Interdomain Routing And

Total Page:16

File Type:pdf, Size:1020Kb

Interdomain Routing And Routing on the Internet In the beginning there was the ARPANET: • route using GGP (Gateway-to-Gateway Protocol), Computer Networks a distance vector routing protocol Problems: • needed “flag-hour” to update routing protocol • incompatibility across vendors Lecture 17: Inter-domain Routing and BGP Routing on the Internet Hierarchical Routing Solution: hierarchical routing 2.2 2.2 AS2 • administrative autonomy: 3.2 AS2 Gateway/border router AS1 2.1 3.3 • each network admin can control 3.2 1.1 3.1 routing within its own network AS1 2.1 3.3 • neighboring ASs interact to AS3 1.1 3.1 border routers • internet: network of networks AS3 coordinate routing 3.4 border routers • 3.4 4.1 4.2 allows the Internet to scale: • direct linK to router in other AS(s) 4.4 • with 200 million hosts, each router 4.1 AS4 4.2 4.3 can’t store all destinations in its routing table 4.4 • Keeps in its routing table: AS4 • 4.3 route updates alone will swamp the linKs • next hop to other ASs 3.1 dest next • all hosts within its AS 1.* 1.1 Aggregate routers into regions of • hosts within an AS only keep a 2.* 2.1 4.* 2.1 “autonomous systems” (ASs) default route to the border router 3.2 3.2 3.3 3.3 3.4 3.4 1989 point of presence NSFNet Hierarchical Routing The NSFNet backbone (pop) Area hierarchy: Routers in the same AS run same routing protocol Regional • bacKbone/core: NSFNet networks • “intra-AS” routing protocol • regional networks: MichNet, Customer BARRNET, Los Nettos, networks • each AS uses its own linK metric 2.2 Cerfnet, JVCNet, NEARNet, etc. Users AS2 [Walrand] • 3.2 routers in different ASs can run • campus networks different intra-AS routing protocol AS1 2.1 3.3 1.1 3.1 • internal topology is not shared AS3 border routers between ASs 3.4 4.1 4.2 4.4 AS4 4.3 [Halabi] [Merit Networks] Commercialization (1994) AS Structure: Other ASs AT&T Tier-1 providers Roughly hierarchical interconnect Sprint Lower tier providers (peer) privately Verizon At center: “Tier-1” ISPs • provide transit service to downstream customers • Tier-1 ASs: top of the Internet • but, need at least one provider of their own hierarchy of ~10 Ass: AOL, • typically have national or regional scope Tier-1 providers also [Walrand] AT&T, Global Crossing, Level3, interconnect at • includes several thousand ASs Verizon/UUNET, NTT, Qwest, public network access points (NAPs) SAVVIS (formerly Cable & Stub ASs Wireless), Sprint, etc. 2 • do not provide transit service to others • full (N ) peering relationships between Tier-1 providers • connect to one or more upstream providers • has no upstream provider • includes the vast majority (e.g., 85-90%) of the ASs • national/international coverage [Halabi] [Rexford] “Tier-2” ISPs: Smaller “Tier-3” ISPs and Local ISPs (Often Regional) ISPs Last hop (“access”) network (closest to end systems) Connect to one or more tier-1 ISPs, Tier-2 ISPs also peer privately with local ISP possibly other tier-2 ISPs each other, and local ISP Tier-3 ISP local ISP interconnect at local ISP Local and tier- 3 NAPs ISPs are Tier-2 ISP Tier-2 ISP customers of Tier-2 ISP Tier-2 ISP Tier-1 ISP higher tier ISPs NAP Tier-2 ISP pays tier-1 connecting them ISP for connectivity to Tier-1 ISP to rest of Internet rest of Internet NAP • tier-2 ISP is customer Tier-1 ISP of tier-1 provider Tier-1 ISP Tier-2 ISP Tier-1 ISP Tier-1 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP Tier-2 ISP Tier-2 ISP local ISP local ISP Tier 1 ISP A Packet Passes AS Number Trivia Through Many Networks AS number is a 16-bit quantity • 65,536 unique AS numbers local ISP Some are reserved numbers (e.g., for private ASs) Tier-3 ISP • only 64,510 are available for public use Tier-2 ISP Tier-2 ISP Managed by Internet Assigned Numbers Authority (IANA) Tier-1 ISP • gives blocks of 1,024 to Regional Internet Registries NAP • RIRs assign AS numbers to institutions • 49,649 AS numbers in visible use (Feb ’15) Tier-1 ISP Tier-1 ISP Tier-2 ISP In 2007 started assigning 32-bit AS #s Tier-2 ISP Tier-2 ISP local ISP [Rexford] Growth of AS numbers Interdomain Routing AS-level