24 Internet
24 Internet
INTERNET
1950s and early 1960s.. These ideas were first realized in ARPANET, which
established the first host-to-host network connection on Oct. 29, 1969. It was
created by the Advanced Research Projects Agency (ARPA) of the U.S. Department
of Defense. ARPANET was one of the first general-purpose computer networks. It
connected time-sharing computers at government-supported research sites,
principally universities in the United
States, Tools and applications—
such as the simple mail transfer
protocol (SMTP, commonly referred
to as e-mail), for sending short
messages, and the file transfer
protocol (FTP), for longer
transmissions. In order to achieve
cost-effective interactive
communications between
computers, which typically
communicate in short bursts of
data, ARPANET employed the new technology of packet switching. Packet switching
takes large messages and breaks them into smaller, manageable pieces (known as
packets) that can travel independently over any available circuit to the target
destination, where the pieces are reassembled. DARPA (Defense Advanced Research
Projects Agency; formerly `ARPA) supported initiatives for ground-based and
satellite-based packet networks. The ground-based packet radio system provided
mobile access to computing resources, while the packet satellite network connected
the United States with several European countries and enabled connections with
widely dispersed and remote regions. Similarly, the packet satellite network was
used by DARPA to link the United States with satellite terminals serving the United
Kingdom, Norway, Germany, and Italy. These terminals, however, had to be
connected to other networks in European countries in order to reach the end users.
Foundation of the Internet:- By the 1980s other U.S. governmental bodies were
heavily involved with networking, including the National Science Foundation (NSF),
the Department of Energy, and the National Aeronautics and Space Administration
(NASA). While DARPA had played a seminal role in creating a small-scale version of
the Internet among its researchers, NSF worked with DARPA to expand access to
the entire scientific and academic community and to make TCP/IP the standard in
all federally supported research networks. In 1985–86 NSF funded the first five
supercomputing centres—at Princeton University, the University of Pittsburgh, the
University of California, San Diego, the University of Illinois, and Cornell
University. In the 1980s NSF also funded the development and operation of the
NSFNET, a national ―backbone‖ network to connect these centres. A few
commercial networks also began in the late 1980s; these were soon joined by
others, and the Commercial Internet Exchange (CIX) was formed to allow transit
traffic between commercial networks that otherwise would not have been allowed
on the NSFNET backbone.
Commercial expansion
The rise of commercial Internet services and applications helped to fuel a rapid
commercialization of the Internet. This phenomenon was the result of several other
factors as well. One important factor was the introduction of the personal computer
and the workstation in the early 1980s. Another factor, which took on increasing
importance, was the emergence of ethernet and other ―local area networks‖ to link
personal computers.. In 1988 the Corporation for National Research Initiatives
received approval to conduct an experiment linking a commercial e-mail service
(MCI Mail) to the Internet. This application was the first Internet connection to a
commercial provider that was not also part of the research community. Approval
quickly followed to allow other e-mail providers access, and the Internet began its
first explosion in traffic.
By the late 1990s there were approximately 10,000 Internet service providers (ISPs)
around the world, more than half located in the United States. However, most of
these ISPs provided only local service and relied on access to regional and national
ISPs for wider connectivity. Consolidation began at the end of the decade, with
many small to medium-size providers merging or being acquired by larger ISPs.
Among these larger providers were groups such as America Online, Inc. (AOL),
which started as a dial-up information service with no Internet connectivity but
made a transition in the late 1990s to become the leading provider of Internet
services in the world—with more than 25 million subscribers by 2000 and with
branches in Australia, Europe, South America, and Asia.
While the precise structure of the future Internet is not yet clear, many directions
of growth seem apparent. One is the increased availability of wireless access.
Wireless services enable applications not previously possible in any economical
fashion. For example, global positioning systems (GPS) combined with wireless
Internet access would help mobile users to locate alternate routes, generate precise
accident reports and initiate recovery services, and improve traffic management
and congestion control. In addition to wireless laptop computers and personal
digital assistants (PDAs), wearable devices with voice input and special display
glasses are under development.
