History of the Internet 722 Essay Example
History of the Internet 722 Essay Example

History of the Internet 722 Essay Example

Available Only on StudyHippo
  • Pages: 12 (3210 words)
  • Published: October 3, 2018
  • Type: Article
View Entire Sample
Text preview

This article aims to provide individuals with insights into the origin, development, expansion, and profound influence of the Internet on society. It caters specifically to those who desire a deeper understanding of this technology. The Internet has undergone significant transformation, starting as a small network of computers and growing into an extensive network comprising constantly connected computers.

This text examines the growth and influence of the Internet, highlighting its increasing popularity and wide-reaching presence. It emphasizes how the Internet has become an integral part of people's lives, citing examples like web addresses in TV commercials and major companies offering online customer support. Additionally, it acknowledges that the concept of the Internet was initially conceived during the Cold War era in the 1960s.

The Department of Defense's Advanced Research Project Agency (ARPA) led the growth of a smal

...

l network (ARPANET), which started as a paper architecture and aimed to facilitate the exchange of super-computers among researchers in the United States. Its main objective was to provide rapid communication during a global war or nuclear attack, considering the potential destruction of traditional communication systems in such a scenario. As a solution, the government implemented a large-scale and scalable network that allowed anyone to connect. Initially, users utilized this network primarily for research purposes, exchanging information and data.

Nowadays, the main concerns for the Internet are potential damage from a tractor's back-ho or government interference. In July 1961, an individual named Leonard Kleinrock from MIT wrote a paper on packet switching theory and published the first book about it in 1964. This concept involved utilizing small amounts of electricity to transmit signals through network wires, laying the foundation fo

View entire sample
Join StudyHippo to see entire essay

networking. Kleinrock firmly believed in the possibility of using packets instead of circuits for communication, representing a significant advancement in computer networking.

The other crucial step involved establishing communication between computers. In 1965, Roberts and Thomas Merrill connected the first two computers using a dial-up telephone line with low speed. This marked the creation of the first wide-area computer network, despite its small scale. The network was considered wide-area because the two computers were located in different states. The experiment revealed that time-shared computers could effectively collaborate, but accessing programs and retrieving data on the remote machine required improvements to the circuit switched telephone system. Roberts and Merrill recognized the need for further work before achieving true networking.

Kleinrock's conviction on the necessity of packet switching was later confirmed, revolutionizing networking. However, companies only realized the practicality of Kleinrock's achievement much later. In late 1966, DARPA embarked on development, leading to the creation of "ARPANET." Notably, in 1964, the RAND group published a paper on secure military voice communication through packet switching networks. Interestingly, MIT (1961-1967), RAND (1962-1965), and NPL (1964-1967) independently conducted parallel research without knowledge of each other's endeavors at the time.

The term "packet" was borrowed from NPL and the planned line speed for ARPANET design was boosted from 2.4 kbps to 50 kbps, which was a noteworthy enhancement and 25 times faster than the previous speeds. This also denoted a considerable progress in packet travel speed at that time. Nevertheless, with the establishment of more connections and increased network traffic, this formerly fast speed swiftly became insufficient.

During the subsequent year, connections were promptly incorporated into the ARPANET. Concurrently, efforts were made to finalize a

fully functional Host-to-Host protocol and other network software. Initially, all software had to be developed from the beginning, but as time progressed, they applied their gained knowledge to generate faster networking software. In December 1970, the Network Working Group (NWG) completed the original ARPANET Host-to-Host protocol, which was known as the Network Control Protocol (NCP).

The purpose of setting standards for networking was to ensure compatibility for most connections. As the ARPANET sites implemented NCP between 1971 and 1972, users were able to develop applications. During this time, E-mail started becoming more important on the Internet because of new standards being set. The number of connected people increased, and they were assigned address names.

"E-MAIL," short for "Electronic Mail," functions like traditional mail but with increased speed. It enables sending messages to recipients worldwide in under a second. Numerous Internet Providers provide complimentary e-mail services alongside their Internet offerings. Comparable to a P.O. box for physical mail, an e-mail address serves as the digital equivalent in the realm of electronic communication.

