Hawke. G.L. "The Internet and its role in the future The Electrical Engineering Handbook Ed. Richard C. Dorf Boca raton crc Press llc. 2000
Hawke, G.L. “The Internet and its Role in the Future” The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000
99 The Internet and Its Role in the future 99.1 Introduction 99.2 History he Internet Today Send/Receive Capacity .Login Password. The World wide Web Gary L. Hawke www, Web) University of Kansas 99.4 The Future 99.1 Introduction The creation of the computer rivals any invention in our history. The wide use of computers and their resultant affect on all communication is tied directly to their ability to contact and interface with each other. This ability to link computers together is the basis for all global success of computer usage. It is the key to sharing knowledge, The Internet is the adolescent offspring developed from the creation of a backbone connecting computers iter networks. These Local Area Networks(LANs) within internal locations can now be linked to other networks worldwide. The Internet, not really a place but a concept, is intended to connect global information resources. The value of the Internet is more than its ability to link computers and networks, its real value is in bringing information to any who need it. This chapter will attempt to give a broad overview of the Internet, condensing the major points of interest is a list of just a few publications the reader may wish to check for more in-depth information The rapid advances in technology and innovations in operating software make any published account of the Internet obsolete before they arrive in the reader's hands. As we look at the Internet as it exists today, we also try to take a glimpse at the future of this creation. There are, however, as many visions of the future as there are dreamers. So, with due respect to those who envision the developments and uses of the Internet in the years to come, here is a basic introduction. 99.2 History Early in the development of the mainframe computer, the creators realized these machines would have to be able to talk to each other for the technology to be of real meaning. They began by connecting one computer to another through direct cable hook-up, then to printers, and eventually they sought a means of connection outside their own building. The telephone system seemed like a logical choice. It was virtually everywhere. It was flexible, inexpensive, and one could simply dial up the location one wanted to reach. The modem was invented to send computer information over telephone lines instead of a direct wire connection. It provided the modulated( Mo)computer signal from one location and the demodulated (dem)to the other end of the connection. Protocols were developed that would translate the computer signal to telephone tones. Modems c 2000 by CRC Press LLC
© 2000 by CRC Press LLC 99 The Internet and Its Role in the Future 99.1 Introduction 99.2 History 99.3 The Internet Today Send/ReceiveCapacity • Login • Password • The World Wide Web (WWW, Web) 99.4 The Future 99.1 Introduction The creation of the computer rivals any invention in our history. The wide use of computers and their resultant affect on all communication is tied directly to their ability to contact and interface with each other. This ability to link computers together is the basis for all global success of computer usage.It is the key to sharing knowledge, data, conversation, and discovery on a global scale. The Internet is the adolescent offspring developed from the creation of a backbone connecting computers and computer networks. These Local Area Networks (LANs) within internal locations can now be linked to other networks worldwide. The Internet, not really a place but a concept, is intended to connect global information resources. The value of the Internet is more than its ability to link computers and networks, its real value is in bringing information to any who need it. This chapter will attempt to give a broad overview of the Internet, condensing the major points of interest into one short chapter. There are, of course, hundreds of books on the subject. At the end of the chapter there is a list of just a few publications the reader may wish to check for more in-depth information. The rapid advances in technology and innovations in operating software make any published account of the Internet obsolete before they arrive in the reader’s hands. As we look at the Internet as it exists today, we also try to take a glimpse at the future of this creation. There are, however, as many visions of the future as there are dreamers. So, with due respect to those who envision the developments and uses of the Internet in the years to come, here is a basic introduction. 99.2 History Early in the development of the mainframe computer, the creators realized these machines would have to be able to talk to each other for the technology to be of real meaning. They began by connecting one computer to another through direct cable hook-up, then to printers, and eventually they sought a means of connection outside their own building. The telephone system seemed like a logical choice. It was virtually everywhere. It was flexible, inexpensive, and one could simply dial up the location one wanted to reach. The modem was invented to send computer information over telephone lines instead of a direct wire connection. It provided the modulated (Mo) computer signal from one location and the demodulated (dem) to the other end of the connection. Protocols were developed that would translate the computer signal to telephone tones. Modems Gary L. Hawke University of Kansas
are limited by the speed at which they can make this translation. Later in the chapter, modem speeds and types will be discussed at greater length. Computers can speak with each other in various methods over telephone lines. Circuit switching is when one computer directly dials up another. As phone lines in and out of locations began to become"busy"at times, the multiplexing idea was born. This allows an electronic cue system where computers may line up to access the next available line when one computer is done. Various forms of multiplexing have been developed to hold the data to be transmitted until an outgoing line is available, then delivering it. This eliminates the leed for the entire computer waiting for a path. Other tasks can be undertaken while the outgoing data is in eo This same early system is still the main access to the Internet for businesses and personal use. It allows anyone ess to the Internet anywhere in the world that telephone service is available. This now includes cellular applications and even direct satellite transmission for extremely remote locations. The system works very well and is expanding on a local access basis. As the Cold War continued, the government began the search for a system that would be less vulnerable to damage or sabotage. The U.S. Advanced Research Projects Agency(ARPA) began to explore an alternate path for government, business, and research locations to interconnect. This national network would allow different operating systems the ability to talk to each other and to route this path in a multitude of connects. Thus, if one path was damaged, the system would seek another path to its destination. The packet system of transmitting, which divides the information into streams of small packets of information, each with an I D number for final assembly, was developed. This new network would allow scientists from around the country to connect to one another to further computer technology. The system would be able to share equipment, transfer data files, and use long distance login capabilities. However, according to one of its early developers, Vint Cerf, vice-president of the Corporation for National Research Initiatives, ..we didn,'t know that e-mail was important.we weren't even sure what it was at the time"Dern, 1994. This new network would be called ARPAnet Soon researchers at private companies and institutions of higher learning were cranking out new software protocols to allow computers access to this new highway. In 1969, the first three aRPanet participants were linked between Stanford University in Palo Alto, California, and the University of California at Los Angeles and the University of California at Santa Barbara. The system grew slowly for the first decade, a bit faster over the next 10 years, and exploded in the 1990s as protocols, access, and individual desk top computers increased o During these years many operating systems, high speed(including fiber optic)transmission lines,access oviders, and language protocols were developed. The Defense Advanced Research Projects Agency developee a protocol for network interconnection called Transmission Control Protocol/Internetworking Protocol (TCP/IP). In 1983 this protocol was adopted as the standard for what would later be called Internet. 