of households had a computer and 71% had Internet access.[60] When buying computers was legalized in Cuba in 2007, the private ownership of computers soared (there were 630,000 computers available on the island in 2008, a 23% increase over 2007).[79][80] Internet access has changed the way in which many people think and has become an integral part of peoples economic, political, and social lives. Providing Internet access to more people in the world allow will them to take advantage of the political, social, economic, educational, and career opportunities available over the Internet.[72] Several of the 67 principles adopted at the World Summit on the Information Society convened by the United
Broadband Internet access Nations in Geneva in 2003, directly address the digital divide.[81] To promote economic development and a reduction of the digital divide, national broadband plans have been and are being developed to increase the availability of affordable high-speed Internet access throughout the world.
163
Rural access
One of the great challenges for Internet access in general and for broadband access in particular is to provide service to potential customers in areas of low population density, such as to farmers, ranchers, and small towns. In cities where the population density is high, it is easier for a service provider to recover equipment costs, but each rural customer may require expensive equipment to get connected. While 66% of Americans had an Internet connection in 2010, that figure was only 50% in rural areas, according to the Pew Internet & American Life Project.[82] Virgin Media advertised over 100 towns across the United Kingdom "from Cwmbran to Clydebank" that have access to their 100Mbit/s service.[19] Wireless Internet Service Provider (WISPs) are rapidly becoming a popular broadband option for rural areas.[83] The technology's line-of-sight requirements may hamper connectivity in some areas with hilly and heavily foliated terrain. However, the Tegola project, a successful pilot in remote Scotland, demonstrates that wireless can be a viable option.[84] The Broadband for Rural Nova Scotia initiative is the first program in North America to guarantee access to "100% of civic addresses" in a region. It is based on Motorola Canopy technology. As of November 2011, under 1000 households have reported access problems. Deployment of a new cell network by one Canopy provider (Eastlink) was expected to provide the alternative of 3G/4G service, possibly at a special unmetered rate, for areas harder to serve by Canopy.[85]
Broadband Internet access electronically transmitted information.[90] Spain: Starting in 2011, Telefnica, the former state monopoly that holds the country's "universal service" contract, has to guarantee to offer "reasonably" priced broadband of at least one megabyte per second throughout Spain.[91] In December 2003, the World Summit on the Information Society (WSIS) was convened under the auspice of the United Nations. After lengthy negotiations between governments, businesses and civil society representatives the WSIS Declaration of Principles was adopted reaffirming the importance of the Information Society to maintaining and strengthening human rights:[] [92] 1. We, the representatives of the peoples of the world, assembled in Geneva from 1012 December 2003 for the first phase of the World Summit on the Information Society, declare our common desire and commitment to build a people-centred, inclusive and development-oriented Information Society, where everyone can create, access, utilize and share information and knowledge, enabling individuals, communities and peoples to achieve their full potential in promoting their sustainable development and improving their quality of life, premised on the purposes and principles of the Charter of the United Nations and respecting fully and upholding the Universal Declaration of Human Rights. 3. We reaffirm the universality, indivisibility, interdependence and interrelation of all human rights and fundamental freedoms, including the right to development, as enshrined in the Vienna Declaration. We also reaffirm that democracy, sustainable development, and respect for human rights and fundamental freedoms as well as good governance at all levels are interdependent and mutually reinforcing. We further resolve to strengthen the rule of law in international as in national affairs. The WSIS Declaration of Principles makes specific reference to the importance of the right to freedom of expression in the "Information Society" in stating: 4. We reaffirm, as an essential foundation of the Information Society, and as outlined in Article 19 of the Universal Declaration of Human Rights, that everyone has the right to freedom of opinion and expression; that this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Communication is a fundamental social process, a basic human need and the foundation of all social organisation. It is central to the Information Society. Everyone, everywhere should have the opportunity to participate and no one should be excluded from the benefits of the Information Society offers."[92] A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[93] conducted for the BBC World Service between 30 November 2009 and 7 February 2010 found that almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right.[94] 50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion.[95] The 88 recommendations made by the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression in a May 2011 report to the Human Rights Council of the United Nations General Assembly include several that bear on the question of the right to Internet access:[96] 67. Unlike any other medium, the Internet enables individuals to seek, receive and impart information and ideas of all kinds instantaneously and inexpensively across national borders. By vastly expanding the capacity of individuals to enjoy their right to freedom of opinion and expression, which is an enabler of other human rights, the Internet boosts economic, social and political development, and contributes to the progress of humankind as a whole. In this regard, the Special Rapporteur encourages other Special Procedures mandate holders to engage on the issue of the Internet with respect to their particular mandates. 78. While blocking and filtering measures deny users access to specific content on the Internet, States have also taken measures to cut off access to the Internet entirely. The Special Rapporteur considers cutting off users from Internet access, regardless of the justification provided, including on the grounds of violating
164
Broadband Internet access intellectual property rights law, to be disproportionate and thus a violation of article 19, paragraph 3, of the International Covenant on Civil and Political Rights. 79. The Special Rapporteur calls upon all States to ensure that Internet access is maintained at all times, including during times of political unrest. 85. Given that the Internet has become an indispensable tool for realizing a range of human rights, combating inequality, and accelerating development and human progress, ensuring universal access to the Internet should be a priority for all States. Each State should thus develop a concrete and effective policy, in consultation with individuals from all sections of society, including the private sector and relevant Government ministries, to make the Internet widely available, accessible and affordable to all segments of population. These statements, opinions, and recommendations have led to the suggestion that Internet access itself is or should become a fundamental human right.[97][98]
165
166
References
[1] The 34 OECD countries are: Australia, Austria, Belgium, Canada, Chile, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. OECD members (http:/ / www. oecd. org/ pages/ 0,3417,en_36734052_36761800_1_1_1_1_1,00. html), accessed 31 April 2012 [2] "OECD Broadband Report Questioned" (http:/ / www. websiteoptimization. com/ bw/ 0705/ ). Website Optimization. . Retrieved June 6, 2009. [3] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [4] Rseaux IP Europens (RIPE) [5] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved 25 December 2005. [6] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [7] "What is Broadband?" (http:/ / www. broadband. gov/ about_broadband. html/ ). The National Broadband Plan. US Federal Communications Commission. . Retrieved July 15, 2011. [8] "Inquiry Concerning the Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion, and Possible Steps to Accelerate Such Deployment Pursuant to Section 706 of the Telecommunications Act of 1996, as Amended by the Broadband Data Improvement Act" (http:/ / transition. fcc. gov/ Daily_Releases/ Daily_Business/ 2010/ db0806/ FCC-10-148A1. pdf). GN Docket No. 10-159, FCC-10-148A1. Federal Communications Commission. August 6, 2010. . Retrieved July 12, 2011. [9] Naveen Bisht; James Connor. "Broadband to the Home: Trends and Issues" (http:/ / books. google. com/ books?id=ipmF3npkMngC& pg=PA1). Broadband Services, Applications, and Networks: Enabling Technologies and Business Models. International Engineering Consortium. p.1. ISBN978-1-931695-24-4. . [10] "How Broadband Works" (http:/ / www. explainthatstuff. com/ howbroadbandworks. html), Chris Woodford, Explain that Stuff, 20 August 2008. Retrieved 19 January. [11] Jeffrey A. Hart; Robert R. Reed; Franois Bar (November 1992). "The building of the internet: Implications for the future of broadband networks". Telecommunications Policy 16 (8): 666689. doi:10.1016/0308-5961(92)90061-S. [12] The Future of the Internet Economy: A Statistical Profile (http:/ / www. oecd. org/ dataoecd/ 24/ 5/ 48255770. pdf), Organization for Economic Co-Operation and Development (OECD), June 2011 [13] Willdig, Karl; Patrik Chen (August 1994). "What You Need to Know about Modems" (http:/ / fndcg0. fnal. gov/ Net/ modm8-94. txt). . Retrieved 2008-03-02. [14] Mitronov, Pavel (2001-06-29). "Modem compression: V.44 against V.42bis" (http:/ / www. digit-life. com/ articles/ compressv44vsv42bis/ ). Digit-Life.com. . Retrieved 2008-03-02. [15] "Birth of Broadband" (http:/ / www. itu. int/ osg/ spu/ publications/ birthofbroadband/ faq. html). ITU. September 2003. . Retrieved July 12, 2011. [16] "Recommendation I.113, Vocabulary of Terms for Broadband aspects of ISDN" (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 113-199706-I!!PDF-E). ITU-T. June 1997 (originally 1988). . Retrieved 19 July 2011. [17] "Sixth Broadband Deployment Report" (http:/ / hraunfoss. fcc. gov/ edocs_public/ attachmatch/ FCC-10-129A1. pdf). FCC. . Retrieved July 23, 2010. [18] Patel, Nilay (March 19, 2008). "FCC redefines "broadband" to mean 768kbit/s, "fast" to mean "kinda slow"" (http:/ / www. engadget. com/ 2008/ 03/ 19/ fcc-redefines-broadband-to-mean-768kbps-fast-to-mean-kinda/ ). Engadget. . Retrieved June 6, 2009. [19] "Virgin Medias ultrafast 100Mb broadband now available to over four million UK homes" (http:/ / mediacentre. virginmedia. com/ Stories/ Virgin-Media-s-ultrafast-100Mb-broadband-now-available-to-over-four-million-UK-homes-211c. aspx). News release. Virgin Media. June 10, 2011. . Retrieved August 18, 2011. [20] Tom Phillips (August 25, 2010). "'Misleading' BT broadband ad banned" (http:/ / www. metro. co. uk/ tech/ 839014-misleading-bt-broadband-ad-banned). UK Metro. . Retrieved July 24, 2011. [21] Gary A. Donahue (June 2007). Network Warrior (http:/ / shop. oreilly. com/ product/ 9780596101510. do). O'Reilly. p.600. ISBN0-596-10151-1. . [22] Dean, Tamara (2010). Network+ Guide to Networks, 5th Ed. [23] "Bonding: 112K, 168K, and beyond " (http:/ / www. 56k. com/ reports/ bonding. shtml), 56K.com [24] "Diamond 56k Shotgun Modem" (http:/ / www. maximumpc. com/ article/ features/ top_tech_blunders_10_products_massively_failed), maximumpc.com [25] William Stallings (1999). ISDN and Broadband ISDN with Frame Relay and ATM (http:/ / www. pearsonhighered. com/ educator/ product/ ISDN-and-Broadband-ISDN-with-Frame-Relay-and-ATM-4E/ 9780139737442. page) (4th ed.). Prentice Hall. p.542. ISBN0139737448. . [26] Telecommunications and Data Communications Handbook (http:/ / www. wiley. com/ WileyCDA/ WileyTitle/ productCd-0470396075. html), Ray Horak, 2nd edition, Wiley-Interscience, 2008, 791 p., ISBN 0-470-39607-5 [27] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . pp 312-315.
167
168
169
170
External links
European broadband (http://ec.europa.eu/information_society/eeurope/i2010/digital_divide/index_en. htm#European_broadband_portal) Corporate vs. Community Internet (http://www.alternet.org/story/22216/), AlterNet, June 14, 2005, - on the clash between US cities' attempts to expand municipal broadband and corporate attempts to defend their markets Broadband data (http://www.google.com/publicdata/directory#!q=broadband), from Google public data US National Broadband Maps (http://broadbandmap.gov)
Languages used
Most web pages on the Internet are in English. A study made by W3Techs shows that as of December 2011 more than 56% of all websites use English as their content language. Other top languages which are used at least in 2% of websites are German, Russian, Japanese, Spanish, Chinese, French, Italian and Portuguese. Note that those figures account for the one million web sites (e.g. 0.27% of the total web sites according to figures of Dec. 2011) the most visited, according to Alexa.com, and language is identified using only the home page of the sites in most of the cases. As a consequence those figures offer a significantly higher percentage for many languages (especially for English) as compared to the real figures for the whole universe (which remain unknown as of today but that some sources estimate below 50% for English - See for instance NET.LANG: Towards a multilingual cyberspace [1]). The use of English online has increased by around 281% over the past ten years, however this is far less than Spanish (743%), Chinese (1,277%), Russian (1,826%) or Arabic (showing a growth of 2,501% over the same period).[2] The foreign language internet is rapidly expanding, with English being used by only 27% of users worldwide. A study on the presence of Romance languages on the Internet, published by the Latin Union in collaboration with FUNREDES, showed that as of November 2007, 45% of the webpages were written in English, 7.8% in Spanish, 4.41% in French, 2.66% in Italian, 1.39% in Portuguese, 0.28% in Romanian and 5.9% in German.[3]
171
Rank Language
Internet users 565,004,000 27% 509,965,000 25% 164,969,000 99,182,000 82,587,000 75,423,000 65,365,000 59,779,000 59,700,000 39,440,000 8% 5% 4% 4% 3% 3% 3% 2%
1 2 3 4 5 6 7 8 9 10
English Chinese Spanish Japanese Portuguese German Arabic French Russian Korean Others
350,557,000 17%
172
Rank 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Language English German Russian Japanese Spanish Chinese French Italian Portuguese Polish Arabic Dutch Turkish Swedish Persian Czech Romanian Korean Greek Hungarian Thai
Percentage 56.6% 6.5% 4.8% 4.7% 4.6% 4.5% 3.9% 2.1% 2.0% 1.4% 1.3% 1.1% 1.1% 0.7% 0.7% 0.5% 0.4% 0.3% 0.3% 0.3% 0.3%
173
22 23 24 25 26 27 28 29 30 31 32 33 34 35 Vietnamese 0.3% Danish Indonesian Finnish Norwegian Bulgarian Slovak Hebrew Croatian Lithuanian Serbian Catalan Slovenian Ukrainian 0.3% 0.3% 0.2% 0.2% 0.2% 0.2% 0.1% 0.1% 0.1% 0.1% 0.1% 0.1% 0.1%
References
[1] http:/ / net-lang. net/ lang_en [2] Rotaru, Alexandru. "The foreign language internet is good for business" (http:/ / www. scottmclay. co. uk/ foreign-language-internet-good-business/ ). . Retrieved 21 June 2011. [3] "Limbile i culturile pe Internet - Studiu 2007 (Languages and cultures on the Internet - 2007 study)" (http:/ / dtil. unilat. org/ LI/ 2007/ ro/ resultados_ro. htm) (in Romanian). Latin Union. . Retrieved 2011-02-02. [4] "Number of Internet Users by Language" (http:/ / www. internetworldstats. com/ stats7. htm), Internet World Stats, Miniwatts Marketing Group, 31 May 2011, accessed 22 April 2012 [5] "Usage of content languages for websites" (http:/ / w3techs. com/ technologies/ overview/ content_language/ all). W3Techs.com. . Retrieved 30 December 2011.
External links
Internet World Stats (http://www.internetworldstats.com) Internet World Stats Global Internet usage by language (http://www.internetworldstats.com/stats7.htm) Latest stats Internet World Stats Internet users in the world by years (http://www.internetworldstats.com/emarketing. htm) European Travel Commission New Media Trend Watch (http://www.newmediatrendwatch.com/) Estimation of English and non-English Language Use on the WWW, 2000 (http://arxiv.org/abs/cs.cl/ 0006032), web pages, 32 Latin character languages World GDP by Language (http://unicode.org/notes/tn13/) Internet Users Map 2005 (http://explomap.free.fr/?p=3) CIA - The World Factbook (https://www.cia.gov/library/publications/the-world-factbook/) Writing the Webs Future in Many Languages - NYTimes.com (http://www.nytimes.com/2008/12/31/ technology/internet/31hindi.html?partner=rss&emc=rss) English translation of the 23rd CNNIC Statistical Survey Report on Internet Usage in China (http://www. nanjingmarketinggroup.com/knowledge/23rd-report-internet-development-in-China) List of CNNIC statistical reports (http://www.cnnic.cn/en/index/0O/02/index.htm)
Languages used on the Internet Measuring Linguistic Diversity on the Internet (http://www.uis.unesco.org/ev.php?ID=6341_201& ID2=DO_TOPIC), UNESCO (2006) Twelve years of measuring linguistic diversity in the Internet (http://unesdoc.unesco.org/images/0018/ 001870/187016e.pdf), UNESCO (2009) Language Observatory (http://gii2.nagaokaut.ac.jp/gii/blog/lopdiary.php/), Japan Science and Technology Agency FUNREDES Observatory of linguistic and cultural diversity on the Internet (http://funredes.org/lc/english/ inicio/)
174
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
China United States India Japan Brazil Germany Russia Indonesia United Kingdom France Nigeria Mexico Korea, South Iran Italy Turkey Vietnam Spain Pakistan Argentina Canada
513,100,000 245,203,319 150,000,000 101,228,736 81,798,000 67,364,898 63,450,004 55,000,000 52,731,209 50,290,226 45,039,711 42,000,000 40,329,660 42,000,000 35,800,000 35,000,000 30,858,742 30,654,678 29,128,970 28,000,000 27,757,540
175
25,000,000 23,852,486 21,691,776 19,554,832 17,723,000 16,685,471 33,600,000 16,303,864 15,812,676 15,371,396 13,811,220 12,412,559 11,744,181 11,115,096 10,675,864 10,290,847 9,642,383 9,116,147 8,494,837 8,270,742 8,136,552 7,928,527 7,787,031 7,435,798 6,688,285 6,557,389 6,375,892 5,950,449 5,885,877 5,702,872 5,470,903 5,425,269 5,306,268 5,231,136 5,131,601 5,066,494 4,976,899 4,712,306 4,700,192 55.9 2011 62.0 2011 26.4 2011 89.8 2011 61.7 2011 72.00 2011 33.0 2011 51.00 2011 23.70 2011 92.30 2011 30.60 2011 47.50 2011 28.00 2011 40.22 2011 36.50 2011 21.00 2011 44.02 2011 53.89 2011 30.20 2011 91.00 2011 78.00 2011 5.00 2011 45.00 2011 72.97 2011 85.20 2011 79.80 2011 19.00 2011 55.30 2011 59.00 2011 53.00 2011 12.00 2011 20.38 2011 74.50 2011 70.00 2011 14.00 2011 22.50 2011 90.00 2011 31.40 2011 89.37 2011
22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
Colombia Poland Egypt Australia Malaysia Taiwan Philippines Morocco Thailand Netherlands Ukraine Saudi Arabia Kenya Venezuela Peru South Africa Romania Chile Uzbekistan Sweden Belgium Bangladesh Kazakhstan Czech Republic Switzerland Austria Sudan Portugal Hungary Greece Tanzania Nepal Hong Kong Israel Algeria Syria Denmark Ecuador Finland
176
4,698,640 4,408,931 4,237,239 4,156,012 4,077,107 3,935,090 3,825,957 3,689,698 3,617,754 3,604,065 3,597,097 3,588,244 3,534,610 3,401,619 3,192,587 3,170,498 3,085,054 3,035,605 2,592,409 2,575,587 2,329,415 2,324,141 2,299,873 2,271,387 2,212,665 2,154,413 2,059,012 1,927,648 1,925,956 1,897,236 1,779,211 1,700,587 1,676,596 1,621,250 1,594,060 1,580,335 1,543,829 1,543,715 1,519,979 50.00 2011 93.97 2011 13.01 2011 39.10 2011 74.44 2011 75.00 2011 39.60 2011 86.00 2011 51.00 2011 70.00 2011 14.91 2011 76.82 2011 35.50 2011 14.11 2011 15.00 2011 70.71 2011 42.20 2011 30.00 2011 14.78 2011 23.23 2011 60.00 2011 55.00 2011 65.05 2011 34.90 2011 17.50 2011 52.00 2011 68.00 2011 42.12 2011 74.20 2011 15.70 2011 48.00 2011 51.40 2011 36.56 2011 11.73 2011 86.20 2011 71.68 2011 11.50 2011 23.90 2011 5.00 2011
60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
Azerbaijan Norway Uganda Tunisia Slovakia Singapore Belarus New Zealand Bulgaria United Arab Emirates Yemen Ireland Dominican Republic Ghana Sri Lanka Croatia Serbia Bolivia Angola Cuba Bosnia and Herzegovina Palestinian Authority Lithuania Jordan Senegal Lebanon Oman Costa Rica Kuwait Zimbabwe Puerto Rico Uruguay Georgia Guatemala Qatar Latvia Zambia Paraguay Iraq
177
1,487,878 1,477,617 1,467,387 1,440,066 1,403,766 1,294,827 1,177,845 1,090,155 1,074,012 993,824 986,801 985,565 981,467 980,307 974,476 935,323 903,540 860,554 807,615 795,930 677,583 646,298 626,664 600,628 582,949 529,198 528,779 502,544 473,092 457,451 455,753 455,649 453,952 406,998 368,248 332,342 326,376 300,648 295,567 5.00 2011 42.70 2011 49.00 2011 72.00 2011 38.00 2011 15.90 2011 56.70 2011 20.00 2011 17.69 2011 13.03 2011 4.30 2011 5.00 2011 76.50 2011 17.00 2011 1.10 2011 77.00 2011 31.50 2011 1.20 2011 8.37 2010 7.00 2011 55.20 2011 57.68 2011 20.00 2011 10.60 2011 9.00 2011 0.98 2011 3.33 2011 3.00 2011 2.20 2011 90.89 2011 3.10 2011 34.95 2011 15.30 2009 1.90 2011 6.20 2011 58.00 2011 3.50 2011 2.00 2011 95.02 2011
97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134
Afghanistan Panama Albania Slovenia Moldova Honduras Macedonia Kyrgyzstan El Salvador Tajikistan Mozambique Cameroon Estonia Libya Ethiopia Bahrain Jamaica Congo, Democratic Republic of the Haiti Rwanda Trinidad and Tobago Cyprus Mongolia Nicaragua Laos Burma Malawi Burkina Faso Cte d'Ivoire Luxembourg Cambodia Mauritius Armenia Madagascar Eritrea Macau Benin Mali Iceland
178
282,648 264,723 257,710 249,875 248,458 247,275 238,326 237,660 237,020 225,058 205,756 205,423 204,420 203,653 195,433 177,011 165,152 148,770 147,674 144,578 137,813 134,300 133,127 128,138 126,133 124,071 123,752 113,603 113,400 108,901 81,323 80,684 72,065 68,708 67,854 60,668 60,557 54,418 52,995 69.22 2011 40.00 2011 12.00 2011 5.00 2011 18.13 2011 28.00 2011 32.00 2011 5.60 2011 3.50 2011 56.00 2011 71.77 2011 1.30 2011 1.90 2011 65.00 2011 10.87 2011 32.00 2011 32.00 2011 21.00 2011 4.50 2011 7.00 2011 1.30 2011 34.00 2011 49.00 2011 50.00 2011 8.00 2011 1.25 2011 2.00 2011 3.00 2011 1.11 2011 2.20 2011 4.22 2011 50.64 2009 82.00 2011 81.00 2011 42.00 2011 88.34 2011 57.07 2011 83.63 2011 7.00 2011
135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167
Malta Montenegro Namibia Turkmenistan Swaziland Fiji Guyana Congo, Republic of the Togo Brunei Barbados Niger Chad Bahamas, The Gambia, The Suriname Cape Verde Bhutan Mauritania Botswana Guinea Maldives French Polynesia New Caledonia Gabon Somalia Papua New Guinea Liberia Burundi Central African Republic Lesotho Guam Antigua and Barbuda Andorra Saint Lucia Bermuda Aruba Guernsey Djibouti
179
44,674 44,033 42,663 39,774 39,704 39,042 38,497 37,922 37,443 36,909 36,191 36,076 35,694 34,313 33,898 30,959 29,234 26,479 22,940 21,431 19,620 18,821 15,781 13,440 13,344 10,967 10,074 10,039 7,176 5,438 3,163 2,908 2,541 2,288 1,802 1,383 1,337 1,125 43.01 2011 14.00 2010 2.67 2011 80.73 2011 5.50 2011 6.00 2010 43.16 2011 76.00 2010 51.31 2011 64.00 2011 20.16 2011 33.46 2010 69.47 2011 6.00 2011 36.00 2011 85.00 2011 27.40 2009 25.00 2011 75.00 2010 20.00 2010 8.00 2010 65.00 2011 49.60 2011 7.00 2010 0.26 2009 37.00 2010 10.00 2011 0.90 2011 48.60 2010 26.97 2004 30.00 2011 96.38 2011 33.00 2011 3.55 2009 1.21 2000 26.90 2011 8.68 2011 74.48 2009 0.00 2009
168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192
Saint Vincent and the Grenadines Belize Guinea-Bissau Faroe Islands Comoros Equatorial Guinea Seychelles Saint Kitts and Nevis Dominica Greenland So Tom and Prncipe Grenada Cayman Islands Solomon Islands Jersey Liechtenstein Virgin Islands, U.S. Tonga Monaco Micronesia, Federated States of Vanuatu Gibraltar San Marino Samoa Sierra Leone Virgin Islands, British Kiribati East Timor Anguilla Palau Tuvalu [4] Falkland Islands Saint Helena Marshall Islands Mayotte Montserrat Wallis and Futuna Niue Korea, North [5]
605
180
556 6.00 2010 36.00 2011 1.50 2003
193
318 20
World population 6.5 billion 7 billion Not using the Internetb Using the Internetb Users in the developing worldb Users in the developed worldb Users in Chinab
a
Internet users by region 2006b Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a
181
References
[1] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union, March 2010. Accessed on 30 September 2011. [2] Population estimates obtained from Internet world stats (http:/ / www. internetworldstats. com/ list2. htm), Miniwatts marketing group, accessed on 06 October 2012. Population for India obtained from (http:/ / www. bbc. co. uk/ news/ technology-20297872), Internet and Mobile Association of India (IAMAI), accessed on 12 November 2012. Population for Falkland Islands obtained from World Population Prospects: The 2010 Revision (http:/ / esa. un. org/ unpd/ wpp/ index. htm), Population Division of the Department of Economic and Social Affairs of the United Nations Secretariat, accessed on 19 August 2012. Population for Ascension Island obtained from About Ascension (http:/ / www. ascension-island. gov. ac/ about), Ascension Island Government, accessed on 19 August 2012. [3] Percentage of Individuals using the Internet 2000-2011 (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ Individuals using the Internet2000-2011. xls), International Telecommunication Union, accessed on 19 August 2012. [4] Population for 2010 was used. [5] Figure of "605" is the mean number of Internet users given a percentage between 0.0000000 and 0.0049999, both of which can be rounded down to 0.00. [6] Population for 31 March 2010 was used. [7] "The World in 2011: ITC Facts and Figures" (http:/ / www. itu. int/ ITU-D/ ict/ facts/ 2011/ material/ ICTFactsFigures2011. pdf), International Telecommunications Unions (ITU), Geneva, 2011 [8] "Internet Users" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ at_glance/ KeyTelecom. html), Key ICT indicators for the ITU/BDT regions, International Telecommunications Unions (ITU), Geneva, 16 November 2011
Internet users per 100 inhabitantsSource: International Telecommunications Union. "Internet users per 100 inhabitants 2001-2011", International Telecommunications Union, Geneva, accessed 4 April 2012
[9] "Internet users per 100 inhabitants 2001-2011" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2011/ Internet_users_01-11. xls), International Telecommunications Union, Geneva, accessed 4 April 2012
182
Broadband subscriptions Fixed subscriptions: Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe Mobile subscriptions: Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a
2007a 0.1% 11.0% 0.9% 3.3% 2.3% 18.4% 2007a 0.2% 6.4% 0.8% 3.1% 0.2% 14.7%
2011a,b 0.2% 15.5% 2.2% 6.2% 9.6% 25.8% 2011a,b 3.8% 30.5% 13.3% 10.7% 14.9% 54.1%
183
Millions of DSL lines by countries at the end of 2005, compared to the previous year.
Worldwide major ADSL operators in number of lines, at the end of the first 2005 half.
Rank
Country or territory
Fixed Per 100 Year [3] broadband inhabitants [3] subscriptions 126,337,000 85,723,155 34,044,729 26,089,800 21,345,000 19,579,823 17,193,570 15,700,000 13,266,310 13,259,398 11,325,022 10,990,000 10,534,492 10,138,741 7,079,792 6,330,000 5,385,000 9.42 2010 27.62 2010 26.91 2010 31.70 2010 34.00 2010 31.56 2010 35.68 2010 10.98 2010 6.81 2010 21.90 2010 9.98 2010 0.9 2010 22.86 2010 29.81 2010 9.73 2010 38.10 2010 24.18 2010
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
China United States Japan Germany France United Kingdom Korea, South Russia Brazil Italy Mexico India Spain Canada Turkey Netherlands Australia
184
5,265,026 4,960,528 3,862,354 3,631,396 3,373,143 3,188,618 2,987,008 2,980,000 2,954,556 2,908,119 2,594,055 2,257,110 2,111,109 2,092,379 2,078,500 2,052,930 2,002,000 1,956,218 1,900,300 1,864,900 1,788,490 1,723,678 1,722,400 1,665,889 1,556,485 1,532,700 1,521,000 1,496,607 1,449,904 1,426,800 1,268,800 1,089,000 1,088,286 941,405 911,635 900,000 858,219 803,823 786,818 22.68 2010 12.96 2010 9.56 2010 4.13 2010 31.49 2010 4.61 2010 31.85 2010 13.87 2010 6.50 2010 37.94 2010 5.60 2010 19.87 2010 29.93 2010 37.70 2010 7.32 2010 19.23 2010 23.85 2010 19.59 2010 0.79 2010 25.14 2010 10.45 2010 35.30 2010 1.85 2010 17.36 2010 5.37 2010 28.57 2010 14.50 2010 5.45 2010 1.79 2010 8.90 2010 24.94 2010 24.93 2010 14.52 2010 21.06 2010 3.14 2010 2.54 2010 11.18 2010 18.25 2010 10.47 2010
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55
Taiwan Poland Argentina Vietnam Belgium Thailand Sweden Romania Ukraine Switzerland Colombia Greece Hong Kong Denmark Malaysia Portugal Austria Hungary Indonesia Israel Chile Norway Philippines Belarus Venezuela Finland Czech Republic Saudi Arabia Egypt Kazakhstan Singapore New Zealand Bulgaria Ireland Peru Algeria Serbia Croatia United Arab Emirates
185
743,000 694,414 684,057 551,520 531,787 500,000 498,682 492,115 481,810 460,000 434,876 367,480 360,039 336,323 307,489 288,236 275,639 269,067 259,000 256,943 253,916 228,316 200,000 197,890 195,784 194,455 175,274 168,368 164,500 145,028 144,057 131,372 116,685 116,569 109,212 105,519 99,108 95,937 89,100 1.48 2010 12.71 2010 20.58 2010 14.71 2010 0.31 2010 0.68 2010 1.56 2010 24.25 2010 4.60 2010 5.01 2010 19.31 2010 10.91 2010 3.63 2010 25.08 2010 8.18 2010 6.19 2010 7.84 2010 7.53 2010 1.80 2010 12.47 2010 5.83 2010 1.09 2010 4.73 2010 1.37 2010 3.16 2010 17.62 2010 2.83 2010 33.18 2010 0.38 2010 10.81 2010 8.19 2010 24.16 2010 4.26 2010 27.99 2010 34.11 2010 3.29 2010 0.06 2010 0.97 2010 0.32 2010
56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
South Africa Slovakia Lithuania Puerto Rico Pakistan Iran Morocco Slovenia Tunisia Azerbaijan Latvia Uruguay Dominican Republic Estonia Bosnia and Herzegovina Costa Rica Panama Moldova Guatemala Macedonia, Republic of Georgia Sri Lanka Lebanon Ecuador Jordan Cyprus El Salvador Luxembourg Sudan Trinidad and Tobago Qatar Macao Jamaica Malta Iceland Albania Nigeria Bolivia Uzbekistan
186
85,177 84,000 79,227 78,647 76,000 72,800 71,709 67,625 67,564 60,000 58,435 56,190 55,648 54,804 52,400 50,082 47,600 46,000 45,449 40,100 38,196 35,666 33,000 32,247 30,186 28,147 24,702 24,502 23,250 23,000 21,699 20,180 20,000 19,217 18,852 16,400 16,269 15,971 15,672 2.75 2010 0.35 2010 6.10 2010 0.63 2010 1.00 2010 1.15 2010 2.60 2010 5.36 2010 0.33 2010 0.04 2010 0.20 2010 20.56 2010 1.49 2007 0.16 2010 8.30 2010 0.21 2010 0.82 2010 1.68 2010 1.63 2010 61.75 2010 15.23 2010 0.25 2010 0.26 2010 11.91 2010 13.39 2009 0.44 2010 7.20 2010 28.87 2010 2.70 2010 63.83 2010 5.44 2010 11.58 2010 0.10 2010 17.88 2010 33.53 2010 0.03 2010 33.40 2010 3.22 2010 2.99 2010
93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123
Armenia Yemen Mauritius Senegal Honduras Libya Mongolia Bahrain Syria Bangladesh Nepal Barbados Palestinian Authority Uganda Montenegro Ghana Nicaragua Kuwait Oman Bermuda New Caledonia Cambodia Zimbabwe French Polynesia French Guiana Paraguay Bahamas Andorra Fiji Liechtenstein Brunei Saint Lucia Angola Aruba Cayman Islands Burma Faroe Islands Cape Verde Suriname
187
15,400 15,148 14,633 14,600 14,437 14,193 13,800 12,502 12,328 12,025 11,978 11,193 10,433 10,267 10,100 9,640 9,391 9,100 8,915 8,675 8,673 8,058 7,900 7,119 6,624 6,278 6,100 5,359 5,120 4,700 4,155 4,107 4,082 3,852 3,707 3,706 3,653 3,569 3,150 0.29 2010 4.80 2010 0.06 2010 27.86 2010 13.82 2010 0.09 2010 38.98 2010 11.43 2010 21.52 2010 0.19 2010 0.60 2010 1.48 2010 35.68 2010 0.08 2010 32.03 2010 0.42 2010 13.86 2010 8.34 2010 2.86 2010 1.20 2010 0.01 2010 0.91 2010 0.04 2010 8.03 2010 0.19 2010 7.26 2010 0.09 2010 0.03 2010 0.03 2010 0.07 2010 0.01 2010 0.00 2010 0.27 2010 0.06 2010 0.02 2010 0.03 2010 24.79 2008 0.04 2010 0.01 2010
124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158
Kyrgyzstan Maldives Mozambique Saint Kitts and Nevis Grenada Burkina Faso Monaco Saint Vincent and the Grenadines Greenland Laos Botswana Guyana Gibraltar Zambia San Marino Namibia Dominica Virgin Islands, U.S. Belize Bhutan Congo, Democratic Republic of the Djibouti Cte d'Ivoire Antigua and Barbuda Mauritania Seychelles Papua New Guinea Madagascar Malawi Tajikistan Kenya Ethiopia Gabon Togo Niger Cuba Anguilla Benin Tanzania
188
3,000 2,640 2,314 2,000 1,675 1,626 1,500 1,186 1,174 1,061 1,000 1,000 998 900 723 582 537 500 500 500 400 400 350 320 313 239 200 200 186 150 150 124 118 77 50 N/A 1.67 2010 0.02 2010 0.02 2010 0.37 2010 8.26 2010 0.14 2010 0.00 2010 0.17 2010 38.91 2010 7.82 2010 0.01 2010 0.96 2010 0.90 2010 0.90 2010 0.01 2010 0.35 2010 13.04 2010 0.01 2010 0.04 2010 0.21 2010 0.02 2010 3.90 2010 0.02 2010 3.26 2010 2010 1.17 2010 0.00 2010 0.11 2010 0.00 2010 0.00 2010 0.02 2010 0.00 2010 0.00 2010 0.00 2010 0.84 2010
159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186
Guam Rwanda Mali Solomon Islands Cook Islands Swaziland Afghanistan Equatorial Guinea Falkland Islands Wallis and Futuna Cameroon Tonga Micronesia, Federated States of Kiribati Turkmenistan So Tom and Prncipe Saint Helena Guinea Timor-Leste Vanuatu Lesotho Nauru Gambia Tuvalu Ascension Island Palau Burundi Samoa Liberia Chad Comoros Congo, Republic of the Eritrea Iraq Montserrat
189
116,650,000 Mar. 2011 [5] 83,344,927 33,537,796 25,599,360 20,257,000 18,827,700 16,789,170 16,500,000 16,500,000 [10] Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Mar. 2011 Dec. 2011 May. 2012 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Mar. 2011 Jun. 2010 Jun. 2010 Dec. 2009 Jun. 2010 Dec. 2010 Jun. 2010 Oct. 2010 Dec. 2009 Jun. 2010 Dec. 2009 Jun. 2010
Germany France
[6]
United Kingdom South Korea Russia Brazil India Italy [7] [6]
11.5% 27.2%[8] 8.1% 0.9% 21.3% 10.1% 22.2% 30.1% 12.3% 37.8% 23.4% 21.6% 13.1% 11.2% 30.0% 64.6% 3.4% 31.8% 13.4% 37.1% N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
[9]
[11]
14,310,000 12,849,074 10,843,812 10,261,933 10,138,741 9,098,755 6,245,000 5,167,000 5,001,000 4,982,882 4,507,703 3,237,052 3,210,700 3,013,000 2,966,384 2,934,762 2,894,830
[6] [6]
Mexico Spain
7.8% 18.0% 13.1% 9.0 [6] 22.0% 19.3% [4] 10.1% 7.6%
[6] [6]
Canada Turkey
[6]
Argentina Belgium
[6] [13]
[4]
Romania
190
34.3% 5.1% 19.9% 37.3% 18.9% 1.18% 23.0% 4.1% 18.7% 10.2% 1.9% 34.2% 24.3% [18] 2,417,654 2,309,688 2,252,653 2,062,000 2,013,528 2,009,593 1,921,445 1,872,900 1,870,149 1,729,575 1,722,407 1,653,837 1,560,000 1,460,149 1,446,900 1,407,500 1,048,518 1,029,063 912,323 907,859 651,268 437,207 400,000 382,948 300,000 242,134 169,757 122,522 106,258 101,000 N/A N/A Dec. 2009 Mar. 2010 Jan. 2011 Jun. 2010 Jun. 2010 April 2012 Jun. 2010 Dec. 2009 Jun. 2010 Jun. 2010 Dec. 2009 Jun. 2010 Dec. 2007 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Dec. 2007 2008 Dec. 2010 2008 Oct. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Dec. 2007 Dec. 2007 Dec. 2008
27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 N/A N/A
[4]
19.3% 3.3% 19.9% 22.3% 10.5% N/A 15.9% 1.8% 8.2% 5.4%
N/A 1.6% 0.0% 10.0% 7.6% N/A 6.9% N/A 8.7% 4.8% N/A 9.2% N/A N/A 4.5% 4.3% 1.5% N/A N/A 3.9 1.6% N/A N/A N/A N/A N/A 5.8% 0.1% 0.0% N/A N/A N/A
N/A 0.2% 0.0% 5.1% 0.7% N/A 0.2% N/A 1.8% 0.0% N/A 4.9% N/A N/A 1.5% 0.3% 0.1% N/A N/A 0.1 3.4% N/A N/A N/A N/A N/A 0.3% 0.2% 2.8% N/A N/A N/A
N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 70.02% N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 93.8% 99.9%
[14]
[15] [6]
[6] [16]
Ukraine
[4]
Venezuela
5.0% 13.7% 26.4% 24.5% 23.00% 3.3% 20.3% 12.0% 0.5% 0.18% [18] [22]
[6]
23.0% N/A N/A [6] 16.3 7.0% N/A N/A N/A N/A
[21]
[17] [22]
[23]
Ecuador
[24] [6]
Belarus
Monaco
38.0% N/A
Singapore
191
82.5% Dec. 2007
N/A
Macau
[17]
N/A
N/A
N/A
N/A
N/A
References
[1] "Key Global Telecom Indicators for the World Telecommunication Service Sector" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ at_glance/ keytelecom. html), International Telecommunications Unions (ITU), Geneva, 2011 [2] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union. Accessed on 30 September 2011. [3] Fixed broadband subscriptions (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2010/ FixedBroadbandInternetSubscriptions_00-10. xls), International Telecommunication Union. Accessed on 8 April 2012. [4] "World Broadband Statistics:Short Report Q4 2010" (http:/ / broadband. cti. gr/ el/ download/ broadbandshortreport2010. pdf). Point Topic. March 2010. . Retrieved January 25, 2011. [5] http:/ / china-screen-news. com/ 2011/ 04/ china-telcos-announce-march-2011-subscribers-totals/ [6] Total fixed and wireless broadband subscriptions by country (June 2010) (http:/ / www. oecd. org/ dataoecd/ 22/ 15/ 39574806. xls) and Fixed and wireless broadband subscriptions per 100 inhabitants (June 2010) (http:/ / www. oecd. org/ dataoecd/ 21/ 35/ 39574709. xls). OECD. Retrieved January 25, 2011 [7] "Residential Broadband Statistics" (http:/ / www. acm-consulting. com/ data-downloads/ cat_view/ 16-broadband. html). AC&M-Consulting. 23 June 2011. . Retrieved 19 July 2011. [8] By September 2010 [9] "Dados informativos Banda Larga Fixa" (http:/ / www. anatel. gov. br/ Portal/ verificaDocumentos/ documento. asp?numeroPublicacao=257088& assuntoPublicacao=Dados informativos - Banda Larga& caminhoRel=null& filtro=1& documentoPath=257088. pdf) (in Portuguese) (Press release). ANATEL. 2011-02-23. . Retrieved 2011-03-19. [10] http:/ / www. teleco. com. br/ blarga. asp [11] http:/ / www. trai. gov. in/ WriteReadData/ PressRealease/ Document/ PR-TSD-May12. pdf [12] "Accesos a Internet" (http:/ / www. indec. mecon. ar/ nuevaweb/ cuadros/ 14/ internet_03_11. pdf) (in Spanish) (PDF) (Press release). INDEC. March 15, 2011. . Retrieved March 16, 2011. [13] (http:/ / www. internetworldstats. com/ asia/ my. htm). [14] "Informe de Conectividad 1T-2010" (http:/ / www. mintic. gov. co/ mincom/ documents/ portal/ documents/ root/ informes del sector/ informes de conectividad/ INFORMEDECONECTIVIDAD1T-2010. pdf) (in Spanish) (PDF) (Press release). Ministerio de Tecnologas de la Informacin y las Comunicaciones. August 2010. . Retrieved January 25, 2011. [15] http:/ / news. in. gr/ science-technology/ article/ ?aid=1231106170 [16] (http:/ / www. pta. gov. pk/ index. php?option=com_content& view=article& id=269:telecom-indicators& catid=124:industry-report& Itemid=599), Pakistan Telecommunication Authority. [17] World Broadband Statistics Report Q4 2009 (http:/ / point-topic. com/ contentDownload/ dslanalysis/ world broadband statistics q407. pdf), Point Topic. [18] Total population penetration rate obtained using July 2007 population estimates by the CIA's The World Factbook (https:/ / www. cia. gov/ library/ publications/ the-world-factbook/ fields/ 2119. html), updated on March 6, 2008. [19] "Venezuela logra crecimiento del 18% en banda ancha durante primer semestre de 2010" (http:/ / www. hispanicbusiness. com/ marketwire/ espanol/ 2010/ 12/ 16/ venezuela_logra_crecimiento_del_18_en. htm). HispanicBusiness.com. December 16, 2010. . Retrieved January 25, 2011. [20] "HAKOM Croatian Post and Electronic Communications Agency" (http:/ / www. hakom. hr/ default. aspx?id=60). . [21] "Banda Ancha Crece 9,4% en el Per durante primer semestre de 2010" (http:/ / www. tecnologiahechapalabra. com/ comunicaciones/ internet/ articulo. asp?i=5319) (in Spanish). Tecnologa Hecha Palabra. December 24, 2010. . Retrieved January 25, 2011. [22] http:/ / www. itu. int/ ITU-D/ icteye/ Reporting/ ShowReportFrame. aspx?ReportName=/ WTI/ InformationTechnologyPublic& RP_intYear=2008& RP_intLanguageID=1 [23] "Cifras de los servicios ms solicitado" (http:/ / www. ursec. gub. uy/ scripts/ templates/ portada_principal. asp?nota=portadahome. asp) (in Spanish). URSEC. . Retrieved April 25, 2011. [24] "Ecuador registra un incremento del 57% en el acceso a Internet" (http:/ / www. conatel. gob. ec/ site_conatel/ index. php?option=com_content& view=article& id=1336:ecuador-registra-un-incremento-del-57-en-el-acceso-a-internet& catid=46:noticias-articulos& Itemid=184) (in Spanish). SENATEL. . Retrieved March 19, 2011. [25] "Bases para un Plan Nacional de Banda Ancha de Internet" (http:/ / att. gob. bo/ attachments/ 807_ATT Parte 2. ppt) (in Spanish). Autoridad de Fiscalizacin y Control Social de Telecomunicaciones y Transportes. November 9, 2010. . Retrieved March 19, 2011. [26] "S'poreans are biggest online shoppers in Asia-Pacific region: Poll". The Straits Times. 10 June 2009. "Singapore is now the most wired nation on earth, with the household broadband penetration rate hitting 99.9 per cent last December"
Internet governance
192
Internet governance
Internet governance is the development and application of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. This article describes how the Internet was and is currently governed, some of the controversies that occurred along the way, and the ongoing debates about how the Internet should or should not be governed in the future. Internet governance should not be confused with E-Governance which refers to technology driven governance.
Background
The Internet is a globally distributed network comprising many voluntarily interconnected autonomous networks. It operates without a central governing body. However, to help ensure interoperability, several key technical and policy aspects of the underlying core infrastructure and the principal namespaces are administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN oversees the assignment of globally unique identifiers on the Internet, including domain names, Internet Protocol (IP) addresses, application port numbers in the transport protocols, and many other parameters. This seeks to create a globally unified namespace to ensure the global reach of the Internet. ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. However, the National Telecommunications and Information Administration, an agency of the United States Department of Commerce, continues to have final approval over changes to the DNS root zone.[1][2] This authority over the root zone file makes ICANN one of a few bodies with global, centralized influence over the otherwise distributed Internet.[3] On 16 November 2005, the World Summit on the Information Society, held in Tunis, established the Internet Governance Forum (IGF) to open an ongoing, non-binding conversation among multiple stakeholders about the future of Internet governance.[4] Since WSIS, the term "Internet governance" has been broadened beyond narrow technical concerns to include a wider range of Internet-related policy issues.[5][6]
Definition
The definition of Internet governance has been contested by differing groups across political and ideological lines. One of the main debates concerns the authority and participation of certain actors, such as national governments, corporate entities and civil society, to play a role in the Internet's governance. A Working group established after a United Nations-initiated World Summit on the Information Society (WSIS) proposed the following definition of Internet governance as part of its June 2005 report: Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.[7] Law professor Yochai Benkler developed a conceptualization of Internet governance by the idea of three "layers" of governance: the "physical infrastructure" layer through which information travels; the "code" or "logical" layer that controls the infrastructure; and the "content" layer, which contains the information that signals through the network.[8]
Internet governance
193
History
To understand how the Internet is managed today, it is necessary to know some of the main events of Internet governance.
Internet governance
194
Governors
During 1979 the Internet Configuration Control Board was founded by DARPA to oversee the network's development. During 1984 it was renamed the Internet Advisory Board (IAB), and during 1986 it became the Internet Activities Board. The Internet Engineering Task Force (IETF) was formed during 1986 by the US Government to develop and promote Internet standards. It consisted initially of researchers, but by the end of the year participation was available to anyone, and its business was performed largely by email. From the early days of the network until his death during 1998, Jon Postel oversaw address allocation and other Internet protocol numbering and assignments in his capacity as Director of the Computer Networks Division at the Information Sciences Institute of the University of Southern California, under a contract from the Dept. of Defense. This function eventually became known as the Internet Assigned Numbers Authority (IANA), and as it expanded to include management of the global Domain Name System (DNS) root servers, a small organization grew. Postel also served as RFC Editor. Allocation of IP addresses was delegated to four Regional Internet Registries (RIRs): American Registry for Internet Numbers (ARIN) for North America Rseaux IP Europens - Network Coordination Centre (RIPE NCC) for Europe, the Middle East, and Central Asia Asia-Pacific Network Information Centre (APNIC) for Asia and the Pacific region Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and the Caribbean region In 2004 a new RIR, AfriNIC, was created to manage allocations for Africa. After Jon Postel's death during 1998, the IANA became part of the Internet Corporation for Assigned Names and Numbers (ICANN), a newly created Californian non-profit corporation, initiated during September 1998 by the US Government and awarded a contract by the US Department of Commerce. Initially two board members were elected by the Internet community at large, though this was changed by the rest of the board during 2002 in a little- attended public meeting in Accra, Ghana.[9] During 1992 the Internet Society (ISOC) was founded, with a mission to "assure the open development, evolution and use of the Internet for the benefit of all people throughout the world". Its members include individuals (anyone may join) as well as corporations, organizations, governments, and universities. The IAB was renamed the Internet Architecture Board, and became part of ISOC. The Internet Engineering Task Force also became part of the ISOC. The IETF is overseen currently by the Internet Engineering Steering Group (IESG), and longer term research is carried on by the Internet Research Task Force and overseen by the Internet Research Steering Group. During 2002, a restructuring of the Internet Society gave more control to its corporate members. At the first World Summit on the Information Society (WSIS) in Geneva 2003 the topic of Internet governance was discussed. ICANN's status as a private corporation under contract to the U.S. government created controversy among other governments, especially Brazil, China, South Africa and some Arab states. Since no general agreement existed even on the definition of what comprised Internet governance, United Nations Secretary General Kofi Annan initiated a Working Group on Internet Governance (WGIG) to clarify the issues and report before the second part of the World Summit on the Information Society in Tunis 2005. After much controversial debate, during which the US delegation refused to consider surrendering the US control of the Root Zone file, participants agreed on a compromise to allow for wider international debate on the policy principles. They agreed to establish an Internet Governance Forum, to be convened by United Nations Secretary General before the end of the second quarter of the year 2006. [10] The Greek government volunteered to host the first such meeting.
Internet governance
195
References
[1] Klein, Hans. (2004). "ICANN and Non-Territorial Sovereignty: Government Without the Nation State." (http:/ / www. ip3. gatech. edu/ research/ KLEIN_ICANN+ Sovereignty. doc) Internet and Public Policy Project. Georgia Institute of Technology. [2] Packard, Ashley (2010). Digital Media Law. Wiley-Blackwell. pp.65. ISBN978-1-4051-8169-3. [3] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.61. ISBN978-0-262-01459-5. [4] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.67. ISBN978-0-262-01459-5. [5] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.7980. ISBN978-0-262-01459-5. [6] DeNardis, Laura, The Emerging Field of Internet Governance (http:/ / ssrn. com/ abstract=1678343) (September 17, 2010). Yale Information Society Project Working Paper Series. [7] "Report of the Working Group on Internet Governance (WGIG)" (http:/ / www. wgig. org/ docs/ WGIGREPORT. pdf), June 2005), p.4. [8] Yochai Benkler, "From Consumers to Users: Shifting the Deeper Structures of Regulation Towards Sustainable Commons and User Access" (http:/ / www. law. indiana. edu/ fclj/ pubs/ v52/ no3/ benkler1. pdf), 52 Fed. Comm. L.J. 561, (2000). [9] "Net governance chief will step down next year" (http:/ / business. highbeam. com/ 437235/ article-1G1-106850793/ net-governance-chief-step-down-next-year), David McGuire, Washingtonpost.com, 28 May 2002. [10] Gore, Innocent Internet governance: U.S., Developing countries strike deal, Africa News Service Nov. 21, 2005, Gale Canada in Context.Web, 29 Oct 2011. [11] Goldsmith/Wu, Jack/Tim (2006). Who Control the Internet? Illusions of a Borderless World. New York: Oxford University Press Inc.. pp.171. ISBN978-0-19-515266-1. [12] "Recommendations from the IBSA (India-Brazil-South Africa) Multistakeholder meeting on Global Internet Governance" (http:/ / www. culturalivre. org. br/ artigos/ IBSA_recommendations_Internet_Governance. pdf), 1-2 September 2011, Rio de Janeiro, Brazil [13] "Tunis Agenda for the Information Society" (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. html), World Summit on the Information Society, 18 November 2005
Internet governance
196
Further reading
Ruling the Root: Internet Governance and the Taming of Cyberspace (http://mitpress.mit.edu/catalog/item/ default.asp?ttype=2&tid=10205/) by Milton Mueller, MIT Press, 2002. The definitive study of DNS and ICANN's early history. Protocol Politics (http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11893/), Laura DeNardis, MIT Press, 2009. IP addressing and the migration to IPv6 "One History of DNS" (http://www.byte.org/one-history-of-dns.pdf) by Ross W. Rader. April 2001. Article contains historic facts about DNS and explains the reasons behind the so called "dns war". "The Emerging Field of Internet Governance" (http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1678343), by Laura DeNardis. September 2010. Suggests a framework for understanding problems in Internet governance. Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance (http://www. scribd.com/doc/58805571/ Launching-the-DNS-War-Dot-Com-Privatization-and-the-Rise-of-Global-Internet-Governance) by Craig Simon. December 2006. Ph.D. dissertation containing an extensive history of events which sparked the so-called "dns war". "[email protected]: Toward a Critical Theory of Cyberspace" (http://papers.ssrn.com/sol3/papers. cfm?abstract_id=363840), by A. Michael Froomkin, 116 Harv. L. Rev. 749 (2003). Argues that the Internet standards process undertaken by the IETF fulfils Jrgen Habermas's conditions for the best practical discourse. Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. ISBN978-0-262-01459-5. Dutton, William H.; Malcolm Peltu (2007-03). "The emerging Internet governance mosaic: Connecting the pieces". Information Polity: The International Journal of Government & Democracy in the Information Age 12 (1/2): 6381. ISSN15701255.
External links
Internet Governance Project (http://www.internetgovernance.org/) Diplo Internet Governance Community (http://www.diplointernetgovernance.org/) Global Internet Governance Academic Network (GigaNet) (http://www.gig-net.org/) "The Politics and Issues of Internet Governance" (http://www.institut-gouvernance.org/en/analyse/ fiche-analyse-265.html), Milton L. Mueller, April 2007, analysis from the Institute of research and debate on Governance (Institut de recherche et dbat sur la gouvernance) ICANN - the Internet Corporation for Assigned Names and Numbers (http://www.icann.org) World Summit on the Information Society: Geneva 2003 and Tunis 2005 (http://www.itu.int/wsis) The Internet Governance Forum (IGF) (http://www.wgig.org), Working Group on Internet Governance (WGIG) The Future of Global Internet governance (http://www.iit.cnr.it/en/taxonomy/term/334/), Institute of Informatics and Telematics - Consiglio Nazionale delle Ricercha (IIT-CNR), Pisa CircleID: Internet Governance (http://www.circleid.com/topics/internet_governance) "United States cedes control of the internet - but what now? - Review of an extraordinary meeting" (http://www. theregister.co.uk/2006/07/27/ntia_icann_meeting/), Kieren McCarthy, The Register, July 2006 APC Internet Rights Charter (http://www.apc.org/en/pubs/about-apc/apc-internet-rights-charter), Association for Progressive Communications, November 2006
197
Common uses
Timeline of popular Internet services
2011
Google+, a social networking system by Google, integrating several of the company's existing services, such as Google Buzz and Picasa Web Albums. Duolingo, a free language-learning website and crowdsourced text translation platform.
2010
OnLive, a cloud gaming platform where the video games are synchronized, rendered, and stored on remote servers and delivered via the Internet. Diaspora, a free personal web server that implements a distributed social networking service. Flattr, a microdonation system.
2009
Google Docs, a free, Web-based word processor, spreadsheet, presentation, form, and data storage service offered by Google goes out of beta. Wolfram Alpha, the answer engine is born. Kickstarter, an online threshold pledge system for funding creative projects. Web 2.0 Suicide Machine, a service to automatically delete private content and friend relationships from many social networking sites at once.
2008
Encyclopedia of Life, a free, online collaborative encyclopedia intended to document all of the 1.8 million living species known to science. GitHub, a web-based hosting service for software development projects that use the Git revision control system TinEye, a reverse image search engine. Spotify, a DRM-based music streaming service offering unlimited streaming of selected music from a range of major and independent record labels. Jinni, a semantic search and recommendation engine for movies, TV shows and short films. Amazon Elastic Compute Cloud (EC2), a cloud computing platform that allows users to rent virtual computers on which to run their own computer applications. Dropbox, a file hosting service that uses cloud computing to enable users to store and share files and folders with others across the Internet using file synchronization.
198
2007
Google Street View, a technology featured in Google Maps and Google Earth that provides panoramic views from various positions along many streets in the world. Kindle, the e-book reader by Amazon.com is launched together with the e-book virtual bookshop. In July 2010 Amazon announced that e-book sales for its Kindle reader outnumbered sales of hardcover books. Tumblr is a microblogging platform that allows users to post text, images, videos, links, quotes and audio to their tumblelog, a short-form blog. Experience Project, a free social networking website of online communities premised on connecting people through shared life experiences. SoundCloud, an online audio distribution platform which allows collaboration, promotion and distribution of audio recordings.
2006
WikiLeaks, an international non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Twitter is a social networking and micro-blogging service that enables its users to send and read other users' updates, tweets, which are text-based posts of up to 140 characters in length. IMSLP, the International Music Score Library Project. Spokeo, a social network aggregator web site that aggregates data from many online and offline sources launches, raising many privacy concerns. YouPorn, a free pornographic video sharing website. Mint.com is a free web-based personal financial management service for the US and Canada. Khan Academy, free educational video repository with more than 3,000 micro lectures, automated exercises, and tutoring.
2005
YouTube is a video sharing website. Google Earth is a virtual globe computer program. Megaupload, allows users to upload and download files. Musopen, an online music library of copyright-free (public domain) music. OpenID, an open standard that describes how users can be authenticated in a decentralized manner eyeOS, an open source web desktop following the cloud computing concept. Etsy, an e-commerce website focused on handmade or vintage items as well as art and craft supplies. Pandora Radio, an online radio and music recommendation system based on the Music Genome Project.
2004
OpenStreetMap, a collaborative project to create a free editable map of the world. Podcast: A downloadable audio file for listening to on a portable media player. A bit like a radio program that you can save and listen to at your convenience. "Podcast" is a portmanteau of the words "iPod" and "broadcast". Podcasting began to catch hold in late 2004, though the ability to distribute audio and video files easily has been around since before the dawn of the Internet. Facebook is a social networking website. World of Warcraft (WoW) is a massively multiplayer online role-playing game (MMORPG). Flickr is a photo/ video sharing website.
199
2003
Skype, a software application that allows users to make voice calls over the Internet. iTunes is an online store which sells music and videos in downloadable form. MySpace is a social networking website. Steam, a digital distribution, digital rights management, multiplayer and communications platform for computer games developed by Valve Corporation. Second Life is a virtual world. 4chan is created. CouchSurfing, a hospitality exchange network. The Pirate Bay, a Swedish website that hosts torrent files.
2002
Tor, a system intended to enable online anonymity is released. Last.fm, a music recommender system. LinkedIn, a business-oriented social networking site is founded and launched next year. TinyURL, a URL shortening service.
Skyscanner, a flight search engine that allows users to browse for flights via price and location.
2001
Wikipedia, an online encyclopedia. StumbleUpon, a discovery engine that uses collaborative filtering to recommend web content to its users. PartyPoker.com, a set of online poker card rooms. Meetup, an online social networking portal that facilitates offline group meetings in various localities around the world.
2000
Blogger is a blog publishing service that allows private or multi-user blogs with time-stamped entries. Geocaching.com starts its activity. This outdoor sport activity with online support can be considered one of the early forms of geosocial networking. deviantArt, an online community showcasing various forms of user-made artwork. TripAdvisor, travel site that assists customers in gathering travel information, posting reviews and opinions of travel related content and engaging in interactive travel forums.
1999
RSS, the first version of the web feed formats used to publish frequently updated works is created at Netscape. Monster.com, an employment website. SourceForge, a web-based source code repository. It acts as a centralized location for software developers to control and manage open source software development. SETI@home, an internet-based public volunteer computing project. Its purpose is to analyze radio signals, searching for signs of extra terrestrial intelligence. Napster (now defunct) was an online music peer-to-peer file sharing service
200
1998
Google Inc. launched a search engine for web sites of the World Wide Web, subsequently extending search facilities to many types of media, including books, magazines, forums, email, news. Yahoo! Groups a community-driven Internet communication tool, a hybrid between an electronic mailing list and an Internet forum starts off as Yahoo! Clubs PayPal, an e-commerce business allowing payments and money transfers to be made through the Internet.
1997
Babel Fish launched by AltaVista. It was the first language translation service for web content, with technology provided by SYSTRAN. Netflix, an American corporation that offers both on-demand video streaming over the internet, and flat rate online video rental. Go Daddy, an Internet domain registrar and Web hosting company. About.com, an online resource for original information and advice.
1996
Ultima Online (UO), a graphical massively multiplayer online role-playing game (MMORPG). Internet Archive is an archive of periodically cached versions of websites. Hotmail, a free web-based email service. Ticketmaster, a ticket sales and distribution company goes online and sells its first ticket through their platform. Shopzilla, a price comparison service.
1995
Ebay is an auction and shopping website. Wiki: A website that anyone can edit. Craigslist, a centralized network of online communities, featuring free online classified advertisements. AltaVista, a web search engine owned by Yahoo!. It was once one of the most popular search engines but its popularity declined with the rise of Google.
1994
Amazon.com is an online retailer, best known for selling books, but now sells all kinds of goods. GeoCities a free web hosting service, now defunct, founded as Beverly Hills Internet (BHI) by David Bohnett and John Rezner . The Yahoo! website started off as a web directory and soon became a webportal offering all kinds of Internet services. Match.com, an online dating company. FedEx.com launches, being the first transportation web site to offer online package tracking.
201
1993
Blog: A blog (a contraction of the term weblog) is a type of website which resembles an online diary. Entries are commonly displayed in reverse-chronological order. Originally hand-coded, there are now blogging tools (a kind of content management system) to facilitate searching and linking to other blogs. CDDB, a database for software applications to look up audio CD (compact disc) information over the Internet. Hutchison Paging email gateway allows emails to be sent to message pagers in the UK. This same system worked with Orange mobile phones when they were launched in 1994, emails would arrive as texts.
1992
HTML was developed by a British engineer, Tim Berners-Lee while working in CERN. This was devised so that reports from CERN, including photographs, graphs and tables could be shared (served) across the web. Veronica (search engine) provides an index of files on Gopher servers.
1991
arXiv, an open access archive for electronic preprints of scientific papers. Gopher: A hypertext system which was soon largely replaced by the World Wide Web.
1990
ARPANET was retired and merged into the NSFNET. IMDb, the Internet Movie Database. The Archie search engine lists names of files on FTP sites.
1988
Internet Relay Chat (IRC): A form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message.
1986
LISTSERV the first electronic mailing list software application,
1983
Internet: A global computer network which was created by interconnecting various existing networks with the TCP/IP protocol suite.
1982
First standardization of the Simple Mail Transfer Protocol, a network transmission standard for the transport of email.
202
1979
Usenet: A distributed threaded discussion and file sharing system; a collection of forums known as newsgroups, that was a precursor to today's web-based forums. One notable difference from a BBS or web forum is that there is no central system owner. Usenet is distributed among a large, constantly changing conglomeration of servers which store and forward messages to one another.
1978
MUD: First real-time, multi-player MUD adventure game was developed by Roy Trubshaw and Richard Bartle at Essex University, England.
1973
E-mail: First proposal for standardization of electronic mail message format in RFC 561. ARPANET made its first international connection between University college in London and Royal Radar establishment in Norway.
1971
FTP: File Transfer Protocol Project Gutenberg, a volunteer effort to digitize and archive cultural works.
1969
Telnet: A system for logging in, over a network, to a computer situated in another location. ARPANET connected Stanford research Institute in Santa Barbara to the University of Utah, the internet was born, although the first attempt actually crashed on the 'g' of the word 'Login'
1960s
Email: Electronic mail applications are developed on timesharing main frame computers for communication between system users. The beginning of the internet can be traced back to 1962, when the RAND (America's military think tank) tackled the problem of how they could communicate in the aftermath of a nuclear attack, their thinking was prompted by the Cuban Missile Crisis.
203
Email
Electronic mail, commonly referred to as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. Historically, the term electronic mail was used generically for any electronic The at sign, a part of every SMTP email [1] address document transmission. For example, several writers in the early 1970s used the term to describe fax document transmission.[2][3] As a result, it is difficult to find the first citation for the use of the term with the more specific meaning it has today. An Internet email message[4] consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. Originally a text-only (7-bit ASCII and others) communications medium, email was extended to carry multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME). Electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating it,[5] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today. Network-based email was initially exchanged on the ARPANET in extensions to the File Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and body) itself.
Spelling
Electronic mail has several English spelling options that occasionally prove cause for vehement disagreement.[6][7] email is the form required by IETF Requests for Comment and working groups[8] and increasingly by style guides.[9][10][11] This spelling also appears in most dictionaries.[12][13][14][15][16][17] e-mail is a form previously recommended by some prominent journalistic and technical style guides. According to Corpus of Contemporary American English data, this is the form that appears most frequently in edited, published American English writing.[18] mail was the form used in the original RFC. The service is referred to as mail and a single piece of electronic mail is called a message.[19][20][21] eMail, capitalizing only the letter M, was common among ARPANET users and the early developers of Unix, CMS, AppleLink, eWorld, AOL, GEnie, and Hotmail.
Email EMail is a traditional form that has been used in RFCs for the "Author's Address",[20][21] and is expressly required "for historical reasons".[22] E-mail is sometimes used, capitalizing the initial letter E as in similar abbreviations like E-piano, E-guitar, A-bomb, H-bomb, and C-section.[23] There is also some variety in the plural form of the term. In US English email is used as a mass noun (like the term mail for items sent through the postal system), but in British English it is more commonly used as a count noun with the plural emails.
204
Origin
Precursors
Sending text messages electronically could be said to date back to the Morse code telegraph of the mid 1800s; and the 1939 New York World's Fair, where IBM sent a letter of congratulations from San Francisco to New York on an IBM radio-type, calling it a high-speed substitute for mail service in the world of tomorrow.[24] Teleprinters were used in Germany during World War II,[25] and use spread until the late 1960s when there was a worldwide Telex network. Additionally, there was the similar but incompatible American TWX, which remained important until the late 1980s.[26] By the early 1970s, the United States Department of Defense AUTODIN network provided message service between 1,350 terminals, handling 30 million messages per month, with an average message length of approximately 3,000 characters. Autodin was supported by 18 large computerized switches, and was connected to the United States General Services Administration Advanced Record System, which provided similar services to roughly 2,500 terminals.[27]
205
Email networks
Soon systems were developed to link compatible mail programs between different organisations over dialup modems or leased lines, creating local and global networks. In 1971 the first ARPANET email was sent,[41] and through RFC 561, RFC 680, RFC 724 and finally 1977's RFC 733, became a standardized working system. Other separate networks were also being created including: Unix mail was networked by 1978's uucp,[42] which was also used for USENET newsgroup postings IBM mainframe email was linked by BITNET in 1981[43] IBM PCs running DOS in 1984 could link with FidoNet for email and shared bulletin board posting
Eventually these systems too could also be linked between different organizations, as long as they ran the same email system and proprietary protocol.[44]
Attempts at interoperability
Early interoperability among independent systems included: ARPANET, the forerunner of today's Internet, defined the first protocols for dissimilar computers to exchange email uucp implementations for non-Unix systems were used as an open "glue" between differing mail systems, primarily over dialup telephones CSNet used dial-up telephone access to link additional sites to the ARPANET and then Internet Later efforts at interoperability standardization included: Novell briefly championed the open MHS protocol but abandoned it after purchasing the non-MHS WordPerfect Office (renamed Groupwise) The Coloured Book protocols on UK academic networks until 1992 X.400 in the 1980s and early 1990s was promoted by major vendors and mandated for government use under GOSIP but abandoned by all but a few in favor of Internet SMTP by the mid-1990s.
Email Marty Yonke combined rewrote NRD to include reading, access to SNDMSG for sending, and a help system, and called the utility WRD which was later known as BANANARD. John Vittal then updated this version to include 3 important commands: Move (combined save/delete command), Answer (determined to whom a reply should be sent) and Forward (send an email to a person who was not already a recipient). The system was called MSG. With inclusion of these features, MSG is considered to be the first integrated modern email program, from which many other applications have descended.[45]
206
Operation overview
The diagram to the right shows a typical sequence of events[49] that takes place when Alice composes a message using her mail user agent (MUA). She enters the email address of her correspondent, and hits the "send" button.
207
1. Her MUA formats the message in email format and uses the Submission Protocol (a profile of the Simple Mail Transfer Protocol (SMTP), see RFC 6409) to send the message to the local mail submission agent (MSA), in this case smtp.a.org, run by Alice's internet service provider (ISP). 2. The MSA looks at the destination address provided in the SMTP protocol (not from the message header), in this case [email protected]. An Internet email address is a string of the form localpart@exampledomain. The part before the @ sign is the local part of the address, often the username of the recipient, and the part after the @ sign is a domain name or a fully qualified domain name. The MSA resolves a domain name to determine the fully qualified domain name of the mail exchange server in the Domain Name System (DNS). 3. The DNS server for the b.org domain, ns.b.org, responds with any MX records listing the mail exchange servers for that domain, in this case mx.b.org, a message transfer agent (MTA) server run by Bob's ISP. 4. smtp.a.org sends the message to mx.b.org using SMTP. This server may need to forward the message to other MTAs before the message reaches the final message delivery agent (MDA). 1. The MDA delivers it to the mailbox of the user bob. 2. Bob presses the "get mail" button in his MUA, which picks up the message using either the Post Office Protocol (POP3) or the Internet Message Access Protocol (IMAP4). That sequence of events applies to the majority of email users. However, there are many alternative possibilities and complications to the email system: Alice or Bob may use a client connected to a corporate email system, such as IBM Lotus Notes or Microsoft Exchange. These systems often have their own internal email format and their clients typically communicate with the email server using a vendor-specific, proprietary protocol. The server sends or receives email via the Internet through the product's Internet mail gateway which also does any necessary reformatting. If Alice and Bob work for the same company, the entire transaction may happen completely within a single corporate email system. Alice may not have a MUA on her computer but instead may connect to a webmail service. Alice's computer may run its own MTA, so avoiding the transfer at step 1. Bob may pick up his email in many ways, for example logging into mx.b.org and reading it directly, or by using a webmail service. Domains usually have several mail exchange servers so that they can continue to accept mail when the main mail exchange server is not available. Email messages are not secure if email encryption is not used correctly.
Email Many MTAs used to accept messages for any recipient on the Internet and do their best to deliver them. Such MTAs are called open mail relays. This was very important in the early days of the Internet when network connections were unreliable. If an MTA couldn't reach the destination, it could at least deliver it to a relay closer to the destination. The relay stood a better chance of delivering the message at a later time. However, this mechanism proved to be exploitable by people sending unsolicited bulk email and as a consequence very few modern MTAs are open mail relays, and many MTAs don't accept messages from open mail relays because such messages are very likely to be spam.
208
Message format
The Internet email message format is now defined by RFC 5322, with multi-media content attachments being defined in RFC 2045 through RFC 2049, collectively called Multipurpose Internet Mail Extensions or MIME. RFC 5322 replaced the earlier RFC 2822 in 2008, and in turn RFC 2822 in 2001 replaced RFC 822 which had been the standard for Internet email for nearly 20 years. Published in 1982, RFC 822 was based on the earlier RFC 733 for the ARPANET.[50] Internet email messages consist of two major sections: Header Structured into fields such as From, To, CC, Subject, Date, and other information about the email. Body The basic content, as unstructured text; sometimes containing a signature block at the end. This is exactly the same as the body of a regular letter. The header is separated from the body by a blank line.
Message header
Each message has exactly one header, which is structured into fields. Each field has a name and a value. RFC 5322 specifies the precise syntax. Informally, each line of text in the header that begins with a printable character begins a separate field. The field name starts in the first character of the line and ends before the separator character ":". The separator is then followed by the field value (the "body" of the field). The value is continued onto subsequent lines if those lines have a space or tab as their first character. Field names and values are restricted to 7-bit ASCII characters. Non-ASCII values may be represented using MIME encoded words. Header fields Email header fields can be multi-line, and each line should be at most 78 characters long and in no event more than 998 characters long.[51] Header fields defined by RFC 5322 can only contain US-ASCII characters; for encoding characters in other sets, a syntax specified in RFC 2047 can be used.[52] Recently the IETF EAI working group has defined some standards track extensions,[53][54] replacing previous experimental extensions, to allow UTF-8 encoded Unicode characters to be used within the header. In particular, this allows email addresses to use non-ASCII characters. Such characters must only be used by servers that support these extensions. The message header must include at least the following fields:[55] From: The email address, and optionally the name of the author(s). In many email clients not changeable except through changing account settings. Date: The local time and date when the message was written. Like the From: field, many email clients fill this in automatically when sending. The recipient's client may then display the time in the format and time zone local to him/her. The message header should include at least the following fields:[56] Message-ID: Also an automatically generated field; used to prevent multiple delivery and for reference in In-Reply-To: (see below).
