The Complete Technical Paper Proceedings From

Total Page:16

File Type:pdf, Size:1020Kb

The Complete Technical Paper Proceedings From THE COMPLETE TECHNICAL PAPER PROCEEDINGS FROM: A METHOD OF ANALYZING MPEG DATA IN ENCAPSULATED STREAMS F. Eugene Rohling DVA Group, Inc. Abstract tools for looking at stream usage of Motorola Broadband DigiCipher, Scientific Atlanta This paper describes a method of analyzing Power Key, and other access control encapsulated binary data streams for the streams are usually held close. This makes it purposes of performing detailed message difficult for an MSO to find problems in his analysis. This method evolved from a general local system, especially when he is purpose analysis tool used to analyze radar responsible for operating it. data. It is now being applied to the analysis of MPEG-2 content and access control data Encapsulated MPEG Data delivered both in-band and out-of-band. It is particularly useful for compartmentalizing the The National Access Control Service details of sensitive control and encryption (NAS) owned by Motorola Broadband and information within the MPEG data strea of an operated by AT&T (now Comcast) is an access control system.. excellent example of MPEG encapsulated data. Figure 1 shows the various layers of The method allows users to describe MPEG data. First, the DigiCipher OOB data encapsulated framed data, parsing a binary is encapsulated into MPEG private data data stream, and generating human readable message packets. When it arrives in the output that can be used to analyze and resolve headend, data is then sent from the satellite problems. The template files can be tailored receiving device (IRT) across Ethernet to the and customized to reveal varying levels of out of band modulator (OM). That is, the proprietary and confidential data within the OOB data is carried as an encapsulated MPEG binary stream. data stream within a HITS multiplex through the satellite system. [1] INTRODUCTION Level 2 Digicipher AC Messages This paper identifies a solution that helps Encapsulation MPEG Messages test and field engineers analyze complex Level 1 Digicipher OOB Traffic MPEG data streams. It uses the familiar NAS MPEG Packets access control service as an example of data Encapsulation that has been encapsulated four times when it HITS Transport Stream Visible Layer is received within a headend system. Finally, MPEG Packets it discusses the need for these tools as new technologies emerge. Figure 1 - NAS Encapsulation This paper specifically discusses access control data. Many off-the-shelf tools exist A standard MPEG recording tool such as for analyzing standard MPEG-2 video and the DSTS by Logic Innovations allows you to DOCSIS services. However, access control record the data stream as it is received by the systems are by their nature proprietary, and IRT. But if you want to recover only the data seen by the set-top, then you must remove the such as awk, sed, grep, lex, and perl. But HITS transport stream. converting a 100 MByte file from binary to readable text becomes unwieldy when the Several one-off tools have been built to result can generate many Gigabytes of data detunnel the data, but they are all considered and take significant time to sort through and proprietary by the AC provider. Sometimes filter that data. an MSO has legitimate reasons to determine if his access control system is operating properly It is significantly less time consuming for or if he is receiving all the data his contract analysts to process binary data and extract with NAS provides. only the information they need to do their task. Similar problems exist with Motorola DAC based local access controllers. In this HISTORY case, the problem becomes more urgent because the MSO is responsible for the The problem of analyzing a complex data operation of the DAC. stream that has been multiplexed into many layers is not unique to the cable or MPEG In many systems, access control data is industries. Instrumentation systems during the encapsulated on a TCP/IP network and sent to 1980 to 1995 time frame commonly mixed a modulating device. Rather than data being and multiplexed dissimilar data from many MPEG encapsulated in MPEG, it is now sources within a telemetry or tape recorded MPEG encapsulated within IP. While good data stream. Ethernet tools exist, they to not provide utilities to integrate with MPEG tools. [1] The Link to Radars Compartmenting Data A good example was a radar instrumentation system developed for the F- To give the MSO the tools Motorola 15, F-16, and B-1 aircraft by Lockheed originally used to develop DigiCipher would Georgia under the Advanced Radar Test Bed be giving away the keys to their access control (ARTB) program. The requirements for that kingdom. But to give MSO’s tools that help system required it to visualize and record identify if code objects are spinning, or if TV traffic from up to four MIL-STD-1553 data Guide data is still online, or to identify