The Beginnings of Packet Switching: Some Underlying Concepts

Total Page:16

File Type:pdf, Size:1020Kb

The Beginnings of Packet Switching: Some Underlying Concepts THE INTERNET: PAST, PRESENT, AND FUTURE The Beginnings of Packet Switching: Some Underlying Concepts Paul Baran, Com21, Inc. ABSTRACT volume to the matter of history and alternative approaches considered [3], which I recommend This article was written for a seminar held on to the serious reader to understand where this the occasion of the Franklin Institute’s 2001 work stood in relation to other work at the time. Bower Award and Prize for the Achievement in This activity was undertaken in 1960 at the Science to the author “for his seminal invention RAND Corporation. RAND was established by of packet switching — the foundation of modern the U.S. Air Force to preserve the operations communications networks and, in particular the research capability created by the Air Force in Internet.” World War II, and to work on issues of national It describes the author’s work 40 years ago security. The freedom of the staff to choose pro- focusing on the rationale creating the key con- jects, try novel approaches, and disagree with the cepts of packet switching. The article considers bureaucracy along the way is difficult to imagine the development of each of a series of about 20 in the present environment. Today, proposals essential concepts. For example, it examines must be written, projects excessively monitored, such subjects as the degree of redundancy to and reports prepared whether or not there is achieve any desired level of survivability; the anything worthwhile to report.1 It was a different necessity to chop data streams into small blocks; era then, and the remarkable degree of freedom what information had to be appended to these I enjoyed that encouraged farout, and sometimes blocks to allow the each block to find its own wild, thinking would be hard to duplicate today. way through the network; why it was necessary for each network element to operate at an inde- COLD WAR BACKGROUND pendent data rate; why all signals had to be con- verted to digital, and so on. When I joined RAND in 1959, a glaring weak In brief it describes the “why” as well as the spot in our strategic forces command and control “how” of packet switching works. communications was a dependence on shortwave radio and the national telephone system, AT&T, INTRODUCTION both highly vulnerable to attack. H-bomb testing in the Pacific revealed that long distance short- This article is a nostalgic trip, revisiting work I wave (high-frequency) sky-wave transmission did 40 years ago. It describes why packet switch- would be disrupted for several hours by a high- ing was invented, how it works, and why it seems altitude nuclear blast. Computer simulations to work so well. A personal recollection such as showed that weapons targeted at U.S. retaliatory this tends to overemphasize the importance of forces would render long distance telephone one’s own work. Throughout the design process, communications service inoperative by collateral I borrowed freely using whatever technology best damage alone. While most of the telephone fit the objective. I mention this to avoid any facilities would survive, the paucity of switching 1 I am particularly indebt- inadvertent impression that all the ideas to be centers formed a dangerous Achilles’ heel. ed to Frank Colbohm, described are totally original. Furthermore, my To cool tensions at this stage of the cold war, John D. Williams, Frank work focuses on basic concepts, not implementa- a retaliatory force capability was needed that Eldridge, Albert Wohlstet- tion — which was done by others. could withstand a surprise attack, and survive ter, Paul Armer, Willis To keep matters in context it is desirable to sufficiently to return the favor in kind in a con- Ware and Keith Uncapher describe where this work stood relative to the trolled manner. A survivable command and con- among others at RAND state of the art at the time it took place. In 1964 trol communications infrastructure would be for continuing strong sup- I wrote a highly detailed set of memoranda that mandatory to get away from the guns loaded, port while undertaking describe this work down to the circuit level [1]. hair trigger doctrine of the time. my highly controversial These memoranda are on the Internet and read- RAND computer simulations showed that the activity. ily available to the reader [2]. I devoted an entire telephone system would fail, while most telephone 42 0163-6804/02/$17.00 © 2002 IEEE IEEE Communications Magazine • July 2002 facilities survived. I believed that the problem was obviously in the topology of our communications networks, and there might be a solution. (I had worked on the subject of survivable networks while at Hughes Aircraft before coming to RAND, so I was