99.3 The Internet Today Today the Internet is a conglomeration of a huge number of interconnected LANs around the world. These are a series of linked IPs, functioning on their own, but able to instantly connect with any other LAN likewise lected to the Internet. It also covers the thousands of personal computers at home or in the office. The Internet can also connect to a wide range of other networks, including privately operated ones like America On Line, Prodigy, and Compuserve, plus hundreds of other special networks now in use throughout the world of speed, capacity, and reliability begin to crop up. These will be discussed later in the dhaple. et problems All you need is their IP, email account, or Web site address. As more and more users access the Internet problems The operating system most used by computers on the Internet is Unix. This system was developed by AT&T Bell Labs. This system uses characters on a menu or command message to access files. For more detailed information on Unix see [ Dern, 1994] The Internet has four major services: (1)electronic mail(email),(2)telnet, (3)file transfer protocol(FTP), nd( 4)client/server connections. Discussion on each service follows 1. Email--Probably the most used process on the Internet, email is a text transfer of messages from one point to another. Email addresses will route a message anywhere in the world in seconds. Several email programs are in use, from free shared systems such as Elm, Pine, Mailx, and Eudora. Recently some e 2000 by CRC Press LLC
© 2000 by CRC Press LLC are limited by the speed at which they can make this translation. Later in the chapter, modem speeds and types will be discussed at greater length. Computers can speak with each other in various methods over telephone lines. Circuit switching is when one computer directly dials up another. As phone lines in and out of locations began to become “busy” at times, the multiplexing idea was born. This allows an electronic cue system where computers may line up to access the next available line when one computer is done. Various forms of multiplexing have been developed to hold the data to be transmitted until an outgoing line is available, then delivering it. This eliminates the need for the entire computer waiting for a path. Other tasks can be undertaken while the outgoing data is in the hold position. This same early system is still the main access to the Internet for businesses and personal use. It allows anyone access to the Internet anywhere in the world that telephone service is available. This now includes cellular applications and even direct satellite transmission for extremely remote locations. The system works very well and is expanding on a local access basis. As the Cold War continued, the government began the search for a system that would be less vulnerable to damage or sabotage. The U.S. Advanced Research Projects Agency (ARPA) began to explore an alternate path for government, business, and research locations to interconnect. This national network would allow different operating systems the ability to talk to each other and to route this path in a multitude of connects. Thus, if one path was damaged, the system would seek another path to its destination. The packet system of transmitting, which divides the information into streams of small packets of information, each with an I.D. number for final assembly, was developed. This new network would allow scientists from around the country to connect to one another to further computer technology. The system would be able to share equipment, transfer data files, and use long distance login capabilities. However, according to one of its early developers, Vint Cerf, vice-president of the Corporation for National Research Initiatives, “...we didn’t know that e-mail was important...we weren’t even sure what it was at the time” [Dern, 1994]. This new network would be called ARPAnet. Soon researchers at private companies and institutions of higher learning were cranking out new software protocols to allow computers access to this new highway. In 1969, the first three ARPAnet participants were linked between Stanford University in Palo Alto, California, and the University of California at Los Angeles and the University of California at Santa Barbara. The system grew slowly for the first decade, a bit faster over the next 10 years, and exploded in the 1990s as protocols, access, and individual desk top computers increased. During these years many operating systems, high speed (including fiber optic) transmission lines, access providers, and language protocols were developed. The Defense Advanced Research Projects Agency developed a protocol for network interconnection called Transmission Control Protocol/Internetworking Protocol (TCP/IP). In 1983 this protocol was adopted as the standard for what would later be called Internet. 99.3 The Internet Today Today the Internet is a conglomeration of a huge number of interconnected LANs around the world. These are a series of linked IPs, functioning on their own, but able to instantly connect with any other LAN likewise connected to the Internet. It also covers the thousands of personal computers at home or in the office. The Internet can also connect to a wide range of other networks, including privately operated ones like America On Line, Prodigy, and Compuserve, plus hundreds of other special networks now in use throughout the world. All you need is their IP, email account, or Web site address.As more and more users access the Internet problems of speed, capacity, and reliability begin to crop up. These will be discussed later in the chapter. The operating system most used by computers on the Internet is Unix. This system was developed by AT&T Bell Labs. This system uses characters on a menu or command message to access files. For more detailed information on Unix see [Dern, 1994]. The Internet has four major services: (1) electronic mail (email), (2) telnet, (3) file transfer protocol (FTP), and (4) client/server connections. Discussion on each service follows. 1. Email—Probably the most used process on the Internet, email is a text transfer of messages from one point to another. Email addresses will route a message anywhere in the world in seconds. Several email programs are in use, from free shared systems such as Elm, Pine, Mailx, and Eudora. Recently some
