The mid-80s marks a boom in the personal computer and super-minicomputer industries. The combination of inexpensive desktop machines and powerful, network-ready servers allows many companies to join the Internet for the first time. Corporations begin to use the Internet to communicate with each other and with their customers.
These new worries are dramatically demonstrated on Nov. 1, 1988 when a malicious program called the "Internet Worm" temporarily disables approximately 6,000 of the 60,000 Internet hosts.
At the University of Minnesota, a team led by computer programmer Mark MaCahill releases "gopher," the first point-and-click way of navigating the files of the Internet in 1991. Originally designed to ease campus communications, gopher is freely distributed on the Internet. MaCahill calls it "the first Internet application my mom can use." 1991 is also the year in which Tim Berners-Lee, working at CERN in Switzerland, posts the first computer code of the World Wide Web in a relatively innocuous newsgroup, "alt.hypertext." The ability to combine words, pictures, and sounds on Web pages excites many computer programmers who see the potential for publishing information on the Internet in a way that can be as easy as using a word processor.
Marc Andreesen and a group of student programmers at NCSA (the National Center for Supercomputing Applications located on the campus of University of Illinois at Urbana Champaign) will eventually develop a graphical browser for the World Wide Web called Mosaic.
As the Internet celebrates its 25th anniversary, the military strategies that influenced its birth become historical footnotes. Approximately 40 million people are connected to the Internet. More than $1 billion per year changes hands at Internet shopping malls, and Internet related companies like Netscape are the darlings of high-tech investors.
Users in almost 150 countries around the world are now connected to the Internet. The number of computer hosts approaches 10 million.
Within 30 years, the Internet has grown from a Cold War concept for controlling the tattered remains of a post-nuclear society to the Information Superhighway. Just as the railroads of the 19th century enabled the Machine Age, and revolutionized the society of the time, the Internet takes us into the Information Age, and profoundly affects the world in which we live.
The Age of the Internet has arrived.
Application
Network applications such as terminal emulation and file transfer. |
Presentation
Formatting of data and encryption |
Session
Establishment and maintenance of sessions |
Transport
Provision of reliable and unreliable end-to-end delivery |
Network
Packet delivery, including routing |
Data Link
Framing of units of information and error checking |
Physical
Transmission of bits on the physical hardware |
Applications SMTP, Telenet, FTP, Gopher, HTTP ... |
||
Transport | TCP / UDP | |
---|---|---|
Internetwork | IP | ICMP |
ARP/RARP | ||
Network Interface and Hardware Ethernet, TokenRing, FDI, X.25, Wirless, Async, ATM, SNA... |
Part of communicationg messages bewteen computers is a routing function
that ensures that messages will be correctly delivered to their
destination. IP provides this rotuing function. A message unit in an IP
network is called an IP datagram. Other internetwork protocols are:
icmp - internet control message protocol, arp - address resolution protocol, and
rarp - reverse address resolution protocol.
The Internet's standard for host names and a hierarchical system of domain name servers to resolve them into IP addresses (such as 199.12.1.1).
Replaces the hosts.txt file on individual machines that used to perform this function (and becomes difficult to administer when there are more than a few stations on a network).
Each name server has the IP address of a name server higher in the hierarchy to which it sends queries that it cannot resolve itself.
A full DNS name (for example) is zucchini.austin.cc.tx.us. zucchini is the name of our host in the subdomain, austin.cc.tx is the name of our network, all in the United States "top-level domain."
Some top-level domain names are listed in the following table.
Domain Name | User |
---|---|
arpa | ARPAnet |
com | Commercial organizations |
edu | Educational institutions |
gov | Government organizations |
mil | U.S.-based military |
net | Internet access providers |
org | Nonprofit organizations |
A recent change is top-level domain names are now often geographically related. ISO 3166 specifies the two-letter country codes to be used.