not new to the subject.) WHY NETWORKS ARE VULNERABLE Let’s consider three different communications network topologies in Fig. 1. (a) The centralized network has all its nodes connected to a central switching node to allow simple switching, giving it a single point of high vulnerability. (b) The decentralized network, representative Link of the AT&T Long Lines network at the time, is better. Instead of a single central switching node, Station the network comprises small centralized clusters, (a) (b) (c) with most traffic going to nearby neighbors, and only the longer distance traffic routed to the I Figure 1. Three forms of networks: a) centralized; b) decentralized; c) dis- longer links. tributed. (c) The distributed network is a network with- out any hierarchical structure; thus, there is no single point of vulnerability to bring down much THE BROADCAST STATION of the network. DISTRIBUTED NETWORK Shortly after I arrived at RAND I began to 2 The optimum degree of study the behavior of distributed networks with My first RAND distributed network proposal in redundancy is a function different levels of redundant connections. 1960 was for a survivable teletypewriter network of the sum of the loss of In Fig. 2, we see a network with its nodes tied to carry what was then called “minimum essen- capacity by component together with the minimum possible number of tial communications.” Carrying briefing charts reliability failures plus the links. This is called a network of redundancy and slides3 around to the Pentagon and various damage anticipated. It level 1. A network of redundancy level 2 looks military command centers, I found the term was doesn’t make much differ- like a fishnet, with horizontal and vertical links. unrealistic. Far, far more capacity was needed ence if the damage is due When we reached redundancy levels on the than was previously realized. So I went back to to an attack or compo- order of 3 an interesting phenomenon occurred: the drawing board and took on the challenge to nent reliability. Thus, it the network became extremely robust. If a node come up with a scalable communications switch- would be possible to build survived physical damage, it would likely be con- ing structure capable of dynamically routing highly reliable networks nected to all other surviving nodes in the largest high-bit-rate traffic among a large set of poten- out of unreliable links and single group of surviving nodes. This meant that tial users, and where user requirements could nodes able to withstand it would be theoretically possible to build extremely not be predicted in advance. high levels of damage at a reliable communication networks out of unreliable (Meanwhile, the broadcast teletypewriter redundancy level of about links, by the proper use of redundancy.2 In other concept crept slowly through the Air Force pro- 3. Even a redundancy words, if a redundantly connected node survived cess and was eventually assigned to the Rome level of 1.5 would more the physical attack, there is a high probability Air Development Center in upper New York than suffice for a network that this node, at least on paper, was somehow State for implementation. An experimental net- where no enemy attack is connected to all the other surviving nodes. work was built to cover the northeast section of anticipated, just compo- “Somehow” was the issue, and was the motiva- the US. Its only stress test was the massive nent reliability. tion for packet switching. Northeast power blackout in 1965 when it was said to have worked well.)4 [4, 5] 3 The majority of the illus- STATE OF THE ART, 1960–1964 trations in this article were NETWORK SYNCHRONIZATION originally projected using In those days (around 1960) we didn’t know how glass lantern slides, to build communication switches where signals My interest was now focused on creating a new, reminding me how much could traverse many serially connected nodes very high-data-rate (in 1960s terms) network. I technology has changed in and operate reliably in the face of damage. The was able to start the design with a clean sheet of 40 years. AT&T telephone system had a limit of five paper rather than fighting all the constraints of switched tandem links before a phone call was our then networks. For example, since the data 4 Extensive testing has unacceptable. flow in the network had to traverse many tandem taken place in the past on A new way was needed to get usable signals nodes, I felt it would be impossible to synchronize the simultaneous trans- through a large number of nodes, traveling via all individual links in tandem to operate at the mission of a commercial highly circuitous paths that could not be deter- exact same data rate. Instead I proposed small broadcast and submodu- mined in advance. The new network would have computer-based switching nodes, to provide a lated teletyped signal.