Email In-Reply-To: Message-ID of the message that this is a reply to. Used to link related messages together. This field only applies for reply messages. RFC 3864 describes registration procedures for message header fields at the IANA; it provides for permanent [57] and provisional [58] message header field names, including also fields defined for MIME, netnews, and http, and referencing relevant RFCs. Common header fields for email include: To: The email address(es), and optionally name(s) of the message's recipient(s). Indicates primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below. Subject: A brief summary of the topic of the message. Certain abbreviations are commonly used in the subject, including "RE:" and "FW:". Bcc: Blind Carbon Copy; addresses added to the SMTP delivery list but not (usually) listed in the message data, remaining invisible to other recipients. Cc: Carbon copy; Many email clients will mark email in your inbox differently depending on whether you are in the To: or Cc: list. Content-Type: Information about how the message is to be displayed, usually a MIME type. Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that automated "vacation" or "out of office" responses should not be returned for this mail, e.g. to prevent vacation notices from being sent to all other subscribers of a mailinglist. Sendmail uses this header to affect prioritization of queued email, with "Precedence: special-delivery" messages delivered sooner. With modern high-bandwidth networks delivery priority is less of an issue than it once was. Microsoft Exchange respects a fine-grained automatic response suppression mechanism, the X-Auto-Response-Suppress header.[59] References: Message-ID of the message that this is a reply to, and the message-id of the message the previous reply was a reply to, etc. Reply-To: Address that should be used to reply to the message. Sender: Address of the actual sender acting on behalf of the author listed in the From: field (secretary, list manager, etc.). Archived-At: A direct link to the archived form of an individual email message.[60] Note that the To: field is not necessarily related to the addresses to which the message is delivered. The actual delivery list is supplied separately to the transport protocol, SMTP, which may or may not originally have been extracted from the header content. The "To:" field is similar to the addressing at the top of a conventional letter which is delivered according to the address on the outer envelope. In the same way, the "From:" field does not have to be the real sender of the email message. Some mail servers apply email authentication systems to messages being relayed. Data pertaining to server's activity is also part of the header, as defined below. SMTP defines the trace information of a message, which is also saved in the header using the following two fields:[61] Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last to first). Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at the top of the header. Other header fields that are added on top of the header by the receiving server may be called trace fields, in a broader sense.[62] Authentication-Results: when a server carries out authentication checks, it can save the results in this field for consumption by downstream agents.[63] Received-SPF: stores the results of SPF checks.[64] Auto-Submitted: is used to mark automatically generated messages.[65] VBR-Info: claims VBR whitelisting[66]
209
210
Message body
Content encoding Email was originally designed for 7-bit ASCII.[67] Most email software is 8-bit clean but must assume it will communicate with 7-bit servers and mail readers. The MIME standard introduced character set specifiers and two content transfer encodings to enable transmission of non-ASCII data: quoted printable for mostly 7 bit content with a few characters outside that range and base64 for arbitrary binary data. The 8BITMIME and BINARY extensions were introduced to allow transmission of mail without the need for these encodings, but many mail transport agents still do not support them fully. In some countries, several encoding schemes coexist; as the result, by default, the message in a non-Latin alphabet language appears in non-readable form (the only exception is coincidence, when the sender and receiver use the same encoding scheme). Therefore, for international character sets, Unicode is growing in popularity. Plain text and HTML Most modern graphic email clients allow the use of either plain text or HTML for the message body at the option of the user. HTML email messages often include an automatically generated plain text copy as well, for compatibility reasons. Advantages of HTML include the ability to include in-line links and images, set apart previous messages in block quotes, wrap naturally on any display, use emphasis such as underlines and italics, and change font styles. Disadvantages include the increased size of the email, privacy concerns about web bugs, abuse of HTML email as a vector for phishing attacks and the spread of malicious software.[68] Some web based Mailing lists recommend that all posts be made in plain-text, with 72 or 80 characters per line[69][70] for all the above reasons, but also because they have a significant number of readers using text-based email clients such as Mutt. Some Microsoft email clients allow rich formatting using RTF, but unless the recipient is guaranteed to have a compatible email client this should be avoided.[71] In order to ensure that HTML sent in an email is rendered properly by the recipient's client software, an additional header must be specified when sending: "Content-type: text/html". Most email programs send this header automatically.
Email interfaces allow users to access their mail with any standard web browser, from any computer, rather than relying on an email client. Programs used by users for retrieving, reading, and managing email are called mail user agents (MUAs). Mail can be stored on the client, on the server side, or in both places. Standard formats for mailboxes include Maildir and mbox. Several prominent email clients use their own proprietary format and require conversion software to transfer email between them. Server-side storage is often in a proprietary format but since access is through a standard protocol such as IMAP, moving email from one server to another can be done with any MUA supporting the protocol. Accepting a message obliges an MTA to deliver it,[72] and when a message cannot be delivered, that MTA must send a bounce message back to the sender, indicating the problem.
211
Filename extensions
Upon reception of email messages, email client applications save messages in operating system files in the file system. Some clients save individual messages as separate files, while others use various database formats, often proprietary, for collective storage. A historical standard of storage is the mbox format. The specific format used is often indicated by special filename extensions: eml Used by many email clients including Microsoft Outlook Express, Windows Mail and Mozilla Thunderbird. The files are plain text in MIME format, containing the email header as well as the message contents and attachments in one or more of several formats. emlx Used by Apple Mail. msg Used by Microsoft Office Outlook and OfficeLogic Groupware. mbx Used by Opera Mail, KMail, and Apple Mail based on the mbox format. Some applications (like Apple Mail) leave attachments encoded in messages for searching while also saving separate copies of the attachments. Others separate attachments from messages and save them in a specific directory.
Types
Main article: Email types
212
Use
Flaming Flaming occurs when a person sends a message with angry or antagonistic content. The term is derived from the use of the word Incendiary to describe particularly heated email discussions. Flaming is assumed to be more common today because of the ease and impersonality of email communications: confrontations in person or via telephone require direct interaction, where social norms encourage civility, whereas typing a message to another person is an indirect interaction, so civility may be forgotten. Flaming is generally looked down upon by Internet communities as it is considered rude and non-productive. Email bankruptcy Also known as "email fatigue", email bankruptcy is when a user ignores a large number of email messages after falling behind in reading and answering them. The reason for falling behind is often due to information overload and a general sense there is so much information that it is not possible to read it all. As a solution, people occasionally send a boilerplate message explaining that the email inbox is being cleared out. Harvard University law professor Lawrence Lessig is credited with coining this term, but he may only have popularized it.[74]
213
In business
Email was widely accepted by the business community as the first broad electronic communication medium and was the first 'e-revolution' in business communication. Email is very simple to understand and like postal mail, email solves two basic problems of communication: logistics and synchronization (see below). LAN based email is also an emerging form of usage for business. It not only allows the business user to download mail when offline, it also allows the small business user to have multiple users' email IDs with just one email connection. Pros The problem of logistics: Much of the business world relies upon communications between people who are not physically in the same building, area or even country; setting up and attending an in-person meeting, telephone call, or conference call can be inconvenient, time-consuming, and costly. Email provides a way to exchange information between two or more people with no set-up costs and that is generally far less expensive than physical meetings or phone calls. The problem of synchronisation: With real time communication by meetings or phone calls, participants have to work on the same schedule, and each participant must spend the same amount of time in the meeting or call. Email allows asynchrony: each participant may control their schedule independently. Cons Most business workers today spend from one to two hours of their working day on email: reading, ordering, sorting, 're-contextualizing' fragmented information, and writing email.[75] The use of email is increasing due to increasing levels of globalisation labour division and outsourcing amongst other things. Email can lead to some well-known problems: Loss of context: which means that the context is lost forever; there is no way to get the text back. Information in context (as in a newspaper) is much easier and faster to understand than unedited and sometimes unrelated fragments of information. Communicating in context can only be achieved when both parties have a full understanding of the context and issue in question. Information overload: Email is a push technology the sender controls who receives the information. Convenient availability of mailing lists and use of "copy all" can lead to people receiving unwanted or irrelevant information of no use to them. Inconsistency: Email can duplicate information. This can be a problem when a large team is working on documents and information while not in constant contact with the other members of their team. Liability. Statements made in an email can be deemed legally binding and be used against a party in a court of law.[76] Despite these disadvantages, email has become the most widely used medium of communication within the business world. In fact, a 2010 study on workplace communication [77], found that 83% of U.S. knowledge workers felt that email was critical to their success and productivity at work.[78] Research on email marketing Research suggests that email marketing can be viewed as useful by consumers if it contains information such as special sales offerings and new product information. Offering interesting hyperlinks or generic information on consumer trends is less useful.[79] This research by Martin et al. (2003) also shows that if consumers find email marketing useful, they are likely to visit a store thereby overcoming limitations of Internet marketing such as not being able to touch or try on a product.
214
Problems
Attachment size limitation
Email messages may have one or more attachments. Attachments serve the purpose of delivering binary or text files of unspecified size. In principle there is no technical intrinsic restriction in the SMTP protocol limiting the size or number of attachments. In practice, however, email service providers implement various limitations on the permissible size of files or the size of an entire message. Furthermore, due to technical reasons, often a small attachment can increase in size when sent,[80] which can be confusing to senders when trying to assess whether they can or cannot send a file by email, and this can result in their message being rejected. As larger and larger file sizes are being created and traded, many users are either forced to upload and download their files using an FTP server, or more popularly, use online file sharing facilities or services, usually over web-friendly HTTP, in order to send and receive them.
Information overload
A December 2007 New York Times blog post described information overload as "a $650 Billion Drag on the Economy",[81] and the New York Times reported in April 2008 that "E-MAIL has become the bane of some peoples professional lives" due to information overload, yet "none of the current wave of high-profile Internet start-ups focused on email really eliminates the problem of email overload because none helps us prepare replies".[82] GigaOm posted a similar article in September 2010, highlighting research [83] that found 57% of knowledge workers were overwhelmed by the volume of email they received.[78] Technology investors reflect similar concerns.[84] In October 2010, CNN published an article titled "Happy Information Overload Day" that compiled research on email overload from IT companies and productivity experts. According to Basex, the average knowledge worker receives 93 emails a day. Subsequent studies have reported higher numbers.[85] Marsha Egan, an email productivity expert, called email technology both a blessing and a curse in the article. She stated, "Everyone just learns that they have to have it dinging and flashing and open just in case the boss e-mails," she said. "The best gift any group can give each other is to never use e-mail urgently. If you need it within three hours, pick up the phone."[86]
215
Email spoofing
Email spoofing occurs when the header information of an email is altered to make the message appear to come from a known or trusted source. It is often used as a ruse to collect personal information.
Email bombing
Email bombing is the intentional sending of large volumes of messages to a target address. The overloading of the target email address can render it unusable and can even cause the mail server to crash.
Privacy concerns
Today it can be important to distinguish between Internet and internal email systems. Internet email may travel and be stored on networks and computers without the sender's or the recipient's control. During the transit time it is possible that third parties read or even modify the content. Internal mail systems, in which the information never leaves the organizational network, may be more secure, although information technology personnel and others whose function may involve monitoring or managing may be accessing the email of other employees. Email privacy, without some security precautions, can be compromised because: email messages are generally not encrypted. email messages have to go through intermediate computers before reaching their destination, meaning it is relatively easy for others to intercept and read messages. many Internet Service Providers (ISP) store copies of email messages on their mail servers before they are delivered. The backups of these can remain for up to several months on their server, despite deletion from the mailbox. the "Received:"-fields and other information in the email can often identify the sender, preventing anonymous communication. There are cryptography applications that can serve as a remedy to one or more of the above. For example, Virtual Private Networks or the Tor anonymity network can be used to encrypt traffic from the user machine to a safer network while GPG, PGP, SMEmail,[90] or S/MIME can be used for end-to-end message encryption, and SMTP STARTTLS or SMTP over Transport Layer Security/Secure Sockets Layer can be used to encrypt communications for a single mail hop between the SMTP client and the SMTP server. Additionally, many mail user agents do not protect logins and passwords, making them easy to intercept by an attacker. Encrypted authentication schemes such as SASL prevent this. Finally, attached files share many of the same hazards as those found in peer-to-peer filesharing. Attached files may contain trojans or viruses.
Email These NDRs then constitute spam from the ISP to the innocent user There are a number of systems that allow the sender to see if messages have been opened.[91][92][93][94] The receiver could also let the sender know that the emails have been opened through an "Okay" button. A check sign can appear in the sender's screen when the receiver's "Okay" button is pressed.
216
U.S. government
The U.S. federal government has been involved in email in several different ways. Starting in 1977, the U.S. Postal Service (USPS) recognized that electronic mail and electronic transactions posed a significant threat to First Class mail volumes and revenue. Therefore, the USPS initiated an experimental email service known as E-COM. Electronic messages were transmitted to a post office, printed out, and delivered as hard copy. To take advantage of the service, an individual had to transmit at least 200 messages. The delivery time of the messages was the same as First Class mail and cost 26 cents. Both the Postal Regulatory Commission and the Federal Communications Commission opposed E-COM. The FCC concluded that E-COM constituted common carriage under its jurisdiction and the USPS would have to file a tariff.[95] Three years after initiating the service, USPS canceled E-COM and attempted to sell it off.[96][97][98][99][100][101] The early ARPANET dealt with multiple email clients that had various, and at times incompatible, formats. For example, in the Multics, the "@" sign meant "kill line" and anything before the "@" sign was ignored, so Multics users had to use a command-line option to specify the destination system.[31] The Department of Defense DARPA desired to have uniformity and interoperability for email and therefore funded efforts to drive towards unified inter-operable standards. This led to David Crocker, John Vittal, Kenneth Pogran, and Austin Henderson publishing RFC 733, "Standard for the Format of ARPA Network Text Message" (November 21, 1977), which was apparently not effective. In 1979, a meeting was held at BBN to resolve incompatibility issues. Jon Postel recounted the meeting in RFC 808, "Summary of Computer Mail Services Meeting Held at BBN on 10 January 1979" (March 1, 1982), which includes an appendix listing the varying email systems at the time. This, in turn, lead to the release of David Crocker's RFC 822, "Standard for the Format of ARPA Internet Text Messages" (August 13, 1982).[102] The National Science Foundation took over operations of the ARPANET and Internet from the Department of Defense, and initiated NSFNet, a new backbone for the network. A part of the NSFNet AUP forbade commercial traffic.[103] In 1988, Vint Cerf arranged for an interconnection of MCI Mail with NSFNET on an experimental basis. The following year Compuserve email interconnected with NSFNET. Within a few years the commercial traffic restriction was removed from NSFNETs AUP, and NSFNET was privatised. In the late 1990s, the Federal Trade Commission grew concerned with fraud transpiring in email, and initiated a series of procedures on spam, fraud, and phishing.[104] In 2004, FTC jurisdiction over spam was codified into law in the form of the CAN SPAM Act.[105] Several other U.S. federal agencies have also exercised jurisdiction including the Department of Justice and the Secret Service. NASA has provided email capabilities to astronauts aboard the Space Shuttle and International Space Station since 1991 when a Macintosh Portable was used aboard Space Shuttle mission STS-43 to send the first email via AppleLink.[106][107][108] Today astronauts aboard the International Space Station have email capabilities through the via wireless networking throughout the station and are connected to the ground at 3 Mbit/s Earth to station and 10 Mbit/s station to Earth, comparable to home DSL connection speeds.[109]
217
Notes
[1] "RFC 5321 Simple Mail Transfer Protocol" (http:/ / tools. ietf. org/ html/ rfc5321#section-2. 3. 11). Network Working Group. . Retrieved 2010-02=October 2008. [2] Ron Brown, Fax invades the mail market, New Scientist (http:/ / books. google. com/ books?id=Ry64sjvOmLkC& pg=PA218), Vol. 56, No. 817 (Oct., 26, 1972), pages 218-221. [3] Herbert P. Luckett, What's News: Electronic-mail delivery gets started, Popular Science (http:/ / books. google. com/ books?id=cKSqa8u3EIoC& pg=PA85), Vol. 202, No. 3 (March 1973); page 85 [4] Unless explicitly qualified, any technical descriptions in this article will refer to current Internet e-mail rather than to earlier email systems. [5] See (Partridge 2008) for early history of email, from origins through 1991. [6] Long, Tony (23 October 2000). A Matter of (Wired News) Style (http:/ / www. nettime. org/ Lists-Archives/ nettime-bold-0010/ msg00471. html). Wired magazine. . [7] Readers on (Wired News) Style (http:/ / www. wired. com/ culture/ lifestyle/ news/ 2000/ 10/ 39651). Wired magazine. 24 October 2000. . [8] "RFC Editor Terms List" (http:/ / www. rfc-editor. org/ rfc-style-guide/ terms-online. txt). IETF. . [9] Yahoo style guide (http:/ / styleguide. yahoo. com/ word-list/ e) [10] AP Stylebook editors share big changes (http:/ / www. aces2011. org/ sessions/ 18/ the-ap-stylebook-editors-visit-aces-2011/ ) from the American Copy Editors Society [11] Gerri Berendzen; Daniel Hunt. "AP changes e-mail to email" (http:/ / www. aces2011. org/ sessions/ 18/ the-ap-stylebook-editors-visit-aces-2011/ ). 15th National Conference of the American Copy Editors Society (2011, Phoenix). ACES. . Retrieved 23 March 2011. [12] AskOxford Language Query team. "What is the correct way to spell 'e' words such as 'email', 'ecommerce', 'egovernment'?" (http:/ / www. askoxford. com/ asktheexperts/ faq/ aboutspelling/ email). FAQ. Oxford University Press. . Retrieved 4 September 2009. "We recommend email, as this is now by far the most common form" [13] Reference.com (http:/ / dictionary. reference. com/ browse/ email) [14] Random House Unabridged Dictionary, 2006 [15] The American Heritage Dictionary of the English Language, Fourth Edition [16] Princeton University WordNet 3.0 [17] The American Heritage Science Dictionary, 2002 [18] ""Email" or "e-mail"" (http:/ / english. stackexchange. com/ questions/ 1925/ email-or-e-mail). English Language & Usage Stack Exchange. August 25, 2010. . Retrieved September 26, 2010. [19] RFC 821 (rfc821) Simple Mail Transfer Protocol (http:/ / www. faqs. org/ rfcs/ rfc821. html) [20] RFC 1939 (rfc1939) Post Office Protocol Version 3 (http:/ / www. faqs. org/ rfcs/ rfc1939. html) [21] RFC 3501 (rfc3501) Internet Message Access Protocol version 4rev1 (http:/ / www. faqs. org/ rfcs/ rfc3501. html) [22] "RFC Style Guide", Table of decisions on consistent usage in RFC (http:/ / www. rfc-editor. org/ rfc-style-guide/ terms-online. txt) [23] Excerpt from the FAQ list of the Usenet newsgroup alt.usage.english (http:/ / alt-usage-english. org/ excerpts/ fxhowdoy. html) [24] "The Watsons: IBM's Troubled Legacy" (http:/ / hbswk. hbs. edu/ item/ 4138. html) [25] See File:Gestapo anti-gay telex.jpg [26] "Telex and TWX History" (http:/ / www. baudot. net/ docs/ kimberlin--telex-twx-history. pdf), Donald E. Kimberlin, 1986 [27] USPS Support Panel, Louis T Rader, Chair, Chapter IV: Systems, Electronic Message Systems for the U.S. Postal Service (http:/ / books. google. com/ books?id=5TQrAAAAYAAJ& pg=PA27), National Academy of Sciences, Washington, D.C., 1976; pages 27-35. [28] "CTSS, Compatible Time-Sharing System" (September 4, 2006), University of South Alabama, USA-CTSS (http:/ / www. cis. usouthal. edu/ faculty/ daigle/ project1/ ctss. htm). [29] an IBM 7094 [30] Tom Van Vleck, "The IBM 7094 and CTSS" (September 10, 2004), Multicians.org (Multics), web: Multicians-7094 (http:/ / www. multicians. org/ thvv/ 7094. html). [31] Tom Van Vleck. "The History of Electronic Mail" (http:/ / www. multicians. org/ thvv/ mail-history. html). . [32] Version 3 Unix mail(1) manual page from 10/25/1972 (http:/ / minnie. tuhs. org/ cgi-bin/ utree. pl?file=V3/ man/ man1/ mail. 1) [33] Version 6 Unix mail(1) manual page from 2/21/1975 (http:/ / minnie. tuhs. org/ cgi-bin/ utree. pl?file=V6/ usr/ man/ man1/ mail. 1) [34] APL Quotations and Anecdotes (http:/ / www. jsoftware. com/ papers/ APLQA. htm), including Leslie Goldsmith's story of the Mailbox [35] History of the Internet, including Carter/Mondale use of email (http:/ / www. actewagl. com. au/ Education/ communications/ Internet/ historyOfTheInternet/ InternetOnItsInfancy. aspx) [36] David Wooley, PLATO: The Emergence of an Online Community (http:/ / www. thinkofit. com/ plato/ dwplato. htm#pnotes), 1994. [37] Stromberg, Joseph (22 February 2012). "A Piece of Email History Comes to the American History Museum" (http:/ / blogs. smithsonianmag. com/ aroundthemall/ 2012/ 02/ a-piece-of-email-history-comes-to-the-american-history-museum/ ). Smithsonian Institution. . Retrieved 11 June 2012. [38] "...PROFS changed the way organizations communicated, collaborated and approached work when it was introduced by IBMs Data Processing Division in 1981..." (http:/ / www. ibm. com/ ibm100/ us/ en/ icons/ networkbus/ ), IBM.com [39] "1982 The National Security Council (NSC) staff at the White House acquires a prototype electronic mail system, from IBM, called the Professional Office System (PROFs)...." (http:/ / www. fas. org/ spp/ starwars/ offdocs/ reagan/ chron. txt), fas.org
Email
[40] Gordon Bell's timeline of Digital Equipment Corporation (https:/ / research. microsoft. com/ en-us/ um/ people/ gbell/ Digital/ timeline/ 1982. htm) [41] Ray Tomlinson. "The First Network Email" (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html). . [42] Version 7 Unix manual: "UUCP Implementation Description" by D. A. Nowitz, and "A Dial-Up Network of UNIX Systems" by D. A. Nowitz and M. E. Lesk (http:/ / cm. bell-labs. com/ 7thEdMan/ vol2/ uucp. bun) [43] "BITNET History" (http:/ / www. livinginternet. com/ u/ ui_bitnet. htm), livinginternet.com [44] with various vendors supplying gateway software to link these incompatible systems [45] Email History (http:/ / www. livinginternet. com/ e/ ei. htm) [46] "The Technical Development of Internet Email" (http:/ / www. ir. bbn. com/ ~craig/ email. pdf) Craig Partridge, AprilJune 2008, p.5 [47] The First Email (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html) [48] Wave New World,Time Magazine, October 19, 2009, p.48 [49] How E-mail Works (http:/ / www. webcastr. com/ videos/ informational/ how-email-works. html) (internet video). howstuffworks.com. 2008. . [50] Simpson, Ken (October 3, 2008). "An update to the email standards" (http:/ / blog. mailchannels. com/ 2008/ 10/ update-to-email-standards. html). Mail Channels Blog Entry. . [51] P. Resnick, Ed. (October 2008). "RFC 5322, Internet Message Format" (http:/ / tools. ietf. org/ html/ rfc5322). IETF. . [52] Moore, K (November 1996). "MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text" (http:/ / tools. ietf. org/ html/ rfc2047). IETF. . Retrieved 2012-01-21. [53] A Yang, Ed. (February 2012). "RFC 6532, Internationalized Email Headers" (http:/ / tools. ietf. org/ html/ rfc6532). IETF. ISSN2070-1721. . [54] J. Yao, Ed., W. Mao, Ed. (February 2012). "RFC 6531, SMTP Extension for Internationalized Email Addresses" (http:/ / tools. ietf. org/ html/ rfc6531). IETF. ISSN2070-1721. . [55] RFC 5322, 3.6. Field Definitions (http:/ / tools. ietf. org/ html/ rfc5322#section-3. 6) [56] RFC 5322, 3.6.4. Identification Fields (http:/ / tools. ietf. org/ html/ rfc5322#section-3. 6. 4) [57] http:/ / www. iana. org/ assignments/ message-headers/ perm-headers. html [58] http:/ / www. iana. org/ assignments/ message-headers/ prov-headers. html [59] Microsoft, Auto Response Suppress, 2010, microsoft reference (http:/ / msdn. microsoft. com/ en-us/ library/ ee219609(v=EXCHG. 80). aspx), 2010 Sep 22 [60] RFC 5064 (http:/ / tools. ietf. org/ html/ rfc5064) [61] John Klensin (October 2008). "Trace Information" (https:/ / tools. ietf. org/ html/ rfc5321& #035;section-4. 4). Simple Mail Transfer Protocol (https:/ / tools. ietf. org/ html/ rfc5321). IETF. sec.4.4. RFC 5321. . [62] John Levine (14 January 2012). "Trace headers" (http:/ / www. ietf. org/ mail-archive/ web/ apps-discuss/ current/ msg04115. html). email message. IETF. . Retrieved 16 January 2012. "there are many more trace headers than those two" [63] This extensible field was defined by RFC 5451, that also defined a IANA registry of Email Authentication Parameters (http:/ / www. iana. org/ assignments/ email-auth/ email-auth. xml). [64] RFC 4408. [65] Defined in RFC 3834, and updated by RFC 5436. [66] RFC 5518. [67] Craig Hunt (2002). TCP/IP Network Administration. O'Reilly Media. p.70. ISBN978-0-596-00297-8. [68] "Email policies that prevent viruses" (http:/ / advosys. ca/ papers/ mail-policies. html). . [69] "When posting to a RootsWeb mailing list..." (http:/ / helpdesk. rootsweb. com/ listadmins/ plaintext. html) [70] "...Plain text, 72 characters per line..." (http:/ / www. openbsd. org/ mail. html) [71] How to Prevent the Winmail.dat File from Being Sent to Internet Users (http:/ / support. microsoft. com/ kb/ 138053) [72] In practice, some accepted messages may nowadays not be delivered to the recipient's InBox, but instead to a Spam or Junk folder which, especially in a corporate environment, may be inaccessible to the recipient [73] RFC 2368 section 3 : by Paul Hoffman in 1998 discusses operation of the "mailto" URL. [74] Barrett, Grant (December 23, 2007). "All We Are Saying." (http:/ / www. nytimes. com/ 2007/ 12/ 23/ weekinreview/ 23buzzwords. html?ref=weekinreview). New York Times. . Retrieved 2007-12-24. [75] "Email Right to Privacy Why Small Businesses Care" (http:/ / www. smallbiztrends. com/ 2007/ 06/ email-has-right-to-privacy-why-small-businesses-care. html). Anita Campbell. 2007-06-19. . [76] C. J. Hughes (February 17, 2011). "E-Mail May Be Binding, State Court Rules" (http:/ / www. nytimes. com/ 2011/ 02/ 20/ realestate/ 20posting. html). New York Times. . Retrieved 2011-02-20. [77] http:/ / www. plantronics. com/ north_america/ en_US/ howwework/ [78] By Om Malik, GigaOm. " Is Email a Curse or a Boon? (http:/ / gigaom. com/ collaboration/ is-email-a-curse-or-a-boon/ )" September 22, 2010. Retrieved October 11, 2010. [79] Martin, Brett A. S., Joel Van Durme, Mika Raulas, and Marko Merisavo (2003), "E-mail Marketing: Exploratory Insights from Finland" (http:/ / www. basmartin. com/ wp-content/ uploads/ 2010/ 08/ Martin-et-al-2003. pdf), Journal of Advertising Research, 43 (3), 293-300. [80] "Exchange 2007: Attachment Size Increase,..." (http:/ / technet. microsoft. com/ en-us/ magazine/ 2009. 01. exchangeqa. aspx?pr=blog). TechNet Magazine, Microsoft.com US. 2010-03-25. .
218
Email
[81] Lohr, Steve (2007-12-20). "Is Information Overload a $650 Billion Drag on the Economy?" (http:/ / bits. blogs. nytimes. com/ 2007/ 12/ 20/ is-information-overload-a-650-billion-drag-on-the-economy). New York Times. . Retrieved May 1, 2010. [82] Stross, Randall (2008-04-20). "Struggling to Evade the E-Mail Tsunami" (http:/ / www. nytimes. com/ 2008/ 04/ 20/ technology/ 20digi. html?_r=2& oref=slogin& oref=slogin). New York Times. . Retrieved May 1, 2010. [83] http:/ / gigaom. com/ collaboration/ is-email-a-curse-or-a-boon/ [84] "Did Darwin Skip Over Email?" (http:/ / www. foundrygroup. com/ blog/ archives/ 2008/ 04/ did-darwin-skip-over-email. php). Foundry Group. 2008-04-28. . [85] Radicati, Sara. "Email Statistics Report, 2010" (http:/ / www. radicati. com/ wp/ wp-content/ uploads/ 2010/ 04/ Email-Statistics-Report-2010-2014-Executive-Summary2. pdf). . [86] Gross, Doug (July 26, 2011). "Happy Information Overload Day!" (http:/ / articles. cnn. com/ 2010-10-20/ tech/ information. overload. day_1_mails-marsha-egan-rss?_s=PM:TECH). CNN. . [87] Rich Kawanagh. The top ten email spam list of 2005. ITVibe news, 2006, January 02, ITvibe.com (http:/ / itvibe. com/ news/ 3837/ ) [88] How Microsoft is losing the war on spam Salon.com (http:/ / dir. salon. com/ story/ tech/ feature/ 2005/ 01/ 19/ microsoft_spam/ index. html) [89] Spam Bill 2003 ( PDF (http:/ / www. aph. gov. au/ library/ pubs/ bd/ 2003-04/ 04bd045. pdf)) [90] M. Toorani, SMEmail A New Protocol for the Secure E-mail in Mobile Environments (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=4783292), Proceedings of the Australian Telecommunications Networks and Applications Conference (ATNAC'08), pp. 3944, Adelaide, Australia, December 2008. (arXiv:1002.3176) [91] Amy Harmon (2000-11-22). "Software That Tracks E-Mail Is Raising Privacy Concerns" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=940CE0D9143AF931A15752C1A9669C8B63& sec=& spon=& pagewanted=print). The New York Times. . Retrieved 2012-01-13. [92] About.com (http:/ / email. about. com/ od/ emailbehindthescenes/ a/ html_return_rcp. htm) [93] Webdevelopersnotes.com (http:/ / www. webdevelopersnotes. com/ tips/ yahoo/ notification-when-yahoo-email-is-opened. php) [94] Microsoft.com (http:/ / support. microsoft. com/ kb/ 222163) [95] In re Request for declaratory ruling and investigation by Graphnet Systems, Inc., concerning the proposed E-COM service, FCC Docket No. 79-6 (September 4, 1979) [96] History of the United States Postal Service, USPS (http:/ / www. usps. com/ history/ history/ his1. htm) [97] Hardy, Ian R; The Evolution of ARPANET Email (http:/ / www. archive. org/ web/ */ http:/ www. ifla. org/ documents/ internet/ hari1. txt); 1996-05-13; History Thesis Paper; University of California at Berkeley [98] James Bovard, The Law Dinosaur: The US Postal Service, CATO Policy Analysis (February 1985) [99] Jay Akkad, The History of Email (http:/ / www. cs. ucsb. edu/ ~almeroth/ classes/ F04. 176A/ homework1_good_papers/ jay-akkad. html) [100] US Postal Service: Postal Activities and Laws Related to Electronic Commerce, GAO-00-188 (http:/ / www. gao. gov/ archive/ 2000/ gg00188. pdf) [101] Implications of Electronic Mail and Message Systems for the U.S. Postal Service , Office of Technology Assessment, Congress of the United States, August 1982 (http:/ / govinfo. library. unt. edu/ ota/ Ota_4/ DATA/ 1982/ 8214. PDF) [102] Email History, How Email was Invented, Living Internet (http:/ / www. livinginternet. com/ e/ ei. htm) [103] Cybertelecom : Internet History (http:/ / www. cybertelecom. org/ notes/ internet_history80s. htm) [104] Cybertelecom : SPAM Reference (http:/ / www. cybertelecom. org/ spam/ Spamref. htm) [105] Cybertelecom : Can Spam Act (http:/ / www. cybertelecom. org/ spam/ canspam. htm) [106] 2001: A Space Laptop | SpaceRef Your Space Reference (http:/ / www. spaceref. com/ news/ viewnews. html?id=213) [107] The Mac Observer This Week in Apple History August 2231: "Welcome, IBM. Seriously," Too Late to License (http:/ / www. macobserver. com/ columns/ thisweek/ 2004/ 20040831. shtml) [108] Linzmayer, Owen W. (2004). Apple confidential 2.0 : the definitive history of the world's most colorful company ([Rev. 2. ed.]. ed.). San Francisco, Calif.: No Starch Press. ISBN1-59327-010-0. [109] Bilton, Nick (January 22, 2010). "First Tweet from Space" (http:/ / bits. blogs. nytimes. com/ 2010/ 01/ 22/ first-tweet-from-space/ ). New York Times. .
219
220
External links
E-mail (http://www.dmoz.org/Computers/Internet/E-mail//) at the Open Directory Project IANA's list of standard header fields (http://www.iana.org/assignments/message-headers/perm-headers.html) The History of Email (http://emailhistory.org/) is Dave Crocker's attempt at capturing the sequence of 'significant' occurrences in the evolution of email; a collaborative effort that also cites this page. The History of Electronic Mail (http://www.multicians.org/thvv/mail-history.html) is a personal memoir by the implementer of an early email system The Official MCI Mail Blog! (http://mcimail.blogspot.com/) a blog about MCI Mail, one of the early commercial electronic mail services
Web content
221
Web content
Web content is the textual, visual or aural content that is encountered as part of the user experience on websites. It may include, among other things: text, images, sounds, videos and animations. In Information Architecture for the World Wide Web, Lou Rosenfeld and Peter Morville write, "We define content broadly as 'the stuff in your Web site.' This may include documents, data, applications, e-services, images, audio and video files, personal Web pages, archived e-mail messages, and more. And we include future stuff as well as present stuff."[1]
Web content Search engine sites are composed mainly of html content, but also has a typically structured approach to revealing information. A search engine results page (SERP) displays a heading, usually the name of the search engine, and then a list of websites and their addresses. What is being listed are the results from a query that may be defined as keywords. The results page lists webpages that are connected in some way with those keywords used in the query. Discussion boards are sites composed of "textual" content organized by html or some variation that can be viewed in a web browser. The driving mechanism of a discussion board is the fact that users are registered and once registered can write posts. Often a discussion board is made up of posts asking some type of question to which other users may provide answers to those questions. Ecommerce sites are largely composed of textual material and embedded with graphics displaying a picture of the item(s) for sale. However, there are extremely few sites that are composed page-by-page using some variant of HTML. Generally, webpages are composed as they are being served from a database to a customer using a web browser. However, the user sees the mainly text document arriving as a webpage to be viewed in a web browser. Ecommerce sites are usually organized by software we identify as a "shopping cart".
222
Content is king
The phrase can be interpreted to mean that - without original and desirable content, or consideration for the rights and commercial interests of content creators - any media venture is likely to fail through lack of appealing content, regardless of other design factors. Content can mean any creative work, such as text, graphics, images or video. "Content is King" is a current meme when organizing or building a website[4] (although Andrew Odlyzko in "Content is Not King" argues otherwise). Text content is particularly important for search engine placement. Without original text content, most search engines will be unable to match search terms to the content of a site.
Content management
Because websites are often complex, a term "content management" appeared in the late 1990s identifying a method or in some cases a tool to organize all the diverse elements to be contained on a website. [5] Content management often means that within a business there is a range of people who have distinct roles to do with content management, such as content author, editor, publisher, and administrator. But it also means there may be a content management system whereby each of the different roles are organized whereby to provide their assistance in operating the system and organizing the information for a website. Even though a business may organize to collect, contain and represent that information online, content needs organization in such a manner to provide the reader (browser) with an overall "customer experience" that is easy to use, the site can be navigated with ease, and the website can fulfill the role assigned to it by the business, that is, to sell to customers, or to market products and services, or to inform customers.
Web content
223
References
[1] Information Architecture for the World Wide Web (http:/ / www. oreilly. com/ catalog/ infotecture/ ), second edition, page 219 [2] NetValley (http:/ / www. netvalley. com/ archives/ mirrors/ davemarsh-timeline-1. htm) [3] Internet Tutorial - What Is the World Wide Web? (http:/ / www. centerspan. org/ tutorial/ www. htm#tour) [4] "Content is king - importance of good content - content is king - page content" (http:/ / www. akamarketing. com/ content-is-king. html). akamarketing. . Retrieved 2009-04-15. [5] Is Content King? (http:/ / www. skyrme. com/ updates/ u59_f2. htm)
File sharing
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images and video), documents, or electronic books. It may be implemented through a variety of ways. Common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking.
History
Files were first exchanged on removable media. Computers were able to access remote files using filesystem mounting, bulletin board systems (1978), Usenet (1979), and FTP servers (1985). Internet Relay Chat (1988) and Hotline (1997) enabled users to communicate remotely through chat and to exchange files. The mp3 encoding, which was standardized in 1991 and which substantially reduced the size of audio files, grew to widespread use in the late 1990s. In 1998, MP3.com and Audiogalaxy were established, the Digital Millennium Copyright Act was
File sharing unanimously passed, and the first mp3 player devices were launched. In June 1999, Napster was released as a centralized unstructured peer-to-peer system,[1] requiring a central server for indexing and peer discovery. It is generally credited as being the first peer-to-peer file sharing system. Gnutella, eDonkey2000, and Freenet were released in 2000, as MP3.com and Napster were facing litigation. Gnutella, released in March, was the first decentralized file sharing network. In the gnutella network, all connecting software was considered equal, and therefore the network had no central point of failure. In July, Freenet was released and became the first anonymity network. In September the eDonkey2000 client and server software was released. In 2001, Kazaa and Poisoned for the Mac was released. Its FastTrack network was distributed, though unlike gnutella, it assigned more traffic to 'supernodes' to increase routing efficiency. The network was proprietary and encrypted, and the Kazaa team made substantial efforts to keep other clients such as Morpheus off of the FastTrack network. In July 2001, Napster was sued by several recording companies and lost in A&M Records, Inc. v. Napster, Inc..[2] In the case of Napster, it has been ruled that an online service provider could not use the "transitory network transmission" safe harbor in the DMCA if they had control of the network with a server.[3] Shortly after its loss in court, Napster was shut down to comply with a court order. This drove users to other P2P applications and file sharing continued its growth.[4] The Audiogalaxy Satellite client grew in popularity, and the LimeWire client and BitTorrent protocol were released. Until its decline in 2004, Kazaa was the most popular file sharing program despite bundled malware and legal battles in the Netherlands, Australia, and the United States. In 2002, a Tokyo district court ruling shut down File Rogue, and the Recording Industry Association of America (RIAA) filed a lawsuit that effectively shut down Audiogalaxy. From 2002 through 2003, a number of BitTorrent services were established, including Suprnova.org, isoHunt, TorrentSpy, and The Pirate Bay. In 2002, the RIAA was filing lawsuits against Kazaa users. As a result of such lawsuits, many universities added file sharing regulations in their school administrative codes (though some students managed to circumvent them during after school hours). With the shutdown of eDonkey in 2005, eMule became the dominant client of the eDonkey network. In 2006, police raids took down the Razorback2 eDonkey server and temporarily took down The Pirate Bay.
224
In 2009, the Pirate Bay trial ended in a guilty verdict for the primary founders of the tracker. The decision was appealed, leading to a second guilty verdict in November 2010. In October 2010, Limewire was forced to shut down following a court order in Arista Records LLC v. Lime Group LLC but the gnutella network remains active through open source clients like Frostwire and gtk-gnutella. Furthermore, multi-protocol file sharing software such as MLDonkey and Shareaza adapted in order to support all the major file sharing protocols, so users no longer had to install and configure multiple file sharing programs. On 19 January 2012, the United States Department of Justice shut down the popular domain of Megaupload (established 2005). The file sharing site has claimed to have over 50,000,000 people a day.[5] Kim Dotcom (formerly Kim Schmitz) was arrested in New Zealand and is awaiting extradition.[6] The case involving the downfall of the world's largest and most popular file sharing site was not well received, with hacker group Anonymous bringing down several sites associated with the take-down.[5] In the days following this, other file sharing sites began to cease services; Filesonic blocked public downloads on January 22, with Fileserve following suit on January 23.
File sharing
225
File sharing available on P2P for free. This clearly suggests P2P network availability is reducing music demand of 75% of music downloaders which is quite contrary to Andersen and Frenz's much published claim."[23]
226
Market dominance
A paper in journal Management Science found that file sharing decreased the chance of survival for low ranked albums on music charts and increased exposure to albums that were ranked high on the music charts, allowing popular and well known artists to remain on the music charts more often. This had a negative impact for new and less known artists while promoting the work of already popular artists and celebrities.[24] A more recent study that examined pre-release file sharing of music albums, using BitTorrent software, also discovered positive impacts for "established and popular artists but not newer and smaller artists." According to Robert G. Hammond of North Carolina State University, an album that leaked one month early would see a modest increase in sales. "This increase in sales is small relative to other factors that have been found to affect album sales." "File-sharing proponents commonly argue that file sharing democratizes music consumption by 'leveling the playing field' for new/small artists relative to established/popular artists, by allowing artists to have their work heard by a wider audience, lessening the advantage held by established/popular artists in terms of promotional and other support. My results suggest that the opposite is happening, which is consistent with evidence on file-sharing behavior."[25] Billboard cautioned that this research looked only at the pre-release period and not continuous file sharing following a release date. "The problem in believing piracy helps sales is deciding where to draw the line between legal and illegal. ... Implicit in the study is the fact that both buyers and sellers are required in order for pre-release file sharing to have a positive impact on album sales. Without iTunes, Amazon and Best Buy, file-sharers would be just file sharers rather than purchasers. If you carry out the 'file sharing should be legal' argument to its logical conclusion, today's retailers will be tomorrow's file-sharing services that integrate with their respective cloud storage services."[26]
Availability
Many argue that file-sharing has forced the owners of entertainment content to make it more widely available legally through fee or advertising on demand on the internet, rather than remain static with TV, radio, DVD's, CD's, and the theater. Content for purchase has been higher than illegal in North America aggregate internet traffic since at least 2009.[27]As content becomes more available for pay streaming and legal action continues against illegal file sharing, illegal file sharing will likely decline further.[28]
References
[1] "Reliable distributed systems: technologies, Web services, and applications - Kenneth P. Birman - Google Books" (http:/ / books. google. ca/ books?id=KeIENcC2BPwC& pg=PA532& lpg=PA532& dq=napster+ first#PPA532,M1). Books.google.ca. . Retrieved 2012-01-20. [2] Menta, Richard (December 9, 1999). "RIAA Sues Music Startup Napster for $20 Billion" (http:/ / www. mp3newswire. net/ stories/ napster. html). MP3 Newswire. . [3] "EFF: What Peer-to-Peer Developers Need to Know about Copyright Law" (http:/ / w2. eff. org/ IP/ P2P/ p2p_copyright_wp. php). W2.eff.org. . Retrieved 2012-01-20. [4] Menta, Richard (July 20, 2001). "Napster Clones Crush Napster. Take 6 out of the Top 10 Downloads on CNet" (http:/ / www. mp3newswire. net/ stories/ 2001/ topclones. html). MP3 Newswire. . [5] "Department of Justice site hacked after Megaupload shutdown, Anonymous claims credit. Washington Post" (http:/ / www. washingtonpost. com/ business/ economy/ department-of-justice-site-hacked-after-megaupload-shutdown-anonymous-claims-credit/ 2012/ 01/ 20/ gIQAl5MNEQ_story. html?tid=pm_business_pop). Washingtonpost.com. . Retrieved 2012-01-30. [6] Schneider, Joe (2012-01-24). "Megauploads Dotcom in Custody as New Zealand Awaits Extradition Request, Bloomberg" (http:/ / www. bloomberg. com/ news/ 2012-01-24/ megaupload-s-dotcom-in-custody-as-new-zealand-awaits-extradition-request. html). Bloomberg.com. . Retrieved 2012-01-30. [7] "Law professors examine ethical controversies of peer-to-peer file sharing" (http:/ / news-service. stanford. edu/ news/ 2004/ march17/ fileshare-317. html). News-service.stanford.edu. 2004-03-17. . Retrieved 2012-01-20.
File sharing
[8] "Poll: Young Say File Sharing OK" (http:/ / www. cbsnews. com/ stories/ 2003/ 09/ 18/ opinion/ polls/ main573990. shtml). CBS News. 2009-02-11. . Retrieved 2012-01-20. [9] Glenn, David. Dispute Over the Economics of File Sharing Intensifies, Chronicle.com, July 17, 2008. [10] Hart, Terry. More Evidence for Copyright Protection (http:/ / www. copyhype. com/ 2012/ 02/ more-evidence-for-copyright-protection/ ), copyhype.com, February 1, 2012. "The literature review looked at a 23rd study but did not classify it here since the author presented a mixed conclusion: the overall effect of unauthorized downloads is insignificant, but for unknown artists, there is a 'strongly negative' effect on recorded music sales." [11] AJ Sokolov, Daniel . Wissenschaftler: Studien ber Tauschbrsen unbrauchbar (http:/ / www. heise. de/ ct/ meldung/ Wissenschaftler-Studien-ueber-Tauschboersen-unbrauchbar-1020532. html), c't magazine, June 11, 2010. [12] Tschmuck, Peter. The Economics of Music File Sharing A Literature Overview, Vienna Music Business Research Days, University of Music and Performing Arts, Vienna, June 9-10, 2010. [13] Levine, Robert. Free Ride: How the Internet Is Destroying the Culture Business and How the Culture Business Can Fight Back, Bodley Head, February 2011. [14] Oberholzer, Felix; Koleman Strumpf. "The Effect of File Sharing on Record Sales: An Empirical Analysis" (http:/ / www. unc. edu/ ~cigar/ papers/ FileSharing_March2004. pdf) (PDF). . Retrieved 2008-06-13. [15] Liebowitz, Stan J.. How Reliable is the Oberholzer-Gee and Strumpf Paper on File-Sharing?. SSRN1014399. [16] Liebowitz, Stan J.. "The Key Instrument in the Oberholzer-Gee/Strumpf File-Sharing Paper is Defective" (http:/ / musicbusinessresearch. files. wordpress. com/ 2010/ 06/ paper-stan-j-liebowitz1. pdf) (PDF). . Retrieved 2008-06-13. [17] Peoples, Glenn. Researchers Change Tune, Now Say P2P Has Negative Impact (http:/ / www. billboard. biz/ bbbiz/ content_display/ industry/ e3i82a006de3290b1a63323f3e4ee910ca9) Billboard. June 22, 2010. [18] Oberholzer & Strumpf. "File Sharing and Copyright" NBER Innovation Policy & the Economy, Vol. 10, No. 1, 2010. "Artists receive a significant portion of their remuneration not in monetary form many of them enjoy fame, admiration, social status, and free beer in bars suggesting a reduction in monetary incentives might possibly have a reduced impact on the quantity and quality of artistic production." [19] Peoples, Glenn. Analysis: Are Musicians Losing the Incentive to Create? (http:/ / www. billboard. biz/ bbbiz/ content_display/ industry/ e3ic193b6eacf48409b52f1ab027d2d2b6c) Billboard. July 26, 2010. [20] Friedlander, Joshua P. & Lamy, Jonathan. Illegal Downloading = Fewer Musicians (http:/ / www. ifpi. org/ content/ library/ view_35. pdf) ifpi.org, July 19, 2010. [21] The Impact of Music Downloads and P2P File-Sharing on the Purchase of Music: A Study for Industry Canada (http:/ / strategis. ic. gc. ca/ epic/ site/ ippd-dppi. nsf/ en/ h_ip01456e. html), Birgitte Andersen and Marion Frenz [22] Peoples, Glenn. A New Look at an Old Survey Finds P2P Hurts Music Purchases (http:/ / www. billboard. biz/ bbbiz/ industry/ digital-and-mobile/ business-matters-a-new-look-at-an-old-survey-1006083952. story), Billboard. February 2, 2012. [23] Barker, George R. Evidence of the Effect of Free Music Downloads on the Purchase of Music CDs (http:/ / papers. ssrn. com/ sol3/ papers. cfm?abstract_id=1990153) Social Science Research Network. January 23, 2012. [24] Bhattacharjee, Sudip., Gopal, Ram D., Lertwachara, Kaveepan. Marsden, James R. & Telang, Rahul. The Effect of Digital Sharing Technologies on Music Markets: A Survival Analysis of Albums on Ranking Charts (http:/ / mansci. journal. informs. org/ content/ 53/ 9/ 1359. full. pdf+ html) Management Science 2007. [25] Hammond. Robert G. " Profit Leak? Pre-Release File Sharing and the Music Industry (http:/ / www4. ncsu. edu/ ~rghammon/ Hammond_File_Sharing_Leak. pdf)" May 2012. File sharing benets mainstream albums such as pop music but not albums in niche genres such as indie music. ... Further, the finding that le sharing redistributes sales toward established/popular artists is inconsistent with claims made by proponents of le sharing that le sharing democratizes music consumption." [26] Peoples, Glenn. Business Matters: Pre-release File Sharing Helps Album Sales, Says a Study. So Why Not Replicate This Legally? (http:/ / www. billboard. biz/ bbbiz/ industry/ record-labels/ business-matters-pre-release-file-sharing-1007125352. story) Billboard. May 22, 2012. [27] Global Internet Phenomena Report - Spring 2011 (http:/ / www. wired. com/ images_blogs/ epicenter/ 2011/ 05/ SandvineGlobalInternetSpringReport2011. pdf) Sandvine Global Internet Waterloo, Ontario, Canada. May 12, 2011 [28] Ryan Singel Most content online is now paid for, thanks to Netflix (http:/ / www. cnn. com/ 2011/ TECH/ web/ 05/ 18/ netflix. piracy. wired/ index. html) Wired via CNN.com May 18, 2011.
227
File sharing
228
Further reading
Levine, Robert. Free Ride: How the Internet Is Destroying the Culture Business and How the Culture Business Can Fight Back, Bodley Head, February 2011. Ghosemajumder, Shuman. Advanced Peer-Based Technology Business Models (http://shumans.com/ p2p-business-models.pdf). MIT Sloan School of Management, 2002 Silverthorne, Sean. Music Downloads: Pirates- or Customers? (http://hbswk.hbs.edu/item.jhtml?id=4206& t=innovation). Harvard Business School Working Knowledge, 2004. Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer Systems and Applications (http://www.peer-to-peer.info/). ISBN 3-540-29192-X, Lecture Notes in Computer Science, Volume 3485, September 2005 Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies (http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html). ACM Computing Surveys, 36(4):335371, December 2004. doi:10.1145/1041680.1041681. Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems (http://www.cs.ucsb.edu/~almeroth/classes/F02.276/papers/p2p-measure.pdf). Technical Report # UW-CSE-01-06-02. Department of Computer Science & Engineering. University of Washington. Seattle, WA, USA. Selected Papers (http://www.cs.huji.ac.il/labs/danss/p2p/resources.html) A collection of academic papers.
External links
Digital Britain (http://interactive.bis.gov.uk/digitalbritain/digital-economy-bill/.)
Search
A web search engine is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERP's). The information may be a specialist in web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler.
History
Timeline (full list) Year Engine Current status Inactive Inactive Active, Aggregator Active, Yahoo Search Active
Search
229
1995 AltaVista Daum Magellan Excite SAPO Yahoo! 1996 Dogpile Inktomi HotBot Ask Jeeves 1997 Northern Light Yandex 1998 Google MSN Search 1999 AlltheWeb GenieKnows Naver Teoma Vivisimo 2000 Baidu Exalead 2002 Inktomi 2003 Info.com 2004 Yahoo! Search Active, Yahoo Search Active Inactive Active Active Active, Launched as a directory Active, Aggregator Acquired by Yahoo! Active (lycos.com) Active (rebranded ask.com) Inactive Active Active Active as Bing Inactive (URL redirected to Yahoo!) Active, rebranded Yellowee.com Active Active Inactive Active Inactive Acquired by Yahoo! Active Active, Launched own web search (see Yahoo! Directory, 1995) Inactive Active Active Active Active Inactive Inactive Active Active Active as Bing, Launched as rebranded MSN Search Active Active
A9.com Sogou 2005 AOL Search Ask.com GoodSearch SearchMe 2006 wikiseek Quaero Ask.com Live Search
ChaCha Guruji.com
Search
230
2007 wikiseek Sproose Wikia Search Blackle.com 2008 Powerset Picollator Viewzi Boogami LeapFish Forestle 2009 Bing Inactive Inactive Inactive Active Inactive (redirects to Bing) Inactive Inactive Inactive Inactive Inactive (redirects to Ecosia) Active, Launched as rebranded Live Search Active Inactive due to a lack of funding Active Active Inactive Active, Launched global (English) search Active Active as Interredu Active, Launched Turkey search Active Active
During the early development of the web, there was a list of webservers edited by Tim Berners-Lee and hosted on the CERN webserver. One historical snapshot from 1992 remains.[1] As more webservers went online the central list could not keep up. On the NCSA site new servers were announced under the title "What's New!"[2] The very first tool used for searching on the Internet was Archie.[3] The name stands for "archive" without the "v". It was created in 1990 by Alan Emtage, Bill Heelan and J. Peter Deutsch, computer science students at McGill University in Montreal. The program downloaded the directory listings of all the files located on public anonymous FTP (File Transfer Protocol) sites, creating a searchable database of file names; however, Archie did not index the contents of these sites since the amount of data was so limited it could be readily searched manually. The rise of Gopher (created in 1991 by Mark McCahill at the University of Minnesota) led to two new search programs, Veronica and Jughead. Like Archie, they searched the file names and titles stored in Gopher index systems. Veronica (Very Easy Rodent-Oriented Net-wide Index to Computerized Archives) provided a keyword search of most Gopher menu titles in the entire Gopher listings. Jughead (Jonzy's Universal Gopher Hierarchy Excavation And Display) was a tool for obtaining menu information from specific Gopher servers. While the name of the search engine "Archie" was not a reference to the Archie comic book series, "Veronica" and "Jughead" are characters in the series, thus referencing their predecessor. In the summer of 1993, no search engine existed yet for the web, though numerous specialized catalogues were maintained by hand. Oscar Nierstrasz at the University of Geneva wrote a series of Perl scripts that would periodically mirror these pages and rewrite them into a standard format which formed the basis for W3Catalog, the
Search web's first primitive search engine, released on September 2, 1993.[4] In June 1993, Matthew Gray, then at MIT, produced what was probably the first web robot, the Perl-based World Wide Web Wanderer, and used it to generate an index called 'Wandex'. The purpose of the Wanderer was to measure the size of the World Wide Web, which it did until late 1995. The web's second search engine Aliweb appeared in November 1993. Aliweb did not use a web robot, but instead depended on being notified by website administrators of the existence at each site of an index file in a particular format. JumpStation (released in December 1993[5]) used a web robot to find web pages and to build its index, and used a web form as the interface to its query program. It was thus the first WWW resource-discovery tool to combine the three essential features of a web search engine (crawling, indexing, and searching) as described below. Because of the limited resources available on the platform on which it ran, its indexing and hence searching were limited to the titles and headings found in the web pages the crawler encountered. One of the first "all text" crawler-based search engines was WebCrawler, which came out in 1994. Unlike its predecessors, it let users search for any word in any webpage, which has become the standard for all major search engines since. It was also the first one to be widely known by the public. Also in 1994, Lycos (which started at Carnegie Mellon University) was launched and became a major commercial endeavor. Soon after, many search engines appeared and vied for popularity. These included Magellan, Excite, Infoseek, Inktomi, Northern Light, and AltaVista. Yahoo! was among the most popular ways for people to find web pages of interest, but its search function operated on its web directory, rather than full-text copies of web pages. Information seekers could also browse the directory instead of doing a keyword-based search. In 1996, Netscape was looking to give a single search engine an exclusive deal to be the featured search engine on Netscape's web browser. There was so much interest that instead a deal was struck with Netscape by five of the major search engines, where for $5 million per year each search engine would be in rotation on the Netscape search engine page. The five engines were Yahoo!, Magellan, Lycos, Infoseek, and Excite.[6][7] Search engines were also known as some of the brightest stars in the Internet investing frenzy that occurred in the late 1990s.[8] Several companies entered the market spectacularly, receiving record gains during their initial public offerings. Some have taken down their public search engine, and are marketing enterprise-only editions, such as Northern Light. Many search engine companies were caught up in the dot-com bubble, a speculation-driven market boom that peaked in 1999 and ended in 2001. Around 2000, Google's search engine rose to prominence.[9] The company achieved better results for many searches with an innovation called PageRank. This iterative algorithm ranks web pages based on the number and PageRank of other web sites and pages that link there, on the premise that good or desirable pages are linked to more than others. Google also maintained a minimalist interface to its search engine. In contrast, many of its competitors embedded a search engine in a web portal. By 2000, Yahoo! was providing search services based on Inktomi's search engine. Yahoo! acquired Inktomi in 2002, and Overture (which owned AlltheWeb and AltaVista) in 2003. Yahoo! switched to Google's search engine until 2004, when it launched its own search engine based on the combined technologies of its acquisitions. Microsoft first launched MSN Search in the fall of 1998 using search results from Inktomi. In early 1999 the site began to display listings from Looksmart blended with results from Inktomi except for a short time in 1999 when results from AltaVista were used instead. In 2004, Microsoft began a transition to its own search technology, powered by its own web crawler (called msnbot). Microsoft's rebranded search engine, Bing, was launched on June 1, 2009. On July 29, 2009, Yahoo! and Microsoft finalized a deal in which Yahoo! Search would be powered by Microsoft Bing technology.
231
Search
232
Search Most Web search engines are commercial ventures supported by advertising revenue and, as a result, some employ, the practice of allowing advertisers to pay money to have their listings ranked higher in search results. Those search engines which do not accept money for their search engine results make money by running search related ads alongside the regular search engine results. The search engines make money every time someone clicks on one of these ads.
233
Market share
Search engine Market share in May 2011 Market share in December 2010[11] Google Yahoo! Baidu Bing Yandex Ask AOL 82.80% 6.42% 4.89% 3.91% 1.7% 0.52% 0.3% 84.65% 6.69% 3.39% 3.29% 1.3% 0.56% 0.42%
Google's worldwide market share peaked at 86.3% in April 2010.[12] Yahoo!, Bing and other search engines are more popular in the US than in Europe. According to Hitwise, market share in the U.S. for October 2011 was Google 65.38%, Bing-powered (Bing and Yahoo!) 28.62%, and the remaining 66 search engines 6%. However, an Experian Hit wise report released in August 2011 gave the "success rate" of searches sampled in July. Over 80 percent of Yahoo! and Bing searches resulted in the users visiting a web site, while Google's rate was just under 68 percent.[13][14] In the People's Republic of China, Baidu held a 61.6% market share for web search in July 2009.[15] In Russian Federation, Yandex holds around 60% of the market share as of April 2012.[16]
Search Horizon oil spill and that the two search results pages were "strikingly different."[20][21][22] The bubble effect may have negative implications for civic discourse, according to Pariser.[23] Since this problem has been identified, competing search engines have emerged that seek to avoid this problem by not tracking[24] or "bubbling"[25] users.
234
References
[1] "World-Wide Web Servers" (http:/ / www. w3. org/ History/ 19921103-hypertext/ hypertext/ DataSources/ WWW/ Servers. html). W3.org. . Retrieved 2012-05-14. [2] "What's New! February 1994" (http:/ / home. mcom. com/ home/ whatsnew/ whats_new_0294. html). Home.mcom.com. . Retrieved 2012-05-14. [3] "Internet History - Search Engines" (from Search Engine Watch), Universiteit Leiden, Netherlands, September 2001, web: LeidenU-Archie (http:/ / www. internethistory. leidenuniv. nl/ index. php3?c=7). [4] Oscar Nierstrasz (2 September 1993). "Searchable Catalog of WWW Resources (experimental)" (http:/ / groups. google. com/ group/ comp. infosystems. www/ browse_thread/ thread/ 2176526a36dc8bd3/ 2718fd17812937ac?hl=en& lnk=gst& q=Oscar+ Nierstrasz#2718fd17812937ac). . [5] "Archive of NCSA what's new in December 1993 page" (http:/ / web. archive. org/ web/ 20010620073530/ http:/ / archive. ncsa. uiuc. edu/ SDG/ Software/ Mosaic/ Docs/ old-whats-new/ whats-new-1293. html). Web.archive.org. 2001-06-20. . Retrieved 2012-05-14. [6] "Yahoo! And Netscape Ink International Distribution Deal" (http:/ / files. shareholder. com/ downloads/ YHOO/ 701084386x0x27155/ 9a3b5ed8-9e84-4cba-a1e5-77a3dc606566/ YHOO_News_1997_7_8_General. pdf). [7] Browser Deals Push Netscape Stock Up 7.8% (http:/ / articles. latimes. com/ 1996-04-01/ business/ fi-53780_1_netscape-home). Los Angeles Times. 1 April 1996. [8] Gandal, Neil (2001). "The dynamics of competition in the internet search engine market". International Journal of Industrial Organization 19 (7): 11031117. doi:10.1016/S0167-7187(01)00065-0. [9] "Our History in debth" (http:/ / www. google. com/ about/ company/ history/ ). W3.org. . Retrieved 2012-10-31. [10] Jawadekar, Waman S (2011), "8. Knowledge Management: Tools and Technology" (http:/ / books. google. com/ books?id=XmGx4J9daUMC& pg=PA278& dq="search+ engine+ operates"& hl=en& sa=X& ei=a-muUJ6UC4aeiAfI24GYAw& sqi=2& ved=0CDgQ6AEwBA), Knowlege Management: Text & Cases (http:/ / books. google. com/ books?id=XmGx4J9daUMC& printsec=frontcover& dq=knowledge+ management:+ text& hl=en& sa=X& ei=ou6uUP-cNqWTiAe2oICoAw& sqi=2& ved=0CDIQ6AEwAA), New Delhi: Tata McGraw-Hill Education Private Ltd, p.278, ISBN978-0-07-07-0086-4, , retrieved November 23 2012 [11] "Net Marketshare - World" (http:/ / marketshare. hitslink. com/ search-engine-market-share. aspx?qprid=4). Marketshare.hitslink.com. . Retrieved 2012-05-14. [12] "Net Market share - Google" (http:/ / marketshare. hitslink. com/ report. aspx?qprid=5& qpcustom=Google - Global& qptimeframe=M& qpsp=120& qpnp=25). Marketshare.hitslink.com. . Retrieved 2012-05-14. [13] "Google Remains Ahead of Bing, But Relevance Drops" (http:/ / news. yahoo. com/ google-remains-ahead-bing-relevance-drops-210457139. html). August 12, 2011. . [14] Experian Hitwise reports Bing-powered share of searches at 29 percent in October 2011 (http:/ / www. hitwise. com/ us/ about-us/ press-center/ press-releases/ bing-powered-share-of-searches-at-29-percent), Experian Hitwise, November 16, 2011 [15] "Search Engine Market Share July 2009 | Rise to the Top Blog" (http:/ / risetothetop. techwyse. com/ internet-marketing/ search-engine-market-share-july-2009/ ). Risetothetop.techwyse.com. 2009-08-04. . Retrieved 2012-05-14. [16] Pavliva, Halia (2012-04-02). "Yandex Internet Search Share Gains, Google Steady: Liveinternet" (http:/ / www. bloomberg. com/ news/ 2012-04-02/ yandex-internet-search-share-gains-google-steady-liveinternet. html). Bloomberg.com. . Retrieved 2012-05-14. [17] Segev, Elad (2010). Google and the Digital Divide: The Biases of Online Knowledge, Oxford: Chandos Publishing. [18] Vaughan, L. & Thelwall, M. (2004). Search engine coverage bias: evidence and possible causes, Information Processing & Management, 40(4), 693-707. [19] Berkman Center for Internet & Society (2002), Replacement of Google with Alternative Search Systems in China: Documentation and Screen Shots (http:/ / cyber. law. harvard. edu/ filtering/ china/ google-replacements/ ), Harvard Law School. [20] Parramore, Lynn (10 October 2010). "The Filter Bubble" (http:/ / www. theatlantic. com/ daily-dish/ archive/ 2010/ 10/ the-filter-bubble/ 181427/ ). The Atlantic. . Retrieved 2011-04-20. "Since Dec. 4, 2009, Google has been personalized for everyone. So when I had two friends this spring Google "BP," one of them got a set of links that was about investment opportunities in BP. The other one got information about the oil spill...." [21] Weisberg, Jacob (10 June 2011). "Bubble Trouble: Is Web personalization turning us into solipsistic twits?" (http:/ / www. slate. com/ id/ 2296633/ ). Slate. . Retrieved 2011-08-15. [22] Gross, Doug (May 19, 2011). "What the Internet is hiding from you" (http:/ / articles. cnn. com/ 2011-05-19/ tech/ online. privacy. pariser_1_google-news-facebook-internet/ 2?_s=PM:TECH). CNN. . Retrieved 2011-08-15. "I had friends Google BP when the oil spill was happening. These are two women who were quite similar in a lot of ways. One got a lot of results about the environmental consequences of what was happening and the spill. The other one just got investment information and nothing about the spill at all."
Search
[23] Zhang, Yuan Cao; Saghdha, Diarmuid ; Quercia, Daniele; Jambor, Tamas (February 2012). "Auralist: Introducing Serendipity into Music Recommendation" (http:/ / www-typo3. cs. ucl. ac. uk/ fileadmin/ UCL-CS/ research/ Research_Notes/ RN_11_21. pdf). ACM WSDM. . [24] "donttrack.us" (http:/ / donttrack. us). . Retrieved 2012-04-29. [25] "dontbubble.us" (http:/ / dontbubble. us). . Retrieved 2012-04-29.
235
GBMW: Reports of 30-day punishment, re: Car maker BMW had its German website bmw.de delisted from Google, such as: Slashdot-BMW (http://slashdot.org/article.pl?sid=06/02/05/235218) (05-Feb-2006). INSIZ: Maximum size of webpages indexed by MSN/Google/Yahoo! ("100-kb limit"): Max Page-size (http:// www.sitepoint.com/article/indexing-limits-where-bots-stop) (28-Apr-2006).
Further reading
For a more detailed history of early search engines, see Search Engine Birthdays (http://searchenginewatch. com/showPage.html?page=3071951) (from Search Engine Watch), Chris Sherman, September 2003. Steve Lawrence; C. Lee Giles (1999). "Accessibility of information on the web". Nature 400 (6740): 1079. doi:10.1038/21987. PMID10428673. Bing Liu (2007), Web Data Mining: Exploring Hyperlinks, Contents and Usage Data (http://www.cs.uic.edu/ ~liub/WebMiningBook.html). Springer, ISBN 3-540-37881-2 Bar-Ilan, J. (2004). The use of Web search engines in information science research. ARIST, 38, 231-288. Levene, Mark (2005). An Introduction to Search Engines and Web Navigation. Pearson. Hock, Randolph (2007). The Extreme Searcher's Handbook. ISBN 978-0-910965-76-7 Javed Mostafa (February 2005). "Seeking Better Web Searches" (http://www.sciam.com/article. cfm?articleID=0006304A-37F4-11E8-B7F483414B7F0000). Scientific American Magazine. Ross, Nancy; Wolfram, Dietmar (2000). "End user searching on the Internet: An analysis of term pair topics submitted to the Excite search engine". Journal of the American Society for Information Science 51 (10): 949958. doi:10.1002/1097-4571(2000)51:10<949::AID-ASI70>3.0.CO;2-5. Xie, M. et al. (1998). "Quality dimensions of Internet search engines". Journal of Information Science 24 (5): 365372. doi:10.1177/016555159802400509. Information Retrieval: Implementing and Evaluating Search Engines (http://www.ir.uwaterloo.ca/book/). MIT Press. 2010.
External links
Search Engines (http://www.dmoz.org/Computers/Internet/Searching/Search_Engines//) at the Open Directory Project
Blogging
236
Blogging
A blog (a portmanteau of the term web log)[1] is a discussion or informational site published on the World Wide Web and consisting of discrete entries ("posts") typically displayed in reverse chronological order (the most recent post appears first). Until 2009 blogs were usually the work of a single individual, occasionally of a small group, and often were themed on a single subject. More recently "multi-author blogs" (MABs) have developed, with posts written by large numbers of authors and professionally edited. MABs from newspapers, other media outlets, universities, think tanks, interest groups and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into societal newstreams. Blog can also be used as a verb, meaning to maintain or add content to a blog. The emergence and growth of blogs in the late 1990s coincided with the advent of web publishing tools that facilitated the posting of content by non-technical users. (Previously, a knowledge of such technologies as HTML and FTP had been required to publish content on the Web.) Although not a requirement, most good quality blogs are interactive, allowing visitors to leave comments and even message each other via GUI widgets on the blogs, and it is this interactivity that distinguishes them from other static websites.[2] In that sense, blogging can be seen as a form of social networking. Indeed, bloggers do not only produce content to post on their blogs, but also build social relations with their readers and other bloggers.[3] Many blogs provide commentary on a particular subject; others function as more personal online diaries; others function more as online brand advertising of a particular individual or company. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important contribution to the popularity of many blogs. Most blogs are primarily textual, although some focus on art (art blogs), photographs (photoblogs), videos (video blogs or "vlogs"), music (MP3 blogs), and audio (podcasts). Microblogging is another type of blogging, featuring very short posts. In education, blogs can be used as instructional resources. These blogs are referred to as edublogs. As of 16 February 2011, there were over 156million public blogs in existence.[4] On October 13, 2012, there were around 77 million Tumblr[5] and 56.6 million WordPress[6] blogs in existence worldwide.
Blogging
237
History
The term "weblog" was coined by Jorn Barger[7] on 17 December 1997. The short form, "blog," was coined by Peter Merholz, who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in April or May 1999.[8][9][10] Shortly thereafter, Evan Williams at Pyra Labs used "blog" as both a noun and verb ("to blog," meaning "to edit one's weblog or to post to one's weblog") and devised the term "blogger" in connection with Pyra Labs' Blogger product, leading to the popularization of the terms.[11]
Origins
Before blogging became popular, digital communities took many forms, including Early example of a "diary" style blog consisting of text and images transmitted Usenet, commercial online services such as wirelessly in real time from a wearable computer with headup display, 1995 GEnie, BiX and the early CompuServe, February 22nd e-mail lists[12] and Bulletin Board Systems (BBS). In the 1990s, Internet forum software, created running conversations with "threads". Threads are topical connections between messages on a virtual "corkboard". From June 14, 1993 Mosaic Communications Corporation maintained their "Whats New" [13] list of new websites, updated daily and archived monthly. The page was accessible by a special "What's New" button in the Mosaic web browser. The modern blog evolved from the online diary, where people would keep a running account of their personal lives. Most such writers called themselves diarists, journalists, or journalers. Justin Hall, who began personal blogging in 1994 while a student at Swarthmore College, is generally recognized as one of the earlier bloggers,[14] as is Jerry Pournelle.[15] Dave Winer's Scripting News is also credited with being one of the older and longer running weblogs.[16][17] The Australian Netguide magazine maintained the Daily Net News [18] on their web site from 1996. Daily Net News ran links and daily reviews of new websites, mostly in Australia. Another early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site in 1994. This practice of semi-automated blogging with live video together with text was referred to as sousveillance, and such journals were also used as evidence in legal matters. Early blogs were simply manually updated components of common Web sites. However, the evolution of tools to facilitate the production and maintenance of Web articles posted in reverse chronological order made the publishing process feasible to a much larger, less technical, population. Ultimately, this resulted in the distinct class of online publishing that produces blogs we recognize today. For instance, the use of some sort of browser-based software is now a typical aspect of "blogging". Blogs can be hosted by dedicated blog hosting services, or they can be run using blog software, or on regular web hosting services. Some early bloggers, such as The Misanthropic Bitch, who began in 1997, actually referred to their online presence as a zine, before the term blog entered common usage.
Blogging
238
Rise in popularity
After a slow start, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near-simultaneous arrival of the first hosted blog tools: Bruce Ableson launched Open Diary in October 1998, which soon grew to thousands of online diaries. Open Diary innovated the reader comment, becoming the first blog community where readers could add comments to other writers' blog entries. Brad Fitzpatrick started LiveJournal in March 1999. Andrew Smales created Pitas.com in July 1999 as an easier alternative to maintaining a "news page" on a Web site, followed by Diaryland in September 1999, focusing more on a personal diary community.[19] Evan Williams and Meg Hourihan (Pyra Labs) launched Blogger.com in August 1999 (purchased by Google in February 2003)
Political impact
An early milestone in the rise in importance of blogs came in 2002, when many bloggers focused on comments by U.S. Senate Majority Leader Trent Lott.[20] Senator Lott, at a party honoring U.S. Senator Strom Thurmond, praised Senator Thurmond by suggesting that the United States would have been better off had Thurmond been elected president. Lott's critics saw these comments as a tacit approval of racial segregation, a policy advocated by Thurmond's 1948 presidential campaign. This view was reinforced by documents and recorded interviews dug up by bloggers. (See Josh Marshall's Talking Points Memo.) Though Lott's comments were made at a public event attended by the media, no major media organizations reported on his controversial comments until after blogs broke the story. Blogging helped to create a political crisis that forced Lott to step down as majority leader. Similarly, blogs were among the driving forces behind the "Rathergate" scandal. To wit: (television journalist) Dan Rather presented documents (on the CBS show 60 Minutes) that conflicted with accepted accounts of President Bush's military service record. Bloggers declared the documents to be forgeries and presented evidence and arguments in support of that view. Consequently, CBS apologized for what it said were inadequate reporting techniques (see Little Green Footballs). Many bloggers view this scandal as the advent of blogs' acceptance by the mass media, both as a news source and opinion and as means of applying political pressure. The impact of these stories gave greater credibility to blogs as a medium of news dissemination. Though often seen as partisan gossips, bloggers sometimes lead the way in bringing key information to public light, with mainstream media having to follow their lead. More often, however, news blogs tend to react to material already published by the mainstream media. Meanwhile, an increasing number of experts blogged, making blogs a source of in-depth analysis. In Russia, some political bloggers have started to challenge the dominance of official, overwhelmingly pro-government media. Bloggers such as Rustem Adagamov and Alexey Navalny have many followers and the latter's nickname for the ruling United Russia party as the "party of crooks and thieves" and been adopted by anti-regime protesters.[21] This led to the Wall Street Journal calling Navalny "the man Vladimir Putin fears most" in March 2012.[22]
Mainstream popularity
By 2004, the role of blogs became increasingly mainstream, as political consultants, news services, and candidates began using them as tools for outreach and opinion forming. Blogging was established by politicians and political candidates to express opinions on war and other issues and cemented blogs' role as a news source. (See Howard Dean and Wesley Clark.) Even politicians not actively campaigning, such as the UK's Labour Party's MP Tom Watson, began to blog to bond with constituents.