if bus streams, up to four streams of telemetry channel maps are being provided to their data, several custom low, medium, and high facility are all reasonable requests. speed data streams at an aggregate rate of up to 12 Mbytes/sec. This was a feat for the A legitimate need exists to compartment 1989 designed system. They also required the the visibility of MPEG access control system to be versatile and instrument any of implementation so legitimate users can five radars on the three aircraft. The visualize it operationally without requirements finally required time stamping compromising the access control system. the data to +/- 10 microseconds. Processing Binary Data High Speed Analysis Becomes Key Instrumenting the aircraft, multiplexing Many processing programs exist for data, recording data, and time tagging data processing text. Unix has a wealth of tools was straightforward. Much of it was performed in hardware. But the system Processing Frames of Data proved that reducing and analyzing the data became a significant labor intensive task. The MAcq filter input description was U.S. Air Force engineers likened the task of designed to process nested frames of variable finding a needle in a hay stack. length data in a serial data stream. Figure 3 shows the format of the filter file. Note that This system evolved into the bench top the format of the filter file allows recursion. Radar Instrumentation System (RIM-68) That is, optional filter frames can be nested developed by Flexible Engineering Resources, within a top level scope frame to create the Inc. (FER). This company developed a same data recursion effect often found with method of encapsulating the data in a common software recursion. This is the primary format and a method of parsing the data at benefit of applying MAcq filters to high speeds so a small number of parameters encapsulated data problems. could be visualized in both text and graphic format. The method was coined “MAcq” for Modular Acquisition. FRAME DESCRIPTOR MACQ FILTERING [3] DATA DESCRIPTION The “macq_filter” program performed the Describes Fields within Frame analysis side of this task was called the “MAcq_filter”. It analyzed data for both real- time and post processing. It used “filters” that LENGTH DESCRIPTOR described the encapsulated nature of the data stream to both extract and process the stream Function = How to determine frame length into either human readable form or into derivative streams for off-the-shelf graphic programs to process as shown in Figure 2. Pass Filter Input Output Function = How to Data macq_ Data determine whether this Stream filter Stream frame is of interest. (File) (File) How to output data (Binary, Text, ...) Default = pass binary MAcq Filter File Optional recursive frame (.flt) Figure 2 - MAcq Filter Process Figure 3 - Filter File Format HITS STREAM NAS OOB NAS OOB MPEG PACKETS MPEG PACKETS MPEG MESSAGE PID = NAS OOB CA Stream PID = Other Services MPEG Packets Access Control CA Stream Message to Digicipher PID = Other Services MPEG Packets Devices CA Stream PID = NAS OOB MPEG Packets PID = Other Services PID = NAS OOB CA Stream PID = Other Services Access Control MPEG Packets Message to Digicipher CA Stream PID = Other Services Devices MPEG Packets PID = Other Services PID = NAS OOB PAT PID = Other Services pat_info.flt PID = Other Services FILTER #ifdef SHOW_PAT PID = NAS OOB <When PID = 0> <Output PID information> PID = Other Services #endif END FILTER PID = Other Services CAT PID = Other Services cat_info.flt FILTER #ifdef SHOW_CAT <When PID = 1> <Output PID information> HITS STREAM FILTER FILE NAS OOB FILTER FILE #endif hits_filter.flt nas_mpeg_pkt.flt END FILTER FRAME = MPEG PACKET FRAME = MPEG PACKET <MPEG Packet Description> <MPEG Packet Description> CODE OBJECT ... ... code_obj_info.flt FILTER #include pat_info.flt <When PIDS=NAS OOB> #include pmt_info.flt FILTER <Output HITS time est.> #include cat_info.flt #ifdef SHOW_CODE_OBJ END FILTER #include code_obj_info.flt #include code_obj_pids.def ... ... <When PID = OBJ1> #include oob_ip.flt END FILTER <Output information> ... ... ... END FRAME END FRAME #endif END FILTER Figure 4 - Representing Encapsulation Data Description became very useful when analyzing F-16 radar data. Each of the fields within a frame must be APPLYING MACQ TO MPEG DATA defined. The data description block within the filter identifies fields of data, such as the packet sync (47 Hex), the continuity counter, DVA Group began a research program in or the PID fields of an MPEG packet. 2002 known as “Crown Royal” or CR to identify whether MAcq could be used to parse MPEG data and generate text output files. Variable Length Data Processing Frames of Data While MPEG packets are fixed format (188 bytes or 204 bytes), UDP / IP data is not. The length, however, can be readily Figure 4 shows how MAcq filter files can determined from the contents of the UDP be used to describe and process the NAS packet.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • 2016 Ncta Intx May 16Th & 17Th