advanced features have been added to mail programs and many have been released at low cost Eudora Pro is an example. Email is a low-cost instant information carrier. It can be used internally or on the Internet and will continue to expand in usage. 2. Telnet--This program allows the user to log onto other computers in distant locations and to operate those computers from their own terminal, running systems or downloading data. This defines how omputers speak to each other for login applications. Of course, most computers require a password to be able to access their information. The use of telnet to open other computers has spawned a rash of hacking, which attempts to forge passwords for unauthorized access. These can be criminal acts and are the very situations seen on occasional newscasts! Telnet is available on a public domain basis and can operate with almost all computer hardware. 3. FTP-This allows you to transfer files from one computer to another or from one remote site to another remote site. The user has the ability to download files from shareware servers or from private files using a password for entry. FTP can download small files and huge databases. It is the primary method for those doing research or fact finding to acquire massive amounts of information in a very short time. as was mentioned previously, the time it takes to download files is directly related to the speed of your modem, or direct connection. This can take a very long time in the case of large files 4. Client/server--Much of the current use of the Internet is to share information. This can happen when one computer accesses another that operates separately and serves information to the client who has logged in. You request another computer to send files to you, the client. In the early days of the Internet, most of these were text files only. One such text-based browse is Lynx, developed at the University of ansas for exploration of the documents on the Internet and the World wide Web(www)Web, for short. www is a system for finding and accessing Internet resources. The Web's most innovative feature is the ability to "point and click"on a text word or graphic to hypertext link you to another Web site holding the information you request. This process allows you to move from one computer to the next hop-scotching across the globe to find the information you seek. By using hypertext-based protocol, the world is at your fingertips in an instant. The Lynx program is only text-based, but later developments brought graphics to the Web search vehicles. In order to search the vast reserves of information, browsers were developed. An early public domain browser, developed by the National Center for Supercomputing Applications, is Mosaic. Mosaic is all you need for Web site access. Later, Netscape Navigator was commercially developed with lots of bells and whistles for quick and easy access. There is a cost for Send/Receive Capacity Computers function using binary numbers. This series of 0 or 1 format exists at the smallest level as a bit. This digital system is transmitted over modems or direct connections in a series of 8-bit packets called bytes. Th number of bits per second that can be transmitted or received equates to the speed at which you can send receive information over the Internet. This bandwidth of the transmission line is expressed in bits per second, normally in metric form. Early computer connects were made at 56 bits per second(56 bps). As the speed of machine and systems proved, rates of transmission have increased to kilobits( kbs), megabits(mps), gigabits(gbs), and so on. Early modems operated at 14.4 kbs(14,000 bps), more modern modems function at 28.8 kbs(28, 800 bps) Higher capacity"pipelines"include Integrated Services Digital Network(ISDN) lines that can now be installed at home or business that operate at 56 kbs, direct Ethernet connections(a technology that can connect computers at a 10 Mbps). Higher capacity lines such as T-1(1.54 Mbs)and multiples of those, T-2, and T-3 lines are now being used for extremely high capacity systems. The T-1 and higher lines are very expensive to install and maintain but offer extremely quick Internet work speed Logi In order to begin the process of logging in, you will need an account of some kind. This is established through your service provider, which could be your own company or a commercial service such as Compuserve, America e 2000 by CRC Press LLC
© 2000 by CRC Press LLC advanced features have been added to mail programs and many have been released at low cost. Eudora Pro is an example. Email is a low-cost instant information carrier. It can be used internally or on the Internet and will continue to expand in usage. 2. Telnet—This program allows the user to log onto other computers in distant locations and to operate those computers from their own terminal, running systems or downloading data. This defines how computers speak to each other for login applications. Of course, most computers require a password to be able to access their information. The use of telnet to open other computers has spawned a rash of hacking, which attempts to forge passwords for unauthorized access. These can be criminal acts and are the very situations seen on occasional newscasts! Telnet is available on a public domain basis and can operate with almost all computer hardware. 3. FTP—This allows you to transfer files from one computer to another or from one remote site to another remote site. The user has the ability to download files from shareware servers or from private files using a password for entry. FTP can download small files and huge databases. It is the primary method for those doing research or fact finding to acquire massive amounts of information in a very short time. As was mentioned previously, the time it takes to download files is directly related to the speed of your modem, or direct connection. This can take a very long time in the case of large files. 4. Client/server—Much of the current use of the Internet is to share information. This can happen when one computer accesses another that operates separately and serves information to the client who has logged in. You request another computer to send files to you, the client. In the early days of the Internet, most of these were text files only. One such text-based browse is Lynx, developed at the University of Kansas for exploration of the documents on the Internet and the World Wide Web (www) Web, for short. WWW is a system for finding and accessing Internet resources. The Web’s most innovative feature is the ability to “point and click” on a text word or graphic to hypertext link you to another Web site holding the information you request. This process allows you to move from one computer to the next hop-scotching across the globe to find the information you seek. By using hypertext-based protocol, the world is at your fingertips in an instant. The Lynx program is only text-based, but later developments brought graphics to the Web search vehicles. In order to search the vast reserves of information, browsers were developed. An early public domain browser, developed by the National Center for Supercomputing Applications, is Mosaic. Mosaic is all you need for Web site access. Later, Netscape Navigator was commercially developed with lots of bells and whistles for quick and easy access. There is a cost for Netscape. Send/Receive Capacity Computers function using binary numbers. This series of 0 or 1 format exists at the smallest level as a bit. This digital system is transmitted over modems or direct connections in a series of 8-bit packets called bytes. The number of bits per second that can be transmitted or received equates to the speed at which you can send or receive information over the Internet. This bandwidth of the transmission line is expressed in bits per second, normally in metric form. Early computer connects were made at 56 bits per second (56 bps). As the speed of machine and systems improved, rates of transmission have increased to kilobits (kbs), megabits (mps), gigabits (gbs), and so on. Early modems operated at 14.4 kbs (14,000 bps), more modern modems function at 28.8 kbs (28,800 bps). Higher capacity “pipelines” include Integrated Services Digital Network (ISDN) lines that can now be installed at home or business that operate at 56 kbs, direct Ethernet connections (a technology that can connect computers at a 10 Mbps). Higher capacity lines such as T-1 (1.54 Mbs) and multiples of those, T-2, and T-3 lines are now being used for extremely high capacity systems. The T-1 and higher lines are very expensive to install and maintain but offer extremely quick Internet work speed. Login In order to begin the process of logging in, you will need an account of some kind. This is established through your service provider, which could be your own company or a commercial service such as Compuserve,America