topology • destinations are CIDR address prefixes (APs, e.g., 12.0.0.0/8) To learn more about Internet AS state see: • nodes are Autonomous Systems (ASs) • Geoff Huston’s CIDR Report • edges are business relationships http://www.cidr-report.org/as2.0/ • CAIDA sKitter maps: http://www.caida.org/research/topology/as_core_network/ 4 AS_Network.xml 3 5 2 7 6 1 Web server Client [Rexford] Challenges for Interdomain Routing Why SPF is not Suitable Scale • address prefixes (APs): 200,000 and growing Topology information is flooded • ASs: ~50,000 visible ones, and 60K allocated • high bandwidth and storage overhead • routers: at least in the millions • nodes must divulge sensitive commercial information Proprietary information: Entire path computed locally per node • ASs don’t want to divulge internal topologies • high processing overhead in a large network • nor their business relationships with neighbors Route computation minimizes some notion of Policy total distance • no Internet-wide notion of a linK cost metric • all traffic must travel on shortest paths • need control over where you send traffic • and who can send traffic through you [Rexford] [Rexford] Why SPF is not Suitable Why Not Distance Vector? All nodes need common notion of link costs Advantages • works only if policy is shared and uniform • hides details of the network topology Incompatible with commercial relationships • nodes determine only “next hop” toward the destination Disadvantages National National YES ISP1 ISP2 • route computation still entails minimization of some notion of total distance, which is difficult in an inter- NO domain setting • slow convergence due to reliance on counting-to-infinity Regional Regional Regional ISP3 ISP2 ISP1 to detect routing loop Instead use path vector Cust3 Cust2 Cust1 • easier loop detection [Rexford] [after Rexford] Path-Vector Routing Other Advantage: Flexible Policies Avoid counting-to-infinity by advertising entire path Each node can apply local policies • distance vector: send distance metric per destination • path selection: which path to use? • path vector: send the entire path for each destination • path export: which paths to advertise? Loop detection: Examples • each node looKs for its own node identifier in advertised path • node 2 may prefer the path “2, 3, 1” over “2, 1” • and discards paths with loops • node 1 may not want node 3 to hear of the path “1, 2” • e.g., node 1 sees itself in the path (3, 2, 1) and discards the path 2 3 2 3 “d: path (2,1)” “d: path (1)” 3 2 1 ✗ data traffic data traffic 1 1 “d: path (3,2,1)” d [Rexford] [Rexford] Internet inter-AS Routing: BGP Internet inter-AS Routing: BGP BGP provides each AS a means to: BGP (Border Gateway Protocol) is the de facto • use prefix-based path-vector protocol standard for inter-AS routing • propagates AP reachability to all routers inside the AS • 06/89 v.1 • obtains AP reachability from neighboring ASs • 06/90 v.2 EGP (Exterior Gateway Protocol) to BGP transition • determines “good” routes to APs based on reachability • 10/91 v.3 BGP installed information and policy • 07/94 v.4 de facto standard • Inter-AS routing is policy driven, not load-sensitive, generally not QoS-based When an AS advertises an AP to another AS, it is promising to forward any pacKets the other AS sends to the AP • an AS can aggregate CIDR APs in its advertisement BGP runs over TCP BGP Messages Pairs of BGP routers (BGP peers) establish semi- permanent TCP connections: BGP sessions BGP messages: • : opens TCP connection to peer and authenticates sender • advantage of using TCP: reliable transmission allows for OPEN incremental updates: updates only when changes occur • UPDATE: advertises a new active path (or withdraws one no • disadvantage: TCP congestion control mechanism slows longer available) down route updates that could decongest linK! • KEEPALIVE: keeps connection alive in the absence of UPDATEs; also acknowledges OPEN request • : reports errors in previous message; Failure detection: NOTIFICATION also used to close connection • TCP doesn’t detect lost connectivity on its own • instead, BGP must detect failure • sends KEEPALIVE pacKets