因特网发展简史(英文版)
Internet的发展历史中英文

I n t e r n e t的发展历史中英文文件编码(TTU-UITID-GGBKT-POIU-WUUI-0089)THE HISTORY OF THE INTERNETThe Beginning - ARPAnetThe Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet had no idea of the possibilities of an "Internet."By definition, an 'Internet' is four or more computers connected by a network.ARPAnet achieved its network by using a protocol called TCP/IP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or aMacintosh.By the 80's ARPAnet, just years away from becoming the more well known Internet, had 200 computers. The Defense Department, satisfied with ARPAnets results, decided to fully adopt it into service, and connected many military computers and resources into the network. ARPAnet then had 562 computers on its network. By the year 1984, it had over 1000 computers on its network.In 1986 ARPAnet (supposedly) shut down, but only the organization shutdown, and the existing networks still existed between the more than 1000computers. It shut down due to a failied link up with NSF, who wanted toconnect its 5 countywide super computers into ARPAnet.With the funding of NSF, new high speed lines were successfully installedat line speeds of 56k (a normal modem nowadays) through telephone linesin 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were 290,000.Another network was built to support the incredible number of peoplejoining. It was constructed in 1992.Today - The InternetToday, the Internet has become one of the most important technological advancements in the history of humanity. Everyone wants to get 'on line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will have Internet access. The Internet has truly become a way of life in our time and era, and is evolving so quickly its hard to determinewhere it will go next, as computer and network technology improve every day.HOW IT WORKS:It's a standard thing. People using the Internet. Shopping, playing games,conversing in virtual Internet environments.The Internet is not a 'thing' itself. The Internet cannot just "crash." It functions the same way as the telephone system, only there is no Internet company that runs the Internet.The Internet is a collection of millioins of computers that are all connected to each other, or have the means to connect to each other. The Internet is just like an office network, only it has millions of computers connected to it.The main thing about how the Internet works is communication. How does a computer in Houston know how to access data on a computer in Tokyo to view a webpageInternet communication, communication among computers connected to the Internet, is based on a language. This language is called TCP/IP. TCP/IP establishes a language for a computer to access and transmit data over the Internet system.But TCP/IP assumes that there is a physical connecetion between one computer and another. This is not usually the case. There would have to be a network wire that went to every computer connected to the Internet, but that would make the Internet impossible to access.The physical connection that is requireed is established by way of modems,phonelines, and other modem cable connections (like cable modems or DSL). Modems on computers read and transmit data over established lines,which could be phonelines or data lines. The actual hard core connections are established among computers called routers.A router is a computer that serves as a traffic controller for information.To explain this better, let's look at how a standard computer might view a webpage.1. The user's computer dials into an Internet Service Provider (ISP). The ISP might in turn be connected to another ISP, or a straight connection into the Internet backbone.2. The user launches a web browser like Netscape or Internet Explorer and types in an internet location to go to.3. Here's where the tricky part comes in. First, the computer sends data about it's data request to a router. A router is a very high speed powerful computer running special software. The collection of routers in the world make what is called a "backbone," on which all the data on the Internet is transferred. The backbone presently operates at a speed of several gigabytes per-second. Such a speed compared to a normal modem is like comparing the heat of the sun to the heat of an ice-cube.Routers handle data that is going back and forth.A router puts small chunks of data into packages called packets, which function similarly to envelopes. So, when the request for the webpage goes through, it uses TCP/IP protocols to tell the router what to do with the data, where it's going, and overall where the user wants to go.4. The router sends these packets to other routers, eventually leading to the target computer. It's like whisper down the lane (only the information remains intact).5. When the information reaches the target web server, the webserver then begins to send the web page back. A webserver is the computer where the webpage is stored that is running a program that handles requests for the webpage and sends the webpage to whoever wants to see it.6. The webpage is put in packets, sent through routers, and arrive at the users computer where the user can view the webpage once it is assembled.The packets which contain the data also containspecial information that lets routers and other computers know how to reassemble the data in the right order.With millions of web pages, and millions of users, using the Internet is not always easy for a beginning user, especially for someone who is not entirely comfortale with using computers. Below you can find tips tricks and help on how to use main services of the Internet.Before you access webpages, you must have a web browser to actually be able to view the webpages. Most Internet Access Providers provide you with a web browser in the software they usually give to customers; you. The fact that you are viewing this page means that you have a web browser. The top two use browsers are Netscape Communicator and Microsoft Internet Explorer. Netscape can be found at and MSIE can be found atThe fact that you're reading this right now means that you have a web browser.Next you must be familiar with actually using webpages. A webpage is a collection of hyperlinks, images, text, forms, menus, and multimedia. To "navigate" a webpage, simply click the links it provides or follow it's own instructions (like if it has a form you need to use, it will probably instruct you how to use it). Basically, everything about a webpage is made to be self- explanetory. That is the nature of a webpage, to be easily navigatable."Oh no! a 404 error! 