Blogging In January 2005, Fortune magazine listed eight bloggers whom business people "could not ignore": Peter Rojas, Xeni Jardin, Ben Trott, Mena Trott, Jonathan Schwartz, Jason Goldman, Robert Scoble, and Jason Calacanis.[23] Israel was among the first national governments to set up an official blog.[24] Under David Saranga, the Israeli Ministry of Foreign Affairs became active in adopting Web 2.0 initiatives, including an official video blog[24] and a political blog.[25] The Foreign Ministry also held a microblogging press conference via Twitter about its war with Hamas, with Saranga answering questions from the public in common text-messaging abbreviations during a live worldwide press conference.[26] The questions and answers were later posted on IsraelPolitik, the country's official political blog.[27] The impact of blogging upon the mainstream media has also been acknowledged by governments. In 2009, the presence of the American journalism industry had declined to the point that several newspaper corporations were filing for bankruptcy, resulting in less direct competition between newspapers within the same circulation area. Discussion emerged as to whether the newspaper industry would benefit from a stimulus package by the federal government. U.S. President Barack Obama acknowledged the emerging influence of blogging upon society by saying "if the direction of the news is all blogosphere, all opinions, with no serious fact-checking, no serious attempts to put stories in context, then what you will end up getting is people shouting at each other across the void but not a lot of mutual understanding.[28]
239
Types
There are many different types of blogs, differing not only in the type of content, but also in the way that content is delivered or written. Personal blogs The personal blog, an ongoing diary or commentary by an individual, is the traditional, most common blog. Personal bloggers usually take pride in their blog posts, even if their blog is never read. Blogs often become more than a way to just communicate; they become a way to reflect on life, or works of art. Blogging can have a sentimental quality. Few personal blogs rise to fame and the mainstream but some personal blogs quickly garner an extensive following. One type of personal blog, referred to as a microblog, is extremely detailed and seeks to capture a moment in time. Some sites, such as Twitter, allow bloggers to share thoughts and feelings instantaneously with friends and family, and are much faster than emailing or writing. Microblogging Microblogging is the practice of posting small pieces of digital contentwhich could be text, pictures, links, short videos, or other mediaon the Internet. Microblogging offers a portable communication mode that feels organic and spontaneous to many and has captured the public imagination. Friends use it to keep in touch, business associates use it to coordinate meetings or share useful resources, and celebrities and politicians (or their publicists) microblog about concert dates, lectures, book releases, or tour schedules. A wide and growing range of add-on tools enables sophisticated updates and interaction with other applications, and the resulting profusion of functionality is helping to define new possibilities for this type of communication.[29] Corporate and organizational blogs A blog can be private, as in most cases, or it can be for business purposes. Blogs used internally to enhance the communication and culture in a corporation or externally for marketing, branding or public relations purposes are called corporate blogs. Similar blogs for clubs and societies are called club blogs, group blogs, or by similar names; typical use is to inform members and other interested parties of club and member activities. By genre Some blogs focus on a particular subject, such as political blogs, health blogs, travel blogs (also known as travelogs), gardening blogs, house blogs,[30][31] fashion blogs, project blogs, education blogs, niche blogs, classical music blogs, quizzing blogs and legal blogs (often referred to as a blawgs) or dreamlogs. Two
Blogging common types of genre blogs are art blogs and music blogs. A blog featuring discussions especially about home and family is not uncommonly called a mom blog and one made popular is by Erica Diamond who created Womenonthefence.com which is syndicated to over two million readers monthly.[32][33][34][35][36][37] While not a legitimate type of blog, one used for the sole purpose of spamming is known as a Splog. By media type A blog comprising videos is called a vlog, one comprising links is called a linklog, a site containing a portfolio of sketches is called a sketchblog or one comprising photos is called a photoblog.[38] Blogs with shorter posts and mixed media types are called tumblelogs. Blogs that are written on typewriters and then scanned are called typecast or typecast blogs; see typecasting (blogging). A rare type of blog hosted on the Gopher Protocol is known as a Phlog. By device Blogs can also be defined by which type of device is used to compose it. A blog written by a mobile device like a mobile phone or PDA could be called a moblog.[39] One early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site. This practice of semi-automated blogging with live video together with text was referred to as sousveillance. Such journals have been used as evidence in legal matters. Reverse blog A Reverse Blog is composed by its users rather than a single blogger. This system has the characteristics of a blog, and the writing of several authors. These can be written by several contributing authors on a topic, or opened up for anyone to write. There is typically some limit to the number of entries to keep it from operating like a Web Forum.
240
Blogging It is common for blogs to feature advertisements either to financially benefit the blogger or to promote the blogger's favorite causes. The popularity of blogs has also given rise to "fake blogs" in which a company will create a fictional blog as a marketing tool to promote a product.[44]
241
Popularity
Researchers have analyzed the dynamics of how blogs become popular. There are essentially two measures of this: popularity through citations, as well as popularity through affiliation (i.e., blogroll). The basic conclusion from studies of the structure of blogs is that while it takes time for a blog to become popular through blogrolls, permalinks can boost popularity more quickly, and are perhaps more indicative of popularity and authority than blogrolls, since they denote that people are actually reading the blog's content and deem it valuable or noteworthy in specific cases.[45] The blogdex project was launched by researchers in the MIT Media Lab to crawl the Web and gather data from thousands of blogs in order to investigate their social properties. It gathered this information for over 4 years, and autonomously tracked the most contagious information spreading in the blog community, ranking it by recency and popularity. It can therefore be considered the first instantiation of a memetracker. The project was replaced by tailrank.com which in turn has been replaced by spinn3r.com [46]. Blogs are given rankings by Technorati based on the number of incoming links and Alexa Internet based on the Web hits of Alexa Toolbar users. In August 2006, Technorati found that the most linked-to blog on the internet was that of Chinese actress Xu Jinglei.[47] Chinese media Xinhua reported that this blog received more than 50 million page views, claiming it to be the most popular blog in the world.[48] Technorati rated Boing Boing to be the most-read group-written blog.[47]
Blogging There are many examples of bloggers who have published books based on their blogs, e.g., Salam Pax, Ellen Simonetti, Jessica Cutler, ScrappleFace. Blog-based books have been given the name blook. A prize for the best blog-based book was initiated in 2005,[54] the Lulu Blooker Prize.[55] However, success has been elusive offline, with many of these books not selling as well as their blogs. Only blogger Tucker Max made the New York Times Bestseller List.[56] The book based on Julie Powell's blog "The Julie/Julia Project" was made into the film Julie & Julia, apparently the first to do so.
242
Defamation or liability
Several cases have been brought before the national courts against bloggers concerning issues of defamation or liability. U.S. payouts related to blogging totaled $17.4 million by 2009; in some cases these have been covered by umbrella insurance.[60] The courts have returned with mixed verdicts. Internet Service Providers (ISPs), in general, are immune from liability for information that originates with third parties (U.S. Communications Decency Act and the EU Directive 2000/31/EC). In Doe v. Cahill, the Delaware Supreme Court held that stringent standards had to be met to unmask the anonymous bloggers, and also took the unusual step of dismissing the libel case itself (as unfounded under American libel law) rather than referring it back to the trial court for reconsideration.[61] In a bizarre twist, the Cahills were able to obtain the identity of John Doe, who turned out to be the person they suspected: the town's mayor, Councilman Cahill's political rival. The Cahills amended their original complaint, and the mayor settled the case rather than going to trial. In January 2007, two prominent Malaysian political bloggers, Jeff Ooi and Ahiruddin Attan, were sued by a pro-government newspaper, The New Straits Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin bin Aun and Brenden John a/l John Pereira over an alleged defamation. The plaintiff was supported by the Malaysian government.[62] Following the suit, the Malaysian government proposed to "register" all bloggers in Malaysia in order to better control parties against their interest.[63] This is the first such legal case against bloggers in the country. In the United States, blogger Aaron Wall was sued by Traffic Power for defamation and publication of trade secrets in 2005.[64] According to Wired Magazine, Traffic Power had been "banned from Google for allegedly rigging search engine results."[65] Wall and other "white hat" search engine optimization consultants had exposed Traffic Power in what they claim was an effort to protect the public. The case addressed the murky legal question of who is liable for comments posted on blogs.[66] The case was dismissed for lack of personal jurisdiction, and Traffic Power failed to appeal within the allowed time.[67]
Blogging In 2009, a controversial and landmark decision by The Hon. Mr Justice Eady refused to grant an order to protect the anonymity of Richard Horton. Horton was a police officer in the United Kingdom who blogged about his job under the name "NightJack".[68] In 2009, NDTV issued a legal notice to Indian blogger Kunte for a blog post criticizing their coverage of the Mumbai attacks.[69] The blogger unconditionally withdrew his post, which resulted in several Indian bloggers criticizing NDTV for trying to silence critics.[70]
243
Employment
Employees who blog about elements of their place of employment can begin to affect the brand recognition of their employer. In general, attempts by employee bloggers to protect themselves by maintaining anonymity have proved ineffective.[71] Delta Air Lines fired flight attendant Ellen Simonetti because she posted photographs of herself in uniform on an airplane and because of comments posted on her blog "Queen of Sky: Diary of a Flight Attendant" which the employer deemed inappropriate.[72][73] This case highlighted the issue of personal blogging and freedom of expression versus employer rights and responsibilities, and so it received wide media attention. Simonetti took legal action against the airline for "wrongful termination, defamation of character and lost future wages".[74] The suit was postponed while Delta was in bankruptcy proceedings (court docket).[75] In early 2006, Erik Ringmar, a tenured senior lecturer at the London School of Economics, was ordered by the convenor of his department to "take down and destroy" his blog in which he discussed the quality of education at the school.[76] Mark Cuban, owner of the Dallas Mavericks, was fined during the 2006 NBA playoffs for criticizing NBA officials on the court and in his blog.[77] Mark Jen was terminated in 2005 after 10 days of employment as an Assistant Product Manager at Google for discussing corporate secrets on his personal blog, then called 99zeros and hosted on the Google-owned Blogger service.[78] He blogged about unreleased products and company finances a week before the company's earnings announcement. He was fired two days after he complied with his employer's request to remove the sensitive material from his blog.[79] In India, blogger Gaurav Sabnis resigned from IBM after his posts questioned the claims of a management school IIPM.[80] Jessica Cutler, aka "The Washingtonienne",[81] blogged about her sex life while employed as a congressional assistant. After the blog was discovered and she was fired,[82] she wrote a novel based on her experiences and blog: The Washingtonienne: A Novel. Cutler is presently being sued by one of her former lovers in a case that could establish the extent to which bloggers are obligated to protect the privacy of their real life associates.[83] Catherine Sanderson, a.k.a. Petite Anglaise, lost her job in Paris at a British accountancy firm because of blogging.[84] Although given in the blog in a fairly anonymous manner, some of the descriptions of the firm and some of its people were less than flattering. Sanderson later won a compensation claim case against the British firm, however.[85] On the other hand, Penelope Trunk wrote an upbeat article in the Boston Globe back in 2006, entitled "Blogs 'essential' to a good career".[86] She was one of the first journalists to point out that a large portion of bloggers are professionals and that a well-written blog can help attract employers.
Blogging
244
Political dangers
Blogging can sometimes have unforeseen consequences in politically sensitive areas. Blogs are much harder to control than broadcast or even print media. As a result, totalitarian and authoritarian regimes often seek to suppress blogs and/or to punish those who maintain them. In Singapore, two ethnic Chinese were imprisoned under the countrys anti-sedition law for posting anti-Muslim remarks in their blogs.[87] Egyptian blogger Kareem Amer was charged with insulting the Egyptian president Hosni Mubarak and an Islamic institution through his blog. It is the first time in the history of Egypt that a blogger was prosecuted. After a brief trial session that took place in Alexandria, the blogger was found guilty and sentenced to prison terms of three years for insulting Islam and inciting sedition, and one year for insulting Mubarak.[88] Egyptian blogger Abdel Monem Mahmoud was arrested in April 2007 for anti-government writings in his blog.[89] Monem is a member of the then banned Muslim Brotherhood. After the 2011 Egyptian revolution, the Egyptian blogger Maikel Nabil Sanad was charged with insulting the military for an article he wrote on his personal blog and sentenced to 3 [90][91][92][93][94][95][96][97][98][99][100][101][102][103] years. After expressing opinions in his personal blog about the state of the Sudanese armed forces, Jan Pronk, United Nations Special Representative for the Sudan, was given three days notice to leave Sudan. The Sudanese army had demanded his deportation.[104][105][106] In Myanmar, Nay Phone Latt, a blogger, was sentenced to 20 years in jail for posting a cartoon critical of head of state Than Shwe.[107]
Personal safety
One consequence of blogging is the possibility of attacks or threats against the blogger, sometimes without apparent reason. Kathy Sierra, author of the innocuous blog "Creating Passionate Users",[108] was the target of such vicious threats and misogynistic insults that she canceled her keynote speech at a technology conference in San Diego, fearing for her safety.[109] While a blogger's anonymity is often tenuous, Internet trolls who would attack a blogger with threats or insults can be emboldened by anonymity. Sierra and supporters initiated an online discussion aimed at countering abusive online behavior[110] and developed a blogger's code of conduct.
Behavior
The Blogger's Code of Conduct is a proposal by Tim O'Reilly for bloggers to enforce civility on their blogs by being civil themselves and moderating comments on their blog. The code was proposed due to threats made to blogger Kathy Sierra.[111] The idea of the code was first reported by BBC News, who quoted O'Reilly saying, "I do think we need some code of conduct around what is acceptable behaviour, I would hope that it doesn't come through any kind of regulation it would come through self-regulation."[112] O'Reilly and others came up with a list of seven proposed ideas:[113][114][115][116][117] 1. 2. 3. 4. 5. 6. Take responsibility not just for your own words, but for the comments you allow on your blog. Label your tolerance level for abusive comments. Consider eliminating anonymous comments. Ignore the trolls. Take the conversation offline, and talk directly, or find an intermediary who can do so. If you know someone who is behaving badly, tell them so.
Blogging
245
References
[1] Blood, Rebecca (September 7, 2000). "Weblogs: A History And Perspective" (http:/ / www. rebeccablood. net/ essays/ weblog_history. html). . [2] Mutum, Dilip; Wang, Qing (2010). "Consumer Generated Advertising in Blogs". In Neal M. Burns, Terry Daugherty, Matthew S. Eastin. Handbook of Research on Digital Media and Advertising: User Generated Content Consumption. 1. IGI Global. pp.248261. [3] Gaudeul, Alexia and Peroni, Chiara (2010). "Reciprocal attention and norm of reciprocity in blogging networks" (http:/ / ideas. repec. org/ a/ ebl/ ecbull/ eb-10-00198. html). Economics Bulletin 30 (3): 22302248. . [4] "BlogPulse" (http:/ / www. blogpulse. com/ ). The Nielsen Company. February 16, 2011. . Retrieved 2011-02-17. [5] About Tumblr.com. Accessed October 13, 2012 (http:/ / www. tumblr. com/ about) [6] WordPress.com Stats. Accessed October 13, 2012 (http:/ / www. wordpress. com/ stats) [7] "After 10 Years of Blogs, the Future's Brighter Than Ever" (http:/ / www. wired. com/ entertainment/ theweb/ news/ 2007/ 12/ blog_anniversary). Wired. 2007-12-17. . Retrieved 2008-06-05. [8] "It's the links, stupid" (http:/ / www. economist. com/ surveys/ displaystory. cfm?story_id=6794172). The Economist. 2006-04-20. . Retrieved 2008-06-05. [9] Merholz, Peter (1999). "Peterme.com" (http:/ / web. archive. org/ web/ 19991013021124/ http:/ / peterme. com/ index. html). The Internet Archive. Archived from the original (http:/ / peterme. com/ index. html) on 1999-10-13. . Retrieved 2008-06-05. [10] Kottke, Jason (2003-08-26). "kottke.org" (http:/ / www. kottke. org/ 03/ 08/ its-weblog-not-web-log). . Retrieved 2008-06-05. [11] Origins of "Blog" and "Blogger" (http:/ / listserv. linguistlist. org/ cgi-bin/ wa?A2=ind0804C& L=ADS-L& P=R16795& I=-3), American Dialect Society Mailing List (Apr. 20, 2008). [12] The term "e-log" has been used to describe journal entries sent out via e-mail since as early as March 1996.Norman, David (2005-07-13). "Users confused by blogs" (http:/ / web. archive. org/ web/ 20070607235110/ http:/ / lists. drupal. org/ archives/ development/ 2005-07/ msg00208. html) ( Scholar search (http:/ / scholar. google. co. uk/ scholar?hl=en& lr=& q=author:Norman+ intitle:Users+ confused+ by+ blogs& as_publication=& as_ylo=2005& as_yhi=2005& btnG=Search)). Archived from the original (http:/ / lists. drupal. org/ archives/ development/ 2005-07/ msg00208. html) on 2007-06-07. . Retrieved 2008-06-05 "Research staff and students welcome E-Log" (http:/ / www. ucl. ac. uk/ news-archive/ archive/ 2003/ december-2003/ latest/ newsitem. shtml?03120901). University College London. December 2003. . Retrieved 2008-06-05. [13] http:/ / home. mcom. com/ home/ whats-new. html [14] Harmanci, Reyhan (2005-02-20). "Time to get a life pioneer blogger Justin Hall bows out at 31" (http:/ / www. sfgate. com/ cgi-bin/ article. cgi?file=/ c/ a/ 2005/ 02/ 20/ MNGBKBEJO01. DTL). San Francisco Chronicle. . Retrieved 2008-06-05. [15] Pournelle, Jerry. "Chaos Manor in Perspective" (http:/ / www. jerrypournelle. com/ #whatabout). Jerry Pournelle's blog. . [16] Paul Festa (2003-02-25). "Newsmaker: Blogging comes to Harvard" (http:/ / news. cnet. com/ 2008-1082-985714. html). CNET. . Retrieved 2007-01-25. [17] "...Dave Winer... whose Scripting News (scripting.com) is one of the oldest blogs."David F. Gallagher (2002-06-10). "Technology; A rift among bloggers" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9E0DE3DE103DF933A25755C0A9649C8B63). New York Times. . [18] http:/ / web. archive. org/ web/ 19961112042649/ http:/ / netguide. aust. com/ daily/ index. html [19] Jensen, Mallory A Brief History of Weblogs (http:/ / cjrarchives. org/ issues/ 2003/ 5/ blog-jensen. asp?printerfriendly=yes) [20] Massing, Michael (2009-08-13). "The News About the Internet" (http:/ / www. nybooks. com/ articles/ 22960). New York Review of Books (The New York Review of Books) 56 (13): 2932. . Retrieved 2009-10-10. [21] Daniel Sandford, BBC News: "Russians tire of corruption spectacle", http:/ / www. bbc. co. uk/ news/ world-europe-15972326 [22] Matthew Kaminski (March 3, 2012). "The Man Vladimir Putin Fears Most (the weekend interview)" (http:/ / online. wsj. com/ article/ SB10001424052970203986604577257321601811092. html). The Wall Street Journal. . [23] {{cite journal|journal=Fortune|date=January 2005|website=Fortune.com|url=http:/ / www. fortune. com/ fortune/ technology/ articles/ 0,15114,1011763-1,00. html| [24] Israel Video Blog aims to show the world 'the beautiful face of real Israel' (http:/ / www. ynetnews. com/ articles/ 0,7340,L-3220593,00. html), Ynet, February 24, 2008. [25] Latest PR venture of Israel's diplomatic mission in New York attracts large Arab audience (http:/ / www. ynetnews. com/ articles/ 0,7340,L-3220593,00. html), Ynet, June 21, 2007. [26] Battlefront Twitter (http:/ / fr. jpost. com/ servlet/ Satellite?cid=1230456533492& pagename=JPost/ JPArticle/ ShowFull), Haviv Rettig Gur, The Jerusalem Post, December 30, 2008. [27] The Toughest Qs Answered in the Briefest Tweets (http:/ / www. nytimes. com/ 2009/ 01/ 04/ weekinreview/ 04cohen. html), Noam Cohen, The New York Times, January 3, 2009. Retrieved January 5, 2009. [28] Journalists deserve subsidies too (http:/ / www. delawareonline. com/ article/ 20091103/ OPINION16/ 91102031/ 1004/ OPINION/ Journalists-deserve-subsidies-too), Robert W. Mcchesney and John Nichols, Delaware Online, November 3, 2009. Retrieved November 10, 2009. [29] "7 Things You Should Know About Microblogging" (http:/ / www. educause. edu/ library/ resources/ 7-things-you-should-know-about-microblogging). Educause.Edu. 2009-07-07. . Retrieved 2012-10-25. [30] Stephan Metcalf, "Fixing a Hole", New York Times, March 2006 [31] Jennifer Saranow, "Blogwatch: This Old House", Wall Street Journal, September 2007
Blogging
[32] Casserly, Meghan and Goudreau, Jenna. Top 100 Websites For Women 2011 (http:/ / www. forbes. com/ 2011/ 06/ 23/ 100-best-web-sites-for-women-blogs-2011. html), Forbes, June 23, 2011 [33] Paul, Pamela (2004-04-12). "The New Family Album" (http:/ / www. time. com/ time/ magazine/ article/ 0,9171,993832-3,00. html). TIME. . Retrieved 2010-03-31. [34] Carpenter, MacKenzie (2007-10-31). "More women are entering the blogosphere satirizing, sharing and reaching a key demographic" (http:/ / www. post-gazette. com/ pg/ 07304/ 829747-51. stm). Post-gazette.com. . Retrieved 2010-03-31. [35] Brown, Jonathan (2005-02-05). "The drooling minutiae of childhood revealed for all to see as 'Mommy blogs' come of age" (http:/ / www. independent. co. uk/ news/ science/ the-drooling-minutiae-of-childhood-revealed-for-all-to-see-as-mommy-blogs-come-of-age-485573. html). The Independent (London). . Retrieved 2010-03-30. [36] "Living" (http:/ / www. omaha. com/ index. php?u_page=1219& u_sid=10322842). Omaha.com. . Retrieved 2010-03-31. [37] Jesella, Kara (2008-07-27). "Bloggings Glass Ceiling" (http:/ / www. nytimes. com/ 2008/ 07/ 27/ fashion/ 27blogher. html?_r=2& sq=blogher women blogging& st=cse& adxnnl=1& scp=1& adxnnlx=1228493929-MAKTyKJ3qiW/ + fidCwXbFg). The New York Times. . Retrieved 2010-03-26. [38] "What is a photoblog" (http:/ / wiki. photoblogs. org/ wiki/ What_is_a_Photoblog). Photoblogs.org Wiki. . Retrieved 2006-06-25. [39] "Blogging goes mobile" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 2783951. stm). BBC News. 2003-02-23. . Retrieved 2008-06-05. [40] See for instance: Mesure, Susie (2009-08-23). "Is it a diary? Is it an ad? It's a mummy blog" (http:/ / www. independent. co. uk/ life-style/ gadgets-and-tech/ news/ is-it-a-diary-is-it-an-ad-its-a-mummy-blog-1776163. html). The Independent (London): p.11. . Retrieved 2009-10-10. [41] "Welcome to Technorati" (http:/ / web. archive. org/ web/ 20080505011927/ http:/ / www. technorati. com/ about). unknown. Archived from the original (http:/ / technorati. com/ about) on May 5, 2008. . Retrieved 2008-06-25. [42] "About MyBlogLog" (http:/ / www. mybloglog. com/ buzz/ help/ #a200502282152271). MyBlogLog. . Retrieved 2007-06-29. [43] "Global Voices: About" (http:/ / globalvoicesonline. org/ about/ ). GlobalVoices.org. . Retrieved 2011-04-02. [44] Gogoi, Pallavi (2006-10-09). "Wal-Mart's Jim and Laura: The Real Story" (http:/ / www. businessweek. com/ bwdaily/ dnflash/ content/ oct2006/ db20061009_579137. htm). BusinessWeek. . Retrieved 2008-08-06. [45] Marlow, C. Audience, structure and authority in the weblog community (http:/ / alumni. media. mit. edu/ ~cameron/ cv/ pubs/ 04-01. pdf). Presented at the International Communication Association Conference, May, 2004, New Orleans, LA. [46] http:/ / spinn3r. com [47] Fickling, David, Internet killed the TV star (http:/ / blogs. guardian. co. uk/ news/ archives/ 2006/ 08/ 15/ internet_killed_the_tv_star. html), The Guardian NewsBlog, 15 August 2006 [48] "Xu Jinglei most popular blogger in world" (http:/ / www. chinadaily. com. cn/ china/ 2006-08/ 24/ content_672747. htm). China Daily. 2006-08-24. . Retrieved 2008-06-05. [49] "Blogging Bonnie." (http:/ / www. poynter. org/ column. asp?id=52& aid=48413/ ). Poynter.org. 2003-09-18. . [50] "National Safety Month" (http:/ / www. nsc. org/ nsc_events/ Nat_Safe_Month/ Pages/ home. aspx). Nsc.org. . Retrieved 2010-04-09. [51] "Flavor Flav Celebrates National Safety Month" (http:/ / blogcritics. org/ archives/ 2006/ 06/ 21/ 173419. php). Blogcritics. . [52] "Lisa Tolliver show notes" (http:/ / tolliveretips. blogspot. com/ 2006/ 06/ lisa-tolliver-show-guests-flavor-flav. html). Emergency Preparedness and Safety Tips On Air and Online. . [53] "Lisa Tolliver's Show Notes" (http:/ / lisatolliver. blogspot. com/ 2006/ 05/ how-my-radio-shows-publications-and. html). Lisa Tolliver On Air and Online. . [54] "Blooker rewards books from blogs" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 4326908. stm). BBC News. 2005-10-11. . Retrieved 2008-06-05. [55] "Blooker prize honours best blogs" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 6446271. stm). BBC News. 2007-03-17. . Retrieved 2008-06-05. [56] St, Warren (2006-04-16). "Dude, here's my book" (http:/ / www. nytimes. com/ 2006/ 04/ 16/ fashion/ sundaystyles/ 16CADS. html?ex=1302840000& en=778087aa367d0620& ei=5090& partner=rssuserland& emc=rss). Nytimes.com. . Retrieved 2010-07-31. [57] Mutum, Dilip and Wang, Qing (2010). Consumer Generated Advertising in Blogs. In Neal M. Burns, Terry Daugherty, Matthew S. Eastin (Eds) Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (Vol 1), IGI Global, 248-261. [58] Techchrunch.com (http:/ / www. techcrunch. com/ 2006/ 06/ 30/ payperpostcom-offers-to-buy-your-soul/ ): Payperpost.com offers to sell your soul, Kirkpatrick, M. (2006, June 30). [59] "Article Window" (http:/ / epaper. timesofindia. com/ Default/ Scripting/ ArticleWin. asp?From=Search& Key=ETBG/ 2008/ 01/ 25/ 12/ Ar01201. xml& CollName=ET_BANGALORE_ARCHIVE_2007& DOCID=108812& Keyword=(<many><stem>Chandu<and><many><stem>Gopalakrishnan<and><many><stem>libel<and><many><stem>blog)& skin=pastissues2& AppName=2& ViewMode=HTML). Epaper.timesofindia.com. . Retrieved 2012-10-25. [60] McQueen MP. (2009). Bloggers, Beware: What You Write Can Get You Sued (http:/ / online. wsj. com/ article/ SB124287328648142113. html). WSJ. [61] Doe v. Cahill (http:/ / caselaw. lp. findlaw. com/ data2/ delawarestatecases/ 266-2005. pdf), 884 A.2d 451 (Del. 2005). [62] "New Straits Times staffers sue two bloggers" (http:/ / web. archive. org/ web/ 20080608220312/ http:/ / www. rsf. org/ article. php3?id_article=20489). Reporters Without Borders. 2007-01-19. Archived from the original (http:/ / www. rsf. org/ article. php3?id_article=20489) on 2008-06-08. . Retrieved 2008-06-05.
246
Blogging
[63] "Government plans to force bloggers to register" (http:/ / web. archive. org/ web/ 20080611025330/ http:/ / www. rsf. org/ article. php3?id_article=21606). Reporters Without Borders. 2007-04-06. Archived from the original (http:/ / www. rsf. org/ article. php3?id_article=21606) on 2008-06-11. . Retrieved 2008-06-05. [64] Kesmodel, David (2005-08-31). Wall Street Journal "Blogger Faces Lawsuit Over Comments Posted by Readers" (http:/ / online. wsj. com/ public/ article/ SB112541909221726743-_vX2YpePQV7AOIl2Jeebz4FAfS4_20060831. html?mod=blogs). Wall Street Journal Online. Wall Street Journal. Retrieved 2008-06-05. [65] Wired Magazine, Legal Showdown in Search Fracas (http:/ / www. wired. com/ culture/ lifestyle/ news/ 2005/ 09/ 68799), Sept 8, 2005 [66] "Slashdot, Aug 31" (http:/ / yro. slashdot. org/ yro/ 05/ 08/ 31/ 1427228. shtml?tid=123). Yro.slashdot.org. 2005-08-31. . Retrieved 2010-07-31. [67] Sullivan, Danny (2006-04-13). "SearchEngineWatch" (http:/ / blog. searchenginewatch. com/ blog/ 060413-084431). Blog.searchenginewatch.com. . Retrieved 2010-07-31. [68] Ruling on NightJack author Richard Horton kills blogger anonymity (http:/ / technology. timesonline. co. uk/ tol/ news/ tech_and_web/ the_web/ article6509677. ece) [69] "Barkha versus blogger" (http:/ / www. thehoot. org/ web/ home/ story. php?storyid=3629& mod=1& pg=1& sectionId=6& valid=true). The Hoot. . Retrieved 2009-02-02. [70] Indian bloggers criticizing NDTV (http:/ / www. abhishekarora. com/ 2009/ 02/ chyetanya-kunte-vs-burkha-dutt-ndtv. html) [71] Sanderson, Cathrine (2007-04-02). "Blogger beware!" (http:/ / commentisfree. guardian. co. uk/ catherine_sanderson/ 2007/ 04/ blogger_beware. html). London: Guardian Unlimited. . Retrieved 2007-04-02. [72] Twist, Jo (2004-11-03). "US Blogger Fired by her Airline" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 3974081. stm). BBC News. . Retrieved 2008-06-05. [73] "Delta employee fired for blogging sues airline" (http:/ / www. usatoday. com/ travel/ news/ 2005-09-08-delta-blog_x. htm). USA Today. 2005-09-08. . Retrieved 2008-06-05. [74] "Queen of the Sky gets marching orders" (http:/ / www. theregister. co. uk/ 2004/ 11/ 03/ airline_blogger_sacked/ ). The Register. 2004-11-03. . Retrieved 2008-06-05. [75] Deltadocket.com (http:/ / deltadocket. com/ delta_downloads/ delta_downloads_CourtFiledDocuments/ Twelfth_OmnibusClaimsObjection. pdf) [76] MacLeod, Donald (2006-05-03). "Lecturer's Blog Sparks Free Speech Row" (http:/ / education. guardian. co. uk/ higher/ news/ story/ 0,,1766663,00. html). London: The Guardian. . Retrieved 2008-06-05. See also Forget the Footnotes (http:/ / ringmar. net/ forgethefootnotes/ ) [77] "NBA fines Cuban $200K for antics on, off court" (http:/ / sports. espn. go. com/ nba/ playoffs2006/ news/ story?id=2440355). ESPN. 2006-05-11. . Retrieved 2008-06-05. [78] Hansen, Evan (2005-02-08). "Google blogger has left the building" (http:/ / news. cnet. com/ Google-blogger-has-left-the-building/ 2100-1038_3-5567863. html). CNET News. . Retrieved 2007-04-04. [79] "Official Story, straight from the source" (http:/ / blog. plaxoed. com/ 2005/ 02/ 11/ the-official-story-straight-from-the-source/ ). . [80] "Express India" (http:/ / cities. expressindia. com/ fullstory. php?newsid=152721). Cities.expressindia.com. . Retrieved 2011-01-30. [81] Washingtoniennearchive.blogspot.com (http:/ / washingtoniennearchive. blogspot. com/ ) [82] "The Hill's Sex Diarist Reveals All (Well, Some)" (http:/ / www. washingtonpost. com/ wp-dyn/ articles/ A48909-2004May22. html). The Washington Post. 2004-05-23. . Retrieved 2008-06-05. [83] "Steamy D.C. Sex Blog Scandal Heads to Court" (http:/ / www. msnbc. msn. com/ id/ 16366256/ ). The Associated Press, MSNBC. 2006-12-27. . Retrieved 2008-06-05. [84] "Bridget Jones Blogger Fire Fury" (http:/ / edition. cnn. com/ 2006/ WORLD/ europe/ 07/ 19/ france. blog/ index. html?section=cnn_tech). CNN. 2006-07-19. . Retrieved 2008-06-05. [85] "Sacked "petite anglaise" blogger wins compensation claim" (http:/ / findarticles. com/ p/ articles/ mi_kmafp/ is_200703/ ai_n18772706). AFP. 2007-03-30. Archived from the original (http:/ / news. yahoo. com/ s/ afp/ 20070330/ tc_afp/ lifestyleinternet_070330205230) on 2007-03-30. . Retrieved 2008-06-05. [86] Boston.com (http:/ / www. boston. com/ business/ globe/ articles/ 2006/ 04/ 16/ blogs_essential_to_a_good_career/ ) [87] Kierkegaard, Sylvia (2006). "Blogs, lies and the doocing: The next hotbed of litigation?". Computer Law & Security Report 22 (2): 127. doi:10.1016/j.clsr.2006.01.002. [88] "Egypt blogger jailed for "insult"" (http:/ / news. bbc. co. uk/ 2/ hi/ middle_east/ 6385849. stm). BBC News. 2007-02-22. . Retrieved 2008-06-05. [89] Ana-ikhwan.blogspot.com (http:/ / www. ana-ikhwan. blogspot. com/ ) [90] VOA News: Imprisoned Egyptian Blogger's Hunger Strike Fights Military Rule (http:/ / www. voanews. com/ english/ news/ middle-east/ Imprisoned-Egyptian-Bloggers-Hunger-Strike-Fights-Military-Rule-131793268. html) (13 October 2011) [91] "EGYPT: Egyptian pacifist Maikel Nabil Sanad arrested for insulting the military | War Resisters' International" (http:/ / www. wri-irg. org/ node/ 12513). Wri-irg.org. . Retrieved 2011-08-14. [92] "Maikel Nabil Sanad : The Army and The People Were Never One Hand" (http:/ / www. maikelnabil. com/ 2011/ 03/ army-and-people-wasnt-ever-one-hand. html). Maikelnabil.com. 2011-03-08. . Retrieved 2011-08-14. [93] "EGYPT: Imprisoned pacifist blogger Maikel Nabil Sanad in solitary confinement | War Resisters' International" (http:/ / www. wri-irg. org/ node/ 13004). Wri-irg.org. . Retrieved 2011-08-14.
247
Blogging
[94] "Advocates: Egyptian blogger Nabil on hunger strike may only have days left Politics Egypt Ahram Online" (http:/ / english. ahram. org. eg/ NewsContent/ 1/ 64/ 22687/ Egypt/ Politics-/ Advocates-Egyptian-blogger-Nabil-on-hunger-strike-. aspx). English.ahram.org.eg. . Retrieved 2012-10-25. [95] "Maikel Nabil Sanads two-year jail term "insults spirit of Egyptian revolution"" (http:/ / en. rsf. org/ egypte-maikel-nabil-sanad-s-two-year-jail-14-12-2011,41301. html). Reporters Without Borders. . Retrieved 2011-12-29. [96] "Maikel Nabil Sanad, On Hunger Strike in Egypt, Is Dying" (http:/ / www. huffingtonpost. com/ 2011/ 09/ 15/ hunger-strike-egyptian-pr_n_963916. html). http:/ / www. huffingtonpost. com. . Retrieved 2011-12-29. [97] "Press Release: The Imminent Death of Blogger Maikel Nabil, Imprisoned by the Egyptian Military" (http:/ / en. nomiltrials. com/ 2011/ 12/ press-release-imminent-death-of-blogger. html). No Military Trials for Civilians. . Retrieved 2011-12-29. [98] "The Story of Maikel Nabil SCAF Crimes" (http:/ / www. youtube. com/ watch?v=vBHs1Xs2lF4). www.youtube.com. . Retrieved 2011-12-29. [99] Jack Shenker (22 January 2012). "Egypt pardons jailed blogger as generals brace for anniversary protests" (http:/ / www. guardian. co. uk/ world/ 2012/ jan/ 22/ egypt-pardons-blogger-anniversary-protests?newsfeed=true). The Guardian. . Retrieved 23 January 2012. [100] Amnesty International: Egypt military court toying with life of jailed blogger (https:/ / www. amnesty. org/ en/ news-and-updates/ egypt-military-court-toying-life-jailed-blogger-2011-10-13) (13 October 2011) [101] Amnesty International: Egypt blogger on hunger strike must be released as health fails (https:/ / www. amnesty. org/ en/ news-and-updates/ egypt-blogger-hunger-strike-must-be-released-health-fails-2011-09-26) (26 September 2011) [102] Reporters Without Borders: The blogger and conscientious objector Maikel Nabil Sanad arrested (http:/ / en. rsf. org/ + the-blogger-and-conscientious+ . html) (28 March 2011) [103] Reporters Without Borders: Authorities urged to free blogger at military court appeal (http:/ / en. rsf. org/ egypt-jailed-blogger-resumes-hunger-17-09-2011,41015. html) (3 October 2011) [104] "Sudan expels U.N. envoy for blog" (http:/ / www. cnn. com/ 2006/ WORLD/ africa/ 10/ 22/ sudan. darfur. un/ index. html). CNN. 2006-10-22. . Retrieved 2007-03-14. [105] "UN envoy leaves after Sudan row" (http:/ / news. bbc. co. uk/ 2/ hi/ africa/ 6076022. stm). BBC NEWS (BBC). 23 October 2006. . Retrieved 2006-10-24. [106] "Annan confirms Pronk will serve out his term as top envoy for Sudan" (http:/ / www. un. org/ apps/ news/ story. asp?NewsID=20396& Cr=sudan& Cr1=). UN News Centre (UN). 27 October 2006. . Retrieved 2008-06-05. [107] "Burma blogger jailed for 20 years" (http:/ / news. bbc. co. uk/ 2/ hi/ asia-pacific/ 7721271. stm). BBC News. 2008-11-11. . Retrieved 2010-03-26. [108] Headrush.typepad.com (http:/ / headrush. typepad. com/ ) [109] Pham, Alex (2007-03-31). "Abuse, threats quiet bloggers' keyboards" (http:/ / web. archive. org/ web/ 20080625081401/ http:/ / www. imsafer. com/ images/ LAtimes_3_31_07. pdf). Los Angeles Times. Archived from the original (http:/ / www. latimes. com/ business/ la-fi-internet31mar31,0,4064392. story?coll=la-home-headlines) on 2007-04-02. . Retrieved 2008-06-05. [110] "Blog death threats spark debate" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 6499095. stm). BBC News. 2007-03-27. . Retrieved 2008-06-05. [111] Tim O'Reilly (2007-03-03). "Call for a Blogger's Code of Conduct" (http:/ / radar. oreilly. com/ archives/ 2007/ 03/ call_for_a_blog_1. html). O'Reilly Radar. . Retrieved 2007-04-14. [112] "Call for blogging code of conduct" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 6502643. stm). BBC News. 2007-03-28. . Retrieved 2007-04-14. [113] "Draft Blogger's Code of Conduct" (http:/ / radar. oreilly. com/ archives/ 2007/ 04/ draft_bloggers_1. html). Radar.oreilly.com. . Retrieved 2011-01-30. [114] "Blogger's Code of Conduct at Blogging Wikia" (http:/ / blogging. wikia. com/ wiki/ Blogger's_Code_of_Conduct). Blogging.wikia.com. . Retrieved 2011-01-30. [115] "MilBlogs Rules of Engagement" (http:/ / www. yankeesailor. us/ ?p=113). Yankeesailor.us. 2005-05-20. . Retrieved 2011-01-30. [116] Code of Conduct: Lessons Learned So Far (http:/ / radar. oreilly. com/ archives/ 2007/ 04/ code_of_conduct. html), by Tim O'Reilly [117] "Blogger Content Policy" (http:/ / www. blogger. com/ content. g). Blogger.com. . Retrieved 2011-01-30.
248
Blogging
249
Further reading
Alavi, Nasrin. We Are Iran: The Persian Blogs, Soft Skull Press, New York, 2005. ISBN 1-933368-05-5. Bruns, Axel, and Joanne Jacobs, eds. Uses of Blogs, Peter Lang, New York, 2006. ISBN 0-8204-8124-6. Blood, Rebecca. "Weblogs: A History and Perspective" (http://www.rebeccablood.net/essays/weblog_history. html). "Rebecca's Pocket". Kline, David; Burstein, Dan. Blog!: How the Newest Media Revolution is Changing Politics, Business, and Culture, Squibnocket Partners, L.L.C., 2005. ISBN 1-59315-141-1. Michael Gorman. "Revenge of the Blog People!" (http://www.libraryjournal.com/article/CA502009.html). Library Journal. Ringmar, Erik. A Blogger's Manifesto: Free Speech and Censorship in the Age of the Internet (http://www. archive.org/download/ABloggersManifestoFreeSpeechAndCensorshipInTheAgeOfTheInternet/ ErikRingmarABloggersManifesto.pdf) (London: Anthem Press, 2007). Rosenberg, Scott, Say Everything: how blogging Began, what it's becoming, and why it matters (http://books. google.com/books?id=opmZQrBNPssC&printsec=frontcover), New York : Crown Publishers, 2009. ISBN 978-0-307-45136-1
External links
Computer Law and Security Report Volume 22 Issue 2, Pages 127-136 (http://www.sciencedirect.com/ science?_ob=ArticleURL&_udi=B6VB3-4JH47F6-5&_user=10& _handle=V-WA-A-W-AB-MsSAYZW-UUA-U-AAVYYUUEZC-AAVZBYADZC-YBADCWEZW-AB-U& _fmt=summary&_coverDate=12/31/2006&_rdoc=5&_orig=browse& _srch=#toc#5915#2006#999779997#619171!&_cdi=5915&view=c&_acct=C000050221&_version=1& ;_urlVersion=0&_userid=10&md5=3a78d26b9ff73d0a9c37060c8bed6dbc) blogs, Lies and the Doocing by Sylvia Kierkegaard (2006) Legal Guide for bloggers (http://www.eff.org/bloggers/lg/) by the Electronic Frontier Foundation
Microblogging
250
Microblogging
Microblogging is a broadcast medium in the form of blogging. A microblog differs from a traditional blog in that its content is typically smaller in both actual and aggregate file size. Microblogs "allow users to exchange small elements of content such as short sentences, individual images, or video links".[1] These small messages are sometimes called microposts.[2][3] As with traditional blogging, microbloggers post about topics ranging from the simple, such as "what I'm doing right now," to the thematic, such as "sports cars." Commercial microblogs also exist, to promote websites, services and/or products, and to promote collaboration within an organization. Some microblogging services offer features such as privacy settings, which allow users to control who can read their microblogs, or alternative ways of publishing entries besides the web-based interface. These may include text messaging, instant messaging, E-mail, digital audio or digital video.
Services
The first microblogs were known as tumblelogs. The term was coined by why the lucky stiff in a blog post on April12, 2005, while describing Christian Neukirchen's Anarchaia.[4]
Blogging has mutated into simpler forms (specifically, link- and mob- and aud- and vid- variant), but I dont think Ive seen a blog like Chris Neukirchens Anarchaia, which fudges together a bunch of disparate forms of citation (links, quotes, flickrings) into a very long and narrow and distracted tumblelog.
However, by 2006 and 2007, the term microblog came into greater usage for such services provided by Tumblr and Twitter. In May 2007, 111 microblogging sites were counted internationally. Among the most notable services are Twitter, Tumblr, Cif2.net, Plurk, Jaiku and identi.ca. Varieties of services and software with the feature of microblogging have been developed. Plurk has a timeline view which integrates video and picture sharing. Flipter uses microblogging as a platform for people to post topics and gather audience's opinions. Emote.in has a concept of sharing emotions, built over microblogging, with a timeline. PingGadget is a location based microblogging service. Pownce, developed by Digg founder Kevin Rose among others, integrates microblogging with file sharing and event invitations. Pownce was merged into SixApart in December 2008.[6] Other leading social networking websites Facebook, MySpace, LinkedIn, Diaspora*, JudgIt, Yahoo Pulse, Google Buzz, Google+ and XING, also have their own microblogging feature, better known as "status updates". Services such as Lifestream and Profilactic will aggregate microblogs from multiple social networks into a single list while other services, such as Ping.fm, will send out your microblog to multiple social networks. Internet users in China are facing a different situation. Foreign microblogging services like Twitter, Facebook, Plurk, and Google+ are censored in China. The users use Chinese weibo services such as Sina Weibo and Tencent Weibo. Tailored to Chinese people, these weibos are like hybrids of Twitter and Facebook, they implement basic features of Twitter and, allow users to comment to others' posts, post with graphical emoticons or attach image, music, video files.
Microblogging
251
Usage
Several studies, most notably by Harvard Business School and Sysomos, have tried to analyze the usage behavior of microblogging services.[7][8] Several of these studies show that for services such as Twitter, there is a small group of active users contributing to most of the activity.[9] Sysomos' Inside Twitter [8] survey, based on more than 11 million users, shows that 10% of Twitter users account for 86% of all activity. Twitter, Facebook, and other microblogging services are also becoming a platform for marketing and public relations,[10] with a sharp growth in the number of social media marketers. The Sysomos study shows that this specific group of marketers on Twitter is much more active than general user population, with 15% following more than 2,000 people. This is in sharp contrast to only 0.29% of overall Twitter users who follow more than 2,000 people.[8] Microblogging services have also emerged as an important source of real-time news updates for recent crisis situations, such as the Mumbai terror attacks or Iran protests.[11][12] The short nature of updates allow users to post news items quickly, reaching its audience in seconds. Microblogging services have revolutionized the way information is consumed. It has empowered citizens themselves to act as sensors or sources of data which could lead to important pieces of information. People now share what they observe in their surroundings, information about events, and what their opinions are about certain topics, for example government policies in healthcare. Moreover, these services store various metadata from these posts, such as the location and time of these shared posts. Aggregate analysis of this data includes different dimensions like space, time, theme, sentiment, network structure etc., and gives researchers an opportunity to understand social perceptions of the people about certain events of interest.[13] Microblogging also promotes authorship. On the microblogging platform Tumblr the reblogging feature links the post back to the original creator. The findings of a study by Emily Pronin of Princeton University and Harvard University's Daniel Wegner have been cited as a possible explanation for the rapid growth of microblogging. The study suggests a link between short bursts of activity and feelings of elation, power and creativity.[14]
Microblogging
252
Related concepts
Live Blogging is a derivative of microblogging that generates a continuous feed on a specific web page. Instant messaging systems display status, but generally only one of a few choices, such as: available, off-line, away. Away messages (messages displayed when the user is away) form a kind of microblogging. In the Finger protocol, the .project and .plan files are sometimes used for status updates similar to microblogging.
References
[1] Kaplan Andreas M., Haenlein Michael (2011) The early bird catches the news: Nine things you should know about micro-blogging, Business Horizons, 54(2). [2] (http:/ / research. hypios. com/ msm2011/ ) [3] S. Lohmann et al. (2012). "'Visual Analysis of Microblog Content Using Time-Varying Co-occurrence Highlighting in Tag Clouds'" (http:/ / www. vis. uni-stuttgart. de/ ~lohmansn/ publications/ MicroblogAnalyzer. pdf). AVI 2012 Conference. . [4] (http:/ / redhanded. hobix. com/ inspect/ tumbleloggingAssortedLarvae. html) [5] Tumblelogs (kottke.org) (http:/ / www. kottke. org/ 05/ 10/ tumblelogs) [6] Pownce website (http:/ / www. pownce. com/ ) [7] "New Twitter Research: Men Follow Men and Nobody Tweets" (http:/ / blogs. harvardbusiness. org/ cs/ 2009/ 06/ new_twitter_research_men_follo. html). Harvard Business School. 2009-06-01. . Retrieved 2009-06-23. [8] "Inside Twitter: An In-depth Look Inside the Twitter World" (http:/ / www. sysomos. com/ insidetwitter/ ). Sysomos. 2009-06-10. . Retrieved 2009-06-23. [9] "The More Followers You Have, The More You Tweet. Or Is It The Other Way Around?" (http:/ / www. techcrunch. com/ 2009/ 06/ 10/ the-more-followers-you-have-the-more-you-tweet-or-is-it-the-other-way-around/ ). TechCrunch. 2009-06-10. . Retrieved 2010-06-23. [10] Jin, Liyun (2009-06-21). "Businesses using Twitter, Facebook to market goods" (http:/ / www. post-gazette. com/ pg/ 09172/ 978727-96. stm). Pittsburgh Post-Gazette. . Retrieved 2009-06-23. [11] "First Hand Accounts Of Terrorist Attacks In India On Twitter, Flickr" (http:/ / www. techcrunch. com/ 2008/ 11/ 26/ first-hand-accounts-of-terrorist-attacks-in-india-on-twitter/ ). TechCrunch. 2008-11-26. . Retrieved 2009-06-23. [12] "Twitter on Iran: A Go-to Source or Almost Useless?" (http:/ / www. findingdulcinea. com/ news/ technology/ 2009/ June/ Twitter-on-Iran-a-Go-to-Source-or-Almost-Useless. html). 2009-06-22. . Retrieved 2009-06-23. [13] M. Nagarajan et. al. "'Spatio-Temporal-Thematic Analysis of Citizen-Sensor Data Challenges and Experiences'" (http:/ / knoesis. wright. edu/ library/ resource. php?id=00559). WISE 2009 Conference. . [14] "Could this be a factor in the allure of microblogs?" (http:/ / thelaughingbuddha. wordpress. com/ 2009/ 04/ 19/ could-this-be-a-factor-in-the-allure-of-microblogs/ ). . [15] "StatusNet Open Source microblogging service" (http:/ / status. net/ ). . Retrieved 2010-01-05. [16] Dejin Zhao & Mary Beth Rosson (May 2009). "'How and why people Twitter: the role that micro-blogging plays in informal communication at work'" (http:/ / portal. acm. org/ citation. cfm?id=1531710). ACM GROUP2009 Conference. . [17] D. Zhao, et al. (May 2011). "'Microblogging's impact on collaboration awareness: A field study of microblogging within and between project teams'" (http:/ / ieeexplore. ieee. org/ xpl/ login. jsp?tp=& arnumber=5928662& url=http:/ / ieeexplore. ieee. org/ xpls/ abs_all. jsp?arnumber=5928662). IEEE CTS2011 Conference. .
Microblogging
[18] Ross Mayfield (October 15, 2008). "'Email hell'" (http:/ / www. forbes. com/ 2008/ 10/ 15/ cio-email-manage-tech-cio-cx_rm_1015email. html). Forbes. . Retrieved March 25, 2010. [19] "Delicious Productivity Improvements For This Flavor Partner" (http:/ / www. socialtext. com/ customers/ casestudy_fona. php). Socialtext.com. . Retrieved March 25, 2010. [20] Joab Jackson (November 20, 2009). "NASA program proves the benefits of social networking" (http:/ / gcn. com/ Articles/ 2009/ 11/ 30/ A-Space-side-NASA-social-networking. aspx?Page=1). Government Computer News. . Retrieved March 25, 2010. [21] "'Google Buzz redesigned after privacy complaints'" (http:/ / www. telegraph. co. uk/ technology/ google/ 7240754/ Google-Buzz-redesigned-after-privacy-complaints. html). The Telegraph (London). February 15, 2010. . Retrieved March 25, 2010. [22] Emma Barnett (March 20, 2010). "'Have business networking sites finally come of age?'" (http:/ / www. telegraph. co. uk/ technology/ 7482116/ Have-business-networking-sites-finally-come-of-age. html). The Telegraph (London). . Retrieved March 25, 2010. [23] "'A world of connections'" (http:/ / www. economist. com/ specialreports/ displaystory. cfm?story_id=15351002). The Economist. Jan 28, 2010. . Retrieved March 25, 2010. [24] "Twitter outings undermine "super injunctions"" (http:/ / uk. reuters. com/ article/ 2011/ 05/ 09/ uk-britain-superinjunctions-twitter-idUKTRE7481YV20110509). Reuters. 2011-05-09. .
253
Social networking
A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those that contain category places (such as former school year or classmates), means to connect with friends (usually with self-description pages), and a recommendation system linked to trust. Popular methods now combine many of these, with American-based services Facebook, Google+, and Twitter widely used worldwide; Nexopia in Canada;[1] Badoo,[2] Bebo,[3] VKontakte, Draugiem.lv (mostly in Latvia), Hi5, Hyves (mostly in The Netherlands), iWiW (mostly in Hungary), Nasza-Klasa (mostly in Poland), Skyrock, The Sphere, StudiVZ (mostly in Germany), Tagged, Tuenti (mostly in Spain), and XING[4] in parts of Europe;[5] Hi5 and Orkut in South America and Central America;[6] LAGbook in Africa;[7] and Cyworld, Mixi, Orkut, renren,weibo and Wretch in Asia and the Pacific Islands. There have been attempts to standardize these services to avoid the need to duplicate entries of friends and interests (see the FOAF standard and the Open Source Initiative). A 2011 survey found that 47% of American adults use a social networking service.[8]
History
The potential for computer networking to facilitate newly improved forms of computer-mediated social interaction was suggested early on.[9] Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet,[10] ARPANET, LISTSERV, and bulletin board services (BBS). Many prototypical features of social networking sites were also present in online services such as America Online, Prodigy, CompuServe, ChatNet, and The WELL.[11] Early social networking on the World Wide Web began in the form of generalized online communities such as Theglobe.com (1995),[12] Geocities (1994) and Tripod.com (1995). Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to-use publishing tools and free or inexpensive webspace. Some communities - such as Classmates.com - took a different approach by simply having people link to each other via email addresses. In the late 1990s, user profiles became a central feature
Social networking of social networking sites, allowing users to compile lists of "friends" and search for other users with similar interests. New social networking methods were developed by the end of the 1990s, and many sites began to develop more advanced features for users to find and manage friends.[13] This newer generation of social networking sites began to flourish with the emergence of SixDegrees.com in 1997,[14] followed by Makeoutclub in 2000,[15][16] Hub Culture and Friendster in 2002,[17] and soon became part of the Internet mainstream. Friendster was followed by MySpace and LinkedIn a year later, and eventually Bebo. Attesting to the rapid increase in social networking sites' popularity, by 2005, it was reported that MySpace was getting more page views than Google. Facebook,[18] launched in 2004, became the largest social networking site in the world[19] in early 2009.[20]
254
Social impact
Web-based social networking services make it possible to connect people who share interests and activities across political, economic, and geographic borders.[21] Through e-mail and instant messaging, online communities are created where a gift economy and reciprocal altruism are encouraged through cooperation. Information is particularly suited to gift economy, as information is a nonrival good and can be gifted at practically no cost.[22][23] Facebook and other social networking tools are increasingly the object of scholarly research. Scholars in many fields have begun to investigate the impact of social-networking sites, investigating how such sites may play into issues of identity, privacy,[24] social capital, youth culture, and education.[25] Several websites are beginning to tap into the power of the social networking model for philanthropy. Such models provide a means for connecting otherwise fragmented industries and small organizations without the resources to reach a broader audience with interested users.[26] Social networks are providing a different way for individuals to communicate digitally. These communities of hypertexts allow for the sharing of information and ideas, an old concept placed in a digital environment. In 2011, HCL Technologies conducted research that showed that 50% of British employers had banned the use of social networking sites/services during office hours.[27][28]
Features
Typical features
According to Boyd and Ellison's (2007) article, "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life", social networking sites (SNSs) share a variety of technical features that allows individuals to: construct a public/semi-public profile, articulate list of other users that they share a connection with, and view their list of connections within the system (6). The most basic of these are visible profiles with a list of "friends" who are also users of the site. In an article entitled "Social Network Sites: Definition, History, and Scholarship," Boyd and Ellison adopt Sunden's (2003) description of profiles as unique pages where one can "type oneself into being."[29] A profile is generated from answers to questions, such as age, location, interests, etc. Some sites allow users to upload pictures, add multimedia content or modify the look and feel of the profile. Others, e.g., Facebook, allow users to enhance their profile by adding modules or "Applications."[29] Many sites allow users to post blog entries, search for others with similar interests and compile and share lists of contacts. User profiles often have a section dedicated to comments from friends and other users. To protect user privacy, social networks typically have controls that allow users to choose who can view their profile, contact them, add them to their list of contacts, and so on.
Social networking
255
Additional features
Some social networks have additional features, such as the ability to create groups that share common interests or affiliations, upload or stream live videos, and hold discussions in forums. Geosocial networking co-opts Internet mapping services to organize user participation around geographic features and their attributes. There is a trend towards more interoperability between social networks led by technologies such as OpenID and OpenSocial. In most mobile communities, mobile phone users can now create their own profiles, make friends, participate in chat rooms, create chat rooms, hold private conversations, share photos and videos, and share blogs by using their mobile phone. Some companies provide wireless services that allow their customers to build their own mobile community and brand it; one of the most popular wireless services for social networking in North America is Facebook Mobile.
Emerging trends
The things you share are things that make you look good, things which you are happy to tie into your identity.
[30]
As the increase in popularity of social networking is on a constant rise,[31] new uses for the technology are constantly being observed. At the forefront of emerging trends in social networking sites is the concept of "real-time web" and "location-based." Real-time allows users to contribute content, which is then broadcast as it is being uploaded - the concept is analogous to live radio and television broadcasts. Twitter set the trend for "real-time" services, wherein users can broadcast to the world what they are doing, or what is on their minds within a 140-character limit. Facebook followed suit with their "Live Feed" where users' activities are streamed as soon as it happens. While Twitter focuses on words, Clixtr, another real-time service, focuses on group photo sharing wherein users can update their photo streams with photos while at an event. Facebook, however, remains the largest photo sharing site - Facebook application and photo aggregator Pixable estimates that Facebook will have 100 billion photos by Summer 2011.[32] In April, 2012, the image-based social media network Pinterest had become the third largest social network in the United States.[33] Companies have begun to merge business technologies and solutions, such as cloud computing, with social networking concepts. Instead of connecting individuals based on social interest, companies are developing interactive communities that connect individuals based on shared business needs or experiences. Many provide specialized networking tools and applications that can be accessed via their websites, such as LinkedIn. Others companies, such as Monster.com, have been steadily developing a more "socialized" feel to their career center sites to harness some of the power of social networking sites. These more business related sites have their own nomenclature for the most part but the most common naming conventions are "Vocational Networking Sites" or "Vocational Media Networks", with the former more closely tied to individual networking relationships based on social networking principles. Foursquare gained popularity as it allowed for users to "check-in" to places that they are frequenting at that moment. Gowalla is another such service that functions in much the same way that Foursquare does, leveraging the GPS in phones to create a location-based user experience. Clixtr, though in the real-time space, is also a location-based social networking site, since events created by users are automatically geotagged, and users can view events occurring nearby through the Clixtr iPhone app. Recently, Yelp announced its entrance into the location-based social networking space through check-ins with their mobile app; whether or not this becomes detrimental to Foursquare or Gowalla is yet to be seen, as it is still considered a new space in the Internet technology industry.[34]
Social networking One popular use for this new technology is social networking between businesses. Companies have found that social networking sites such as Facebook and Twitter are great ways to build their brand image. According to Jody Nimetz, author of Marketing Jive,[35] there are five major uses for businesses and social media: to create brand awareness, as an online reputation management tool, for recruiting, to learn about new technologies and competitors, and as a lead generation tool to intercept potential prospects.[35] These companies are able to drive traffic to their own online sites while encouraging their consumers and clients to have discussions on how to improve or change products or services.
256
The European Southern Observatory uses social networks to engage people in astronomical [37] observations.
The use of online social networks by school libraries is also increasingly prevalent and they are being used to communicate with potential library users, as well as extending the services provided by individual school libraries. Social networks and their educational uses are of interest to many researchers. According to Livingstone and Brake (2010), Social networking sites, like much else on the internet, represent a moving target for researchers and policy makers.[38] Recent trends indicate that 47% of American adults use a social network.[39] A national survey in 2009 found that 73% of online teenagers use SNS, which is an increase from 55% three years earlier. (Lenhart, Purcell, Smith, & Zickuhr, 2010)[40] Recent studies have shown that social network services provide opportunities within professional education, curriculum education, and learning. However, there are constraints in this area. Professional uses within education Professional use of social networking services refers to the employment of a network site to connect with other professionals within a given field of interest. SNSs like LinkedIn, a social networking website geared towards companies and industry professionals looking to make new business contacts or keep in touch with previous co-workers, affiliates, and clients. Other network sites are now being used in this manner, Twitter has become [a] mainstay for professional development as well as promotion[41] and online SNSs support both the maintenance of existing social ties and the formation of new connections. Much of the early research on online communities assume that individuals using these systems would be connecting with others outside their preexisting social group or
Social networking location, liberating them to form communities around shared interests, as opposed to shared geography.[42] Other researchers have suggested that the professional use of network sites produce social capital. For individuals, social capital allows a person to draw on resources from other members of the networks to which he or she belongs. These resources can take the form of useful information, personal relationships, or the capacity to organize groups. As well, networks within these services also can be established or built by joining special interest groups that others have made, or creating one and asking others to join.[43] Curriculum uses within education According to Doering, Beach and OBrien, a future English curriculum needs to recognize a major shift in how adolescents are communicating with each other.[44] Curriculum uses of social networking services also can include sharing curriculum-related resources. Educators tap into user-generated content to find and discuss curriculum-related content for students. Responding to the popularity of social networking services among many students, teachers are increasingly using social networks to supplement teaching and learning in traditional classroom environments as they can provide new opportunities for enriching existing curriculum through creative, authentic and/or flexible, non-linear learning experiences.[45] Some social networks, such as English, baby! and LiveMocha, are explicitly education-focused and couple instructional content with an educational peer environment.[46] The new Web 2.0 technologies built into most social networking services promote conferencing, interaction, creation, research on a global scale, enabling educators to share, remix, and repurpose curriculum resources. In short, social networking services can become research networks as well as learning networks.[47] Learning uses within education Educators and advocates of new digital literacies are confident that social networking encourages the development of transferable, technical, and social skills of value in formal and informal learning.[48] In a formal learning environment, goals or objectives are determined by an outside department or agency. Tweeting, instant messaging, or blogging enhances student involvement. Students who would not normally participate in class are more apt to partake through social network services. Networking allows participants the opportunity for just-in-time learning and higher levels of engagement.[49] The use of SNSs allow educators to enhance the prescribed curriculum. When learning experiences are infused into a website, students utilize everyday for fun, students realize that learning can and should be a part of everyday life. It does not have to be separate and unattached.[50] Informal learning consists of the learner setting the goals and objectives. It has been claimed that media no longer just influence our culture. They are our culture.[51] With such a high number of users between the ages of 13-18, a number of skills are developed. Participants hone technical skills in choosing to navigate through social networking services. This includes elementary items such as sending an instant message or updating a status. The development of new media skills are paramount in helping youth navigate the digital world with confidence. Social networking services foster learning through what Jenkins (2006) describes as a "Participatory Culture."[52] A participatory culture consists of a space that allows engagement, sharing, mentoring, and an opportunity for social interaction. Participants of social network services avail of this opportunity. Informal learning, in the forms of participatory and social learning online, is an excellent tool for teachers to sneak in material and ideas that students will identify with and therefore, in a secondary manner, students will learn skills that would normally be taught in a formal setting in the more interesting and engaging environment of social learning.[53] Sites like Twitter provide students with the opportunity to converse and collaborate with others in real time. Social networking services provide a virtual space for learners. James Gee (2004) suggests that affinity spaces instantiate participation, collaboration, distribution, and dispersion of expertise, and relatedness.[54] Registered users share and search for knowledge which contributes to informal learning.
257
Social networking Constraints of social networking services in education In the past social networking services were viewed as a distraction and offered no educational benefit. Blocking these social networks was a form of protection for students against wasting time, bullying, and privacy protection. In an education setting, Facebook is seen by many instructors and educators as a frivolous, time-wasting distraction from schoolwork, and it is not uncommon to have Facebook banned at junior high or high school computer labs.[50] Cyberbullying has become an issue of concern with social networking services. According to the UK Children Go Online survey of 9-19 year olds found that a third have received bullying comments online.[55] To avoid this problem, many school districts/boards have blocked access to social networking services like Facebook, MySpace, Twitter, and so on, within the school environment. Social networking services often include a lot of personal information posted publicly and many believe that sharing personal information is a window into privacy theft. Schools have taken action to protect students from this. It is believed that this outpouring of identifiable information and the easy communication vehicle that social networking services opens the door to sexual predators, cyberbullying, and cyberstalking.[56] However, there is evidence to contradict this. 69% of social media using teens and 85% of adults believe that people are mostly kind to one another on social network sites[40] Recent research suggests that there has been a shift in blocking the use of social networking services. In many cases, the opposite is occurring as the potential of online networking services is being realized. It has been suggested that if schools block them [social networking services], theyre preventing students from learning the skills they need.[41] Banning social networking [] is not only inappropriate but also borderline irresponsible when it comes to providing the best educational experiences for students.[57] Schools and school districts have the option of educating safe media usage as well as incorporating digital media into the classroom experience, thus preparing students for the literacy they will encounter in the future.
258
Social networking
259
Business model
Few social networks currently charge money for membership. In part, this may be because social networking is a relatively new service, and the value of using them has not been firmly established in customers' minds. Companies such as MySpace and Facebook sell online advertising on their site. Their business model is based upon large membership count, and charging for membership would be counterproductive.[60] Some believe that the deeper information that the sites have on each user will allow much better targeted advertising than any other site can currently provide.[61] Social networks operate under an autonomous business model, in which a social network's members serve dual roles as both the suppliers and the consumers of content. This is in contrast to a traditional business model, where the suppliers and consumers are distinct agents. Revenue is typically gained in the autonomous business model via advertisements, but subscription-based revenue is possible when membership and content levels are sufficiently high.[62]
Social Interaction
Put simply, social networking is a way for one person to meet up with other people on the net. People use social networking sites for meeting new friends, finding old friends, or locating people who have the same problems or interests they have, called niche networking. More and more relationships and friendships are being formed online and then carried to an offline setting. Psychologist and University of Hamburg professor Erich H. Witte says that relationships which start online are much more likely to succeed. Witte has said that in less than 10 years, online dating will be the predominant way for people to start a relationship.[63] One online dating site claims that 2% of all marriages begin at its site, the equivalent of 236 marriages a day. Other sites claim 1 in 5 relationships begin online. Social networking sites play a vital role in this area as well. Being able to meet someone as a "friend" and see what common interests you share and how you have built up your friend base and "likes" you can truly see a fuller picture of the person you are talking with. Most sites are free instead of being pay based which allows younger people with stricter budgets to enjoy some of the same features as those of adults who are more likely to be able to afford pay based sites. While not the intended or original use for these social sites, a large area of their current function has stemmed from people wanting to meet other people in person and with the extremely busy schedules of most people, it is a fast, reliable and easy way in which to do so that costs you little time and money (if any). Users do not necessarily share with others the content which is of most interest to them, but rather that which projects a good impression of themselves.[30]
Social networking
260
Issues
Privacy
Privacy concerns with social networking services have been raised growing concerns amongst users on the dangers of giving out too much personal information and the threat of sexual predators. Users of these services also need to be aware of data theft or viruses. However, large services, such as MySpace and Netlog, often work with law enforcement to try to prevent such incidents. In addition, there is a perceived privacy threat in relation to placing too much personal information in the hands of large corporations or governmental bodies, allowing a profile to be produced on an individual's behavior on which decisions, detrimental to an individual, may be taken. Furthermore, there is an issue over the control of datainformation that was altered or removed by the user may in fact be retained and/or passed to third parties. This danger was highlighted when the controversial social networking site Quechup harvested e-mail addresses from users' e-mail accounts for use in a spamming operation.[66] In medical and scientific research, asking subjects for information about their behaviors is normally strictly scrutinized by institutional review boards, for example, to ensure that adolescents and their parents have informed consent. It is not clear whether the same rules apply to researchers who collect data from social networking sites. These sites often contain a great deal of data that is hard to obtain via traditional means. Even though the data are public, republishing it in a research paper might be considered invasion of privacy.[67] Privacy on social networking sites can be undermined by many factors. For example, users may disclose personal information, sites may not take adequate steps to protect user privacy, and third parties frequently use information posted on social networks for a variety of purposes. "For the Net generation, social networking sites have become the preferred forum for social interactions, from posturing and role playing to simply sounding off. However, because such forums are relatively easy to access, posted content can be reviewed by anyone with an interest in the users' personal information".[68][69][70] Following plans by the UK government to monitor traffic on social networks[71] schemes similar to E-mail jamming have been proposed for networks such as Twitter and Facebook. These would involve "friending" and "following" large numbers of random people to thwart attempts at network analysis.
Data mining
Through data mining, companies are able to improve their sales and profitability. With this data, companies create customer profiles that contain customer demographics and online behavior. A recent strategy has been the purchase and production of "network analysis software". This software is able to sort out through the influx of social networking data for any specific company.[72] Facebook has been especially important to marketing strategists. Facebook's controversial and new "Social Ads" program gives companies access to the millions of profiles in order to tailor their ads to a Facebook user's own interests and hobbies. However, rather than sell actual user information, Facebook sells tracked "social actions". That is, they track the websites a user uses outside of Facebook through a program called Facebook Beacon.[73]
Social networking
261
Notifications on websites
There has been a trend for social networking sites to send out only 'positive' notifications to users. For example sites such as Bebo, Facebook, and MySpace will not send notifications to users when they are removed from a person's friends list. Likewise, Bebo will send out a notification if a user is moved to the top of another user's friends list but no notification is sent if they are moved down the list. This allows users to purge undesirables from their list extremely easily and often without confrontation since a user will rarely notice if one person disappears from their friends list. It also enforces the general positive atmosphere of the website without drawing attention to unpleasant happenings such as friends falling out, rejection and failed relationships.
Access to information
Many social networking services, such as Facebook, provide the user with a choice of who can view their profile. This prevents unauthorized user(s) from accessing their information.[74] Parents who want to access their child's MySpace or Facebook account have become a big problem for teenagers who do not want their profile seen by their parents. By making their profile private, teens can select who may see their page, allowing only people added as "friends" to view their profile and preventing unwanted viewing of the profile by parents. Most teens are constantly trying to create a structural barrier between their private life and their parents.[75] To edit information on a certain social networking service account, the social networking sites require you to login or provide a password. This prevents unauthorized user(s) from adding, changing, or removing personal information, pictures, and/or other data. See also: Unauthorized access in online social networks
Social networking
262
Trolling
A common misuse of social networking sites such as Facebook is that it is occasionally used to emotionally abuse individuals. Such actions are often referred to as trolling. It is not rare for confrontations in the real world to be translated online. Trolling can occur in many different forms, such as (but not limited to) defacement of deceased person(s) tribute pages, name calling, playing online pranks on volatile individuals and controversial comments with the intention to cause anger and cause arguments. Trolling is not to be confused with cyber-bullying.
Online bullying
Online bullying, also called cyber-bullying, is a relatively common occurrence and it can often result in emotional trauma for the victim. Depending on the networking outlet, up to 39% of users admit to being cyber-bullied.[83] Danah Boyd, a researcher of social networks quotes a teenager in her article, Why Youth (Heart) Social Network Sites. The teenager expresses frustration towards networking sites like MySpace because it causes drama and too much emotional stress.[84] There are not many limitations as to what individuals can post when online. Individuals are given the power to post offensive remarks or pictures that could potentially cause a great amount of emotional pain for another individual.