on Line, etc. If you are operating your own system, you'll first need a tCp/ip plus a serial communications protocol such as a Serial Line Internet Protocol(SLIP), Point to Point Protocol(PPP), or the like. If you access one of these from your desktop computer you may start an email program, such as Eudora, without logging in to your multiuser account. Your mail will be downloaded to your desktop, where you can read it, print it, save it, or compose a new message. When you copy files from public acccess sites, your desktop system can bring them directly to it. You can also use the full desktop visual capabilities of your system when attaching to a Web site. If you are using a modem connection to another server/host, you'll need to check the speed. From Internet providers and accounts available you can select: full network sites dial in Ip telnet(long distance telephone service) public access accounts(terminal servers) commercial servers Email and Web sites are identified by an address On the Internet, address always refers to an electronic address. he form is Userid, the name selected by the user, followed by the character, followed by the computers name(all computers on the Internet have a specific name) Example: ghawke @ukans edu In this case"ukans"refers to the University of Kansas computer center. No spaces are used in the address. The information after the"@"refers to a domain. There can be any number of user names alike but each and every domain will have their own unique I fter the userid -@- and domain name, there can be one or more sub-domains. In the example above, the sub-domain is"edu"for educational institution. The sub-domains are listed with the most general information about the domain computer being further to the right or end of the address and the most specific name being to the immediate right of the domain name. Domains and their meanings are listed in Table 99.1 Password At this point of your login, you'll be asked to create a password. This password is the key to your account and the tighter you guard it, the more secure your system will be Common passwords are a combination of letter and number characters, usually eight or so in number. Obviously, these can be the subject of unauthorized usage. The more creative the password, the more secure it wil The World Wide Web( www, Web The www has more Internet locations than any other resource. It serves as a huge reference book for the world, with the added feature of hypertext links. Hypertext allows one to follow a topic line or reference idea TABLE 99.1 Organizational Top-Level Domains Meaning Cultural and entertainment entities Commercial organization Educational institution Businesses or firms Information services International organization networking organization Individual or personal nomenclature creational activity organizations Businesses offering goods to purchase www related activity organizations e 2000 by CRC Press LLC
© 2000 by CRC Press LLC on Line, etc. If you are operating your own system, you’ll first need a TCP/IP plus a serial communications protocol such as a Serial Line Internet Protocol (SLIP), Point to Point Protocol (PPP), or the like. If you access one of these from your desktop computer you may start an email program, such as Eudora, without logging in to your multiuser account. Your mail will be downloaded to your desktop, where you can read it, print it, save it, or compose a new message. When you copy files from public acccess sites, your desktop system can bring them directly to it. You can also use the full desktop visual capabilities of your system when attaching to a Web site. If you are using a modem connection to another server/host, you’ll need to check the speed. From Internet providers and accounts available you can select: • full network sites • dial in IP accounts • telnet (long distance telephone service) • public access accounts (terminal servers) • commercial servers Email and Web sites are identified by an address. On the Internet, address always refers to an electronic address. The form is Userid, the name selected by the user, followed by the @ character, followed by the computer’s name (all computers on the Internet have a specific name). Example: ghawke@ukans.edu In this case “ukans” refers to the University of Kansas computer center. No spaces are used in the address. The information after the “@” refers to a domain. There can be any number of user names alike but each and every domain will have their own unique name. After the userid –@– and domain name, there can be one or more sub-domains. In the example above, the sub-domain is “edu” for educational institution. The sub-domains are listed with the most general information about the domain computer being further to the right or end of the address and the most specific name being to the immediate right of the domain name. Domains and their meanings are listed in Table 99.1. Password At this point of your login, you’ll be asked to create a password. This password is the key to your account and the tighter you guard it, the more secure your system will be. Common passwords are a combination of letter and number characters, usually eight or so in number. Obviously, these can be the subject of unauthorized usage. The more creative the password, the more secure it will be. The World Wide Web (WWW, Web) The WWW has more Internet locations than any other resource. It serves as a huge reference book for the world, with the added feature of hypertext links . Hypertext allows one to follow a topic line or reference idea TABLE 99.1 Organizational Top-Level Domains Domain Meaning art Cultural and entertainment entities com Commercial organization edu Educational institution firm Businesses or firms gov Government info Information services int International organization mil U.S. military net Networking organization nom Individual or personal nomenclature org Non-profit organization rec Recreational activity organizations store Businesses offering goods to purchase web WWW related activity organizations
from one site to another, just by a point and"click" of a mouse. This link can take you to another page of the site you initially addressed or it can automatically link you around the world to another computer with a totally different Web site full of additional information. This is done through a computer program titled Hyper Text Markup Language(HTML). This program will allow you to create your own Web site, or home page as the are sometimes called, or connect your site to any others you wish to link With the millions of Web sites out there, the browsers we previously mentioned are invaluable in locating e site you want. You may access these by topic name, individual name, address, or randomly. a list of searching tools is provided in the Defining Terms section. 