'Cannot find web page'" is a common remark made by new web-users.Sometimes websites have errors. But an error on a website is not the user's fault, of course.A 404 error means that the page you tried to go to does not exist. This could be because the site is still being constructed and the page hasn't been created yet, or because the site author made a typo in the page. There's nothing much to do about a 404 error except for e-mailing the site administrator (of the page you wanted to go to) an telling him/herabout the error.A Javascript error is the result of a programming error in the Javascript code of a website. Not all websites utilize Javascript, but many do. Javascript is different from Java, and most browsers now support Javascript. If you are using an old version of a web browser (Netscape for example), you might get Javascript errors because sites utilize Javascript versions that your browser does not support. So, you can try getting a newer version of your web browser.E-mail stands for Electronic Mail, and that's what it is. E-mail enables people to send letters, and even files and pictures to each other.To use e-mail, you must have an e-mail client, which is just like a personal post office, since it retrieves and stores e-mail.Secondly, you must have an e-mail account. Most Internet Service Providers provide free e-mail account(s) for free. Some services offer free e-mail,like Hotmail, and Geocities.After configuring your e-mail client with your POP3 and SMTP server address (your e-mail provider will give you that information), you are ready to receive mail.An attachment is a file sent in a letter. If someone sends you an attachment and you don't know who it is, don't run the file, ever. It could be a virus or some other kind of nasty programs. You can't get a virus just by reading e-mail, you'll have to physically execute some form of program for a virus to strike.A signature is a feature of many e-mail programs. A signature is added to the end of every e-mail you send out. You can put a text graphic, your business information, anything you want.Imagine that a computer on the Internet is an island in the sea. The sea is filled with millions of islands. This is the Internet. Imagine an island communicates with other island by sending ships toother islands and receiving ships. The island has ports to accept and send out ships.A computer on the Internet has access nodes called ports. A port is just a symbolic object that allows the computer to operate on a network (or the Internet). This method is similar to the island/ocean symbolism above.Telnet refers to accessing ports on a server directly with a text connection. Almost every kind of Internet function, like accessing web pages,"chatting," and e-mailing is done over a Telnet connection.Telnetting requires a Telnet client. A telnet program comes with the Windows system, so Windows users can access telnet by typing in "telnet" (without the "'s) in the run dialog. Linux has it built into the command line; telnet. A popular telnet program for Macintosh is NCSA telnet.Any server software (web page daemon, chat daemon) can be accessed via telnet, although theyare not usually meant to be accessed in such a manner. For instance, it is possible to connect directly to a mail server and check your mail by interfacing with the e-mail server software, but it's easier to use an e-mail client (of course).There are millions of WebPages that come from all over the world, yet how will you know what the address of a page you want isSearch engines save the day. A search engine is a very large website that allows you to search it's own database of websites. For instance, if you wanted to find a website on dogs, you'd search for "dog" or "dogs" or "dog information." Here are a few search-engines.1. Altavista - Web spider & Indexed2. Yahoo - Web spider & Indexed Collection3. Excite - Web spider & Indexed4. Lycos - Web spider & Indexed5. Metasearch - Multiple searchA web spider is a program used by search engines that goes from page to page, following any link it can possibly find. This means that a search engine can literally map out as much of the Internet as it's own time and speed allows for.An indexed collection uses hand-added links. For instance, on Yahoo's site. You can click on Computers & the Internet. Then you can click on Hardware. Then you can click on Modems, etc., and along the way through sections, there are sites available which relate to what section you're in.Metasearch searches many search engines at the same time, finding the top choices from about 10 search engines, making searching a lot more effective.Once you are able to use search engines, you can effectively find the pages you want.With the arrival of networking and multi usersystems, security has always been on the mind of system developers and system operators. Since the dawn of AT&T and its phone network, hackers have been known by many, hackers who find ways all the time of breaking into systems. It used to not be that big of a problem, since networking