Interpersonal communication
Interpersonal communication has been a growing issue as more and more people have turned to social networking as a means of communication. "Benniger (1987) describes how mass media has gradually replaced interpersonal communication as a socializing force. Further, social networking sites have become popular sites for youth culture to explore themselves, relationships, and share cultural artifacts".[85] Many teens and social networking users may be harming their interpersonal communication by using sites such as Facebook and MySpace. Stated by Baroness Greenfield, an Oxford University Neuroscientist, "My fear is that these technologies are infantilizing the brain into the state of small children who are attracted by buzzing noises and bright lights, who have a small attention span and who live for the moment."[86] The convenience that social network sites give users to communicate with one another can also damage their interpersonal communication. Sherry Turkle, the founder and director of the MIT Initiative on Technology and Self, stated, Networked, we are together, but so lessened are our expectations of each other that we feel utterly alone. And there is the risk that we come to see others as objects to be accessed--and only for the parts we find useful, comforting, or amusing.[87] Furthermore, social network sites can create insincere friendships, Turkle also noted, They nurture friendships on social-networking sites and then wonder if they are among friends. They become confused about companionship.[88]
Social networking
263
Patents
There has been rapid growth in the number of US patent applications that cover new technologies related to social networking. The number of published applications has been growing rapidly since 2003. There are now over 3500 published applications. As many as 7000 applications may be currently on file including those that haven't been published yet.[92] Only about 400[93] of these applications have issued as patents, however, due largely to the multi-year backlog in examination of business method patents and the difficulty in getting these patent applications allowed.[94] It has been reported that social networking patents are important for the published per year and patents issued per year establishment of new start-up companies.[95] It has also been reported, however, that social networking patents inhibit innovation.[96] On June 15, 2010, the United States Patent and Trademark Office awarded Amazon.com a patent for a "Social Networking System" based on its ownership of PlanetAll.[97] The patent describes a Social Networking System as A networked computer system provides various services for assisting users in locating, and establishing contact relationships with, other users. For example, in one embodiment, users can identify other users based on their affiliations with particular schools or other organizations. The system also provides a mechanism for a user to selectively establish contact relationships or connections with other users, and to grant permissions for such other users to view personal information of the user. The system may also include features for enabling users to identify contacts of their respective contacts. In addition, the system may automatically notify users of personal information updates made by their respective contacts.[98] The patent has garnered attention due to its similarity to the popular social networking site Facebook.[99]
Number of US social network patent applications
Worker's rights
What types of speech workers are protected from being fired for on social networking websites has been an issue for American companies with over 100 complaints as of 2011 on this topic having been made to the National Labor Relations Board (NLRB).[100] The National Labor Relations Act protects workers from being fired for "protected concerted activity," which prevents workers from being fired for collective action, while allowing companies the right to fire workers for individual actions they take against the company.[100] Companies are concerned with the potential damage comments online can do to public image due to their visibility and accessibility, but despite over 100 cases being presented thus far to NLRB only 1 has led to a formal ruling, leaving uncertainty as to the boundaries of what types of speech the NLRB will ultimately put in place.[100]
Social networking
264
Decentralized architecture
Most of the existing SNS sites use one or multiple dedicated data centers to serve its all users. Such infrastructure-based systems faces over-provisioning during non-peak hours, while may encounter service outage during peak hours, due to the highly dynamic of SNS users' activities. There are several proposals, leveraging a decentralized architecture to ensure the scalability of SNS sites with low infrastructure cost. These proposals include Fethr[101] uaOSN ,[102] and Cuckoo .[103]
Investigations
Social networking services are increasingly being used in legal and criminal investigations. Information posted on sites such as MySpace and Facebook has been used by police (forensic profiling), probation, and university officials to prosecute users of said sites. In some situations, content posted on MySpace has been used in court.[104] Facebook is increasingly being used by school administrations and law enforcement agencies as a source of evidence against student users. This site being the number one online destination for college students, allows users to create profile pages with personal details. These pages can be viewed by other registered users from the same school, which often include resident assistants and campus police who have signed up for the service.[105] One UK police force has sifted pictures from Facebook and arrested some people who had been photographed in a public place holding a weapon such as a knife (having a weapon in a public place is illegal).[106]
Application domains
Government applications
Social networking is more recently being used by various government agencies. Social networking tools serve as a quick and easy way for the government to get the opinion of the public and to keep the public updated on their activity. The Centers for Disease Control demonstrated the importance of vaccinations on the popular children's site Whyville and the National Oceanic and Atmospheric Administration has a virtual island on Second Life where people can explore underground caves or explore the effects of global warming.[107] Likewise, NASA has taken advantage of a few social networking tools, including Twitter and Flickr. They are using these tools to aid the Review of U.S. Human Space Flight Plans Committee, whose goal it is to ensure that the nation is on a vigorous and sustainable path to achieving its boldest aspirations in space.[108]
Business applications
The use of social networking services in an enterprise context presents the potential of having a major impact on the world of business and work (Fraser & Dutta 2008). Social networks connect people at low cost; this can be beneficial for entrepreneurs and small businesses looking to expand their contact bases. These networks often act as a customer relationship management tool for companies selling products and services. Companies can also use social networks for advertising in the form of banners and text ads. Since businesses operate globally, social networks can make it easier to keep in touch with contacts around the world. Two examples of social networking being used for business purposes are LinkedIn.com and Youngblackprofessionals.org [109]. LinkedIn aims to interconnect professionals. LinkedIn has over 100 million users in over 200 countries.[110] Youngblackprofessionals.org or YBP aims to do the same thing, but is targeted toward professional minorities. .[111] Another is the use of physical spaces available to members of a social network such as Hub Culture, an invitation-only social network for entrepreneurs, and other business influentials, with Pavilions in major cities such as London, UK. Having a physical presence allows members to network in the real world, as well as the virtual,
Social networking adding extra business value. Applications for social networking sites have extended toward businesses and brands are creating their own, high functioning sites, a sector known as brand networking. It is the idea that a brand can build its consumer relationship by connecting their consumers to the brand image on a platform that provides them relative content, elements of participation, and a ranking or score system. Brand networking is a new way to capitalize on social trends as a marketing tool. The power of social networks it beginning to permeate into internal culture of businesses where they are finding uses for collaboration, file sharing and knowledge transfer. The term Enterprise Social Software is becoming increasingly popular for these types of applications.
265
Dating applications
Many social networks provide an online environment for people to communicate and exchange personal information for dating purposes. Intentions can vary from looking for a one time date, short-term relationships, and long-term relationships.[112] Most of these social networks, just like online dating services, require users to give out certain pieces of information. This usually includes a user's age, gender, location, interests, and perhaps a picture. Releasing very personal information is usually discouraged for safety reasons.[113] This allows other users to search or be searched by some sort of criteria, but at the same time people can maintain a degree of anonymity similar to most online dating services. Online dating sites are similar to social networks in the sense that users create profiles to meet and communicate with others, but their activities on such sites are for the sole purpose of finding a person of interest to date. Social networks do not necessarily have to be for dating; many users simply use it for keeping in touch with friends, and colleagues.[114] However, an important difference between social networks and online dating services is the fact that online dating sites usually require a fee, where social networks are free.[115] This difference is one of the reasons the online dating industry is seeing a massive decrease in revenue due to many users opting to use social networking services instead. Many popular online dating services such as Match.com, Yahoo Personals, and eHarmony.com are seeing a decrease in users, where social networks like MySpace and Facebook are experiencing an increase in users.[116] The number of Internet users in the U.S. that visit online dating sites has fallen from a peak of 21% in 2003 to 10% in 2006.[117] Whether its the cost of the services, the variety of users with different intentions, or any other reason, it is undeniable that social networking sites are quickly becoming the new way to find dates online.
Educational applications
The National School Boards Association reports that almost 60 percent of students who use social networking talk about education topics online, and more than 50 percent talk specifically about schoolwork. Yet the vast majority of school districts have stringent rules against nearly all forms of social networking during the school day even though students and parents report few problem behaviors online. Social networks focused on supporting relationships between teachers and their students are now used for learning, educator professional development, and content sharing. Ning for teachers, TermWiki, Learn Central,[118] TeachStreet and other sites are being built to foster relationships that include educational blogs, eportfolios, formal and ad hoc communities, as well as communication such as chats, discussion threads, and synchronous forums. These sites also have content sharing and rating features. Social networks are also emerging as online yearbooks, both public and private. One such service is MyYearbook, which allows anyone from the general public to register and connect. A new trend emerging is private label yearbooks accessible only by students, parents, and teachers of a particular school, similar to Facebook's beginning within Harvard.
Social networking
266
Finance applications
The use of virtual currency systems inside social networks create new opportunities for global finance. Hub Culture operates a virtual currency Ven used for global transactions among members, product sales[119] and financial trades in commodities and carbon credits.[120][121] In May 2010, Carbon pricing contracts were introduced to the weighted basket of currencies and commodities that determine the floating exchange value of Ven. The introduction of carbon to the calculation price of the currency made Ven the first and only currency that is linked to the environment.[122]
Market share
According to ComScore, up to end of November 2011:[130]
Social networking
267
Worldwide
Unique Visitors Percentage 55.1% 11.7% 6.6% 17.7% 4.2% 17.8% 100 %
LinkedIn.com 94,823,000 Google+ MySpace Others Total 250,000,000 61,037,000 255,539,000 1,438,877,000
World Usage
According to ComScore,[131] as of December 2011, Israel leads the world in the time spent in social networks online, followed closely by Argentina.
In the media
In December 2010, Time Magazine named Facebook CEO Mark Zuckerberg as person of the year. Released in 2010, The Social Network is a film dramatizing the origin of Facebook.
References
Boyd, Danah; Ellison, Nicole (2007). "Social Network Sites: Definition, History, and Scholarship" [132]. Journal of Computer-Mediated Communication 13 (1). Boyd, Danah (2006). "Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites" [133]. First Monday 11 (12). Ellison, Nicole B.; Steinfield, Charles; Lampe, Cliff (2007). "The benefits of Facebook "friends": Exploring the relationship between college students' use of online social networks and social capital" [134]. Journal of Computer-Mediated Communication 12 (4). Fraser, Matthew; Dutta, Soumitra (2008). Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World [135]. Wiley. ISBN978-0-470-74014-9. Mazer, J. P.; Murphy, R. E.; Simonds, C. J. (2007). "I'll See You On "Facebook": The Effects of Computer-Mediated Teacher Self-Disclosure on Student Motivation, Affective Learning, and Classroom Climate" [136] . Communication Education 56 (1): 117. doi:10.1080/03634520601009710. Prensky, Marc (2001). "Digital Natives, Digital Immigrants" [137]. On the Horizon 9 (5). White, D.S.; Le Cornu, A. (2011). "Visitors and Residents: A New Typology for Online Engagement" [138]. First Monday 16 (9).
Social networking
268
Notes
[1] "Nexopia stats on" (http:/ / www. alexa. com/ data/ details/ traffic_details/ nexopia. com). Alexa.com. . Retrieved 2011-03-13. [2] Elevator Pitch: Why Badoo wants to be the next word in social networking (http:/ / blogs. guardian. co. uk/ digitalcontent/ 2008/ 03/ elevator_pitch_why_badoo_wants. html), Mark Sweney , The Guardian, December 24, 2007 , Accessed March 2008. [3] Bebo (http:/ / www. techcrunch. com/ 2007/ 08/ 20/ windows-live-messaging-coming-to-bebo/ ) - most popular of its kind in UK,(August 2007): TechCrunch website. Retrieved on January 15, 2008. [4] German Xing Plans Invasion of LinkedIn Turf (http:/ / www. marketingvox. com/ german-xing-plans-invasion-of-linkedin-turf-030727/ ): article from the MarketingVox website. [5] Hi5 popular in Europe (http:/ / www. pbs. org/ mediashift/ 2007/ 06/ try_try_againorkut_friendster. html): article from the PBS MediaShift website. Retrieved on January 18, 2008. [6] "Why Users Love Orkut" (http:/ / usability. about. com/ od/ websiteaudiences/ a/ Orkut. htm) - 55% of users are Brazilian: About.com website. Retrieved on January 15, 2008, [7] Kucera, Von Gregor (August 9, 2012). "Wundersame Welt der Netzwerke" (http:/ / www. wienerzeitung. at/ nachrichten/ kultur/ medien/ 478619_Wundersame-Welt-der-Netzwerke. html). Wiener Zeitung. . [8] finance.yahoo.com (http:/ / finance. yahoo. com/ family-home/ article/ 112952/ family-that-tweets-wsj?mod=family-kids_parents) [9] The Network Nation 2 by S. Roxanne Hiltz and Murray Turoff (Addison-Wesley, 1978, 1993) [10] Michael Hauben, Ronda Hauben, and Thomas Truscott (1997-04-27). Netizens: On the History and Impact of Usenet and the Internet (Perspectives). Wiley-IEEE Computer Society P. ISBN 0-8186-7706-6 [11] Katie Hafner, The WELL: A Story of Love, Death and Real Life in the Seminal Online Community (2001) Carroll & Graf Publishers ISBN 0-7867-0846-8 [12] Cotriss, David (2008-05-29). "Where are they now: TheGlobe.com" (http:/ / www. thestandard. com/ news/ 2008/ 05/ 29/ where-are-they-now-theglobe-com). The Industry Standard. . [13] Romm-Livermore, C. & Setzekorn, K. (2008). Social Networking Communities and E-Dating Services: Concepts and Implications. IGI Global. p.271 [14] mcmc.indiana.edu (http:/ / jcmc. indiana. edu/ vol13/ issue1/ boyd. ellison. html) [15] longislandpress.com (http:/ / www. longislandpress. com/ 2010/ 09/ 30/ from-friendster-to-myspace-to-facebook-the-evolution-and-deaths-of-social-networks/ ) [16] bnet.com (http:/ / www. bnet. com/ videos/ gibby-miller-inventing-the-social-network/ 239462) [17] Knapp, E. (2006). A Parent's Guide to MySpace. DayDream Publishers. ISBN 1-4196-4146-8 [18] Steve Rosenbush (2005). News Corp.'s Place in MySpace (http:/ / www. businessweek. com/ technology/ content/ jul2005/ tc20050719_5427_tc119. htm), BusinessWeek, July 19, 2005. (MySpace Page Views figures) [19] "Social graph-iti" (http:/ / www. economist. com/ business/ displaystory. cfm?story_id=9990635): Facebook's social network graphing: article from The Economist's website. Retrieved on January 19, 2008. [20] Social Networks: Facebook Takes Over Top Spot, Twitter Climbs (http:/ / blog. compete. com/ 2009/ 02/ 09/ facebook-myspace-twitter-social-network/ ) [21] "Social networking goes global" (http:/ / www. comscore. com/ press/ release. asp?press=1555). Reston, VAR: comscore.com. 2007. . Retrieved September 9, 2007. [22] Mackaay, Ejan (1990). "Economic Incentives in Markets for Information and Innovation". Harvard Journal of Law & Public Policy 13 (909): 867910. [23] Heylighen, Francis (2007). "Why is Open Access Development so Successful?". In B. Lutterbeck, M. Barwolff, and R. A. Gehring. Open Source Jahrbuch. Lehmanns Media. [24] Gross, R and Acquisti, A (2005). Information Revelation and Privacy in Online Social Networks (The Facebook case) (http:/ / www. heinz. cmu. edu/ ~acquisti/ papers/ privacy-facebook-gross-acquisti. pdf). Pre-proceedings version. ACM Workshop on Privacy in the Electronic Society (WPES) [25] Danah Boyd, (2007), Why Youth (Heart) Social Network Sites (http:/ / www. mitpressjournals. org/ doi/ pdf/ 10. 1162/ dmal. 9780262524834. 119), MacArthur Foundation Series on Digital Learning - Youth, Identity, and Digital Media Volume (ed. David Buckingham). MIT Press [26] "A New Generation Reinvents Philanthropy" (http:/ / online. wsj. com/ public/ article/ SB118765256378003494. html), Wall Street Journal website. [27] "Half of employees banned from Facebook at work" (http:/ / www. telegraph. co. uk/ technology/ facebook/ 8506380/ Half-of-employees-banned-from-Facebook-at-work. html). The Daily Telegraph (London). 2011-05-11. . [28] news.searchofficespace.com (http:/ / news. searchofficespace. com/ sos-news/ 50-of-british-employers-have-banned-facebook-from-the-office-what-do-you-think. html) [29] boyd, D. M., & Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship (http:/ / jcmc. indiana. edu/ vol13/ issue1/ boyd. ellison. html). Journal of Computer-Mediated Communication, 13(1), article 11. Retrieved on: 2012-01-30. [30] Byrne, Ciara (23 August 2012). "What you read is not what you share" (http:/ / venturebeat. com/ 2012/ 08/ 23/ bitly-realtime-hilary-mason/ ). VentureBeat. . Retrieved 10 September 2012. [31] Search for "e-commerce, social networking" (http:/ / www. google. com/ trends?q=e-commerce,+ social+ networking& ctab=0& geo=all& date=all& sort=1). Google Trends. Accessed 26 October 2009.
Social networking
[32] mashable.com (http:/ / mashable. com/ 2011/ 02/ 14/ facebook-photo-infographic/ ?asid=c228f21b) [33] (http:/ / mashable. com/ 2012/ 04/ 06/ pinterest-number-3-social-network/ ) Pinterest is Now the No. 3 Social Network in the U.S via Mashable.com [34] MG Siegler Jan 15, 2010 (2010-01-15). "Yelp Enables Check-Ins On Its iPhone App; Foursquare, Gowalla Ousted As Mayors" (http:/ / www. techcrunch. com/ 2010/ 01/ 15/ yelp-iphone-app-4-check-ins/ ). Techcrunch.com. . Retrieved 2011-03-13. [35] Nimetz, Jody. "Jody Nimetz on Emerging Trends in B2B Social Networking" (http:/ / www. marketing-jive. com/ 2007/ 11/ jody-nimetz-on-emerging-trends-in-b2b. html). Marketing Jive, November 18, 2007. Accessed 26 October 2009. [36] Liebeskind, Julia Porter, et al. "Social Networks, Learning, and Flexibility: Sourcing Scientific Knowledge in New Biotechnology Firms" (http:/ / www. jstor. org/ pss/ 2635102). Organization Science, Vol. 7, No. 4 (JulyAugust 1996), pp. 428443. [37] "Choose What the VLT Observes & Tweet Your Way to the VLT!" (http:/ / www. eso. org/ public/ news/ eso1232/ ). ESO Press Release. . Retrieved 8 August 2012. [38] Livingstone, Sonia; Brake, David R (December 2010). "On the Rapid Rise of Social Networking Sites: New Findings and Policy Implications" (http:/ / eprints. Ise. ac. uk/ 30124/ ). Children & Society 24 (1): 7583. doi:10.1111/j.1099-0860.2009.00243.x. . Retrieved July 16, 2012. [39] Wikipedia. "Social Networking service" (http:/ / en. wikipedia. org/ w/ index. php?title=Social_networking_service). . Retrieved July 17, 2012. [40] Lenhart, Amanda. "Social Media & Mobile Internet Use Among Teens and Young Adults" (http:/ / pewinternet. org/ Reports/ 2010/ Social-Media-and-Young-Adults. aspx). Pew Research Center. . Retrieved July 16, 2012. [41] Davis, Michelle R.. "Social Networking Goes to School" (http:/ / www. edweek. org/ dd/ articles/ 2010/ 06/ 16/ 03networking. h03. html?print=1). Education Week. . Retrieved July 17, 2012. [42] Ellison, Nicole B.; Steinfield, Charles; Lampe, Cliff (2007). "The Benefits of Facebook "Friends:" Social Capital and College Student's Use of Online Social Network Sites" (http:/ / www. elkhealth. pbworks. com/ f/ Ellison,+ Steinfield,+ and+ Lampe+ (2007). pdf). Journal of Computer-Mediated Communication 12: 11431168. doi:10.1111/j.1083-6101.2007.00367.x. . Retrieved July 16, 2012. [43] Knobel, Michelle., Lankshear, Colin (2008). Digital Literacy and Participation in Online Social Networking Spaces. New York: Peter Lang. pp.249278. [44] Doering, Aaron; Beach, Richard and O'Brien, David (October 2007). "Infusing Multimodal Tools and Digital Literacies into an English Education Program". National Council of Teachers of English 40 (1): 4160. [45] Buzzetto-More, Nicole A. (2010). "Social Networking in Undergraduate Education". Interdisciplinary Journal of Information, Knowledge, and Management 7: 6390. [46] "2012 Learn English Comparisons" (http:/ / learn-english-review. toptenreviews. com/ ). Top Ten Reviews. . Retrieved 3 September 2012. [47] Mason, Robin, and Rennie, Frank (2008). E-Learning and Social Networking Handbook Resources for Higher Education. Hoboken: Rutledge. pp.124. ISBN9780203927762. [48] Livingstone, Sonia; Brake, David R. (2010). "On the Rapid Rise of Social Networking Sites: New Findings and Policy Implications" (http:/ / eprints. Ise. ac. uk/ 30124/ ). Children & Society 24 (1): 7583. doi:10.1111/j.1099-0860.2009.00243.x. . Retrieved July 16, 2012. [49] Luo, Tian; Gao, Fei (2012). "Enhancing Classroom Learning Experience by Providing Structures to Microblogging Based Activities". Journal of Information Technical Education 11. [50] Gardner, J. Clark. "Facebooks Potential in the Classroom" (http:/ / www. jclarkgardner. com/ uploads/ 5/ 4/ 1/ 4/ 5414483/ jclark_gardner_facebook_classroom. pdf). . [51] Graber, Dianna; mentored by Mendoza, Kelly (2012). "New Media Literacy Education (NMLE): A Developmental Approach" (http:/ / www. jmle. org). Journal of Media Literacy Education 4 (1): 8292. . Retrieved July 16, 2012. [52] Jenkins, Henry (2006). Confronting the challenges of participatory culture: Media education for the 21st century. Chicago: The John D. and Catherine T. MacArthur Foundation. ISBN9780262513623. [53] Taylor, Gina, Rozi, Kristina. "Current Issues and Trends: Social Networking" (http:/ / niu. edu/ ~lynch/ social_networking_510_su2010. pdf). Northern Illinois University. . [54] Gee, James Paul (2004). Situated Language and Learning: A Critique of Traditional Schooling. London: Routledge. [55] Livingstone, Sonia, and Bober, Magdalena. "UK Children Go Online: Surveying the Experiences of Young People and Their Parents" (http:/ / eprints. lse. ac. uk/ archive/ 00000395). . [56] Munoz, Caroline Lego; Towner, Terri (Dec 5, 2011). "Back to the "Wall": Facebook in the College Classroom". First Monday 16 (12). [57] Waddington, Jayme (May 2011). "Social Networking: The Unharnessed Educational Tool". Undergraduate Research Journal at UCCS 4.1: 1218. [58] Carlson, Ben (April 28, 2010). "March 2.0: Success of the National Equality March relied on social media tools" (http:/ / www. mediabullseye. com/ mb/ 2010/ 04/ march-2-0-success-of-the-national-equality-march-relied-on-social-media-tools. html#idc-container). Media Bullseye. . Retrieved 2010-04-29. [59] Arabie, Phipps, and Yoram Wind. "Marketing and Social Networks" (http:/ / books. google. com/ books?hl=en& lr=& id=C6juDKDmvCcC& oi=fnd& pg=PR9& dq=social+ networking& ots=Aw9oXw-AtG& sig=CPAZMmPPnAhSZzAu0lh-k4iUXt4#PRA1-PA254,M1). In Stanley Wasserman and Joseph Galaskiewicz, Advances in Social Network Analysis: Research in the Social and Behavioral Sciences. Thousand Oaks, Calif.: Sage Publications, 1994, pp. 254273. ISBN 0-8039-4302-4
269
Social networking
[60] Chambers, Clem. "Murdoch Will Earn a Payday from MySpace" (http:/ / www. forbes. com/ technology/ ebusiness/ 2006/ 03/ 29/ microsoft-myspace-newscorp-in_cc_0330soapbox_inl. html). Forbes, March 30, 2006. Accessed 26 October 2009. [61] Tynan, Dan. "As Applications Blossom, Facebook Is Open for Business" (http:/ / www. wired. com/ techbiz/ startups/ news/ 2007/ 07/ facebook_platform) Wired, July 30, 2007. Accessed 26 October 2009. [62] Flor, Nick V. (2000). Web Business Engineering: Using Offline Activities to Drive Internet Strategies. Reading, Mass.: Addison-Wesley. ISBN 0-201-60468-X; Flor, Nick V. "Week 1: The Business Model Approach to Web Site Design" (http:/ / www. informit. com/ articles/ article. aspx?p=20882). InformIT, March 2, 2001. Accessed 26 October 2009. Description of the autonomous business model used in social networking services. [63] "Online Dating: The Relationship Status Update" (http:/ / www. bitrebels. com/ social/ online-dating-the-relationship-status-update-infographic/ ). bitrebels.com. . [64] Locke, Laura. (http:/ / news. cnet. com/ 8301-1023_3-20125633-93/ nextdoor-first-private-social-network-for-neighborhoods/ )"ORB", October 26, 2011. Accessed 24 April 2012. [65] McMillan, Graeme. (http:/ / www. digitaltrends. com/ social-media/ more-americans-read-news-online-than-anywhere-else-new-survey-says/ )"Digital Trends", September 28, 2012. Accessed 29 September 2012. [66] Social network launches worldwide spam campaign (http:/ / www. e-consultancy. com/ news-blog/ 364182/ social-network-launches-worldwide-spam-campaign. html) E-consultancy.com, Accessed 10 September 2007 [67] Moreno MA, Fost NC, Christakis DA (2008). "Research ethics in the MySpace era". Pediatrics 121 (1): 15761. doi:10.1542/peds.2007-3015. PMID18166570. [68] David Rosenblum (2007). "What Anyone Can Know: The Privacy Risks of Social Networking Sites" (http:/ / www. computer. org/ portal/ web/ csdl/ doi/ 10. 1109/ MSP. 2007. 75). . [69] Henry Jenkins and Danah Boyd (2006-05-24). "Discussion: MySpace and Deleting Online Predators Act (DOPA)" (http:/ / www. danah. org/ papers/ MySpaceDOPA. html). . Retrieved 2006-05-26. [70] Susan B. Barnes (2006-09-04). "A privacy paradox: Social networking in the United States" (http:/ / firstmonday. org/ htbin/ cgiwrap/ bin/ ojs/ index. php/ fm/ article/ viewArticle/ 1394/ 1312). . [71] BBC (2009-03-25). "Social Network Sites 'Monitored'" (http:/ / news. bbc. co. uk/ 1/ hi/ uk_politics/ 7962631. stm). BBC News. . Retrieved 2009-03-25. [72] Miller, Andy (2010-09-02). "Mining Social Networks: Untangling the Social Web" (http:/ / www. economist. com/ node/ 16910031). The Economist. . [73] Elkins, Sarah. "A Social Network's Faux Pas?" (http:/ / www. newsweek. com/ 2007/ 11/ 08/ a-social-network-s-faux-pas. html). Newsweek. . [74] "Niet compatibele browser" (http:/ / www. facebook. com/ policy. php?ref=pf). Facebook. . Retrieved 2011-03-13. [75] boyd, danah. "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life" [76] May 22, 2007 12:00AM (2007-05-22). "Fatal MySpace internet hoax mother is charged, Herald Sun, 17 May 2008" (http:/ / www. news. com. au/ heraldsun/ story/ 0,21985,21775032-11869,00. html). News.com.au. . Retrieved 2011-03-13. [77] "Parents: Cyber Bullying Led to Teen's Suicide: Megan Meier's Parents Now Want Measures to Protect Children Online" (http:/ / abcnews. go. com/ GMA/ Story?id=3882520). ABC News. 29 November 2007. . [78] "Banned for keeps on Facebook for odd name, Sydney Morning Herald, 24 September 2008" (http:/ / www. smh. com. au/ news/ biztech/ banned-for-keeps-on-facebook-for-odd-name/ 2008/ 09/ 25/ 1222217399252. html). Smh.com.au. 2008-09-25. . Retrieved 2011-03-13. [79] "Social Networking's Good and Bad Impacts on Kids" (http:/ / www. apa. org/ news/ press/ releases/ 2011/ 08/ social-kids. aspx). American Psychological Association. August 6, 2011. . [80] Enhancing Child Safety and Online Technologies (http:/ / cyber. law. harvard. edu/ pubrelease/ isttf/ ). Internet Safety Technical Task Force, Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States. 2008 (published 31 December 2008). [81] Wilson, Charles (May 27, 2010). Child porn 'social networking site' busted by feds (http:/ / www. washingtonpost. com/ wp-dyn/ content/ article/ 2010/ 05/ 27/ AR2010052700559. html). Associated Press. [82] Mark Tran, (http:/ / www. guardian. co. uk/ world/ 2010/ mar/ 05/ korean-girl-starved-online-game), "The Guardian", March 5, 2010 [83] Computer Science Illuminated [84] Boyd, Danah. "Why Youth (Heart) Social Networking Sites: The Role of Networked Publics in Teenage Social Life" (http:/ / eres. ucsc. edu/ eres/ coursepage. aspx?cid=3840& page=docs#). eres.ucsc.edu. . [85] "A Privacy Paradox" (http:/ / firstmonday. org/ htbin/ cgiwrap/ bin/ ojs/ index. php/ fm/ article/ viewArticle/ 1394/ 1312#note4). . [86] Derbyshire, David (24 February 2009). "Social websites harm children's brains: Chilling warning to parents from top neuroscientist" (http:/ / www. dailymail. co. uk/ news/ article-1153583/ Social-websites-harm-childrens-brains-Chilling-warning-parents-neuroscientist. html). Daily Mail (London). . [87] Turkle, Sherry (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books. p.154. ISBN978-0-465-02234-2. [88] Turkle, Sherry (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books. p.17. ISBN978-0-465-02234-2.
270
Social networking
[89] "CBS "Social Networking: An Internet Addiction?", CBS News, June 24, 2008" (http:/ / www. cbsnews. com/ stories/ 2008/ 06/ 24/ earlyshow/ main4205009. shtml?tag=contentMain;contentBody). cbsnews.com. 2008-06-24. . Retrieved 2011-05-13. [90] "Cornblatt, Johannah, "Lonely Planet", Newsweek, August 21, 2009" (http:/ / www. newsweek. com/ 2009/ 08/ 20/ lonely-planet. html). newsweek.com. 2009-08-29. . Retrieved 2011-05-13. [91] "Magid, Larry, "Is there really 'Facebook depression?'"" (http:/ / news. cnet. com/ 8301-19518_3-20048148-238. html). CNET. 2011-03-29. . Retrieved 2011-10-18. [92] "Mark Nowotarski, "Don't Steal My Avatar! Challenges of Social Network Patents, IP Watchdog, January 23, 2011" (http:/ / ipwatchdog. com/ 2011/ 01/ 23/ dont-steal-my-avatar-challenges-of-social-networking-patents/ id=14531/ ). Ipwatchdog.com. . Retrieved 2011-03-13. [93] "USPTO search on issued patents mentioning "social network"" (http:/ / patft. uspto. gov/ netacgi/ nph-Parser?Sect1=PTO2& Sect2=HITOFF& u=/ netahtml/ PTO/ search-adv. htm& r=0& p=1& f=S& l=50& Query=spec/ "social+ network"& d=PTXT). Patft.uspto.gov. . Retrieved 2011-03-13. [94] "Nowotarski, Mark "Reducing Patent Backlog and Prosecution Costs Using PAIR data", IP Watchdog, August 16, 2010" (http:/ / ipwatchdog. com/ 2010/ 08/ 16/ reducing-patent-backlog-prosecution-costs-using-pair-data/ id=12108/ ). Ipwatchdog.com. . Retrieved 2011-03-13. [95] Added by Mikk Putk on July 30, 2009 at 6:48am View Videos (2009-07-30). "News 12 "On the Money" interview of Mark Nowotarski, July 30, 2009" (http:/ / ipestonia. ning. com/ video/ patents-on-social-media). Ipestonia.ning.com. . Retrieved 2011-03-13. [96] "USPTO Lets Amazon Patent the Social Networking System" (http:/ / yro. slashdot. org/ story/ 10/ 06/ 16/ 2233230/ USPTO-Lets-Amazon-Patent-the-Social-Networking-System?from=twitter). yro.slashdot.org. 2010-06-16. . Retrieved 2011-03-13. [97] Gold, Kimberly. "Amazon Secures Patent For Social Networking System" (http:/ / blogs. forbes. com/ docket/ 2010/ 06/ 17/ amazon-secures-patent-for-social-networking-system/ ). Forbes. . [98] US Patent and Trademark Office (http:/ / patft. uspto. gov/ netacgi/ nph-Parser?Sect1=PTO1& Sect2=HITOFF& d=PALL& p=1& u=/ netahtml/ PTO/ srchnum. htm& r=1& f=G& l=50& s1=7,739,139. PN. & OS=PN/ 7,739,139& RS=PN/ 7,739,139) Patent number 7,739,139 [99] "Network World" (http:/ / www. networkworld. com/ news/ 2010/ 061710-amazon-social-network-patent. html). Network World. . Retrieved 2011-03-13. [100] "Facebook policies tricky for employers, workers" (http:/ / www. japantoday. com/ category/ technology/ view/ facebook-policies-tricky-for-employers-workers). japantoday.com. Japan Today. . Retrieved 28 September 2011. [101] D. R. Sandler and D. S. Wallach (April 2009). "Birds of a FETHR: Open, decentralized micropublishing" (http:/ / www. iptps. org/ papers-2009/ sandler. pdf) (PDF). Proc. of the 8th International Workshop on Peer-to-Peer Systems (IPTPS09). . [102] Michal Kryczka, Ruben Cuevas, Carmen Guerrero, Eiko Yoneki, Arturo Azcorra (April 2010). "A first step towards user assisted online social networks". Proc. of the 3rd Workshop on Social Network Systems (SNS'10). [103] Tianyin Xu, Yang Chen, Lei Jiao, Ben Y. Zhao, Pan Hui, and Xiaoming Fu (December 2011). "Scaling Microblogging Services with Divergent Traffic Demands" (http:/ / cseweb. ucsd. edu/ ~tixu/ papers/ middleware11. pdf) (PDF). Proc. of the ACM/IFIP/USENIX 12th International Middleware Conference (Middleware'11). . [104] "MySpace exposes sex predators" (http:/ / www. news. com. au/ heraldsun/ story/ 0,21985,,00. html), use of its content in the courtroom: Herald and Weekly Times (Australia) website. Retrieved on January 19, 2008. [105] "Getting booked by Facebook" (http:/ / www. jsonline. com/ story/ index. aspx?id=670380), courtesy of campus police: Milwaukee Journal Sentinel website. Retrieved on January 19, 2008. [106] "Police use Facebook to identify weapon carriers" (http:/ / www. journal-online. co. uk/ article/ 5410-police-use-facebook-to-identify-weapon-carriers) The Journal (Edinburgh) website. Retrieved on May 11, 2009 [107] "Government Agencies Establishing Presence on Social-Networking Sites" (http:/ / www. itbusinessedge. com/ topics/ reader. aspx?oss=37848). Itbusinessedge.com. . Retrieved 2011-03-13. [108] "OSTP Press Release Announcing Review (pdf, 50k)" (http:/ / www. nasa. gov/ pdf/ 358006main_OSTP Press Release. pdf) (PDF). . Retrieved 2011-03-13. [109] http:/ / Youngblackprofessionals. org [110] "Latest LinkedIn Facts" (http:/ / press. linkedin. com/ about). Press.linkedin.com. . Retrieved 2011-03-13. [111] "Terms of Joining YoungBlackProfessionals.org" (http:/ / www. youngblackprofessionals. org/ index. php?page=terms). . Retrieved 2011-12-14. [112] MySpace, Facebook Add Opportunity for Love, Trouble to Online Dating (http:/ / www. foxnews. com/ story/ 0,2933,396461,00. html), FoxNews.com website. [113] MySpace Adds a Security Monitor (http:/ / www. npr. org/ templates/ story/ story. php?storyId=5336688), NPR.com website. [114] Online Dating: Can Social Networks Cut In? (http:/ / www. internetnews. com/ ec-news/ article. php/ 3659911), internetnews.com website. [115] "Online Dating vs. Social Networking Which Will Emerge as Premier Matchmaker?" (http:/ / localtechwire. com/ business/ local_tech_wire/ opinion/ story/ 2449164/ ). localtechwire.com. . [116] Social networks vs. dating sites Commentary: Fragmenting may save online dating sites (http:/ / www. marketwatch. com/ news/ story/ story. aspx?guid={4640E6FF-17B8-40D5-901C-098EE74B03DD}), marketwatch.com website. [117] Seeking Love Around The Web (http:/ / www. forbes. com/ 2007/ 12/ 20/ online-dating-love-tech-personal-cx_wt_1221dating. html), Forbes.com website. [118] learncentral.org [119] Wall street journal blog article about Ven (http:/ / blogs. wsj. com/ economics/ 2009/ 09/ 09/ the-currency-revolution/ )
271
Social networking
[120] finextra.com (http:/ / www. finextra. com/ news/ fullstory. aspx?newsitemid=22475) [121] blog.americancarbonregistry.org (http:/ / blog. americancarbonregistry. org/ redd/ american-carbon-registry-offsets-retired-ven-carbon-transaction/ ) [122] hubculture.com (http:/ / www. hubculture. com/ groups/ 237/ news/ 486/ ) [123] "Social Networking: Now Professionally Ready" (http:/ / www. primarypsychiatry. com/ aspx/ articledetail. aspx?articleid=975). primarypsychiatry.com. . [124] Comprehensive listing of medical applications using social networking (http:/ / www. doseofdigital. com/ healthcare-pharma-social-media-wiki/ ) via Dose of Digital [125] "Auer, Matthew R. "The Policy Sciences of Social Media". Policy Studies Journal '''39''' (4): 709736" (http:/ / papers. ssrn. com/ sol3/ papers. cfm?abstract_id=1974080). Papers.ssrn.com. . Retrieved 24 April 2012. [126] Sutter, John D. (21 Feb 2011). "The faces of Egypt's 'Revolution 2.0'" (http:/ / www. cnn. com/ 2011/ TECH/ innovation/ 02/ 21/ egypt. internet. revolution/ index. html). CNN.com. . Retrieved 13 May 2011. [127] Anahita Project. "The Anahita Social Networking Engine" (http:/ / www. anahitapolis. com). anahitapolis.com. . Retrieved 2011-01-18. [128] The Appleseed Project. "The Appleseed Project - Open Source Social Networking" (http:/ / opensource. appleseedproject. org). Opensource.appleseedproject.org. . Retrieved 2011-03-13. [129] "Creating a free, open, and decentralized social networking platform" (http:/ / onesocialweb. org/ ). OneSocialWeb. . Retrieved 2011-03-13. [130] "ComScore: Google+ Grows Worldwide Users From 65 Million In October To 67 Million In November" (http:/ / techcrunch. com/ 2011/ 12/ 22/ googlesplus/ ?utm_source=feedburner& utm_medium=feed& utm_campaign=Feed:+ Techcrunch+ (TechCrunch)). December 22, 2011. . [131] Its a Social World: Social Networking Leads as Top Online Activity Globally, Accounting for 1 in Every 5 Online Minutes (http:/ / www. comscore. com/ Press_Events/ Press_Releases/ 2011/ 12/ Social_Networking_Leads_as_Top_Online_Activity_Globally), ComScore [132] [133] [134] [135] [136] [137] [138] http:/ / jcmc. indiana. edu/ vol13/ issue1/ boyd. ellison. html http:/ / www. firstmonday. org/ issues/ issue11_12/ boyd/ index. html http:/ / jcmc. indiana. edu/ vol12/ issue4/ ellison. html http:/ / books. google. com/ ?id=SP92NwAACAAJ http:/ / www. informaworld. com/ smpp/ ftinterface~content=a769651179~fulltext=713240930 http:/ / www. marcprensky. com/ writing/ Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1. pdf http:/ / firstmonday. org/
272
Further reading
Alemn, Ana M. Martnez; Wartman, Katherine Lynk, "Online social networking on campus: understanding what matters in student culture" (http://books.google.com/books?id=GH4KOM3MS-sC&printsec=frontcover), New York and London : Routledge, 1st edition, 2009. ISBN 0-415-99019-X Barham, Nick, Disconnected: Why our kids are turning their backs on everything we thought we knew, 1st ed., Ebury Press, 2004. ISBN 0-09-189586-3 Baron, Naomi S., Always on : language in an online and mobile world (http://books.google.com/ books?id=X8-gaJM6NUIC&printsec=frontcover), Oxford ; New York : Oxford University Press, 2008. ISBN 978-0-19-531305-5 Cockrell, Cathy, "Plumbing the mysterious practices of 'digital youth': In first public report from a 'seminal' study, UC Berkeley scholars shed light on kids' use of Web 2.0 tools" (http://www.berkeley.edu/news/media/ releases/2008/04/28_digitalyouth.shtml), UC Berkeley News, University of California, Berkeley, NewsCenter, 28 April 2008 Kelsey, Todd (2010), Social Networking Spaces: From Facebook to Twitter and Everything In Between (http:// books.google.ca/books?id=1EgTu8fFMJgC&lpg=PP1&ots=HUuksBAE9m&dq=Social Networking Spaces: From Facebook to Twitter and Everything In Between&pg=PP1#v=onepage&q&f=true), Springer-Verlag, ISBN978-1-4302-2596-6 Davis, Donald Carrington, "MySpace Isn't Your Space: Expanding the Fair Credit Reporting Act to Ensure Accountability and Fairness in Employer Searches of Online Social Networking Services" (http://www.law.ku. edu/publications/journal/pdf/v16n2/davis.pdf), 16 Kan. J.L. & Pub. Pol'y 237 (2007). Else, Liz; Turkle, Sherry. "Living online: I'll have to ask my friends" (http://web.mit.edu/sturkle/www/ pdfsforstwebpage/ST_Living Online.pdf), New Scientist, issue 2569, 20 September 2006. (interview)
Social networking Glaser, Mark, Your Guide to Social Networking Online (http://www.pbs.org/mediashift/2007/08/ digging_deeperyour_guide_to_so_1.html)," PBS MediaShift, August 2007 Powers, William, Hamlets Blackberry : a practical philosophy for building a good life in the digital age, 1st ed., New York : Harper, 2010. ISBN 978-0-06-168716-7 Video on the History of social networks by WikiLecture (http://wikilecture.org/Social_network_service) C. Infant Louis Richards , "Advanced Techniques to overcome privacy issues and SNS threats" (http:// rspublication.com/ijam/oct 11pdf/1.pdf) October, 2011
273
Remote access
Remote access may refer to: Connection to a data-processing system from a remote location, for example through a virtual private network Remote desktop software, refers to a software or an OS feature allowing applications to be run remotely on a server while being graphically displayed locally Terminal emulation - when used to interface with a remote system. May use standard tools like: Telnet, software used to remotely control a computer system ssh, secure shell often used with remote applications Activation of features of a business telephone system from outside the business's premises RemoteAccess, a DOS-based bulletin board system Remote Database Access, a protocol standard for database access
Collaborative software
Collaborative software or groupware is computer software designed to help people involved in a common task achieve goals. One of the earliest definitions of collaborative software is 'intentional group processes plus software to support them.'[1] The design intent of collaborative software is to transform the way documents and rich media are shared to enable more effective team collaboration. Collaboration, with respect to information technology, seems to have several definitions. Some are defensible but others are so broad they lose meaningful application. Understanding the differences in human interactions is necessary to ensure that appropriate technologies are employed to meet interaction needs. Collaboration requires individuals working together in a coordinated fashion, towards a common goal. Accomplishing the goal is the primary purpose for bringing the team together. Collaborative software helps facilitate action-oriented teams working together over geographic distances by providing tools that aid communication, collaboration and the process of problem solving. Additionally, collaborative software may support project management functions, such as task assignments, time-managing deadlines, and shared calendars. The artefacts, the tangible evidence of the problem solving process, and the final outcome of the collaborative effort, require documentation and may involve archiving project plans, deadlines and deliverables.
Collaborative software
274
Overview
Collaborative software is a broad concept that greatly overlaps with Computer-supported cooperative work (CSCW). Some authors argue they are equivalent. According to Carstensen and Schmidt (1999)[2] groupware is part of CSCW. The authors claim that CSCW, and thereby groupware addresses "how collaborative activities and their coordination can be supported by means of computer systems". Software products such as email, calendaring, text chat, wiki, and bookmarking belong to this category, whenever used for group work, whereas the more general term social software applies to systems used outside the workplace, for example, online dating services and social networking sites like Friendster, Twitter and Facebook. It has been suggested that Metcalfe's law the more people who use something, the more valuable it becomes applies to these types of software. The use of collaborative software in the workspace creates a collaborative working environment (CWE). A collaborative working environment supports people in both their individual and cooperative work thus giving birth to a new class of professionals, e-professionals, who can work together irrespective of their geographical location. Finally collaborative software relates to the notion of collaborative work systems which are conceived as any form of human organization that emerges any time that collaboration takes place, whether it is formal or informal, intentional or unintentional.[3] Whereas the groupware or collaborative software pertains to the technological elements of computer supported cooperative work, collaborative work systems become a useful analytical tool to understand the behavioral and organizational variables that are associated to the broader concept of CSCW.[4]
Origins
Doug Engelbart first envisioned collaborative computing in 1951 Doug Engelbart - Father of Groupware [5], documented his vision in 1962,[6] with working prototypes in full operational use by his research team by the mid 1960s,[7] and held the first public demonstration of his work in 1968 in what is now referred to as "The Mother of All Demos."[8] The following year, Engelbart's lab was hooked into the ARPANET, the first computer network, enabling them to extend services to a broader userbase. See also Intelligence Amplification Section 4: Douglas Engelbart, ARPANET Section on ARPANET Deployed, and the Doug Engelbart Archive Collection [9]. Online collaborative gaming software began between early networked computer users. In 1975 by Will Crowther created Colossal Cave Adventure on a DEC PDP-10 computer. As internet connections grew, so did the numbers of users and multi-user games. In 1978 Roy Trubshaw, a student at Essex University in the UK, created the game MUD (Multi-User Dungeon). A number of other MUDs were created, but remained a computer science novelty until the late 1980s, when personal computers with dial-up modems began to be more common in homes, largely through the use of multi-line Bulletin Board Systems and online service providers. Parallel to development of MUDs were applications for online chat, video sharing and voice over IP. These would be essential for further development. Studies at MITRE showed the value of voice and text chat, and sharing pictures for shared understanding. The US Government began using truly collaborative applications in the early 1990s.[10] One of the first robust applications was the Navy's Common Operational Modeling, Planning and Simulation Strategy (COMPASS).[11] The COMPASS system allowed up to 6 users created point-to-point connections with one another; the collaborative session only remained while at least one user stayed active, and would have to be recreated if all six logged out. MITRE improved on that model by hosting the collaborative session on a server that each user logged into. Called the Collaborative Virtual Workstation (CVW), this allowed the session to be set up in a virtual file cabinet and virtual rooms, and left as a persistent session that could be joined later.[12] In 1996, Pavel Curtis, who had built MUDs at PARC, created PlaceWare, a server that simulated a one-to-many auditorium, with side chat between "seat-mates", and the ability to invite a limited number of audience members to speak. In 1997, engineers at GTE used the PlaceWare engine in a commercial version of MITRE's CVW, calling it InfoWorkSpace (IWS). In 1998, IWS was chosen as the military standard for the standardized Air Operations Center.[13] The IWS product was sold to General Dynamics and then later to Ezenia.[14]
Collaborative software
275
Philosophical underpinnings
Technology has long been used to bring people together. However, as distance increases, rules and protocols need to be implemented. One seminal book on the process of working together from a distance is Virtual Teams by Jessica Lipnack and Jeffrey Stamps.[15]
Groupware
Collaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987)[16] wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work." Even further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, intentional group processes plus software to support them. Later in their article they went on to explain groupware as computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.[1] In the early 1990s the first groupware commercial products began delivering up to their promises, and big companies such as Boeing and IBM started using electronic meeting systems to leverage key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the Internet was still in its infancy. Kirkpatrick and Losee (1992)[17] wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." As collaborative software evolves and migrates into the Internet itself, it contributes to the development of the so-called Web 2.0 bringing a host of collaborative features that were originally conceived for within the corporate network. These include functionalities such as document sharing (including group editing), group calendar and instant messaging, web conferencing, among others.
Collaborative software
276
revision control
Collaborative software
277
Wikis Either stand-alone (such as MediaWiki), part of a suite (such as TikiWiki) or web-based such as Wetpaint. A Wiki might include: workflow management blogs image and file galleries chat
278
Collaborative software history. An emerging category of computer software, a collaboration platform is a unified electronic platform that supports synchronous and asynchronous communication through a variety of devices and channels. An extension of groupware is collaborative media, software that allows several concurrent users to create and manage information in a website. Collaborative media models include wiki (Comparison of wiki software) and Slashdot models. Some sites with publicly accessible content based on collaborative software are: WikiWikiWeb, Wikipedia and Everything2. By method used we can divide them into: Web-based collaborative tools Software collaborative tools Along with these, already traditional, methods recent expansion of corporate use of Second Life and other virtual worlds led to development of a newer generation of software that takes advantage of a 3D data presentation. Some of this software (3D Topicscape) works independently from virtual worlds and simply uses 3D to support user "in concept creation, planning, organization, development and actualization". Other [26] designed specifically to assist in collaboration when using virtual worlds as a business platform, while yet another type of software, Collaborative Knowledge Management (cKM) [27], bridges the gap and can be used simultaneously in Second Life and on the web. By area served we can divide collaborative software into: Knowledge management tools Knowledge creation tools Information sharing tools Collaborative project management tools
279
Background
During the mid-1990s project management started to evolve into collaborative project management; this was when the process in which a project's inputs and outputs were carried out started to change with the evolution of the internet. Since the geographical boundaries broadened the development teams increasingly became more remote changing the dynamics of a project team thus changing the way a project was managed. Former chairman of General Electric, Jack Welch, believed that you could not be successful if you went it alone in a global economy. Therefore Welch became a driving force behind not only collaboration between organizations, but also collaborative project management.
Classification
Collaborative project management tools (CPMT) Collaborative management tools (CMT)
Collaborative software
280
CPMT facilitate and manage social or group project based activities. In addition to most CPMT examples, CMT also includes: Examples include: Electronic calendars Project management systems Resource Management Workflow systems Knowledge management Prediction markets Extranet systems Social software Online spreadsheets Online artwork proofing, feedback, review and approval tool HR and equipment management Time and cost management Online chat Instant messaging Telephony Videoconferencing Web conferencing Data conferencing Application sharing Electronic meeting systems (EMS) Synchronous conferencing E-mail Faxing voice mail Wikis Web publishing Revision control Charting Document versioning Document retention Document sharing Document repository Evaluation and survey
Dimensions
Different frameworks could be established based on a project needs and requirements in order to find the best software. But the best framework is the one in which the characteristics are so well defined that they cover all the aspects of collaboration activities and management of the overall project. The challenge in determining which CPM software to use is having a good understanding of the requirements and tools needed for project development. There are many dynamics that make project management challenging (coordination, collaboration, sharing of knowledge and effectiveness of pm's to facilitate the process). Choosing the right CPM software is essential to complementing these issues. According to a survey conducted in 2008 to find out what project managers' expectations and uses of project management software are, the features most important to project managers with project management software were:
Dimensions diagram
Ability to plan using and sequence activities using CPM/PDM/PERT or Gantt Chart method, Produce project master schedules based on project/task/work breakdown structures, with subordinate details, Critical path calculation.
Collaborative software
281
Descriptions / Examples
System Requirements
Platform: The operating system that the system can perform on (example Windows, Mac, Linux). Platform type single and multiple. Hardware: physical requirements such as hard drive space and amount of memory. Installation/access: How and where the software is installed. Types of installations stand alone, server based, web portal. Email 24/7 or restricted schedules Online or web help Built-in Help i.e. MS Office On location assistance Training on-site/off-site Group Size: The number of users that software supports Email list Revision Control Charting Document versioning Document retention Document sharing Document repository
Collaboration Requirements
Collaborative software
282
References
[1] Johnson-Lenz, Peter. "Rhythms, Boundaries, and Containers:" (http:/ / nexus. awakentech. com:8080/ at/ awaken1. nsf/ UNIDs/ CFB70C1957A686E98825654000699E1B?OpenDocument). Awakening Technology. . Retrieved 30 April 1990. [2] Carstensen, P.H.; Schmidt, K. (1999). Computer supported cooperative work: new challenges to systems design. http:/ / citeseer. ist. psu. edu/ carstensen99computer. html. Retrieved 2007-08-03 [3] Beyerlein, M; Freedman, S.; McGee, G.; Moran, L. (2002). Beyond Teams: Building the Collaborative Organization. The Collaborative Work Systems series, Wiley. [4] Wilson, P. (1991). Computer Supported Cooperative Work: An Introduction. Kluwer Academic Pub. [5] http:/ / www. dougengelbart. org/ firsts/ groupware. html [6] Augmenting Human Intellect: A Conceptual Framework (http:/ / www. dougengelbart. org/ pubs/ augment-3906. html), Douglas C. Engelbart, 1962] [7] A Research Center for Augmenting Human Intellect (http:/ / www. dougengelbart. org/ pubs/ augment-3954. html), Douglas C. Engelbart and William K. English, 1968. [8] 1968 Demo Overview and Links to Video (http:/ / www. dougengelbart. org/ firsts/ dougs-1968-demo. html) [9] http:/ / dougengelbart. org [10] http:/ / portal. acm. org/ citation. cfm?id=99362& dl=GUIDE& coll=GUIDE& CFID=107391064& CFTOKEN=53017578 [11] https:/ / www. cwid. js. mil/ public/ CWIDFctShtSuccesses21Mar08. doc [12] http:/ / www. inf. unisinos. br/ ~cazella/ dss/ aula7/ p51-maybury. pdf [13] http:/ / www. ezenia. com/ news/ infoworkspace-saves-lives-in-iraq/ [14] http:/ / www. ezenia. com/ products/ products-infoworkspace/ [15] http:/ / www. netage. com/ virtualteams/ index. html [16] Richman, Louis, S; Slovak, Julianne; (1987, June 8) SOFTWARE CATCHES THE TEAM SPIRIT New computer programs may soon change the way groups of people work together -- and start delivering the long-awaited payoff from office automation.fouttounehttp://money.cnn.com/magazines/fortune/fortune_archive/1987/06/08/69109/index.htm [17] Kirkpatrick, D.; Losee, S. (1992, March 23) HERE COMES THE PAYOFF FROM PCs New network software lets brainstormers around a table all talk at once on their keyboards. The result: measurable productivity gains from desktop computing. http:/ / money. cnn. com/ magazines/ fortune/ fortune_archive/ 1992/ 03/ 23/ 76204/ index. htm [18] http:/ / www. cscw2012. org/ [19] http:/ / www. cscw2010. org/ [20] http:/ / www. mitre. org/ news/ the_edge/ june_98/ transfer. html [21] http:/ / www. mitre. org/ news/ the_edge/ june_98/ second. html [22] Clarence A. Ellis, Simon J. Gibbs, and Gail Rein. 1991. Groupware: some issues and experiences. Commun. ACM 34, 1 (January 1991), 39-58. DOI=10.1145/99977.99987 http:/ / doi. acm. org/ 10. 1145/ 99977. 99987 [23] Till Schmmer and Stephan Lukosch. 2007. Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series). John Wiley & Sons. [24] "Groupware - Communication, Collaboration and Coordination" (http:/ / www. intranetjournal. com/ faq/ lotusbible. html). Lotus Development Corporation. 1995. . [25] Collaboration Made Easy (http:/ / www. pinnadyne. com/ index. php?option=com_content& view=article& id=74& Itemid=80) [26] http:/ / www. theseventhsun. com/ 1107_mindMap. htm [27] http:/ / www. ahg. com/ Second_Life/ knowledge_management/ Enterprise_Knowledge_Management_and_Collaboration_Solution. htm [28] Software negotiation tool (http:/ / www. negotiationtool. com)
Lockwood, A. (2008). The Project Manager's Perspective on Project Management Software Packages. Avignon, France. (http://www.pmi.org/PDF/Lockwood - PMI Survey Report.pdf) Retrieved February 24, 2009. Pedersen, A.A. (2008). Collaborative Project Management. (http://www.databasedesign-resource.com/ collaborative-project-management.html) Retrieved February 25, 2009. Pinnadyne, Collaboration Made Easy. (http://www.pinnadyne.com/index.php?option=com_content& view=article&id=74&Itemid=80) Retrieved November 15, 2009. Romano, N.C., Jr., Nunamaker, J.F., Jr., Fang, C., & Briggs, R.O. (2003). A Collaborative Project Management Architecture.[abstract] Retrieved February 25, 2009. System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on Volume, Issue, 6-9 Jan. 2003 Page(s): 12 pp From http://ieeexplore.ieee. org/Xplore/defdeny.jsp?url=/stamp/stamp.jsp?tp=x&tp=x&arnumber=1173655&isnumber=26341& code=21&code=21# M.Katerine (kit) Brown, Brenda Huetture, and Char James-Tanny (2007), Managing Virtual Teams, Worldware Publishing, Plano.
Collaborative software
283
External links
Information and Collaboration Technologies (see Chapter 5): Managing Collective Intelligence, Toward a New Corporate Governance (http://www.axiopole.com/pdf/Managing_collective_intelligence.pdf) Electronic Information Exchange System (EIES) Legacy (http://eies.net/wiki/index.php/EIES Legacy)
Internet phone
Voice over IP (VoIP, or voice over Internet Protocol) commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone. Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the Internet, rather than the public switched telephone network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the original voice stream.[1] Even though IP telephony and VoIP are used interchangeably, IP telephony refers to all use of IP protocols for voice communication by digital telephony systems, while VoIP is one technology used by IP telephony to transport phone calls.[2] Early providers of voice over IP services offered business models (and technical solutions) that mirrored the architecture of the legacy telephone network. Second generation providers, such as Skype have built closed networks for private user bases, offering the benefit of free calls and convenience, while denying their users the ability to call out to other networks. This has severely limited the ability of users to mix-and-match third-party hardware and software. Third generation providers, such as Google Talk have adopted[3] the concept of Federated VoIP which is a complete departure from the architecture of the legacy networks. These solutions typically allow arbitrary and dynamic interconnection between any two domains on the Internet whenever a user wishes to place a call. VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The choice of codec varies between different implementations of VoIP depending on application requirements and network bandwidth; some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs. Some popular codecs include u-law and a-law versions of G.711, G.722 which is a high-fidelity codec marketed as HD Voice by Polycom, a popular open source voice codec known as iLBC, a codec that only uses 8kbit/s each way called G.729, and many others. VoIP is available on many smartphones and Internet devices so that users of portable devices that are not phones, may place calls or send SMS text messages over 3G or Wi-Fi.[4]
Internet phone
284
Protocols
Voice over IP has been implemented in various ways using both proprietary and open protocols and standards. Examples of the network protocols used to implement VoIP include: H.323 Media Gateway Control Protocol (MGCP) Session Initiation Protocol (SIP) Real-time Transport Protocol (RTP) Session Description Protocol (SDP) Inter-Asterisk eXchange (IAX) Jingle XMPP VoIP extensions
The H.323 protocol was one of the first VoIP protocols that found widespread implementation for long-distance traffic, as well as local area network services. However, since the development of newer, less complex protocols such as MGCP and SIP, H.323 deployments are increasingly limited to carrying existing long-haul network traffic. In particular, the Session Initiation Protocol (SIP) has gained widespread VoIP market penetration. A notable proprietary implementation is the Skype protocol, which is in part based on the principles of peer-to-peer (P2P) networking.
Adoption
Consumer market
A major development that started in 2004 was the introduction of mass-market VoIP services that utilize existing broadband Internet access, by which subscribers place and receive telephone calls in much the same manner as they would via the public switched telephone network (PSTN). Full-service VoIP phone companies provide inbound and outbound service with Direct Inbound Dialing. Many offer unlimited domestic calling for a flat monthly subscription fee. This sometimes includes international calls to certain countries. Phone calls between subscribers of the same provider are usually free when flat-fee service is not available A VoIP phone is necessary to connect to a VoIP service provider. This can be implemented in several ways: Dedicated VoIP phones connect directly to the IP network using technologies such as wired Ethernet or wireless Wi-Fi. They are typically designed in the style of traditional digital business telephones.
Example of residential network including VoIP
An analog telephone adapter is a device that connects to the network and implements the electronics and firmware to operate a conventional analog telephone attached through a modular phone jack. Some residential Internet gateways and cablemodems have this function built in. A softphone is application software installed on a networked computer that is equipped with a microphone and speaker, or headset. The application typically presents a dial pad and display field to the user to operate the application by mouse clicks or keyboard input.
Internet phone
285
Corporate use
Because of the bandwidth efficiency and low costs that VoIP technology can provide, businesses are migrating from traditional copper-wire telephone systems to VoIP systems to reduce their monthly phone costs. In 2008, 80% of all new PBX lines installed internationally were VoIP.[7] VoIP solutions aimed at businesses have evolved into unified communications services that treat all communicationsphone calls, faxes, voice mail, e-mail, Web conferences and moreas discrete units that can all be delivered via any means and to any handset, including cellphones. Two kinds of competitors are competing in this space: one set is focused on VoIP for medium to large enterprises, while another is targeting the small-to-medium business (SMB) market.[8] VoIP allows both voice and data communications to be run over a single network, which can significantly reduce infrastructure costs.[9] The prices of extensions on VoIP are lower than for PBX and key systems. VoIP switches may run on commodity hardware, such as PCs or Linux systems. Rather than closed architectures, these devices rely on standard interfaces.[9] VoIP devices have simple, intuitive user interfaces, so users can often make simple system configuration changes. Dual-mode phones enable users to continue their conversations as they move between an outside cellular service and an internal Wi-Fi network, so that it is no longer necessary to carry both a desktop phone and a cellphone. Maintenance becomes simpler as there are fewer devices to oversee.[9] Skype, which originally marketed itself as a service among friends, has begun to cater to businesses, providing free-of-charge connections between any users on the Skype network and connecting to and from ordinary PSTN telephones for a charge.[10] In the United States the Social Security Administration (SSA) is converting its field offices of 63,000 workers from traditional phone installations to a VoIP infrastructure carried over its existing data network.[11][12]
Advantages
There are several advantages to using voice over IP. The biggest single advantage VoIP has over standard telephone systems is cost. In addition, international calls using VoIP are usually very inexpensive. One other advantage, which will become much more pronounced as VoIP use climbs, is that calls between VoIP users are usually free. Using services such as TrueVoIP, subscribers can call one another at no cost to either party.[13]
Operational cost
VoIP can be a benefit for reducing communication and infrastructure costs. Examples include: Routing phone calls over existing data networks to avoid the need for separate voice and data networks.[14] The ability to transmit more than one telephone call over a single broadband connection. Secure calls using standardized protocols (such as Secure Real-time Transport Protocol). Most of the difficulties of creating a secure telephone connection over traditional phone lines, such as digitizing and digital transmission, are already in place with VoIP. It is only necessary to encrypt and authenticate the existing data stream.
Internet phone
286
Challenges
Quality of service
Communication on the IP network is inherently less reliable in contrast to the circuit-switched public telephone network, as it does not provide a network-based mechanism to ensure that data packets are not lost, and are delivered in sequential order. It is a best-effort network without fundamental Quality of Service (QoS) guarantees. Therefore, VoIP implementations may face problems mitigating latency and jitter.[15][16] By default, network routers handle traffic on a first-come, first-served basis. Network routers on high volume traffic links may introduce latency that exceeds permissible thresholds for VoIP. Fixed delays cannot be controlled, as they are caused by the physical distance the packets travel; however, latency can be minimized by marking voice packets as being delay-sensitive with methods such as DiffServ.[15] A VoIP packet usually has to wait for the current packet to finish transmission. Although it is possible to preempt (abort) a less important packet in mid-transmission, this is not commonly done, especially on high-speed links where transmission times are short even for maximum-sized packets.[17] An alternative to preemption on slower links, such as dialup and digital subscriber line (DSL), is to reduce the maximum transmission time by reducing the maximum transmission unit. But every packet must contain protocol headers, so this increases relative header overhead on every link traversed, not just the bottleneck (usually Internet access) link.[17] DSL modems provide Ethernet (or Ethernet over USB) connections to local equipment, but inside they are actually Asynchronous Transfer Mode (ATM) modems. They use ATM Adaptation Layer 5 (AAL5) to segment each Ethernet packet into a series of 53-byte ATM cells for transmission and reassemble them back into Ethernet packets at the receiver. A virtual circuit identifier (VCI) is part of the 5-byte header on every ATM cell, so the transmitter can multiplex the active virtual circuits (VCs) in any arbitrary order. Cells from the same VC are always sent sequentially. However, the great majority of DSL providers use only one VC for each customer, even those with bundled VoIP service. Every Ethernet packet must be completely transmitted before another can begin. If a second VC were established, given high priority and reserved for VoIP, then a low priority data packet could be suspended in mid-transmission and a VoIP packet sent right away on the high priority VC. Then the link would pick up the low priority VC where it left off. Because ATM links are multiplexed on a cell-by-cell basis, a high priority packet would have to wait at most 53 byte times to begin transmission. There would be no need to reduce the interface MTU and accept the resulting increase in higher layer protocol overhead, and no need to abort a low priority packet and resend it later. ATM has substantial header overhead: 5/53 = 9.4%, roughly twice the total header overhead of a 1500 byte Ethernet packet. This "ATM tax" is incurred by every DSL user whether or not he takes advantage of multiple virtual circuits-and few can.[15] ATM's potential for latency reduction is greatest on slow links, because worst-case latency decreases with increasing link speed. A full-size (1500 byte) Ethernet frame takes 94ms to transmit at 128kbit/s but only 8ms at 1.5Mbit/s. If this is the bottleneck link, this latency is probably small enough to ensure good VoIP performance without MTU reductions or multiple ATM VCs. The latest generations of DSL, VDSL and VDSL2, carry Ethernet without intermediate ATM/AAL5 layers, and they generally support IEEE 802.1p priority tagging so that VoIP can be queued ahead of less time-critical traffic.[15] Voice, and all other data, travels in packets over IP networks with fixed maximum capacity. This system may be more prone to congestion and DoS attacks[18] than traditional circuit switched systems; a circuit switched system of insufficient capacity will refuse new connections while carrying the remainder without impairment, while the quality of real-time data such as telephone conversations on packet-switched networks degrades dramatically.[15]
Internet phone Fixed delays cannot be controlled as they are caused by the physical distance the packets travel. They are especially problematic when satellite circuits are involved because of the long distance to a geostationary satellite and back; delays of 400600ms are typical. When the load on a link grows so quickly that its switches experience queue overflows, congestion results and data packets are lost. This signals a transport protocol like TCP to reduce its transmission rate to alleviate the congestion. But VoIP usually uses UDP not TCP because recovering from congestion through retransmission usually entails too much latency.[15] So QoS mechanisms can avoid the undesirable loss of VoIP packets by immediately transmitting them ahead of any queued bulk traffic on the same link, even when that bulk traffic queue is overflowing. The receiver must resequence IP packets that arrive out of order and recover gracefully when packets arrive too late or not at all. Jitter results from the rapid and random (i.e., unpredictable) changes in queue lengths along a given Internet path due to competition from other users for the same transmission links. VoIP receivers counter jitter by storing incoming packets briefly in a "de-jitter" or "playout" buffer, deliberately increasing latency to improve the chance that each packet will be on hand when it is time for the voice engine to play it. The added delay is thus a compromise between excessive latency and excessive dropout, i.e., momentary audio interruptions. Although jitter is a random variable, it is the sum of several other random variables that are at least somewhat independent: the individual queuing delays of the routers along the Internet path in question. Thus according to the central limit theorem, we can model jitter as a gaussian random variable. This suggests continually estimating the mean delay and its standard deviation and setting the playout delay so that only packets delayed more than several standard deviations above the mean will arrive too late to be useful. In practice, however, the variance in latency of many Internet paths is dominated by a small number (often one) of relatively slow and congested "bottleneck" links. Most Internet backbone links are now so fast (e.g. 10Gbit/s) that their delays are dominated by the transmission medium (e.g., optical fiber) and the routers driving them do not have enough buffering for queuing delays to be significant. It has been suggested to rely on the packetized nature of media in VoIP communications and transmit the stream of packets from the source phone to the destination phone simultaneously across different routes (multi-path routing).[19] In such a way, temporary failures have less impact on the communication quality. In capillary routing it has been suggested to use at the packet level Fountain codes or particularly raptor codes for transmitting extra redundant packets making the communication more reliable. A number of protocols have been defined to support the reporting of quality of service (QoS) and quality of experience (QoE) for VoIP calls. These include RTCP Extended Report (RFC 3611), SIP RTCP Summary Reports, H.460.9 Annex B (for H.323), H.248.30 and MGCP extensions. The RFC3611 VoIP Metrics block is generated by an IP phone or gateway during a live call and contains information on packet loss rate, packet discard rate (because of jitter), packet loss/discard burst metrics (burst length/density, gap length/density), network delay, end system delay, signal / noise / echo level, Mean Opinion Scores (MOS) and R factors and configuration information related to the jitter buffer. RFC3611 VoIP metrics reports are exchanged between IP endpoints on an occasional basis during a call, and an end of call message sent via SIP RTCP Summary Report or one of the other signaling protocol extensions. RFC3611 VoIP metrics reports are intended to support real time feedback related to QoS problems, the exchange of information between the endpoints for improved call quality calculation and a variety of other applications.
287
Internet phone Layer-2 quality of service A number of protocols that deal with the data link layer and physical layer include quality-of-service mechanisms that can be used to ensure that applications like VoIP work well even in congested scenarios. Some examples include: IEEE 802.11e is an approved amendment to the IEEE 802.11 standard that defines a set of quality-of-service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as voice over wireless IP. IEEE 802.1p defines 8 different classes of service (including one dedicated to voice) for traffic on layer-2 wired Ethernet. The ITU-T G.hn standard, which provides a way to create a high-speed (up to 1 gigabit per second) Local area network using existing home wiring (power lines, phone lines and coaxial cables). G.hn provides QoS by means of "Contention-Free Transmission Opportunities" (CFTXOPs) which are allocated to flows (such as a VoIP call) which require QoS and which have negotiated a "contract" with the network controllers.
288
Emergency calls
The nature of IP makes it difficult to locate network users geographically. Emergency calls, therefore, cannot easily be routed to a nearby call center. Sometimes, VoIP systems may route emergency calls to a non-emergency phone line at the intended department; in the United States, at least one major police department has strongly objected to this practice as potentially endangering the public.[21][22] A fixed line phone has a direct relationship between a telephone number and a physical location. If an emergency call comes from that number, then the physical location is known. In the IP world, it is not so simple. A broadband provider may know the location where the wires terminate, but this does not necessarily allow the mapping of an IP address to that location. IP addresses are often dynamically assigned, so the ISP may allocate an address for online access, or at the time a broadband router is engaged. The ISP recognizes individual IP addresses, but does not necessarily know to which physical location it corresponds. The broadband service provider knows the physical location, but is not necessarily tracking the IP addresses in use.[22] There are more complications since IP allows a great deal of mobility. For example, a broadband connection can be used to dial a virtual private network that is employer-owned. When this is done, the IP address being used will belong to the range of the employer, rather than the address of the ISP, so this could be many kilometres away or even in another country. To provide another example: if mobile data is used, e.g., a 3G mobile handset or USB wireless broadband adapter, then the IP address has no relationship with any physical location, since a mobile user
Internet phone could be anywhere that there is network coverage, even roaming via another cellular company. In short, there is no relationship between IP address and physical location, so the address itself reveals no useful information for the emergency services. At the VoIP level, a phone or gateway may identify itself with a SIP registrar by using a username and password. So in this case, the Internet Telephony Service Provider (ITSP) knows that a particular user is online, and can relate a specific telephone number to the user. However, it does not recognize how that IP traffic was engaged. Since the IP address itself does not necessarily provide location information presently, today a "best efforts" approach is to use an available database to find that user and the physical address the user chose to associate with that telephone numberclearly an imperfect solution.[22] VoIP Enhanced 911 (E911) is a method by which VoIP providers in the United States support emergency services. The VoIP E911 emergency-calling system associates a physical address with the calling party's telephone number as required by the Wireless Communications and Public Safety Act of 1999. All VoIP providers that provide access to the public switched telephone network are required to implement E911,[22] a service for which the subscriber may be charged. Participation in E911 is not required and customers may opt-out of E911 service.[22] One shortcoming of VoIP E911 is that the emergency system is based on a static table lookup. Unlike in cellular phones, where the location of an E911 call can be traced using Assisted GPS or other methods, the VoIP E911 information is only accurate so long as subscribers are diligent in keeping their emergency address information up-to-date. In the United States, the Wireless Communications and Public Safety Act of 1999 leaves the burden of responsibility upon the subscribers and not the service providers to keep their emergency information up to date.[22]
289
Lack of redundancy
The historical separation of IP networks and the PSTN provided redundancy when no portion of a call was routed over IP network. An IP network outage would not necessarily mean that a voice communication outage would occur simultaneously, allowing phone calls to be made during IP network outages. When telephone service relies on IP network infrastructure such as the Internet, a network failure can isolate users from all telephony communication, including Enhanced 911 and equivalent services in other locales. However, the network design envisioned by DARPA in the early 1980s included a fault tolerant architecture under adverse conditions.
Number portability
Local number portability (LNP) and Mobile number portability (MNP) also impact VoIP business. In November 2007, the Federal Communications Commission in the United States released an order extending number portability obligations to interconnected VoIP providers and carriers that support VoIP providers.[23] Number portability is a service that allows a subscriber to select a new telephone carrier without requiring a new number to be issued. Typically, it is the responsibility of the former carrier to "map" the old number to the undisclosed number assigned by the new carrier. This is achieved by maintaining a database of numbers. A dialed number is initially received by the original carrier and quickly rerouted to the new carrier. Multiple porting references must be maintained even if the subscriber returns to the original carrier. The FCC mandates carrier compliance with these consumer-protection stipulations. A voice call originating in the VoIP environment also faces challenges to reach its destination if the number is routed to a mobile phone number on a traditional mobile carrier. VoIP has been identified in the past as a Least Cost Routing (LCR) system, which is based on checking the destination of each telephone call as it is made, and then sending the call via the network that will cost the customer the least.[24] This rating is subject to some debate given the complexity of call routing created by number portability. With GSM number portability now in place, LCR providers can no longer rely on using the network root prefix to determine how to route a call. Instead, they must now determine the actual network of every number before routing the call.