DNS is distributed in that name servers keep track of hosts that are below them in the hierarchy. Usually, each site has a name server for its local machines. The most popular implementation of DNS is the Berkeley Internet Name Daemon (bind), it is usually just another process on a UNIX host.
End-user stations have a name resolver that caches frequent DNS queries. Their name resolver configuration file has IP addresses of a few nearby name servers.
The process for registering for a (guaranteed worldwide unique and known) domain name (and IP address) involves filling out a form. Usually, your Internet service provider will do this for you, but you can do it yourself as well (though you need to know the address of your name server). Where the form comes from (and to whom you return it) depends on the type of name desired.
Determining the registered DNS name for an organization can be done by telnetting to the InterNIC (to rs.internic.net and running the whois command or to ds.internic.net and select the White Pages menu item) or, using WWW, use URL http://www.csi.nb.ca/domain (for the .ca domain).
Terminal emulation with communications to the host over a network (rather than through an EIA-232 connection).
The telnet protocol provides a standadized interface, through which a program on one host (The telnet client) can access the resources of another host (the telnet server) as though the client were a local terminal connected to the server.
That is, typing telnet servername connects you to the host servername. Your session then continues as if your terminal (likely actually a PC running a data communications program that makes your PC emulate a terminal) was directly connected to the remote host. You are prompted for a username and a password.
File Transfer Protocol.A client/server protocol for exchanging files with a host computer.
A simple file transfer protocol (a simplified version of ftp) that is often used to boot diskless workstations and other network devices (such as routers) over a network (typically a LAN).
Has no password security.
Remote shell protocol. Allows ruuning commands on a remote host.
The protocol used in TCP/IP networks for transferring electronic mail messages between end user computers and mail servers. Popular freeware SMTP mail programs for user workstations are Elm and Pine. Since mail messages cannot have control characters in them, binary files must first be converted into ASCII often using uuencode (usually a separate program; the corresponding program at the other end is then uudecode, which converts the file back to binary) or MIME. SMTP is used only when both the mail sender and receiver are ready at the same time. If (for example) the destination PC is not connected (it dials in periodically to an ISP), then a post office must be used to temporarily store the mail. A post office protocol (such as IMAP or POP) must then be used to retrieve the mail.
The older type of Internet mail server. Most new servers are IMAP. POP downloads all mail to a user as soon as the user connect to the mail server.
The newer type of Internet mail server. It allows connected stations to first view message headers and choose which, of the mail messages for them, they wish to receive. (The others remain stored on the mail server.) Can work with the older POP2 and POP3 mail servers, only offering the POP functionality (for example, you need to accept all mail messages once a connection is established to the mail server).
Line printer Daemon. Allows printing to printers connected via the network.
A method of mapping (technically called "mounting") shared remote disk drives so that they appear to be local. Developed and licensed by Sun Microsystems. Uses UDP, not TCP. Defined in RFC 1094.
The protocol used to carry WWW traffic between a WWW browser computer and the WWW server being accessed. The protocol is documented at http://www.w3.org.
Network News Transfer Protocol.Internet protocol for connecting to Usenet newsgroups and post messages.
A method of snooping through the Internet for files and retrieving them. Easier to use than the ftp utility (though gopher actually retrieves files using ftp), but not nearly as much fun, and not as powerful as the WWW. A series of menus (on destination machines) provide pointers to resources, which the gopher client software (running on your local machine) displays, or uses as a trigger to launch other applications, such as telnet or WAIS. Many WWW browsers can also be gopher clients (for example, enter gopher://internic.net/ into Netscape). The name comes from the system's function: to "go fer" things. Also, it was developed at the University of Minnesota, and its Twin Cities campus athletic teams are called the Gophers. The gopher FAQ is at ftp://rtfm.mit.edu/pub/usenet/news.answers/gopher-faq.
Defined in RFC 1!57, snmp executes network management applications that monitor and control the network.
The BOOTstrap protocol enables a client workstation to initialize with a minimal IP stack. This is useful for diskless clients.