was limited to big corporate companies or government computers who could afford the necessary computer security.The biggest problem now-a-days is personal information. Why should you be careful while making purchases via a website Let's look at how the internet works, quickly.The user is transferring credit card information to a webpage. Looks safe, right Not necessarily. As the user submits the information, it is being streamed through a series of computers that make up the Internet backbone. The information is in little chunks, in packages called packets. Here's the problem: While the information is being transferred through this big backbone, what is preventing a "hacker" from intercepting this data stream at one ofthe backbone pointsBig-brother is not watching you if you access a web site, but users should be aware of potential threats while transmitting private information. There are methods of enforcing security, like password protection, an most importantly, encryption.Encryption means scrambling data into a code that can only be unscrambled on the "other end." Browser's like Netscape Communicator and Internet Explorer feature encryption support for making on-line transfers. Some encryptions work better than others. The most advanced encryption system is called DES (Data Encryption Standard), and it was adopted by the US Defense Department because it was deemed so difficult to 'crack' that they considered it a security risk if it would fall into another countries hands.A DES uses a single key of information to unlock an entire document. The problem is, there are 75 trillion possible keys to use, so it is a highlydifficult system to break. One document was cracked and decoded, but it was a combined effort of 14,000 computers networked over the Internet that took a while to do it, so most hackers don't have that many resources available.Internet的历史起源——ARPAnetInternet是被美国政府作为一项工程进行开发的。
因特网的发展史

The development of Internet historyARPAnet, the network in 1969 put into use. In 1968, ARPA ARPAnet network project . In 1972, ARPAnet at the first International Conference on computer background communication for the first time to meet with the public, and validated the feasibility of packet switching technology, the modern computer network, ARPAnet became the symbol of the birth of. In 1980, ARPA investment TCP / IP to UNIX ( BSD4.1 version ) of the kernel, in version BSD4.2, TCP / IP protocol that became UNIX operating system standard communication module. In 1982, Internet by ARPAnet, MILNET and several other computer network merger. In 1983, ARPAnet split into two parts: ARPAnet and pure military MILNET. In 1986, NSF established a six Super Computer Center, in order to make the country 's scientists, engineers were able to share these super computer facilities, NSF established its own based on TCP / IP protocols of computer network NSFnet. The success of the NSFnet in 1990 June completely replaced ARPAnet as a Internet trunk network.Internet Web is the fastest growing application, the user from less than 4000000 in 1994 to 10000000 in 1995. Web number of stations from 1995 to thirty thousand.因特网的发展史ARPAnet,该网于1969年投入使用。
中学英语作文因特网的历史(History of the Internet)

中学英语作文因特网的历史(History of theInternet)nowadays intemet is very popular all over the world, especially in some big cities. do you know when the intemet was first established? built in 1960s, the internet was a crude network of a few computers which shared information. if one of the computers broke down, the whole networks would be unable to work, causing continual problems.at first, just the government had access to the internet, using it for communications among different branches. however, by 1970s the internet had been used in universities, banks, and hospitals. at the beginning of 1990s computers became affordable for common people and this affordability increased the use of the internet by people,it is said that each day tens of millions of people log off, making it the most important part of peoples life.internet was first established in 1960s. at that time, the computer was both large and expensive and the networks were unable to work well. if one of the computers broke down, the whole networks would be unable to work.at first, the intemet was just used by the government. by1970s, it had been used in universities, banks and hospitals. at the beginning of 1990s,computers became both cheaper and easier to operate. now it is very convenient to log on the intemet.it is said that each day tens of millions of people log on the internet. sending e-mails is becoming more and more popular.the intemet has become the most important part of peoples life.。
网络发展简史英文作文

网络发展简史英文作文英文:The development of the internet has been a rapid and transformative process over the past few decades. It has changed the way we communicate, work, and access information. The history of the internet can be traced back to the 1960s, when the US Department of Defense developed ARPANET, a network that connected computers at universities and research institutions. This was the precursor to the internet as we know it today.In the 1980s, the World Wide Web was created by Tim Berners-Lee, a British computer scientist. This allowed for the creation of websites and the sharing of information on a global scale. The 1990s saw the rise of commercial internet service providers, which made the internet more accessible to the general public. This led to the dot-com boom, where many companies sought to capitalize on the potential of the internet.The 2000s brought about the rise of social media, which allowed for greater connectivity and communication between individuals. Platforms such as Facebook, Twitter, and Instagram have become integral parts of many people's daily lives. The proliferation of smartphones and mobile devices has also made the internet more accessible than ever before.Today, the internet continues to evolve and change at a rapid pace. The rise of artificial intelligence, blockchain technology, and the Internet of Things are just a few examples of how the internet is shaping our world. It is hard to imagine a world without the internet, and it willbe interesting to see how it continues to shape our livesin the future.中文:互联网的发展是一个快速而深刻的过程,过去几十年中它已经改变了我们的交流、工作和获取信息的方式。