every 60 seconds • hold timer: 180 seconds BGP sessions do not correspond to physical linKs, but rather business relationship [after Rexford] BGP Operations Path Attributes & BGP Routes Establish session on AS1 When advertising an AP, advertisement includes BGP TCP port 179 attributes Two important attributes: BGP session • AS-PATH: the path vector of ASs through which the Exchange all advertisement for an AP passed through active routes • NEXT-HOP: the specific internal-AS router to next-hop AS AS2 (there may be multiple exits from current AS to next-hop-AS) While connection is Exchange incremental ALIVE, exchange route updates UPDATE messages [Rexford] Path Attributes & BGP Routes Causes of BGP Routing Changes Sample BGP entry: Topology changes destination NEXT-HOP AS-PATH • equipments going up or down 198.32.163.0/24 202.232.1.8 2497 2914 3582 4600 • deployment of new routers or sessions • address range 198.32.163.0/24 is in AS 4600 BGP session failures • to get there, send to next hop router at address 202.232.1.8 • due to equipment failures, maintenance, etc. • the path there goes through ASs 2497, 2914, 3582, in order • or, due to congestion on the physical path AS path chosen may not 2 AS hops, 11 router hops Changes in routing policy be the shortest AS path • changes in preferences in the routes • changes in whether the route is exported Router path may be longer than AS path s d Persistent protocol oscillation 3 AS hops, 7 router hops • conflicts between policies of different ASs [after Rexford] [Rexford] BGP Session Failure Routing Change: Before and After Reacting to a failure AS1 AS1 0 • discard all routes learned • delete the route (1, 0) from the neighbor • switch to next route (1, 2, 0) (1, 0) (2, 0) • send new updates for any • send route (1, 2, 0) to AS3 routes that change (1, 2, 0) 1 • overhead increases with # of routes AS3 1 2 • reason why many Tier-1 ASs filter out • sees (1, 2, 0) replace (1,0) prefixes longer than /24 • compares to route (2, 0) • switches to using AS2 (3, 1, 0) (3, 2, 0) AS2 3 [Rexford] [Rexford] .
Recommended publications
  • CSE 127 Computer Security Stefan Savage, Spring 2018, Lecture 16
    CSE 127 Computer Security Stefan Savage, Spring 2018, Lecture 16 Network Security I Objectives ▪ Understand – Architecture of the Internet protocol suite (TCP/IP) ▪ CSE123 in 20mins – Common weaknesses in networking protocols – Available mitigations and their limitations Review: Internet Protocol Suite ▪ Application Layer – Examples: SMTP, FTP, SSH, HTTP, etc. ▪ Transport Layer: Port-addressed host-to-host communications (on LAN or WAN). – User Datagram Protocol (UDP): single packet transmission with no reliability or ordering mechanisms. – Transmission Control Protocol (TCP): connection establishment, reliable transmission, and flow-control. ▪ Internet Layer (IP): Fragmentation, reassembly, and end-to-end (across network boundaries) routing of data packets. – Provides a uniform interface that hides the underlying network topology. ▪ Link Layer: Transmission of data frames within a local network (without intervening routers). – Example: Ethernet ▪ Physical Layer: Transmission of raw bits (rather than logical data packets) over a physical data link connecting network nodes. – Example: 100BASE-T – [Technically not part of the Internet Protocol Model, but is still there] Review: Internet Protocol Suite https://en.wikipedia.org/wiki/Internet_protocol_suite Review: Internet Protocol Suite https://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP Protocol Stack by Example ▪ ROUGHLY, what happens when I click on a URL while UCSD’s network? My computer www.yahoo.com Application Layer (HTTP) ▪ Turn click into HTTP GET request GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive … Application Layer (Name Resolution) ▪ Where is www.yahoo.com? What’s the address for www.yahoo.com My computer Oh, you can find it at 64.58.76.177 132.239.9.64 Local DNS server 132.239.51.18 Transport Layer (TCP) ▪ Break message into packets (TCP segments) ▪ Should be delivered reliably & in-order GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive … 3 yahoo.c 2 p://www.