Internet phone Therefore, VoIP solutions also need to handle MNP when routing a voice call. In countries without a central database, like the UK, it might be necessary to query the GSM network about which home network a mobile phone number belongs to. As the popularity of VoIP increases in the enterprise markets because of least cost routing options, it needs to provide a certain level of reliability when handling calls. MNP checks are important to assure that this quality of service is met. By handling MNP lookups before routing a call and by assuring that the voice call will actually work, VoIP service providers are able to offer business subscribers the level of reliability they require.
290
PSTN integration
The Media VoIP Gateway connects the digital media stream, so as to complete creating the path for voice as well as data media. It includes the interface for connecting the standard PSTN networks with the ATM and Inter Protocol networks. The Ethernet interfaces are also included in the modern systems, which are specially designed to link calls that are passed via the VoIP.[25] E.164 is a global FGFnumbering standard for both the PSTN and PLMN. Most VoIP implementations support E.164 to allow calls to be routed to and from VoIP subscribers and the PSTN/PLMN.[26] VoIP implementations can also allow other identification techniques to be used. For example, Skype allows subscribers to choose "Skype names"[27] (usernames) whereas SIP implementations can use URIs[28] similar to email addresses. Often VoIP implementations employ methods of translating non-E.164 identifiers to E.164 numbers and vice-versa, such as the Skype-In service provided by Skype[29] and the ENUM service in IMS and SIP.[30] Echo can also be an issue for PSTN integration.[31] Common causes of echo include impedance mismatches in analog circuitry and acoustic coupling of the transmit and receive signal at the receiving end.
Security
VoIP telephone systems are susceptible to attacks as are any Internet-connected devices. This means that hackers who know about these vulnerabilities (such as insecure passwords) can institute denial-of-service attacks, harvest customer data, record conversations and break into voice mailboxes.[32][33][34] Another challenge is routing VoIP traffic through firewalls and network address translators. Private Session Border Controllers are used along with firewalls to enable VoIP calls to and from protected networks. For example, Skype uses a proprietary protocol to route calls through other Skype peers on the network, allowing it to traverse symmetric NATs and firewalls. Other methods to traverse NATs involve using protocols such as STUN or Interactive Connectivity Establishment (ICE). Many consumer VoIP solutions do not support encryption, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content.[35] An attacker with a packet sniffer could intercept your VoIP calls if you are not on a secure VLAN. However, physical security of the switches within an enterprise and the facility security provided by ISPs make packet capture less of a problem than originally foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a voice packet is within the Internet backbone it is relatively safe from interception. There are open source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. Securing the content of conversations from malicious observers requires encryption and cryptographic authentication which is sometimes difficult to find at a consumer level. The existing security standard Secure Real-time Transport Protocol (SRTP) and the new ZRTP protocol are available on Analog Telephone Adapters (ATAs) as well as various softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. In 2005, Skype invited a researcher, Dr Tom Berson, to assess the security of the Skype software, and his conclusions are available in a published report.[36]
Internet phone
291
Securing VoIP
To prevent the above security concerns government and military organizations are using voice over secure IP (VoSIP), secure voice over IP (SVoIP), and secure voice over secure IP (SVoSIP) to protect confidential and classified VoIP communications.[37] Secure voice over secure IP is accomplished by encrypting VoIP with protocols such as SRTP or ZRTP. Secure voice over IP is accomplished by using Type 1 encryption on a classified network, like SIPRNet.[38][39][40][41][42] Public Secure VoIP is also available with free GNU programs and in many popular commercial VoIP programs via libraries such as ZRTP.[43]
Caller ID
Caller ID support among VoIP providers varies, but is provided by the majority of VoIP providers. Many VoIP carriers allow callers to configure arbitrary caller ID information, thus permitting spoofing attacks.[44] Business-grade VoIP equipment and software often makes it easy to modify caller ID information, providing many businesses great flexibility. The Truth in Caller ID Act became law in on December 22, 2010. This bill proposes to make it a crime in the United States to "knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value...".[45] Rules implementing the law were adopted by the Federal Communications Commission on June 20, 2011.[46]
Fax handling
Support for sending faxes over VoIP implementations is still limited. The existing voice codecs are not designed for fax transmission; they are designed to digitize an analog representation of a human voice efficiently. However, the inefficiency of digitizing an analog representation (modem signal) of a digital representation (a document image) of analog data (an original document) more than negates any bandwidth advantage of VoIP. In other words, the fax "sounds" simply do not fit in the VoIP channel. An alternative IP-based solution for delivering fax-over-IP called T.38 is available. Sending faxes using VoIP is sometimes referred to as FoIP, or Fax over IP.[48] The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet based transmissions which are the basis for IP communications. The fax machine could be a traditional fax machine connected to the PSTN, or an ATA box (or similar). It could be a fax machine with an RJ-45 connector plugged straight into an IP network, or it could be a computer pretending to be a fax machine.[49] Originally, T.38 was designed to use UDP and TCP transmission methods across an IP network. TCP is better suited for use between two IP devices. However, older fax machines, connected to an analog system, benefit from UDP near real-time characteristics due to the "no recovery rule" when a UDP packet is lost or an error occurs during transmission.[50] UDP transmissions are preferred as they do not require testing for dropped packets and as such since each T.38 packet transmission includes a majority of the data sent in the prior packet, a T.38 termination point has a higher degree of success in re-assembling the fax transmission back into its original form for interpretation by the end device. This in an attempt to overcome the obstacles of simulating real time transmissions using packet based protocol.[51] There have been updated versions of T.30 to resolve the fax over IP issues, which is the core fax protocol. Some newer high end fax machines have T.38 built-in capabilities which allow the user to plug right into the network and transmit/receive faxes in native T.38 like the Ricoh 4410NF Fax Machine.[52] A unique feature of T.38 is that each packet contains a portion of the main data sent in the previous packet. With T.38, two successive lost packets are
Internet phone needed to actually lose any data. The data you lose will only be a small piece, but with the right settings and error correction mode, there is an increased likelihood that you will receive enough of the transmission to satisfy the requirements of the fax machine for output of the sent document.
292
Legal issues
As the popularity of VoIP grows, governments are becoming more interested in regulating VoIP in a manner similar to PSTN services.[53] Throughout the developing world, countries where regulation is weak or captured by the dominant operator, restrictions on the use of VoIP are imposed, including in Panama where VoIP is taxed, Guyana where VoIP is prohibited and India where its retail commercial sales is allowed but only for long distance service.[54] In Ethiopia, where the government is monopolizing telecommunication service, it is a criminal offense to offer services using VoIP. The country has installed firewalls to prevent international calls being made using VoIP. These measures were taken after the popularity of VoIP reduced the income generated by the state owned telecommunication company.
European Union
In the European Union, the treatment of VoIP service providers is a decision for each Member State's national telecoms regulator, which must use competition law to define relevant national markets and then determine whether any service provider on those national markets has "significant market power" (and so should be subject to certain obligations). A general distinction is usually made between VoIP services that function over managed networks (via broadband connections) and VoIP services that function over unmanaged networks (essentially, the Internet). The relevant EU Directive is not clearly drafted concerning obligations which can exist independently of market power (e.g., the obligation to offer access to emergency calls), and it is impossible to say definitively whether VoIP service providers of either type are bound by them. A review of the EU Directive is under way and should be complete by 2007.
India
In India, it is legal to use VoIP, but it is illegal to have VoIP gateways inside India. This effectively means that people who have PCs can use them to make a VoIP call to any number, but if the remote side is a normal phone, the gateway that converts the VoIP call to a POTS call should not be inside India. In the interest of the Access Service Providers and International Long Distance Operators the Internet telephony was permitted to the ISP with restrictions. Internet Telephony is considered to be different service in its scope, nature and kind from real time voice as offered by other Access Service Providers and Long Distance Carriers. Hence the following type of Internet Telephony are permitted in India : (a) PC to PC; within or outside India (b) PC / a device / Adapter conforming to standard of any international agencies like- ITU or IETF etc. in India to PSTN/PLMN abroad. (c) Any device / Adapter conforming to standards of International agencies like ITU, IETF etc. connected to ISP node with static IP address to similar device / Adapter; within or outside India. (d) Except whatever is described
Internet phone in condition (ii) above, no other form of Internet Telephony is permitted. (e) In India no Separate Numbering Scheme is provided to the Internet Telephony. Presently the 10 digit Numbering allocation based on E.164 is permitted to the Fixed Telephony, GSM, CDMA wireless service. For Internet Telephony the numbering scheme shall only conform to IP addressing Scheme of Internet Assigned Numbers Authority (IANA). Translation of E.164 number / private number to IP address allotted to any device and vice versa, by ISP to show compliance with IANA numbering scheme is not permitted. (f) The Internet Service Licensee is not permitted to have PSTN/PLMN connectivity. Voice communication to and from a telephone connected to PSTN/PLMN and following E.164 numbering is prohibited in India. [55]
293
Middle East
In the UAE and Oman it is illegal to use any form of VoIP, to the extent that Web sites of Skype and Gizmo5 are blocked. Providing or using VoIP services is illegal in Oman. Those who violate the law stand to be fined 50,000 Omani Rial (about 130,317 US dollars) or spend two years in jail or both. In 2009, police in Oman have raided 121 Internet cafes throughout the country and arrested 212 people for using/providing VoIP services.
South Korea
In South Korea, only providers registered with the government are authorized to offer VoIP services. Unlike many VoIP providers, most of whom offer flat rates, Korean VoIP services are generally metered and charged at rates similar to terrestrial calling. Foreign VoIP providers encounter high barriers to government registration. This issue came to a head in 2006 when Internet service providers providing personal Internet services by contract to United States Forces Korea members residing on USFK bases threatened to block off access to VoIP services used by USFK members as an economical way to keep in contact with their families in the United States, on the grounds that the service members' VoIP providers were not registered. A compromise was reached between USFK and Korean telecommunications officials in January 2007, wherein USFK service members arriving in Korea before June 1, 2007, and subscribing to the ISP services provided on base may continue to use their US-based VoIP subscription, but later arrivals must use a Korean-based VoIP provider, which by contract will offer pricing similar to the flat rates offered by US VoIP providers.[56]
United States
In the United States, the Federal Communications Commission now requires all interconnected VoIP service providers to comply with requirements comparable to those for traditional telecommunications service providers. VoIP operators in the US are required to support local number portability; make service accessible to people with disabilities; pay regulatory fees, universal service contributions, and other mandated payments; and enable law enforcement authorities to conduct surveillance pursuant to the Communications Assistance for Law Enforcement Act (CALEA). "Interconnected" VoIP operators also must provide Enhanced 911 service, disclose any limitations on their E-911 functionality to their consumers, and obtain affirmative acknowledgements of these disclosures from all consumers.[57] VoIP operators also receive the benefit of certain US telecommunications regulations, including an entitlement to interconnection and exchange of traffic with incumbent local exchange carriers via wholesale carriers. Providers of "nomadic" VoIP servicethose who are unable to determine the location of their usersare exempt from state telecommunications regulation.[58] Another legal issue that the US Congress is debating concerns changes to the Foreign Intelligence Surveillance Act. The issue in question is calls between Americans and foreigners. The National Security Agency (NSA) is not authorized to tap Americans' conversations without a warrantbut the Internet, and specifically VoIP does not draw as clear a line to the location of a caller or a call's recipient as the traditional phone system does. As VoIP's low cost and flexibility convinces more and more organizations to adopt the technology, the surveillance for law enforcement agencies becomes more difficult. VoIP technology has also increased security concerns because VoIP and similar
Internet phone technologies have made it more difficult for the government to determine where a target is physically located when communications are being intercepted, and that creates a whole set of new legal challenges.[59]
294
Pronunciation
The acronym VoIP has been pronounced variably since the inception of the term. Apart from spelling out the acronym letter by letter, v'''p (vee-oh-eye-pee), there are three likely possible pronunciations: v''p[needs IPA] (vo-eye-pee) and v'ip[needs IPA] (vo-ipp), have been used, but generally, the single syllable vy'p[needs IPA] (voyp, as in voice) may be the most common within the industry.[60]
Historical milestones
1973: Network Voice Protocol (NVP) developed by Danny Cohen and others to carry real time voice over Arpanet 1974: The Institute of Electrical and Electronic Engineers (IEEE) published a paper titled "A Protocol for Packet Network Interconnection".[61] 1974: Network Voice Protocol (NVP) first tested over Arpanet in August 1974, carrying 16k CVSD encoded voice first implementation of Voice over IP 1977: Danny Cohen, Vint Cerf, Jon Postel agree to separate IP from TCP, and create UDP for carrying real time traffic 1981: IPv4 is described in RFC 791. 1985: The National Science Foundation commissions the creation of NSFNET.[62] 1986: Proposals from various standards organizations for Voice over ATM, in addition to commercial packet voice products from companies such as StrataCom 1992: Voice over Frame Relay standards development within Frame Relay Forum 1994: First Voice Over IP application (MTALK, a freeware application for Linux)[63] 1995: VocalTec releases the first commercial Internet phone software.[64][65] Beginning in 1995, Intel, Microsoft and Radvision initiated standardization activities for VoIP communications system.[66] 1996: ITU-T begins development of standards for the transmission and signaling of voice communications over Internet Protocol networks with the H.323 standard.[67] US telecommunication companies petition the US Congress to ban Internet phone technology.[68] 1997: Level 3 began development of its first softswitch, a term they coined in 1998.[69] 1999: The Session Initiation Protocol (SIP) specification RFC 2543 is released.[70] Mark Spencer of Digium develops the first open source private branch exchange (PBX) software (Asterisk).[71] 2004: Commercial VoIP service providers proliferate.
Internet phone
295
References
[1] "Voice over Internet Protocol. Definition and Overview" (http:/ / www. teliqo. com/ voip/ ). International Engineering Consortium. 2007. . Retrieved 2009-04-27. [2] "IP Telephony Vs VoIP" (http:/ / www. networkstraining. com/ ip-telephony-and-voip-tutorial-part-1/ ). . Retrieved April 27, 2011. [3] "XMPP Federation" (http:/ / googletalk. blogspot. com/ 2006/ 01/ xmpp-federation. html). Google Talkabout. 2006. . Retrieved 2012-05-11. [4] Booth, C (2010). "Chapter 2: IP Phones, Software VoIP, and Integrated and Mobile VoIP". Library Technology Reports 46 (5): 1119. [5] "Carriers look to IP for backhaul" (http:/ / www. commsdesign. com/ showArticle. jhtml;jsessionid=YBQXDJILLQX0IQSNDLPSKH0CJUNN2JVN?articleID=159907138). Telecommunications Online. January 21, 2009. . Retrieved 2009-01-21. [6] "Mobile's IP challenge" (http:/ / www. totaltele. com/ View. aspx?ID=77588& t=4). Total Telecom. December 8, 2005. . Retrieved 2009-01-21. [7] Michael Dosch and Steve Church. "VoIP in the Broadcast Studio" (http:/ / www. axiaaudio. com/ tech/ voip/ default. htm). Axia Audio. . Retrieved 2011-06-21. [8] Callahan, Renee (December 9, 2008). "Businesses Move To Voice-Over-IP" (http:/ / www. forbes. com/ 2008/ 12/ 09/ skype-vonage-ringcentral_leadership_clayton_in_rc_1209claytonchristensen_inl. html). Forbes. . Retrieved 2009-03-03. [9] Korzeniowski, Peter (January 8, 2009). "Three Technologies You Need In 2009" (http:/ / www. forbes. com/ 2009/ 01/ 08/ small-business-voip-ent-tech-cx_bm_0108bmightytech09. html/ ). Forbes. . Retrieved 2009-03-02. [10] "Skype For Business" (http:/ / www. skype. com/ business/ allfeatures/ 3skypephone/ ). skype.com. . Retrieved 2009-03-16. [11] William Jackson (May 27, 2009). "SSA goes big on VOIP" (http:/ / gcn. com/ Articles/ 2009/ 06/ 01/ SSA-VOIP-implementation. aspx?s=gcndaily_280509& Page=1). Government Computer News. . Retrieved 2009-05-28. [12] "Social Security to Build "World's Largest VOIP"" (http:/ / www. govtech. com/ gt/ 275677). Government Technology. . Retrieved 2009-05-29. [13] voip cute (http:/ / voipcute. blogspot. com/ 2012/ 01/ voice-over-ip-voip-services. html), VOIP Advantages [14] FCC.gov (http:/ / www. fcc. gov/ voip/ ), What are some advantages of VOIP? [15] "Quality of Service for Voice over IP" (http:/ / www. cisco. com/ en/ US/ docs/ ios/ solutions_docs/ qos_solutions/ QoSVoIP/ QoSVoIP. html). . Retrieved May 3, 2011. [16] Prabhakar, G.; Rastogi, R.,& Thotton, M (2005). "OSS Architecture & Requirements for VoIP Networks". Bell Labs Technical Journal 10 (1): 3145. [17] "Quality of Service for Voice over IP" (http:/ / www. cisco. com/ en/ US/ docs/ ios/ solutions_docs/ qos_solutions/ QoSVoIP/ QoSVoIP. html#wp1029054). . Retrieved May 3, 2011. [18] VOIP Vulnerability over Internet Protocol (http:/ / www. continuitycentral. com/ feature074. htm) [19] IEEE Multipath routing with adaptive playback scheduling for Voice over IP in Service Overlay Networks (Abstract) (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=4520089) [20] ICT Regulation Tool Kit 4.4 VOIP Regulatory Issues Universal Service (http:/ / www. ictregulationtoolkit. org/ en/ Section. 3083. html) [21] Letter from the City of New York to the Federal Communications Commission (http:/ / gullfoss2. fcc. gov/ prod/ ecfs/ retrieve. cgi?native_or_pdf=pdf& id_document=6517587651) [22] "FCC Consumer Advisory VoIP and 911 Service" (http:/ / www. fcc. gov/ cgb/ consumerfacts/ voip911. pdf). . Retrieved May 2, 2011. [23] Keeping your telephone number when you change your service provider FCC (http:/ / www. fcc. gov/ cgb/ consumerfacts/ numbport. html) [24] VoIpservice.com (http:/ / www. voipservice. com/ sip-trunking) [25] "Importance of Softswitch VoIP Technology" (http:/ / www. ixc. ua/ importance-of-softswitch-voip-technology-properly). ixc.ua. May 20, 2011. . Retrieved 2012-10-04. [26] "RFC 3824 Using E.164 numbers with the Session Initiation Protocol (SIP)" (http:/ / www. packetizer. com/ rfc/ rfc3824/ ). The Internet Society. June 1, 2004. . Retrieved 2009-01-21. [27] "Create a Skype Name" (http:/ / www. skype. com/ help/ guides/ createskypename_windows/ ). Skype. . Retrieved 2009-01-21. [28] "RFC 3969 The Internet Assigned Number Authority (IANA) Uniform Resource Identifier (URI) Parameter Registry for the Session Initiation Protocol (SIP)" (http:/ / www. packetizer. com/ rfc/ rfc3969/ ). The Internet Society. December 1, 2004. . Retrieved 2009-01-21. [29] "Your personal online number" (http:/ / www. skype. com/ allfeatures/ onlinenumber/ ). Skype. . Retrieved 2009-01-21. [30] "Application-level Network Interoperability and the Evolution of IMS" (http:/ / ipcommunications. tmcnet. com/ hot-topics/ MCP/ articles/ 1311-application-level-network-interoperability-the-evolution-ims. htm). TMCnet.com. May 24, 2006. . Retrieved 2009-01-21. [31] Packetcable Implementation P557 Jeff Riddel ISBN 1-58705-181-8 Google Books Preview (http:/ / books. google. com/ books?id=8CNBbrxytcAC& pg=PA557& lpg=PA557& dq=PSTN+ gateway+ VOIP+ impedance+ mismatch) [32] Taub, Eric (April 2, 2008). "VOIP System Security: Time to Worry, or Maybe Not" (http:/ / bits. blogs. nytimes. com/ 2008/ 04/ 02/ voip-system-security-time-to-worry-or-maybe-not/ ?scp=4& sq=voip& st=cse/ ). New York Times. . Retrieved 2009-03-02. [33] Stanton, Ray (Secure VoIP- An Achievable Goal). Computer Fraud & Security 4: 1114. doi:10.1016/S1361-3723(06)70333-5. [34] Stanton, R. (2006). "Secure VoIP- an achievable goal". Computer Fraud & Security 4: 1114. doi:10.1016/S1361-3723(06)70333-5.
Internet phone
[35] "Examining Two Well-Known Attacks on VOIP" (http:/ / www. circleid. com/ posts/ examining_two_well_known_attacks_on_voip1/ ). CircleID. . Retrieved 2006-04-05. [36] Skype.com (http:/ / download. skype. com/ share/ security/ 2005-031 security evaluation. pdf), "Skype Security Evaluation", Tom Berson/Anagram Laboratories [37] Disa.mil (http:/ / iase. disa. mil/ stigs/ stig/ VoIP-STIG-V2R2. pdf), Internet Protocol Telephony & Voice over Internet Protocol Security Technical Implementation Guide [38] IJCSNS.org (http:/ / paper. ijcsns. org/ 07_book/ 200706/ 20070610. pdf), Secure Voice-over-IP [39] Sans.org (http:/ / www. sans. org/ reading_room/ whitepapers/ voip/ secure_voice_over_ip_322), SANS Institute InfoSec Reading Room [40] JHU.edu (http:/ / www. clsp. jhu. edu/ ~cwhite/ papers/ asilo_04_LossConceal_final. pdf), Packet Loss Concealment in a Secure Voice over IP Environment [41] GDC4S.com (http:/ / www. gdc4s. com/ documents/ D-VIPER-14-1007_p11. pdf), State-of-the-art voice over IP encryptor [42] Networkworld.com (http:/ / www. networkworld. com/ news/ 2009/ 041609-cellcrypt-secure-voip-heading-to. html), Cellcrypt secure VOIP heading to BlackBerry. [43] Freesorftwaremagazine.com (http:/ / www. freesoftwaremagazine. com/ columns/ secure_voip_calling_free_software_right_to_privacy), Secure VOIP calling, free software, and the right to privacy [44] VOIPSA.org (http:/ / voipsa. org/ blog/ 2006/ 09/ 29/ hello-mom-im-a-fake/ ), Blog: "Hello Mom, I'm a Fake!" (Telespoof and Fakecaller). [45] 111th Congress (2009) (January 7, 2009). "S. 30 (111th)" (http:/ / www. govtrack. us/ congress/ bills/ 111/ s30). Legislation. GovTrack.us. . Retrieved June 25, 2012. "Truth in Caller ID Act of 2009" [46] Federal Communications Commission (June 22, 2011). "Rules and Regulation Implementing the Truth in Caller ID Act of 2009" (http:/ / www. fcc. gov/ document/ rules-and-regulation-implementing-truth-caller-id-act-2009). fcc.gov. . Retrieved June 25, 2012. [47] Oldphoneworks.com (http:/ / www. oldphoneworks. com/ antique-phone-parts/ parts-and-pieces/ pulse-to-tone-converters/ ) [48] Voip-Info.org (http:/ / www. voip-info. org/ wiki/ view/ FoIP), "FoIP". [49] Soft-Switch.org (http:/ / soft-switch. org/ foip. html), Faxing over IP networks [50] Umass.edu (http:/ / www-net. cs. umass. edu/ kurose/ transport/ UDP. html), UMass Discussion on UDP transmission Characteristics. [51] Faqs.org (http:/ / www. faqs. org/ rfcs/ rfc3362. html), RFC 3362-T.38 [52] FaxSuperstore.com (http:/ / www. faxsuperstore. com/ ricoh-4410nf. html), Ricoh 4410NF [53] "Global VOIP Policy Status Matrix" (http:/ / www. ipall. org/ matrix/ ). Global IP Alliance. . Retrieved 2006-11-23. [54] Proenza, Francisco J.. "The Road to Broadband Development in Developing Countries is through Competition Driven by Wireless and VOIP" (http:/ / www. e-forall. org/ pdf/ Wireless& VOIP_10July2006. pdf) (PDF). . Retrieved 2008-04-07. [55] (http:/ / www. scribd. com/ doc/ 101919043/ TECHNICAL-NOTE-ON-ILLEGAL-INTERNATIONAL-LONG-DISTANCE-TELEPHONE-EXCHANGE-IN-INDIA) by Harish Kumar Gangwar , Technical Note on illegal ILD telephone Exchange in India [56] Stripes.com (http:/ / www. stripes. com/ article. asp?section=104& article=41826& archive=true), Stars and Stripes: USFK deal keeps VoIP access for troops [57] GPO.gov (http:/ / www. access. gpo. gov/ nara/ cfr/ waisidx_07/ 47cfr9_07. html), 47 C.F.R. pt. 9 (2007) [58] FCC.gov (http:/ / www. fcc. gov/ voip/ ) [59] Greenberg, Andy (May 15, 2008). "The State Of Cybersecurity Wiretapping's Fuzzy Future" (http:/ / www. forbes. com/ 2008/ 05/ 15/ wiretapping-voip-lichtblau-tech-security08-cx_ag_0515wiretap. html/ ). Forbes. . Retrieved 2009-03-02. [60] Voip | Define Voip at Dictionary.com (http:/ / dictionary. reference. com/ browse/ voip). Dictionary.com. Retrieved 2011-07-15. [61] Vinton G. Cerf, Robert E. Kahn, "A Protocol for Packet Network Intercommunication", IEEE Transactions on Communications, Vol. 22, No. 5, May 1974, pp. 637648. [62] "The Launch of NSFNET" (http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ launch. htm). The National Science Foundation. . Retrieved 2009-01-21. [63] "MTALK-Readme" (ftp:/ / sunsite. unc. edu/ pub/ Linux/ apps/ sound/ talk/ mtalk. README) (TXT). Sunsite.edu. . Retrieved 2012-04-29. [64] Keating, Tom. "Internet Phone Release 4" (http:/ / blog. tmcnet. com/ blog/ tom-keating/ docs/ cti-buyers-guide-1996. pdf) (PDF). Computer Telephony Interaction Magazine. . Retrieved 2007-11-07. [65] "The 10 that Established VOIP (Part 1: VocalTec)" (http:/ / www. ilocus. com/ 2007/ 07/ the_10_that_established_voip_p_2. html). iLocus. . Retrieved 2009-01-21. [66] The free Library RADVision and Intel Target Compatibility Between RADVision's H.323/320 Videoconferencing Gateway And Intel's Business Video Conferencing And TeamStation Products. (http:/ / www. thefreelibrary. com/ RADVision+ and+ Intel+ Target+ Compatibility+ Between+ RADVision's+ . . . -a019467970) June 2, 1997 VoiP Developer Solutions (http:/ / www. radvision. com/ Developer-Solutions/ ) [67] "H.323 Visual telephone systems and equipment for local area networks which provide a non-guaranteed quality of service" (http:/ / www. itu. int/ rec/ T-REC-H. 323-199611-S/ en). ITU-T. . Retrieved 2009-01-21. [68] "RFC 2235" (http:/ / www. faqs. org/ rfcs/ rfc2235. html). R. Zakon. . Retrieved 2009-01-21. [69] "The 10 that Established VOIP (Part 2: Level 3)" (http:/ / www. ilocus. com/ 2007/ 07/ the_10_that_established_voip_p_1. html). iLocus. July 13, 2007. . Retrieved 2007-11-07. [70] "RFC 2543, SIP: Session Initiation Protocol" (http:/ / www. ietf. org/ rfc/ rfc2543. txt). Handley,Schulzrinne,Schooler,Rosenberg. . Retrieved 2009-01-21.
296
Internet phone
[71] "What is Asterisk" (http:/ / www. asterisk. org/ about). Asterisk.org. . Retrieved 2009-01-21.
297
External links
Internet phone (http://www.dmoz.org/Business/Telecommunications/Services/VoIP/) at the Open Directory Project
Internet radio
Internet radio (also web radio, net radio, streaming radio, e-radio webcasting) is an audio service transmitted via the Internet. Music streaming on the Internet is usually referred to as webcasting since it is not transmitted broadly through wireless means. Internet radio involves streaming media, presenting listeners with a continuous stream of audio that cannot be paused or replayed, much like traditional broadcast media; in this respect, it is distinct from on-demand file serving. Internet radio is also distinct from podcasting, which involves downloading rather than streaming. Many Internet radio services are associated with a corresponding traditional (terrestrial) radio station or radio network. Internet-only radio stations are independent of such associations. Internet radio services are usually accessible from anywhere in the worldfor example, one could listen to an Australian station from Europe or America. Some major networks like CBS Radio and Citadel Broadcasting (except for news/talk and sports stations) in the US, and Chrysalis in the UK restrict listening to in-country because of music licensing and advertising concerns. Internet radio remains popular among expatriates and listeners with interests that are often not adequately served by local radio stations (such as eurodance, progressive rock, ambient music, folk music, classical music, and stand-up comedy). Internet radio services offer news, sports, talk, and various genres of musicevery format that is available on traditional radio stations.
Internet radio
298
Simulation
A local tuner simulation program includes all the online radios that can also be heard in the air in the city.
History
The first live internet only broadcast of a live band was Seattle based space rock group Sky Cries Mary on November 10th, 1994, by Paul Allen's digital media start-up Starwave, also based in Seattle.[3][4] A week later, during November 1994, Rolling Stones concert was the "first major cyberspace multicast concert." Mick Jagger opened the concert by saying, "I wanna say a special welcome to everyone that's, uh, climbed into the Internet tonight and, uh, has got into the M-bone. And I hope it doesn't all collapse."[5] On November 7, 1994, WXYC (89.3 FM Chapel Hill, NC USA) became the first traditional radio station to announce broadcasting on the Internet. WXYC used an FM radio connected to a system at SunSite, later known as Ibiblio, running Cornell's CU-SeeMe software. WXYC had begun test broadcasts and bandwidth testing as early as August 1994.[6] WREK (91.1 FM, Atlanta, GA USA) started streaming on the same day using their own custom software called CyberRadio1. However, unlike WXYC, this was WREK's beta launch and the stream was not advertised until a later date.[7]
The original cabin housing the (now defunct) Internet radio station Whole Wheat Radio in Talkeetna, Alaska
In 1995, Progressive Networks released RealAudio as a free download. Time magazine said that RealAudio took "advantage of the latest advances in digital compression" and delivered "AM radio-quality sound in so-called real time."[8] Eventually, companies such as Nullsoft and Microsoft released streaming audio players as free downloads.[9] As the software audio players became available, "many Web-based radio stations began springing up."[9] In 1996, Edward Lyman created Sonicwave.com, the first American internet radio station, legally licensed by both ASCAP and BMI, to broadcast live, 24 hours a day on the internet. In March 1996, Virgin Radio - London, became the first European radio station to broadcast its full program live on the internet.[10] It broadcast its FM signal, live from the source, simultaneously on the Internet 24 hours a day.[11] Internet radio attracted significant media and investor attention in the late 1990s. In 1998, the initial public stock offering for Broadcast.com set a record at the time for the largest jump in price in stock offerings in the United States. The offering price was US$18 and the company's shares opened at US$68 on the first day of trading.[12] The company was losing money at the time and indicated in a prospectus filed with the Securities Exchange Commission that they expected the losses to continue indefinitely.[12] Yahoo! purchased Broadcast.com on July 20, 1999[13] for US$5.7 billion.[14] With the advent of streaming RealAudio over HTTP, streaming became more accessible to a number of radio shows. One such show, TechEdge Radio in 1997 was broadcast in 3 formats - live on the radio, live from a RealAudio server and streamed from the web over HTTP. In 1998, the longest running internet radio show,[15] "The Vinyl Lounge", commenced netcasting from Sydney, Australia, from Australia's first Internet Radio Station, NetFM (www.netfm.net). In 1999, Australian Telco "Telstra" launched The Basement Internet Radio Station but it was later shut down in 2003 as it was not a viable business for the Telco. From 2000 onwards, most Internet Radio Stations increased their stream quality as bandwidth became more economical. Today, most stations stream between 64 kbit/s and 128 kbit/s providing near CD quality audio.
Internet radio
299
US royalty controversy
In October 1998, the US Congress passed the Digital Millennium Copyright Act (DMCA). One result of the DMCA is that performance royalties are to be paid for satellite radio and Internet radio broadcasts in addition to publishing royalties. In contrast, traditional radio broadcasters pay only publishing royalties and no performance royalties.[16] A rancorous dispute ensued over how performance royalties should be assessed for Internet broadcasters.[14][16][17][18][19][20][21] Some observers said that royalty rates that were being proposed were overly Internet radio configuration for Penistone FM burdensome and intended to disadvantage independent Internet-only studio stations[16]that "while Internet giants like AOL may be able to afford the new rates, many smaller Internet radio stations will have to shut down."[19] The Digital Media Association (DiMA) said that even large companies, like Yahoo! Music, might fail due to the proposed rates.[20] Some observers said that some U.S.-based Internet broadcasts might be moved to foreign jurisdictions where US royalties do not apply.[18] Many of these critics organized SaveNetRadio.org, "a coalition of listeners, artists, labels and webcasters"[17] that opposed the proposed royalty rates. To focus attention on the consequences of the impending rate hike, many US Internet broadcasters participated in a "Day of Silence" on June 26, 2007. On that day, they shut off their audio streams or streamed ambient sound, sometimes interspersed with brief public service announcements voiced, written and produced by popular voiceover artist Dave Solomon. [22] Notable participants included Rhapsody, Live365, MTV, Pandora, and SHOUTcast. Some broadcasters did not participate, such as Last.fm, that had just been purchased for US $280 million by CBS Music Group.[23] According to a Last.fm employee, they were unable to participate because participation "may compromise ongoing license negotiations."[24] SoundExchange, representing supporters of the increase in royalty rates, pointed out the fact that the rates were flat from 1998 through 2005 (see above), without even being increased to reflect cost-of-living increases. They also declared that if internet radio is to build businesses from the product of recordings, the performers and owners of those recordings should receive fair compensation. On May 1, 2007, SoundExchange came to an agreement with certain large webcasters regarding the minimum fees that were modified by the determination of the Copyright Royalty Board. While the CRB decision imposed a $500 per station or channel minimum fee for all webcasters, certain webcasters represented through DiMA negotiated a $50,000 "cap" on those fees with SoundExchange.[25] However, DiMA and SoundExchange continue to negotiate over the per song, per listener fees. SoundExchange has also offered alternative rates and terms to certain eligible small webcasters, that allows them to calculate their royalties as a percentage of their revenue or expenses, instead of at a per performance rate.[26] To be eligible, a webcaster had to have revenues of less than US $1.25 million a year and stream less than 5 million "listener hours" a month (or an average of 6830 concurrent listeners).[27] These restrictions would disqualify independent webcasters like AccuRadio, Digitally Imported, Club977 and others from participating in the offer, and therefore many small commercial webcasters continue to negotiate a settlement with SoundExchange.[28] An August 16, 2008 Washington Post article reported that although Pandora was "one of the nation's most popular Web radio services, with about 1 million listeners daily...the burgeoning company may be on the verge of collapse" due to the structuring of performance royalty payment for webcasters. "Traditional radio, by contrast, pays no such fee. Satellite radio pays a fee but at a less onerous rate, at least by some measures." The article indicated that "other Web radio outfits" may be "doom[ed]" for the same reasons.[29]
Internet radio On September 30, 2008, the United States Congress passed "a bill that would put into effect any changes to the royalty rate to which [record labels and web casters] agree while lawmakers are out of session."[30] Although royalty rates are expected to decrease, many webcasters nevertheless predict difficulties generating sufficient revenue to cover their royalty payments.[30] In January 2009, the US Copyright Royalty Board announced that "it will apply royalties to streaming net services based on revenue."[31] Since then, websites like Pandora Radio, Mog, 8tracks and even recently Google Music have changed the way people discover and listen to music.
300
Popularity
In 2003, revenue from online streaming music radio was US$49 million. By 2006, that figure rose to US$500 million.[20] A February 21, 2007 "survey of 3,000 Americans released by consultancy Bridge Ratings & Research" found that "[a]s much as 19% of U.S. consumers 12 and older listen to Web-based radio stations." In other words, there were "some 57 million weekly listeners of Internet radio programs. More people listen to online radio than to satellite radio, high-definition radio, podcasts, or cell-phone-based radio combined."[20][32] An April 2008 Arbitron survey[33] showed that, in the US, more than one in seven persons aged 2554 years old listen to online radio each week.[34] In 2008, 13 percent of the American population listened to the radio online, compared to 11 percent in 2007. Internet radio functionality is also built into many dedicated Internet radio devices, which give an FM like receiver user experience.
References
[1] Hoeg, Wolfgang; Lauterbach, Thomas (2009). Digital audio broadcasting: principles and applications of DAB, DAB+ and DMB (http:/ / books. google. com/ books?id=T0KSa6w3qH4C& pg=PA26). Wiley. p.26. ISBN978-0-470-51037-7. . [2] Hoeg, p 43. [3] Quinn, Michelle (October 29, 1995). "Prankster Takes on Microsoft" (http:/ / articles. sfgate. com/ 1995-10-29/ entertainment/ 17817541_1_sky-cries-mary-anisa-romero-roderick-band-members/ 2). The San Francisco Chronicle. . [4] "Company Info" (http:/ / www. mediacast. com/ Company/ ). MediaCast. . Retrieved 2011-09-19. [5] Peter H. Lewis (February 8, 1995). "Peering Out a 'Real Time' Window" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=990CE6DF123FF93BA35751C0A963958260). New York Times. . Retrieved 2009-02-09. [6] WXYC's groundbreaking internet simulcast is now 10 years old (http:/ / wxyc. org/ about/ first/ ) November 12, 2004. WXYC Chapel Hill, NC, 89.3 FM. [7] We got here first. Sort of. (http:/ / www. wrek. org/ ?q=wreknet-first) WREK Atlanta, 91.1 FM. [8] Josh Quittner (1995-05-01). "Radio Free Cyberspace" (http:/ / www. time. com/ time/ magazine/ article/ 0,9171,982874,00. html). Time. . Retrieved 2009-03-05. [9] Richard D. Rose (2002-05-08). "Connecting the Dots: Navigating the Laws and Licensing Requirements of the Internet Music Revolution" (http:/ / www. ipmall. org/ hosted_resources/ IDEA/ 42_IDEA/ 42-3_IDEA_313_Rose. pdf) (PDF). IDEA: The Intellectual Property Law Review. . Retrieved 2009-03-05. [10] Adam Bowie (September 26, 2008). "A brief history of Virgin Radio" (http:/ / onegoldensquare. com/ 2008/ 09/ a-brief-history-of-virgin-radio-by-adam-bowie/ ). One Golden Square. . Retrieved 2009-03-30. [11] "An Introduction to Internet Radio" (http:/ / www. ebu. ch/ fr/ technical/ trev/ trev_304-webcasting. pdf) (PDF). European Broadcasting Union (EBU). 26 October 2005. . Retrieved 2009-03-30. [12] Saul Hansell (July 20, 1998). "Broadcast.com Faces Risks After Strong Initial Offering" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9F07E6DB1030F933A15754C0A96E958260). New York Times. . Retrieved 2008-11-23. [13] "Yahoo! Completes Broadcast.com Acquisition" (http:/ / docs. yahoo. com/ docs/ pr/ release343. html). Yahoo! Media Relations. July 20, 1999. . Retrieved 2009-01-10. [14] Doc Searls, (July 17, 2002) "Why Are So Many Internet Radio Stations Still on the Air?" (http:/ / www. linuxjournal. com/ article/ 6218) Linux Journal. Retrieved 2010-03-14. [15] National Film & Sound Archive (September 20, 2010). "National Film & Sound Archive" (http:/ / www. screensound. gov. au). National Film & Sound Archive. . [16] Michael Roberts (May 2, 2002). "Digital Dilemma: Will new royalty fees kill Web radio?" (http:/ / www. westword. com/ 2002-05-02/ news/ digital-dilemma/ ). Westword. Retrieved 2010-03-14. [17] Carlos Militante (April 26, 2007). "Stagnant royalty rates may bring end to Internet radio" (http:/ / web. archive. org/ web/ 20080209025141/ http:/ / media. www. dailycollegian. com/ media/ storage/ paper874/ news/ 2007/ 04/ 26/ News/ Stagnant. Royalty. Rates. May. Bring. End. To. Internet. Radio-2881008. shtml). Spartan Daily (San Jose State U.). The Daily Collegian. Archived from the original
Internet radio
(http:/ / media. www. dailycollegian. com/ media/ storage/ paper874/ news/ 2007/ 04/ 26/ News/ Stagnant. Royalty. Rates. May. Bring. End. To. Internet. Radio-2881008. shtml) on February 9, 2008. . Retrieved 2010-03-14. [18] Michael Geist (April 9, 2007). Web radio may stream north to Canada (http:/ / www. thestar. com/ sciencetech/ article/ 200867). The Toronto Star. [19] Gray, Hiawatha (March 14, 2007). Royalty hike could mute Internet radio: Smaller stations say rise will be too much (http:/ / www. boston. com/ business/ technology/ articles/ 2007/ 03/ 14/ royalty_hike_could_mute_internet_radio/ ), The Boston Globe. [20] Olga Kharif, The Last Days of Internet Radio? (http:/ / www. businessweek. com/ technology/ content/ mar2007/ tc20070307_534338. htm), March 7, 2007. Retrieved on March 7, 2007. [21] Broache, Anne (2007-04-26). "Lawmakers propose reversal of Net radio fee increases" (http:/ / news. com. com/ Lawmakers+ + propose+ reversal+ of+ Net+ radio+ fee+ increases/ 2100-1028_3-6179627. html). CNet News. . Retrieved 2010-03-14. [22] Official SaveNetRadio PSAs & Day Of Silence Network Audio (http:/ / www. wzfb. com/ savenetradio/ ). The Toronto Star. [23] Duncan Riley (May 30, 2007). CBS Acquires Europes Last.FM for $280 million (http:/ / www. techcrunch. com/ 2007/ 05/ 30/ cbs-acquires-lastfm-for-280m/ ) Techcrunch. Retrieved 2010-03-14. [24] Russ Garrett (June 25, 2007). Post by Russ on Last.fm Forum - Day of Silence, June 25, 2007 (http:/ / www. last. fm/ forum/ 23/ _/ 296674/ 2#f4141933). Retrieved 2012-06-24. [25] Olga Kharif (2007-08-23). "Webcasters and SoundExchange Shake Hands" (http:/ / www. businessweek. com/ the_thread/ techbeat/ archives/ 2007/ 08/ web_radio_and_m. html). BusinessWeek.com. . Retrieved 2007-08-24. [26] Mark Hefflinger (2007-08-22). "SoundExchange Offers Discounted Music Rates To Small Webcasters" (http:/ / www. dmwmedia. com/ news/ 2007/ 08/ 22/ soundexchange-offers-discounted-music-royalties-to-small-webcasters). DigitalMediaWire.com. . Retrieved 2007-08-24. [27] Rusty Hodge, (August 1, 2007) SoundExchange extends (not very good) offer to small webcasters (http:/ / somafm. com/ blogs/ rusty/ 2007_08_01_archive. html). SomaFM. Retrieved 2010-03-14. [28] David Oxenford (September 19, 2007) SoundExchange Announces 24 Agreements - But Not One a Settlement With Small Webcasters (http:/ / www. broadcastlawblog. com/ archives/ internet-radio-soundexchange-announces-24-agreements-but-not-one-a-settlement-with-small-webcasters. html). Broadcast Law Blog. [29] Peter Whoriskey (August 16, 2008) Giant Of Internet Nears Its 'Last Stand' (http:/ / www. washingtonpost. com/ wp-dyn/ content/ article/ 2008/ 08/ 15/ AR2008081503367. html). The Washington Post. Retrieved 2010-03-14. [30] Miller, Cain Claire (Oct.27, 2008) Even If Royalties for Web Radio Fall, Revenue Remains Elusive (http:/ / www. nytimes. com/ 2008/ 10/ 27/ technology/ internet/ 27radio. html), The New York Times. [31] Scott M. Fulton, III (January 29, 2009) Copyright Board begrudgingly adopts revenue-based streaming royalties (http:/ / www. betanews. com/ article/ Copyright_Board_begrudgingly_adopts_revenuebased_streaming_royalties/ 1233268577). BetaNews.com. Retrieved 2010-03-14. [32] The "HD" in "HD radio" actually stands for hybrid digital, not high-definition. It's hybrid because analog and digital signals are broadcast together. [33] Joe Lensky; Bill Rose (2008-06-24). "The Infinite Dial 2008: Radios Digital Platforms" (http:/ / www. arbitron. com/ downloads/ digital_radio_study_2008. pdf) (PDF). Digital Radio Study 2008. Arbitron and Edison Research. . [34] "Weekly online radio audience increases from 11 percent to 13 percent of Americans in last year, according to the latest Arbitron/Edison media research study" (http:/ / www. redorbit. com/ news/ technology/ 1334023/ weekly_online_radio_audience_increases_from_11_percent_to_13/ index. html). Arbitron & Edison Research. Red Orbit. April 9, 2008. .
301
Further reading
"VOA: First on the Internet," by Chris Kern (http://www.chriskern.net/history/voaFirstOnTheInternet.html) (2006) Priestman, Chris (2001). Web Radio: Radio Production for Internet Streaming. Focal Press. ISBN978-0-240-51635-6.
Internet television
302
Internet television
"Net TV" redirects here. For other uses, see Net (disambiguation). Internet television (otherwise known as Internet TV, or Online TV) is the digital distribution of television content via the Internet. It should not be confused with Web television - short programs or videos created by a wide variety of companies and individuals, or Internet protocol television (IPTV) - an emerging internet technology standard for use by television broadcasters. Some Internet television is known as catch-up TV. Internet Television is a general term that covers the delivery of television shows and other video content over the internet by video streaming technology, typically by major traditional television broadcasters. It does not describe a technology used to deliver content (see Internet protocol television). Internet television has become very popular through services such as RT Player in Ireland; BBC iPlayer, 4oD, ITV Player (also STV Player and UTV Player) and Demand Five in the United Kingdom; Hulu in the United States; Nederland 24 in the Netherlands; ABC iview and Australia Live TV in Australia; Tivibu in Turkey. See List of Internet television providers.
Concept
Internet television allows the users to choose the content or the television show they want to watch from an archive of content or from a channel directory. The two forms of viewing Internet television are streaming the content directly to a media player or simply downloading the media to the user's computer. With the "TV on Demand" market growing, these on-demand websites or applications are essential for major television broadcasters. For example, the BBC iPlayer brings in users which stream more than one million videos per week, with one of the BBC's headline shows The Apprentice taking over three percent to five percent of the UK's internet traffic due to people watching the first episode on the BBC iPlayer. Availability of online TV content continues to grow. As an example, in Canada as of May 2011 there were more than 600 TV shows available for free streaming, including several major titles like Survivor and The Daily Show with Jon Stewart.[1] Every night the use of on-demand television peaks at around 10 pm.[2] Most providers of the service provide several different formats and quality controls so that the service can be viewed on many different devices. Some services now offer a HD service along side their SD, streaming is the same but offers the quality of HD to the device being used, as long as it is using a HD screen. During Peak times the BBC iPlayer transmits 12 GB (gigabytes) of information per second.[3] Over the course of a month the iPlayer sends 7 PB (petabytes) of information. Before 2006, most catch-up services used peer-to-peer (P2P) networking, in which users downloaded an application and data would be shared between the users rather than the service provider giving the now more commonly used streaming method. Now most service providers have moved away from the P2P systems and are now using the streaming media. The old P2P service was selected because the existing infrastructure could not handle the bandwidth necessary for centralized streaming distribution. Some consumers didn't like their upload bandwidth being consumed by their video player, which partially motivated the rollout of centralized streaming distribution.[4] Launching in March 2012 in New York City, Aereo streams network TV to customers over the internet. Broadcasters filed lawsuits against Aereo which Aereo captured broadcast signals and streaming the content to Aereo's costumers without paying broadcasters. In mid-July 2012, a federal judge sided with the Aereo start-up. Aereo planned to expand it to every major metropolitan area by the end of 2013.[5]
Internet television
303
Market competitors
Many providers of internet-television services exist including conventional television stations that have taken advantage of the internet as a way to continue showing television shows after they have been broadcast often advertised as "on-demand" and "catch-up" services. Today, almost every major broadcaster around the world is operating an internet-television platform.[6] Examples include the BBC, which introduced the BBC iPlayer on 25 June 2008 as an extension to its "RadioPlayer" and already existing streamed video-clip content, and Channel 4 that launched 4oD ("4 on Demand") in November 2006 allowing users to watch recently shown content. Most internet-television services allow users to view content free of charge; however, some content is for a fee.
Control
Controlling content on the Internet presents a challenge for most providers; to try to ensure that a user is allowed to view content such as content with age certificates, providers use methods such as parental controls that allows restrictions to be placed upon the use and access of certificated material. The BBC iPlayer makes use of a parental control system giving parents the option to "lock" content, meaning that a password would have to be used to access it. Flagging systems can be used to warn a user that content may be certified or that it is intended for viewing post-watershed. Honor systems are also used where users are asked for their dates of birth or age to verify if they are able to view certain content.
Archives
An archive is a collection of information and media much like a library or interactive-storage facility. It is a necessity for an on-demand media service to maintain archives so that users can watch content that has already been aired on standard-broadcast television. However, these archives can vary from a few weeks to months to years, depending on the curator and the type of content. For example, the BBC iPlayer's shows are in general available for up to seven days after their original broadcast.[7] This so-called "seven-day catch-up" model seems to become an industry standard for internet-television services in many countries around the world.[8] However, some shows may only be available for shorter periods. Others, such as the BBC's Panorama, may be available for an extended period because of the shows documentary nature or its popularity. In contrast, 4oD channel 4's on-demand service[9] offers many of its television shows that were originally aired years ago. An example of this is the comedy The IT Crowd where users can view the full series on the internet player. The same is true for other hit channel 4 comedies such as The Inbetweeners and Black Books. The benefit of lLarge archives, is that they bring in far more users who, in turn, watch more media, leading to a wider audience base and more advertising revenue. Large archives will also mean the user will spend more time on that website rather than a competitors, leading to starvation of demand for the competitors. Having an extensive archive, however, can bring problems along with benefits. Large archives are expensive to maintain, server farms and mass storage is needed along with ample bandwidth to transmit it all. Vast archives can be hard to catalogue and sort so that it is accessible to users.
Internet television
304
Broadcasting rights
Broadcasting rights vary from country to country and even within provinces of countries. These rights govern the distribution of copyrighted content and media and allow the sole distribution of that content at any one time. An example of content only being aired in certain countries is BBC iPlayer. The BBC checks a user's IP address to make sure that only users located in the UK can stream content from the BBC. The BBC only allows free use of their product for users within the UK as those users have paid for a television license that funds part of the BBC. This IP address check is not foolproof as the user may be accessing the BBC website through a VPN. Broadcasting rights can also be restricted to allowing a broadcaster rights to distribute that content for a limited time. Channel 4's online service 4oD can only stream shows created in the US by companies such as HBO for thirty days after they are aired on one of the Channel 4 group channels. This is to boost DVD sales for the companies who produce that media. Some companies pay very large amounts for broadcasting rights with sports and US sitcoms usually fetching the highest price from UK-based broadcasters.
Internet television
305
Stream quality
Stream quality refers to the quality of the image and audio transferred from the servers of the distributor to the user's home screen. Higher-quality video such as video in high definition (720p+) requires higher bandwidth and faster connection speeds. The generally accepted kbit/s download rate needed to stream high-definition video that has been encoded with H.264 is 3500 kbit/s, whereas standard-definition television can range from 500 to 1500 kbit/s depending on the resolution on screen. In the UK, the BBC iPlayer deals with the largest amount of traffic yet it offers HD content along with SD content. As more people get broadband connections which can deal with streaming HD video over the internet, the BBC iPlayer has tried to keep up with demand and pace. However, as streaming HD video takes around 1.5 gb of data per hour of video the BBC has had to invest a lot of money collected from License Fee payers to implement this on such a large scale.[13] For users which do not have the bandwidth to stream HD video or even high-SD video which requires 1500 kbit/s, the BBC iPlayer offers lower bitrate streams which in turn lead to lower video quality. This makes use of an adaptive bitrate stream so that if the user's bandwidth suddenly drops, iPlayer will lower its streaming rate to compensate. This diagnostic tool offered on the BBC iPlayer site measures a user's streaming capabilities and bandwidth for free.[14] Although competitors in the UK such as 4oD, ITV Player and Demand Five have not yet offered HD streaming, the technology to support it is fairly new and widespread HD streaming is not an impossibility. The availability of Channel 4 and Five content on YouTube is predicted to prove incredibly popular as series such as Skins, Green Wing, The X Factor and others become available in a simple, straightforward format on a website which already attracts millions of people every day.
[15]
Xbox 360
Panasonic, Demand,
ABC iview
Australia
Internet television
306
UK & Ireland Yes Yes Yes Yes PS3, Xbox 360 Virgin Media On Demand Yes
4OD
Channel 4
SeeSaw Hulu
UK US
Yes Yes
RT TG4
TV3 Catch Up TV3 STV Player Global Video Scottish Television Global
References
[1] 'Streaming Guide' List of Online TV Shows in Canada (http:/ / www. streaming-guide. com/ ), 05/16/2011 'Streaming Guide' List of Online TV Shows in Canada. [2] BBC iPlayer 'risks overloading the internet' (http:/ / technology. timesonline. co. uk/ tol/ news/ tech_and_web/ article3716781. ece), The Sunday Times, 04/10/2008 News article regarding BBC iPlayer internet traffic. [3] BBC iPlayer Stats and Facts (http:/ / www. bluestagstudio. co. uk/ blog-3-BBCiPlayer_StatsandFacts), 12/05/2009 Brief blog style entry on BBC iPlayer traffic per month. [4] iPlayer uncovered: What powers the BBC's epic creation? (http:/ / crave. cnet. co. uk/ software/ 0,39029471,49302215,00. htm), 08/05/2009 CNet interview with iPlayer boss Anthony Rose, mostly on iPlayer 3.0 [5] "Aereo Threatens Broadcasters By Streaming Network TV Online" (http:/ / www. huffingtonpost. com/ 2012/ 07/ 20/ aereo-broadcasters-streams-networks-tv_n_1690173. html). July 20, 2012. . [6] Internet television platforms around the world (http:/ / www. international-television. org/ itve/ ) International TV Explorer [7] BBC iPlayer Help (http:/ / iplayerhelp. external. bbc. co. uk/ help/ prog_availability/ how_long) BBC iPlayer [8] International TV Explorer (http:/ / www. international-television. org/ itve/ ) International Television Expert Group [9] "Channel 4's home page for channel 4 content on demand" (http:/ / www. channel4. com/ programmes/ 4od). Channel4.com. . Retrieved 2011-01-02. [10] "New European Initiative Merges Television with the Power of the Internet" (http:/ / www. hbbtv. org/ news/ HBBTV_PR_Final. pdf) (Press release). HbbTV Consortium. August 27, 2009. . [11] "Info page detailing all platforms iPlayer works with" (http:/ / www. bbc. co. uk/ iplayer/ where_to_get_iplayer). Bbc.co.uk. 2010-05-15. . Retrieved 2011-01-02. [12] ["http:/ / www. twice. com/ article/ 468711-Samsung_To_Do_3D_VOD_Streaming. php"Samsung To Do 3D VOD Streaming, May 24, 2011 [13] BBC iPlayer goes HD, adds higher quality streams, releases iPlayer Desktop out of Labs (http:/ / www. bbc. co. uk/ blogs/ bbcinternet/ 2009/ 04/ bbc_iplayer_goes_hd_adds_highe. html), BBC Internet Blog, 20/04/2009 [14] "BBC web page which runs a diagnostic of internet download speeds for streaming remotely" (http:/ / www. bbc. co. uk/ iplayer/ diagnostics). Bbc.co.uk. . Retrieved 2011-01-02. [15] "BBC iPlayer Apps op Android Market" (https:/ / market. android. com/ details?id=bbc. iplayer. android). Market.android.com. . Retrieved 2012-01-14.
Internet television
307
External links
IPTV future (http://www.theregister.co.uk/2006/05/05/iptv_future/) The Register 2006-05-05 As Internet TV Aims at Niche Audiences, the Slivercast Is Born (http://www.nytimes.com/2006/03/12/ business/yourmoney/12sliver.html?ex=1299819600en=b93a73a9426aeb16ei=5088partner=rssnytemc=rss& pagewanted=all) New York Times 2006-03-12 TV's future stars will come from the web (http://www.guardian.co.uk/technology/2008/sep/11/internet. socialnetworking)The Guardian 2008-09-11 Your top web TV (http://www.telegraph.co.uk/culture/tvandradio/3666961/Your-top-web-TV.html)The Telegraph 2007-08-03
308
Social impact
Sociology of the Internet
The sociology of the Internet involves the application of sociological theory and method to the Internet as a source of information and communication. Sociologists are concerned with the social implications of the technology; new social networks, virtual communities and ways of interaction that have arisen, as well as issues related to cyber crime, etc. The Internetthe newest in a series of major information breakthroughsis of interest for sociologists in various ways: as a tool for research, for example, in using online questionnaires instead of paper ones, as a discussion platform, and as a research topic. The sociology of the Internet in the stricter sense concerns the analysis of online communities (e.g. as found in newsgroups), virtual communities and virtual worlds, organizational change catalyzed through new media such as the Internet, and social change at-large in the transformation from industrial to informational society (or to information society). Online communities can be studied statistically through network analysis and at the same time interpreted qualitatively, such as through virtual ethnography. Social change can be studied through statistical demographics or through the interpretation of changing messages and symbols in online media studies.
Research trends
According to DiMaggio et al. (2001),[2] research tends to focus on the Internet's implications in five domains: 1. 2. 3. 4. 5. inequality (the issues of digital divide) community and social capital (the issues of time displacement) political participation (the issues of public sphere, deliberative democracy and civil society) organizations and other economic institutions cultural participation and cultural diversity
Early on there were predictions that the Internet would change everything (or nothing); over time, however, a consensus emerged that the Internet, at least in the current phase of development, complements rather than displaces previously implemented media.[2] This has meant a rethinking of the 1990s ideas of "convergence of new and old media". Further, the Internet offers a rare opportunity to study changes caused by the newly emerged - and likely, still evolving - information and communication technology (ICT).[2]
309
Social impact
The Internet has created new forums of social interaction and social relations including social networking websites such as Facebook and MySpace and sites such as meetup.com and Couchsurfing which facilitate offline interaction. Though virtual communities were once thought to be composed of strictly virtual social ties, researchers often find that even those social ties formed in virtual spaces are often maintained both online and offline [3][4] There are ongoing debates about the impact of the Internet on strong and weak ties, whether the internet is creating more or less social capital,[5][6] the internet's role in trends towards social isolation,[7] and whether it creates a more or less diverse social environment.
Philanthropy
The spread of low-cost internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites such as Donors Choose and Global Giving now allow small-scale donors to direct funds to individual projects of their choice. A popular twist on internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations which post stories and updates on behalf of the borrowers. Lenders can contribute as little as $25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves.[8][9] However, the recent spread of cheap internet access in developing countries has made genuine peer-to-peer connections increasingly feasible. In 2009 the US-based nonprofit Zidisha tapped into this trend to offer the first peer-to-peer microlending platform to link lenders and borrowers across international borders without local intermediaries. Inspired by interactive websites such as Facebook and eBay, Zidisha's microlending platform facilitates direct dialogue between lenders and borrowers and a performance rating system for borrowers. Web users worldwide can fund loans for as little as a dollar.[10]
Leisure
The Internet has been a major source of leisure since before the World Wide Web, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much of the main traffic. Today, many Internet forums have sections devoted to games and funny videos; short cartoons in the form of Flash movies are also popular. Over 6 million people use blogs or message boards as a means of communication and for the sharing of ideas.
Sociology of the Internet The pornography and gambling industries have both taken full advantage of the World Wide Web, and often provide a significant source of advertising revenue for other websites. Although governments have made attempts to censor internet porn, internet service providers have told governments that these plans are not feasible.[11] Also many governments have attempted to put restrictions on both industries' use of the Internet, this has generally failed to stop their widespread popularity. One area of leisure on the Internet is multiplayer gaming. This form of leisure creates communities, bringing people of all ages and origins to enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. This has revolutionized the way many people interact and spend their free time on the Internet. While online gaming has been around since the 1970s, modern modes of online gaming began with services such as GameSpy and MPlayer, to which players of games would typically subscribe. Non-subscribers were limited to certain types of gameplay or certain games. Many use the Internet to access and download music, movies and other works for their enjoyment and relaxation. As discussed above, there are paid and unpaid sources for all of these, using centralized servers and distributed peer-to-peer technologies. Discretion is needed as some of these sources take more care over the original artists' rights and over copyright laws than others. Many use the World Wide Web to access news, weather and sports reports, to plan and book holidays and to find out more about their random ideas and casual interests. People use chat, messaging and e-mail to make and stay in touch with friends worldwide, sometimes in the same way as some previously had pen pals. Social networking websites like MySpace, Facebook and many others like them also put and keep people in contact for their enjoyment. The Internet has seen a growing number of Web desktops, where users can access their files, folders, and settings via the Internet. Cyberslacking has become a serious drain on corporate resources; the average UK employee spends 57 minutes a day surfing the Web at work, according to a study by Peninsula Business Services.[12]
310
References
[1] Robert Darnton, The Library in the New Age (http:/ / www. nybooks. com/ articles/ 21514), The New York Review of Books, Volume 55, Number 10. June 12, 2008. Retrieved on 22 December 2009. [2] Paul DiMaggio, Eszter Hargittai, W. Russell Neuman, and John P. Robinson, Social Implications of the Internet, Annual Review of Sociology, Vol. 27: 307-336 (Volume publication date August 2001), doi:10.1146/annurev.soc.27.1.307 (http:/ / arjournals. annualreviews. org/ doi/ abs/ 10. 1146/ annurev. soc. 27. 1. 307) [3] Lauren F. Sessions, "How offline gatherings affect online community members: when virtual community members meetup.""Information, Communication, and Society"13,3(April, 2010):375-395 [4] Bo Xie, B. The mutual shaping of online and offline social relationships."Information Research, 1,3(2008):n.p. [5] Lee Rainie, John Horrigan, Barry Wellman, and Jeffrey Boase. (2006)"The Strength of Internet Ties" Pew Internet and American Life Project. Washington, D.C. [6] Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication, 12(4). [7] Social Isolation and New Technology Pew Internet and American Life Report (http:/ / www. pewinternet. org/ Reports/ 2009/ 18--Social-Isolation-and-New-Technology. aspx) [8] Kiva Is Not Quite What It Seems (http:/ / blogs. cgdev. org/ open_book/ 2009/ 10/ kiva-is-not-quite-what-it-seems. php), by David Roodman, Center for Global Development, Oct. 2, 2009, as accessed Jan. 2 & 16, 2010 [9] Confusion on Where Money Lent via Kiva Goes (http:/ / www. nytimes. com/ 2009/ 11/ 09/ business/ global/ 09kiva. html?_r=1& scp=1& sq=Kiva& st=cse), by Stephanie Strom, in The New York Times, Nov. 8, 2009, as accessed Jan. 2 & 16, 2010 [10] "Zidisha Set to "Expand" in Peer-to-Peer Microfinance", Microfinance Focus, Feb 2010 (http:/ / www. microfinancefocus. com/ news/ 2010/ 02/ 07/ zidisha-set-to-expand-in-peer-to-peer-microfinance-julia-kurnia/ ) [11] Chivers, Tom (Dec 21 2010). "Internet pornography block plans: other attempts to control the internet" (http:/ / www. telegraph. co. uk/ technology/ internet/ 8215030/ Internet-pornography-block-plans-other-attempts-to-control-the-internet. html). The Telegraph. . Retrieved 24 February 2012.
311
Further reading
John A. Bargh and Katelyn Y. A. McKenna, The Internet and Social Life, Annual Review of Psychology, Vol. 55: 573-590 (Volume publication date February 2004), doi:10.1146/annurev.psych.55.090902.141922 (http:// arjournals.annualreviews.org/doi/abs/10.1146/annurev.psych.55.090902.141922?journalCode=psych) Allison Cavanagh, Sociology in the Age of the Internet, McGraw-Hill International, 2007, ISBN 0-335-21725-7 Christine Hine, Virtual Methods: Issues in Social Research on the Internet, Berg Publishers, 2005, ISBN 1-84520-085-3 Rob Kling, The Internet for Sociologists, Contemporary Sociology, Vol. 26, No. 4 (Jul., 1997), pp.434444 Joan Ferrante-Wallace, Joan Ferrante, Sociology.net: Sociology on the Internet, Thomson Wadsworth, 1996, ISBN 0-534-52756-6 Daniel A. Menchik and Xiaoli Tian. (2008) "Putting Social Context into Text: The Semiotics of Email Interaction." (http://menchik.com/Menchik_Tian_AJS.pdf) The American Journal of Sociology. 114:2 pp.33270. D. R. Wilson, Researching Sociology on the Internet, Thomson/Wadsworth, 2004, ISBN 0-534-62437-5
External links
Sociology and the Internet (http://www.sociology.org.uk/olinset.htm) (A short introduction, originally put-together for delegates to the ATSS 2000 Conference.) Peculiarities of Cyberspace - Building Blocks for an Internet Sociology (http://www.sociosite.org/index_en. php) (Articles the social structure and dynamic of internetcommunities. Presented by dr Albert Benschop, University of Amsterdam.) Communication and Information Technologies Section of the American Sociological Association (http://citasa. org/) The Impact of the Internet on Sociology: The Importance of the Communication and Information Technologies Section of the American Sociological Association (http://www.allacademic.com/meta/ p_mla_apa_research_citation/1/0/4/1/6/p104169_index.html) Sociology and the Internet (http://camden-www.rutgers.edu/~wood/445syl.html) (course) Sociology of the Internet (http://web.archive.org/web/20091026213335/http://geocities.com/ ResearchTriangle/1214/) (link collection) Internet sociologist (http://www.vts.intute.ac.uk/he/tutorial/sociologist) The Sociology of the Internet (http://www-frd.fsl.noaa.gov/~moninger/NOAATech2002/Relaxation.html)
Internet censorship
312
Internet censorship
Internet censorship is the control or suppression of the publishing of, or access to information on the Internet. It may be carried out by governments or by private organizations at the behest of government, regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences. Opinions on the topic of Internet censorship vary, with arguments being made both for and against censorship. Moreover, the extent of Internet censorship varies on a country-to-country basis. While some countries have little Internet censorship, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the Arab Spring. Other areas of censorship includes copyrights, defamation, harassment, and obscene material.
Overview
The events associated with Internet censorship are similar to those for online/offline censorship of traditional/modern media such as newspapers or internet. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.[1] Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies: A 1993 Time Magazine article quotes computer scientist John Gilmore, one of the founders of the Electronic Frontier Foundation, as saying "The Net interprets censorship as damage and routes around it."[2] In November 2007, "Father of the Internet" Vint Cerf stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.[3] A report of research conducted in 2007 and published in 2009 by the Berkman Center for Internet & Society at Harvard University stated that: "We are confident that the [ censorship circumvention ] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools".[4] In contrast, a 2011 report by researchers at the Oxford Internet Institute published by UNESCO concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."[1] Blocking and filtering can be based on relatively static blacklists or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, for example in libraries, universities or Internet cafes. Blocking and filtering may also vary within a country across different ISPs.[5] Countries may filter sensitive content on an on-going basis and/or introduce temporary filtering during key time periods such as elections. In some cases the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake "Not Found" error message when an attempt is made to access a blocked web.[6] Unless the censor has total control over all Internet-connected computers, such as in North Korea or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee
Internet censorship material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.[1] The term "splinternet" is sometimes used to describe the effects of national firewalls. The verb "rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.[7]
313
Internet censorship (China, Iran, Myanmar, and Tajikistan).[1][9] Freedom on the Net reports In the 2011 edition of Freedom House's report Freedom on the Net, of the 37 countries surveyed, 8 were rated as "free" (22%), 18 as "partly free" (49%), and 11 as "not free" (30%).[15] In their 2009 report, of the 15 countries surveyed, 4 were rated as "free" (27%), 7 as "partly free" (47%), and 4 as "not free" (27%).[16] And of the 15 countries surveyed in both 2009 and 2011, 5 were seen to be moving in the direction of more network freedom (33%), 9 moved toward less freedom (60%), and one was unchanged (7%). "Internet enemies" and "countries under surveillance" lists In 2006, Reporters Without Borders (Reporters sans frontires, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet".[17] The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users."[18] In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added. Both lists are updated annually.[19]
Enemies of the Internet: Armenia Bahrain Belarus Burma Mainland China Cuba [10] Iran North Korea Countries Under Surveillance: Australia Egypt Eritrea France India Kazakhstan Malaysia Russia [10] South Korea Sri Lanka Thailand Tunisia Turkey United Arab Emirates
314
When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. Belarus, Egypt, and Tunisia moved to the "Countries under surveillance" list in 2009, 2011, and 2011 respectively. Belarus moved back and Bahrain was added to the list in 2012. When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 14. In addition to the moves to and from the "Enemies of the Internet" list noted earlier, Jordan in 2009, Tajikistan in 2009, and Yemen in 2010 were dropped from the list and Australia in 2009, France in 2011, Russia in 2010, South Korea in 2009, Turkey in 2010 were added. Bahrain, Eritrea, Malaysia, and Sri Lanka dropped from the list in 2010, but were added again in 2011. Libya dropped from the list in 2009, added again in 2011, and then dropped in 2012. Venezuela was added in 2011 and then dropped in 2012. BBC World Service global public opinion poll A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[20] was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that: Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most dont want governments to regulate it.[21] Findings from the poll include:[21] Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom. Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
Internet censorship Opinion was evenly split between Internet users who felt that the internet is a safe place to express my opinions (48%) and those who disagreed (49%). Somewhat surprisingly users in Germany and France agreed the least, followed by users in highly filtered countries such as the People's Republic of China and South Korea, while users in Egypt, India and Kenya agreed more strongly.[1] The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%). Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion).[22] And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Japan, 11% in the U.S., 11% in Kenya, 11% in Pakistan, and 10% in Canada strongly disagree).[1]
315
Arab Spring
See also: Internet Censorship in the Arab Spring, 2011 Egyptian Internet shutdown, and Free speech in the media during the 2011 Libyan civil war During the Arab Spring of 2011, media jihad (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.[24] This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt[25][26][27] and Libya in 2011.[28][29] In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian regime. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient TV, and Dubai-based al-Arabia TV.[30] In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved Tunisia and Egypt from its "Internet enemies" list to its list of countries "under surveillance"[31] and in 2012 dropped Libya from the list entirely.[10] At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring.[32][33]
Internet censorship
316
Common targets
There are several motives or rationales for Internet censorship: politics and power, social norms and morals, and security concerns. Protecting intellectual property rights and existing economic interests are two additional motives for Internet censorship. In addition, networking tools and applications that allow the sharing of information related to these motives are themselves subjected to filtering and blocking. And while there is considerable variation from country to country, the blocking of web sites in a local language is roughly twice that of web sites available only in English or other international languages.[6]
Nazi and similar websites particularly in France and Germany[36] Sites that contain blasphemous content, particularly when directed at a majority or state supported religion Sites that contain defamatory, slanderous, or libelous content Sites that include political satire
Internet censorship
317
Security concerns
Many organisations implement filtering as part of a defence in depth strategy to protect their environments from malware,[37] and to protect their reputations in the event of their networks being used, for example, to carry out sexual harassment. Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.[6] Examples include: Blocking of proNorth Korean sites by South Korea[38] Blocking sites of groups that foment domestic conflict in India Blocking of sites of the Muslim Brotherhood in some countries in the Middle East Blocking Wikileaks[39] Blocking sites such as 4chan thought to be related to the group Anonymous[40]
Network tools
Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.[6] Examples include: Media sharing websites (e.g. Flickr and YouTube)[43] Social networks (e.g. Facebook and MySpace) Translation sites and tools E-mail providers Web hosting sites Blog hosting sites such as Blogspot Microblogging sites such as Twitter and Weibo[44] Wikipedia Censorship circumvention sites Anonymizers Proxy avoidance sites Search engines such as Bing[45] and Google[46][47] particularly in Mainland China and Cuba[48]
Internet censorship
318
Technical censorship
Approaches Internet content is also subject to technical censorship methods, including:[1][52] Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses. Domain name system (DNS) filtering and redirection: Blocked domain names are not resolved, or an incorrect IP address is returned via DNS hijacking or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find a Alternative DNS root that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser. Uniform Resource Locator filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.[53] Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored. Typical circumvention methods are to use encrypted connections such as VPN and TLS/SSL to escape the HTML content, or by reducing the TCP/IP stack's MTU/MSS to reduce the amount of text contained in a given packet.
