How the Internet Developed

2021 ◽  
pp. 27-35
Author(s):  
Kieron O’Hara

This chapter presents the history of the Internet and associated applications. The Internet grew out of the ARPANET, founded on network engineering ideas such as packet switching and the end-to-end principle. The chapter describes the development of TCP/IP to connect networks by Cerf and Kahn, creating the modern Internet as a permissionless open system which anyone can join without a gatekeeper, allowing it to scale up. The evolution of the governance system of Internet Service Providers (ISPs) and Internet Exchange Points (IXPs) is presented. The chapter also describes the development of applications that sit on the Internet platform, including the World Wide Web, linked data, cloud computing, and social media.

First Monday ◽  
2015 ◽  
Author(s):  
Gerard Goggin

As the World Wide Web turns 25, it is an appropriate time to ask: where are we are now with disability and the Internet? A good place to look is in the burgeoning area of Internet and mobile technology. Accordingly, this paper explores the issues and prospect for disability and mobile Internet. It provides a brief history of the entwined nature of the rise of disability and the Internet, discusses the emergence of mobile Internets, and then turns to a discussion of mobile Web accessibility. It concludes by noting the limits of mobile Web accessibility, for its struggle to adopt an expanded concept of disability — but also because of growing complexity of mobile Internets.


Author(s):  
Andrew Ward ◽  
Brian Prosser

In the last decade of the twentieth century, with the advent of computers networked through Internet Service Providers and the declining cost of such computers, the traditional topography of secondary and post-secondary education has begun to change. Where before students were required to travel to a geographically central location in order to receive instruction, this is often no longer the case. In this connection, Todd Oppenheimer writes in The Atlantic Monthly that one of the principal arguments used to justify increasing the presence of computer technology in educational settings is that “[W]ork with computers – particularly using the Internet – brings students valuable connections with teachers, other schools and students, and a wide network of professionals around the globe.”1 This shift from the traditional to the “virtual” classroom2 has been welcomed by many. As Gary Goettling writes, “[D]istance learning is offered by hundreds, if not thousands, of colleges and universities around the world, along with a rapidly growing number of corporate and private entities.”3 Goettling’s statement echoes an earlier claim by the University of Idaho School of Engineering that one of the advantages of using computers in distance education is that they “increase access. Local, regional, and national networks link resources and individuals, wherever they might be.”4


Author(s):  
James K. Ho

Much academic research on information technology (IT), systems (IS), and management (IM) has been branded by practitioners in business as unusable, irrelevant, and unreadable. Consequently, it is highly unlikely that conventional outlets for such work, e.g., scholarly journals and conference proceedings, can receive significant real-world exposure. By reversing the push-pull dynamics of information dissemination and retrieval in the new media, alternative approaches are emerging. This article presents the history of a case in point with data recorded over a period of 15 months. It is shown that the Internet in general and the World Wide Web in particular will be significant resources in bridging the gap between practice and relevant research.


2019 ◽  
Vol 2 (3) ◽  
pp. 238-242
Author(s):  
Andreas Tedja ◽  
Charles Lim ◽  
Heru Purnomo Ipung

The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.


1994 ◽  
Vol 41 (5) ◽  
pp. 276-281
Author(s):  
M. G. (Peggy) Kelly ◽  
James H. Wiebe

Throughout the Curriculum and Evaluation Standards for School Mathematics (NCTM 1989) the notion of students and teachers as critical thinkers, information seekers, and problem solvers is a priority. The Internet, an electronic highway connected by gateways from one computer network to another, furnishes a telecommunications link around the world. The Internet enables students and teachers to access authentic, real-time data for critical analysis. With access to such Internet service providers as a university computer network or a commercial service like Compuserve, Prodigy, or Applelink, students and teachers become active information seekers.


2008 ◽  
Vol 32 (1) ◽  
pp. 1-18 ◽  
Author(s):  
Margo Anderson

Visual and oral, video and audio evidence are brought to bear to examine the history of the U.S. census and the practice of social science history. The article explores how artists have appropriated and depicted census taking in America and how census takers used “artistic” forms of evidence to advertise and promote the census and explicate census results to the public. The article also suggests how social science historians have understood and used the new electronic environment of the Internet and the World Wide Web to present their data and findings.