    [Show full text]
  • Competing in Book Retailing
    COMPETINGCOMPETING ININ CENTER FOR RESEARCH BOOK RETAILING: ON INFORMATION TECHNOLOGY AND THE CASE OF AMAZON.COM ORGANIZATIONS University of California, Irvine AUTHORS: 3200 Berkeley Place Aarti Shrikhande and Irvine, California 92697-4650 Vijay Gurbaxani and Graduate School of Management NOVEMBER 1999 Acknowledgement: This research has been supported by grants from the CISE/IIS/CSS Division of the U.S. National Science Foundation and the NSF Industry/University Cooperative Research Center (CISE/EEC) to the Center for Research on Information Technology and Organizations (CRITO) at the University of California, Irvine. Industry sponsors include: ATL Products, the Boeing Company, Bristol-Myers Squibb, Canon Information Systems, IBM, Nortel Networks, Rockwell International, Microsoft, Seagate Technology, Sun Microsystems, and Systems Management Specialists (SMS). The authors would like to thank Asish Ramchandran for his assistance on this project. TABLE OF CONTENTS INTRODUCTION....................................................................................................................................................................1 INDUSTRY ENVIRONMENT AND COMPETITION .......................................................................................................2 FIRM LEVEL ANALYSIS ......................................................................................................................................................9 BUSINESS MODEL .........................................................................................................................................................9
    [Show full text]
  • Internet Pricing and the History of Communications
    Internet pricing and the history of communications Andrew Odlyzko AT&T Labs - Research [email protected] http://www.research.att.com/ amo Revised version, February 8, 2001. Abstract There are repeating patterns in the histories of communication technologies, including ordinary mail, the telegraph, the telephone, and the Internet. In particular, the typical story for each service is that quality rises, prices decrease, and usage increases to produce increased total revenues. At the same time, prices become simpler. The historical analogies of this paper suggest that the Internet will evolve in a similar way, towards simplicity. The schemes that aim to provide differentiated service levels and sophisticated pricing schemes are unlikely to be widely adopted. Price and quality differentiation are valuable tools that can provide higher revenues and increase utilization efficiency of a network, and thus in general increase social welfare. Such measures, most noticeable in airline pricing, are spreading to many services and products, especially high-tech ones. However, it appears that as communication services become less expensive and are used more fre- quently, those arguments lose out to customers’ desire for simplicity. In practice, user preferences express themselves through willingness to pay more for simple pricing plans. In addition, there is a strong “threshhold” effect to usage-sensitive billing. Even tiny charges based on utilization decrease usage substantially. In a rapidly growing market, it is in the service providers’ interest to encourage usage, and that argues for simple, preferably flat rate, pricing. Histori- cal evidence suggests that when service costs decrease, such arguments prevail over the need to operate a network at high utilization levels and to extract the highest possible revenues.