99.4 The Future Obviously, the future of the Internet is as wide open as imagination itself. The author, therefore, can only propose one persons opinion. Those who have the vision and talent for the future needs of information and services on the Internet will be the millionaires and experts in the years to come. There are a few areas that current trends indicate will be open for expansion Advertising and Marketing It seems clear that what is driving the expanse of the Internet's development is directly linked to advertising nd marketing. When Netscape and Yahoo went public, the company founders became instant millionaires and the value of those and other companies soared. Although theses two companies now charge for their software, these search vehicles will create the majority of their income for advertising on their search pages and by the sale of marketing research they can develop from the chronicling of data received from their visitors. Every time one of these is accessed, computers can archive the visitor s name and address, the sites they visited, the time spent on each page, the links made to other sites and any purchases ordered. Advertisers can focus on the exact customer profile they want in purchasing this information database or to advertise directly on the page. There are huge dollars waiting to be spent on this form of advertising. The user of the Internet may feel they are an independent wanderer through the garden of knowledge, with no forced direction and no guided path. They should know, however, that the most popular search vehicles, most exciting Web site pages, and most creative browsers will be paid for by advertising dollars. Their use of these sites will contribute to databases designed to exploit these visitors. One of the major reasons the Internet and, more specifically, the world wide Web will increase in use is its ability for interactive use by the public. This takes the form of game playing, research responses, banking, entertainment, and purchases. Recent trade shows have unveiled incredible interactive games designed for all ges that can be played over the Internet from Scrabble to Super Mario. The Web already contains hundreds of sites that allow you to respond directly to research questions, interest levels and personal inquiry. There are many sites that already involve banking and the ordering of goods and services. Obviously, the popularity of these services is directly related to the public's confidence in their security. Just as with Automated Teller Machines, I believe this aspect of technology will be mastered on the Internet, although any code or security be broken by another. The entertainment side will grow rapidly. Movies on demand, archival information from existing print media and traditional radio and tv will be available. In December of 1994, KjhK, the student FM radio station at the University of Kansas, was the first station to provide a real time, live and continuous programming source to the Internet. The on-air programming of the station can be heard anywhere in the world by attaching their Web site. There are many radio stations now"broadcasting"over the Internet and several commercial software companies around to facilitate that use. On January 2, 1996, the University of Kansas provided a live television signal to the Internet that could be viewed by computers connected to the Internet with 28.8 modems or higher. These real time audio and video services will be used in all kinds of applications in the future. They not only provide good quality and diverse choice, but can be delivered at very low costs since most long distance telephone charges are not present. The huge growth in the use of the Internet is even more amazing when one considers that the ownership of personal computers is still rather low when compared with the entire population, although 1995 was the first e 2000 by CRC Press LLC
© 2000 by CRC Press LLC from one site to another, just by a point and “click” of a mouse. This link can take you to another page of the site you initially addressed or it can automatically link you around the world to another computer with a totally different Web site full of additional information. This is done through a computer program titled HyperText Markup Language (HTML). This program will allow you to create your own Web site, or home page as they are sometimes called, or connect your site to any others you wish to link. With the millions of Web sites out there, the browsers we previously mentioned are invaluable in locating the site you want.You may access these by topic name, individual name, address, or randomly.A list of searching tools is provided in the Defining Terms section. 99.4 The Future Obviously, the future of the Internet is as wide open as imagination itself. The author, therefore, can only propose one person’s opinion. Those who have the vision and talent for the future needs of information and services on the Internet will be the millionaires and experts in the years to come. There are a few areas that current trends indicate will be open for expansion. Advertising and Marketing It seems clear that what is driving the expanse of the Internet’s development is directly linked to advertising and marketing. When Netscape and Yahoo went public, the company founders became instant millionaires and the value of those and other companies soared. Although theses two companies now charge for their software, these search vehicles will create the majority of their income for advertising on their search pages and by the sale of marketing research they can develop from the chronicling of data received from their visitors. Every time one of these is accessed, computers can archive the visitor’s name and address, the sites they visited, the time spent on each page, the links made to other sites and any purchases ordered. Advertisers can focus on the exact customer profile they want in purchasing this information database or to advertise directly on the page. There are huge dollars waiting to be spent on this form of advertising. The user of the Internet may feel they are an independent wanderer through the garden of knowledge, with no forced direction and no guided path. They should know, however, that the most popular search vehicles, most exciting Web site pages, and most creative browsers will be paid for by advertising dollars. Their use of these sites will contribute to databases designed to exploit these visitors. One of the major reasons the Internet and, more specifically, the World Wide Web will increase in use is its ability for interactive use by the public. This takes the form of game playing, research responses, banking, entertainment, and purchases. Recent trade shows have unveiled incredible interactive games designed for all ages that can be played over the Internet from Scrabble to Super Mario. The Web already contains hundreds of sites that allow you to respond directly to research questions, interest levels and personal inquiry. There are many sites that already involve banking and the ordering of goods and services. Obviously, the popularity of these services is directly related to the public’s confidence in their security. Just as with Automated Teller Machines, I believe this aspect of technology will be mastered on the Internet, although any code or security system designed by one can be broken by another. The entertainment side will grow rapidly. Movies on demand, archival information from existing print media and traditional radio and TV will be available. In December of 1994, KJHK, the student FM radio station at the University of Kansas, was the first station to provide a real time, live and continuous programming source to the Internet. The on-air programming of the station can be heard anywhere in the world by attaching to their Web site. There are many radio stations now “broadcasting” over the Internet and several commercial software companies around to facilitate that use. On January 2, 1996, the University of Kansas provided a live television signal to the Internet that could be viewed by computers connected to the Internet with 28.8 modems or higher. These real time audio and video services will be used in all kinds of applications in the future. They not only provide good quality and diverse choice, but can be delivered at very low costs since most long distance telephone charges are not present. The huge growth in the use of the Internet is even more amazing when one considers that the ownership of personal computers is still rather low when compared with the entire population, although 1995 was the first