因特网发明作文英语

因特网发明作文英语The Invention of the Internet。
The invention of the Internet has revolutionized theway we live, work, and communicate. It has become an essential part of our daily lives, connecting people fromall corners of the world and providing access to an unimaginable amount of information. This essay will explore the history of the Internet, its impact on society, and its potential for the future.The Internet, as we know it today, was not created overnight. Its origins can be traced back to the 1960s when the United States Department of Defense initiated a project called ARPANET. This project aimed to create adecentralized network that could withstand a nuclear attack. The first message was sent over ARPANET in 1969, markingthe birth of the Internet.Initially, the Internet was used primarily byscientists, researchers, and the military. However, it quickly expanded to include educational institutions and eventually reached the general public in the early 1990s. This expansion was driven by the development of the World Wide Web, which made it easier to navigate and access information on the Internet.The impact of the Internet on society has been immense. It has transformed the way we communicate, conduct business, and access information. Communication has become instantaneous and global, with email, instant messaging,and social media platforms connecting people across the world. Businesses have also benefited from the Internet, as it has opened up new markets and allowed for more efficient operations.One of the most significant impacts of the Internet is its role in democratizing information. Prior to its invention, access to information was limited to those who had the means to visit libraries or purchase books. Withthe Internet, anyone with an internet connection can access a vast amount of information on any topic imaginable. Thishas empowered individuals and allowed for the spread of knowledge and ideas on a global scale.However, the Internet also brings with it challenges and concerns. The rise of fake news, cyberbullying, and privacy breaches are just a few examples of the negative aspects associated with the Internet. It is crucial for individuals, governments, and organizations to address these issues and work towards creating a safer and more responsible online environment.Looking towards the future, the Internet has the potential to continue shaping our lives in ways we can't even imagine. The Internet of Things (IoT) is a conceptthat envisions a world where everyday objects are connected to the Internet, allowing for greater automation and efficiency. This could lead to advancements in areas such as healthcare, transportation, and energy management.In conclusion, the invention of the Internet has had a profound impact on society. It has transformed the way we communicate, access information, and conduct business.While it has brought about many positive changes, it also comes with challenges that need to be addressed. As we move forward, it is important to harness the potential of the Internet while ensuring its responsible and ethical use.。
互联网的历史英语作文

互联网的历史英语作文The History of the InternetThe history of the Internet is a fascinating journey that dates back to the late 1960s. It began as a small-scale experiment conducted by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense, with the goal of creating a decentralized network that could withstand failures and continue operating. This early network, known as ARPANET, laid the foundation for the modern Internet.In the 1970s, the development of TCP/IP, a set of communication protocols, enabled different networks to communicate with each other, greatly expanding the reach of the Internet. This standardization process was crucial for the Internet's growth and eventual worldwide adoption.The 1980s saw the emergence of personal computers and the growth of the World Wide Web, which made the Internet accessible to a wider audience. Tim Berners-Lee, a British scientist, invented the concept of the Web and developed the first web browser and web server. This made it possible for anyone with a computer and an Internet connection to access and share information globally. The 1990s marked the beginning of the commercialization of the Internet. As more and more businesses and individuals began to use the Internet, it grew exponentially in size and complexity. The dot-com bubble of the late 1990s, though a period of significant turbulence, also highlighted the potential of the Internet as a platform for economic growth and innovation.The 2000s saw the rise of social media and the further integration of the Internet into people's daily lives. Platforms like Facebook, Twitter, and Instagram changed the way people communicate and consume information. The advent of smartphones and mobile internet also made the Internet more accessible and convenient for users around the world.Today, the Internet has become an essential part of modern life, connecting billions of people and enabling unprecedented levels of communication, collaboration, and innovation. As technology continues to advance, the Internet will likely evolve in new and exciting ways, further shaping our world and the way we live in it.。
英语科普文选:互联网发展简史_0