The email address is composed of your name or login, followed by the @ symbol, and then the supplier of the email or school. For instance, an example would be [email protected]. Throughout time, email has been responsible for significant issues within the Internet.

Advanced software has been created to scour the Internet in pursuit of E-Mail addresses, subsequently storing them in an extensive database. The companies responsible for managing this software then vend these databases to individuals seeking to promote a product or offer a service. Consequently, this procedure has evolved into an excessively extensive junk mail system, causing significant complications with E-mail and impairing the speed

of the Internet.

The excessive amount of unsolicited emails that individuals receive simultaneously can result in network issues. These unsolicited emails are commonly referred to as spam. The ARPANET, developed between 1970 and 1973, experienced instant success. While its primary objective was to enable data sharing and remote computer access amongst scientists, email quickly became the preferred use of the network.

Electronic mail and Newsgroups became popular rapidly as ARPANET, the precursor to the internet, experienced significant growth. By 1971, ARPANET had expanded to include 23 hosts, connecting prestigious universities and government research centers nationwide. During this time, ARPANET started to transition away from its initial focus on military and research purposes. Notably, in 1976, Queen Elizabeth made history by sending the first email from the royal family.

In the early days of 1981, ARPANET had 213 hosts, just before the explosion of micro-computers. Approximately every 20 days, a new host was added. From 1982-1987, researchers across the network focused on enhancing the network due to emerging issues. The researchers at MIT developed TCP/IP, the universal language for all Internet computers. TCP/IP proved to be a crucial advancement for the Internet. Prior to its development, connecting to systems was challenging due to disorganized names and numbers.

The utilization of TCP/IP facilitated the distribution of computer names and numbers, ultimately resulting in the creation of the internet as it exists today. This marked a noteworthy achievement as the ARPANET, originally consisting of a collection of networks, was officially recognized as an "internet". In the mid-80s, advancements in technology led to a boom in both personal computers and super-minicomputers due to cost-effective and faster production methods.

The power of this

new desktop tool rapidly grew as business software advanced, allowing computers to easily handle intricate calculations like spreadsheets and databases. Affordable desktop machines became widely available, along with strong network-ready servers, enabling numerous companies to connect to the internet and improve communication with customers. The term "Internet" was first used in 1982, and by 1987, the number of Internet hosts exceeded 10,000 and continued to grow significantly. This period also witnessed substantial expansion of Newsgroups.

The Internet, which we are familiar with, began with a single branch known as NEWSGROUPS. This platform allows individuals to post and exchange messages. Newsgroups have been a part of the Internet since its earliest days and mainly consist of text-based messages shared among people. In modern times, they continue to be highly popular.

Nowadays, there is a multitude of online discussion forums that encompass various subjects. These platforms provide an opportunity to access information and ask public queries on specific topics. You can both seek assistance or guidance as well as contribute your knowledge to aid others in their quest for information.

In 1988, the Internet became crucial for communication, raising concerns about privacy and security. This led to the emergence of terms such as "hacker," "cracker," and "electronic break-in." It is worth noting that computer hackers have always existed and will continue to do so. Therefore, it is vital to recognize that not all hackers are malicious individuals who intend to disrupt your computer.

While some hackers are driven by curiosity and the desire to test their skills in infiltrating systems undetected, it is important to recognize that not all hackers have malicious intentions aimed at compromising personal data or disrupting servers.

It is vital to defend against those individuals who do intend to destroy data and servers. Companies have long been aware of the risks associated with directly connecting their networks to the Internet without implementing protective measures. In response to this concern, firewalls were created as software programs that serve as traffic regulators, overseeing and managing information flow.

The firewall operates by filtering the traffic based on its IP address and can also filter the port of transmission. The significance of these concerns was evident on November 1, 1988, when a harmful program known as the "Internet Worm" temporarily disabled approximately 6,000 out of the total 60,000 Internet hosts. In addition to Hackers and Crackers, there are also Viruses. According to Symantec Corporation's definition, a virus is "a parasitic program intentionally designed to infiltrate a computer without the user's consent or awareness." The term parasitic is used because a virus attaches itself to files or boot sectors and reproduces, thus perpetuating its spread.