Recommended publications
  • Internet Protocol Design 12 Networking Truths
    HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Internet Design Principles Protocol Design © 2009 Jörg Ott & Carsten Bormann 1 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Origin of Packet Switching Concepts show up in the early 1960s Devised by multiple, largely independent groups Paul Baran, Leonard Kleinrock, Donald Davies, Roger Scantlebury ARPANET Development sponsored by DARPA Motivated by considerations of fail-safe networks Applications shall not depend on individual elements in the networks Clearly based on quite some military thinking in general But: NOT a particular response to a Soviet nuclear threat © 2009 Jörg Ott & Carsten Bormann 2 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Initial ARPANET (1969) UCSB SRI 56kbit/s Digital lines UCLA Univ Utah © 2009 Jörg Ott & Carsten Bormann 3 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Common Goals for Early Internet Design Scientists interested in sharing and accessing (computing) resources Scientists and engineers interested in building an infrastructure to interconnect all computers in the world and make it work Designers, users, and operators: common vision and spirit © 2009 Jörg Ott & Carsten Bormann 4 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Some Aspects of the Internet Design Philosophy “Has evolved considerably from the first proposal to the current standards…” Dave Clark, 1988 © 2009 Jörg Ott & Carsten
    [Show full text]
  • THE FUTURE of IDEAS This Work Is Licensed Under a Creative Commons Attribution-Noncommercial License (US/V3.0)
    less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page i THE FUTURE OF IDEAS This work is licensed under a Creative Commons Attribution-Noncommercial License (US/v3.0). Noncommercial uses are thus permitted without any further permission from the copyright owner. Permissions beyond the scope of this license are administered by Random House. Information on how to request permission may be found at: http://www.randomhouse.com/about/ permissions.html The book maybe downloaded in electronic form (freely) at: http://the-future-of-ideas.com For more permission about Creative Commons licenses, go to: http://creativecommons.org less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iii the future of ideas THE FATE OF THE COMMONS IN A CONNECTED WORLD /// Lawrence Lessig f RANDOM HOUSE New York less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iv Copyright © 2001 Lawrence Lessig All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Random House and colophon are registered trademarks of Random House, Inc. library of congress cataloging-in-publication data Lessig, Lawrence. The future of ideas : the fate of the commons in a connected world / Lawrence Lessig. p. cm. Includes index. ISBN 0-375-50578-4 1. Intellectual property. 2. Copyright and electronic data processing. 3. Internet—Law and legislation. 4. Information society. I. Title. K1401 .L47 2001 346.04'8'0285—dc21 2001031968 Random House website address: www.atrandom.com Printed in the United States of America on acid-free paper 24689753 First Edition Book design by Jo Anne Metsch less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page v To Bettina, my teacher of the most important lesson.
    [Show full text]
  • Paul Baran, Network Theory, and the Past, Present, and Future of the Internet
    PAUL BARAN, NETWORK THEORY, AND THE PAST, PRESENT, AND FUTURE OF THE INTERNET CHRISTOPHER S. YOO* Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have embraced the concept of a flat network have largely overlooked the extent to which it is inconsistent with network theory, which emphasizes the importance of short cuts and hubs in enabling networks to scale. The flat network is also inconsistent with the actual way the Internet was deployed, which relied on a three- tiered, hierarchical architecture resembling what Baran called a decentralized network. However, empirical studies reveal that the Internet’s architecture is changing; as large content providers build extensive wide area networks and undersea cables to connect directly to last-mile networks, it is in the process of becoming flatter and less hierarchical. This change is making the network become more centralized rather than more distributed. As a result, this article suggests that the standard reference model that places backbones at the center of the architecture may need to be replaced with a radically different vision: a stack of centralized star networks, each centered on one of the leading content providers. INTRODUCTION................................................................................. 162 I. BARAN’S UNREALIZED VISION OF A DISTRIBUTED NETWORKS 164 A. Baran’s Vision of a Distributed Network ........................ 164 B. The Partial Reception of Baran’s Vision ......................... 167 II. NETWORK SCIENCE’S INSIGHTS INTO THE BENEFITS OF NETWORKS ............................................................................
    [Show full text]
  • Marconi Society - Wikipedia
    9/23/2019 Marconi Society - Wikipedia Marconi Society The Guglielmo Marconi International Fellowship Foundation, briefly called Marconi Foundation and currently known as The Marconi Society, was established by Gioia Marconi Braga in 1974[1] to commemorate the centennial of the birth (April 24, 1874) of her father Guglielmo Marconi. The Marconi International Fellowship Council was established to honor significant contributions in science and technology, awarding the Marconi Prize and an annual $100,000 grant to a living scientist who has made advances in communication technology that benefits mankind. The Marconi Fellows are Sir Eric A. Ash (1984), Paul Baran (1991), Sir Tim Berners-Lee (2002), Claude Berrou (2005), Sergey Brin (2004), Francesco Carassa (1983), Vinton G. Cerf (1998), Andrew Chraplyvy (2009), Colin Cherry (1978), John Cioffi (2006), Arthur C. Clarke (1982), Martin Cooper (2013), Whitfield Diffie (2000), Federico Faggin (1988), James Flanagan (1992), David Forney, Jr. (1997), Robert G. Gallager (2003), Robert N. Hall (1989), Izuo Hayashi (1993), Martin Hellman (2000), Hiroshi Inose (1976), Irwin M. Jacobs (2011), Robert E. Kahn (1994) Sir Charles Kao (1985), James R. Killian (1975), Leonard Kleinrock (1986), Herwig Kogelnik (2001), Robert W. Lucky (1987), James L. Massey (1999), Robert Metcalfe (2003), Lawrence Page (2004), Yash Pal (1980), Seymour Papert (1981), Arogyaswami Paulraj (2014), David N. Payne (2008), John R. Pierce (1979), Ronald L. Rivest (2007), Arthur L. Schawlow (1977), Allan Snyder (2001), Robert Tkach (2009), Gottfried Ungerboeck (1996), Andrew Viterbi (1990), Jack Keil Wolf (2011), Jacob Ziv (1995). In 2015, the prize went to Peter T. Kirstein for bringing the internet to Europe. Since 2008, Marconi has also issued the Paul Baran Marconi Society Young Scholar Awards.
