What Is Internet?: 1969 - Birth of A Network
What Is Internet?: 1969 - Birth of A Network
What Is Internet?: 1969 - Birth of A Network
Internet History
The Internet as we know it today, in the mid-1990s, traces it origins back to a Defense
Department project in 1969. The subject of the project was wartime digital communications. At
that time the telephone system was about the only theater-scale communications system in use.
A major problem had been identified in its design - its dependence on switching stations that could
be targeted during an attack. Would it be possible to design a network that could quickly reroute
digital traffic around failed nodes? A possible solution had been identified in theory. That was to
build a "web" of datagram network, called an "catenet", and use dynamic routing protocols to
constantly adjust the flow of traffic through the catenet. The Defense Advanced Research Projects
Agency (DARPA) launched the DARPA Internet Program.
1970s - Infancy
DARPA Internet, largely the plaything of academic and military researchers, spent more
than a decade in relative obscurity. As Vietnam, Watergate, the Oil Crisis, and the Iranian Hostage
Crisis rolled over the nation, several Internet research teams proceeded through a gradual
evolution of protocols. In 1975, DARPA declared the project a success and handed its management
over to the Defense Communications Agency. Several of today's key protocols (including IP and
TCP) were stable by 1980, and adopted throughout ARPANET by 1983.
Mid 1980s - The Research Net
Let's outline key features, circa-1983, of what was then called ARPANET. A small computer
was a PDP-11/45, and a PDP-11/45 does not fit on your desk. Some sites had a hundred computers
attached to the Internet. Most had a dozen or so, probably with something like a VAX doing most
of the work - mail, news, EGP routing. Users did their work using DEC VT-100 terminals. FORTRAN
was the word of the day. Few companies had Internet access, relying instead on SNA and IBM
mainframes. Rather, the Internet community was dominated by universities and military research
sites. It's most popular service was the rapid email it made possible with distant colleagues. In
August 1983, there were 562 registered ARPANET hosts (RFC 1296).
UNIX deserves at least an honorable mention, since almost all the initial Internet protocols
were developed first for UNIX, largely due to the availability of kernel source (for a price) and the
relative ease of implementation (relative to things like VMS or MVS). The University of California at
Berkeley (UCB) deserves special mention, because their Computer Science Research Group (CSRG)
developed the BSD variants of AT&T's UNIX operating system. BSD UNIX and its derivatives would
become the most common Internet programming platform.
Many key features of the Internet were already in place, including the IP and TCP protocols.
ARPANET was fundamentally unreliable in nature, as the Internet is still today. This principle of
unreliable delivery means that the Internet only makes a best-effort attempt to deliver packets.
The network can drop a packet without any notification to sender or receiver. Remember, the
Internet was designed for military survivability. The software running on either end must be
prepared to recognize data loss, retransmitting data as often as necessary to achieve its ultimate
delivery.
Driven largely by the development of the PC and LAN technology, subnetting was
standardized in 1985 when RFC 950 was released. LAN technology made the idea of a "catenet"
feasible - an internetwork of networks. Subnetting opened the possibilities of interconnecting LANs
with WANs.
The National Science Foundation (NSF) started the Supercomputer Centers program in 1986. Until
then, supercomputers such as Crays were largely the playthings of large, well-funded universities
and military research centers. NSF's idea was to make supercomputer resources available to those
of more modest means by constructing five supercomputer centers around the country and building
a network linking them with potential users. NSF decided to base their network on the Internet
protocols, and NSFNET was born. For the next decade, NSFNET would be the core of the U.S.
Internet, until its privatization and ultimate retirement in 1995.
Domain naming was stable by 1987 when RFC 1034 was released. Until then, hostnames were
mapped to IP address using static tables, but the Internet's exponential growth had made this
practice infeasible.
In the late 1980s, important advances related poor network performance with poor TCP
performance, and a string of papers by the likes of Nagle and Van Jacobson (RFC 896, RFC
1072, RFC 1144, RFC 1323) present key insights into TCP performance.
The 1987 Internet Worm was the largest security failure in the history of the Internet. More
information can be found in RFC 1135. All things considered, it could happen again.
In the early 90s, the first address exhaustion crisis hit the Internet technical community. The
present solution, CIDR, will sustain the Internet for a few more years by making more efficient use
of IP's existing 32-bit address space. For a more lasting solution, IETF is looking at IPv6 and its
128-bit address space, but CIDR is here to stay.
Of at least as much interest as Internet's technical progress in the 1990s has been its sociological
progress. It has already become part of the national vocabulary, and seems headed for even
greater prominence. It has been accepted by the business community, with a resulting explosion
of service providers, consultants, books, and TV coverage. It has given birth to the Free Software
Movement.
DSL: DSL stands for digital subscriber line. It uses ordinary telephone lines and a special modem
to provide an Internet connection that can transmit high-bandwidth information to a user's
computer. A DSL line can carry both data and voice signals. The data part of the line is a dedicated
connection to the Internet and does not interfere with use of the telephone. DSL is high speed and
is always connected to the Internet.