Internet censorship Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.[54] Network disconnection: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). This appears to have been the case on 27/28 January 2011 during the 2011 Egyptian protests, in what has been widely described as an "unprecedented" internet block.[26][27] About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January.[26] This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."[26] Full blocks also occurred in Myanmar/Burma in 2007[55], Libya in 2011[28], and Syria in 2012. Portal censorship and search result removal: Major portals, including search engines, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect as censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example Google.de [56] and Google.fr [57] remove Neo-Nazi and other listings in compliance with German and French law.[58] Computer network attacks: Denial-of-service attacks and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.[59] See also Internet forum#Word censor and Anti-spam techniques#Detecting spam. Over- and under-blocking Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired.[1] An example is that automatic censorship against sexual words in matter for children, set to block the word "cunt", has been known to block the Lincolnshire placename Scunthorpe.[60] Another example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.[61] According to a report produced in 1997 by the gay rights group GLAAD, many 90s-era Internet censorship software products prevent access to non-pornographic LGBT-related material. GLAAD argued that this is disempowering and dangerous for young LGBT people.[62] Use of commercial filtering software Writing in 2009 Ronald Deibert, professor of political science at the University of Toronto and co-founder and one of the principal investigators of the OpenNet Initiative, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University and an Op-Ed contributor to the New York Times, explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online Screenshot of Websense blocking Facebook in an content filtering worldwide. While the off-the-shelf filtering software organisation where it has been configured to block a category named "Personals and Dating" sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.[63][64]
319
Internet censorship Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee in 2008. SmartFilter has been used by Tunisia, Saudi Arabia, Sudan, the UAE, Kuwait, Bahrain, Iran, and Oman, as well as the United States and the UK.[65] Myanmar and Yemen have used filtering software from Websense. The Canadian-made commercial filter Netsweeper[66] is used in Qatar, the UAE, and Yemen.[14] In a U.S. lawsuit filed in May 2011, Cisco Systems is accused of helping the Chinese Government build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents. Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.[67] Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), ....[14] The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites.[63] The blocking of DailyMotion in early 2007 by Tunisian authorities was, according to the OpenNet Initiative, due to Secure Computing wrongly categorizing DailyMotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked DailyMotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to DailyMotion was gradually restored in Tunisia.[68] Organizations such as the Global Network Initiative, the Electronic Frontier Foundation, Amnesty International, and the American Civil Liberties Union have successfully lobbied some vendors such as Websense to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly.[69][70][71] Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.[14]
320
Circumvention
Internet censorship circumvention is the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet, because filtering and blocking do not remove content from the Internet but rather block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However circumvention may not be possible by non tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.[1] Different techniques and resources are used to bypass Internet censorship, including proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.[72] In June 2011 the New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by
321
Internet censorship
322
References
This article incorporates licensed material [81] from the OpenNet Initiative web site.[82]
[1] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet (http:/ / www. unesco. org/ new/ en/ communication-and-information/ resources/ publications-and-communication-materials/ publications/ full-list/ freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4 [2] "First Nation in Cyberspace" (http:/ / www. chemie. fu-berlin. de/ outerspace/ internet-article. html), Philip Elmer-Dewitt, Time, 6 December 1993, No.49 [3] "Cerf sees government control of Internet failing" (http:/ / www. reuters. com/ article/ reutersEdge/ idUSN1420689320071114?sp=true), Pedro Fonseca, Reuters, 14 November 2007 [4] 2007 Circumvention Landscape Report: Methods, Uses, and Tools (http:/ / cyber. law. harvard. edu/ sites/ cyber. law. harvard. edu/ files/ 2007_Circumvention_Landscape. pdf), Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009 [5] ed. Chadwick, Andrew (2009). Routledge handbook of Internet politics (http:/ / books. google. com/ books/ about/ Routledge_handbook_of_Internet_politics. html?id=GJdfuGSa1xUC). Routledge international handbooks. Taylor and Francis. pp.332. ISBN978-0-415-42914-6. . [6] "Measuring Global Internet Filtering" (http:/ / opennet. net/ sites/ opennet. net/ files/ Deibert_02_Ch01_005-028. pdf), Robert Faris and Nart Villeneuve, in Access Denied: The Practice and Policy of Global Internet Filtering (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=11329), Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 [7] Lao Wai (21 October 2007). "I've Been Rivercrabbed!" (http:/ / americaninbeijing. blogspot. com/ 2007/ 10/ ive-been-rivercrabbed. html). An American In Beijing. . Retrieved 28 May 2011. [8] OpenNet Initiative "Summarized global Internet filtering data spreadsheet" (http:/ / opennet. net/ research/ data), 8 November 2011 and "Country Profiles" (http:/ / opennet. net/ research/ profiles), the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa [9] Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. [10] Internet Enemies (http:/ / march12. rsf. org/ i/ Report_EnemiesoftheInternet_2012. pdf), Reporters Without Borders (Paris), 12March 2012 [11] "Introduction" (http:/ / mitpress. mit. edu/ books/ chapters/ 0262541963intro1. pdf), Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=11329), Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 [12] "Internet Filtering: The Politics and Mechanisms of Control" (http:/ / opennet. net/ sites/ opennet. net/ files/ Deibert_03_Ch02_029-056. pdf), Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=11329), Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 [13] "2010 Country Reports on Human Rights Practices" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ index. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [14] "West Censoring East: The Use of Western Technologies by Middle East Censors, 20102011" (http:/ / opennet. net/ west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011), Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011 [15] Freedom on the Net 2011 (http:/ / www. freedomhouse. org/ template. cfm?page=664), Freedom House. Retrieved 1 September 2011 [16] Freedom on the Net 2009 (http:/ / freedomhouse. org/ template. cfm?page=383& report=79), Freedom House. Retrieved 1 September 2011 [17] List of the 13 Internet enemies (http:/ / en. rsf. org/ list-of-the-13-internet-enemies-07-11-2006,19603) Reporters Without Borders (Paris), 11July 2006. [18] "Internet enemies" (http:/ / www. rsf. org/ IMG/ pdf/ Internet_enemies_2009_2_. pdf), Reporters Without Borders (Paris), 12March 2009. [19] Web 2.0 versus Control 2.0. (http:/ / www. rsf. org/ ennemis. html) Reporters Without Borders (Paris), 18March 2010. [20] For the BBC poll Internet users are those who used the Internet within the previous six months. [21] "BBC Internet Poll: Detailed Findings" (http:/ / news. bbc. co. uk/ 1/ shared/ bsp/ hi/ pdfs/ 08_03_10_BBC_internet_poll. pdf), BBC World Service, 8 March 2010 [22] "Internet access is 'a fundamental right'" (http:/ / news. bbc. co. uk/ 2/ hi/ 8548190. stm), BBC News, 8 March 2010 [23] ed. Chadwick (2009). pp.331. [24] "The Arab Springs Cascading Effects" (http:/ / www. miller-mccune. com/ politics/ the-cascading-effects-of-the-arab-spring-28575/ ), Philip N. Howard, Miller-McCune, 23 February 2011 [25] "Middle East Political Protest And Internet Traffic Report: February 1220, 2011" (http:/ / monkey. org/ ~labovit/ blog/ / viewpage. php?page=middle_east_scorecard_feb20), Craig Labovitz, Arbor Networks [26] Cowie, James. "Egypt Leaves the Internet" (http:/ / www. renesys. com/ blog/ 2011/ 01/ egypt-leaves-the-internet. shtml). Renesys. Archived (http:/ / www. webcitation. org/ 5w51j0pga) from the original on 28 January 2011. . Retrieved 28 January 2011.
Internet censorship
[27] Kirk, Jeremy (28 January 2011). "With Wired Internet Locked, Egypt Looks to the Sky" (http:/ / www. pcworld. com/ businesscenter/ article/ 218064/ with_wired_internet_locked_egypt_looks_to_the_sky. html). IDG News/PC World. Archived (http:/ / www. webcitation. org/ 5w518Yu9B) from the original on 28 January 2011. . Retrieved 28 January 2011. [28] "Journalists confined to their hotels, Internet disconnected" (http:/ / en. rsf. org/ journalists-confined-to-their-04-03-2011,39681. html). Journalists confined to their hotels, Internet disconnected. Reporters Without Borders. . Retrieved 21 March 2011. [29] Dainotti et al. (2011). "Analysis of Country-wide Internet Outages Caused by Censorship" (http:/ / www. caida. org/ publications/ papers/ 2011/ outages_censorship/ outages_censorship. pdf). ACM. . [30] "Syrian Electronic Army: Disruptive Attacks and Hyped Targets" (http:/ / opennet. net/ syrian-electronic-army-disruptive-attacks-and-hyped-targets), OpenNet Initiative, 25 June 2011 [31] "Countries under surveillance: Egypt" (http:/ / en. rsf. org/ surveillance-egypt,39740. html), Reporters Without Borders, March 2011 [32] "Censorship fallout from the Arab Spring?" (http:/ / www. future500. org/ blog/ censorship-fallout-from-the-arab-spring/ ), Juliette Terzieff, The Future 500, 29 June 2011 [33] "Insight: Social media a political tool for good or evil?" (http:/ / ca. reuters. com/ article/ technologyNews/ idCATRE78R3CM20110928?pageNumber=1& virtualBrandChannel=0), Peter Apps, Reuters Canada, 28 September 2011 [34] Blog censorship gains support | CNET News.com (http:/ / www. news. com/ Blog-censorship-gains-support/ 2100-1028_3-5670096. html) [35] "Erowid Interview" (http:/ / erowidethnography. files. wordpress. com/ 2011/ 05/ erowid-interview. pdf). . Retrieved 26 May 2011. [36] "Latest Stories From News.Com.Au" (http:/ / www. theaustralian. news. com. au/ story/ 0,25197,22885402-12335,00. html). . [37] "Why Malware Filtering Is Necessary in the Web Gateway" (http:/ / www. gartner. com/ id=747218). Gartner. 26 August 2008. . Retrieved 14 April 2012. [38] "Collateral Blocking: Filtering by South Korean Government of Pro-North Korean Websites" (http:/ / opennet. net/ bulletins/ 009/ ), OpenNet Initiative: Bulletin 009, 31 January 2005 [39] Press release from WIkileaks concerning Australian censorship (http:/ / wikileaks. org/ wiki/ Australia_secretly_censors_Wikileaks_press_release_and_Danish_Internet_censorship_list,_16_Mar_2009) [40] "Federal authorities take on Anonymous hackers" (http:/ / www. washingtonpost. com/ politics/ federal-authorities-take-on-anonymous-hackers/ 2011/ 09/ 11/ gIQAYrhgMK_story. html), Associated Press in the Washington Post, 12 September 2011 [41] Rick Falkvinge (9 July 2011). "The Copyright Lobby Absolutely Loves Child Pornography" (https:/ / torrentfreak. com/ the-copyright-lobby-absolutely-loves-child-pornography-110709/ ) (in en). TorrentFreak. . Retrieved 26 July 2012. [42] Christian Engstrm (27 April 2010). "IFPIs child porn strategy" (https:/ / christianengstrom. wordpress. com/ 2010/ 04/ 27/ ifpis-child-porn-strategy/ ) (in en). . Retrieved 26 July 2012. [43] YouTube Blocked inThailand (http:/ / mashable. com/ 2007/ 03/ 11/ youtube-blocked-inthailand/ ) [44] "China struggles to tame microblogging masses" (http:/ / www. independent. co. uk/ life-style/ gadgets-and-tech/ china-struggles-to-tame-microblogging-masses-2351509. html), Agence France-Presse (AFP) in The Independent, 8 September 2011 [45] "Sex, Social Mores, and Keyword Filtering: Microsoft Bing in the "Arabian Countries (http:/ / opennet. net/ sex-social-mores-and-keyword-filtering-microsoft-bing-arabian-countries)", Helmi Noman, OpenNet Initiative, March 2010 [46] "Google Search & Cache Filtering Behind China's Great Firewall" (http:/ / opennet. net/ bulletins/ 006/ ), OpenNet Initiative: Bulletin 006, 3 September 2004 [47] "Empirical Analysis of Google SafeSearch" (http:/ / cyber. law. harvard. edu/ archived_content/ people/ edelman/ google-safesearch/ ), Benjamin Edelman, Berkman Center for Internet & Society, Harvard Law School, 13 April 2003 [48] "China blocking Google" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 2231101. stm). BBC News. 2 September 2002. . Retrieved 5 May 2010. [49] "In Mexico, Social Media Become a Battleground in the Drug War" (http:/ / thelede. blogs. nytimes. com/ 2011/ 09/ 15/ in-mexico-social-media-becomes-a-battleground-in-the-drug-war/ ), J. David Goodman, The Lede, New York Times, 15 September 2011 [50] Provision of information in this fashion is in keeping with principles of freedom of expression, as long as it is done transparently and does not overwhelm alternative sources of information. [51] "Chinas growing army of paid internet commentators" (http:/ / blog. freedomhouse. org/ weblog/ 2011/ 10/ chinas-growing-army-of-paid-internet-commentators. html), Sarah Cook and Maggie Shum, Freedom House, 11 October 2011 [52] "Empirical Analysis of Internet Filtering in China: Technical Appendix" (http:/ / cyber. law. harvard. edu/ filtering/ china/ appendix-tech. html), Jonathan Zittrain and Benjamin Edelman, Berkman Center for Internet & Society at Harvard Law School, 20 March 2003 [53] For an example, see Wikipedia:Advice to users using Tor to bypass the Great Firewall [54] Academics break the Great Firewall of China (http:/ / www. zdnetasia. com/ news/ security/ 0,39044215,39372326,00. htm) [55] "Pulling the Plug: A Technical Review of the Internet Shutdown in Burma", OpenNet Initiative, November 2007 (http:/ / opennet. net/ research/ bulletins/ 013) [56] http:/ / www. google. de/ [57] http:/ / www. google. fr/ [58] Google excluding controversial sites (http:/ / news. com. com/ 2100-1023-963132. html), Declan McCullagh, CNET News, 23 October 2002, 8:55pm PDT. Retrieved 22 April 2007 00:40 UTC [59] "The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army" (http:/ / opennet. net/ emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army), Helmi Noman,
323
Internet censorship
OpenNet Initative, May 2011 [60] Declan McCullagh (23 April 2004). "Google's chastity belt too tight" (http:/ / news. cnet. com/ 2100-1032_3-5198125. html). . [61] "India blocks Yahoo! Groups" (http:/ / www. theregister. co. uk/ 2003/ 09/ 24/ india_blocks_yahoo_groups/ ), Andrew Orlowski, The Register, 24 September 2003 [62] "Access Denied" (http:/ / web. archive. org/ web/ 19990117013223/ http:/ / www. glaad. org/ glaad/ access_denied/ index. html). GLAAD. Archived from the original (http:/ / www. glaad. org/ glaad/ access_denied/ index. html) on 17 January 1999. . Retrieved 5 May 2012. [63] ed. Chadwick (2009). pp.330331. [64] "Political Repression 2.0" (http:/ / www. nytimes. com/ 2011/ 09/ 02/ opinion/ political-repression-2-0. html), Evgeny Morzov, Op-Ed Contributor to the New York Times, 1 September 2011 [65] Glanville, Jo (17 November 2008). "The big business of net censorship" (http:/ / www. guardian. co. uk/ commentisfree/ 2008/ nov/ 17/ censorship-internet). The Guardian (London). . [66] "Internet content filtering" (http:/ / www. netsweeper. com/ index. php?page=netsw_prod_content_filtering), Netsweeper, Inc. web site. Retrieved 1 September 2011 [67] "Group Says It Has New Evidence of Ciscos Misdeeds in China" (http:/ / www. nytimes. com/ 2011/ 09/ 03/ technology/ group-says-it-has-new-evidence-of-ciscos-misdeeds-in-china. html), Somini Sengupta, New York Times, 2 September 2011 [68] ed. Chadwick (2009). pp.323324. [69] The Rhode Island affiliate, American Civil Liberties Union (April 2005). "R.I. ACLU releases report on "troubling" internet censorship in public libraries" (http:/ / web. archive. org/ web/ 20081205070114/ http:/ / www. riaclu. org/ 20050418. html). Archived from the original (http:/ / www. riaclu. org/ 20050418. html) on 8 December 2008. . full report (http:/ / www. riaclu. org/ friendly/ documents/ 2005libraryinternetreport. pdf) [70] Sutton, Maira; Timm, Trevor (7 November 2011). "This Week in Internet Censorship Egypt Imprisons Alaa, Other Pro-democracy Bloggers" (https:/ / www. eff. org/ deeplinks/ 2011/ 11/ week-internet-censorship ). Electronic Frontier Foundation. . Retrieved 27 March 2012. [71] China: Controls tighten as Internet activism grows (http:/ / www. amnesty. org/ en/ library/ asset/ ASA17/ 001/ 2004/ en/ 9dc9d9e2-d64d-11dd-ab95-a13b602c0642/ asa170012004en. pdf) "Cisco Systems, Microsoft, Nortel Networks, Websense and Sun Microsystems", citing Amnesty International: Peoples Republic of China: State Control of the Internet in China, ASA, 17/007/2002, November 2002. [72] "Risks" (http:/ / en. cship. org/ wiki/ Risks), Internet censorship wiki. Retrieved 2 September 2011 [73] "U.S. Underwrites Internet Detour Around Censors" (http:/ / www. nytimes. com/ 2011/ 06/ 12/ world/ 12internet. html?pagewanted=all), James Glanz and John Markoff, New York Times, 12 June 2011 [74] "Statement of Rights and Responsibilities" (http:/ / www. facebook. com/ terms. php), Facebook, 26 April 2011. Retrieved 18 August 2011 [75] "Google Terms of Service" (http:/ / www. google. com/ intl/ en/ policies/ terms/ ), Policies & Principles, Google, Inc.. Retrieved 1 April 2012 [76] "Why does Google remove sites from the Google index?" (http:/ / www. google. com/ support/ webmasters/ bin/ answer. py?answer=40052), Google Webmaster Tools Help. Retrieved 22 April 2007 00:43 UTC [77] "Terms of Service" (http:/ / twitter. com/ tos), Twitter, 1 June 2011. Retrieved 18 August 2011 [78] "Terms of Service" (http:/ / www. youtube. com/ static?gl=US& template=terms), YouTube, 9 June 2010. Retrieved 18 August 2011 [79] "Deletion policy", Wikipedia. Retrieved 18 August 2011 [80] "Yahoo! Terms of Service" (http:/ / info. yahoo. com/ legal/ us/ yahoo/ utos/ utos-173. html), Yahoo!, 24 November 2008. Retrieved 18 August 2011 [81] http:/ / creativecommons. org/ licenses/ by/ 3. 0/ us/ [82] Creative Commons Attribution 3.0 Unported license (http:/ / creativecommons. org/ licenses/ by/ 3. 0/ deed. en), see the lower right corner of pages at the OpenNet Initiative web site (http:/ / opennet. net/ )
324
External links
Censorship Wikia (http://censorship.wikia.com/), an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship. How to Bypass Internet Censorship (http://www.howtobypassinternetcensorship.org/), also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp. "Index on Censorship" (http://indexoncensorship.org), web site for the London based organization and magazine that promotes freedom of expression. Internet censorship wiki (http://en.cship.org/wiki/Main_Page), provides information about different methods of access filtering and ways to bypass them.
Internet censorship "Media Freedom Internet Cookbook" (http://www.osce.org/fom/13836) by the OSCE Representative on Freedom of the Media, Vienna, 2004. Discussion (http://cyber.law.harvard.edu/interactive/events/2008/03/access_denied) of global net filtering, Berkman Center for Internet & Society, Harvard, March 2008 Global survey (http://web20summit.blip.tv/file/1450774) of Web filtering & blocking: Rebecca MacKinnon at Web 2.0 Summit, November 2008 "Free Speech in the Age of YouTube" (http://www.nytimes.com/2012/09/23/sunday-review/ free-speech-in-the-age-of-youtube.html) in the New York Times, 22 September 2012
325
326
Methods
There are many methods available that may allow the circumvention of Internet filtering. They range from the simple to the complex and from the trivial to the difficult in terms of implementation. Of course, not all methods will work to bypass all filters. And censorship tools and sites are themselves subject to censorship and monitoring. Circumventing censorship using proxies gives access to international content, but doesnt address domestic censorship and access to more local content. Nor does it offer a defense against DDoS or other attacks that target a publisher.[4][5]
Cached Pages
Some search engines keep cached pages, copies of previously indexed Web pages, and these pages are not always blocked. Cached pages may be identified with a small link labeled "cached" in a list of search results. Google allows the retrieval of cached pages by entering "cache:some-blocked-url" as a search request.
RSS aggregators
RSS aggregators such as Google Reader and Bloglines may be able to receive and pass on RSS feeds that are blocked when accessed directly.
327
Proxy websites
Proxy websites are often the simplest and fastest way to access banned websites in censored nations. Such websites work by being themselves un-blocked, but capable of displaying the blocked material. This is usually accomplished by entering a URL which the proxy website will fetch and display. Using the https protocol is recommended since it is encrypted and harder to block. A list of web proxies is available from web sites such as http:/ / www. proxy. org/ or by searching for "free web proxy". Most modern web browsers have preferences or allow plug-ins to enable proxies. Translation services such as babelfish.yahoo.com [10] and translate.google.com [11] are a specific type of proxy website and can sometimes be used to display blocked pages even when no translation is needed by asking for a translation into the same language that is used on the original site or by asking for a translation from a language that does not appear on the original site.
Reverse Proxy
A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching. Websites could use reverse proxy to reroute traffic to avoid censorship.[12]
Sneakernets
The Sneakernet is the transfer of electronic information, especially computer files, by physically carrying data on storage media from one place to another. A sneakernet can move data regardless of network restrictions simply by not using the network at all.[13]
Software
Types: CGI proxies use a script running on a web server to perform the proxying function. A CGI proxy client sends the requested url embedded within the data portion of an HTTP request to the CGI proxy server. The CGI proxy server pulls the ultimate destination information from the data embedded in the HTTP request, sends out its own HTTP request to the ultimate destination, and then returns the result to the proxy client. A CGI proxy tool's security can be trusted as far as the operator of the proxy server can be trusted. CGI proxy tools require no manual configuration of the browser or client software installation, but they do require that the user use an alternative, potentially confusing browser interface within the existing browser. HTTP proxies send HTTP requests through an intermediate proxying server. A client connecting through an HTTP proxy sends exactly the same HTTP request to the proxy as it would send to the destination server unproxied. The HTTP proxy parses the HTTP request; sends its own HTTP request to the ultimate destination server; and then returns the response back to the proxy client. An HTTP proxy tool's security can be trusted as far as the operator of the proxy server can be trusted. HTTP proxy tools require either manual configuration of the browser or client side
Internet censorship circumvention software that can configure the browser for the user. Once configured, an HTTP proxy tool allows the user transparently to use his normal browser interface. Application proxies are similar to HTTP proxies, but support a wider range of online applications. Peer-to-peer systems store content across a range of participating volunteer servers combined with technical techniques such as re-routing to reduce the amount of trust placed on volunteer servers or on social networks to establish trust relationships between server and client users. Peer-to-peer system can be trusted as far as the operators of the various servers can be trusted or to the extent that the architecture of the peer-to-peer system limits the amount of information available to any single server and the server operators can be trusted not to cooperate to combine the information they hold. Re-routing systems send requests and responses through a series of proxying servers, encrypting the data again at each proxy, so that a given proxy knows at most either where the data came from or is going to, but not both. This decreases the amount of trust required of the individual proxy hosts.
Name alkasir [14] Type HTTP proxy Developer Yemeni journalist Walid al-Saqaf Cost free Web site www.alkasir.com [15] Notes Uses 'split-tunneling' to only redirect to proxy servers when blocking is encountered. Is not a general circumvention solution and only allows access to certain blocked websites. In particular it does not allow access to blocked websites that contain pornography, nudity or similar adult content. [17] Transparently tunnels traffic through Anonymizer. Turn a computer into a personal, encrypted proxy server capable of retrieving and displaying web pages to users of the server. CGIProxy is the engine used by many other circumvention systems. Turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages for others. Uses a range of open proxies to access blocked web sites via DIT's DynaWeb anti-censorship network. A decentralized, distributed data store using contributed bandwidth and storage space of member computers to provide strong anonymity protection. Provides a secure and anonymous Internet connection. Supports multiple applications, including Web browsers, multimedia players, email, instant messengers, and download managers. [31] A SOCKS server, managing all data transmissions between the computer and the network. Supports multiple applications.
328
Anonymizer
[16]
HTTP proxy
Anonymizer, Inc.
fee
www.anonymizer.com/
CGIProxy
[18]
HTTP proxy
James Marshall
free
www.jmarshall.com/
[19]
Circumventor
[20]
CGI proxy
Peacefire
free
peacefire.org/
[21]
[22] Freegate
HTTP proxy
free
www.dit-inc.us
[23]
Freenet
[24]
peer-to-peer
Ian Clarke
free
freenetproject.org
[25]
[26]
HTTP proxy
Tenebril, Inc.
fee
www.tenebril.com [29]
[27]
GPass
Application proxy
free
gpass1.com/
HTTP Tunnel
[30]
Application proxy
HTTP-Tunnel Corporation
www.http-tunnel.com
329
I2P Project free Uses a pseudonymous overlay network to allow anonymous web browsing, chatting, file transfers, amongst other features. Uses the underlying anonymity service AN.ON to allow browsing with revocable pseudonymity. Originally developed as part of a project of the Technische Universitt Dresden, the Universitt Regensburg, and the Privacy Commissioner of Schleswig-Holstein. A simple-to-administer Internet censorship circumvention system that can be scaled for use by a home user serving a few friends to a cloud-based infrastructure serving thousands. An encrypted, public, web-based circumvention system. Because the site is public, it is blocked in many countries and by most filtering applications. Uses an encrypted VPN tunnel to access the Relakks servers in Sweden. [44] An encrypted, public, web-based circumvention system. Because the site is public, it is blocked in many countries and by most filtering applications. [45] mousematrix.com is a similar site based on the same software. Allows users to bypass Internet censorship while providing strong anonymity. Anti-censorship product that allows users in countries with heavy internet censorship to protect their internet privacy and security. Simple unobtrusive proxy. Uses RSA to encrypt the requests, transports via normal HTTP connections. For the gateway, a machine with uncensored internet access, is required.
re-routing
www.i2p2.de/
re-routing (fixed)
Jondos GmbH
anonymous-proxy-servers.net [35]
Psiphon
[36][37]
CGI proxy
Psiphon, Inc.
free
psiphon.ca
[38]
Proxify
[39]
HTTP proxy
UpsideOut, Inc.
proxify.com/
[40]
Relakks
[41]
StupidCensorship
free
www.torproject.org
[47]
www.ultrasurf.us/
[49]
scotty
[50]
HTTP proxy
OpenSource
free
www.scotty-transporter.org/ [51]
Summary
The Berkman Center for Internet & Society's 2007 Circumvention Landscape Report included the following observations:[53] We were reassured to discover that most [circumvention] tools function as intended. They allow users to circumvent Internet censorship, even in countries like China and Vietnam, which use sophisticated technology to filter. However, we discovered that all tools slow down access to the Internet, that most tools featured
Internet censorship circumvention serious security holes [some of which were patched during or shortly after the study], and that some tools were extremely difficult for a novice Internet user to use. ...we guess that the number of people using circumvention tools is around two to five million users worldwide. This number is quite high in absolute terms but quite low relative to the total number of filtered Internet users (China alone has over two hundred million Internet users). Even accepting likely high end estimates of the project developers, we believe that less than two percent of all filtered Internet users use circumvention tools. ... we now think it likely that simple web proxies represent at least as great if not greater proportion of circumvention tool usage as do the more sophisticated tools included in this report. An assumption of this report was that only users at the margins would rely on simple proxies because of the trouble of constantly finding new proxies as old ones were blocked by countries. We now have some evidence that that assumption is false (both that users are not using the simple proxies and that filtering countries are blocking simple proxies quickly). Its worth nothing that none of the developers we spoke to, individually and at our convening, foresaw a silver bullet that would solve the problem of filtering circumvention. All the tools rely, to a certain degree, on providing more proxies than the authorities can block and continuing to create new proxies as old ones are blocked. The preferred technical term for this strategy is Whack a Mole, a reference to an American fairground game, and while none of the developers are thrilled about an ongoing arms race with censors, some are taking complex steps to ensure theyll have many more proxies than the government can shut down. We are confident that the tool developers will for the most part keep ahead of the governments' blocking efforts.
330
References
[1] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet (http:/ / www. unesco. org/ new/ en/ communication-and-information/ resources/ publications-and-communication-materials/ publications/ full-list/ freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4 [2] New Technologies Battle and Defeat Internet Censorship (http:/ / www. internetfreedom. org/ files/ WhitePaper/ TechnologiesBattleAndDefeatInternetCensorship70920. pdf), Global Internet Freedom Consortium, 20 September 2007 [3] "Risks" (http:/ / en. cship. org/ wiki/ Risks), Internet censorship wiki, accessed 2 September 2011 [4] Everyone's Guide to By-passing Internet Censorship (http:/ / www. nartv. org/ mirror/ circ_guide. pdf), The Citizen Lab, University of Toronto, September 2007 [5] "Circumventing Network Filters Or Internet Censorship Using Simple Methods, VPNs, And Proxies" (http:/ / www. notascoolasitseems. com/ review/ circumventing-network-filters-or-internet-censorship-using-simple-methods-vpns-and-proxies), Not As Cool As It Seems, 16 December 2009, accessed 16 September 2011 [6] http:/ / www. archive. org/ [7] http:/ / www. web2mail. com [8] http:/ / code. google. com/ speed/ public-dns/ [9] http:/ / pcsupport. about. com/ od/ tipstricks/ a/ free-public-dns-servers. htm [10] http:/ / babelfish. yahoo. com/ [11] http:/ / translate. google. com [12] "faq of unblock.cn.com" (https:/ / unblock. cn. com/ faq). unblock.cn.com. . [13] Sullivan, Bob (13 April 2006) Military Thumb Drives Expose Larger Problem (http:/ / redtape. msnbc. com/ 2006/ 04/ military_thumb_. html) MSNBC Retrieved on 25 January 2007. [14] "About alkasir" (https:/ / www. alkasir. com/ about), alkasir.com, accessed 16 September 2011 [15] https:/ / www. alkasir. com [16] www.anonymizer.com/ (http:/ / www. anonymizer. com/ ), Anonymizer, Inc., accessed 16 September 2011 [17] http:/ / www. anonymizer. com/ [18] CGIProxy" (http:/ / www. jmarshall. com/ tools/ cgiproxy/ ), James Marshall, accessed 17 September 2011 [19] http:/ / www. jmarshall. com/ [20] "How to install the Circumventor program, which gets around all Web-blocking software" (http:/ / www. peacefire. org/ circumventor/ simple-circumventor-instructions. html), Bennett Haselton, accessed 17 September 2011 [21] http:/ / peacefire. org/ [22] "About D.I.T." (http:/ / www. dit-inc. us/ about_us), Dynamic Internet Technology, accessed 16 September 2011
331
External links
Casting A Wider Net: Lessons Learned in Delivering BBC Content on the Censored Internet (http://uoft.me/ casting), Ronald Deibert, Canada Centre for Global Security Studies and Citizen Lab, Munk School of Global Affairs, University of Toronto, 11 October 2011 Censorship Wikia (http://censorship.wikia.com/), an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship "Circumvention Tool Evaluation: 2011" (http://cyber.law.harvard.edu/publications/2011/ 2011_Circumvention_Tool_Evaluation), Hal Roberts, Ethan Zuckerman, and John Palfrey, Berkman Centre for Internet & Society, 18 August 2011 "Circumvention Tool Usage Report: 2010" (http://cyber.law.harvard.edu/publications/2010/ Circumvention_Tool_Usage), Hal Roberts, Ethan Zuckerman, Jillian York, Robert Faris, and John Palfrey, Berkman Centre for Internet & Society, 14 October 2010 Digital Security and Privacy for Human Rights Defenders (http://www.frontlinedefenders.org/manuals/en/ esecman/), by Dmitri Vitaliev, Published by Front Line - The International Foundation for the Protection of Human Rights Defenders
Internet censorship circumvention "DNS Nameserver Swapping" (http://www.ab9il.net/crypto/dns-swapping.html), Methods and Scripts useful for evading censorship through DNS filtering. How to Bypass Internet Censorship (http://www.howtobypassinternetcensorship.org/), also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp. Translations have been published in Arabic (http://en.flossmanuals.net/bypassing-ar), Burmese (http://en. flossmanuals.net/circumvention-tools-mn), Chinese (http://en.flossmanuals.net/circumvention-tools-zh), Farsi (http://en.flossmanuals.net/bypassing-fa), Russian (http://en.flossmanuals.net/bypassing-ru), Spanish (http:/ /en.flossmanuals.net/bypassing-es), and Vietnamese (http://en.flossmanuals.net/bypassing-vi). Internet censorship wiki (http://en.cship.org/wiki/Main_Page), provides information about different methods of access filtering and ways to bypass them. "Leaping over the Firewall: A Review of Censorship Circumvention Tools" (http://freedomhouse.org/uploads/ special_report/97.pdf), by Cormac Callanan (Ireland), Hein Dries-Ziekenheiner (Netherlands), Alberto Escudero-Pascual (Sweden), and Robert Guerra (Canada), Freedom House, April 2011 "Selected Papers in Anonymity" (http://freehaven.net/anonbib/topic.html), Free Haven Project, accessed 16 September 2011 "Ten Things to Look for in a Circumvention Tool" (https://www.torproject.org/press/presskit/ 2010-09-16-circumvention-features.pdf), Roger Dingledine, The Tor Project, September 2010
332
Classifications
Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports.[4] The ratings produced by several of these organizations are summarized below as well as in the Censorship by country article.
OpenNet Initiative
The OpenNet Initiative (ONI) classifies the magnitude of censorship or filtering occurring in a country in four areas of activity.[5]
Internet censorship by countryOpenNet Initiative "Summarized global Internet filtering data spreadsheet", 8 November 2011 and "Country Profiles", the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa Internet Enemies, Reporters Without Borders (Paris), 12March 2012Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship.
The magnitude or level of censorship is classified as follows: Pervasive: A large portion of content in several categories is blocked.
Internet censorship by country Substantial: A number of categories are subject to a medium level of filtering or many categories are subject to a low level of filtering. Selective: A small number of specific sites are blocked or filtering targets a small number of categories or issues. Suspected: It is suspected, but not confirmed, that Web sites are being blocked. No evidence: No evidence of blocked Web sites, although other forms of controls may exist. The classifications are done for the following areas of activity: Political: Views and information in opposition to those of the current government or related to human rights, freedom of expression, minority rights, and religious movements. Social: Views and information perceived as offensive or as socially sensitive, often related to sexuality, gambling, or illegal drugs and alcohol. Conflict/security: Views and information related to armed conflicts, border disputes, separatist movements, and militant groups. Internet tools: e-mail, Internet hosting, search, translation, and Voice-over Internet Protocol (VoIP) services, and censorship or filtering circumvention methods. Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.[6] The level of filtering was classified in 26 countries in 2007 and in 25 countries in 2009. Of the 41 separate countries classified in these two years, seven were found to show no evidence of filtering (Egypt, France, Germany, India, the Ukraine, the United Kingdom, and the United States), while one was found to engage in pervasive filtering in all areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering (China, Iran, Myanmar, and Tajikistan).[7]
333
When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. Belarus, Egypt, and Tunisia moved to the "Countries under surveillance" list in 2009, 2011, and 2011 respectively. Belarus moved back and Bahrain was added to the list in
Internet censorship by country 2012. When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 14. In addition to the moves to and from the "Enemies of the Internet" list noted earlier, Jordan in 2009, Tajikistan in 2009, and Yemen in 2010 were dropped from the list and Australia in 2009, France in 2011, Russia in 2010, South Korea in 2009, Turkey in 2010 were added. Bahrain, Eritrea, Malaysia, and Sri Lanka dropped from the list in 2010, but were added again in 2011. Libya dropped from the list in 2009, added again in 2011, and then dropped in 2012. Venezuela was added in 2011 and then dropped in 2012.
334
Partly free 7 (47%) Not free Improved Declined 4 (27%) n/a n/a
18 (49%) 20 (43%) 11 (30%) 13 (28%) 5 (33%) 9 (60%) 1 (7%) 11 (31%) 17 (47%) 8 (22%)
No change n/a
In addition the 2012 report identified seven countries that were at particular risk of suffering setbacks related to Internet freedom in late 2012 and in 2013: Azerbaijan, Libya, Malaysia, Pakistan, Rwanda, Russia, and Sir Lanka. In most of these countries the Internet is currently a relatively open and unconstrained space for free expression, but the countries also typically feature a repressive environment for traditional media and have recently considered or introduced legislation that would negatively affect Internet freedom.[11]
Country classifications
The classifications that follow are based on the classifications and ratings from both the OpenNet Initiative (ONI) and the Reporters Without Boarders (RWB).
Pervasive censorship
While there is no universally agreed upon definition of what constitutes "pervasive censorship", a country is included in this classification when it is included on the "Internet enemies" list maintained by Reporters Without Borders,[8] or when the OpenNet Initiative categorizes the level of Internet filtering as pervasive in any of the four areas (political, social, conflict/security, and Internet tools) for which they test. Such nations often censor political, social, and other content and may retaliate against citizens who violate the censorship with imprisonment or other sanctions.
Internet censorship by country Bahrain Listed as pervasive in the political and social areas, as substantial in Internet tools, and as selective in conflict/security by ONI in August 2009.[5] Listed as an Internet enemy by RWB in 2012.[2] Bahrain enforces an effective news blackout using an array of repressive measures, including keeping the international media away, harassing human rights activists, arresting bloggers and other online activists (one of whom died in detention), prosecuting free speech activists, and disrupting communications, especially during major demonstrations.[2] On 5 January 2009 the Ministry of Culture and Information issued an order (Resolution No 1 of 2009)[12] pursuant to the Telecommunications Law and Press and Publications Law of Bahrain that regulates the blocking and unblocking of websites. This resolution requires all ISPs among other things to procure and install a website blocking software solution chosen by the Ministry. The Telecommunications Regulatory Authority ("TRA") assisted the Ministry of Culture and Information in the execution of the said Resolution by coordinating the procurement of the unified website blocking software solution. This software solution is operated solely by the Ministry of Information and Culture and neither the TRA nor ISPs have any control over sites that are blocked or unblocked. Belarus Listed as selective in the political, social, conflict/security and Internet tools areas by ONI in November 2010.[5] Listed as an Internet enemy by RWB in 2012.[2] The Internet in Belarus, as a space used for circulating information and mobilizing protests, has been hard hit as the authorities increased the list of blocked websites and partially blocked the Internet during protests. As a way to limit coverage of demonstrations some Internet users and bloggers have been arrested and others have been invited to preventive conversations with the police. Law No. 317-3, which took effect on 6 January 2012, reinforced Internet surveillance and control measures.[2] The Belarus government has moved to second- and third-generation controls to manage its national information space. Control over the Internet is centralized with the government-owned Beltelecom managing the countrys Internet gateway. Regulation is heavy with strong state involvement in the telecommunications and media market. Most users who post online media practice a degree of self-censorship prompted by fears of regulatory prosecution. The president has established a strong and elaborate information security policy and has declared his intention to exercise strict control over the Internet under the pretext of national security. The political climate is repressive and opposition leaders and independent journalists are frequently detained and prosecuted.[13] Burma Listed as pervasive in the political area and as substantial in social, conflict/security, and Internet tools by ONI in December 2010.[14] Listed as an Internet enemy by RWB in 2011.[2] Burma (also known as Myanmar) has a very low Internet penetration rate due to both government restrictions on pricing and deliberate lack of facilities and infrastructure.[15] The internet is regulated by the Electronic Act which bans the importing and use of a modem without official permission, and the penalty for violating this is a 15 year prison sentence, as it is considered "damaging state security, national unity, culture, the national economy and law and order."[9] However, internet usage is widely spread in the major cities and towns, with internet cafes and chat rooms. The internet speed is deliberately slowed and a range of websites, from politics to pornography are banned by the Ministry of Post and Telecommunications. Burma has banned the websites of political opposition groups, sites relating to human rights, and organizations promoting democracy in Burma.[16] During the 2007 anti-government protests, Burma completely shut down all internet links from its country.[17]
335
Internet censorship by country China Listed as pervasive in the political and conflict/security areas and as substantial in social and Internet tools by ONI in June 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] The People's Republic of China blocks or filters Internet content relating to Tibetan independence, Taiwan independence, police brutality, the Tiananmen Square protests of 1989, freedom of speech, pornography, some international news sources and propaganda outlets (such as the VOA), certain religious movements (such as Falun Gong), and many blogging websites. At the end of 2007 51 cyber dissidents were reportedly imprisoned in China for their online postings.[18] Cuba Listed as an Internet enemy by RWB in 2011.[2] Not categorized by ONI due to lack of data. Cuba has the lowest ratio of computers per inhabitant in Latin America, and the lowest internet access ratio of all the Western hemisphere.[19] Citizens have to use government controlled "access points", where their activity is monitored through IP blocking, keyword filtering and browsing history checking. The government cites its citizens' access to internet services are limited due to high costs and the American embargo, but there are reports concerning the will of the government to control access to uncensored information both from and to the outer world.[20] The Cuban government continues to imprison independent journalists for contributing reports through the Internet to web sites outside of Cuba.[21] Salim Lamrani, a professor at Paris Descartes University, has accused Reporters Without Borders with making unsupported and contradictory statements regarding Internet connectivity in Cuba.[22] However, even with the lack of precise figures due to the secretive nature of the regime, testimonials from independent bloggers, activists, and international watchers support the view that it is difficult for most people to access the web and that harsh punishments for individuals that do not follow government policies are the norm.[23][24] The Committee to Protect Journalists has pointed to Cuba as one of the ten most censored countries around the world.[25] Iran Listed as pervasive in the political, social, and Internet tools areas and as substantial in conflict/security by ONI in June 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] The Islamic Republic of Iran continues to expand and consolidate its technical filtering system, which is among the most extensive in the world. A centralized system for Internet filtering has been implemented that augments the filtering conducted at the Internet service provider (ISP) level.[26] Filtering targets content critical of the government, religion, pornographic websites, political blogs, and women's rights websites, weblogs, and online magazines.[16][27] Bloggers in Iran have been imprisoned for their Internet activities.[28] The Iranian government temporarily blocked access, between 12 May 2006 and January 2009, to video-upload sites such as YouTube.com.[29] Flickr, which was blocked for almost the same amount of time was opened in February 2009. But after 2009 election protests YouTube, Flickr, Twitter, Facebook and many more websites were blocked again.[30]
336
Internet censorship by country Kuwait Listed as pervasive in the social and Internet tools areas and as selective in political and conflict/security by ONI in June 2009.[5] The primary target of Internet filtering is pornography and, to a lesser extent, gay and lesbian content. Secular content and Web sites that are critical of Islam are also censored. Some Web sites that are related to religions other than Islam are blocked even though they are not necessarily critical of Islam.[31] The Kuwait Ministry of Communication regulates ISPs, forcing them to block pornography, anti-religion, anti-tradition, and anti-security websites to "protect the public by maintaining both public order and morality".[32] Both private ISPs and the government take actions to filter the Internet.[33][34] The Kuwait Institute for Scientific Research (KISR) operates the Domain Name System in Kuwait and does not register domain names which are "injurious to public order or to public sensibilities or otherwise do not comply with the laws of Kuwait".[35] Voice over Internet Protocol is illegal in Kuwait.[36] Not only have many VoIP Web sites been blocked by the MOC, but expatriates have been deported for using or running VOIP services.[37] In response to several videos declared "offensive to Muslims", Kuwaiti authorities called for the blocking of YouTube[38] and several Kuwaiti Members of Parliament called for stricter restrictions on online content.[39] Myanmar See Burma. North Korea Listed as an Internet enemy by RWB in 2011.[2] Not categorized by ONI due to lack of data.[40] North Korea is cut off from the internet, much as it is from other areas with respect to the world. Only a few hundred thousand citizens in North Korea, representing about 4% of the total population, have access to the Internet, which is heavily censored by the national government.[41] According to the RWB, North Korea is a prime example where all mediums of communication are controlled by the government. According to the RWB, the Internet is used by the North Korean government primarily to spread propaganda. The North Korean network is monitored heavily. All websites are under government control, as is all other media in North Korea.[42] Oman Listed as pervasive in the social area, as substantial in Internet tools, selective in political, and as no evidence in conflict/security by ONI in August 2009.[5] Oman engages in extensive filtering of pornographic Web sites, gay and lesbian content, content that is critical of Islam, content about illegal drugs, and anonymizer sites used to circumvent blocking. There is no evidence of technical filtering of political content, but laws and regulations restrict free expression online and encourage self-censorship.[43] Qatar Listed as pervasive in the social and Internet tools areas and selective in political and conflict/security by ONI in August 2009.[5] Qatar is the second most connected country in the Arab region, but Internet users have heavily censored access to the Internet. Qatar filters pornography, political criticism of Gulf countries, gay and lesbian content, sexual health resources, dating and escort services, and privacy and circumvention tools. Political filtering is highly selective, but journalists self-censor on sensitive issues such as government policies, Islam, and the ruling family.[44]
337
Internet censorship by country Saudi Arabia Listed as pervasive in the social and Internet tools areas, as substantial in political, and as selective in conflict/security by ONI in August 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] Saudi Arabia directs all international Internet traffic through a proxy run by the CITC. Content filtering is implemented there using software by Secure Computing.[45] Additionally, a number of sites are blocked according to two lists maintained by the Internet Services Unit (ISU):[46] one containing "immoral" (mostly pornographic) sites, the other based on directions from a security committee run by the Ministry of Interior (including sites critical of the Saudi government). Citizens are encouraged to actively report "immoral" sites for blocking, using a provided Web form. Many Wikipedia articles in different languages have been included in the censorship of "immoral" content in Saudi Arabia. The legal basis for content-filtering is the resolution by Council of Ministers dated 12 February 2001.[47] According to a study carried out in 2004 by the OpenNet Initiative: "The most aggressive censorship focused on pornography, drug use, gambling, religious conversion of Muslims, and filtering circumvention tools."[45] South Korea Listed as pervasive in the conflict/security area, as selective in social, and as no evidence in political and Internet tools by ONI in 2011.[1][5] Listed as Under Surveillance by RWB in 2011.[2] South Korea is a world leader in Internet and broadband penetration, but its citizens do not have access to a free and unfiltered Internet. South Koreas government maintains a wide-ranging approach toward the regulation of specific online content and imposes a substantial level of censorship on elections-related discourse and on a large number of Web sites that the government deems subversive or socially harmful.[48] The policies are particularly strong toward suppressing anonymity in the Korean internet. In 2007, numerous bloggers were censored and their posts deleted by police for expressing criticism of, or even support for, presidential candidates. This even lead to some bloggers being arrested by the police.[49] South Korea uses IP address blocking to ban web sites considered sympathetic to North Korea.[16][50] Illegal websites, such as those offering unrated games, pornography, and gambling, are also blocked. Syria Listed as pervasive in the political and Internet tools areas, and as selective in social and conflict/security by ONI in August 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] Syria has banned websites for political reasons and arrested people accessing them. In addition to filtering a wide range of Web content, the Syrian government monitors Internet use very closely and has detained citizens "for expressing their opinions or reporting information online." Vague and broadly worded laws invite government abuse and have prompted Internet users to engage in self-censoring and self-monitoring to avoid the state's ambiguous grounds for arrest.[16][51]
338
Internet censorship by country Turkmenistan Listed as pervasive in the political area and as selective in social, conflict/security, and Internet tools by ONI in December 2010.[5] Listed as an Internet enemy by RWB in 2011.[2] Internet usage in Turkmenistan is under tight control of the government. Turkmen got their news through satellite television until 2008 when the government decided to get rid of satellites, leaving Internet as the only medium where information could be gathered. The Internet is monitored thoroughly by the government and websites run by human rights organizations and news agencies are blocked. Attempts to get around this censorship can lead to grave consequences.[52] United Arab Emirates Listed as pervasive in the social and Internet tools areas, as substantial in political, and as selective in conflict/security by ONI in August 2009.[5] Listed as Under Surveillance by RWB in 2011.[2] The United Arab Emirates forcibly censors the Internet using Secure Computing's solution. The nation's ISPs Etisalat and du (telco) ban pornography, politically sensitive material, all Israeli domains,[53] and anything against the perceived moral values of the UAE. All or most VoIP services are blocked. The Emirates Discussion Forum (Arabic: ,) or simply uaehewar.net, has been subjected to multiple censorship actions by UAE authorities.[54] Uzbekistan Classified by ONI as pervasive in the political and as selective in the social, conflict/security, and Internet tools areas in 2008.[1][5] Listed as an Internet enemy by RWB in 2011.[2] Uzbekistan prevents access to websites regarding banned Islamic movements, independent media, NGOs, and material critical of the government's human rights violations.[16] Some Internet cafes in the capital have posted warnings that users will be fined for viewing pornographic websites or website containing banned political material.[55] The main VoIP protocols SIP and IAX used to be blocked for individual users; however, as of July 2010, blocks were no longer in place. Facebook was blocked for few days in 2010.[56] Vietnam Classified by ONI as pervasive in the political, as substantial in the Internet tools, and as selective in the social and conflict/security areas in 2011.[1][5] Listed as an Internet enemy by RWB in 2011.[2] The main networks in Vietnam prevent access to websites critical of the Vietnamese government, expatriate political parties, and international human rights organizations, among others. Notably, websites with pornographic content. [16] Online police reportedly monitor Internet cafes and cyber dissidents have been imprisoned for advocating democracy.[57]
339
Internet censorship by country Yemen Listed as pervasive in the social and Internet tools areas, as substantial in the political, and as selective in the conflict/security areas by ONI in August 2009.[5] Listed as Under Surveillance by RWB in 2008 and 2009, but not in 2010 or 2011.[2] Yemen censors pornography, nudity, gay and lesbian content, escort and dating services, sites displaying provocative attire, Web sites which present critical reviews of Islam and/or attempt to convert Muslims to other religions, or content related to alcohol, gambling, and drugs.[58] Yemens Ministry of Information declared in April 2008 that the penal code will be used to prosecute writers who publish Internet content that "incites hatred" or "harms national interests".[59] Yemen's two ISPs, YemenNet and TeleYemen, block access to gambling, adult, sex education, and some religious content.[16] The ISP TeleYemen (aka Y.Net) prohibits "sending any message which is offensive on moral, religious, communal, or political grounds" and will report "any use or attempted use of the Y.Net service which contravenes any applicable Law of the Republic of Yemen". TeleYemen reserves the right to control access to data stored in its system in any manner deemed appropriate by TeleYemen.[60] In Yemen closed rooms or curtains that might obstruct views of the monitors are not allowed in Internet cafs, computer screens in Internet cafs must be visible to the floor supervisor, police have ordered some Internet cafs to close at midnight, and demanded that users show their identification cards to the caf operator.[61]
340
Substantial censorship
Countries included in this classification were found to practice substantial Internet filtering in at least one of the four areas (political, social, conflict/security, and Internet tools) for which ONI tests, but which were not already included in the pervasive censorship classification. This includes countries where a number of categories are subject to a medium level of filtering or many categories are subject to a low level of filtering. Armenia Listed as substantial in the political area and as selective in social, conflict/security, and Internet tools by ONI in November 2010.[5] Access to the Internet in Armenia is largely unfettered, although evidence of second- and third-generation filtering is mounting. Armenias political climate is volatile and largely unpredictable. In times of political unrest, the government has not hesitated to put in place restrictions on the Internet as a means to curtail public protest and discontent.[62] Ethiopia Listed as substantial in the political and as selective in social, conflict/security and Internet tools areas by ONI in September 2011.[5] Ethiopia has implemented a largely political filtering regime that blocks access to popular blogs and the Web sites of many news organizations, dissident political parties, and human rights groups. However, much of the media content that the government is attempting to censor can be found on sites that are not banned. The authors of the blocked blogs have in many cases continued to write for an international audience, apparently without sanction. However, Ethiopia is increasingly jailing journalists, and the government has shown a growing propensity toward repressive behavior both off- and online. Censorship is likely to become more extensive as Internet access expands across the country.[63]
Internet censorship by country Gaza and the West Bank Listed as substantial in the social area and as no evidence in political, conflict/security, and Internet tools by ONI in August 2009.[5] Access to Internet in the Palestinian territories remains relatively open, although social filtering of sexually explicit content has been implemented in Gaza. Internet in the West Bank remains almost entirely unfiltered, save for a single news Web site that was banned for roughly six months starting in late 2008. Media freedom is constrained in Gaza and the West Bank by the political upheaval and internal conflict as well as by the Israeli forces.[64] Indonesia Listed as substantial in the social area, as selective in the political and Internet tools areas, and as no evidence of filtering in the conflict/security area by ONI in 2011 based on testing done during 2009 and 2010. Testing also showed that Internet filtering in Indonesia is unsystematic and inconsistent, illustrated by the differences found in the level of filtering between ISPs.[65] Indonesia was rated "partly free" in Freedom on the Net 2011 with a score of 46, midway between the end of the "free" range at 30 and the start of the "not free" range at 60.[66] Although the government of Indonesia holds a positive view about the Internet as a means for economic development, it has become increasingly concerned over the impact of access to information and has demonstrated an interest in increasing its control over offensive online content, particularly pornographic and anti-Islamic online content. The government regulates such content through legal and regulatory frameworks and through partnerships with ISPs and Internet cafs.[65] Media reported that selective blocking of some web sites for brief periods began in 20072008. Indonesia ordered ISPs to block YouTube in April 2008 after Google reportedly did not respond to the governments request to remove the film Fitna by the Dutch parliamentarian Geert Wilders, which purportedly mocked the Prophet Muhammed.[67] In May 2010, when an account on Facebook promoted a competition to draw the Prophet Muhammad, government officials took a more focused approach and sent a letter to Facebook urging closure of the account, asked all ISPs to limit access to the accounts link, and invited the Indonesian Association of Internet Cafe Entrepreneurs to restrict access to the group. Due to opposition from bloggers and civil society, however, ISPs disregarded the governments requests, and the account remained accessible.[66] In March 2008, the government passed the Law on Information and Electronic Transactions (ITE Law), which broadened the authority of the Ministry of Communications and Information Technology (MCI) to include supervision of the flow of information and possible censorship of online content. In early 2010, the ministry published a draft Regulation on Multimedia Content that, if implemented, would require ISPs to filter or otherwise remove certain material. The types of content listed include vaguely worded categories such as pornography, gambling, hate incitement, threats of violence, exposure of private information, intellectual property, false information, and content that degrades a person or group on the basis of a physical or nonphysical attribute, such as a disability. Following a public outcry, the government announced that it would take time to process suggestions from the public before proceeding with the draft regulation.[66] Under the ITE Law anyone convicted of committing defamation online faces up to six years in prison, and a fine of up to 1 billion rupiah (US$111,000). As of June 2010, there were at least eight cases in which citizens had been indicted on defamation charges under the ITE Law for comments on e-mail lists, blogs, or Facebook. Prosecutions under the ITE Law have contributed to an increased atmosphere of fear, caution, and self-censorship among online writers and average users.[66]
341
Internet censorship by country Pakistan Listed as substantial in the conflict/security and as selective in the political, social, and Internet tools areas by ONI in 2011.[1][5] Pornography, Blasphemous Content on the internet is Blocked in Pakistan and is closed to access for general public. The access is managed by PTA (Pakistan Telecommunication Authority) Although the Pakistani government does not employ a sophisticated blocking system, a limitation which has led to collateral blocks on entire domains such as Blogspot.com and YouTube.com, it continues to block Web sites containing content it considers to be blasphemous, anti-Islamic, or threatening to internal security. Pakistan has blocked access to websites critical of the government.[68] Sudan Listed as substantial in the social and Internet tools areas and as selective in political, and as no evidence in conflict/security by ONI in August 2009.[5] Sudan openly acknowledges filtering content that transgresses public morality and ethics or threatens order. The state's regulatory authority has established a special unit to monitor and implement filtration; this primarily targets pornography and, to a lesser extent, gay and lesbian content, dating sites, provocative attire, and many anonymizer and proxy Web sites.[69]
342
Selective censorship
Countries included in this classification were found to practice selective Internet filtering in at least one of the four areas (political, social, conflict/security, and Internet tools) for which ONI tests, but which were not already included in the pervasive or substantial censorship classifications. This classification includes countries where a small number of specific sites are blocked or filtering targets a small number of categories or issues. Azerbaijan Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in November 2009.[5] The Internet in Azerbaijan remains largely free from direct censorship, although there is evidence of second- and third-generation controls.[70] Colombia Classified as selective in the social area and no evidence of filtering in the political, conflict, or tools areas by ONI in 2011.[1] There is no individual ONI country profile for Colombia, but it is included in the regional overview for Latin America.[67] Colombia blocks several websites as part of its Internet Sano program. In December 2009, an internaute was sent to prison for threatening president lvaro Uribe's sons.[71] Gambia Not individually classified by ONI,[5] but classified as selective based on the limited descriptions in the ONI profile for the sub-Saharan Africa region.[67] Gambia is a particularly egregious offender of the right to freedom of expression: in 2007 a Gambian journalist living in the US was convicted of sedition for an article published online; she was fined USD12,000;[72] in 2006 the Gambian police ordered all subscribers to an online independent newspaper to report to the police or face arrest.[73]
Internet censorship by country Georgia Listed as selective in the political and conflict/security areas and as no evidence in social and Internet tools by ONI in November 2010.[5] Access to Internet content in Georgia is largely unrestricted as the legal constitutional framework, developed after the 2003 Rose Revolution, established a series of provisions that should, in theory, curtail any attempts by the state to censor the Internet. At the same time, these legal instruments have not been sufficient to prevent limited filtering on corporate and educational networks. Georgias dependence on international connectivity makes it vulnerable to upstream filtering, evident in the March 2008 blocking of YouTube by Turk Telecom.[74] Georgia blocked all websites with addresses ending in .ru (top-level domain for Russian Federation) after South Ossetia War in 2008.[75] India Listed as "Partly Free" in Freedom on the Net 2011.[76] Listed as selective in all areas by ONI in 2011.[3][5] Listed as Under Surveillance by RWB in 2012.[2] Since the Mumbai bombings of 2008, the Indian authorities have stepped up Internet surveillance and pressure on technical service providers, while publicly rejecting accusations of censorship.[2] ONI describes India as:[5] A stable democracy with a strong tradition of press freedom, [that] nevertheless continues its regime of Internet filtering. However, Indias selective censorship of blogs and other content, often under the guise of security, has also been met with significant opposition. Indian ISPs continue to selectively filter Web sites identified by authorities. However, government attempts at filtering have not been entirely effective because blocked content has quickly migrated to other Web sites and users have found ways to circumvent filtering. The government has also been criticized for a poor understanding of the technical feasibility of censorship and for haphazardly choosing which Web sites to block. Italy Listed as selective in the social area and as no evidence in political, conflict/security, and Internet tools by ONI in December 2010.[5] Italy bans the use of foreign bookmakers over the Internet by mandating certain edits to DNS host files of Italian ISPs.[77][78] Italy is also blocking access to websites containing child pornography.[79] In 2008, Italy blocked also The Pirate Bay website[80][81] for some time, basing this censorship on a law on electronic commerce. As of 25 May 2010, access to The Pirate Bay is blocked again. Jordan Listed as selective in the political area and as no evidence in social, conflict/security, and Internet tools by ONI in August 2009.[5] Censorship in Jordan is relatively light, with filtering selectively applied to only a small number of sites. However, media laws and regulations encourage some measure of self-censorship in cyberspace, and citizens have reportedly been questioned and arrested for Web content they have authored. Censorship in Jordan is mainly focused on political issues that might be seen as a threat to national security due to the nation's close proximity to regional hotspots like Israel, Iraq, Lebanon, and the Palestinian territories.[82]
343
Internet censorship by country Kazakhstan Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in December 2010.[5] Listed as Under Surveillance by RWB in 2012.[2] In 2011 the government responded to an oil workers strike, a major riot, a wave of bombings, and the presidents ailing health by imposing new, repressive Internet regulations, greater control of information, especially online information, blocking of news websites, and cutting communications with the city of Zhanaozen during the riot.[2] Kazakhstan uses its significant regulatory authority to ensure that all Internet traffic passes through infrastructure controlled by the dominant telecommunications provider KazakhTelecom. Selective content filtering is widely used, and second- and third-generation control strategies are evident. Independent media and bloggers reportedly practice self-censorship for fear of government reprisal. The technical sophistication of the Kazakhstan Internet environment is evolving and the governments tendency toward stricter online controls warrant closer examination and monitoring.[83] Kyrgyzstan Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in December 2010.[5] Access to the Internet in Kyrgyzstan has deteriorated as heightened political tensions have led to more frequent instances of second- and third-generation controls. The government has become more sensitive to the Internets influence on domestic politics and enacted laws that increase its authority to regulate the sector.[83] Liberalization of the telecommunications market in Kyrgyzstan has made the Internet affordable for the majority of the population. However, Kyrgyzstan is an effectively cyberlocked country dependent on purchasing bandwidth from Kazakhstan and Russia. The increasingly authoritarian regime in Kazakhstan is shifting toward more restrictive Internet controls, which is leading to instances of upstream filtering affecting ISPs in Kyrgyzstan.[83] Libya Listed as selective in the political area and as no evidence in social, conflict/security, and Internet tools by ONI in August 2009.[5] The overthrow of the Gaddafi regime ended an era of censorship. Before his removal and death, Col. Gaddafi had tried to impose a news blackout by cutting access to the Internet.[2] Prior to this, Internet filtering under the Gaddafi regime had become more selective, focusing on a few political opposition Web sites. This relatively lenient filtering policy coincided with what was arguably a trend toward greater openness and increasing freedom of the press. However, the legal and political climate continued to encourage self-censorship in online media.[83] In 2006 Reporters Without Borders removed Libya from their list of Internet enemies after a fact-finding visit found no evidence of Internet censorship.[8] ONIs 20072008 technical test results contradicted that conclusion, however.[83] And in 2012 RWB removed Libya from its list of countries under surveillance.[2] Mauritania Classified by ONI as selective in the political and as no evidence in the social, security/conflict, and Internet tools areas in 2009.[1] There is no individual ONI country profile for Mauritania, but it is included in the ONI regional overview for the Middle East and North Africa.[67] There were no government restrictions on access to the Internet or reports that the government monitored email or Internet chat rooms in 2010. Individuals and groups could engage in the peaceful expression of views via the Internet, including by e-mail. There is a law prohibiting child pornography with penalties of two months to one year imprisonment and a 160,000 to 300,000 ouguiya ($550 to $1,034) fine.[84]
344
Internet censorship by country Internet access was available in urban areas throughout the country, with home access common among the affluent and internet cafs serving the remainder of the population. According to International Telecommunication Union statistics for 2009, approximately 2.28 percent of the country's inhabitants used the Internet.[84] Between 16 March and 19 March 2009 and again on 25 June 2009 the news Web site Taqadoumy was blocked.[67][84] On 26 February 2010, Hanevy Ould Dehah, director of Taqadoumy, received a presidential pardon after being detained since December 2009 despite having served his sentence for crimes against Islam and paying all imposed fines and legal fees. Dehah, who was originally arrested in June 2009 on charges of defamation of presidential candidate Ibrahima Sarr for publishing an article stating that Sarr bought a house with campaign money from General Aziz. Dehah, was sentenced in August 2009 to six months in prison and fined 30,000 ouguiya ($111) for committing acts contrary to Islam and decency. The sentencing judge accused Dehah of creating a space allowing individuals to express anti-Islamic and indecent views, based on a female reader's comments made on the Taqadoumy site calling for increased sexual freedom.[84] Moldova Listed as selective in the political area and as no evidence in social, conflict/security, and Internet tools by ONI in December 2010.[5] While State authorities have interfered with mobile and Internet connections in an attempt to silence protestors and influence the results of elections, Internet users in Moldova enjoy largely unfettered access despite the governments restrictive and increasingly authoritarian tendencies. Evidence of second- and third-generation controls is mounting. Although filtering does not occur at the backbone level, the majority of filtering and surveillance takes place at the sites where most Moldovans access the Internet: Internet cafe s and workplaces. Moldovan security forces have developed the capacity to monitor the Internet, and national legislation concerning illegal activities is strict.[85] Morocco Listed as selective in the social, conflict/security, and Internet tools areas and as no evidence in political by ONI in August 2009.[5] Internet access in Morocco is, for the most part, open and unrestricted. Moroccos Internet filtration regime is relatively light and focuses on a few blog sites, a few highly visible anonymizers, and for a brief period in May 2007, the video sharing Web site YouTube.[86] ONI testing revealed that Morocco no longer filters a majority of sites in favor of independence of the Western Sahara, which were previously blocked. The filtration regime is not comprehensive, that is to say, similar content can be found on other Web sites that are not blocked. On the other hand, Morocco has started to prosecute Internet users and bloggers for their online activities and writings.[87] Russia Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in December 2010.[5] Listed as under surveillance by RWB in 2011.[2] The absence of overt state-mandated Internet filtering in Russia before November 2012 had led some observers to conclude that the Russian Internet represents an open and uncontested space. In fact, the Russian government actively competes in Russian cyberspace employing second- and third-generation strategies as a means to shape the national information space and promote pro-government political messages and strategies. This approach is consistent with the governments strategic view of cyberspace that is articulated in strategies such as the doctrine of information security. The DoS attacks against Estonia (May 2007) and Georgia (August 2008) may be an indication of the governments active interest in mobilizing and shaping activities in Russian cyberspace.[88] In 2004 Russia pressured Lithuania and in 2006 Sweden into shutting down the Kavkaz Center website, a site that supports creation of a Sharia state in North Caucasus and hosts videos on terrorist attacks on Russian forces in North
345
Internet censorship by country Caucasus.[89][90][91] In July 2012, the Russian State Duma passed the Bill 89417-6 which created a blacklist of Internet sites containing alleged child pornography, drug-related material, extremist material, and other content illegal in Russia.[92][93] The Russian Internet blacklist was officially launched in November 2012, despite criticism by major websites and NGOs.[94] Singapore Listed as selective in the social area and as no evidence in political, conflict/security, and Internet tools by ONI in May 2007.[5] The Republic of Singapore engages in minimal Internet filtering, blocking only a small set of pornographic Web sites. However, the state employs a combination of licensing controls and legal pressures to regulate Internet access and to limit the presence of objectionable content and conduct online.[95] In 2005 and 2006 three people were arrested and charged with sedition for posting racist comments on the Internet, of which two have been sentenced to imprisonment.[96] Some ISPs also block internet content related to recreational drug use. Singapore's government-run Media Development Authority maintains a confidential list of blocked websites that are inaccessible within the country. The Media Development Authority exerts control over Singapore's three ISPs to ensure that blocked content is entirely inaccessible. Tajikistan Listed as selective in the political area and as no evidence as in social, conflict/security, and Internet tools by ONI in December 2010.[5] Internet penetration remains low in Tajikistan because of widespread poverty and the relatively high cost of Internet access. Internet access remains largely unrestricted, but emerging second-generation controls have threatened to erode these freedoms just as Internet penetration is starting to have an impact on political life in the country. In the run-up to the 2006 presidential elections, ISPs were asked to voluntarily censor access to an opposition Web site, and other second-generation controls have begun to emerge.[97] Thailand Listed as selective in political, social, and Internet tools and as no evidence in conflict/security by ONI in 2011.[1][5] Listed as Under Surveillance by RWB in 2011.[2] Listed as "Not Free" in the Freedom on the Net 2011 report by Freedom House, which cites substantial political censorship and the arrest of bloggers and other online users.[98] Prior to the September 2006 military coup d'tat most Internet censorship in Thailand was focused on blocking pornographic websites. The following years have seen a constant stream of sometimes violent protests, regional unrest,[99] emergency decrees,[100] a new cybercrimes law,[101] and an updated Internal Security Act.[102] And year by year Internet censorship has grown, with its focus shifting to lse majest, national security, and political issues. Estimates put the number of websites blocked at over 110,000 and growing in 2010.[103] Reasons for blocking:
346
347
Priorto [104] [105] 2006 2010 Reason 11% 77% lse majest content (content that defames, insults, threatens, or is unflattering to the King, includes national security and some political issues) pornographic content content related to gambling copyright infringement, illegal products and services, illegal drugs, sales of sex equipment, prostitution,
60% 2% 27%
According to the Associated Press, the Computer Crime Act has contributed to a sharp increase in the number of lse majest cases tried each year in Thailand.[106] While between 1990 and 2005, roughly five cases were tried in Thai courts each year, since that time about 400 cases have come to triala 1,500 percent increase.[106] Tunisia Listed as selective in the social and Internet tools and as no evidence in the political and conflict/security areas by ONI in 2011.[1][5] Listed as Under Surveillance by RWB in 2011.[2] Tunisia has blocked thousands of websites (such as pornography, mail, search engine cached pages, online documents conversion and translation services) and peer-to-peer and FTP transfer using a transparent proxy and port blocking. Cyber dissidents including pro-democracy lawyer Mohammed Abbou have been jailed by the Tunisian government for their online activities.[107] Turkey Listed as selective in the political, social, and Internet tools areas and as no evidence as in conflict/security by ONI in December 2010.[5] Listed as under surveillance by RWB in 2011.[2] The Turkish government has implemented legal and institutional reforms driven by the countrys ambitions to become a European Union member state, while at the same time demonstrating its high sensitivity to defamation and other inappropriate online content, which has resulted in the closure of a number of local and international Web sites. All Internet traffic passes through Turk Telecoms infrastructure, allowing centralized control over online content and facilitating the implementation of shutdown decisions.[83] Many minor and major websites in Turkey have been subject to censorship. As of June 2010 more than 8000 major and minor websites were banned, most of them pornographic and mp3 sharing sites.[108] Other Among the web sites banned are the prominent sites Youporn, Megaupload, Deezer, Tagged, Slide, and ShoutCast. However, blocked sites are often available using proxies or by changing DNS servers. The Internet Movie Database escaped being blocked due to a misspelling of its domain name, resulting in a futile ban on www.imbd.com [109].[110] In October 2010, the ban of YouTube was lifted. But a range of IP addresses used by Google remained blocked, thus access to Google Apps hosted sites, including all Google App Engine powered sites and some of the Google services, remained blocked. Under new regulations announced on 22 February 2011 and scheduled to go into effect on 22 August 2011, the Information Technologies Board (BTK), an offshoot of the prime ministers office, will require that all computers select one of four levels of content filtering (family, children, domestic, or standard) in order to gain access to the Internet.[111]
Internet censorship by country Venezuela Classified as selective in the social and no evidence in the political, conflict/security, and Internet tools areas in 2011.[1][5] Access to the Internet in Venezuela continues to be unrestricted. The level of self-censorship is hard to evaluate, but the adoption of legislation that could potentially limit Internet freedom has yet to have any damaging effect in practice. As a result RWB removed Venezuela from its list of countries under surveillance.[2] In December 2010, the government of Venezuela approved a law named "Social Responsibility in Radio, Television and Electronic Media" (Ley de Responsabilidad Social en Radio, Televisin y Medios Electrnicos). The law is intended to exercise control over content that could "entice felonies", "create social distress", or "question the legitimate constituted authority". The law indicates that the website's owners will be responsible for any information and contents published, and that they will have to create mechanisms that could restrict without delay the distribution of content that could go against the aforementioned restrictions. The fines for individuals who break the law will be of the 10% of the person's last year's income. The law was received with criticism from the opposition on the grounds that it is a violation of freedom of speech protections stipulated in the Venezuelan constitution, and that it encourages censorship and self-censorship.[112]
348
Under surveillance
Countries in this category are on the RWB "Under Surveillance" list, but which were not already included in the pervasive, substantial, or selective censorship classifications. Countries "Under Surveillance" are ones in which changes are underway or are being considered that give cause for concern about the possibility of increased Internet censorship. Australia No evidence of filtering found by ONI in 2009.[1] There is no individual ONI country profile for Australia, but it is included in the regional overview for Australia and New Zealand.[67] Listed as Under Surveillance by RWB in 2011.[2] Australia does not allow content that would be classified "RC" (Refused Classification or banned) or "X18+" (hardcore non-violent pornography or very hardcore shock value) to be hosted within Australia and considers such content "prohibited"/"potentially prohibited" outside Australia; it also requires most other age-restricted content sites to verify a user's age before allowing access. Since January 2008 material that would be likely to be classified "R18+" or "MA15+" and which is not behind such an age verification service (and, for MA15+, which also meets other criteria such as provided for profit, or contains certain media types) also fits the category of "prohibited" or "potentially prohibited". The regulator ACMA can order local sites which do not comply taken down, and overseas sites added to a blacklist provided to makers of PC-based filtering software. Australia is classified as "under surveillance" by Reporters Without Borders due to the internet filtering legislation proposed by Minister Stephen Conroy. Regardless, as of August 2010 and the outcome of the 2010 election, it would be highly unlikely for the filter to pass the Senate if proposed due to the close numbers of seats held by Labor and the Coalition, who Joe Hockey says do not support it.[113] In June 2011 two Australian ISPs, Telstra and Optus, confirmed they would voluntary block access to a list of child abuse websites provided by the Australian Communications and Media Authority and more websites on a list compiled by unnamed international organizations from mid-year.[114]
Internet censorship by country Egypt In August 2009 ONI found no evidence of Internet filtering in any of the four areas (political, social, conflict/security, and Internet tools).[5] Listed as Under Surveillance by RWB in 2011 and 2012.[2] The Internet in Egypt was not directly censored under President Hosni Mubarak, but his regime kept watch on the most critical bloggers and regularly arrested them. At the height of the uprising against the dictatorship, in late January 2011, the authorities first filtered pictures of the repression and then cut off Internet access entirely in a bid to stop the revolt spreading. The success of the 2011 Egyptian revolution offers a chance to establish greater freedom of expression in Egypt, especially online. In response to these dramatic events and opportunities, in March 2011, Reporters Without Borders moved Egypt from its "Internet enemies" list to its list of countries "under surveillance".[115] In March 2012 Reporters Without Borders reported:[116] The first anniversary of Egypts revolution was celebrated in a climate of uncertainty and tension between a contested military power, a protest movement attempting to get its second wind, and triumphant Islamists. Bloggers and netizens critical of the army have been harassed, threatened, and sometimes arrested. The Supreme Council of the Armed Forces (SCAF), which has been leading the country since February 2011, has not only perpetuated Hosni Mubaraks ways of controlling information, but has strengthened them. Eritrea Listed as Under Surveillance by RWB in 2011.[2] Eritrea has not set up a widespread automatic Internet filtering system, but it does not hesitate to order blocking of several diaspora websites critical of the regime. Access to these sites is blocked by two of the Internet service providers, Erson and Ewan, as are pornographic websites and YouTube. Self-censorship is said to be widespread.[117] France Listed as no evidence in the political, social, conflict/security, and Internet tools areas by ONI in November 2010.[5] Listed as Under Surveillance by RWB in 2011.[2] France continues to promote freedom of the press and speech online by allowing unfiltered access to most content, apart from limited filtering of child pornography and web sites that promote terrorism, or racial violence and hatred. The French government has undertaken numerous measures to protect the rights of Internet users, including the passage of the Loi pour la Confiance dans lconomie Numrique (LCEN, Law for Trust in the Digital Economy) in 2004. However, the passage of a new copyright law threatening to ban users from the Internet upon their third violation has drawn much criticism from privacy advocates as well as the European Union (EU) parliament.[83] With the implementation of the "three-strikes" legislation and a law providing for the administrative filtering of the web and the defense of a "civilized" Internet, 2010 was a difficult year for Internet freedom in France. The offices of several online media firms and their journalists were targeted for break-ins and court summons and pressured to identify their sources. As a result, France has been added to Reports Without Borders list of "Countries Under Surveillance".[118] A June 2011 draft executive order implementing Article 18[119] of the Law for Trust in the Digital Economy (LCEN) would give several French government ministries[120] the power to restrict online content in case of violation, or where there is a serious risk of violation, of the maintenance of public order, the protection of minors, the protection of public health, the preservation of interests of the national defense, or the protection of physical persons.[65] According to Flix Trguer, a Policy and Legal Analyst for the digital rights advocacy group La Quadrature du Net,
349
Internet censorship by country this is "a censorship power over the Internet that is probably unrivaled in the democratic world."[121] In response to criticism, on 23 June 2011 the minister for the Industry and the Digital economy, ric Besson, announced that the Government would rewrite the order, possibly calling for a judge to review the legality of the content and the proportionality of the measures to be taken. Any executive order has to be approved by the French Council of State, which will have to decide whether Internet censorship authorization can be extended to such an extent by a mere executive order. It has also been suggested that, because e-commerce legislation is to be harmonized within the European Union, the draft should be reviewed by the European Commission. Malaysia Listed as no evidence in the political, social, conflict/security, and Internet tools areas by ONI in May 2007.[5] Listed as under surveillance by RWB in 2011.[2] There have been mixed messages and confusion regarding Internet censorship in Malaysia. Internet content is officially uncensored, and civil liberties assured, though on numerous occasions the government has been accused of filtering politically sensitive sites. Any act that curbs internet freedom is theoretically contrary to the Multimedia Act signed by the government of Malaysia in the 1990s. However, pervasive state controls on traditional media spill over to the Internet at times, leading to self-censorship and reports that the state investigates and harasses bloggers and cyber-dissidents.[65] In April 2011, prime minister Najib Razak repeated promises that Malaysia will never censor the Internet.[122] On June 11, however, the Malaysian Communications and Multimedia Commission (MCMC) ordered ISPs to block 10 websites for violating the Copyright Act.[123] This led to the creation of a new Facebook page, "1M Malaysians Don't Want SKMM Block File Sharing Website".[124] Sri Lanka Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for Sri Lanka, but it is included in the regional overview for Asia.[67] Listed as Under Surveillance by RWB in 2011.[2] Several political and news websites, including tamilnet.com and lankanewsweb.com have been blocked within the country.[125] The Sri Lanka courts have ordered hundreds of adult sites blocked to "protect women and children".[126][127] In October and November 2011 the Sri Lankan Telecommunication Regulatory Commission blocked the five websites, www.lankaenews.com, srilankamirror.com, srilankaguardian.com, paparacigossip9.com, and www.lankawaynews.com, for what the government alleges as publishing reports that amount to "character assassination and violating individual privacy" and damaging the character of President Mahinda Rajapaksa, ministers and senior government officials. The five sites have published material critical of the government and alleged corruption and malfeasance by politicians.[128]
350
351
Little or no censorship
This classification includes countries that are not listed as an "Internet enemy" or as "Under survalance" by Reporters Without Borders and for which no evidence of Internet filtering was found by the OpenNet Initiative, although other controls such as voluntary filtering, self-censorship, and other types of public or private action to limit child pornography, hate speech, defamation, or theft of intellectual property often exist. Afghanistan Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in May 2007.[5] Only about 1/10 of 1 percent of Afghans are online, thus limiting the Internet as a means of expression. Freedom of expression is inviolable under the Afghanistan Constitution, and every Afghan has the right to print or publish topics without prior submission to state authorities. However, the limits of the law are clear: under the Constitution no law can be contrary to the beliefs and provisions of the sacred religion of Islam. The December 2005 Media Law includes bans on four broad content categories: the publication of news contrary to Islam and other religions; slanderous or insulting materials concerning individuals; matters contrary to the Afghan Constitution or criminal law; and the exposure of the identities of victims of violence. Proposed additions to the law would ban content jeopardizing stability, national security, and territorial integrity of Afghanistan; false information that might disrupt public opinion; promotion of any religion other than Islam; and "material which might damage physical well-being, psychological and moral security of people, especially children and the youth.[129] The Electronic Frontier Foundation reported that the Afghan Ministry of Communications mandated in June 2010 that all Internet Service Providers (ISPs) in Afghanistan filter Facebook, Gmail, Twitter, YouTube and websites related to alcohol, gambling and sex. They are also trying or blocking websites which are immoral and against the traditions of the Afghan people.[130] However, executives at Afghan ISPs said this was the result of a mistaken announcement by Ariana Network Service, one of the country's largest ISPs. An executive there said that while the government intends to censor pornographic content and gambling sites, social networking sites and email services are not slated for filtering. As of July 2010, enforcement of Afghanistan's restrictions on "immoral" content was limited, with internet executives saying the government didn't have the technical capacity to filter internet traffic.[131] Algeria Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] Internet access in Algeria is not restricted by technical filtering. However, the state controls the Internet infrastructure and regulates content by other means. Internet users and Internet service providers (ISPs) can face criminal penalties for posting or allowing the posting of material deemed contrary to public order or morality.[132] Argentina Not individually classified by ONI, but is included in the regional overview for Latin America.[67] Technical filtering of the Internet is uncommon in Argentina. The regulation of Internet content addresses largely the same concerns and strategies seen in North America and Europe, focusing on combating the spread of child pornography and restricting child access to age-inappropriate material. As Internet usage in Argentina increases, so do defamation, hate speech, copyright, and privacy issues.[67] Prosecutors and police pursue cases of Internet child pornography. In June 2008 the Congress passed a law criminalizing child pornography; however, the law does not penalize possession by individuals for personal use.[133] Since the 1997 presidential declaration regarding Free Speech on the Internet that guarantees Internet content the same constitutional protections for freedom of expression, Argentina has become a haven for neo-Nazi and race-hate groups around the region.[134] In 2000 an Argentine appellate court affirmed a lower courts dismissal of a claim that
Internet censorship by country a Yahoo! site selling Nazi memorabilia violated Argentinas anti-discrimination law (no. 23.592), holding that the equivalent restrictions of non-Internet speech would be unacceptable.[135] Under Argentinas anti-discrimination law a crime is aggravated if racism is involved.[67] The defendant in the case Jujuy.com v. Omar Lozano was found liable for publishing slanderous content on his Web site after imputing adulterous conduct to a couple and failing to remove the content promptly. An injunction was imposed and damages were set at $40,000 (USD).[67] Argentina has strengthened intellectual property rights protections by drafting and updating laws and ratifying international agreements such as the WIPO Copyright Treaty.[67] On 11 August 2011 a judge ordered all ISPs to block the site LeakyMails, a Web site that obtains and publishes documents exposing corruption in Argentina.[136][137] Some internet service providers blocked the website IP address 216.239.32.2 which is linked to more than one million blogs hosted on Google's Blogger service disrupting the access to all of them.[138] Bangladesh No evidence of filtering found by ONI in 2011.[1][5] During the 20082009 ONI testing period Bangladesh was not filtering the Internet, but media reported selective blocking for brief periods. The Bangla blogging platform Sachalayatan was reported to be inaccessible on 15 July 2008, and was forced to migrate to a new IP address. Although the blocking was not officially confirmed, Sachalayatan was likely Bangladeshs inaugural filtering event. YouTube was blocked for a few days in March 2009 in order to protect the national interest. The disputed video covered a partial audio recording of a meeting between the prime minister and military officials, who were angry at the governments handling of a mutiny by border guards in Dhaka that left more than seventy people dead.[67] Facebook was blocked by the Bangladesh Telecommunication Regulatory Commission (BTRC) for 7 days starting on 29 May 2010 because of "obnoxious images", including depictions of Mohammed and several of the country's political officials as well as links to pornographic sites.[139] The block was lifted after Facebook agreed to remove the offensive content.[140] During the same period a 30-year-old man was arrested in the Bangladeshi capital on charges of uploading satiric images of some political leaders on Facebook.[141] Belgium Not individually classified by ONI, but included in the regional overview for Europe.[67] Belgian internet providers Belgacom, Telenet, Base, Scarlet, EDPnet, Dommel, Proximus, Mobistar, Mobile Vikings, Tele2, and Versatel have started filtering several websites on DNS level since April 2009.[142] People who browse the internet using one of these providers and hit a blocked website are redirected to a page that claims that the content of the website is illegal under Belgian law and therefore blocked.[143] Brazil Not individually classified by ONI, but is included in the regional overview for Latin America.[67] Brazilian legislation restricts the freedom of expression (Paim Law), directed especially to publications considered racist (such as neo-nazi sites). The Brazilian Constitution also prohibits anonymity of journalists.[144] In March 2009, Chamber President Michel Temer ordered TV Cmara to remove a video of a debate from its website in which CartaCapital journalist Leandro Fortes criticized Gilmar Mendes' tenure as Court President.[145] Many viewed this as political censorship and the video was soon posted on YouTube.[146] After being denounced for censorship by the country's main bodies representing journalists, TV Cmara put the debate back on its website.[145] In September 2012 an elections court in Brazil ordered the arrest of Googles most senior executive in the country, after the company failed to take down YouTube videos attacking a local mayoral candidate. The stringent 1965
352
Internet censorship by country Electoral Code bans campaign ads that offend the dignity or decorum of a candidate. Google is appealing the order, which comes after a similar decision by another Brazilian elections judge. In that case, the judge found a different senior executive responsible for violating local election law after the company refused to take down a YouTube video mocking a mayoral candidate. That decision was overturned by another judge who wrote that Google is not the intellectual author of the video, it did not post the file, and for that reason it cannot be punished for its propagation. [147] Canada No evidence of filtering found by ONI in 2009.[1] There is no individual ONI country profile for Canada, but it is included in the regional overview for the United States and Canada.[67] Information, such as names of young offenders or information on criminal trials subject to publication bans, which the government is actively attempting to keep out of Canadian broadcast and print media is sometimes available to Canadian users via the Internet from sites hosted outside Canada. Project Cleanfeed Canada (cybertip.ca) decides what sites are child pornographic in nature and transmits those lists to the voluntarily participating ISPs who can then block the pages for their users. However, some authors, bloggers and digital rights lawyers argue that they are accountable to no one and could be adding non pornographic sites to their list without public knowledge.[148] Chile Not individually classified by ONI, but is included in the regional overview for Latin America.[67] Many educational institutions (universities and schools) block the access to websites like YouTube, Fotolog, Flickr, Blogger, Rapidshare, Twitter and Facebook, depending of the institution; in some cases also popular portals like Terra.cl, LUN.com, EMOL.com are also blocked; pornography, especially any kind of child pornographic website is blocked.[149] The Chilean Government also block the access in their computers to blogs or electronic versions of the local newspapers with opinions against the Government or the ruling coalition, for example, during the first days of Transantiago or the 2006 Student Protests. Croatia No ONI country profile, but shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[65] The constitution and law generally provide for freedom of speech and the press; however, growing economic pressures lead journalists to practice self-censorship. Hate speech committed over the Internet is punishable by six months' to three years' imprisonment and libel is a criminal offense. There are no government restrictions on access to the Internet or reports the government monitors e-mail or Internet chat rooms. In general individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail. Internet access is widely available and used by citizens throughout the country. An estimated 51 percent of the country's inhabitants used the Internet in 2010.[150]
353
Internet censorship by country Czech Republic Not individually classified by ONI. Since 2008, mobile operators T-Mobile[151] and Vodafone[152][153] pass mobile and fixed Internet traffic through Cleanfeed, which uses data provided by the Internet Watch Foundation to identify pages believed to contain indecent photographs of children, and racist materials. On 13 August 2009, Telefnica O2 Czech Republic, Czech DSL incumbent and mobile operator, started to block access to sites listed by Internet Watch Foundation. The company said it wanted to replace the list with data provided by Czech Police.[154] The rollout of the blocking system attracted public attention due to serious network service difficulties and many innocent sites mistakenly blocked. The concrete blocking implementation is unknown but it is believed that recursive DNS servers provided by the operator to its customers have been modified to return fake answers diverting consequent TCP connections to an HTTP firewall.[155] On 6 May 2010, T-Mobile Czech Republic officially announced[156] that it was starting to block web pages promoting child pornography, child prostitution, child trafficking, pedophilia and illegal sexual contact with children. T-Mobile claimed that its blocking was based on URLs from the Internet Watch Foundation list and on individual direct requests made by customers. Denmark No evidence of filtering found by ONI in 2009.[1] There is no individual ONI country profile for Denmark, but it is included in the regional overview for the Nordic Countries.[67] Denmark's biggest Internet service provider TDC A/S launched a DNS-based child pornography filter on 18 October 2005 in cooperation with the state police department and Save the Children, a charity organisation. Since then, all major providers have joined and as of May 2006, 98% of the Danish Internet users were restricted by the filter.[157] The filter caused some controversy in March 2006, when a legal sex site named Bizar.dk was caught in the filter, sparking discussion about the reliability, accuracy and credibility of the filter.[158] Also, as of 18 October 2005, TDC A/S had blocked access to AllOfMP3.com, a popular MP3 download site, through DNS filtering.[159] On 4 February 2008 a Danish court ordered the Danish ISP Tele2 to shutdown access to the file-sharing site thepiratebay.org for its Danish users.[160] On 23 December 2008, the list of 3,863 sites filtered in Denmark was released by Wikileaks.[161] In November 2011 a site selling diet pills, 24hdiet.com, was blocked by Danish ISPs, the first use of a new law on the blocking of foreign websites that sell drugs.[162] In August 2012 Google removed ads from ticket website Viagogo after an investigation found that the site was violating Danish law by overcharging and manipulating tickets before sending them to the buyer.[163] Estonia Not individually classified by ONI, but is included in the regional overview for the Commonwealth of Independent States.[164] Early 2010 Estonia started DNS filtering of "remote gambling sites" conflicting the renewed Gambling Act (2008). Estonia Implements Gambling Act [165]. So far (2010-03-01) only one casino [166] has obtained the proper license. The Gambling Act says servers for the "legal" remote gambling must be physically located in Estonia. The latest local news [167] is that Tax and Customs Board [168] has compiled a blocking list [169] containing 175 sites which ISPs are to enforce. Previously [170] Internet was completely free of censorship in Estonia.
