TRUST on the LINE a Philosophical Exploration of Trust in the Networked Era

Total Page:16

File Type:pdf, Size:1020Kb

TRUST on the LINE a Philosophical Exploration of Trust in the Networked Era TRUST ON THE LINE A philosophical exploration of trust in the networked era. ONLINE VERTROUWEN ONDER DRUK Een filosofisch onderzoek naar vertrouwen in het netwerktijdperk. Thesis to obtain the degree of Doctor from the Erasmus University Rotterdam by command of the rector magnificus Prof.dr. H.A.P. Pols and in accordance with the decision of the Doctorate Board. The public defense shall be held on Thursday, 21 April 2016 at 13.30 hours by Esther Lieve Omer Keymolen born in Sint-Niklaas, Belgium. Doctoral Committee Promotors: Prof.dr. J. de Mul Prof.dr. V.A.J. Frissen Other members: Prof.dr. M. Hildebrandt Prof.dr. S. van der Hof Prof.dr. P.P.C.C. Verbeek TRUST ON THE LINE A philosophical exploration of trust in the networked era. This research was supported by TNO Printing CPI Koninklijke Wöhrmann Design Tiemen Seinstra © Esther Keymolen Dankwoord Dit proefschrift heeft niet alleen mij, maar ook een heleboel andere mensen bezig gehouden. Mijn dank gaat uit naar de oud-collega’s van de WRR die mijn wens om te doctoreren altijd hebben gesteund. In het bijzonder dank ik Anne-Greet voor de aanmoedigingen en Corien die niet alleen de praktische proefschriftmolen in gang zette, maar mij ook inspireert als vrouw in de academie. Dennis, die de categorie van oud-collega al lang is ontstegen, dank ik voor de vriendschap, de gesprekken aan de keukentafel, niet te vergeten samen met Linnet –dank Linnet!-, en voor het vakkundig schrappen van de helft van een hoofdstuk. Ik dank TNO voor het mogelijk maken van dit proefschrift en de faculteit Wijsbegeerte, in het bijzonder de vakgroep Mens en Cultuur waarbinnen ik de ruimte en tijd kreeg om mijn eigen onderzoek vorm te geven. Ik dank al mijn Rotterdamse collega’s voor hun interesse en hulp en zeker ook de promovendi-groep waarin ik mijn werk mocht presenteren. In het bijzonder dank ik mijn kamergenoot Rolf voor de immer inspirerende gesprekken én voor het verzinnen van de titel van dit boek! Zo ook dank ik Awee voor de filosofische gesprekken die mijn denken hebben gescherpt en om mij de kans te geven de liefde voor de techniekfilosofie te delen met studenten. Dat mijn twee promotoren Jos en Valerie een proefschrift over vertrouwen relevant genoeg vonden is enigszins verwonderlijk aangezien zij daarover–zo heb ik mogen ondervinden- duidelijk alles al weten! Dank jullie wel voor het onwrikbaar vertrouwen in mij, de vrijheid die ik heb gekregen om mijn ideeën vorm te geven en de begeleiding daar vervolgens bij. Dank voor jullie ontspannenheid die mijn innerlijke controle-freak enigszins wist te sussen (niet volledig, natuurlijk) en voor de gezamenlijke congresbezoeken en projecten. Ik kijk al uit naar nieuwe samenwerkingsverbanden in de toekomst! Van het ene warme bad in het andere! Wat een geluk. Ik dank al mijn eLaw collega’s aan de Universiteit Leiden voor het hartelijke welkom anderhalf jaar geleden. Met jullie samenwerken is enorm inspirerend en het was een ontzettend goede stimulans om er bij het schrijven de vaart in te houden. Ik dank in het bijzonder Simone voor de kans om samen het Advanced master programma verder te ontwikkelen en voor de vrijheid om mijn eigen academische weg te vinden. Dit boek was bijna op losse A4’tjes in Comic Sans bij elkaar geniet tot jullie gekomen, ware het niet dat Lisa daar een stokje voor stak en de lay-out van de tekst voor haar rekening nam. Dank! De prachtige cover en dito boeklegger dank ik aan Tiemen. Het oog wil tenslotte ook wat. Shazade Jameson dank ik voor het nalopen van het Engels. ‘Oude’ vriendinnen die zich niet lieten afschrikken door mijn filosofische aspiraties: Mieke, Jurith, Jona en Sonja, dank jullie wel voor jullie vriendschap, steun, koffie, wijntjes, chocolade en taart op zijn tijd. Als ik weer eens mezelf aan het voorbij rennen was, kon ik me bij jullie altijd terugvinden. Hoewel het proefschrift een heel groot deel van mijn aandacht heeft opgeslokt de afgelopen jaren, bleken er toch mensen te zijn die zich daar niet door lieten weerhouden en nu deel uitmaken van mijn leven. Hulde! Ik ben ontzettend blij en vereerd jullie tot mijn vrienden te mogen rekenen. Anna, Petra en Jacqueline; zonder jullie was het een stuk minder leuk geweest. Het stelt me enorm gerust dat ik tijdens de verdediging hen aan mijn zijde heb als paranimfen: Sem en Bibi! Sems kritisch meedenken –al dan niet onder de geneugten van een hapje en een drankje- en humor bleken een noodzakelijke voorwaarde voor het slagen van dit