英语科普文选:互联网发展简史ARPANET started by the US Dept. of Defense for research.It is the original basis for what now forms the Internet.It was opened to non-military users later in the 1970s.The first international connections to ARPANET are established.The TCP/IP Protocol established,and the "Internet" is formed as a connected set of networks using TCP/IP.DNS(Domain Name Server) introduced to the Internet, with then consisted of about 1000 hosts.World Wide Web,invented by Tim Berners-Lee who saw the need for a global information exhcange that would allow physicists to collaborate on research.The Web started as a text-only interface,but NCSA Mosaic later presented a graphical interface for it.Web traffic over the Internet increased by 300,000%.Netscape 1.0 was written as an alternative browser to NCSA Mosaic.December JavaScript development announced by Netscape.Now Internet is still developing faster and faster...美国国防部建立了阿帕网,作研究用。
中国互联网的发展英文版

移动互联网网民规模, 2008, 1.18
移动互联网网民规模, 2007, 0.50
PC互联网网民规模(亿人)
移动互联网网民规模 (亿人)
China is accelerating into the online shopping country
2T00h7-e201s4c年a中l、e美o、f日o三n国l网in络e购物sh交o易p规p模ing
◆ 2002 The second quarter, Sohu the first to announce earnings, announced that the Internet spring has arrived。
Chinese Internet listed company(上市公司)
1999-2000
中国网络日购本物网规络模购(物亿规模元()亿, 2012e, 8648.5 日本网络元购)物, 规20模1元1(e),亿,72203101.0e, 7626.6 日本网络中购国物网规络模购元(物)亿规, 2模01(0亿e, 6542.1 日本网络购物规日模本(网亿络购物规模元()亿, 2元00)9,, 25021302e.1, 4755.0 元), 2007, 329元2.5),中20国0网8, 络38购67物.3规模(亿 中国网络购物规模元()亿, 2009, 2630.0 中国网络购物规元模)(, 2亿008, 1281.8 元), 2007, 561.0
The development of china’s internet(发展历程)
◆ 1987 Peking University(PKU) send the first e-mail to Germany。 ◆ 1989 China began the internet construction of five-year goal。 ◆ 1991 the United States proposed China into co-plan network。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
T. Tronco (Ed.): New Network Architectures, SCI 297, pp. 1–11. © Springer-Verlag Berlin Heidelberg 2010 A Brief History of the InternetTania Regina TroncoCPqD Foundation, Rodovia Campinas Mogi-Mirim, km 118,5,Campinas – São Paulo, CEP 13096-902, Brazil tania@.brAbstract. This chapter introduces a brief history review of Internet with focus on its original conception. It’s important to remember such initial ideas because they were the basis of Internet architecture, they are still at the core of today’s Internet and they can be helpful to rethink new design requirements nowadays. Hence, we start by the initial packet-based network protocols and their evolution to TCP/IP. 1 IntroductionThe Internet architecture concept was conceived at the end of the 60´s by ARPA (Advanced Research Projects Agency) during the Cold War, when the United States and Soviet Union were preparing for an eventual military confrontation. At that time, the U.S. military created an underground network of cables and equip-ments intended to survive a nuclear attack. This network was named ARPANET and its design consisted of a number of requirements such as:•Data should be moved through leased lines to avoid problems with in-terruptions of the telephone system; •The information to be transmitted should be broken into segments of fixed length (packets) instead of being a continuous stream and •The network should be totally decentralized, without a single node in the control of the network, yielding reliability and robustness.ARPANET was opened to universities after the end of arms race and a key re-quirement was added to the network project:•Communication between computers, called hosts, should be done through devices called Interface Message Processor (IMP), as shown in Fig. 1.The IMP function was to receive messages from a host and break them in packets. These packets should pass from IMP to IMP through the network until the destina-tion IMP, which should pass them to the destination host.The network consisted of the interconnection of these IMPs through the leased lines supplied by telephonic companies. The first IMP was built by the companyTronco2 T.R.Fig. 1 A Typical Section of ARPANET (adapted from [1])BBN (Bolt Beraneck and Newman) from Cambridge in 1976. The report No. 1822of BBN [2] contains the specifications for the interconnection of a host and anIMP. According to this report, for each regular message, the host specified a desti-nation, composed of three parameters: IMP, host and handling type. These pa-rameters specified uniquely a connection between source and destination host. Thehandling type was used to specify characteristics of the connection, such as prior-ity or non-priority of transmission. The messages should be sent to the destinationin the same order that were transmitted by the source and, for each regular mes-sage, the host also specified a 12 bit identifier to be used with the destination ofthe message, forming a message-id, in order to retransmit them in case of thenetwork failure.The first IMP was installed at University of California (UCLA), in Los Ange-les, followed by SRI (Stanford Research Institute), University of California inSanta Barbara and University of Utah, 4 points in total. The first ARPANETtransmission was made between UCLA and SRI in Mento Park, California in1969. In the same year, the first RFC (Request for Comments) was published;RFC3 defined the RFC series for ARPANET and later, the Internet.2 Decade of the 70´sAfter installing some IMPs in a network, the objective of DARPA was to stan-dardize the ARPANET network interface to allow more DARPA sites to join theA Brief History of the Internet 3 network. To achieve this, the first standard networking protocol was developed in December 1970, namely Network Control Protocol (NCP) [4].2.1 Network Control Protocol OperationThe NCP operation consisted of store-and-forward messages from a sending host to a receiving host. After a host sent a message, it was prohibited from sending another message until receives a RFMN (Request-for-Next-Message). This se-quence of requests made a connection. A connection linked two processes be-tween a sending and a receiving host.The primary function of the NCP was to establish connections and release con-nections. In order to send control commands to establish and release connections between the hosts, one particular link, designated as the control link, was estab-lished between each pair of host.Each host had its internal naming scheme, often incompatible with other hosts. Then, an intermediate name space, named socket, was created in NCP to prevent using this internal name scheme. Each host was responsible for mapping its inner process identifiers into sockets as shown in shown in Fig. 2.Fig. 2 A Typical Socket (adapted from [4])A socket specifies one connection endpoint and is determined by three numbers:• A user number (24 bits) composed by:o 8-bit for home host number,o16 bits to identify him at that host.