Another future direction is toward higher backbone and network access speeds.
Backbone data rates of 10 billion bits (10 gigabits) per second are readily available
today, but data rates of 1 trillion bits (1 terabit) per second or higher will eventually
become commercially feasible. If the development of computer hardware, software,
applications, and local access keeps pace, it may be possible for users to access
networks at speeds of 100 gigabits per second. At such data rates, high-resolution
video—indeed, multiple video streams—would occupy only a small fraction of
available bandwidth.
. As the Pew Charitable Trust observed in 2004, it took 46 years wire 30 percent of
the United States for electricity; it took only 7 years for the Internet to reach that
same level of connection to American homes.
By 2005, 68 percent of American adults and
90 percent of American teenagers had used
the Internet. Europe and Asia were at least as
well connected as the United States. Nearly
half of the citizens of the European Union are
online, and even higher rates are found in the
For the individual, the Internet opened up new communication possibilities. E-mail
led to a substantial decline in traditional ―snail mail.‖ Instant messaging (IM), or
text messaging, expanded, especially among youth, with the convergence of the
Internet and cellular telephone access to the Web. Indeed, IM became a particular
problem in classrooms, with students often surreptitiously exchanging notes via
wireless communication devices. More than 50 million American adults, including
11 million at work, use IM.
From mailing lists to ―buddy lists,‖ e-mail and IM have been used to create ―smart
mobs‖ that converge in the physical world. Examples include protest organizing,
spontaneous performance art, and shopping. Obviously, people congregated before
the Internet existed, but the change wrought by mass e-mailings was in the speed
of assembling such events. In February 1999, for example, activists began planning
protests against the November 1999 World Trade Organization (WTO) meetings in
Seattle, Washington. Using the Internet, organizers mobilized more than 50,000
individuals from around the world to engage in demonstrations—at times violent—
that effectively altered the WTO’s agenda.
More than a decade later, in June 2010 Egyptian computer engineer Wael Ghonim
anonymously created a page titled ―We Are All Khaled Said‖ on the social media site
Facebook to publicize the death of a 28-year-old Egyptian man beaten to death by
police. The page garnered hundreds of thousands of members, becoming an online
forum for the discussion of police brutality in Egypt. After a popular uprising in
Tunisia in January 2011, Ghonim and several other Internet democracy activists
posted messages to their sites calling for similar action in Egypt. Their social media
campaign helped spur mass demonstrations that forced Egyptian Pres. Ḥosnī
Mubārak from power.
In the wake of catastrophic disasters, citizens have used the Internet to donate to
charities in an unprecedented fashion. Others have used the Internet to reunite
family members or to match lost pets with their owners. The role of the Internet in
responding to disasters, both natural and deliberate, remains the topic of much
discussion, as it is unclear whether the Internet actually can function in a disaster
area when much of the infrastructure is destroyed. Certainly during the September
11, 2001, attacks, people found it easier to communicate with loved ones in New
York City via e-mail than through the overwhelmed telephone network.
Following the earthquake that struck Haiti in January 2010, electronic media
emerged as a useful mode for connecting those separated by the quake and for
coordinating relief efforts. Survivors who were able to access the Internet—and
friends and relatives abroad—took to social networking sites such as Facebook in
search of information on those missing in the wake of the catastrophe. Feeds from
those sites also assisted aid organizations in constructing maps of the areas
affected and in determining where to channel resources. The many Haitians lacking
Internet access were able to contribute updates via text messaging on mobile
phones.
Online gaming is a kind of video game that is played through Internet or social
network. It allows multiple players online at the same time and it could be
implemented on mobile devices or PCs. Online games including social games,
MOBA games (Multiplayer Online Battle Arena), and first-person shooters. All of
them are a source of entertainment and a way to maintain positive relationships
with family and friends. Therefore, games become a significant part of the overall
experience of social media. people could establish different relationships in games,
such as friends or lovers. Most of players enjoy these relationships, and some of
them become lovers and get married in reality through games, just as Facebook or
Tender do.