2005 ◽  
Vol 15 (4) ◽  
pp. 378-399 ◽  
Author(s):  
Yuval Elovici ◽  
Chanan Glezer ◽  
Bracha Shapira

PurposeTo propose a model of a privacy‐enhanced catalogue search system (PECSS) in an attempt to address privacy threats to consumers, who search for products and services on the world wide web.Design/methodology/approachThe model extends an agent‐based architecture for electronic catalogue mediation by supplementing it with a privacy enhancement mechanism. This mechanism introduces fake queries into the original stream of user queries, in an attempt to reduce the similarity between the actual interests of users (“internal user profile”) and the interests as observed by potential eavesdroppers on the web (“external user profile”). A prototype was constructed to demonstrate the feasibility and effectiveness of the model.FindingsThe evaluation of the model indicates that, by generating five fake queries per each original user query, the user's profile is hidden most effectively from any potential eavesdropper. Future research is needed to identify the optimal glossary of fake queries for various clients. The model also should be tested against various attacks perpetrated against the mixed stream of original and fake queries (i.e. statistical clustering).Research limitations/implicationsThe model's feasibility was evaluated through a prototype. It was not empirically tested against various statistical methods used by intruders to reveal the original queries.Practical implicationsA useful architecture for electronic commerce providers, internet service providers (ISP) and individual clients who are concerned with their privacy and wish to minimize their dependencies on third‐party security providers.Originality/valueThe contribution of the PECSS model stems from the fact that, as the internet gradually transforms into a non‐free service, anonymous browsing cannot be employed any more to protect consumers' privacy, and therefore other approaches should be explored. Moreover, unlike other approaches, our model does not rely on the honesty of any third mediators and proxies that are also exposed to the interests of the client. In addition, the proposed model is scalable as it is installed on the user's computer.


Author(s):  
Elisabeth Jay Friedman

This chapter offers an alternative account of the invention of the internet. It tells the story of how social justice-oriented web enthusiasts built the internet as we know it today – a networks of networks – because they wanted to ensure access for activist counterpublics around the world. They concretized their goals with the formation of the Association for Progressive Communications, a network of civil society-based Internet Service Providers. Within this global project, feminist communication activists carved out a space for women’s organizing through the APC’s Women’s Networking Support Programme. From their early efforts to today, such activists have contested the gendering of internet technology as the province of men. In doing so, they have also subverted the West’s domination over the internet by extending resources to women from the Global South, particularly Latin America, to nurture their own counterpublics.


Author(s):  
Heinz Scheifinger

Technological change is a fundamental element of modernity, and an exploration of modern Hinduism must take seriously the role of technology in religious transformation. While the nineteenth century saw the introduction of the printing press as a new tool for mass mobilization, the Internet has become the technological platform for religious innovation and transformation since the last decade of the twentieth century. This chapter gives an introduction to the topic of Hinduism online. It starts by giving a brief overview of the short history of Hinduism online, with the first movements and temples establishing a presence on the World Wide Web from the mid-1990s. Focusing on the core concept of pūjā, the chapter argues that online Hinduism and the wider Hindu tradition are so closely linked that it makes little sense to see the online and the offline as separate realms. In fact, online Hinduism is an integral part of contemporary Hinduism, and the Internet has already spurred interesting questions and dilemmas of theology and religious authority in the Hindu tradition and will certainly continue to do so.


1997 ◽  
Vol 21 (12) ◽  
pp. 775-778 ◽  
Author(s):  
C. Senior ◽  
M. L. Phillips ◽  
A. S. David

This paper highlights the role that the World Wide Web (WWW) has to play as an aid to psychiatry. A basic history of the WWW is provided as is an introduction to some search techniques involved with the WWW. The literature on applications potentially relevant to psychiatry is reviewed using computer search facilities (BIDS, PsychLit and Medline). The WWW is one of the aspects of the Internet that possesses a huge potential for exploitation, both the clinical and research psychiatrist are able to benefit from its use.


Sign in / Sign up

Export Citation Format

Share Document