• A host number (8 bits)•An AEN (Another Eight-bit Number) composed by:o 1 bit that indicate a receive host (=0) or a send host (=1);o7 bits – that provide a population of 128 sockets for each used number at each host.When a user tried to log into a host, her user number was used to tag all the proc-esses created in that host, producing a sort of virtual network.4 T.R.TroncoBy the end of 1971, there were fifteen sites attached into ARPANET usingNCP [10] as follows:•Bolt Baranek and Newman (BBN)•Carnegie Mellon University•Case Western Reserve University•Harvard University•Lincoln Laboratories•Massachusetts Institute of Technology (MIT)•NASA at AMES•RAND Corporation•Stanford Research Institute (SRI)•Stanford University•System Development Corporation•University of California at Los Angeles (UCLA)•University of California of Santa Barbara•University of Illinois at Urbana•University of UTAHAt this time, BBN also developed an electronic mail program for ARPANET thatquickly became the most popular application on the ARPANET [11]. The e-mailprogram specified the destination address as username@hostname, where user-name was the same used to login in the host.At the end of the seventies, there were about 200 hosts connected to ARPA-NET [11]. The NCP was becoming inefficient to connect different packet switch-ing networks because individual networks could differ in their implementationslike the heterogeneous addressing schemes, the different maximum size for thedata, the different time delays for accepting, delivering, and transporting data andso on. In May 1974, Robert Kahn and Vinton Cerf published a paper entitled “AProtocol for Packet Network Intercommunication” on IEEE Transaction on Com-munication [3], proposing a new protocol to support the sharing resources betweendifferent packet switching networks. This protocol was named TCP (TransmissionControl Protocol).According to [3], for both economic and technical considerations, it was con-venient that all the differences between networks could be resolved by simple andreliable interface. This interconnection should also preserve intact the internal op-eration of each individual network. This interface was named Gateway.Fig. 3 illustrates two network interconnected by one gateways.The gateway was divided into two parts; each one associated with its own net-work and its function was understand the source and destination host addressesand insert this information in a standard format in every packet. For this operation,an internetwork header was added to the local header of the packet by the sourcehost, as illustrated in Fig. 4.A Brief History of the Internet 5Fig. 3 Internetworking by Gateway (adapted from [3])Fig. 4 Internetwork Header (adapted from [3])The internetwork header contained the standardized source and destination ad-dresses. The next two fields in the header provided a sequence number and a byte count used to properly sequence the packets upon delivery to the destination and also enabling the gateways to detect fault conditions. The flag field was used to The gateway does not modify the information, only forwarded the header check sum along the path.2.2 TCPThe TCP protocol specified by Cerf and Kahn [3] had the function of promoting the transmission and acceptance of messages of processes that wanted to commu-nicate. To implement this function, TCP first broke the process messages into segments according to a maximum transmission size. This action was called frag-mentation and was done in such a way that the destination process was able to re-assemble the fragmented segments. On the transmission side, the TCP multiplexed together segments from different processes and produced packets for delivery to the packet switches. On the reception side, the TCP accepted the packets sequence from the packet switches, demultiplexed and reassembled the segments to the des-tination processes.This system introduced the notion of ports and TCP address. A port was used to designate a message stream associated with a process. A TCP address was used to routing and delivery packets from diverse processes to the suitable destination host. The original TCP address format is shown in Fig. 5.6 T.R.TroncoFig. 