354
Internet censorship by country Fiji Not individually classified by ONI. In May 2007 it was reported that the military in Fiji had blocked access to blogs critical of the regime.[171] Finland Classified as no evidence of filtering in all areas by ONI in 2009.[1] There is no individual ONI country profile for Finland, but it is included in the regional overview for the Nordic Countries.[67] In 2006, a new copyright law known as Lex Karpela set some restrictions on publishing information regarding copy protection schemes. Also in 2006 the government started Internet censorship by delivering Finnish ISPs a secret blocking list maintained by Finnish police.[172] Implementation of the block was voluntary, but some ISPs implemented it. The list was supposed to contain only sites with child pornography, but ended up also blocking, among others, the site lapsiporno.info that criticized the move towards censorship and listed sites that were noticed to have been blocked.[173]
355
Lapsiporno.info block announcement as seen from the network maintained by ISP Welho
In 2008 a government-sponsored report has considered establishing similar filtering in order to curb online gambling.[174] Germany Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in December 2010.[5] Occasional take down requests and access restrictions are imposed on German ISPs, usually to protect minors or to suppress hate speech and extremism. In April 2009, the German government signed a bill that would implement large-scale filtering of child pornography Web sites, with the possibility for later expansion.[175] However, that law was repelled in 2011 since internet service providers quickly take down child pornography after they receive knowledge about it, a fact that had already been pointed out by internet freedom organisations and political parties such as the Freie Demokratische Partei and the Piratenpartei before the law came into effect. Ghana Not individually classified by ONI, but is included in the regional overview for sub-Saharan Africa.[67] In 2002 the government of Ghana censored internet media coverage of tribal violence in Northern Ghana.[176] Guatemala Classified as no evidence of filtering by ONI in 2011.[1] There is no individual ONI country profile for Guatemala, but it is included in the regional overview for Latin America.[67] Hungary No ONI country profile, but shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[] The constitution and law provide for freedom of speech and of the press, and the government generally respects these rights in practice. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the peaceful expression of views via the
Internet censorship by country Internet, including by e-mail. According to the International Telecommunication Union, in 2009 approximately 63 percent of the country's inhabitants used the Internet.[177] European Commissioner Kroes, NGOs, and the foreign press raised concerns that provisions of the new media laws requiring balanced reporting and registration of media outlets lacked clear limits and could be interpreted to include blogs. The government and the NMHH argued that, in practice, blogs would be exempt from these requirements on the basis that they are not considered "business endeavors."[177] Iceland Not individually classified by ONI, but included in the regional overview for the Nordic Countries.[67] Censorship is prohibited by the Icelandic Constitution and there is a strong tradition of protecting freedom of expression that extends to the use of the Internet.[178] However, questions about how best to protect children, fight terrorism, prevent libel, and protect the rights of copyright holders are ongoing in Iceland as they are in much of the world. The five Nordic countriesDenmark, Finland, Norway, Sweden, and Icelandare central players in the European battle between file sharers, rights holders, and Internet service providers (ISPs). While each country determines its own destiny, the presence of the European Union (EU) is felt in all legal controversies and court cases. Iceland, while not a member of the EU, is part of the European Economic Area (EEA) and has agreed to enact legislation similar to that passed in the EU in areas such as consumer protection and business law.[67] Internet service providers in Iceland use filters to block Web sites distributing child pornography. Iceland's ISPs in cooperation with BarnaheillSave the Children Iceland participate in the International Association of Internet Hotlines (INHOPE) project. Suspicious links are reported by organizations and the general public and passed on to relevant authorities for verification.[67] Iraq Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] Internet access in Iraq remains largely unfettered, but this is likely to change, as the authorities have initiated measures to censor Internet content and monitor online activities. In addition, the government has launched legal offensives against independent news media and Web sites.[179] Ireland Not individually classified by ONI. Israel Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] The Orthodox Jewish parties in Israel proposed an internet censorship legislation would only allow access to pornographic Internet sites for users who identify themselves as adults and request not to be subject to filtering. In February 2008 the law passed in its first of three votes required,[180] however, it was rejected by the government's legislation committee on 12 July 2009.[181]
356
Internet censorship by country Japan Japanese law provides for freedom of speech and of the press, and the government respects these rights in practice. These freedoms extend to speech and expression on the Internet. An effective judiciary and a functioning democratic political system combine to ensure these rights. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet activities. Individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail.[182] Freedom House's Freedom in the World 2011 reports that "Internet access is not restricted" in Japan.[183] Legislation criminalizing the use of the Internet for child pornography and the solicitation of sex from minors was passed in 2003.[184] Kenya There is no ONI country profile for Kenya.[5] Kenya was rated as "partly free" in the 2009 and 2011 Freedom on the Net reports with scores of 34 and 32 which is much closer to the "free" rating that ends at 30 then it is to the "not free" rating that starts at 60.[185] The government does not employ technical filtering or any administrative censorship system to restrict access to political or other content. Citizens engage in the peaceful expression of views via the Internet, including by e-mail, and are able to access a wide range of viewpoints, with the websites of the British Broadcasting Corporation (BBC), the U.S.-based Cable News Network (CNN), and Kenyas Daily Nation newspaper the most commonly accessed.[185] There are no government restrictions on access to the Internet, but Internet services are limited in rural areas due to lack of infrastructure. In 2008, approximately 8.6 percent of Kenyans used the Internet.[177] The constitution protects freedom of expression and the freedom to communicate ideas and information. However, it also grants the government the authority to punish defamation, protect privileged information, and restrict state employees "freedom of expression in the interest of defense, public safety, public order, public morality or public health. In January 2009, the government passed a controversial Communications Amendment Act that established that any person who publishes, transmits, or causes to be published in electronic form obscene information commits an offense. The Act also outlines other forms of illegality associated with the use of information and communication technologies. At the end of 2010, the measure had not been used to prosecute anyone for online expression. Under the Act, the Communications Commission of Kenya (CCK), rather than the independent Media Council of Kenya, is responsible for regulating both traditional and online media. The CCK is also independent, but because the CCK has yet to make any decisions affecting the internet, its autonomy and professionalism in making determinations remain to be seen.[185] In July 2009 the government announced that all cell phone users had to provide the government with their name and identification number. This regulation applies to citizens who access the Internet through cell phone-based services as well.[177] Laos There is no ONI country profile for Laos,[5] but Laos is included in the ONI Regional Overview for Asia[67] and the ONI global Internet filtering maps show no evidence of filtering in Laos in the political, social, conflict/security, and Internet tools areas.[65] Very few homes have Internet access; most non-business users depend on Internet cafes located chiefly in the larger urban areas. The International Telecommunication Union reported that Internet users numbered approximately 5 percent of the country's inhabitants in 2009. The government does not block domestic web sites, major foreign news sources, or social networking sites. There are no reports of government prosecution of persons for the expression of political, religious, or dissenting views via the Internet. The Lao National Internet Committee under the Prime Minister's Office administers a system that controls all domestic Internet servers, sporadically monitors Internet usage, and has authority to block access to
357
Internet censorship by country Internet sites it deems pornographic or critical of government institutions and policies.[186] Latvia No ONI country profile, but shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[] The constitution and law provide for freedom of speech and of the press. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail. According to International Telecommunication Union statistics for 2009, approximately 67 percent of the country's inhabitants used the Internet.[177] In September 2010 the government's Corruption Prevention and Combating Bureau (KNAB), which enforces campaign laws, removed a satirical film, The Last Bear Slayer, from the on-demand playlist of the partially state-owned cable provider, Lattelecom. The KNAB stated that the film might have constituted election advertising. Reporters Without Borders charged that the prohibition constituted improper censorship, but noted it was ineffective because the film was widely available on the Internet.[177] Lebanon Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] Internet traffic in Lebanon is not subject to technical filtering, but poor infrastructure, few household computers, low Internet penetration rates, and the cost high of connectivity, remain serious challenges. Some Internet caf operators prevent their clients from accessing objectionable content such as pornography, however, there is no evidence that these practices are required or encouraged by the state. Lebanese law permits the censoring of pornography, political opinions, and religious materials when considered a threat to national security.[187] Malawi Not individually classified by ONI, but is included in the regional overview for sub-Saharan Africa.[67] Malawi prohibits the publication or transmission of anything that could be useful to the enemy, as well as religiously offensive and obscene material. Malawi participates in regional efforts to combat cybercrime: the East African Community (consisting of Kenya, Tanzania, and Uganda) and the South African Development Community (consisting of Malawi, Mozambique, South Africa, Zambia, and Zimbabwe) have both enacted plans to standardize cybercrime laws throughout their regions.[67] Mexico Classified by ONI as no evidence of filtering in 2011.[1] There is no individual ONI country profile for Mexico, but it is included in the regional overview for Latin America.[67] In May 2009, the Mexican Federal Electoral Institute (IFE), asked YouTube to remove a parody of Fidel Herrera, governor of the state of Veracruz. Negative advertising in political campaigns is prohibited by present law, although the video appears to be made by a regular citizen which would make it legal. It was the first time a Mexican institution intervened directly with the Internet.
358
Internet censorship by country Nepal Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in May 2007.[5] In 2007 Nepali journalists reported virtually unconditional freedom of the press, including the Internet, and ONIs testing revealed no evidence that Nepal imposes technological filters on the Internet.[188] Netherlands Not individually classified by ONI. Government-mandated Internet censorship is nonexistent due to the house of representatives speaking out against filtering on multiple occasions, although there have been proposals to filter child pornography and the Netherlands, like many countries, is grappling with how to prevent or control copyright infringement on the Internet. In 2008 the Minister of Justice proposed a plan to block websites known to contain child pornography. A blacklist created by the Meldpunt ter bestrijding van Kinderpornografie op Internet (Hotline combating Child Pornography on the Internet)[189] would have been used by Internet Service Providers to redirect the websites to a stop page. In 2011 the plan was withdrawn due to an "almost complete lack of websites to block" because the sharing of the material was no longer done by conventional websites, but by other services.[190] The House of Representatives reaffirmed this by voting against the filter later that year, effectively killing any plans for government censorship.[191] In January 2012, the internet providers Ziggo and XS4all were required by a court order in a case brought by the Bescherming Rechten Entertainment Industrie Nederland (BREIN) to block the website of The Pirate Bay due to copyright infringement.[192] This blocking raised questions within the government, customers, and the internet providers themselves, not only because of the blocking, but also about its randomness and the role of BREIN, an industry trade association that can change the blacklist.[193][194][195] New Zealand Not individually classified by ONI, but is included in the regional overview for Australia and New Zealand.[67] Since February 2010 Department of Internal Affairs offers to ISPs voluntary Internet filtering.[196] Participating providers routes suspect destination IP addresses to the Department that blocks desired HTTP requests. Other packets are routed back to correct networks. List of blocked addresses is secret, but it's believed that child pornography is subjected only. Nigeria Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in October 2009.[5] In 2008 two journalists were arrested for publishing online articles and photos critical of the government.[197] Norway Classified as no evidence of filtering by ONI in 2009.[1] There is no individual ONI country profile for Norway, but it is included in the regional overview for the Nordic Countries.[67] Norway's major Internet service providers have a DNS filter which blocks access to sites authorities claim are known to provide child pornography,[198] similar to Denmark's filter. A list claimed to be the Norwegian DNS blacklist was published at Wikileaks in March 2009.[199] The minister of justice, Knut Storberget, sent a letter threatening ISPs with a law compelling them to use the filter should they refuse to do so voluntarily (dated 29 August 2008).[200]
359
Internet censorship by country Paraguay The law in Paraguay provides for freedom of speech and press, and the government generally respects these rights in practice. Individuals criticize the government publicly and privately, generally without reprisal or impediment. There are no government restrictions on access to the Internet or credible reports that the government monitored e-mail or Internet chat rooms. Individuals and groups could engage in the expression of views via the Internet, including by e-mail.[201] Because of their reporting, journalists are on occasion subjected to harassment, intimidation, and violenceprimarily from drug trafficking gangs and criminal syndicates based in departments bordering Brazil but also from politicians. Political officials often retaliate against media criticism by invoking criminal libel laws and suing the media to intimidate journalists and suppress further investigations.[201] Following the 22 June 2012 parliamentary coup, the new government appears to be assuming complete control of the state-owned media and its hostility is affecting journalists with the privately-owned media as well.[202][203][204][205][206] Peru No ONI country profile, but included in the regional overview for Latin America,[67] and shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[] There are no government restrictions on access to the Internet and no reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the free expression of views via the Internet, including by e-mail. The chief impediment to Internet access was a lack of infrastructure; the International Telecommunication Union reported that there were 31 Internet users per 100 inhabitants in 2009.[207] Philippines There is no ONI country profile for the Philippines,[5] but it is included in the ONI Regional Overview for Asia[67] and the ONI global Internet filtering maps show no evidence of filtering in the political, social, conflict/security, and Internet tools areas.[65] The constitution provides for freedom of speech and of the press, and the government generally respects these rights. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in peaceful expressions of views via the Internet, including by e-mail. Internet access is widely available. According to International Telecommunication Union statistics for 2009, approximately 6.5 percent of the country's inhabitants used the Internet.[208] In 2012 the Republic Act No. 10175 or Cybercrime Prevention Act of 2012 was signed by President Benigno Aquino, which criminalizes acts such as libel done online that are already punishable in other media such as radio, TV, and newspapers, with punishment one level higher than their non computer counterpart. The Act was greatly endorsed by Senator Tito Sotto, who was recently "cyberbullied" online for plagiarizing bloggers and Sen. Robert F. Kennedy. [209] After several petitions submitted to the Supreme Court questioned the constitutionality of the Act,[210] on October 9, 2012, the Supreme Court issued a temporary restraining order, stopping implementation of the Act for 120 days.[211]
360
Internet censorship by country Poland Not individually classified by ONI, but included in the regional overview for Europe.[67] Internet censorship legislation that included the creation of a register of blocked web sites was abandoned by the Polish Government in early 2011, following protests and petitions opposing the proposal.[212][213][214] Romania Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for Romania, but it is included in the regional overview for Europe.[67] Rwanda Not individually classified by ONI. Rated "partly free" in Freedom on the Net 2011 with a score of 50, somewhat past the midway point between the end of the range for "free" (30) and the start of the range for "not free" (60).[215] There are no government restrictions on access to the Internet. Individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail. Internet cafes are common and used regularly in the largest towns, but the Internet is generally unavailable in rural areas, where the majority of the population lives. According to International Telecommunication Union statistics for 2008, approximately 3 percent of the country's inhabitants used the Internet. Laws prohibiting divisionism, genocide ideology, and genocide denial and forbidding "contempt for the Head of State of Rwanda" promote self-censorship. Expression of these viewpoints sometimes results in arrest, harassment, or intimidation.[216] Slovenia Not individually classified by ONI. On 28 January 2010 the Slovenian National Assembly adopted changes to the law governing gambling. Under the law Internet service providers are responsible for blocking access to Internet gambling web sites that are not licensed by the Slovenian government.[217] South Africa Not individually classified by ONI, but is included in the regional overview for sub-Saharan Africa.[67] In 2006, the government of South Africa began prohibiting sites hosted in the country from displaying X18 (explicitly sexual) and XXX content (including child pornography and depictions of violent sexual acts); site owners who refuse to comply are punishable under the Film and Publications Act 1996. In 2007 a South African "sex blogger" was arrested . In South Africa participates in regional efforts to combat cybercrime. The East African Community (consisting of Kenya, Tanzania, and Uganda) and the South African Development Community (consisting of Malawi, Mozambique, South Africa, Zambia, and Zimbabwe) have both enacted plans to standardize cybercrime laws throughout their regions.[67] Sweden Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for Sweden, but it is included in the regional overview for the Nordic Countries.[67] Sweden's major Internet service providers have a DNS filter which blocks access to sites authorities claim are known to provide child porn, similar to Denmark's filter. A partial sample of the Swedish internet censorship list can be seen at a Finnish site criticizing internet censorship [218]. The Swedish police are responsible for updating this list of forbidden Internet sites. On 6 July, Swedish police said that there is material with child pornography available on torrents linked to from the torrent tracker site Pirate Bay and said it would be included in the list of forbidden Internet sites. This, however, did not happen as the police claimed the illegal material had been removed from the
361
Internet censorship by country site. Police never specified what the illegal content was on TPB. This came with criticism and accusations that the intended The Pirate Bay's censorship was political in nature. Uganda Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in September 2009.[5] Though Uganda has made great technological strides in the past five years, the country still faces a number of challenges in obtaining affordable, reliable Internet bandwidth. This, rather than a formal government-sponsored filtering regime, is the major obstacle to Internet access. Just prior to the presidential elections in February 2006, the Uganda Communications Commission (UCC) blocked the anti-government Web site RadioKatwe in the only internationally reported case of Internet filtering in Uganda to date.[219] Ukraine Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in December 2010.[5] Access to Internet content in Ukraine remains largely unfettered. Ukraine possesses relatively liberal legislation governing the Internet and access to information. The Law on Protection of Public Morals of November 20, 2003 prohibits the production and circulation of pornography; dissemination of products that propagandize war or spread national and religious intolerance; humiliation or insult to an individual or nation on the grounds of nationality, religion, or ignorance; and the propagation of "drug addition, toxicology, alcoholism, smoking and other bad habits."[220] United Kingdom Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in December 2010.[5] The United Kingdom has a notable libertarian tradition, manifested by, among other things, solid guarantees of freedom of expression, freedom of information, and protection of privacy. Freedom of expression and protection of privacy over the Internet is guaranteed by law. Nonetheless, over the last few years there has been a shift toward increased surveillance and police measures. Combating terrorism and preventing child abuse have been widely used as a justification by state agencies and private commercial actors (e.g., Internet service providers) for the implementation of interception and direct filtering measures. Nevertheless in 2010 the OpenNet Initiative found no evidence of technical filtering in the political, social, conflict/security, or Internet tools areas. However, the U.K. openly blocks child pornography Web sites, for which ONI does not test.[221] British Telecommunications' ISP passes internet traffic through a service called Cleanfeed which uses data provided by the Internet Watch Foundation to identify pages believed to contain indecent photographs of children.[222][223] When such a page is found, the system creates a 'URL not found page' error rather than deliver the actual page or a warning page. Other ISPs use different systems such as WebMinder [224]. In July and again in October 2011, the UK High Court ruled that British Telecom must block access to a website (newzbin.com) which "provides links to pirated movies".[225][226] In September 2011, in response to the court ruling and with encouragement from government, leading UK ISPs are reported to have privately agreed in principle to quickly restrict access to websites when presented with court orders.[227] In May 2012 the High Court ordered UK ISPs to block The Pirate Bay to prevent further copyright infringing movie and music downloads from the website.[228][229]
362
Internet censorship by country United States Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for the United States, but it is included in the regional overview for the United States and Canada.[67] Most online expression is protected by the First Amendment to the United States Constitution, but laws concerning libel, intellectual property, and child pornography still determine if certain content can be legally published online. Internet access by individuals in the US is not subject to technical censorship, but can be penalized by law for violating the rights of others. As in other countries, the potential for legal liability for civil violations, including defamation and copyright, constrains the publishers of Internet content in the United States. This can have a "chilling effect" and lead to self-censorship of lawful online content and conduct. Content-control software is sometimes used by businesses, libraries, schools, and government offices to limit access to specific types of content.[67] Zimbabwe Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in September 2009.[5] Because Internet penetration in Zimbabwe is low, it is mainly used for e-mail and the government focuses its efforts to control the Internet to e-mail monitoring and censorship. Though its legal authority to pursue such measures is contested, the government appears to be following through on its wishes to crack down on dissent via e-mail.[230]
363
References
This article incorporatespublic domain material from the United States Department of State document "2010 Country Reports on Human Rights Practices" [231] by the Bureau of Democracy, Human Rights, and Labor. This article incorporates licensed material [81] from the Country Profiles, [232] Regional Overviews [233], and Filtering Maps [234] sections of the OpenNet Initiative web site.[235]
[1] OpenNet Initiative "Summarized global Internet filtering data spreadsheet" (http:/ / opennet. net/ research/ data), 8 November 2011 and "Country Profiles" (http:/ / opennet. net/ research/ profiles), the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa [2] Internet Enemies (http:/ / march12. rsf. org/ i/ Report_EnemiesoftheInternet_2012. pdf), Reporters Without Borders (Paris), 12March 2012 [3] Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. [4] "2010 Country Reports on Human Rights Practices" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ index. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [5] "ONI Country Profiles" (http:/ / opennet. net/ research/ profiles), Research section at the OpenNet Initiative web site, a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa [6] "West Censoring East: The Use of Western Technologies by Middle East Censors, 20102011" (http:/ / opennet. net/ west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011), Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011 [7] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet (http:/ / www. unesco. org/ new/ en/ communication-and-information/ resources/ publications-and-communication-materials/ publications/ full-list/ freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4 [8] List of the 13 Internet enemies (http:/ / en. rsf. org/ list-of-the-13-internet-enemies-07-11-2006,19603) Reporters Without Borders (Paris), 11July 2006. [9] "Internet enemies" (http:/ / www. rsf. org/ IMG/ pdf/ Internet_enemies_2009_2_. pdf), Reporters Without Borders (Paris), 12March 2009. [10] Web 2.0 versus Control 2.0. (http:/ / www. rsf. org/ ennemis. html) Reporters Without Borders (Paris), 18March 2010. [11] Freedom on the Net 2009 (http:/ / www. state. gov/ documents/ organization/ 135959. pdf), Freedom House, accessed 16 April 2012 [12] Resolution No 1 of 2009, Ministry of Culture and Information, published in Official Gazette, Issue No.2877, dated 8 January 2009 [13] "ONI Country Profile: Belarus" (http:/ / opennet. net/ research/ profiles/ belarus), OpenNet Initiative, 18 November 2010 [14] "ONI Country Profile: Burma" (http:/ / opennet. net/ research/ profiles/ burma), OpenNet Initiative, 22 December 2010
364
(Spanish)
[25] "CPJ Special Report 2006" (http:/ / www. cpj. org/ censored/ censored_06. html). . [26] "ONI Country Profile: Iran" (http:/ / opennet. net/ research/ profiles/ iran), OpenNet Initiative, 16 June 2009 [27] "Authorities urged to halt threats to "cyber-feminists" Iran" (http:/ / www. rsf. org/ article. php3?id_article=26889). Reporters Without Borders. . Retrieved 18 May 2008. [28] "Internet "black holes" Iran" (http:/ / web. archive. org/ web/ 20070317080832/ http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=92& annee=2005). Reporters Without Borders. Archived from the original (http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=92& annee=2005) on 17 March 2007. . Retrieved 31 August 2006. [29] "Iran blocks access to video-sharing on YouTube" (http:/ / www. usatoday. com/ life/ television/ news/ 2006-12-05-youtube_x. htm). Tehran(AP): USA Today. 5 December 2006. . Retrieved 12 December 2006. [30] "Cracking Down on Digital Communication and Political Organizing in Iran" (http:/ / opennet. net/ blog/ 2009/ 06/ cracking-down-digital-communication-and-political-organizing-iran), Rebekah Heacock, OpenNet Initiative, 15 June 2009 [31] ONI Country Profile: Kuwait" (http:/ / opennet. net/ research/ profiles/ kuwait#footnote20_1w5khpn), OpenNet Initiative, 6 August 2009 [32] "Kuwait: State of the media" (http:/ / www. menassat. com/ ?q=en/ media-landscape/ state-media-5), Menassat [33] "Middle East and North Africa: Kuwait" (http:/ / www. irex. org/ programs/ msi_mena/ 2005/ MSI05_MENA_KW. pdf), Media Sustainability Index, 2006 [34] "Country Reports on Human Rights Practices: Kuwait 2007" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2007/ 100599. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 11 March 2008 [35] Kuwait Institute for Scientific Research (http:/ / www. kw/ ) web site [36] "VOIP Policy and Regulation: Regional perspective" (http:/ / www. ituarabic. org/ 2007/ IP-VOIP/ Docs/ Doc5-Saudi Arabia. pdf), Professor Ibrahim Kadi, Communications and Information Technology Commission, presented at the regional seminar on Internet Protocol: VOIP, Algiers, Algeria, 12 March 2007 [37] "Ministry blocks call sites on web" (http:/ / www. arabtimesonline. com/ arabtimes/ kuwait/ Viewdet. asp?ID=9870& cat=a), Kuwait Times Online, 13 May 2007 [38] "Kuwait blocks YouTube" (http:/ / www. kuwaittimes. net/ read_news. php?newsid=MTI1MjMyNzg4Mw==), Jamie Etheridge, Kuwait Times, 22 September 2008 [39] "Kuwaiti MPs call for stricter net censorship" (http:/ / www. arabianbusiness. com/ 532671-kuwaiti-mps-call-for-stricter-net-censorship), Dylan Bowman, Arabian Business, 29 September 2008 [40] "ONI Country Profile: North Korea" (http:/ / opennet. net/ research/ profiles/ north-korea), OpenNet Initiative, 10 May 2007 [41] "The Internet Black Hole That Is North Korea " (http:/ / www. nytimes. com/ 2006/ 10/ 23/ technology/ 23link. html), Tom Zeller Jr., New York Times, 23 October 2006 [42] "Internet Enemies: North Korea" (http:/ / en. rsf. org/ internet-enemie-north-korea,39755. html), Reporters Without Borders, March 2011 [43] "ONI Country Profile: Oman" (http:/ / opennet. net/ research/ profiles/ oman), OpenNet Initiative, August 2009 [44] "ONI Country Profile: Qatar" (http:/ / opennet. net/ research/ profiles/ qatar), OpenNet Initiative, 6 August 2009 [45] Internet Filtering in Saudi Arabia in 2004 (http:/ / www. opennetinitiative. net/ studies/ saudi/ ) An OpenNet Initiative study [46] Introduction to Content Filtering (http:/ / www. isu. net. sa/ saudi-internet/ contenet-filtring/ filtring. htm), Saudi Arabia Internet Services Unit, of King Abdulaziz City for Science & Technology (KACST), 2006 [47] Saudi Internet rules (2001) (http:/ / www. al-bab. com/ media/ docs/ saudi. htm), Council of Ministers Resolution, 12 February 2001, Al-Bab gateway: An open door to the Arab world
365
366
367
368
369
370
371
External links
OpenNet Initiative web site (http://opennet.net/). Reporters Without Borders web site (http://en.rsf.org/). Global Integrity: Internet Censorship, A Comparative Study (http://www.globalintegrity.org/node/130), Jonathan Werve, Global Integrity Commons, 19 February 2008, puts online censorship in cross-country context.
372
Organizations
Internet Corporation for Assigned Names and Numbers
ICANN
Founded September 18, 1998
Headquarters Los Angeles, California, U.S. Key people Focus Website Fadi Chehad Manage Internet protocol numbers and Domain Name System root www.icann.org [1]
The Internet Corporation for Assigned Names and Numbers (ICANN, /akn/ EYE-kan) is a nonprofit private organization headquartered in Los Angeles, California, United States, that was created on September 18, 1998, and incorporated on September 30, 1998[2] to oversee a number of Internet-related tasks previously performed directly on behalf of the U.S. government by other organizations, notably the Internet Assigned Numbers Authority (IANA), which ICANN now operates. ICANN is responsible for the coordination of the global Internet's systems of unique identifiers and, in particular, ensuring its stable and secure operation.[3] This work includes coordination of the Internet Protocol address spaces (IPv4 and IPv6) and assignment of address blocks to regional Internet registries, for maintaining registries of Internet protocol identifiers, and for the management of the top-level domain name space (DNS root zone), which includes the operation of root name servers. Most visibly, much of its work has concerned the DNS policy development for internationalization of the DNS system and introduction of new generic top-level domains (TLDs). The actual technical maintenance work of maintenance of the central Internet address pools and DNS root registries ICANN performs pursuant to the "IANA function" contract. ICANN's primary principles of operation have been described as helping preserve the operational stability of the Internet; to promote competition; to achieve broad representation of the global Internet community; and to develop policies appropriate to its mission through bottom-up, consensus-based processes.[4] On September 29, 2006, ICANN signed a new agreement with the United States Department of Commerce (DOC) that moves the private organization towards full management of the Internet's system of centrally coordinated identifiers through the multi-stakeholder model of consultation that ICANN represents.[5]
373
History
Before the establishment of ICANN, the Government of the United States controlled the domain name system of the Internet.[6] The original mandate for ICANN came from the United States government, spanning the presidential administrations of both Bill Clinton and George W. Bush. On January 30, 1998, the National Telecommunications and Information Administration (NTIA), an agency of the U.S. Department of Commerce, issued for comment, "A Proposal to Improve the Technical Management of Internet Names and Addresses." The proposed rule making, or "Green Paper [7] ", was published in the Federal Register on February 20, 1998, providing opportunity for public comment. NTIA received more than 650 comments as of March 23, 1998, when the comment period closed. The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of robust competition and facilitates global participation in Internet management. The Green Paper proposed for discussion a variety of issues relating to DNS management including private sector creation of a new not-for-profit corporation (the "new corporation") managed by a globally and functionally representative Board of Directors. ICANN was formed in response to this policy. The IANA function currently exists under an agreement with the U.S. Department of Commerce. ICANN was incorporated in California on September 30, 1998, with leading entrepreneurs and philanthropist Esther Dyson as founding chairwoman.[2] It is qualified to do business in the District of Columbia.[8] ICANN was established in California due to the presence of Jon Postel, who was a founder of ICANN and was set to be its first CTO prior to his unexpected death. ICANN remains in the same building where he worked, which is home to an office of the Information Sciences Institute at the University of Southern California. Per its original Bylaws [9], primary responsibility for policy formation in ICANN was to be delegated to three supporting organizations (Address Supporting Organization, Domain Name Supporting Organization, and Protocol Supporting Organization), each of which was to develop and recommend substantive policies and procedures for the management of the identifiers within their respective scope. As expected, the Regional Internet Registries and the IETF agreed to serve as the Address Supporting Organization and Protocol Supporting Organization respectively,[10][11] and ICANN issued a call for interested parties to propose the structure and composition of the Domain Name Supporting Organization.[12] On 4 March 1999, the ICANN Board, based in part on the DNSO proposals received, decided instead on an alternate construction for DNSO which delineated specific constituencies.[13][14] On July 26, 2006, the United States government renewed the contract with ICANN for performance of the IANA function for an additional one to five years.[15] The context of ICANN's relationship with the U.S. government was clarified on September 29, 2006 when ICANN signed a new Memorandum of understanding with the United States Department of Commerce (DOC).[16] This document does give the DoC a final, unilateral oversight over some of the ICANN operations.[16][17] In July 2008, the U.S. Department of Commerce reiterated an earlier statement[18] that it has "no plans to transition management of the authoritative root zone file to ICANN". The letter also stresses the separate roles of the IANA and VeriSign.[19]
Structure
At present, ICANN is formally organized as a non-profit corporation "for charitable and public purposes" under the California Nonprofit Public Benefit Corporation Law. It is managed by a 16-member Board of Directors, which is composed of eight members selected by a Nominating Committee on which all the constituencies of ICANN are represented; six representatives of its Supporting Organizations, sub-groups that deal with specific sections of the policies under ICANN's purview; an At-Large seat filled by an At-Large Organization; and the President / CEO, appointed by the Board. [20]
Internet Corporation for Assigned Names and Numbers There are currently three Supporting Organizations. The Generic Names Supporting Organization (GNSO) deals with policy making on generic top-level domains (gTLDs). The Country Code Names Supporting Organization (ccNSO) deals with policy making on country-code top-level domains (ccTLDs). The Address Supporting Organization (ASO) deals with policy making on IP addresses. ICANN also relies on some advisory committees to receive advice on the interests and needs of stakeholders that do not directly participate in the Supporting Organizations. These include the Governmental Advisory Committee (GAC), which is composed of representatives of a large number of national governments from all over the world; the At-Large Advisory Committee (ALAC), which is composed of representatives of organizations of individual Internet users from around the world; the Root Server System Advisory Committee, which provides advice on the operation of the DNS root server system; the Security and Stability Advisory Committee (SSAC), which is composed of Internet experts who study security issues pertaining to ICANN's mandate; and the Technical Liaison Group (TLG), which is composed of representatives of other international technical organizations that focus, at least in part, on the Internet.
374
African Telecommunications Union Asia-Pacific Telecommunity Commonwealth Telecommunications Organisation (CTO) Council of Europe Economic Commission for Africa (ECA) European Broadcasting Union European Organization for Nuclear Research (CERN) European Space Agency International Labour Office International Telecommunication Union (ITU) International Criminal Police Organization (INTERPOL) League of Arab States New Partnership for Africa's Development (NEPAD) Organisation for Economic Cooperation and Development Organisation Internationale de la Francophonie (OIF) Pacific Islands Forum REGULATEL Secretariat of the Pacific Community (SPC)
Inter-American Telecommunication Commission (CITEL) International Criminal Court United Nations Educational Scientific and Cultural Organization (UNESCO)
Internet Corporation for Assigned Names and Numbers Universal Postal Union World Health Organization World Intellectual Property Organization (WIPO) World Bank World Trade Organization
375
Democratic input
In the Memorandum of Understanding that set up the relationship between ICANN and the U.S. government, ICANN was given a mandate requiring that it operate "in a bottom up, consensus driven, democratic manner." However, the attempts that ICANN have made to set up an organizational structure that would allow wide input from the global Internet community did not produce results amenable to the current Board. As a result, the At-Large constituency and direct election of board members by the global Internet community were soon abandoned.[23] ICANN holds periodic public meetings rotated between continents for the purpose of encouraging global participation in its processes. Resolutions of the ICANN Board, preliminary reports, and minutes of the meetings, are published on the ICANN website, sometimes in real time. However there are criticisms from ICANN constituencies including the Noncommercial Users Constituency (NCUC) and the At-Large Advisory Committee (ALAC) that there is not enough public disclosure and that too many discussions and decisions take place out of sight of the public. In the early 2000s, there had been speculation that the United Nations might signal a takeover of ICANN,[24] followed by a negative reaction from the US government[18] and worries about a division of the Internet[25] the World Summit on the Information Society in Tunisia in November 2005 agreed not to get involved in the day-to-day and technical operations of ICANN. However it also agreed to set up an international Internet Governance Forum, with a consultative role on the future governance of the Internet. ICANN's Government Advisory Committee is currently set up to provide advice to ICANN regarding public policy issues and has participation by many of the world's governments.[26] Some have attempted to argue that ICANN was never given the authority to decide policy, e.g., choose new TLDs or shut out other interested parties who refuse to pay ICANN's US$185,000 fee, but was to be a technical caretaker. Critics suggest that ICANN should not be allowed to impose business rules on market participants, and that all TLDs should be added on a first-come, first-served basis and the market should be the arbiter of who succeeds and who does not.
Activities
One task that ICANN was asked to do was to address the issue of domain name ownership resolution for generic top-level domains (gTLDs). ICANN's attempt at such a policy was drafted in close cooperation with the World Intellectual Property Organization (WIPO), and the result has now become known as the Uniform Dispute Resolution Policy (UDRP). This policy essentially attempts to provide a mechanism for rapid, cheap and reasonable resolution of domain name conflicts, avoiding the traditional court system for disputes by allowing cases to be brought to one of a set of bodies that arbitrate domain name disputes. According to ICANN policy, a domain registrant must agree to be bound by the UDRP they cannot get a domain name without agreeing to this. A look at the UDRP decision patterns has led some[27] to conclude that compulsory domain name arbitration is less likely to give a fair hearing to domain name owners asserting defenses under the First Amendment and other laws, compared to the federal courts of appeal in particular.
376
Notable events
On March 18, 2002, publicly elected At-Large Representative for North America board member Karl Auerbach sued ICANN in Superior Court in California to gain access to ICANN's accounting records without restriction. Auerbach won.[28] In September and October 2003, ICANN played a crucial role in the conflict over VeriSign's "wild card" DNS service Site Finder. After an open letter from ICANN issuing an ultimatum to VeriSign, later supported by the IAB,[29] the company voluntarily shut down the service on October 4, 2003. Following this action, VeriSign filed a lawsuit against ICANN on February 27, 2004, claiming that ICANN had overstepped its authority. In this lawsuit, VeriSign sought to reduce ambiguity about ICANN's authority. The antitrust component of VeriSign's claim was dismissed in August 2004. VeriSign's broader challenge that ICANN overstepped its contractual rights is currently outstanding. A proposed settlement already approved by ICANN's board would resolve VeriSign's challenge to ICANN in exchange for the right to increase pricing on .com domains. At the meeting of ICANN in Rome, which took place from March 2 to March 6, 2004, ICANN agreed to ask approval of the US Department of Commerce for the Waiting List Service of VeriSign. On May 17, 2004, ICANN published a proposed budget for the year 2004-05. It included proposals to increase the openness and professionalism of its operations, and greatly increased its proposed spending from US $8.27 million to $15.83 million. The increase was to be funded by the introduction of new top-level domains, charges to domain registries, and a fee for some domain name registrations, renewals and transfers (initially USD 0.20 for all domains within a country-code top-level domain, and USD 0.25 for all others). The Council of European National Top Level Domain Registries (CENTR), which represents the Internet registries of 39 countries, rejected the increase, accusing ICANN of a lack of financial prudence and criticizing what it describes as ICANN's "unrealistic political and operational targets". Despite the criticism, the registry agreement for the top-level domains jobs and travel includes a US $2 fee on every domain the licensed companies sell or renew.[30] After a second round of negotiations in 2004, the TLDs eu, asia, travel, jobs, mobi, and cat were introduced in 2005. On February 28, 2006, ICANN's board approved a settlement with VeriSign in the lawsuit resulting from SiteFinder that involved allowing VeriSign (the registry) to raise its registration fees by up to 7% a year.[31] This was criticised by some people in the US House of Representatives' Small Business committee.[32] In February 2007, ICANN began the steps to remove accreditation of one of their registrars, RegisterFly amid charges and lawsuits involving fraud, and criticism of ICANN's handling of the situation. ICANN has been the subject of criticism as a result of its handling of RegisterFly, and the harm caused to thousands of clients due to what has been called ICANN's "laissez faire attitude toward customer allegations of fraud".[33]
ICANN meeting, Los Angeles USA, 2007. The sign refers to Vint Cerf, then Chairman of the Board of Directors, who is working on the Interplanetary Internet.
On May 23, 2008, ICANN issued Enforcement Notices against 10 Accredited Registrars and announced this through a press release entitled: "Worst Spam Offenders" Notified by ICANN, Compliance system working to correct Whois and other issues.[34] This was largely in response to a report issued by KnujOn called The 10 Worst Registrars in terms of spam advertised junk product sites and compliance failure.[35] The mention of the word spam in the title of the ICANN memo is somewhat misleading since ICANN does not address issues of spam or email abuse. Website content and usage are not within ICANN's mandate. However the KnujOn Report details how various registrars have not complied with their contractual obligations under the Registrar Accreditation Agreement (RAA).[36] The main point of the KnujOn research was to demonstrate the relationships between compliance failure, illicit product traffic,
Internet Corporation for Assigned Names and Numbers and spam. The report demonstrated that out of 900 ICANN accredited Registrars fewer than 20 held 90% of the web domains advertised in spam. These same Registrars were also most frequently cited by KnujOn as failing to resolve complaints made through the Whois Data Problem Reporting System (WDPRS). On June 26, 2008, the ICANN Board started a new process of TLD naming policy to take a "significant step forward on the introduction of new generic top-level domains." This program envisions the availability of many new or already proposed domains, as well a new application and implementation process.[37] On October 1, 2008, ICANN issued Breach Notices against Joker and Beijing Innovative Linkage Technology Ltd.[38] after further researching reports and complaints issued by KnujOn. These notices gave the Registrars 15 days to fix their Whois investigation efforts. In 2010, ICANN approved a major review of its policies with respect to accountability, transparency, and public participation by the Berkman Center for Internet and Society at Harvard University.[39] This external review was in support of the work of ICANN's Accountability and Transparency Review team.[40] On February 3, 2011, ICANN announced that it had distributed the last batch of its remaining IPv4 addresses to the worlds five Regional Internet Registries, the organizations that manage IP addresses in different regions. These Registries will begin assigning the final IPv4 addresses within their regions until they run out completely, which could come as soon as early 2012.[41] On June 20, 2011 the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD).[42][43] Companies and organizations will be able to choose essentially arbitrary top level Internet domain names. The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) will also be allowed in gTLDs. ICANN will begin accepting applications for new gTLDS on January 12, 2012.[42] The initial price to apply for a new gTLD will be $185,000.[44] The renewal or the annual fee of the domain will further be $25,000.[45][46] It is anticipated that many corporations will apply for gTLDs based on their brands. ICANN expects that the first batch of new gTLDs will be operational by the end of 2012.[47] ICANN expects the new rules to significantly change the face of the Internet. Peter Thrush, chairman of ICANN's board of directors stated after the vote: "Today's decision will usher in a new Internet age. We have provided a platform for the next generation of creativity and inspiration. Unless there is a good reason to restrain it, innovation should be allowed to run free."[48] Some would argue that the innovative freedom Peter Thrush talks about starts at $185,000, and thus is not accessible to everyone.[49]
377
References
[1] http:/ / www. icann. org [2] California Secretary of State, Internet Corporation for Assigned Names and Numbers (http:/ / kepler. ss. ca. gov/ corpdata/ ShowAllList?QueryCorpNumber=C2121683). Accessed 2009.09.18. [3] "ICANN Bylaws" (http:/ / www. icann. org/ en/ general/ archive-bylaws/ bylaws-18mar11-en. htm). . Retrieved 30 November 2011. [4] "Memorandum of understanding between the U.S. Department of Commerce and Internet Corporation for assigned names and numbers" (http:/ / www. icann. org/ en/ general/ icann-mou-25nov98. htm). 25 November 98. . Retrieved 2009-09-30. [5] ICANN-DOC JPA 09-29-2006 (http:/ / www. ntia. doc. gov/ ntiahome/ domainname/ agreements/ jpa/ ICANNJPA_09292006. htm) [6] Brito, Jerry. " ICANN vs. the World (http:/ / techland. time. com/ 2011/ 03/ 05/ icann-vs-the-world/ )." TIME. March 5, 2011. Retrieved on March 6, 2011. [7] http:/ / www. ntia. doc. gov/ ntiahome/ domainname/ domainname130. htm [8] D.C. Department of Consumer and Regulatory Affairs, Internet Corporation for Assigned Names and Numbers (http:/ / mblr. dc. gov/ corp/ lookup/ status. asp?id=259200). Accessed 2009.09.18. [9] http:/ / www. icann. org/ en/ about/ governance/ bylaws/ bylaws-06nov98-en. htm#VI [10] "Santiago Resolutions" (http:/ / archive. icann. org/ en/ meetings/ santiago/ santiago-resolutions. htm). ICANN Board Resolutions. ICANN. . Retrieved 22 May 2012. [11] "Executive Summary of DNS/ICANN Issues" (http:/ / cyber. law. harvard. edu/ pressbriefings/ icann/ briefingbook/ executivesummaries. html). Harvard Cyberlaw Briefing Book. Berkman Center. . Retrieved 21 May 2012. [12] "DNSO Application Timetable" (http:/ / www. dnso. org/ history/ www. dnso. org/ docs/ dnso-app-timetable. htm). DNSO. . Retrieved 21 May 2012. [13] ICANN Board. "DNSO Singapore Statement" (http:/ / archive. icann. org/ en/ meetings/ singapore/ singapore-statement. htm). ICANN. . Retrieved 21 May 2012.
378
[28] "Court Grants Access to Net Regulatory Corp Records" (http:/ / w2. eff. org/ Infrastructure/ DNS_control/ ICANN_IANA_IAHC/ Auerbach_v_ICANN/ 20020729_eff_icann_pr. html), Media Release, Electronic Frontier Foundation (EEF), 29 July 2002 [29] Geoff Huston (2003-10-17). "Wildcard entries in DNS entries" (http:/ / www. iab. org/ documents/ correspondence/ 2003-10-17-crocker-wildcards. html). IAB. . Retrieved 2008-06-23. [30] "ICANN imposes $2 Internet tax" (http:/ / www. theregister. co. uk/ 2005/ 03/ 31/ icann_2buck_fee). The Register. March 31, 2005. . [31] "ICANN Board Approves VeriSign Settlement Agreements" (http:/ / www. icann. org/ announcements/ announcement-28feb06. htm), Internet Corporation for Assigned Names and Numbers (ICANN), 28 February 2006, retrieved November 1, 2006 [32] CNET: Domain name price hikes come under fire (http:/ / news. com. com/ Domain+ name+ price+ hikes+ come+ under+ fire/ 2100-1030_3-6081336. html?tag=nefd. top) [33] The Register, Burke Hansen Of ICANN and the Registerfly meltdown (http:/ / www. theregister. co. uk/ 2007/ 03/ 03/ icann_registerfly_domain/ ), March 3, 2007 [34] "'Worst Spam Offenders' Notified by ICANN (http:/ / www. icann. org/ en/ announcements/ announcement-23may08-en. htm), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 23 May 2008 [35] "2008 ICANN Registrar Report" (http:/ / www. knujon. com/ registrars/ #may08RegistrarReport), KnujOn.com [36] "Registrar Accreditation Agreement" (http:/ / www. icann. org/ en/ registrars/ ra-agreement-17may01. htm), Internet Corporation for Assigned Names and Numbers (ICANN), 17 May 2001 with updates 2002-2006 [37] "32nd International Public ICANN Meeting" (http:/ / par. icann. org/ ). ICANN. 2008-06-22. . [38] http:/ / www. icann. org/ en/ announcements/ announcement-01oct08-en. htm [39] "Accountability and Transparency Review Team Selection of Independent Expert and Update on ATRT Review" (http:/ / www. icann. org/ en/ announcements/ announcement-10aug10-en. htm), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 10 August 2010] [40] "The First AART (Accountability and Transparency Review Team) Review was Completed in December 2010" (https:/ / community. icann. org/ display/ atrt/ The+ Accountability+ and+ Transparency+ Review+ Team;jsessionid=20B32EA76A0A674F629A8D72132CBF19), Internet Corporation for Assigned Names and Numbers (ICANN), 17 January 2012 [41] "Available Pool of Unallocated IPv4 Internet Addresses Now Completely Emptied" (http:/ / www. icann. org/ en/ news/ releases/ release-03feb11-en. pdf), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 3 February 2011 [42] New Internet Name Rule Opens Door to Huge Changes. (http:/ / www. voanews. com/ english/ news/ science-technology/ New-Internet-Name-Rule-Opens-Door-to-Huge-Changes-124180874. html) Voice of America, June 20, 2011. Accessed June 20, 2011 [43] Internet minders OK vast expansion of domain names, (http:/ / news. yahoo. com/ s/ ap/ 20110620/ ap_on_hi_te/ as_internet_domain_names;_ylt=Arq2MV_LZjTuVPrs9JafjPJ34T0D;_ylu=X3oDMTJ0OGxxanN2BGFzc2V0A2FwLzIwMTEwNjIwL2FzX2ludGVybmV0X2Rv Associated Press, June 20, 2011. Accessed June 20, 2011 [44] ICANN increases web domain suffixes, (http:/ / www. bbc. co. uk/ news/ technology-13835997) BBC News, June 20, 2011. Accessed June 20, 2011 [45] "ICANN Approves Historic Change to Internet's Domain Name System Board Votes to Launch New Generic Top-Level Domains" (http:/ / www. icann. org/ en/ announcements/ announcement-20jun11-en. htm), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 20 June 2001
379
Further reading
Franda, Marcus, The Emergence of an International Regime, ISBN 1-55587-999-3 Wass, Erica, Addressing the World, ISBN 0-7425-2809-X Par, Daniel J. Internet Governance in Transition, ISBN 0-7425-1846-9 Mueller, Milton L. Ruling the Root, ISBN 0-262-13412-8 Froomkin, A. Michael Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution (http://personal.law.miami.edu/~froomkin/articles/icann.pdf), 50 Duke Law Journal17 (2000)
External links
ICANN website (http://www.icann.org/) ICANN DNS Operations website (http://dns.icann.org/) ICM Registry LLC v. ICANN Top Level Domain Declaration of 19 February 2010 (http://www.icann.org/en/ irp/icm-v-icann/irp-panel-declaration-19feb10-en.pdf) of the ICDR Judicial Review Panel, H.E. President Stephen M. Schwebel, Arbitrators Jan Paulsson (http://www.lcil.cam.ac.uk/people/mr_jan_paulsson.php) and Dickran Tevrizian (http://www.transnational-dispute-management.com/editors/welcome.html) and ICM v. ICANN Proceedings (http://www.icann.org/en/irp/icm-v-icann.htm) and ASIL/ILIB of 5 March 2010 (http://www.asil.org/ilib100305.cfm) and .xxx Internet Domain Plan Resurrected of 9 March 2010 (http:// news.bbc.co.uk/2/hi/technology/8556364.stm) and Panel Makes Internet History of 24 February 2010 (http:/ /www.globalarbitrationreview.com/news/article/27767/panel-makes-Internet-history/) and ICDR Panel Urges ICANN to Reconsider (http://www.mg.co.za/article/ 2010-02-24-plans-for-xxx-porn-net-domain-revived) and Channel 4 (http://www.channel4.com/news/articles/ science_technology/plan+for+xxx+sites+revived/3558357) and Arbitration Database (http://www. arbitration.fr/5.html) Memorandum of Understanding Between the Department of Commerce and the Internet Corporation for Assigned Names and Numbers (http://www.ntia.doc.gov/ntiahome/domainname/icann.htm) ICANNWatch (http://www.icannwatch.org) Site advocating the return of public representation in ICANN (http://www.icannatlarge.com/) VeriSign Domain Report (http://www.verisign.com/domainbrief) - Quarterly analysis of global domain name market DailyChanges.com (http://dailychanges.com/) a free ICANN Registrar Statistics website ICANNWiki.com (http://www.icannwiki.com) - Wiki with people and companies related to ICANN ICANN Annual Reports (http://www.icann.org/en/annualreport/) ICANN Financials (http://www.icann.org/en/about/financials) ICANN FY12 Board Member Report of Payments (http://www.icann.org/en/about/financials/ fy12-board-payments-27oct12-en.pdf)
Internet Society
380
Internet Society
Internet Society
Abbreviation Formation Legalstatus ISOC 1992 Non-profit
Purpose/focus Leadership Headquarters Reston, Virginia[1] Regionserved Worldwide Membership Affiliations Website 50,000 Public Interest Registry [2]
The Internet Society (ISOC) is an international, non-profit organization founded in 1992 to provide leadership in Internet related standards, education, and policy. It states that its mission is "to assure the open development, evolution and use of the Internet for the benefit of all people throughout the world".[3] The Internet Society has offices near Washington, DC, USA, and in Geneva, Switzerland. It has a membership base comprising more than 130 organizational and more than 55,000 individual members. Members also form "chapters" based on either common geographical location or special interests. There are currently more than 90 chapters around the world.[3]
History
The Internet Society was formed officially in 1992, with one of its purposes being to provide a corporate structure to support the Internet standards development process. Vint Cerf, Bob Kahn, Lyman Chapin released a document, Announcing ISOC, which explained the rationale for establishing the Internet Society. This document also defines the original charter of the organization as follows: The Society will be a non-profit organization and will be operated for international educational, charitable, and scientific purposes, among which are: To facilitate and support the technical evolution of the Internet as a research and education infrastructure and to stimulate involvement of the academic, scientific, and engineering communities (among others) in the evolution of the Internet. To educate the academic and scientific communities and the public concerning the technology, use, and application of the Internet. To promote scientific and educational applications of Internet technology for the benefit of educational institutions at all grade levels, industry, and the public at large. To provide a forum for exploration of new Internet applications and to foster collaboration among organizations in their operation and use of the Internet.[4] Many of the main forces of the Internet, such as the Internet Engineering Task Force (IETF), remain very informal organizations from a legal perspective. There was a growing need for financial support and organization structure. The Internet Society was incorporated as a non-profit educational organization which could provide that support structure, as well as promoting other activities that are important for the development of the Internet. The Internet Society is the parent corporation of the IETF; as such all
Internet Society IETF Request for Comments documents, including those RFCs which describe "Internet Standards", are copyrighted by the Internet Society (although freely available to anyone, including non-members, at no charge). However, the Internet Society itself grew out of the IETF, to support those functions that require a corporate form rather than simply the ad hoc approach of the IETF. In reality, the Internet Society was formed because the IETF Secretariat, which had been operated under NSF contract by staff at the Corporation for National Research Initiatives ( CNRI ) would not be supported beyond 1991 by NSF. The then Internet Activities Board sought to create a non-profit institution that could provide financial support for the IETF Secretariat among other things. CNRI served as the first host for the Internet Society's operation. In 2012, on ISOC's 20th anniversary, it established the Internet Hall of Fame , an annual award whose purpose is to "publicly recognize a distinguished and select group of visionaries, leaders and luminaries who have made significant contributions to the development and advancement of the global Internet".