Nichification allows for consumers to find what they want, but it also provides
opportunities for advertisers to find consumers. For example, most search engines
generate revenue by matching ads to an individual’s particular search query.
Among the greatest challenges facing the Internet’s continued development is the
task of reconciling advertising and commercial needs with the right of Internet
users not to be bombarded by ―pop-up‖ Web pages and spam
EDUCATION:-
The development of Internet technologies has raised the education level in all
countries and it has changed the way students are being taught at schools. That’s
why it is very important for the present generation that they provide internet
education for their young generations.
File sharing
College students have been at the leading edge of the growing awareness of the
centrality of intellectual property in a digital age. When American college student
Shawn Fanning invented Napster in 1999, he set in motion an ongoing legal battle
over digital rights. Napster was a file-sharing system that allowed users to share
electronic copies of music online. The problem was obvious: recording companies
were losing revenues as one legal copy of a song was shared among many people.
Although the record companies succeeded in shutting down Napster, they found
themselves having to contend with a new form of file sharing, P2P (―person-to-
person‖). In P2P there is no central administrator to shut down as there had been
with Napster. Initially, the recording industry sued the makers of P2P software and
a few of the most prolific users—often students located on university campuses
with access to high-speed connections for serving music and, later, movie files—in
an attempt to discourage the millions of people who regularly used the software.
Still, even while some P2P software makers have been held liable for losses that the
copyright owners have incurred, more-devious schemes for circumventing
apprehension have been invented.
The Internet poses a particular problem for autocratic regimes that restrict access
to independent sources of information. The Chinese government has been
particularly successful at policing the public’s access to the Internet, beginning
with its ―Great Firewall of China‖ that automatically blocks access to undesirable
Web sites. The state also actively monitors Chinese Web sites to ensure that they
adhere to government limits on acceptable discourse and tolerable dissent. In 2000
the Chinese government banned nine types of information, including postings that
might ―harm the dignity and interests of the state‖ or ―disturb social order.‖ Users
must enter their national identification number in order to access the Internet at
cybercafés. Also, Internet service providers are responsible for the content on their
servers. Hence, providers engage in a significant amount of self-censorship in order
to avoid problems with the law, which may result in losing access to the Internet or
even serving jail time. Finally, the authorities are willing to shut Web sites quickly
and with no discussion. Of course, the state’s efforts are not completely effective.
Information can be smuggled into China on DVDs, and creative Chinese users can
circumvent the national firewall with proxy servers—Web sites that allow users to
move through the firewall to an ostensibly acceptable Web site where they can
connect to the rest of the Internet.
The threats to privacy in the new Internet age were crystallized in 2000 by the case
of DoubleClick, Inc. For a few years DoubleClick, the Internet’s largest advertising
company, had been compiling detailed information on the browsing habits of
millions of World Wide Web users by placing ―cookie‖ files on computer hard drives.
Cookies are electronic footprints that allow Web sites and advertising networks to
monitor people’s online movements with telescopic precision—
Privacy of cell phone communication also has become an issue, as in 2010 when
BlackBerry smartphone maker RIM reacted to demands from the United Arab
Emirates (U.A.E.), Saudi Arabia, and India that security forces from those countries
be given the ability to intercept communications such as e-mail and instant
messages from BlackBerry users within their borders. The U.A.E. later canceled a
planned ban on the BlackBerry service, saying that it had reached an agreement
with RIM, which declined to reveal its discussions with the governments of other
countries. The demands were part of a rising tide of security demands from
national governments that cited the need to monitor criminals and terrorists who
used wireless communications.