boek. Bibi is ‘buiten categorie’ en aan haar zou een heel dankwoord gewijd kunnen worden. Vriendin, collega en zo vertrouwd als familie. Ik kijk uit naar alles wat nog op ons pad komt (‘en hunnie zijn @#$%’ ;-). Ik dank mijn familie die –over de landsgrenzen heen- altijd in mij geloofd heeft: mijn moeder Karin en zus Ellen. Dichterbij huis, de familie Hemmes en familie Naaborg en dan zeker opa Fred die trouw door weer en wind kleinkinderen ophaalt en natuurlijk ook tante Jacqueline voor haar sprankelende zelf. Tenslotte draag ik dit proefschrift op aan de liefste mensen ter wereld: Rogier, Hannah en Nina. Niemand kent mij beter dan Rogier. Ik heb het boek dan wel geschreven, zijn liefde en vertrouwen hebben het mogelijk gemaakt. Hannah en Nina, met jullie ontdek ik de wereld helemaal opnieuw. Daar kan geen boek tegenop. Contents 1 Introduction: Philosophy begins in wonder. 10 1.1 Research on trust: Pandora’s box 13 1.2 Guido Möllering. Trust: reason, routine, reflexivity 15 1.3 e-Trust 19 1.4 The Internet 23 1.5 Outline 26 2 The concept of trust. 30 2.1 Introducing Niklas Luhmann 31 2.2 Luhmann’s theory of trust 33 2.3 Trust: bridging the hiatus 45 2.4 Helmuth Plessner and philosophical anthropology 48 2.5 Three times in a row: Positionality 51 2.6 An anthropological perspective on trust 58 3 System trust in late modernity. 61 3.1 Introducing: system trust 63 3.2 System trust and late modernity 66 3.3 Trust: The interaction between system trust, interpersonal trust, and familiarity in late modernity 74 3.4 Conclusion 85 4 The Internet: A familiar world? 87 4.1 A short history of the Internet 89 4.2 The Internet as a layered infrastructure 95 4.3 A new online reality 101 4.4 Conclusion 115 5 Trust in context: a theory of mediation. 117 5.1 Human beings, technology, and environment 119 5.2 The networked era 124 5.3 Artificial by nature in the networked era 131 5.4 Artificial by nature in the networked era: some challenges for trust 142 5.5 Mediated immediacy in the networked era 144 5.6 Mediated immediacy in the networked era: some challenges for trust 152 5.7 Utopian standpoint 155 5.8 Utopian standpoint: Challenges for trust in the networked era 158 5.9 Conclusion: challenges for trust 162 6 Open Sesame. When your phone becomes your key. 166 6.1 The hotel key and a cumbersome but handy key chain 168 6.2 When a key becomes a card 174 6.3 When a keycard becomes a smartphone 178 6.4 Conclusion 195 7 Interpersonal system trust in Airbnb. 197 7.1 What is collaborative consumption? 200 7.2 Airbnb 205 7.3 Context 207 7.4 Construction 211 7.5 Curation 214 7.6 Codification 218 7.7 Conclusion: Why the sharing economy is not just about you and me 224 8 A too familiar world. 226 8.1 Construction 229 8.2 Curation 232 8.3 Codification 234 8.4 Context 238 8.5 A familiar world 242 8.6 Profiling 244 8.7 A too familiar world online 246 8.8 Challenges for trust 247 9 Epilogue 252 10 Bibliography 257 11 Samenvatting 287 12 About the author 291 1 Introduction: Philosophy begins in wonder. You wake up and for another 5 minutes you stay in the warmth of your bed to check the latest news on your smartphone. You see the headline about the Snowden revelations and read that the NSA –the U.S.A.’s National Security Agency- has compromised the backbone of the Internet, constructing secret back doors to enable them to eavesdrop on literally everybody. Although the scope of the surveillance seems to be much bigger than most experts had expected, you cannot say you are surprised –this is what secret intelligence services do, right? - You leave the news app to look at today’s weather forecast. In the tube, on your way to work, you check your Facebook page and like a few of the messages some of your 436 friends have posted. Next, you go to your Linkedin- app and accept the pending requests to connect. Some of these people you only know vaguely, but they can become an interesting connection, you never know. At work, you log in on the company’s network. Before starting your busy day in the office, you quickly go to the website of your bank. You want to wire the money for a theatre ticket your friend has bought for you in advance. You log in with your username and password and verify if the green icon is visible in your browser to ascertain the trustworthiness of the connection. To be honest, you feel pretty good about doing that. You will not be fooled by any smart-ass cybercriminal pretending he –they are often male- is your bank, filching your log-in credentials. Also, the e-mails from the Nigerian prince who regularly contacts you to ask for your help with his enormous inheritance, you delete without a second thought.