    [Show full text]
  • The First Amendment, Common Carriers, and Public Accommodations: Net Neutrality, Digital Platforms, and Privacy
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 2021 The First Amendment, Common Carriers, and Public Accommodations: Net Neutrality, Digital Platforms, and Privacy Christopher S. Yoo University of Pennsylvania Carey Law School Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Communication Technology and New Media Commons, Digital Communications and Networking Commons, First Amendment Commons, Internet Law Commons, Law and Economics Commons, Policy History, Theory, and Methods Commons, Science and Technology Law Commons, and the Science and Technology Policy Commons Repository Citation Yoo, Christopher S., "The First Amendment, Common Carriers, and Public Accommodations: Net Neutrality, Digital Platforms, and Privacy" (2021). Faculty Scholarship at Penn Law. 2576. https://scholarship.law.upenn.edu/faculty_scholarship/2576 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. THE FIRST AMENDMENT, COMMON CARRIERS, AND PUBLIC ACCOMMODATIONS: NET NEUTRALITY, DIGITAL PLATFORMS, AND PRIVACY Christopher S. Yoo* Recent prominent judicial opinions have assumed that common car- riers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A re- view of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial dis- cretion over whom to carry or host.
    [Show full text]
  • I: the Conception
    Excerpt from: Mayo, Keenan and Newcomb, Peter. “How the Web Was Won,” Vanity Fair, July 2008. I: The Conception Paul Baran, an electrical engineer, conceived one of the Internet’s building blocks—packet switching— while working at the Rand Corporation around 1960. Packet switching breaks data into chunks, or “packets,” and lets each one take its own path to a destination, where they are re-assembled (rather than sending everything along the same path, as a traditional telephone circuit does). A similar idea was proposed independently in Britain by Donald Davies. Later in his career, Baran would pioneer the airport metal detector. Paul Baran: It was necessary to have a strategic system that could withstand a first attack and then be able to return the favor in kind. The problem was that we didn’t have a survivable communications system, and so Soviet missiles aimed at U.S. missiles would take out the entire telephone- communication system. At that time the Strategic Air Command had just two forms of communication. One was the U.S. telephone system, or an overlay of that, and the other was high-frequency or shortwave radio. So that left us with the interesting situation of saying, Well, why do the communications fail when the bombs were aimed, not at the cities, but just at the strategic forces? And the answer was that the collateral damage was sufficient to knock out a telephone system that was highly centralized. Well, then, let’s not make it centralized. Let’s spread it out so that we can have other paths to get around the damage.
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • OBJ (Application/Pdf)
    THE POLITICAL ECONOMY OF THE FREE FLOW OF INFORMATION IN THE NEW INTERNATIONAL ORDER A DISSERTATION SUBMITTED TO THE FACULTY OF ATLANTA UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY BY MARVIN HAIRE DEPARTMENT OF POLITICAL SCIENCE JULY 1986 Bu. T ABSTRACT Political Science Haire, Marvin B.A. Youngstown State University, 1976 M.A. Atlanta University, 1980 The Political Economy of the Free Flow of Information in the New International Order. Advisor: Professor William H. Boone Dissertation dated: July 1986 This dissertation analyzes the quest by the underdeveloped and non-aligned nations for a New World Information and Communication Order (NWICO). This is achieved by focusing on the evolution of the debate over the "free flow of information" within the United Nations Educational, Scientific and Cultural Organization (UNESCO), from its inception in 1946 to the present. The major assumption of this analy¬ sis is that the concept of "free flow" has served as a useful ideolo¬ gical weapon employed by the United States in fostering the emergence of American state, multinational corporate and banking interests as dominant actors in the arena of international communications and in¬ formation in the post-World War II era. This dominance has been achieved at the expense of both Western European allies and Third World nations. We note that until the decision by the Soviet Union to join UNESCO in the mid-1950s and the rise in the membership of Third World nations during the era of decolonization in the 1960s, the U.S. found very little opposition to its views and philosophy regarding the free flow of information.