According to Symantec, viruses can have varying effects, from simply replicating to causing serious damage or impacting program and system performance. It is important to never assume that a virus is harmless and leave it on a system ("http://www.symantec.com/avcenter/vfaq.html#what_virus"). In 1992, the "MBONE" portion of the Internet saw the first audio and video broadcasts take place. Another significant development during this expanding Internet era was hypertext, which allowed for the viewing of graphics and sounds over the Net. In 1993, the first graphics-based Web browser called Mosaic became available.

The Internet's most popular area is the World Wide Web (WWW), which both defines and shares similarities with other Internet protocols. The WWW includes elements like

information and more.

The popularity of the World Wide Web (WWW) stems from its abundant collection of visually appealing pictures that load quickly and are vibrant in color. One reason for this popularity is attributed to the American people's accustomedness to a constantly evolving and regularly updated flow of information, partly influenced by their familiarity with television. Furthermore, the internet predominantly offers free information to its users.

The Internet encompasses a diverse range of content, including government documents, expired copyrighted works, public domain materials, and experimental creations shared by authors within the online community. However, it is improbable to come across certain types of information such as copyrighted commercial works or data provided by companies or organizations.

In 1996, the Internet celebrated its 25th anniversary and transitioned from its military origins to a significant historical milestone. At that time, approximately 40 million individuals were connected to the Internet. Furthermore, the Internet has evolved into a thriving marketplace where online shopping malls, auctions, and companies selling goods and services contribute to generating over $1 billion in annual transactions.

There is tension on the internet as Netscape and Microsoft engage in a battle over HTML implementation. Currently, there are two dominant web browsers – Netscape and Microsoft Internet Explorer – competing fiercely. Both companies are developing their own browser versions, but Microsoft is introducing variations in how it handles certain aspects of HTTP coding. In contrast, Netscape remains loyal to the original HTML coding created by its founders.

Microsoft is making changes to the original format of HTML in order to stand out and create difficulties for web page creators, with the goal of winning the browser war. These modifications

align with their requirements. At present, numerous parents are opting for homeschooling instead of public schools and they heavily depend on the Internet as a priceless tool for educating their children.

Parents should exercise caution regarding the content their children access due to the vast amount of information available. It is crucial to consider the source of this information, distinguishing between reliable sources and personal webpages. To ascertain the credibility of the information, one can examine its web address. If the address contains ".org" or ".gov", it indicates a trustworthy source.

Those are reputable places of information. "Computers in some schools are helping teachers to keep themselves trained on the latest equipment and software. Teachers must constantly adapt their curriculum to the changing needs of their students that computer technology can bring about (IFT Insight, 1996). With the Internet, teachers are no longer necessarily the center of instruction. With the proper use of the WWW tools, students can take control of their own learning at different levels. Cognitive research has confirmed that students learn best when they are engaged with their studies, and when they are making decisions and thinking critically (Elmore, 1993). The role of the teacher begins to change to that of the person who guides students towards finding and sorting through information.

In recent years, the amount of information people have to deal with has been increasing exponentially. It is not realistic to expect teachers to be able to teach all the necessary information for students to succeed in a community that now has higher expectations than ever before (http://www.geocities.com/Athens/5461/paper_1.html). Another significant aspect of the Internet is IRC (Internet Relay Chat), which allows real-time communication

with people from all over the world. Although it is simple and easy to use, it is limited to text-based communication. IRC consists of various separate networks, called "nets," which are made up of IRC servers that allow users to connect. The largest net, EFnet, often has more than 15,000 people online simultaneously. Once connected to an IRC net, users can join one or more "channels" to converse with others.