Cable Internet: Cable Internet uses your local cable TV line to receive broadband Internet
content. This data rate far exceeds that of modems and is about the same as DSL. Your local TV
cable company is typically the cable Internet service provider.
Dial-up access: This may be the best option if you are on a tight budget. Dial-up access uses a
modem and a telephone line to connect to the Internet. The drawbacks of using this option are
that data is typically transmitted at a slow rate and it blocks the telephone line.
Satellite Internet: If cable or DSL aren't available in your area, or if the slow dial-up access
speeds are not acceptable, consider using satellite internet. It's available to you if you live in the
Northern Hemisphere and have an unobstructed view of the southern sky. The service is expensive
and the data rate is not as fast as a direct line, but it is a good connectivity alternative if you live
in an isolated location.
Recipient's Address
The first thing you need to enter when composing an email is the recipient's address.
This is entered before you compose the body of the email. This field is usually found in one of the
spaces above the message. An example of an email address is: johndoe@email.com. When sending
a message to multiple recipients be sure to separate all addresses with a comma.
Cc and Bcc
Another option when sending a message to multiple recipients is to use the Cc, or carbon
copy, and Bcc, blind carbon copy fields. When using the Cc feature, all recipients can see the email
addresses of everyone the message was sent to. If you want your communication to be more
private, choose the Bcc and the identities of the other recipients will not be shown.
The date and time an email was sent is usually included automatically somewhere in the
message.
Subject Line
The subject line is the first part of your email that the recipient will see. When entering the
subject line be sure to include important information such as what the email is about. If you are
too vague or don't include any subject line at all, your message could be mistaken for spam and
deleted without ever being read.
Body
The body is where you actually write the message that you want sent. Your message can
be anything from a professional memo to a note to friend or family member. Try to avoid writing
too much in an email and keep it limited to one screen's length. If you have a lot of information
that needs to be sent include it as an attached file.
Attachments
Attachments are similar to enclosures in traditional mail. If you have files that you want to
share with your recipient's you can include them as attachments to the email. Use caution when
opening attachments sent to you as they can contain viruses, and never
INTERNET TERMINOLOGIES
1. Web Browser
Internet Explorer
Mozilla Firefox
Google Chrome
Opera
Safari
2. Web Pages
3. Hyperlink
5. Resource
The concept of resource is primitive in the Web architecture, and is used in the
definition of its fundamental elements
6. Website
Is a collection of related web pages, images, videos or other digital assets that
are hosted on one web server, usually accessible via the Internet.
7. URL
A web search engine is designed to search for information on the World Wide Web. The search
results are usually presented in a list of results and are commonly called hits. The information may
consist of web pages, images, information and other types of files. Some search engines also mine
data available in databases or open directories. Unlike Web directories, which are maintained by
human editors, search engines operate algorithmically or are a mixture of algorithmic and human
input.
GETTING STARTED
Screen Layout
Menus
When you begin to explore Word 2000, you will notice a significant
change in the menu structure if you are familiar with previous
versions of Word. The menus in Word 2000 display only the
commands you have recently used. To view all options in each
menu, you must click the double arrows at the bottom of the menu.
The images below show the Format menu collapsed (left) and
expanded (right) after the double arrows at the bottom of the menu
were clicked:
Shortcut Menus
These features allow you to access various Word commands faster than using the options on the menu
bar. View shortcut menus by right-clicking with the mouse. The options on this menu will vary depending
on the element that was right-clicked. For example, the shortcut menu below is produced by right-
clicking on a bulleted list.
Actions such as "Decrease Indent" and "Increase Indent" are only applicable to lists and therefore only
appear on the list shortcut menu. The shortcut menus are helpful because they only display the options
that can be applied to the item that was right-clicked and, therefore, prevent searching through the many
menu options.
Toolbars
Many toolbars displaying shortcut buttons are also available to make editing and formatting quicker and
easier. Select View|Toolbars from the menu bar to select the toolbars. The toolbars that are already
displayed on the screen are checked. Add a toolbar simply by clicking on the name.
Customizing Toolbars
There may be certain actions on a toolbar that you do not use and there may also be commands that you
execute often but that are not located on any toolbar. Word toolbars can be customized so these
commands can be added and deleted.
By highlighting the command categories in the Categories box, the choices will change in the
Commands box to the right.
Select the command you would like to add to the toolbar by selecting it in the Commands box.
Drag the command with the mouse to the desired location on the toolbar and release the mouse
button.
Remove a button from the toolbar by clicking and dragging the button off the toolbar.
There are several ways to create new documents, open existing documents, and save documents in
Word:
Each method will show the Open dialog box. Choose the file and click the Open button.
Save a Document
Renaming Documents
To rename a Word document while using the program, select File|Open and find the file you want to
rename. Right-click on the document name with the mouse and select Rename from the shortcut menu.
Type the new name for the file and press the ENTER key.
Working on Multiple Documents
Close a Document
Close the current document by selecting File|Close or click the Close icon if it's visible
on the Standard Toolbar.