    [Show full text]
  • Not the Internet, but This Internet
    Not The Internet, but This Internet: How Othernets Illuminate Our Feudal Internet Paul Dourish Department of Informatics University of California, Irvine Irvine, CA 92697-3440, USA [email protected] ABSTRACT built – the Internet, this Internet, our Internet, the one to What is the Internet like, and how do we know? Less which I’m connected right now? tendentiously, how can we make general statements about the Internet without reference to alternatives that help us to I ask these questions in the context of a burgeoning recent understand what the space of network design possibilities interest in examining digital technologies as materially, might be? This paper presents a series of cases of network socially, historically and geographically specific [e.g. 13, alternatives which provide a vantage point from which to 15, 36, 37]. There is no denying the central role that “the reflect upon the ways that the Internet does or does not digital,” broadly construed, plays as part of contemporary uphold both its own design goals and our collective everyday life. Wireless connectivity, broadband imaginings of what it does and how. The goal is to provide communications, and computational devices may be a framework for understanding how technologies embody concentrated in the urban centers of economically promises, and how these both come to evolve. privileged nations, but even in the most “remote” corners of the globe, much of everyday life is structured, organized, Author Keywords and governed by databases and algorithms, and “the digital” Network protocols; network topology; naming routing; still operates even in the central fact of its occasional media infrastructures.
    [Show full text]
  • Abbate Ch1-2
    6 Introductum Wide Web are prominent examples of informally created applications that became popular, not as the result of some central agency's mar­ Heat and ,-,UIH..4< keting plan, but through the spontaneous decisions of thousands of a.ndMeanings of Hacket(Switching independent users. In reconstructing the history of the Internet, I have been struck time and again by. the unexpected twists and turns its development has taken. Often a well-laid plan was abandoned after a short time and replaced by a new approach from an unexpected quarter..Rapid advances, such as the introduction of personal computers and the invention of local-area networks, continually threatened to make existing network technologies obsolete. In addition, responsibility for operating the Internet changed hands several times over the course Of all the ARPANET's technical innovations, perhaps the most cele­ of its first thirty years or so. How, in the face of all this change and brated was packet switching. Packet switching was an experimental, uncertainty, did the system survive and even flourish? I believe that even controversial method for transmitting data across a network. Its the key to the Internet's success was a commitment to flexibility and proponents claimed that it would increase the efficiency, reliability, and diversity, both in technical design and in organizational culture. No speed of data communications, butit was also quite complex to imple­ one could predict the specific changes that would revolutionize the ment, and some communications experts argued that the technique computing and communications industries at the end of the twentieth would never work.
    [Show full text]
  • The First 31 Years of the Internet -- an Insider's View. Bob Braden
    The First 31 Years of the Internet -- An Insider’s View. Bob Braden USC Information Sciences Institute May 3, 2001 Bob Braden -- 3 May 2001 1 Outline A. Historical Overview o 1961 - 1968: Pre-history o 1969 - 1973: ARPAnet research period o 1974 - 1983: Internet Research Period o 1984 - 1990: Academic Internet o 1990 - ??: Commercial (and Popular) Internet B. The Internet Architecture C. Conclusions and Challenges Bob Braden -- 3 May 2001 2 1961 - 1968: Pre-History MIT: Len Kleinrock, J. C. R. Licklider, Larry Roberts o Kleinrock: Paper on theory of packet switching, 1961 o Licklider: Memos on "Galactic Network", 1962 o Roberts: Plan for the "ARPANET", 1967 Rand: Paul Baran Report on packet switching for secure voice, 1964 NPL (UK): Donald Davies & Roger Scantlebury: Paper on a packet-switching network, 1967 IRIA (France): Louis Pouzin -- Cyclades Bob Braden -- 3 May 2001 3 1969 - 1973: ARPAnet Research Period o ARPAnet: a prototype packet-switching network. -- The unit of multiplexing is a packet of data, bearing a destination address. -- Packet switches ("IMPs") : Minicomputers -- DDP 316, 516 -- High-speed leased lines (56Kbps) -- Distributed adaptive routing algorithm ARPA selected Bolt, Beranek, and Newman (BBN) to design, build, and operate the IMPs and the ARPAnet infrastructure. Bob Braden -- 3 May 2001 4 ARPAnet Protocols o IMP-Host Interface: defined by BBN Report 1822 >> Bit-serial o Communication Service: Reliable delivery to a specified host system of a message of arbitrary bit length. -- I.E., a “reliable datagram” service -- The 8-bit byte not universal yet; computers used 8, 12, 16, 18, 24, 32, 36, 48, ..
    [Show full text]