On EFnet, there are frequently over 5,000 channels available. Conversations can be either public, where anyone in the channel can see what you type, or private, consisting of messages between two individuals, who may or may not be on the same channel. It is important to remember that IRC is not a "game" and to treat the people you encounter on IRC with the same level of respect as if you were conversing face-to-face. Unfortunately, IRC has introduced certain risks to the Internet, such as stalkers and pedophiles, which puts children in potential danger while using IRC. There have been instances where children have been influenced to leave their homes or, even worse, harm themselves.

In 1997, the FBI conducted a research project to assess the severity of a particular issue. To investigate, the FBI created counterfeit accounts and accessed the Internet. Specifically, they assumed the identity of 14-year-old females on IRC. They deliberately entered channels with explicit content and soon found themselves inundated with explicit materials and information. The outcomes of this investigation were eventually shared with the news media.

In this age of abundant Internet information, it can be challenging to find anything useful. Fortunately, Search Engines come to the rescue. These websites catalog Internet

Sites, making it easy for users to locate them. Just type in a keyword related to the desired topic, click the search button in your web browser, and voila, you will get the necessary information. There are numerous search engines available, such as Yahoo, Webcrawler, Altavista, Excite, Magellan, Inktomi, and Lycos. However, one major drawback of these search engines is the inability to filter search results. For instance, searching for "dogs" can yield over 10,000 hits (where information appears on a web page), when all you wanted was free medical information about dog care.

The amount of information available on the internet about "breast cancer" is vast and constantly changing. However, search engines often fail to update their databases quickly enough, resulting in links to outdated or useless information. Two major issues caused by the internet are the abundance of public data that can be abused and the rise of internet addiction. Many public websites offer access to public information, such as www.PublicData.Com, which provides drivers' license numbers and license plate numbers for individuals in Texas.

All you need to do in our databases is input the name of the person you are searching for and it will provide you with a list of all individuals with the same name. Once you have selected the intended person, you will be given access to all the information present on their driver's license. Additionally, there is a feature that allows you to explore all individuals residing at the same address. This means that by searching for an individual's husband, you can also obtain data on their wife and children who live in the same household. Furthermore, the database includes

information on Texas License Plates in addition to driver's licenses.

By using the provided , you can easily access the ownership details of any registered car in Texas. Once you obtain the owner's name, simply input this information into the search to discover their residential address. If this sensitive information falls into the wrong hands, it could have dire consequences. Today, internet addiction has become increasingly prevalent, particularly among college students who often stay up late at night and consequently struggle to attend their classes the next day.

The University of Texas provides a support group for students struggling with new addictions. It is anticipated that this issue will worsen as the Internet expands and connection speeds improve. How does an individual connect to the Internet at home? There are numerous options available, ranging from high-cost solutions suited for large corporations or universities to affordable alternatives suitable for small businesses or personal use. Regardless of the type of service, whether it is an expensive dedicated connection or a cost-effective dial-up connection for home users, accessing the Internet has never been easier. It is highly likely that there is a local Internet provider available in your area.

Every major city has several local internet service providers (ISPs). Due to the issues associated with these providers, many people have switched to larger nationwide ISPs. Examples of such major nationwide ISPs include Comp-U-Serv, America on Line (AOL), and Microsoft Network. This is particularly beneficial for frequent travelers, as it allows them to stay connected no matter their location.

With the rise in Internet users, service providers have struggled to meet the increasing demand. The state of New York

filed a lawsuit against America on Line (AOL) as a result of numerous user complaints about connectivity issues. Essentially, AOL had an excessive number of users without sufficient computer equipment, modems, and phone lines to handle the load. The sheer volume of users connected to the Internet has significantly slowed down its overall speed. Nevertheless, there are promising prospects for faster speeds in the near future. In fact, cable TV providers currently have the technology to offer high-speed Internet service.

This new cable modem Internet service offers speeds up to 200 times faster than the fastest phone modem, all for a similar cost. The Internet has become an essential part of our lives with a staggering annual growth rate of 341,634%. In just 30 years, the Internet has evolved from a Cold War idea to control a post-nuclear society into the Information Superhighway. Similar to how railroads transformed society during the 19th century, the Internet propels us into the Information Age, profoundly shaping our world.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New