    A Center for Law, 2016 NCTA INTX Technology, and Entrepreneurship ACADEMIC WORKSHOP at the University Silicon of Colorado MAY 16TH & 17TH latirons WORKSHOP PARTICIPANTS Workshop Locations Yochai Benkler, Professor of Law, Harvard University Babette E. Boliek, Associate Professor, Pepperdine University School of Law Monday, May 16, 2016 Adam Candeub, Professor, Michigan State University College of Law Samberg Conference Center - MIT David Clark, Professor, Massachusetts Institute of Technology 6th Floor, Dining Room 5 & 6 Stacey Dogan, Professor, Boston University School of Law MIT Chang Building (E52) Carolyn Gideon, Assistant Professor of International Communication and Technology 50 Memorial Drive Policy and Director of Hitachi Center for Technology and International Affairs, The Cambridge, MA 02139 Fletcher School, Tufts University Ray Gifford, Senior Fellow, Silicon Flatirons, University of Colorado Shane Greenstein, Professor, Harvard Business School Tuesday, May 17, 2016 Christiaan Hogendorn, Associate Professor of Economics, Wesleyan University Boston Convention and John B. Horrigan, Senior Researcher, Pew Research Center Expo Center Gus Hurwitz, Assistant Professor, University of Nebraska College of Law 415 Summer Street Roslyn Layton, PhD Fellow, Aalborg University Boston, MA 02210 William Lehr, Research Scientist/CSAIL, Massachusetts Institute of Technology Directions & Parking Daniel Lyons, Associate Professor, Boston College Law School Information John Mayo, Professor of Economics, Business and Public Policy, Georgetown University
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) Unlicensed Use of the 6 GHz Band ) ET Docket No. 18-295 ) Expanding Flexible Use in Mid-Band ) GN Docket No. 17-183 Spectrum Between 3.7 and 24 GHz ) OPPOSITION OF NCTA – THE INTERNET & TELEVISION ASSOCIATION TO PETITIONS FOR RECONSIDERATION Rick Chessen Neal Goldberg Danielle J. Piñeres NCTA – The Internet & Television Association 25 Massachusetts Avenue, NW – Suite 100 Washington, DC 20001-1431 (202) 222-2445 July 29, 2020 TABLE OF CONTENTS INTRODUCTION AND SUMMARY ......................................................................................... 2 I. THE COMMISSION BASED ITS DECISION TO PERMIT UNLICENSED USE IN THE 6 GHZ BAND ON THOROUGH CONSIDERATION OF THE RECORD AND SOUND TECHNICAL ANALYSIS AND ACCORDINGLY ADOPTED APPROPRIATE PROTECTION MEASURES ........................................ 4 A. The Commission Should Reject FWCC’s Claims that It Failed to Take Sufficient Action to Protect Incumbents Against Harmful Interference ..................... 5 B. FWCC Proposes Burdensome Measures to Address Its Harmful Interference Concerns that the Commission Already Considered and Properly Rejected and that Are neither Necessary nor in the Public Interest ................................................. 10 i. The Commission Correctly Decided Not to Codify an Unnecessary Activity Limit for LPI Devices ........................................................................... 11 ii. The Commission Considered and Declined to Mandate Testing Before
    [Show full text]
  • Internet Peer-To-Peer File Sharing Policy Effective Date 8T20t2010
    Title: Internet Peer-to-Peer File Sharing Policy Policy Number 2010-002 TopicalArea: Security Document Type Program Policy Pages: 3 Effective Date 8t20t2010 POC for Changes Director, Office of Computing and Information Services (OCIS) Synopsis Establishes a Dalton State College-wide policy regarding copyright infringement. Overview The popularity of Internet peer-to-peer file sharing is often the source of network resource allocation problems and copyright infringement. Purpose This policy will define Internet peer-to-peer file sharing and state the policy of Dalton State College (DSC) on this issue. Scope The scope of this policy includes all DSC computing resources. Policy Internet peer-to-peer file sharing applications are frequently used to distribute copyrighted materials such as music, motion pictures, and computer software. Such exchanges are illegal and are not permifted on Dalton State Gollege computers or network. See the standards outlined in the Appropriate Use Policy. DSG Procedures and Sanctions Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas, and the secure environment for creating and maintaining information property, and subjects one to discipline. Any user of any DSC system found using lT resources for unethical and/or inappropriate practices has violated this policy and is subject to disciplinary proceedings including suspension of DSC privileges, expulsion from school, termination of employment and/or legal action as may be appropriate. Although all users of DSC's lT resources have an expectation of privacy, their right to privacy may be superseded by DSC's requirement to protect the integrity of its lT resources, the rights of all users and the property of DSC and the State.