    [Show full text]
  • Research Articles in the American Economic Review, the RAND Journal Ofeconomics, The
    3 I. Introduction And Qualifications 1. My name is Nicholas S. Economides. I am a Professor ofEconomics at the Stern School ofBusiness ofNew York University, located at 44 West 4th Street New York, NY 10012. 2. I received a B.Sc. degree in Mathematical Economics (first class honors) from the London School ofEconomics in 1976, a Masters degree in Economics from the University of California at Berkeley in 1979 and a Ph.D. degree in Economics from Berkeley in 1981, specializing in Industrial Organization. 3. From 1981 to 1988, I was assistant and then associate professor ofeconomics at Columbia University. From 1988 to 1990, I was associate professor ofeconomics at Stanford University. I have taught at the Stern School ofBusiness since 1990. During the academic year 1996-1997, I was visiting professor at Stanford University. 4. I have published more than seventy research papers in the areas ofindustrial organization, microeconomics, network economics, antitrust, finance, and telecommunications policy, and I have given numerous seminar presentations at academic and government institutions and conferences. I have published academic research articles in the American Economic Review, the RAND Journal ofEconomics, the International Journal ofIndustrial Organization, the International Economic Review, the Journal ofEconomic Theory, and the Journal ofIndustrial Economics, among others. I am currently editor ofthe International Journal ofIndustrial Organization and ofNetnomics. I have served as advisor and consultant to major telecommunications companies, a number of 4 the Federal Reserve Banks, the Bank ofGreece, and major Financial Exchanges. I teach graduate (MBA and Ph.D.) courses in antitrust, industrial organization, microeconomics, and telecommunications. A copy ofmy curriculum vitae is attached as Attachment 1.
    [Show full text]
  • INSIDE MICROSOFT (Part 2) 2/7/04 2:30 PM
    07/15/96 INSIDE MICROSOFT (Part 2) 2/7/04 2:30 PM INSIDE MICROSOFT (Part 2) The untold story of how the Internet forced Bill Gates to reverse course (Continued from Part 1) BABY STEPS. In one breakout group, Allard tangled with Russell Siegelman, who was heading Marvel, the code name for what's now the Microsoft Network online service. Allard argued that instead of being proprietary, Marvel should be based on Web standards. Siegelman held his ground--and won. It was a decision that would later cost millions to reverse. Still, Net progress was made: TCP/IP would be integrated into Win95 and Windows NT, the version of Windows that runs network-server computers. The sales team was told to use the Web to dispense marketing information. The applications group agreed to give Word, the word-processing program, the ability to create Web pages. Next, Gates jumped deeper into the process by devoting much of his April Think Week--a semiannual retreat--to the Internet. His Apr. 16 memo, ``Internet Strategy and Technical Goals,'' contained the first signs of a growing corporate commitment. ``We want to and will invest resources to be a leader in Internet support,'' wrote Gates. It was a first step, albeit a measured one. ``I don't think he knew how much to bet yet,'' says Allard. But board member David F. Marquardt did: He recalls that he was ``amazed'' that Microsoft was putting so little into the Net. ``They weren't in Silicon Valley. When you're here, you feel it all around you,'' says Marquardt, a general partner at Technology Venture Investors in Menlo Park, Calif.