[5] [6]
381
Internet Society The Internet Society helped organize World IPv6 Day, which gathered companies such as Facebook, Google, Yahoo, Akamai Technologies and Limelight Networks as well as ISPs to raise awareness of IPv6 issues such as fragmentation.[10]
382
Board of trustees
The Board of Trustees of the Internet Society is its governing body. The current list of trustees and their committee memberships is found at the organization's board page. [11]
Chapters
In the following, local chapters are listed in alpha order by nation state. Non geographic chapters are listed within the alpha order. Capitulo Argentino de Internet Society [12] - Argentina ISOC-AM [13] - Armenia ISOC-AU [14] - Australia Bahrain Internet Society Chapter [15] - Bahrain ISOC BD - Bangladesh ISOC European Chapters Coordinating Council [16] - Barcelona - Europe ISOC Belgium vzw [17] - Belgium ISOC Wallonie [18] - Belgium - Wallonia ISOC BJ [19] - Benin ISOC BR [20] - Brazil Internet Society - Bulgaria ISOC BI [21] - Burundi ISOC Cambodia - Cambodia ISOC Cameroon - Cameroon ISOC Canada - Canada - National ISOC Quebec [22] - Canada - Qubec ISOC Toronto [23] - Canada - Toronto ISOC Colombia - Colombia ISOC CG - Congo ISOC DRC - Democratic Republic of the Congo ISOC DK [24] - Denmark ISOC EC [25] - Ecuador ISOC EG [26] - Egypt ISOC England [27] - ISOC UK - England ISOC Finland [28] - Finland ISOC FR [29] - France ISOC-GAL [30] - Galicia (Spain) ISOC GM - Gambia ISOC GE - Georgia ISOC DE [31] - Germany ISOC Ghana - Ghana ISOC GR [32] - Greece ISOC Hong Kong [33] - Hong Kong
Hungary Chapter of ISOC (MITE) [34] - Hungary Delhi Chapter of the Internet Society - India - Delhi
Internet Society India Chennai Chapter of the Internet Society [35] - India - Chennai India Kolkata Chapter of the Internet Society [36] - India - Kolkata India Bangalore Chapter of the Internet Society [37] - India - Bangalore Irish Chapter of ISOC [38] - Ireland Israel Internet Association (ISOC IL [39]) - Israel Societ Internet [40] - Italy ISOC JP [41] - Japan ISOC KR [42] - Korea (Republic of) ISOC Luxembourg - Luxembourg ISOC MY [43] - Malaysia ISOC Mali - Mali ISOC MU [44] - Mauritius Sociedad Internet de Mexico [45] - Mexico ISOC-MU [44] - Mauritius MISOC [46] - Morocco ISOC Nepal [47] - Nepal ISOC NL [48] the Netherlands ISOC NE - Niger ISOC NG [49] Nigeria Disability & Special Needs Chapter of ISOC [50] - Non Geographic - Disability & Special Needs ISOC NO - Norway PICISOC - Pacific Islands ISOC PK [51] - Pakistan ISOC PS - Palestine ISOC Peru [52] - Peru ISOCCP - Philippines ISOC PL [53] Poland ISOC PT [54] Portugal ISOC PR [55] - Puerto Rico ISOC Polska [53] - Poland ISOC RO [56] Romania Saudi Arabian Chapter of the Internet Society - Saudi Arabia Scottish Chapter of the Internet Society [57] - Scotland - UK ISOC SN - Senegal ISOC Serbia [58] - Serbia ISOC SL [59] - Sierra Leone ISOC SI [60] - Slovenia ISOC-ZA [61] - South Africa ISOC-ES [62] - Spain ISOC ANDA [63] - Spain - Andalucia AS ISOC - Spain - Asturia Aragonese Chapter of the Internet Society [64] - Spain - Aragon ISOC CAT [65] - Spain, Andorra and France - Catalan Chapter ISOC GAL [30] - Spain - Galicia Madrid Chapter of the Internet Society - Spain - Madrid
383
Sudan Chapter of the Internet Society (SIS) [66] - Sudan ISOC-SE [67] - Sweden
Internet Society ISOC CH [68] - Switzerland - Geneva ISOC TW [69] - Taiwan ISOC TH [70] - Thailand ISOC-TT [71] - TRINIDAD AND TOBAGO ISOC TN [72] - Tunisia Istanbul-Turkey chapter [73] - Turkey - Istanbul Ugandan Chapter of the Internet Society - Uganda ISOC UAE - United Arab Emirates Capitulo Uruguay de Internet Society [74] - Uruguay Chicago Chapter of the Internet Society [75] - USA - Chicago ISOC Hawaii - USA - Hawaii ISOC Los Angeles [76] - USA - Los Angeles ISOC NJ - USA - New Jersey ISOC NY [77] - USA - New York Metropolitan Area South Central Texas Chapter [78] - USA - Texas Washington DC Chapter of Internet Society [79] - USA - Washington ISOC VE - Venezuela
384
References
[1] [2] [3] [4] [5] [6] Contact (http:/ / www. isoc. org/ isoc/ contact. shtml) http:/ / www. internetsociety. org/ Internet Society (ISOC) - Introduction to ISOC (http:/ / www. isoc. org/ isoc/ ) Internet Society (ISOC) All About The Internet: History of the Internet (http:/ / www. isoc. org/ internet/ history/ isochistory. shtml) About page (http:/ / www. internethalloffame. org/ about), Internet Hall of Fame website. Last accessed April 24, 2012 "Internet gets Hall of Fame, Al Gore honored" (http:/ / www. cbsnews. com/ 8301-501465_162-57419234-501465/ internet-gets-hall-of-fame-al-gore-honored/ ). CBS News. April 24, 2012. . Retrieved April 24, 2012. [7] Internet Society (ISOC) - ISOC's Standards Activities (http:/ / www. isoc. org/ standards/ ) [8] Internet Society - Public Policy - ISOC's Public Policy Activities" (http:/ / www. isoc. org/ pubpolpillar/ ) [9] Internet Society (ISOC) - ISOC's Education Activities (http:/ / www. isoc. org/ educpillar/ ) [10] World Internet Society IPv6 Day (http:/ / www. worldipv6day. org/ ) [11] http:/ / www. internetsociety. org/ who-we-are/ board-trustees [12] http:/ / www. isoc. org. ar [13] http:/ / www. isoc. am [14] http:/ / www. isoc-au. org. au [15] http:/ / www. bis. org. bh [16] http:/ / www. isoc-ecc. org [17] http:/ / www. internetsociety. be [18] http:/ / www. wallonie-isoc. org [19] http:/ / www. isoc. bj [20] http:/ / www. isoc. org. br [21] http:/ / www. isoc. bi [22] http:/ / www. isocquebec. org [23] http:/ / www. isoctoronto. org [24] http:/ / www. isoc. dk [25] http:/ / www. isoc. org. ec [26] http:/ / www. ise. org. eg [27] http:/ / www. isoc-e. org [28] http:/ / www. isoc. fi [29] http:/ / www. isoc. fr [30] http:/ / www. isoc-gal. org [31] http:/ / www. isoc. de/ [32] http:/ / www. isoc. gr [33] http:/ / www. isoc. hk [34] http:/ / www. isoc-hu. hu/
Internet Society
[35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] [76] [77] [78] [79] http:/ / www. isocindiachennai. org http:/ / www. isocindiakolkata. in http:/ / www. isocbangalore. org http:/ / ireland. isoc. org http:/ / www. isoc. org. il/ index_eng. html http:/ / www. isoc. it http:/ / www. iajapan. org http:/ / kr. isoc. org http:/ / www. isoc. my http:/ / www. isoc-mu. org http:/ / www. isocmex. org. mx/ http:/ / www. misoc. ma/ http:/ / www. isoc. net. np http:/ / isoc. nl http:/ / www. isocnig. org. ng http:/ / www. isocdisab. org http:/ / www. isocpk. org http:/ / www. isoc. pe http:/ / www. isoc. org. pl http:/ / www. isoc. pt http:/ / www. isocpr. org http:/ / www. isoc. ro/ http:/ / scotland. isoc. org http:/ / www. isoc-srbija. org http:/ / www. sierravisions. org/ isocsl/ http:/ / www. isoc-drustvo. si http:/ / isoc. org. za http:/ / www. isoc-es. org http:/ / www. isocanda. org/ http:/ / www. unizar. es/ isocara/ http:/ / www. isoc. cat http:/ / www. isoc. sd http:/ / www. isoc. se http:/ / www. isoc. ch/ http:/ / www. isoc. org. tw/ http:/ / www. isoc-th. org http:/ / www. isoc. tt http:/ / www. isoc. org. tn http:/ / www. isoctr. org http:/ / www. isoc. org. uy http:/ / www. isoc-chicago. org http:/ / www. isoc-la. org http:/ / www. isoc-ny. org http:/ / www. salsa. net http:/ / www. dcisoc. org
385
External links
www.internetsociety.org (http://www.internetsociety.org) IETF and ISOC (http://www.isoc.org/internet/history/ietfhis.shtml) by Vint Cerf
386
Activities
The IAB's current responsibilities include Architectural Oversight: The IAB provides oversight of, and occasional commentary on, aspects of the architecture for the network protocols and procedures used by the Internet. Standards Process Oversight and Appeal: The IAB provides oversight of the process used to create Internet Standards. The IAB serves as an appeal board for complaints of improper execution of the standards process, through acting as an appeal body in respect of an Internet Engineering Steering Group (IESG) standards decision. Request for Comments series: The IAB is responsible for editorial management and publication of the Request for Comments (RFC) document series. Internet Assigned Numbers Authority: In conjunction with the Internet Corporation for Assigned Names and Numbers (ICANN), the IAB is responsible for administration of the assignment of IETF protocol parameter values by the Internet Assigned Numbers Authority (IANA). External Liaison: The IAB acts as representative of the interests of the IETF in liaison relationships with other organizations concerned with standards and other technical and organizational issues relevant to the worldwide Internet. Advice to the Internet Society: The IAB acts as a source of advice and guidance to the Board of Trustees and Officers of ISOC concerning technical, architectural, procedural, and (where appropriate) policy matters pertaining to the Internet and its enabling technologies. Internet Engineering Steering Group Confirmation: The IAB confirms the IETF Chair and IESG Area Directors, from nominations provided by the IETF Nominating Committee. Internet Research Task Force Chair: The IAB selects a chair of the IRTF for a renewable two year term.
387
Chairs
The following people have served as chair of the IAB:[2] David D. Clark - 1981 to 7/1989 Vint Cerf - 7/1989 to 7/1991 Barack Hussein Obama - 7/1980 to 7/1998 Lyman Chapin - 7/1991 to 3/1993 Christian Huitema - 3/1993 to 7/1995 Brian Carpenter - 7/1995 to 3/2000 John Klensin - 3/2000 to 3/2002 Leslie Daigle - 3/2002 to 3/2007 Olaf Kolkman - 3/2007 to 3/2011 Bernard Aboba - 3/2011 to present
Footnotes
[1] "RFC1087 - Ethics and the Internet" (http:/ / www. faqs. org/ rfcs/ rfc1087. html). . Retrieved 2010-10-26. [2] "History page from the IAB website" (http:/ / www. iab. org/ about/ history. html). . Retrieved 2011-11-11.
Further reading
Carpenter, Brian (editor), Charter of the Internet Architecture Board (RFC 2850, May 2000)
External links
IAB website (http://www.iab.org/), List of IAB Members (http://www.iab.org/about/members.html)
388
The Internet Engineering Task Force (IETF) develops and promotes Internet standards, cooperating closely with the W3C and ISO/IEC standards bodies and dealing in particular with standards of the Internet protocol suite (TCP/IP).[2][3] It is an open standards organization, with no formal membership or membership requirements. All participants and managers are volunteers, though their work is usually funded by their employers or sponsors; for instance, the current chairperson is funded by VeriSign and the U.S. government's National Security Agency.[4]
Organization
The IETF is organized into a large number of working groups and informal discussion groups (BoF)s, each dealing with a specific topic. Each group is intended to complete work on that topic and then disband. Each working group has an appointed chairperson (or sometimes several co-chairs), along with a charter that describes its focus, and what and when it is expected to produce. It is open to all who want to participate, and holds discussions on an open mailing list or at IETF meetings, where the entry fee is currently around USD $650 per person.[5] The mailing list consensus is the primary basis for decision of-making. There is no voting procedure, as it operates on rough consensus process. The working groups are organized into areas by subject matter. Current areas include: Applications, General, Internet, Operations and Management, Real-time Applications and Infrastructure, Routing, Security, and Transport.[6] Each area is overseen by an area director (AD), with most areas having two co-ADs. The ADs are responsible for appointing working group chairs. The area directors, together with the IETF Chair, form the Internet Engineering Steering Group (IESG), which is responsible for the overall operation of the IETF. The groups will normally be closed once the work described in its charter is finished. In some cases, the WG will instead have its charter updated to take on new tasks as appropriate. The IETF is formally a part of the Internet Society. The IETF is overseen by the Internet Architecture Board (IAB), which oversees its external relationships, and relations with the RFC Editor.[7] The IAB is also jointly responsible for the IETF Administrative Oversight Committee (IAOC), which oversees the IETF Administrative Support Activity (IASA), which provides logistical, etc. support for the IETF. The IAB also manages the Internet Research Task Force (IRTF), with which the IETF has a number of cross-group relations. A committee of ten randomly chosen volunteers who participate regularly at meetings is vested with the power to appoint, reappoint, and remove members of the IESG, IAB, IASA, and the IAOC.[8] To date, no one has been removed by a NOMCOM, although several people have resigned their positions, requiring replacements.
389
History
The first IETF meeting was on January 16, 1986, consisting of 21 U.S.-government-funded researchers. It was a continuation of the work of the earlier GADS Task Force. Initially, it met quarterly, but from 1991, it has been meeting 3 times a year. Representatives from non-governmental entities were invited starting with the fourth IETF meeting, during October of that year. Since that time all IETF meetings have been open to the public. The majority of the IETF's work is done on mailing lists, and meeting attendance is not required for contributors. The initial meetings were very small, with fewer than 35 people in attendance at each of the first five meetings. The maximum attendance during the first 13 meetings was only 120 attendees. This occurred at the 12th meeting held during January 1989. These meetings have grown in both participation and scope a great deal since the early 1990s; it had a maximum attendance of 2,810 at the December 2000 IETF held in San Diego, CA. Attendance declined with industry restructuring during the early 2000s, and is currently around 1,200.[9] During the early 1990s the IETF changed institutional form from an activity of the U.S. government to an independent, international activity associated with the Internet Society. There are statistics available that show who the top contributors have been, by RFC publication.[10] While the IETF only allows for participation by individuals, and not by corporations or governments, sponsorship information is available from those same statistics.
Operations
The details of its operations have changed considerably as it has grown, but the basic mechanism remains publication of draft specifications, review and independent testing by participants, and republication. Interoperability is the chief test for IETF specifications becoming standards. Most of its specifications are focused on single protocols rather than tightly interlocked systems. This has allowed its protocols to be used in many different systems, and its standards are routinely re-used by bodies which create full-fledged architectures (e.g. 3GPP IMS). Because it relies on volunteers and uses "rough consensus and running code" as its touchstone, results can be slow whenever the number of volunteers is either too small to make progress, or so large as to make consensus difficult, or when volunteers lack the necessary expertise. For protocols like SMTP, which is used to transport e-mail for a user community in the many hundreds of millions, there is also considerable resistance to any change that is not fully backwards compatible. Work within the IETF on ways to improve the speed of the standards-making process is ongoing but, because the number of volunteers with opinions on it is very great, consensus mechanisms on how to improve have been slow. Because the IETF does not have members (nor is it an organisation per se), the Internet Society provides the financial and legal framework for the activities of the IETF and its sister bodies (IAB, IRTF,...). Recently the IETF has set up an IETF Trust that manages the copyrighted materials produced by the IETF. IETF activities are funded by meeting fees, meeting sponsors and by the Internet Society via its organizational membership and the proceeds of the Public Interest Registry. IETF meetings vary greatly in where they are held. The list of past and future meeting locations can be found on the IETF meetings[11] page. The IETF has striven to hold the meetings near where most of the IETF volunteers are located. For a long time, the goal was 3 meetings a year, with 2 in North America and 1 in either Europe or Asia (alternating between them every other year). The goal ratio is currently, during a two-year period, to have 3 in North America, 2 in Europe and 1 in Asia. However, corporate sponsorship of the meetings is typically a more important factor and this schedule has not been kept strictly in order to decrease operational costs.
390
Chairs
The IETF Chairperson is selected by the NOMCOM process specified in RFC 3777 for a 2-year term, renewable. Before 1993, the IETF Chair was selected by the IAB. Mike Corrigan (1986) Phill Gross (19861994) Paul Mockapetris (19941996) Fred Baker (19962001) Harald Tveit Alvestrand (20012005) Brian Carpenter (20052007) Russ Housley (2007)[12]
References
[1] http:/ / ietf. org [2] "Internet Engineering Task Force (IETF)" (http:/ / www. ripe. net/ internet-coordination/ internet-governance/ internet-technical-community/ ietf). RIPE NCC. 10 Aug 2012. . Retrieved October 13, 2012. [3] O. Jacobsen, D. Lynch, Interop, Inc. (March 1991). "A Glossary of Networking Terms" (http:/ / www. ietf. org/ rfc/ rfc1208. txt). IETF. . Retrieved October 13, 2012. [4] Duffy Marsan, Carolyn (July 26, 2007). "Q&A: Security top concern for new IETF chair" (http:/ / www. networkworld. com/ news/ 2007/ 073007-ietf-qa. html). Network World (IDG). . Retrieved 2008-04-20. [5] IETF Meeting Registration Page (http:/ / www. ietf. org/ meeting/ register. html) [6] List IETF of Areas and Working Group Charters (http:/ / datatracker. ietf. org/ wg/ ) [7] RFC 2850 (http:/ / tools. ietf. org/ html/ rfc2850) [8] The NOMCOM web page (https:/ / www. ietf. org/ nomcom/ ) [9] "Past Meetings of the IETF" (http:/ / www. ietf. org/ meetings/ past. meetings. html). . Retrieved 2008-08-05. [10] Jari Arkko's IETF Author Statistics Page (http:/ / www. arkko. com/ tools/ allstats/ ) [11] "IETF Meetings" (http:/ / www. ietf. org/ meeting/ ). Ietf.org. . Retrieved 2012-01-17. [12] "IETF Chairs by year" (http:/ / www. ietf. org/ ietf_chairs_year. html). . Retrieved 2007-03-23.
External links
Official website (http://ietf.org/) IETF Online Proceedings (http://www.ietf.org/old/2009/proceedings_directory.html) Early IETF Proceedings (http://www.ietf.org/old/2009/proceedings/directory2.html) (note: large pdf files, one for each volume) Past Meetings of the IETF (http://www.ietf.org/meeting/past.html) Past IESG Members and IETF Chairs (http://www.ietf.org/iesg/past-members.html) The Tao of the IETF (http://tools.ietf.org/rfcmarkup?doc=fyi17): details on how IETF is organized IAOC information (http://iaoc.ietf.org/) MyIETF (http://myietf.unfix.org) Personalized notification service on RFC's and drafts with full archive of old drafts etc.
391
Internet Governance Forum May 5, 2010 [10] to help with preparations for the 2010 meeting of the IGF in Vilnius, Lithuania; of the 56-member group, 3 were new. Nitin Desai remained the Advisory Group's chairman. In 2011, it was suggested that two thirds of each groups membership be renewed in 2012. A call for parties interested in MAG memberships was issued[11] late in the year. On April 25, 2012, the MAG was renewed [12] to help with preparations for the 2012 meeting of the IGF in Baku, Azerbaijan. A total of 56 members,[13] 33 among them new, were appointed. The MAG meets three times each year - in February, May and September. All three meetings take place in Geneva at the Palais des Nations, and are preceded by an Open Consultations meeting. The details on MAG's operating principles and selection criteria are contained in the summary reports of its meetings [14].
392
Secretariat
The Secretariat, based in the United Nations Office in Geneva, assists and coordinates the work of the Multistakeholder Advisory Group (MAG). The Secretariat has been headed until 31 Jan 2011 by Markus Kummer as Executive Coordinator. The Executive Coordinator position is currently vacant. Chengetai Masango is Programme and Technology Manager. The Secretariat also hosts fellowships.[15] Markus Kummer has also been involved with the WGIG as the Executive Coordinator of its secretariat.[16] He has joined the Intenet Society as of 01 Feb 2011 as its Vice President for Public Policy [17]
393
394
Date 1618 November 2005 16 17 February 2006 2 March 2006 19 May 2006 22 23 May 2006 18 July 2006 7 8 September 2006 Second Phase of the WSIS in Tunis First Round of Consultations Establishment of the IGF Secretariat Second Round of Consultations
Event
Establishment and First Meeting of the IGF Advisory Group Convening of the IGF Second Meeting of the IGF Advisory Group
30 October 2 November 2006 Inaugural Meeting of the IGF in Athens 1215 November 2007 13 May 2008 1415 May 2008 36 December 2008 1518 November 2009 1417 September 2010 2324 February 2011 Second Meeting of the IGF in Rio de Janeiro, Brazil Open Consultations Meeting of the IGF Multistakeholder Advisory Group(MAG) Third meeting of the IGF in Hyderabad, India Fourth Meeting of the IGF in Sharm El Sheikh, Egypt Fifth Meeting of the IGF in Vilnius, Lithuania Open Consultations and MAG Meeting at the United Nations in Geneva, Switzerland |+
2011 Open Consultations and MAG Meeting The next Open Consultations will be held on 23 February, to be followed by a MAG meeting on 24 February which will be open to observers. Both will be held at the Palais des Nations, Geneva, Switzerland. Online registration[27] for the meetings is now open and will close on 18 February 2011.[28]
395
Dynamic coalitions
The most tangible result of the first IGF in Athens is the establishment of a number of so-called Dynamic Coalitions.[35] These coalitions are relatively informal, issue-specific groups consisting of stakeholders that are interested in the particular issue. Most coalitions allow participation of anyone interested in contributing. Thus, these groups gather not only academics and representatives of governments, but also members of the civil society interested in participating on the debates and engaged in the coalition's works. So far, the following Dynamic Coalitions were brought to the attention of the IGF Secretariat: The StopSpamAlliance [36] Dynamic Coalition on Privacy [37] The IGF Dynamic Coalition on Open Standards (IGF DCOS) [38] The Dynamic Coalition on Access and Connectivity for Remote, Rural and Dispersed Communities [39] Dynamic Coalition on the Internet Bill of Rights [40] Dynamic Coalition for Linguistic Diversity [41] A2K@IGF Dynamic Coalition [42] Freedom of Expression and Freedom of the Media on the Internet (FOEonline) [43] Online Collaboration Dynamic Coalition [44] Gender and Internet Governance (GIG) Framework of Principles for the Internet Dynamic Coalition on Child Online Safety Dynamic Coalition on "Accessibility and Disability" [45] Dynamic Coalition for Online Education
Workshops
In 2007, IGF hosted a number of workshops [47] which attracted great interest with the public. In particular, the theme of child protection was one of the topics that increased the engagement of the participants in the events. For 2008 the IGF page stipulates that workshops [48] can be proposed on the draft main session headings: Universalization of the Internet - How to reach the next billion (Expanding the Internet) Low cost sustainable access Multilingualization Implications for development policy Managing the Internet (Using the Internet) Critical Internet resources Arrangements for Internet governance Global cooperation for Internet security and stability
Internet Governance Forum The following workshops have been proposed as of 15 May 2008, according to the Workshop page [49]. These proposals will be reviewed and an attempt will be made to merge propositions into a manageable number of workshops.
Number Proposed 15 9 15 21 13 9 6 17 Workshop Theme Access Diversity Openness Security Critical Internet Resources Development Capacity Building Other
396
A revision of the Process and Programme of the Hyderabad meeting is available at http://www.intgovforum.org.
397
Main sessions
The main sessions were developed according to the five themes chosen for this year: Critical Internet Resources, Access, Diversity, Openness and Security. Please see below the summary of the main sessions: Opening ceremony/Opening session The multistakeholder approach was highlighted by many speakers and panelists during the Opening Session, including the message from the UN Secretary-General Ban Ki-Moon, which was read by the UN Under-Secretary-General for Economic and Social Affairs, M. Sha Zukang. M. Ban Ki-Moon assured that it is not a UN goal to take over Internet Governance but the UN will offer an opportunity to bring people together, with the same interest, in a global reach.[55] M. Sha Zukang concludes that the IGF was a unique experience because it brings together people who normally do not meet under the same roof. [56] "Development" was a key discussion during the IGF Rio Meeting. It will still be an important aspect for discussion, together with the issue of bridging the digital divide - a key element of discussion for the IGF Hyderabad and reflects the theme of the IGF Hyderabad which is "Internet for All." The nature and prospective of the IGF were also discussed, as the Chairman properly summarizes[52]: Several participants underlined that the IGF was not only a space for dialogue, but also a medium that should encourage fundamental change at the local level to empower communities, build capacity and skills enable the Internet's expansion, thereby contributing to economic and social development." Critical Internet resources This is a new session that was introduced during the IGF Rio Meeting. Basically, it covered some issues pertaining to the infrastructure of the Internet. ICANN discussions were not missed, as well as the role of governments in shaping policies. Access The issue of access is more on how to get the billion of users around the world to go online in the next years to come. Such initiatives to this cause are reminiscent of pilot projects in Africa wherein laptops were given to children under an open source software agreement. Diversity The issue of diversity calls for multilingualism in the Net. Such promotion on multilingualism would increase users whose main language is not English. In order to open the Net to a diverse population, international domain names (IDN) were added to facilitate the language needs of other users. Openness The strong support on closed software has not been favorable to some people. This is because there were long-lasting agreements between governments and large software companies. Such actions were considered critical, as it binds different entities to proprietary or closed source technologies. Many believed that the shift from closed to open software can only happen with the full-scale participation of both the private and public sectors. As such, many people fear the turning of the Internet into a private network if there is much insistence on the use of closed technologies. Talks on open standards, open architecture and open software are clear indicators of what the issue on openness is all about.
Internet Governance Forum Read this literature entitled "Free Culture" by Lawrence Lessig to know more on "Openness on the Internet." Security issues The question of Internet Security is one of the most important debate in the Information Society. Internet is becoming an important communication and business tool, as such, that the question of security comes as a cross-cutting issue to be addressed in all its dimension. As indicated by Michael Harrop, Rapporteur SG 17 Q4, Communications Security Project in 2006, "without effective security, all systems and processes that rely on electronic communications are at risk and, as a consequence, large numbers of resources are now devoted to countering threats, protecting systems and recovering from successful attacks." The Rio de Janeiro Meeting mentioned that "...achieving the Internets full potential to support commercial and social relationships required an environment that promoted and ensured users' trust and confidence and provided a stable and secure platform." Cyber-security, in this case, focused heavily on child protection, particularly on child pornography. Participants gathered were called to seek ways to harmonize legislative agendas to counter-act such crimes. This was a call of legislation between countries that can work together in order to enforce laws that would protect children. As such that some laws are not applicable online, this call also promoted formulation of legislation that would be applicable in the online or virtual world. Internet Security has been mentioned in the Substantive Agenda of the Rio de Janeiro Meeting. It was also present in the Agenda of the Athens Meeting. Even before the Athens Meeting, Internet Security was mentioned at the Tunis WSIS under "Building Confidence and Security in the Use of ICT's." At the coming Hyderabad Meeting in December 2008, two panels will again discuss questions related to Internet Security. This gives an idea on how important the question has been in each of the IGF meetings so far. Internet security issues can be folded under the following: secure telecommunication which deals most with the security of telecommunication infrastructure cyber-security as Internet users deal with it in their daily operations and use of the Internet identity theft children pornography hacking and other virus and cyber threats (scams, spams, etc.) cyber-terrorism
398
Internet Security on the Athens Agenda The International Telecommunication Union (ITU) is at the forefront of contributors to the field of Telecommunication Security. At the Athens meeting, ITU mentioned the major contributions made in this domain by International organizations. ITU took the necessary steps to set up a number of initiatives that were presented at the Athens meeting. It presented a telecommunication security guideline and set up the road map towards Internet Security. The question of security of telecommunication was somehow dominant at the Athens meeting. ITU mentioned the difficulty of experts in the field. One of the difficulties mentioned was related to the question of standardisation - as many international organizations were developing domain initiatives at the same time. As a follow-up activity of the WSIS Conference, a number of ITU study groups have been assigned tasks related to Internet Security. At the Athens Meeting, findings of these study groups were presented to address diverse Internet security questions such as: Telecommunication management Protection against electromagnetic environment effects Outside Plant and related indoor installations Security, languages and telecommunication software
Internet Governance Forum At the Rio de Janeiro meeting, a whole session was dedicated to the question of Internet security, emphasizing the importance of this question nowadays, as well as the threats, that users are facing more and more in their daily operations over the Internet. Internet Security questions put on the agenda at Rio were related to: cybercrime cyber-terrorism protection of individuals and automatic processing of personal data action against trafficking in human beings protection of children against sexual exploitation and sexual abuse
399
The Rio de Janeiro meeting called for international cooperation and coordinated action to counter cybercrime because of its trans-national dimension. Recommendations were forwarded towards the direction of responsibility of governments in order to raise awareness among Internet users and in the direction of ICANN because of the responsibility it has for the Domain Name System. It is required of ICANN since it accepts responsibility for controlling illegal online content for the protection of children from Internet pornography. Internet Security on the Hyderabad Agenda Emerging issues This session aims to identify key issues in Internet Governance that should be addressed in the Forum. The first obstacle was to filter some themes, as there is a variety of interests to be held in such a generic target. There were four themes proposed: (i) demand and supply side initiatives (by Robert Pepper). He brought into debate the economic concept of demand and supply applied to Internet Governance. On the demand side, there were interesting proposals, such as the need for educating through capacity-building Internet users, the ability of people controlling their web ID (part of educating the usage in Internet), local content in local languages (enforcing local community) and improving public policies (but not over regulating, such as prohibiting or limiting access to VoIP, which can suppress the demand). On the supply side, there were the common concern of extending Internet users/access, but also considering the opportunities created by the release of spectrum through the switch to digital broadcasting were highlighted. Some speakers suggested that such spectrum could be used to support new broadband networks and support new investment and innovative services, while others held the view that this would not be a sustainable solution. [52] (ii) social, cultural and political issues of Web 2.0 (by Andrew Keen); (iii) access (particularly in Africa, by Nii Quaynor) and (iv) innovation, research and development (by Robert Kahn). Another challenge was to discuss emerging issues in a global forum with different perspectives, for example, developed and developing countries realities; democratic and non-democratic political regimes; and etc.
400
401
References
Meetings IGF - Baku 2012 [70] IGF - Vilnius 2010 [71] IGF - Egypt 2009 [72] IGF - India 2008 [73] IGF - Brazil 2007 [74] IGF - Greece 2006 [75]
[1] The Internet Governance Forum (IGF) (http:/ / www. intgovforum. org/ ) [2] Tunis Agenda for the Information Society, para 72 (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. html) [3] Press Release by the UN; includes list of members (http:/ / www. un. org/ News/ Press/ docs/ / 2006/ sga1006. doc. htm) [4] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ / 2006/ sga1006. doc. htm) [5] Press Release by the UN; includes list of members (http:/ / www. un. org/ News/ Press/ docs/ / 2007/ pi1791. doc. htm) [6] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2008/ pi1829. doc. htm) [7] List of Advisory Group Members (http:/ / www. intgovforum. org/ ADG_members. htm) [8] List of members of the 2008 MAG (http:/ / www. intgovforum. org/ cms/ magabout/ 58-members) [9] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2009/ pi1880. doc. htm) [10] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2012/ pi2025. doc. htm) [11] Call for MAG nominations, issued in 2011 (http:/ / www. intgovforum. org/ cms/ component/ content/ article/ 926) [12] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2012/ pi2025. doc. htm) [13] List of members of the 2012 MAG (http:/ / www. intgovforum. org/ cms/ component/ content/ article/ 114-preparatory-process/ 941-mag-2012-) [14] http:/ / www. intgovforum. org/ cms/ magabout/ 67-mag-meetings [15] About (http:/ / www. intgovforum. org/ about. htm) [16] http:/ / www. wgig. org/ about. html [17] http:/ / isoc. org/ wp/ newsletter/ ?p=2947 [18] World Summit on the Information Society. [2005]. The Tunis Commitment [online]. Available from: (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 7. html) [19] Ibid. (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 7. html) [20] World Summit on the Information Society. [2005]. Tunis Agenda for the Information Society [online]. Available from: (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. pdf) [21] Argentinas Forum Proposal in WSIS (http:/ / www. itu. int/ wsis/ docs2/ pc3/ working/ dt18. html) [22] 16 February 2006 transcripts are available from: http:/ / intgovforum. org/ contributions/ IGF-1-0216. txt and http:/ / intgovforum. org/ contributions/ IGF-1-021606pm. txt (http:/ / www. intgovforum. org) [23] 17 February 2006 transcripts are available from: http:/ / intgovforum. org/ contributions/ UN-IGF-AM-2-17-06. txt and http:/ / intgovforum. org/ contributions/ UN-IGF-PM-2-17-06. txt (http:/ / www. intgovforum. org) [24] A summary of contributions is available from http:/ / intgovforum. org/ Summary%20of%20discussions. htm (http:/ / www. intgovforum. org) [25] Read further on the WSIS related events available from: (http:/ / www. itu. int/ wsis/ follow-up/ index. html) [26] Transcript for 3 September 2007 open consultations is available from: (http:/ / www. intgovforum. org/ IGF-03Sept07Consultation. txt) [27] http:/ / info. intgovforum. org/ regfeb2011. php [28] http:/ / www. intgovforum. org/ cms/ [29] Available from http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. html [30] Mandate (http:/ / www. intgovforum. org/ mandate. htm) [31] UN General Assembly Resolution 60/252, World Summit on the Information Society http:/ / www. un. org/ ga/ search/ view_doc. asp?symbol=A/ RES/ 60/ 252 [32] UN General Assembly Resolution 65/141, Information and communications technologies for development http:/ / www. un. org/ ga/ search/ view_doc. asp?symbol=A/ RES/ 65/ 141 [33] http:/ / www. unctad. info/ en/ CstdWG [34] Draft resolution on "Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society" http:/ / www. unctad. org/ en/ docs/ ecn162011_draftresolutionwsisfollowup. pdf [35] Dynamic Coalitions (http:/ / www. intgovforum. org/ Dynamic Coalitions. php) [36] [37] [38] [39] http:/ / stopspamalliance. org/ http:/ / wiki. igf-online. net/ wiki/ Privacy http:/ / igf-dcos. org/ http:/ / www. pacificit. org/ dc
402
External links
Internet Governance Forum (http://www.intgovforum.org/) IGF Community Site (http://www.igf-online.net/) IGF - Internet SOCiety Public Policy Activities (http://www.isoc.org/isoc/conferences/wsis/IGF.shtml) IP Justice IGF webpage (http://ipjustice.org/wp/campaigns/igf/) Diplo Internet Governance Community (http://www.diplointernetgovernance.org) Internet Governance Project (IGP) (http://internetgovernance.org/) Association for Progressive Communications (APC) on the IGF (http://www.apc.org/en/node/6924/) Recommendations and publications from the civil society network for social justice and sustainable development. 80% of APC's member organisations are from developing countries.
403
People
Internet pioneers
Instead of a single "inventor", the Internet was developed by many people over many years. The following are some Internet pioneers who contributed to its early development. These include early theoretical foundations, specifying original protocols, and expansion beyond a research tool to wide deployment.
The pioneers
Claude Shannon
Claude Shannon (19162001) called the "father of modern information theory", published a "A Mathematical Theory of Communication" in 1948. His paper gave a formal way of studying communication channels. It established fundamental limits on the efficiency of communication over noisy channels, and presented the challenge of finding families of codes to achieve capacity.[1]
Vannevar Bush
Vannevar Bush (18901974) helped to establish a partnership between U.S. military, university research, and independent think tanks. He was appointed Chairman of the National Defense Research Committee in 1940 by President Franklin D. Roosevelt, appointed Director of the Office of Scientific Research and Development in 1941, and from 1946 to 1947, he served as chairman of the Joint Research and Development Board. Out of this would come DARPA, which in turn would lead to the ARPANET Project.[2] His July 1945 Atlantic Monthly article "As We May Think" proposed Memex, a theoretical proto-hypertext computer system in which an individual compresses and stores all of their books, records, and communications, which is then mechanized so that it may be consulted with exceeding speed and flexibility.[3]
Paul Baran
Paul Baran (19262011) developed the field of redundant distributed networks while conducting research at RAND Corporation starting in 1959 when Baran began investigating the development of survivable communication networks. This led to a series of papers titled "On Distributed communications"[4] that in 1964 described a detailed architecture for a distributed survivable packet switched communications network.[2]
Donald Davies
Donald Davies (19242000) coined the term "packet switching" at the National Physical Laboratory in the United Kingdom. Previously working independently, the "packet" terminology was adopted when the ARPANET was designed in 1967, and became the key concept of the Internet Protocol.[5]
Internet pioneers
404
J. C. R. Licklider
Joseph Carl Robnett Licklider (19151990) was a faculty member of Massachusetts Institute of Technology, and researcher at Bolt, Beranek and Newman. He developed the idea of a universal network at the Information Processing Techniques Office (IPTO) of the United States Department of Defense Advanced Research Projects Agency (ARPA).[2][6] He headed IPTO from 1962 to 1963, and again from 1974 to 1975. His 1960 paper "Man-Computer Symbiosis" envisions that mutually-interdependent, "living together", tightly-coupled human brains and computing machines would prove to complement each other's strengths.[7]
Charles M. Herzfeld
Charles M. Herzfeld is an American scientist and scientific manager, best known for his time as Director of DARPA, during which, among other things, he personally took the decision to authorize the creation of the ARPANET, the predecessor of the Internet. In 2012, Herzfeld was inducted into the Internet Hall of Fame by the Internet Society.[8]
Bob Taylor
Robert W. Taylor (born 1932) was director of ARPA's Information Processing Techniques Office from 1965 through 1969, where he convinced ARPA to fund a computer network. From 1970 to 1983, he managed the Computer Science Laboratory of the Xerox Palo Alto Research Center (PARC), where technologies such as Ethernet and the Xerox Alto were developed.[9] He was the founder and manager of Digital Equipment Corporation's Systems Research Center until 1996.[10] The 1968 paper, "The Computer as a Communication Device", that he wrote together with J.C.R. Licklider starts out: "In a few years, men will be able to communicate more effectively through a machine than face to face."[11] And while their vision would take more than "a few years", the paper lays out the future of what the Internet would eventually become.
Douglas Engelbart
Douglas Engelbart (born 1925) was an early researcher at the Stanford Research Institute. His Augmentation Research Center laboratory became the second node on the ARPANET in October 1969, and SRI became the early Network Information Center, which evolved into the domain name registry.[5]
Larry Roberts
Lawrence G. "Larry" Roberts (born 1937) is an American computer scientist.[12] After earning his PhD in electrical engineering from MIT in 1963, Roberts continued to work at MIT's Lincoln Laboratory where in 1965 he connected Lincoln Lab's TX-2 computer to the SDC Q-32 computer in Santa Monica using packet-switching.[13] In 1966, he became the chief scientist in the ARPA Information Processing Techniques Office (IPTO), where he led the development of the ARPANET. In 1973, he left ARPA to commercialize the nascent technology in the form of Telenet, the first data network utility, and served as its CEO from 1973 to 1980.[14]
Internet pioneers
405
Leonard Kleinrock
Leonard Kleinrock (born 1934) published his first paper on digital network communications, "Information Flow in Large Communication Nets", in 1961. After completing his Ph.D. thesis in 1962 which provided a fundamental theory of packet switching, he moved to UCLA. In 1969, a team at UCLA connected a computer to an Interface Message Processor, becoming the first node on ARPANET.[15] Bernard Luskin,a doctoral student at UCLA bridged much of the work into education through is dissertation working between UCLA and the Rand Corporation in articulating the theory of innformation flow in large communication nets pioneered by Leonard Kleinrock into education.
Louis Pouzin
Leonard Kleinrock and the first Interface
Louis Pouzin (born 1931) is a French computer scientist. He invented the Message Processor datagram and designed an early packet communications network, CYCLADES.[16] His work was broadly used by Robert Kahn, Vinton Cerf, and others in the development of TCP/IP.
John Klensin
John Klensin's involvement with Internet began in 1969, when he worked on the File Transfer Protocol.[17] Klensin was involved in the early procedural and definitional work for DNS administration and top-level domain definitions and was part of the committee that worked out the transition of DNS-related responsibilities between USC-ISI and what became ICANN.[18] His career includes 30 years as a Principal Research Scientist at MIT, a stint as INFOODS Project Coordinator for the United Nations University, Distinguished Engineering Fellow at MCI WorldCom, and Internet Architecture Vice President at AT&T; he is now an independent consultant.[19] In 1992 Randy Bush and John Klensin created the Network Startup Resource Center,[20] helping dozens of countries to establish connections with FidoNet, UseNet, and when possible the Internet. In 2003 he received an International Committee for Information Technology Standards Merit Award.[21] In 2007, he was inducted as a Fellow of the Association for Computing Machinery for contributions to networking standards and Internet applications.[22] In 2012, Klensin was inducted into the Internet Hall of Fame by the Internet Society.[8]
Bob Kahn
Robert E. "Bob" Kahn (born 1938) is an American engineer and computer scientist, who in 1974, along with Vint Cerf, invented the TCP/IP protocols.[23][24] After earning a Ph.D. degree from Princeton University in 1964, he worked for AT&T Bell Laboratories, as an assistant professor at MIT, and at Bolt, Beranek and Newman (BBN), where he helped develop the ARPANET IMP. In 1972, he began work at the Information Processing Techniques Office (IPTO) within ARPA. In 1986 he left ARPA to found the Corporation for National Research Initiatives (CNRI), a nonprofit organization providing leadership and funding for research and development of the National Information Infrastructure[25]
Internet pioneers
406
Vint Cerf
Vinton G. "Vint" Cerf (born 1943) is an American computer scientist.[26] He earned his Ph.D. from UCLA in 1972. At UCLA he worked in Professor Leonard Kleinrock's networking group that connected the first two nodes of the ARPANET and contributed to the ARPANET host-to-host protocol. Cerf was an assistant professor at Stanford University from 19721976, where he conducted research on packet network interconnection protocols and co-designed the DoD TCP/IP protocol suite with Bob Kahn. He was a program manager for the Advanced Research Projects Agency (ARPA) from 1976 to 1982. Cerf was instrumental in the formation of both the Internet Society and Internet Corporation for Assigned Names and Numbers (ICANN), serving as founding president of the Internet Society from 19921995 and in 1999 as Chairman of the Board and as ICANN Chairman from 2000 to 2007.[27]
Steve Crocker
Steve Crocker (born 1944 in Pasadena, California) has worked in the ARPANET and Internet communities since their inception. As a UCLA graduate student in the 1960s, he helped create the ARPANET protocols which were the foundation for today's Internet.[28] He created the Request for Comments series,[29] authoring the very first RFC and many more.[30] He was instrumental in creating the ARPA "Network Working Group", the forerunner of the modern Internet Engineering Task Force.
Steve Crocker
Crocker has been a program manager at the Advanced Research Projects Agency (ARPA), a senior researcher at USC's Information Sciences Institute, founder and director of the Computer Science Laboratory at The Aerospace Corporation and a vice president at Trusted Information Systems. In 1994, Crocker was one of the founders and chief technology officer of CyberCash, Inc. He has also been an IETF security area director, a member of the Internet Architecture Board, chair of the Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee, a board member of the Internet Society and numerous other Internet-related volunteer positions. Crocker is chair of the board of ICANN.[31] For this work, Crocker was awarded the 2002 IEEE Internet Award for "for leadership in creation of key elements in open evolution of Internet protocols". In 2012, Crocker was inducted into the Internet Hall of Fame by the Internet Society.[8]
Jon Postel
Jon Postel (19431998) was a researcher at the Information Sciences Institute. He was editor of all early Internet standards specifications, such as the Request for Comments (RFC) series. His beard and sandals made him "the most recognizable archetype of an Internet pioneer".[32] The Internet Society's Postel Award is named in his honor, as is the Postel Center at Information Sciences Institute. His obituary was written by Vint Cerf and published as RFC 2468 in remembrance of Postel and his work. In 2012, Postel was inducted into the Internet Hall of Fame by the Internet Society.[8]
Internet pioneers
407
Jake Feinler
Elizabeth J. "Jake" Feinler was a staff member of Doug Engelbart's Augmentation Research Center at SRI and PI for the Network Information Center (NIC) for the ARPANET and the Defense Data Network (DDN) from 1972 until 1989.[33][34] In 2012, Feinler was inducted into the Internet Hall of Fame by the Internet Society.[]
Peter Kirstein
Peter T. Kirstein (born 1933) is a British computer scientist and a leader in the international development of the Internet.[35] In 1973, he established one of the first two international nodes of the ARPANET.[36] In 1978 he co-authored "Issues in packet-network interconnection" with Vint Cerf, one of the early technical papers on the internet concept.[37] Starting in 1983 he chaired the International Collaboration Board, which involved six NATO countries, served on the Networking Panel of the NATO Science Committee (serving as chair in 2001), and on Advisory Committees for the Australian Research Council, the Canadian Department of Communications, the German GMD, and the Indian Education and Research Network (ERNET) Project. He leads the Silk Project, which provides satellite-based Internet access to the Newly Independent States in the Southern Caucasus and Central Asia. In 2012, Kirstein was inducted into the Internet Hall of Fame by the Internet Society.[]
Danny Cohen
Danny Cohen led several projects on real-time interactive applications over the ARPANet and the Internet starting in 1973.[38] After serving on the computer science faculty at Harvard University (19691973) and Caltech (1976), he joined the Information Sciences Institute (ISI) at University of Southern California (USC). At ISI (19731993) he started many network related projects including, one to allow interactive, real-time speech over the ARPANet, packet-voice, packet-video, and Internet Concepts.[39] In 1981 he adapted his visual flight simulator to run over the ARPANet, the first application of packet switching networks to real-time applications. In 1993, he worked on Distributed Interactive Simulation through several projects funded by United States Department of Defense. He is probably best known for his 1980 paper "On Holy Wars and a Plea for Peace"[40] which adopted the terminology of endianness for computing. Cohen was elected to the National Academy of Engineering in 2006 for contributions to the advanced design, graphics, and real-time network protocols of computer systems[41] and as an IEEE Fellow in 2010 for contributions to protocols for packet switching in real-time applications.[42] In 1993 he received a United States Air Force Meritorious Civilian Service Award. And in 2012, Cohen was inducted into the Internet Hall of Fame by the Internet Society.[]
Paul Mockapetris
Paul V. Mockapetris, while working with Jon Postel at the Information Sciences Institute (ISI) in 1983, proposed the Domain Name System (DNS) architecture.[43][44] He was IETF chair from 1994 to 1996.[45] Mockapetris received the 1997 John C. Dvorak Telecommunications Excellence Award "Personal Achievement Network Engineering" for DNS design and implementation, the 2003 IEEE Internet Award for his contributions to DNS, and the Distinguished Alumnus award from the University of California, Irvine. In May 2005, he received the ACM Sigcomm lifetime award. In 2012, Mockapetris was inducted into the Internet Hall of Fame by the Internet Society.[]
Internet pioneers
408
Joyce Reynolds
Joyce K. Reynolds of USC's Information Sciences Institute (ISI) served as RFC Editor, together with Bob Barden, from 1987 to 2006,[46] and also performed the IANA function with Jon Postel until this was transferred to ICANN, and worked with ICANN in this role until 2001.[47] She was IETF User Services Area Director and a member of the Internet Engineering Steering Group (IESG) from 1990 to 1998.[48] She has authored or co-authored many RFCs.
David Clark
We reject: kings, presidents and voting. We believe in: rough consensus and running code. [49] -Dave Clark at IETF 24
David D. Clark (born 1944) is an American computer scientist.[50] During the period of tremendous grown and expansion of the Internet from 1981 to 1989, he acted as chief protocol architect in the development of the Internet, and chaired the Internet Activities Board, which later became the Internet Architecture Board. He is currently a Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory.
Dave Mills
David L. Mills (born 1938) is an American computer engineer.[51] Mills earned his PhD in Computer and Communication Sciences from the University of Michigan in 1971. While at Michigan he worked on the ARPA sponsored Conversational Use of Computers (CONCOMP) project and developed DEC PDP-8 based hardware and software to allow terminals to be connected over phone lines to an IBM System/360 mainframe computer.[52][53] Mills was the chairman of the Gateway Algorithms and Data Structures Task Force (GADS) and the first chairman of the Internet Architecture Task Force.[54] He invented the Network Time Protocol (1981),[55][56] the DEC LSI-11 based fuzzball router that was used for the 56 kbit/s NSFNET (1985),[57] the Exterior Gateway Protocol (1984),[58] and inspired the author of ping (1983).[59] He is an emeritus professor at the University of Delaware.
Radia Perlman
Radia Joy Perlman (born 1951) is the software designer and network engineer who developed the spanning-tree protocol which is fundamental to the operation of network bridges.[60] She also played an important role in the development of link-state routing protocols such as IS-IS (which had a significant influence on OSPF).[61][62]
Dennis M. Jennings
Dennis M. Jennings is an Irish physicist, academic, Internet pioneer, and venture capitalist. In 1984, the National Science Foundation (NSF) began construction of several regional supercomputing centers to provide very high-speed computing resources for the US research community. In 1985 NSF hired Jennings as Director of CSNET and to lead the establishment of the National Science Foundation Network (NSFNET) to link five of the super-computing centers to enable sharing of resources and information. Jennings made three critical decisions that shaped the subsequent development of NSFNET:[63] that it would be a general-purpose research network, not limited to connection of the supercomputers; it would act as the backbone for connection of regional networks at each supercomputing site; and it would use the ARPANET's TCP/IP protocols. Jennings was also actively involved in the start-up of research networks in Europe (European Academic Research Network, EARN - President; EBONE - Board member) and Ireland (HEAnet - initial proposal and later Board member). He chaired the Board and General Assembly of the Council of European National Top Level Domain
Internet pioneers Registries (CENTR) from 1999 to early 2001 and was actively involved in the start-up of the Internet Corporation for Assigned Names and Numbers (ICANN). He was a member of the ICANN Board from 2007 to 2010, serving as Vice-Chair in 2009-2010.[64]
409
Steve Wolff
Stephen "Steve" Wolff participated in the development of ARPANET while working for the U.S. Army.[65] In 1986 he became Division Director for Networking and Communications Research and Infrastructure at the National Science Foundation (NSF) where he managed the development of NSFNET.[66] He also conceived the Gigabit Testbed, a joint NSF-DARPA project to prove the feasibility of IP networking at gigabit speeds.[67] His work at NSF transformed the fledgling internet from a narrowly focused U.S. government project into the modern Internet with scholarly and commercial interest for the entire world.[68] In 1994 he left NSF to join Cisco as a technical manager in Corporate Consulting Engineering.[65] In 2011 he became the CTO at Internet2.[69]
Van Jacobson
Van Jacobson is an American computer scientist, best known for his work on TCP/IP network performance and scaling.[] His work redesigning TCP/IP's flow control algorithms (Jacobson's algorithm)[70][71] to better handle congestion is said to have saved the Internet from collapsing in the late 1980s and early 1990s.[] He is also known for the TCP/IP Header Compression protocol described in RFC 1144: Compressing TCP/IP Headers for Low-Speed Serial Links, popularly known as Van Jacobson TCP/IP Header Compression. He is co-author of several widely used network diagnostic tools, including traceroute, tcpdump, and pathchar. He was a leader in the development of the multicast backbone (MBone) and the multimedia tools vic,[72] vat,[73] and wb.[74] For his work, Jacobson received the 2001 ACM SIGCOMM Award for Lifetime Achievement,[75] the 2003 IEEE Koji Kobayashi Computers and Communications Award,[42] and was elected to the National Academy of Engineering in 2006.[76] In 2012, Jacobson was inducted into the Internet Hall of Fame by the Internet Society.[]
Ted Nelson
Theodor Holm "Ted" Nelson (born 1937) is an American sociologist and philosopher. In 1960 he founded Project Xanadu with the goal of creating a computer network with a simple user interface. Project Xanadu was to be a worldwide electronic publishing system using hypertext linking that would have created a universal library.[77] In 1963 he coined the terms "hypertext" and "hypermedia". In 1974 he wrote and published two books in one, Computer Lib/Dream Machines,[78] that has been hailed as "the most important book in the history of new media."[79] Sadly, his grand ideas from the 1960s and 1970s never became completed projects.
Tim Berners-Lee
Timothy John "Tim" Berners-Lee (born 1955) is a British physicist and computer scientist.[80] In 1980, while working at CERN, he proposed a project using hypertext to facilitate sharing and updating information among researchers.[81] While there, he built a prototype system named ENQUIRE.[82] Back at CERN in 1989 he conceived of and, in 1990, together with Robert Cailliau, created the first client and server implementations for what became the World Wide Web. Berners-Lee is the director of the World Wide Web Consortium (W3C), a standards organization which oversees and encourages the Web's continued development, co-Director of the Web Science Trust, and founder of the World Wide Web Foundation.[83]
Internet pioneers In 1994 Berners-Lee became one of only six members of the World Wide Web Hall of Fame.[84] In 2004, Berners-Lee was knighted by Queen Elizabeth II for his pioneering work.[85] In April 2009, he was elected a foreign associate of the United States National Academy of Sciences, based in Washington, D.C.[86][87] In 2012, Berners-Lee was inducted into the Internet Hall of Fame by the Internet Society.[]
410
Mark P. McCahill
Mark P. McCahill (born 1956) is an American programmer and systems architect. While working at the University of Minnesota he led the development of the Gopher protocol, the effective predecessor of the World Wide Web, and contributed to the development and popularization of a number of other Internet technologies from the 1980s.
Robert Cailliau
Robert Cailliau (French:[kajo], born 1947), is a Belgian informatics engineer and computer scientist who, working with Tim Berners-Lee and Nicola Pellow at CERN, developed the World Wide Web.[88] In 2012 he was inducted into the Internet Hall of Fame by the Internet Society.[]
Marc Andreessen
Marc L. Andreessen (born 1971) is an American software engineer, entrepreneur, and investor. Working with Eric Bina while at NCSA, he co-authored Mosaic, the first widely-used web browser. He is also co-founder of Netscape Communications Corporation.[89]
Eric Bina
Eric J. Bina (born 1964) is an American computer programmer. In 1993, together with Marc Andreessen, he authored the first version of Mosaic while working at NCSA at the University of Illinois at Urbana-Champaign.[84] Mosaic is famed as the first killer application that popularized the Internet. He is also a co-founder of Netscape Communications Corporation.[90]
THEIR WORK BECAME KNOWN IN SEPTEMBER 1973 AT A NETWORKING CONFERENCE IN ENGLAND. CERF AND KAHN'S SEMINAL PAPER WAS PUBLISHED IN MAY 1974.
Internet pioneers
CERF, YOGEN K. DALAL, AND CARL SUNSHINE WROTE THE FIRST FULL TCP SPECIFICATION IN DECEMBER 1974. WITH THE SUPPORT OF DARPA, EARLY IMPLEMENTATIONS OF TCP (AND IP LATER) WERE TESTED BY BOLT BERANEK AND NEWMAN (BBN), STANFORD, AND UNIVERSITY COLLEGE LONDON DURING 1975.
411
BBN BUILT THE FIRST INTERNET GATEWAY, NOW KNOWN AS A ROUTER, TO LINK NETWORKS TOGETHER. IN SUBSEQUENT YEARS, RESEARCHERS AT MIT AND USC-ISI, AMONG MANY OTHERS, PLAYED KEY ROLES IN THE DEVELOPMENT OF THE SET OF INTERNET PROTOCOLS.
VINTON CERF DAG BELSNES RONALD CRANE YOGEN DALAL JUDITH ESTRIN RICHARD KARP GERALD LE LANN (Seal of LELAND STANFORD JUNIOR UNIVERSITY 1891 motto in German: DIE LUFT DER FREIHEIT WEHT) JAMES MATHIS BOB METCALFE DARRYL RUBIN JOHN SHOCH CARL SUNSHINE KUNINOBU TANNO
COLLABORATING GROUPS
BOLT BERANEK AND NEWMAN WILLIAM PLUMMER GINNY STRAZISAR RAY TOMLINSON
UNIVERSITY COLLEGE LONDON FRANK DEIGNAN MARTINE GALLAND PETER HIGGINSON ANDREW HINCHLEY PETER KIRSTEIN ADRIAN STOKES
ULTIMATELY, THOUSANDS IF NOT TENS TO HUNDREDS OF THOUSANDS HAVE CONTRIBUTED THEIR EXPERTISE TO THE EVOLUTION OF THE INTERNET.
Internet pioneers
412
References
[1] MIT "Professor Claude Shannon dies; was founder of digital communications" (http:/ / web. mit. edu/ newsoffice/ 2001/ shannon. html), MIT - News office, Cambridge, Massachusetts, February 27, 2001 [2] Bill Stewart. "Internet History" (http:/ / www. livinginternet. com/ i/ ii. htm). Living Internet web book. . Retrieved March 30, 2011. [3] Bush, Vannevar (July 1945). "[[As We May Think (http:/ / www. theatlantic. com/ doc/ 194507/ bush)]"]. The Atlantic Monthly. . [4] About RAND | History and Mission | Paul Baran: Publications on Distributed Communications (http:/ / www. rand. org/ about/ history/ baran. list. html) [5] Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff. "A Brief History of the Internet" (http:/ / www. isoc. org/ internet/ history/ brief. shtml). Internet Society. . Retrieved March 30, 2011. [6] Jay R. Hauben. "JCR Licklider (1915-1990)" (http:/ / www. columbia. edu/ ~jrh29/ years. html). Columbia University. . Retrieved March 30, 2011. [7] "Man-Computer Symbiosis" (http:/ / medg. lcs. mit. edu/ people/ psz/ Licklider. html), J.C.R. Licklider, IRE Transactions on Human Factors in Electronics, vol. HFE-1, pp.4-11, Mar 1960 [8] 2012 Inductees (http:/ / www. internethalloffame. org/ inductees/ year/ 2012), Internet Hall of Fame website. Last accessed April 24, 2012 [9] Marion Softky (October 11, 2000). "Building the Internet: Bob Taylor won the National Medal of Technology "For visionary leadership in the development of modern computing technology"" (http:/ / www. almanacnews. com/ morgue/ 2000/ 2000_10_11. taylor. html). The California Almanac. . Retrieved March 30, 2011. [10] John Naughton (October 5, 200). A Brief History of the Future: Origins of the Internet. Phoenix. ISBN978-0-7538-1093-4. [11] J.C.R. Licklider; Robert Taylor (April 1968). "The Computer as a Communication Device" (http:/ / www. kurzweilai. net/ the-computer-as-a-communication-device). Science and Technology. . [12] "2001 Draper Prize Recipients' Bios" (http:/ / www. nae. edu/ Activities/ Projects20676/ Awards/ 20681/ PastWinners/ page2001. aspx). National Academy of Engineering. 2001. . [13] Josh McHugh (2001-05). "The n -Dimensional Superswitch" (http:/ / www. wired. com/ wired/ archive/ 9. 05/ caspian. html?pg=3& topic=& topic_set=). Wired Magazine. . [14] Otis Port (2004-09-27). "Larry Roberts:He made the Net Work" (http:/ / www. businessweek. com/ magazine/ content/ 04_39/ b3901030_mz072. htm). Business Week. . [15] Leonard Kleinrock (August 27, 1996). "Leonard Kleinrock's Personal History/Biography: The Birth of the Internet" (http:/ / www. isoc. org/ awards/ postel/ memory. shtml). . Retrieved March 30, 2011. [16] "Biography of Louis Pouzin, 1999 SIGCOMM Award Winner" (http:/ / www. acm. org/ sigs/ sigcomm/ sigcomm99/ pouzin. html), ACM SIGCOMM web site [17] "Internet Experts selected to fill top organizational posts" (http:/ / www. isoc. org/ isoc/ media/ releases/ 980403pr. shtml). ISOC. 1998-04-03. . Retrieved 2011-07-23. [18] "John Klensin biographical sketch" (http:/ / www. internethalloffame. org/ inductees/ john-klensin), Internet Hall of Fame, Internet Society, 2012 [19] "Biography of John Klensin at the ICANN web site" (http:/ / www. icann. org/ biog/ klensin. htm). . Retrieved 2008-06-17. [20] "About the Network Startup Resource Center" (http:/ / www. nsrc. org/ about. html#support). NSRC (http:/ / www. nsrc. org/ ). 1992. . Retrieved 2011-07-25. [21] "INCITS Awards Honor Roll" (http:/ / www. incits. org/ Awards/ honor. htm). INCITS. . Retrieved 2011-07-25. [22] "List of 2007 ACM Fellows inductees" (http:/ / fellows. acm. org/ fellow_citation. cfm?id=1101344& srt=alpha& alpha=K). . Retrieved 2008-06-17. [23] "Robert E Kahn" (http:/ / awards. acm. org/ citation. cfm?id=4598637& srt=all& aw=140& ao=AMTURING& yr=2004). A. M. Turing Award. ACM. 2004. . Retrieved 2010-01-23. "For pioneering work on internetworking, including the design and implementation of the Internet's basic communications protocols, TCP/IP, and for inspired leadership in networking." [24] IEEE Alexander Graham Bell Medal (http:/ / www. ieee. org/ about/ awards/ medals/ bell. html#sect3) [25] "CNRI Officers and Directors" (http:/ / www. cnri. reston. va. us/ directors_2. html). CNRI. . Retrieved 2009-02-25. [26] Cerf's curriculum vitae (http:/ / www. icann. org/ correspondence/ cerf-testimony-08feb01. htm#Vita), attached to a transcript of his February 2001 testimony before the United States House Energy Subcommittee on Telecommunications and the Internet [27] Vinton G. Cerf's biography at the Internet Society (http:/ / www. icann. org/ en/ biog/ cerf. htm) [28] Matthew Lyon (Fall 1997). "Wired!" (http:/ / www. magazine. ucla. edu/ year1997/ fall97_03. html). UCLA Magazine. . [29] RFC 2468 [30] RFC 1 [31] "ICANN news release" (http:/ / www. icann. org/ en/ announcements/ announcement-1-24jun11-en. htm). June 2011. . [32] "A ten year tribute to Jon Postel: An Internet visionary, 1943-1998" (http:/ / www. isoc. org/ awards/ postel/ memory. shtml). Internet Society. October 16, 2008. . Retrieved March 30, 2011. [33] Oral History of Elizabeth (Jake) Feinler (http:/ / archive. computerhistory. org/ resources/ access/ text/ Oral_History/ 102702199. 05. 01. acc. pdf), Interviewed by Marc Weber, September 10, 2009, Reference no: X5378.2009, Computer History Museum, 49 pp. [34] "Elizabeth J. Feinler Biography" (http:/ / alumni. sri. com/ hofbios/ Elizabeth J. Feinler 2000. htm), SRI Alumni Hall of Fame, 2000
Internet pioneers
[35] "Peter T. Kirsten recognized with the Internet Society's Postel Award" (http:/ / www. isoc. org/ isoc/ media/ releases/ 030716pr. shtml), July 16, 2003, Press Release, Internet Society [36] "Peter Kirstein's International Activities" (http:/ / www. cs. ucl. ac. uk/ staff/ P. Kirstein/ internationalactivity. html), University College London web page [37] "Issues in packet-network interconnection" (http:/ / dx. doi. org/ 10. 1109/ PROC. 1978. 11147), V.G. Cerf and P.T. Kirstein, in Proceedings of the IEEE, Volume 66 Issue 11 (November 1978), pp. 13861408 [38] "Danny Cohen biography" (http:/ / www. internethalloffame. org/ inductees/ danny-cohen), Internet Hall of Fame, Internet Society, accessed 14 July 2012 [39] "RFC 0741: Specifications for the Network Voice Protocol (NVP)", Nov-22-1977. [40] Cohen, Danny (1 April 1980). On Holy Wars and a Plea for Peace (https:/ / tools. ietf. org/ rfcmarkup?url=ftp:/ / ftp. rfc-editor. org/ in-notes/ ien/ ien137. txt). IEN 137. . "...which bit should travel first, the bit from the little end of the word, or the bit from the big end of the word? The followers of the former approach are called the Little-Endians, and the followers of the latter are called the Big-Endians." Also published at IEEE Computer, October 1981 issue (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=1667115). [41] National Academy of Engineering member (http:/ / www. nae. edu/ nae/ naepub. nsf/ Members+ By+ UNID/ 4424CB034570705786257552006B36FC?opendocument), 2006 [42] IEEE Fellow (http:/ / www. ieee. org/ membership_services/ membership/ fellows/ chronology/ fellows_2010. html), 2010 [43] RFC 882 - Domain Names - Concepts and Facilities, November 1983 [44] RFC 883 - Domain Names - Implementation and Specification, November 1983 [45] Biography of Paul Mockapetris (http:/ / www. nominum. com/ who-we-are/ board-of-directors/ paul-mockapetris), Nominum web site [46] "Bob Braden and Joyce K. Reynolds recognized with the Internet Society's Postel Award" (http:/ / www. isoc. org/ isoc/ media/ releases/ 061110pr. shtml). 10 November 2006. . Retrieved 2008-07-30. [47] "Internet History Project biography, 2003" (http:/ / www. postel. org/ pipermail/ internet-history/ 2003-October/ 000343. html). . Retrieved 2009-07-26. [48] IETF List of IESG members (http:/ / www. ietf. org/ iesg/ past-members. html), IETF web page [49] "A Cloudy Crystal Ball -- Visions of the Future" (http:/ / ietf. org/ proceedings/ prior29/ IETF24. pdf) (PDF). 1992-07-16. p.551. . Retrieved 2011-03-05. (Presentation given at the 24th Internet Engineering Task Force.) [50] David Clark's Biography (http:/ / www. csail. mit. edu/ user/ 1526), MIT Computer Science and Artificial Intelligence Laboratory [51] "David L. Mills Biography and Credentials" (http:/ / www. eecis. udel. edu/ ~mills/ bio. html), University of Delaware [52] The Data Concentrator (http:/ / deepblue. lib. umich. edu/ handle/ 2027. 42/ 6635), David Mills, May 1968, CONCOMP Project, University of Michigan, Ann Arbor [53] System/360 interface engineering report (http:/ / deepblue. lib. umich. edu/ handle/ 2027. 42/ 6642), D. L. Mills, November 1967, CONCOMP Project, University of Michigan, Ann Arbor [54] John S. Quarterman (1990). Matrix: Computer Networks and Conferencing Systems Worldwide (http:/ / portal. acm. org/ citation. cfm?id=77526) (2 ed.). Digital Press. pp.185186. ISBN1-55558-033-5. . [55] RFC 778: DCNET Internet Clock Service (http:/ / tools. ietf. org/ pdf/ rfc778), D.L. Mills, COMSAT Laboratories, April 18, 1981 [56] RFC 958: Network Time Protocol (NTP) (http:/ / tools. ietf. org/ pdf/ rfc958), D.L. Mills, M/A-COM Linkabit, September 1985 [57] "Fuzzball: The Innovative Router" (http:/ / nsf. gov/ about/ history/ nsf0050/ internet/ fuzzball. htm), web page on NSF's "The Internet: Changing the Way We Communicate" (http:/ / nsf. gov/ about/ history/ nsf0050/ internet/ internet. htm) [58] RFC 904: Exterior Gateway Protocol Formal Specification (http:/ / tools. ietf. org/ pdf/ rfc904), D.L. Mills, April 1984 [59] "The Story of the PING Program" (http:/ / ftp. arl. army. mil/ ~mike/ ping. html), Mike Muuss [60] Bob Brown (May 5, 2006). "Mother of the Internet Radia Perlman speaks out" (http:/ / www. networkworld. com/ community/ node/ 5738). Network World. . Retrieved 22 January 2010. [61] "Inventor of the Week: Radia Perlman" (http:/ / web. mit. edu/ invent/ iow/ perlman. html), August 2007, Inventor Archive, Lemelson-MIT Program [62] 2010 SIGCOM Lifetime Achievement Award given to Radia Perlman (http:/ / www. sigcomm. org/ awards/ sigcomm-awards), "for her fundamental contributions to the Internet routing and bridging protocols that we all use and take for granted every day", ACM SIGCOMM award recipents web page [63] "Internet > History > NSFNET -- National Science Foundation Network" (http:/ / www. livinginternet. com/ i/ ii_nsfnet. htm), livinginternet.com: The World's First Web Published Book, 2000, accessed 16 July 2012 [64] "Ireland's real net pioneer" (http:/ / www. independent. ie/ business/ technology/ irelandrsquos-real-net-pioneer-1115628. html), Independent.ie, 4 October 2007 [65] "Stephen WolffHustling for Innovation" (http:/ / newsroom. cisco. com/ dlls/ ts_073002. html), Charles Waltner, News@Cisco, July 30, 2002 [66] On the Way to the Web: The Secret History of the Internet and Its Founders (http:/ / www. apress. com/ book/ view/ 9781430208693), Michael A. Banks, Apress, New York, 2008, ISBN 978-1-4302-0869-3 [67] "The Gigabit Testbed InitiativeFinal Report" (http:/ / www. cnri. reston. va. us/ gigafr/ ), Corporation for National Research Initiatives (CNRI), December 1996 [68] "A Brief History of the Internet" (http:/ / www. isoc. org/ internet/ history/ brief. shtml), Barry M. Leiner, et al., Internet Society, December 2003
413
Internet pioneers
[69] "Internet2s new chief technology officer helped create Internet No. 1" (http:/ / www. crainsdetroit. com/ article/ 20110401/ FREE/ 110409996#), Tom Henderson, Crain's Detroit Business, April 1, 2011 [70] "Congestion avoidance and control" (http:/ / ee. lbl. gov/ papers/ congavoid. pdf), Van Jacobson, Proceedings of SIGCOMM 88, Stanford, CA, Aug. 1988, ACM [71] "Congestion avoidance and control" (http:/ / portal. acm. org/ citation. cfm?doid=205447. 205462), Van Jacobson, ACM SIGCOMM Computer Communication Review - Special twenty-fifth anniversary issue, Highlights from 25 years of the Computer Communication Review, Volume 25 Issue 1, Jan. 1995, pp.157-187 [72] "vic - Video Conferencing Tool" (http:/ / ee. lbl. gov/ vic/ ), web page at Lawrence Berkeley National Laboratory [73] "vat - LBL Audio Conferencing Tool" (http:/ / ee. lbl. gov/ vat/ ), web page at Lawrence Berkeley National Laboratory [74] "wb - LBNL Whiteboard Tool" (http:/ / ee. lbl. gov/ wb/ ), web page at Lawrence Berkeley National Laboratory [75] 2001 SIGCOMM Award for Lifetime Achievement (http:/ / www. sigcomm. org/ awards/ sigcomm-awards) to Van Jacobson "for contributions to protocol architecture and congestion control." [76] "Mr. Van Jacobson" (http:/ / www. nae. edu/ MembersSection/ Directory20412/ 30818. aspx), Members Directory, National Academy of Engineering [77] "Internet Pioneers: Ted Nelson" (http:/ / www. ibiblio. org/ pioneers/ nelson. html), web page at ibiblio.org (http:/ / ibiblio. org), a collaboration of the School of Information and Library Science and the School of Journalism and Mass Communication at the University of North Carolina at Chapel Hill. [78] Computer Lib (You can and must understand computers NOW) / Dream Machines (Come Dream along with me: The Best Is Yet To Be) (http:/ / www. arch. kth. se/ unrealstockholm/ unreal_web/ seminar03_2006/ computerlib. pdf), Theodor H. Nelson, self-published, 1974, ISBN 978-0-89347-002-9 [79] "Chapter 21: From Computer Lib / Dream Machines, Theodor H. Nelson, 1970-1974" (http:/ / www. newmediareader. com/ book_samples/ nmr-21-nelson. pdf), The New Media Reader, Noah Wardrip-Fruin and Nick Montfort (Eds), MIT Press, February 2003, 837 pp., ISBN 978-0-262-23227-2 [80] "Berners-Lee Longer Biography" (http:/ / www. w3. org/ People/ Berners-Lee/ Longer. html). World Wide Web Consortium. . Retrieved 18 January 2011. [81] "Berners-Lee's original proposal to CERN" (http:/ / www. w3. org/ History/ 1989/ proposal. html). World Wide Web Consortium. March 1989. . Retrieved 25 May 2008. [82] Stewart, Bill. "Tim Berners-Lee, Robert Cailliau, and the World Wide Web" (http:/ / www. livinginternet. com/ w/ wi_lee. htm). . Retrieved 22 July 2010. [83] "Tim Berners-Lee receives Draper Prize" (http:/ / web. mit. edu/ newsoffice/ 2007/ draper-prize. html). MIT News, Massachusetts Institute of Technology. . Retrieved May 25, 2008. [84] "The World-Wide Web Hall of Fame" (http:/ / botw. org/ 1994/ awards/ fame. html). Best of the Web Directory. . [85] "Web's inventor gets a knighthood" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 3357073. stm). BBC. 31 December 2003. . Retrieved 25 May 2008. [86] "Timothy Berners-Lee Elected to National Academy of Sciences" (http:/ / www. ddj. com/ 217200450). Dr. Dobb's Journal. . Retrieved 9 June 2009. [87] "72 New Members Chosen By Academy" (http:/ / www8. nationalacademies. org/ onpinews/ newsitem. aspx?RecordID=04282009) (Press release). United States National Academy of Sciences. 28 April 2009. . Retrieved 17 January 2011. [88] Berners-Lee, Tim (3 November 1992). "Macintosh Browser" (http:/ / www. w3. org/ History/ 19921103-hypertext/ hypertext/ WWW/ Macintosh/ Status. html). World Wide Web Consortium. . Retrieved 2 June 2010. [89] Dan Frommer. "Marc Andreessen Joins Facebook Board" (http:/ / www. alleyinsider. com/ 2008/ 6/ marc-andreessen-joins-facebook-board). Alleyinsider.com. . Retrieved 2008-10-05. [90] "About NCSA Mosaic" (http:/ / www. ncsa. illinois. edu/ Projects/ mosaic. html), NCSA web site, University of Illinois [91] David Orenstein (July 13, 2005). "Cyber-pioneer Vint Cerf to headline July 28 forum on the future of Internet" (http:/ / news. stanford. edu/ news/ 2005/ july13/ forum-071305. html). Press release (Stanford Report). . Retrieved April 7, 2011. [92] "Stanford University 'Birth of the Internet' Plaque" (http:/ / mercury. lcs. mit. edu/ ~jnc/ plaque. html), web page, J. Noel Chiappa, Laboratory for Computer Science, MIT
414
Internet pioneers
415
External links
Internet Hall of Fame (http://www.internethalloffame.org/), established by the Internet Society in April 2012. RFC 1336 (http://www.rfc-editor.org/rfc/pdfrfc/rfc1336.txt.pdf): Who's Who in the Internet: Biographies of Internet Activities Board (IAB), Internet Engineering Steering Group (IESG), and the Internet Research Steering Group (IRSG) of the Internet Research Task Force (IRTF) Members, G. Malkin, IETF, May 1992. "Past IESG Members and IETF Chairs" (http://www.ietf.org/iesg/past-members.html), IETF web site "A Brief History of the Internet Advisory / Activities / Architecture Board" (http://www.iab.org/about/history. html) from the IAB web site includes historical lists of IAB Members, IAB Chairs, IAB Ex-Officio and Liaison Members (IETF Chairs), IRTF Chairs, RFC Editors, and much more historical information. "Internet Pioneers" (http://www.ibiblio.org/pioneers/), web pages at ibiblio.org (http://ibiblio.org), a collaboration of the School of Information and Library Science and the School of Journalism and Mass Communication at the University of North Carolina at Chapel Hill. "Pioneers Gallery" (http://www.wiwiw.org/pioneers/), from the Who Is Who in the Internet World (WiWiW) web site. "Internet Milestones: Timeline of Notable Internet Pioneers and Contributions" (http://www.juliantrubin.com/ schooldirectory/internet_milestones_pioneers.html). Retrieved 6 January 2012. "The Greatest Internet Pioneers You Never Heard Of: The Story of Erwise and Four Finns Who Showed the Way to the Web Browser" (http://www.xconomy.com/national/2009/03/03/ the-greatest-internet-pioneers-you-never-heard-of-the-story-of-erwise-and-four-finns-who-showed-the-way-to-the-web-browser/ ), Juha-Pekka Tikka, March 3, 2009, Xconomy web page.
Oral histories
"Oral history interview with Robert E. Kahn" (http://purl.umn.edu/107387). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 15 May 2008. Focuses on Kahn's role in the development of computer networking from 1967 through the early 1980s. Beginning with his work at Bolt Beranek and Newman (BBN), Kahn discusses his involvement as the ARPANET proposal was being written and then implemented, and his role in the public demonstration of the ARPANET. The interview continues into Kahn's involvement with networking when he moves to IPTO in 1972, where he was responsible for the administrative and technical evolution of the ARPANET, including programs in packet radio, the development of a new network protocol (TCP/IP), and the switch to TCP/IP to connect multiple networks. "Oral history interview with Vinton Cerf" (http://purl.umn.edu/107214). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 1 July 2008. Cerf describes his involvement with the ARPA network, and his relationships with Bolt Beranek and Newman, Robert Kahn, Lawrence Roberts, and the Network Working Group. "Oral history interview with Paul Baran" (http://purl.umn.edu/107101). University of Minnesota, Minneapolis: Charles Babbage Institute. 5 March 1990. Retrieved 1 July 2008. Baran describes his work at RAND, and discusses his interaction with the group at ARPA who were responsible for the later development of the ARPANET. "Oral history interview with Leonard Kleinrock" (http://purl.umn.edu/107411). University of Minnesota, Minneapolis: Charles Babbage Institute. 3 April 1990. Retrieved 1 July 2008. Kleinrock discusses his work on the ARPANET. "Oral history interview with Larry Roberts" (http://purl.umn.edu/107608). University of Minnesota, Minneapolis: Charles Babbage Institute. 4 April 1989. Retrieved 1 July 2008.
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
License
434
License
Creative Commons Attribution-Share Alike 3.0 Unported //creativecommons.org/licenses/by-sa/3.0/