5 TCP Address Format (adapted from [3])The use of 8 bits for network identification (ID) allowed up to 256 distinct net-works. At that time, this address field seemed enough for the future. The TCPidentifier field permitted up to 65 536 distinct TCP be addressed. As each packetpassed through the gateway, it observed the destination network ID to determinethe packet route. If the destination network was connected to the gateway, thelower 16 bits of the TCP address were used to produce a local TCP address in thedestination network. On the other hand, if the destination network was not con-nected to the gateway, the upper 8 bits was used to select the next gateway.In order to send a TCP message, a process settled the information to be trans-mitted in its own address space, inserted network/host/port addresses of the trans-mitter and receiver in a transmit control block (TCB), and transmitted it. At thereceiving side, the TCP examined the source and destination port addresses anddecided whether accepted or reject the request. If the request was rejected, it mere-ly transmitted a release indicating that the destination port address was unknownor inaccessible. On the other hand, if the request was accepted, the sending and re-ceiving ports were associated and the connection was established. After it, TCPstarted the transmission of the packets and waited for the acknowledgements car-ried in the reverse direction of the communication. If no acknowledgement for aparticular packet was received, the TCP retransmitted the packet.Aftertime, a window strategy to flow control of sent and received packets alsowas proposed by Cerf and Kahn [3], as shown in Fig. 6.Fig. 6 Window Strategy (adapted from [3])Supposing that the sequence number field in the internetwork header permitspacket sequence numbers to range from 0 to n – 1, the sender could not transmitmore than w bytes without receiving an acknowledgment. The w bytes werenamed a window (see Fig. 6). On timeout, the sender retransmits the unacknow-ledged bytes. Once acknowledgment was received, the sender’s left window edgeadvanced over the acknowledged.A Brief History of the Internet 7After the development of fundamental characteristics of TCP, the next chal-lenge of DARPA was running TCP on multiple hardware platforms and making experiments to determine optimal parameters for the protocol. In 1977, the ARPA research program included important players in this development such as: BBN, DCEC, ISI, MIT, SRI, UCLA and some prototypes of TCP/IP were implemented.2.3 EthernetAt the same time, the development of the first concepts of new computer network-ing technology for local area networks (LANs) named Ethernet. This technology technologies.The Ethernet idea began on May 22, 1973, when Bob Metcalfe (then at the Xe-rox Palo Alto Research Center, PARC, in California) wrote a memo describing the Ethernet network system he had invented for interconnecting advanced computer workstations, making it possible to send data to one another and to high-speed la-ser printers (see Fig. 7). The seminal article: "Ethernet: Distributed Packet Switch-ing for Local Computer Networks" was published by Robert M. Metcalfe and David R. Boggs in [6].Robert Metcalfe got the idea for the Ethernet protocol when he read a 1970 computer conference paper by Norman Abramson of the University of Hawaii about the packet radio system called ALOHANET linking the Hawaiian Islands. At the end of 1972, the ALOHANET was connected to ARPANET by satellite given a pass to the development of the Internet.Each node in ALOHANET sent out its messages in streams of separate packets of information. If it did not get an acknowledgment back for some packets becauseFig. 7 Robert Metcalfe picture and his famous Ethernet first drawing(adapted from [4])8 T.R.Troncotwo radios were broadcasting at the same time, then the missing packets were con-sidered “lost in the ether”. The word ether was used to denote the propagationmedium that could be used by any type of machine, in analogy to the materialbelieved by the physicists to fill in the free space enabling the electromagneticpropagation.When a packet was lost in the ether, the node would re-broadcast them afterwaiting a random interval of time. Because of this randomness, problems with col-lisions were quickly resolved except under very high traffic loads. On average, thenetwork rarely had to retry more than once or twice to get all the packets to thedestination, which was more efficient than trying to implement a complex coordi-nation system to prevent collisions in the first place. The original 10 Mbps Ether-net standard was first published in the next decade by the DEC-Intel-Xerox (DIX)vendor consortium.3 Decade of the 80´sAfter testing three increasingly better versions: TCPv1, TCPv2, a split into TCPv3and IPv3, finally in 1981, TCP (Transmission Control protocol) v4 and IP (Inter-net Protocol) v4, posted in RFC 791 [7] and RFC 793 [9], respectively, becamestable. This version is still in use on the Internet today.In 1982, an Internet Gateway, to route internet packets based on TCPv4/IPv4,developed by BBN, was standardized in RFC 823 [5]. TCPv4/IPv4 became a stan-dard for DARPA and, in January, 1983, the ARPANET protocol switched fromNCP to TCP/IP. This date is considered the date of the birth of the Internet [11]. In1985, Dan Lynch and the IAB (Internet Architecture Board) realized a workshopfor the computer industry to become TCP/IP a commercial standard and promotethe development of networking products.3.1 Internet ProtocolThe IPv4 implements two basic functions: fragmentation and addressing. Frag-packet" networks.The addressing is used to forward Internet packets toward their destinations.The Internet protocol treats each Internet packet as an independent entity. Thereare no connections or logical circuit establishment. So, the Internet protocol doesnot provide a reliable communication facility, only hop-by-hop forwarding ofpackets. There is no error control for the information, only a header checksum anderrors detected in the header are reported via the Internet Control Message Proto-col (ICMP) [8].The Internet transmission occurs when an application program via transportprotocols sends a request on its local router (gateway) to send data as a packetthought the Internet (see Fig. 8). The Internet router prepares the packet headerand attaches it to the data. The router determines a local network address andsends the packet to the local network interface. The local network interface createsA Brief History of the Internet 9 a local network header, attaches