    [Show full text]
  • Worldcom1 Ethics Case Study
    fWorldCom1 By Dennis Moberg (Santa Clara University) and Edward Romar (University of Massachusetts- Boston) An update for this case is available. 2002 saw an unprecedented number of corporate scandals: Enron, Tyco, Global Crossing. In many ways, WorldCom is just another case of failed corporate governance, accounting abuses, and outright greed. But none of these other companies had senior executives as colorful and likable as Bernie Ebbers. A Canadian by birth, the 6 foot, 3 inch former basketball coach and Sunday School teacher emerged from the collapse of WorldCom not only broke but with a personal net worth as a negative nine-digit number.2 No palace in a gated community, no stable of racehorses or multi-million dollar yacht to show for the telecommunications giant he created. Only debts and red ink--results some consider inevitable given his unflagging enthusiasm and entrepreneurial flair. There is no question that he did some pretty bad stuff, but he really wasn't like the corporate villains of his day: Andy Fastow of Enron, Dennis Koslowski of Tyco, or Gary Winnick of Global Crossing.3 Personally, Bernie is a hard guy not to like. In 1998 when Bernie was in the midst of acquiring the telecommunications firm MCI, Reverend Jesse Jackson, speaking at an all-black college near WorldCom's Mississippi headquarters, asked how Ebbers could afford $35 billion for MCI but hadn't donated funds to local black students. Businessman LeRoy Walker Jr., was in the audience at Jackson's speech, and afterwards set him straight. Ebbers had given over $1 million plus loads of information technology to that black college.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • SEC News Digest, 10-20-1999
    SEC NEWS DIGEST Issue 99-202 October 20, 1999 RULES AND RELATED MATTERS ADOPTION OF UPDATED EDGAR FILER MANUAL A revised EDGAR Filer Manual and Form ID became effective on October 18. This new version of EDGAR and the EDGAR Filer Manual (Release 6.60) incorporates changes resulting from the decision by CompuServe, a sub-contractor to TRW (the developer of the EDGAR system), to discontinue its EDGAR services. These services include the Public Data Network (PDN) for transmission of filings to EDGAR, private mailboxes for receiving EDGAR Acceptance/Suspense notifications and Return Copies, the EDGAR company database, and the bulletin board. TRW has contracted with UUNET to provide EDGAR Private Mail and PDN Services. Although The EDGAR bulletin board and the EDGAR company database will no longer be available, filers may obtain similar information from our Web Site at www.sec.gov and the TRW/UUNET Web Site at www.trw-edgar.com. The Form ID, the Uniform Application for Access Codes to File on EDGAR, was also changed to reflect the change in the EDGAR private mail service. The basic TRW/UUNET service will include five hours of access and a mailbox for messages. There will be additional charges for larger mailboxes and connect time over the basic limit. Those filers who want to use the public data network for transmission to EDGAR, who want a private system (instead of the Internet) for receipt of acceptance/suspense messages, or who want an electronic returned copy of their filings must sign up for this service. To access their new mailboxes, filers will use a standard POP3 mail client.
    [Show full text]
  • United States Court of Appeals for the Second Circuit
    05-0570-cv UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT ALBERTO GONZALES, in his official capacity as Attorney General of the United States, ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, and MARION E. BOWMAN, in his official capacity as Senior Counsel to the Federal Bureau of Investigation, Defendants/Appellants, v. JOHN DOE, AMERICAN CIVIL LIBERTIES UNION, and AMERICAN CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs/Appellees ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK BRIEF OF ELECTRONIC FRONTIER FOUNDATION, ET AL., IN SUPPORT OF APPELLEES AND AFFIRMATION OF JUDGMENT BELOW Lee Tien Kurt B. Opsahl Kevin S. Bankston Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 (415) 436-9333 (415) 436-9993 (fax) CORPORATE DISCLOSURE STATEMENT Pursuant to Rule 26.1 of the Federal Rules of Appellate Procedure, Amici Curiae certify that no publicly held corporation or other publicly held entity owns 10% or more of any Amicus Curiae. Respectfully submitted, ____________________________ Lee Tien Kurt B. Opsahl Kevin S. Bankston Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 (415) 436-9333 (415) 436-9993 (fax) TABLE OF CONTENTS I. INTERESTS OF AMICI.....................................................................................1 II. PRELIMINARY STATEMENT.........................................................................4 III. ARGUMENT ......................................................................................................5
    [Show full text]
  • The Growth and Development of the Internet in the United States
    3 The Growth and Development of the Internet in the United States Martin Kenney Rarely does a new technology emerge that galvanizes a dramatic re- thinking of the nature of commerce. The Internet is such a technology. At this early stage, it is difficult to appreciate fully the importance of the Internet, but some speculate it might be as momentous as the arrival of the telegraph (Cohen, Delurg, and Sysmar 2000; Standage 1999). Radi- cally new communication technologies such as the Internet have mul- tiple applications and often become ubiquitous. As such, the adoption, diffusion, and development of this new technology provide an especially penetrating view of how different national innovation systems have re- sponded to and shaped the commercial possibilities inherent in the In- ternet. Of course, such an assessment for an economy as large as that of the United States is difficult. It is further complicated by the peculiar way in which communications technologies permeate and facilitate connec- tions and relationships. Often the action of such technologies is imper- ceptible to most of the actors involved and even to aggregate statistics; for example, better information transfer between customers and suppliers is not manifested in the finished good, though it is embodied in the good in terms of lower cost and/or higher quality. Given the diffuse nature and the speed of the Internet's evolution, any analysis can only be tentative. i Government and universities played vital roles in the gestation of the Internet in the pre-commercial and early commercialization phases. The apparent ease of entry encouraged many start-ups.