ear that the purchase of computers outpaced the purchase of television sets! The use of the Internet for email will continue to increase. This will also take the form of video conferencing. The speed and low cost of both of these systems make contact between family and student or between corporations and their clients a very desirable advantage of the Internet. No discussion about the Internet's future would be complete without a quick look at the legal aspects. We have already seen an attempt by the government to censor content on the Internet. The recent Telecommuni- cations Act called for criminal penalties for certain obscene material provided to the Internet. This was struck down by the Supreme Court, but look for more attempts to regulate this new media. In addition, the concerns about intellectual property and copyright infringement are already being addressed. Many Internet users"use material on their Web sites without permission from their creators. This applies to music licenses for entertain ment, reprints of news stories and books, cartoons, artists creations, and copyrighted research. Be careful in this area. The larger the pockets of the user, the more apt they are to be sued for copyright infringement. As the years go by, you will see many new regulations and judicial decisions in favor of the creators of this material. Finally, the anonymity for Internet users, the personal soap box it offers, and the ability to gather even the most obscure interest groups together in the privacy of their very own home means a huge use of the Internet for personal expression. This new technology will be as great, if not greater, an influence on world society tha television has been. Your predictions on its future are as good as mine Defining Terms The following list of terms is based in large part from the published list compiled by Academic Computing Services, University of Kansas, and is reprinted with their permission Anonymous FTP: Used to log into public access file sites and download files by logging in the user name anonymous Archie: A search system for locating publicly available files by anonymous FTP ARPA: The United States Advanced Research Projects Agency was the original source for the development of network to inter-connect ARPAnet: The original inter-connecting network that was the basis for the Internet. ASCIl: American Standard Code for Information Interchange. An industry-wide computer standard for the encoding of numeric characters ASCII file: American Standard Code for Information Interchange. A file type where characters are stored as a series of eight binary digits(A=01000001) Buad rate: The primary signaling rate of a carrier. A 9600"baud"modem transfers data at 2400 baud,but the signal rate is 4 bits per cycle allowing for a transfer rate of 9600 bps. Baud and bps are used synonymously but they not the same BBS: Bulletin board system. An electronic multi-user system that often includes a message database people login to and lea binary file: A file in which all 8 bits of a byte are used to encode information. Binary is also a file transfer type used for zip and executable files in ftp BITNET: An academically oriented international network using a different protocol than the Internet, although email may be exchanged via gateways. a typical BITNET address might look like joe@ukanvm ps: Bits per second. Bridge: A connection using software or hardware to connect two segments of a network not necessarily using Browser: any program that reads hypertext. Mosaic Lynx, and Netscape Navigator are browser clients used to access world wide web sites network(Think of your telephone as the client and the telephone company as the server ere on the Client: A software application that exists to extract some service from a remote server somewl Compression: A utility used on many platforms to make files smaller for transport. On a Mac common compression formats are sit(use Stuffit to uncompress)or cpx(use Compact Pro to uncompress).On a PC, zip is common(use pkunzip to uncompress e 2000 by CRC Press LLC
© 2000 by CRC Press LLC year that the purchase of computers outpaced the purchase of television sets! The use of the Internet for email will continue to increase. This will also take the form of video conferencing. The speed and low cost of both of these systems make contact between family and student or between corporations and their clients a very desirable advantage of the Internet. No discussion about the Internet’s future would be complete without a quick look at the legal aspects. We have already seen an attempt by the government to censor content on the Internet. The recent Telecommunications Act called for criminal penalties for certain obscene material provided to the Internet. This was struck down by the Supreme Court, but look for more attempts to regulate this new media. In addition, the concerns about intellectual property and copyright infringement are already being addressed. Many Internet users “use” material on their Web sites without permission from their creators. This applies to music licenses for entertainment, reprints of news stories and books, cartoons, artists creations, and copyrighted research. Be careful in this area. The larger the pockets of the user, the more apt they are to be sued for copyright infringement. As the years go by, you will see many new regulations and judicial decisions in favor of the creators of this material. Finally, the anonymity for Internet users, the personal soap box it offers, and the ability to gather even the most obscure interest groups together in the privacy of their very own home means a huge use of the Internet for personal expression. This new technology will be as great, if not greater, an influence on world society than television has been. Your predictions on its future are as good as mine. Defining Terms The following list of terms is based in large part from the published list compiled by Academic Computing Services, University of Kansas, and is reprinted with their permission. Anonymous FTP: Used to log into public access file sites and download files by logging in the user name “anonymous” Archie: A search system for locating publicly available files by anonymous FTP. ARPA: The United States Advanced Research Projects Agency was the original source for the development of a network to inter-connect computers. ARPAnet: The original inter-connecting network that was the basis for the Internet. ASCII: American Standard Code for Information Interchange. An industry-wide computer standard for the encoding of numeric characters. ASCII file: American Standard Code for Information Interchange. A file type where characters are stored as a series of eight binary digits (A=01000001). Buad rate: The primary signaling rate of a carrier. A 9600 “baud” modem transfers data at 2400 baud, but the signal rate is 4 bits per cycle allowing for a transfer rate of 9600 bps. Baud and bps are used synonymously but they not the same. BBS: Bulletin board system. An electronic multi-user system that often includes a message database people can login to and leave messages for a particular group. binary file: A file in which all 8 bits of a byte are used to encode information. Binary is also a file transfer type used for .zip and executable files in ftp. BITNET: An academically oriented international network using a different protocol than the Internet, although email may be exchanged via gateways. A typical BITNET address might look like joe@ukanvm. bps: Bits per second. Bridge: A connection using software or hardware to connect two segments of a network not necessarily using the same protocol. Browser: any program that reads hypertext. Mosaic, Lynx, and Netscape Navigator are browser clients used to access World Wide Web sites. Client: A software application that exists to extract some service from a remote server somewhere on the network. (Think of your telephone as the client and the telephone company as the server). Compression: A utility used on many platforms to make files smaller for transport. On a Mac common compression formats are .sit (use Stuffit to uncompress) or .cpx (use Compact Pro to uncompress). On a PC, .zip is common (use pkunzip to uncompress)