    [Show full text]
  • Assessing the Economic Potential of 10G NETWORKS
    TELECOM ADVISORY SERVICES Assessing the Economic Potential of 10G NETWORKS OCTOBER 2020 AUTHORS RAUL KATZ (Ph.D., Management Science and Political Science, Massachusetts Institute of Technology) is currently Director of Business Strategy Research at the Columbia Institute for Tele-Information, and President of Telecom Advisory Services, LLC (URL: www.teleadvs.com). Before founding Telecom Advisory Services, he worked for twenty years at Booz Allen Hamilton, where he was the Head of the Telecommunications Practice in North and Latin America and member of its Leadership Team. MR. FERNANDO CALLORDA (BA, MA, Economics, Universidad de San Andres-Argentina) is a Project Manager at Telecom Advisory Services, LLC and Research Fellow in the National Network of Public Universities in Argentina. He is also a professor of Political Economy at UNLAM and has taught courses of finance in regulated industries. Telecom Advisory Services LLC (TAS) is an international consulting firm specialized in the development of business strategies and public policies for digital and telecommunications companies, governments, and international organizations. Its clients include leading companies in the digital and telecommunications sectors, as well as international organizations such as the International Telecommunications Union, the World Bank, the Inter-American Development Bank, the World Economic Forum, the UN Economic Commission for Latin America and the Caribbean, the GSMA Association, the CTIA, the NCTA, GigaEurope, the Wi-Fi Alliance, and the FTTH Council (Europe).
    [Show full text]
  • Declaratory Ruling
    Federal Communications Commission DA 21-78 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Accelerating Wireline Broadband Deployment by ) WC Docket No. 17-84 Removing Barriers to Infrastructure Investment ) DECLARATORY RULING Adopted: January 19, 2020 Released: January 19, 2021 By the Chief, Wireline Competition Bureau I. INTRODUCTION 1. Closing the digital divide and delivering the benefits of broadband to all Americans remains the Commission’s top priority. The COVID-19 pandemic has served to highlight the essential nature of a robust communications infrastructure in promoting access to healthcare, employment, education opportunities, and social connectivity, including civic and religious institutions, as well as family and friends. As part of its efforts to close the digital divide and further broadband deployment, the Commission has undertaken a series of reforms of its pole attachment rules with the aim of making access to this critical infrastructure faster, easier, safer, more predictable, and more affordable.1 Most notably, in August 2018, the Commission adopted the 2018 Wireline Infrastructure Order, which eliminated barriers to broadband deployment by streamlining the process for attaching new communications facilities to utility poles and reducing associated costs.2 2. In July 2020, NCTA — The Internet & Television Association filed a Petition for Expedited Declaratory Ruling (NCTA Petition) seeking clarification of certain issues related to pole replacements.3 In particular, NCTA requested that the Commission clarify that in unserved areas, it is unjust and unreasonable for pole owners to shift all pole replacement costs to new attachers.4 We decline to act on NCTA’s Petition at this time.