    [Show full text]
  • The Great Telecom Meltdown
    4 The Internet Boom and the Limits to Growth Nothing says “meltdown” quite like “Internet.” For although the boom and crash cycle had many things feeding it, the Internet was at its heart. The Internet created demand for telecommunications; along the way, it helped create an expectation of demand that did not materialize. The Internet’s commercializa- tion and rapid growth led to a supply of “dotcom” vendors; that led to an expec- tation of customers that did not materialize. But the Internet itself was not at fault. The Internet, after all, was not one thing at all; as its name implies, it was a concatenation [1] of networks, under separate ownership, connected by an understanding that each was more valuable because it was able to connect to the others. That value was not reduced by the mere fact that many people overesti- mated it. The ARPAnet Was a Seminal Research Network The origins of the Internet are usually traced to the ARPAnet, an experimental network created by the Advanced Research Projects Agency, a unit of the U.S. Department of Defense, in conjunction with academic and commercial contrac- tors. The ARPAnet began as a small research project in the 1960s. It was pio- neering packet-switching technology, the sending of blocks of data between computers. The telephone network was well established and improving rapidly, though by today’s standards it was rather primitive—digital transmission and switching were yet to come. But the telephone network was not well suited to the bursty nature of data. 57 58 The Great Telecom Meltdown A number of individuals and companies played a crucial role in the ARPAnet’s early days [2].
    [Show full text]
  • Afterword: Omissions,Additions, and Corrections
    Afterword: Omissions,Additions, and Corrections The astute reader will notice that I’ve omitted a few online services. Some were so short-lived or of so little consequence that they would be meaningless to most readers. Others are beyond the theme or time frame of this book. Some of the omissions: ᭿ ABI/INFORM (Abstracted Business Information), a database of abstracted information from selected business publications, hosted by ORBIT, Dialog, and eventually UMI/ProQuest ᭿ Data Courier, a small online service hosted by the Louisville Courier- Journal (the owners of which bought ABI/INFORM under the company name “Data Courier”) ᭿ EasyLink, Western Union’s now-defunct email/FAX/mail system ᭿ Easynet, a front end for more than 700 database services ᭿ EasyPlex, a specialized CompuServe email service ᭿ E-COM, the United States Postal Service’s electronic messaging service (EMS) ᭿ Freenet, free BBSs in cities such as Cleveland and Rochester that used the same software and were designed to serve as community centers ᭿ Info-Look, a gateway to online services hosted by Nynex ᭿ Internet Relay Chat (IRC), the first implementation of real-time chatting via the Internet (Jarkko Oikarinen, 1988) ᭿ Knowledge Index (KI), a subset of Dialog databases ᭿ The Microsoft Network (MSN), more an ISP than online service that started after Bill Gates decided that the Internet was going to be important, after all 177 178 Afterword ᭿ MIX, the McGraw-Hill Information Exchange, a CoSy-based service for educators ᭿ NABU Network, a Canadian online service that operated
    [Show full text]