Domain name server: A distribution database system for translating mnemonic computer addresses (like kuhub. cc. ukans edu into numeric addresses (like 129. 237. 32. 1)and vice versa. Domain name: The exclusive name assigned to a site on the Internet. Email: Electronic mail. The exchange of messages between people on an electronic network. Ethernet: A computer communications technology designed to connect computer systems together to form local area networks(LANs). Ethernet transmits information at 10 million bits per second over different physical media ranging from twisted pair wires to fiber optic cable Fetch: An easy to use public domain ftp program for the Macintosh. FTP: File Transfer Protocol. The process of moving a file from one computer to another. The application program that moves files using the file transfer protocol. Gateway: Device that converts messages from one protocol to another allowing two different networks to Gopher: A menu-based system for exploring the Internet. HTML: Hyper Text Markup Language Used to define the various components of a World wide Web docu ment. HTML tells Web browsers like Netscape how to display text. Hypertext: Documents that contain links to other documents or other areas of the same document. Selecting a link in a hypertext document automatically displays the second location IP: Internet Protocol. Allows a packet to transverse multiple networks to find a destination. LAN: Local area network. A hardware/software combination that allows a group of computers in a limited area to share Lynx: A cursor-based hypertext browser for exploring the Web. Developed at the University of Kansas by members of the Distributed Computing Group of User Services Modem: A piece of equipment that connects a computer to a data transmission line(usually a telephone line) Mosaic: An Internet navigating tool for exploring the Web Multiplexing: As it relates to the modem connection of computer, the ability to process on command while waiting for another to"cue up"and wait for a connection to another site Netscape Navigator: An Internet navigating tool for exploring the Web, sometimes called Netscape. NIC: Network Information Center. As close as the Internet gets to a central office Packet: A bundle of data. Data on the Internet is broken up into small chunks called packets. When packets arrive at an addressed location, they are reassembled into the original data stream. PPP: Point to point protocol. A format that allows a computer to use Internet protocols over a serial dial-in connection Protocol: A definition of a formal process. For example, a communications protocol allows computers from different manufacturers to talk to each other Public domain: A file is said to be in the public domain if it can be downloaded free without restrictions uch as shareware fees Router: A combined hardware/software system to transfer data between two networks that use the same Searching tools: Programs that aide you in finding the many Internet sites you wish to connect to, searchable by name, subject, or category. Some of these are: Archie: A toll for locating files on publicly accessible sites. The results of an Archie search are the names anddirectoriesoffilesonanonymousftpsitesAccessArchieat:http://www.lerc.nasagov/doc/arcHieplezht Finger: Designed to give information about a person with an account on a particular system. From the system prompt enter the command: talk address opher: A menu-based system for exploring Internet resources. Accessed files may be on an anonymous ftp, library, or database that is accessible only with Gopher. To access Gopher http://www.cc.ukans.edu_/cwis/reference/gopherresourceshtml Wais:Accessat:http://www.w3.org/hypertext/datasources/wais/byhOst.html Whois: Access from your multiuser account by entering the command: whois name Server: A computer that provides files and other facilities to anyone with proper access and authorization e 2000 by CRC Press LLC
© 2000 by CRC Press LLC Domain name server: A distribution database system for translating mnemonic computer addresses (like kuhub.cc.ukans.edu into numeric addresses (like 129.237.32.1) and vice versa. Domain name: The exclusive name assigned to a site on the Internet. Email: Electronic mail. The exchange of messages between people on an electronic network. Ethernet: A computer communications technology designed to connect computer systems together to form local area networks (LANs). Ethernet transmits information at 10 million bits per second over different physical media ranging from twisted pair wires to fiber optic cable. Fetch: An easy to use public domain ftp program for the Macintosh. FTP: File Transfer Protocol. The process of moving a file from one computer to another. The application program that moves files using the file transfer protocol. Gateway: Device that converts messages from one protocol to another allowing two different networks to communicate. Gopher: A menu-based system for exploring the Internet. HTML: HyperText Markup Language. Used to define the various components of a World Wide Web document. HTML tells Web browsers like Netscape how to display text. Hypertext: Documents that contain links to other documents or other areas of the same document. Selecting a link in a hypertext document automatically displays the second location. IP: Internet Protocol. Allows a packet to transverse multiple networks to find a destination. LAN: Local area network. A hardware/software combination that allows a group of computers in a limited area to share resources. Lynx: A cursor-based hypertext browser for exploring the Web. Developed at the University of Kansas by members of the Distributed Computing Group of User Services. Modem: A piece of equipment that connects a computer to a data transmission line (usually a telephone line). Mosaic: An Internet navigating tool for exploring the Web. Multiplexing: As it relates to the modem connection of computer, the ability to process on command while waiting for another to “cue up” and wait for a connection to another site. Netscape Navigator: An Internet navigating tool for exploring the Web, sometimes called Netscape. NIC: Network Information Center. As close as the Internet gets to a central office. Packet: A bundle of data. Data on the Internet is broken up into small chunks called packets. When packets arrive at an addressed location, they are reassembled into the original data stream. PPP: Point to point protocol. A format that allows a computer to use Internet protocols over a serial dial-in connection. Protocol: A definition of a formal process. For example, a communications protocol allows computers from different manufacturers to talk to each other. Public domain: A file is said to be in the public domain if it can be downloaded free without restrictions such as shareware fees. Router: A combined hardware/software system to transfer data between two networks that use the same protocol. Searching tools: Programs that aide you in finding the many Internet sites you wish to connect to, searchable by name, subject, or category. Some of these are: Archie: A toll for locating files on publicly accessible sites. The results of an Archie search are the names and directories of files on anonymous ftp sites. Access Archie at: http://www.lerc.nasa.gov/Doc/archieplezhttpd.html Finger: Designed to give information about a person with an account on a particular system. From the system prompt enter the command: talk address Gopher: A menu-based system for exploring Internet resources. Accessed files may be on an anonymous ftp, librar y, or database that is accessible only w ith Gopher. To access Gopher : http://www.cc.ukans.edu/cwis/ reference/gopher_ resources.html WAIS: Access at: http://www.w3.org/hypertext/DataSources/WAIS/ByHost.html Whois: Access from your multiuser account by entering the command: whois name Server: A computer that provides files and other facilities to anyone with proper access and authorization