    [Show full text]
  • INTERNET ACCESS VIA CABLE TV: HIGH SPEED ACCESS to the INFORMATION HIGHWAY Lynn Jones Digital Equipment Corporation
    INTERNET ACCESS VIA CABLE TV: HIGH SPEED ACCESS TO THE INFORMATION HIGHWAY Lynn Jones Digital Equipment Corporation Abstract countries around the world. In early 1994, it was estimated that on the average, a new Internet access has become a feeding frenzy. computer was added to the Internet every 30 Dial-up access to the World Wide Web just seconds.ii The growth of the Internet contin­ isn't fast enough. Your subscribers know ues to be exponential. that cable TV can give them access to hyper­ text at the speed of a bullet train, and they The cable TV industry has the capability want it. Now what do you do? to provide subscribers with Internet access at speeds unmatched in price/performance by How do you separate the hype from the hy­ any other medium. Using the ubiquitous, ex­ pertext? For that matter, what is hypertext? isting Hybrid Fiber Coax (HFC) infrastructure This paper will answer these questions and in place in the US, Canada, and many coun­ more, providing a framework within which tries around the world today, the cable indus­ to plan and implement Internet access on try can give customers high speed access at a your system. It will give you a crash course much lower cost - a key criteria for Internet on the Internet and show how the informa­ users. tion highway is being created today with the Internet and cable TV. Rapid access to and provision of pic­ tures, sound, video, audio, and integrated text and graphics are all made possible by access­ INTRODUCTION ing Internet sites on the World Wide Web, using a Web browser program from a personal "Internet over cable TV will receive more computer connected to the Internet via cable general press (Information Superhighway) television.
    [Show full text]
  • Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 in the Matter of Use of the 5.850-5.925 Ghz Band ET Docket
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ET Docket No. 19-138 Use of the 5.850-5.925 GHz Band COMMENTS OF NCTA – THE INTERNET & TELEVISION ASSOCIATION Rick Chessen Paul Margie Neal Goldberg Jason Neal Danielle Piñeres HARRIS, WILTSHIRE & GRANNIS LLP NCTA – THE INTERNET & 1919 M Street NW TELEVISION ASSOCIATION 8th Floor 25 Massachusetts Avenue NW Washington, DC 20036 Suite 100 (202) 730-1300 Washington, DC 20001 (202) 222-2445 Counsel for NCTA June 2, 2021 TABLE OF CONTENTS I. INTRODUCTION AND SUMMARY ........................................................................................... 1 II. THE COMMISSION CORRECTLY DETERMINED THAT OPENING THE 5.9 GHZ BAND TO UNLICENSED TECHNOLOGIES WILL IMPROVE CONSUMER BROADBAND. ............................ 2 A. The First Report and Order Found that 5.9 GHz Unlicensed Spectrum Will Facilitate Access to a 160-Megahertz Channel for Next-Generation Wi-Fi, Including Through Upgrades to Existing Equipment. ............................................ 2 B. Consumer Demand for Additional Wi-Fi Spectrum Continues to Grow as the Nation Responds to the Public Health Crisis. ......................................................... 4 III. THE COMMISSION SHOULD ADOPT RULES THAT PERMIT ROBUST OUTDOOR INVESTMENT AND DEPLOYMENT. ........................................................................................ 5 A. The Commission Should Adopt NTIA’s Proposed Exclusion Zones for 36 dBm EIRP Outdoor Unlicensed Operations. ....................................................
    [Show full text]
  • The Future of Cable Television Audio Is Accessible
    The Future of Cable Television Audio is Accessible A Technical Paper prepared for SCTE•ISBE by Mark Francisco Fellow Comcast Cable 1800 Arch Street Philadelphia, PA 19103 (215)286-8959 [email protected] © 2020 SCTE•ISBE and NCTA. All rights reserved. 1 Table of Contents Title Page Number 1. Introduction .......................................................................................................................................... 3 2. What we must do – Regulations for MVPDs and Broadcasters ......................................................... 3 3. Conventions in Cable Television Audio .............................................................................................. 4 3.1. Retransmission....................................................................................................................... 4 3.2. Conventions in Streaming Media Provider Audio .................................................................. 5 3.3. Conventions in Cable Television Broadcast Programming .................................................... 5 4. Where Do We Go From Here .............................................................................................................. 7 4.1. The United Nations Already Solved This Problem ................................................................. 7 4.2. Accessibility is About More Than Just Content Signaling ...................................................... 7 4.3. The Future of Over-the-Air Broadcasting ..............................................................................
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]