it to the packet and sends it to the local network. The packet is forward hop-by-hop through the network until the local network where the destination host is located. At each hop, the router examines the header and determines the next hop based on the destination address. At the destination router, the packet is sent to the destination host, via transport protocol socket to the application.Fig. 8 Internet Forwarding Packets (adapted from [3])3.2 Ethernet ProtocolThe first Ethernet standard was entitled “The Ethernet, A Local Area Network: Data Link Layer and Physical Layer Specifications” and was published in 1980 by the DIX vendor consortium. It contained the specifications of both the operation of Ethernet and the single media system based on thick coaxial cable.Ethernet is by definition a broadcast protocol where any signal can be received by all hosts. The packets from the network layer are transmitted over an Ethernet by encapsulating them in a frame format as shown in Fig. 9.Fig. 9 Ethernet FrameThe fields of this frame are described as follow:Preamble: is a sequence of 8 bytes, each set to “10101010” and used to syn-chronize receiver before actual data is sent;Addresses•48-bit unicast address assigned to each adapter, named MAC (Me-dium Access Control) Address•Broadcast address: all bits set to 1•Multicast: first bit is set to 1Type field: is used to determine which higher level protocol the frame should be delivered toBody: contains up to 1500 bytes of data10 T.R.TroncoWhen the Ethernet standard was published, a new effort led by the Institute ofElectrical and Electronics Engineers (IEEE) to develop open network standardswas also getting underway. The IEEE standard was created under the direction ofthe IEEE Local and Metropolitan Networks (LAN/MAN) Standards Committee,which identifies all the standards it develops with the number 802. There have beena number of networking standards published in the 802 branch of the IEEE, includ-ing the 802.3 Ethernet and 802.5 Token Ring standards. The IEEE 802.3 committeetook up the network system described in the original DIX standard and used it asthe basis for an IEEE standard. The IEEE standard was first published in 1985 withthe title IEEE 802.3 Carrier Sense Multiple Access with Collision Detection(CSMA/CD). Ethernet uses CSMA/CD to listen the line before sending data:•If the line is idle (no carrier sensed), it sends packet immediately;•If line is busy (carrier sensed), it wait until idle and transmit packetimmediately;•If collision is detected, it stops sending and try again later.After the publication of the original IEEE 802.3 standard for thick Ethernet, thenext development in Ethernet media was the thin coaxial Ethernet variety, inspiredby technology first marketed by the 3Com Corporation. When the IEEE 802.3committee standardized the thin Ethernet technology, they gave it the shorthandidentifier of 10BASE2. Following the development of thin coaxial Ethernet cameseveral new media varieties, including the twisted-pair and fiber optic varieties forthe 10 Mbps system. Next, the 100 Mbps Fast Ethernet system was developed,which also included several varieties of twisted-pair and fiber optic media sys-tems. Most recently, the Gigabit Ethernet and 10 Gigabit Ethernet systems weredeveloped and 100 Gigabit Ethernet is in development. These systems were alldeveloped as supplements to the IEEE Ethernet standard.3.3 Evolution of InternetIn 1985, the National Science Foundation (NSF) launched a network to connectacademic researchers to supercomputer centers to provide very high-speed com-puting resources for the research community. This network was named NSFNETand one of its project design premises was to use ARPANET's TCP/IP protocol. In1986, the NSFNET was connected to ARPANET and these backbones formingwhat today is known as Internet. At the end of this decade, NSFNET became defacto the backbone of the Internet and the ARPANET was ended (Stewart 2000).Also in this period, the World Wide Web (WWW) system was created by TimBerners-Lee [1] to run in the Internet and provide graphical user interfaces andhypertext links between different addresses.In 1991, the Internet became commercially exploited and new backbones werebuilt to offer services of communications. This fact became Internet completelydecentralized, without a central coordination, difficult architectural changes. In1995, the NSFNET was officially dissolved, although, retained a core researchA Brief History of the Internet 11 network called the Very High Speed Backbone Network Service (vBNS), which formed the basis for the Internet2 project [10].Since 1995, the Internet continues growing; more and more people use it to be connected, find information, create business, and share information. The Internet is now an essential part of our lives.References1.Berners-Lee: Information Management: A Proposal, CERN (1989),/History/1989/proposal.html(accessed March 2010)2.Bolt, Beranek, Newman: Report No. 1822: Specification for the Interconnection of ahost and an IMP (1976)3.Cerf, V., Kahn, R.: A Protocol for Packet Network Intercommunication. IEEE Trans-actions on Communication 22(5) (1974)4.Cocker, S., Carr, S., Cerf, V.: RFC 33 New Host-Host Protocol (1970)5.Hinden, R., Shelzer, A.: RFC 823 DARPA Internet gateway (1982)6.Metcalfe, R., Boggs, D.: Ethernet: Distributed Packet Switching for Local ComputerNetworks. Communications of the ACM 19(5), 395–404 (1976),/classics/apr96/ (accessed March 2010)7.Postel, J.: RFC 791 Internet Protocol (1981)8.Postel, J.: RFC 792 Internet Control Message Protocol (1981)9.Postel, J.: RFC 793 Transmission Control Protocol (1981)10.Stewart, B.: Living Internet (2000),/i/i.htm11.Wladrop, M.: Darpa and the Internet Revolution. DARPA 78-85 (2008),/Docs/Internet_Development_200807180909255.pdf (accessed March 2010)。