Shareware: Software that is distributed for use by the public. If found to be useful, a fee is expected by the SLIP: Serial Line Internet Protocol. A protocol that allows a computer to use Internet protocols over a serial dial-in connection TCP/IP: The Transmission Control Protocol/Internet Protocol. One of the protocols on which the Internet is based Telnet: A terminal emulation protocol that allows someone to sign-on to a remote system on the Internet and an application that implements the telnet protocol Terminal server: Provides dial-in access to basic services (i.e, telnet)for file transfer and internet service via ppP of Slip UNIX: A popular operating system developed by At&T/Bell labs. This is the major system by which Internet servers are programmed. The most common user interfaces on the Internet are character-based menu choice or command-line interfaces to Unix system vt100: A type of terminal made by Digital Equipment Corp. Many terminal emulation programs provide vt100 emulation WAIS: Wide Area Information Services. A system for searching databases across the Internet. Whois: An application used to access a directory of domain names and addresses using the Network Infor mation Center database. To access whois from a multiuser account enter the command: whois name. The name may be a registered person, Internet host name, or an organization. Web(www): World Wide Web. A hypertext-based system for finding and accessing Internet resources The following are Internet program locaters Archie for Macintosh: Via anonymous ftp from sumex-aim. stanford. edu in the directory info-mac/comm Eudora:Commercialversionemaileudora-info@qulcomm.com.Nochargeversionavailableviaanonymous ftp from sumex-aim. stanford. edu in the directory info-mac/comm or from ftp. qualcomm. com in the mac/eudora dire PcEudora:Availableviaanonymousftpfromftpqualcomm.com. Fetch: Via anonymous ftp from sumex-aim. stanford. edu in the directory info-mac or dartmouth. edu in the pub/mac directory. Gopher Book for Widows: gophbook zip is available via anonymous ftp from sunsite. unc.edu. Directory PC Gopher for DOS: From sunsite. unc. edu pub/package/gopher/PC_client HGopher for Windows: Available via anonymous ftp from lister. cc. ic ac uk in the directory pub/wingopher TurboGopher: Via anonymous ftp from sumex-aim. stanford. edu in the directory info-mac/comm. mosaic: Via anonymous ftp from ftp ncsa uiuc. edu in the Mosaic/mosaic-binaries directory. NCSA Telnet: Via anonymous ftp from sumex-sim stanford edu in the directory info-mac/comm or from ftp nscauiuc. edu in Mac directory. MacPPP: Pub/pp directory at merit.edu. Combine this with MacTCP to get your Mac directly on the Internet. Pc/tCpPlusforDos:info@ftp.com Mactcp:Contactapda@applelink.apple.com. Interslip:pub/salesdirectoryatftp.intercon.com Macslip:Forinformatione-mailinfor@hdepark.com. Super-tcpi/nfsforWindowstcp@frontiertech.com Talk for the Macintosh: Via anonymous ftp from mac archive. umich. edu in the directory mac/util/comm. WAIS-for-Mac: Via anonymous ftp from ftp/wais. com. Go to the file wais-for-mac-12-alpha sea hqx from the directory pub/freeware/mac. win WAIS for Windows: wmmwais2 1 zip is available via anonymous ftp from ridgisd erusgs. gov in the directory www Browser for Macintosh: In the directory pub/www/bin/mac via anonymous ftp from infor. cern.ch. WorldwideWebBrowserViaanonymousftpfrominfocernchinthedirectorypub.www.bin.next. e 2000 by CRC Press LLC
© 2000 by CRC Press LLC Shareware: Software that is distributed for use by the public. If found to be useful, a fee is expected by the developer. SLIP: Serial Line Internet Protocol. A protocol that allows a computer to use Internet protocols over a serial dial-in connection. TCP/IP: The Transmission Control Protocol/Internet Protocol. One of the protocols on which the Internet is based. Telnet: A terminal emulation protocol that allows someone to sign-on to a remote system on the Internet and an application that implements the telnet protocol. Terminal server: Provides dial-in access to basic services (i.e., telnet) for file transfer and Internet service via PPP of SLIP. UNIX: A popular operating system developed by AT&T/Bell labs. This is the major system by which Internet servers are programmed. The most common user interfaces on the Internet are character-based menuchoice or command-line interfaces to Unix systems. vt100: A type of terminal made by Digital Equipment Corp. Many terminal emulation programs provide vt100 emulation. WAIS: Wide Area Information Services. A system for searching databases across the Internet. Whois: An application used to access a directory of domain names and addresses using the Network Information Center database. To access whois from a multiuser account enter the command: whois name. The name may be a registered person, Internet host name, or an organization. Web (WWW): World Wide Web. A hypertext-based system for finding and accessing Internet resources. The following are Internet program locaters. Archie for Macintosh: Via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac/comm. Eudora: Commercial version email eudora-info@qulcomm.com. No charge version available via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac/comm or from ftp.qualcomm.com in the mac/eudora directory. PC Eudora: Available via anonymous ftp from ftp.qualcomm.com. Fetch: Via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac or dartmouth.edu in the pub/mac directory. Gopher Book for Widows: gophbook.zip is available via anonymous ftp from sunsite.unc.edu. Directory pub/micro/pc-stuff/ms-windows/winsock/apps. PC Gopher for DOS: From sunsite.unc.edu pub/package/gopher/PC_client. HGopher for Windows: Available via anonymous ftp from lister.cc.ic.ac.uk in the directory pub/wingopher. TurboGopher: Via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac/comm. Mosaic: Via anonymous ftp from ftp.ncsa.uiuc.edu in the Mosaic/mosaic-binaries directory. NCSA Telnet: Via anonymous ftp from sumex-sim.stanford.edu in the directory info-mac/comm or from ftp.nsca.uiuc.edu in Mac directory. MacPPP: pub/pp directory at merit.edu. Combine this with MacTCP to get your Mac directly on the Internet. PC/TCP Plus for DOS: info@ftp.com. MacTCP: Contact apda@applelink.apple.com. InterSLIP: pub/sales directory at ftp.intercon.com. MacSLIP: For information, e-mail infor@hdepark.com. Super-TCP//NFS for Windows: tcp@frontiertech.com. Talk for the Macintosh: Via anonymous ftp from mac.archive.umich.edu in the directory mac/util/comm. WAIS-for-Mac: Via anonymous ftp from ftp/wais.com. Go to the file wais-for-mac-1.2-alpha.sea.hqx from the directory pub/freeware/mac. WinWAIS for Windows: wnwais21.zip is available via anonymous ftp from ridgisd.er.usgs.gov in the directory software/wais. WWW Browser for Macintosh: In the directory pub/www/bin/mac via anonymous ftp from infor.cern.ch. WorldWideWeb Browser: Via anonymous ftp from info.cern.ch in the directory pub.www.bin.next
Related Topics 72.3 Local-Area Networks 92.2 Local Area Networks References Hahn, Osborne, and Stout, The Internet Complete Reference, New York: McGraw-Hill, 1994 D. Sachs and H Stair, Hands on Internet: A Beginning Guide for PC Users, Englewood Cliffs, N J: Prentice-Hall, A Glossbrenner, Internet 101: A College Student's Guide, 2nd ed, New York: McGraw-Hill, 1995 D Dern, The Internet Guide for New Users, New York: McGraw-Hill, 1994 B P. Kohoe, Zen and the Art of the Internet, Englewood Cliffs, N J Prentice-Hall. E. T. L. Hardie and V. Neov, Internet: Mailing Lists, Englewood Cliffs, N J. Prentice-Hall. e 2000 by CRC Press LLC
© 2000 by CRC Press LLC Related Topics 72.3 Local-Area Networks • 92.2 Local Area Networks References Hahn, Osborne, and Stout, The Internet Complete Reference, New York: McGraw-Hill, 1994. D. Sachs and H. Stair, Hands on Internet: A Beginning Guide for PC Users, Englewood Cliffs, N.J.: Prentice-Hall, 1994. A. Glossbrenner, Internet 101: A College Student’s Guide, 2nd ed., New York: McGraw-Hill., 1995. D. Dern, The Internet Guide for New Users, New York: McGraw-Hill, 1994. B. P. Kohoe, Zen and the Art of the Internet, Englewood Cliffs, N.J.: Prentice-Hall. E. T. L. Hardie and V. Neov, Internet: Mailing Lists, Englewood Cliffs, N.J.: Prentice-Hall