The United States is not immune to these controversies. In 2010 Pres. Barack
Obama’s administration said that in order to prevent terrorism and identify
criminals, it wanted Congress to require that all Internet services be capable of
complying with wiretap orders. The broad requirement would include Internet
phone services, social networking services, and other types of Internet
communication, and it would enable even encrypted messages to be decoded and
read—something that required considerable time and effort. Critics complained
that the monitoring proposal challenged the ideals of privacy and the lack of
centralized authority for which the Internet had long been known
The Internet, sometimes called simply "the Net," is a worldwide system of computer
networks -- a network of networks in which users at any one computer can, if they
have permission, get information from any other computer (and sometimes talk
directly to users at other computers.
A computer network developed by the Advanced Research Project Agency (now the
Defense Advance Research Projects Agency) In The 1960s And 1970s As A Means
Of Communication Between Research Laboratories And Universities. Arpanet Was
The Predecessor To The Internet. Arpanet. Short For Advanced Research Projects
Agency Network, Arpanet Was Created To Make It Easier For People To Access
Computers, Improve Computer Equipment, And To Have A More Effective
Communication Method For The Military.
SMTP is part of the application layer of the TCP/IP protocol. Using a process called
"store and forward," SMTP moves your email on and across networks. It works
closely with something called the Mail Transfer Agent (MTA) to send your
communication to the right computer and email inbox.
File Transfer Protocol (FTP) is a client/server protocol used for transferring files to
or exchanging files with a host computer. ... Anonymous FTP allows users to access
files, programs and other data from the Internet without the need for a user ID or
password.simple mail transfer protocol (SMTP, commonly referred to as e-mail), for
sending short messages, and the file transfer protocol (FTP), for longer
transmissions.
While DARPA had played a seminal role in creating a small-scale version of the
Internet among its researchers, NSF worked with DARPA to expand access to the
entire scientific and academic community and to make TCP/IP the standard in all
federally supported research networks. In 1985–86 NSF funded the first five
supercomputing centres—at Princeton University, the University of Pittsburgh, the
University of California, San Diego, the University of Illinois, and Cornell
University. In the 1980s NSF also funded the development and operation of the
NSFNET, a national ―backbone‖ network to connect these centres.
Since it is a large network of people and information around the world, the Internet
is an enabler for e-commerce as because it allows businesses to showcase and sell
their products and services online.
Internet impact on society is now making economic, social, and political changes
around the globe. It's obvious because the billions of users, communities, cultures
using the internet in their daily life. And our actions, thoughts and communication
skills on the internet is impacting society positively or negatively.
Social media has revolutionized the way people communicate and socialize on the
web. There is a positive effect on business, politics, socialization as well as some
negative effects such as cyberbullying, privacy, and fake news. Social media has
definitely made us closer to different parts of the world.
File sharing is the public or private sharing of computer data or space in a network
with various levels of access privilege. FTP can be used to access (read and possibly
write to) files shared among a particular set of users with a password to gain access
to files shared from an FTP server site.
(A)Ftp Protocol
3.The Centerlized Computer Having Huge Storage Capacity And Vert High Proccessing
Peed Are Called As:
(A)Server
(B)Workstation
(C)Tree
(D)Mesh
4. The Documents In Web Sites That Display Information Are Called As:
(A) Server
(C) ISP
(D) LAN
(A)HTTP
(B) FTP
(C)TCP/IP
(D) WWW
(A)ARPANET
(B) NSFNET
(C)VNET
7. Voice Mail, E-mail , Online Service The Internet And WWW Are Example Of:
(A)Computer Categroies
(B) Connectivity
(C)Telecommuting
(C)Mil Domain
(A) Internet
(B) Network
(C) Software
(D) Process
(A) ARPA
(B)NSF
(C) NSA
(D) ISO
(A)None Of These
B) None Of These
(B)Circuit Switching
ANSWER:- 1.B 2.A 3.A 4.B 5.C 6.A 7.C 8.B 9.A 10.A 11.B
References:
IT FOR SCHOOL BY MICA EDUCO BOOKS
HTTPS://BRITANNICA.COM
HTTPS://TUTORIALSPOINT.COM
HTTPS://SANFOUNDRY.COM
CONTACT:- 8708398741