Recommended publications
  • Internet Protocol Design 12 Networking Truths
    HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Internet Design Principles Protocol Design © 2009 Jörg Ott & Carsten Bormann 1 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Origin of Packet Switching Concepts show up in the early 1960s Devised by multiple, largely independent groups Paul Baran, Leonard Kleinrock, Donald Davies, Roger Scantlebury ARPANET Development sponsored by DARPA Motivated by considerations of fail-safe networks Applications shall not depend on individual elements in the networks Clearly based on quite some military thinking in general But: NOT a particular response to a Soviet nuclear threat © 2009 Jörg Ott & Carsten Bormann 2 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Initial ARPANET (1969) UCSB SRI 56kbit/s Digital lines UCLA Univ Utah © 2009 Jörg Ott & Carsten Bormann 3 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Common Goals for Early Internet Design Scientists interested in sharing and accessing (computing) resources Scientists and engineers interested in building an infrastructure to interconnect all computers in the world and make it work Designers, users, and operators: common vision and spirit © 2009 Jörg Ott & Carsten Bormann 4 HELSINKI UNIVERSITY OF TECHNOLOGY DEPARTMENT OF COMMUNICATIONS AND NETWORKING Some Aspects of the Internet Design Philosophy “Has evolved considerably from the first proposal to the current standards…” Dave Clark, 1988 © 2009 Jörg Ott & Carsten
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • Abbate Ch1-2
    6 Introductum Wide Web are prominent examples of informally created applications that became popular, not as the result of some central agency's mar­ Heat and ,-,UIH..4< keting plan, but through the spontaneous decisions of thousands of a.ndMeanings of Hacket(Switching independent users. In reconstructing the history of the Internet, I have been struck time and again by. the unexpected twists and turns its development has taken. Often a well-laid plan was abandoned after a short time and replaced by a new approach from an unexpected quarter..Rapid advances, such as the introduction of personal computers and the invention of local-area networks, continually threatened to make existing network technologies obsolete. In addition, responsibility for operating the Internet changed hands several times over the course Of all the ARPANET's technical innovations, perhaps the most cele­ of its first thirty years or so. How, in the face of all this change and brated was packet switching. Packet switching was an experimental, uncertainty, did the system survive and even flourish? I believe that even controversial method for transmitting data across a network. Its the key to the Internet's success was a commitment to flexibility and proponents claimed that it would increase the efficiency, reliability, and diversity, both in technical design and in organizational culture. No speed of data communications, butit was also quite complex to imple­ one could predict the specific changes that would revolutionize the ment, and some communications experts argued that the technique computing and communications industries at the end of the twentieth would never work.
    [Show full text]
  • The First 31 Years of the Internet -- an Insider's View. Bob Braden
    The First 31 Years of the Internet -- An Insider’s View. Bob Braden USC Information Sciences Institute May 3, 2001 Bob Braden -- 3 May 2001 1 Outline A. Historical Overview o 1961 - 1968: Pre-history o 1969 - 1973: ARPAnet research period o 1974 - 1983: Internet Research Period o 1984 - 1990: Academic Internet o 1990 - ??: Commercial (and Popular) Internet B. The Internet Architecture C. Conclusions and Challenges Bob Braden -- 3 May 2001 2 1961 - 1968: Pre-History MIT: Len Kleinrock, J. C. R. Licklider, Larry Roberts o Kleinrock: Paper on theory of packet switching, 1961 o Licklider: Memos on "Galactic Network", 1962 o Roberts: Plan for the "ARPANET", 1967 Rand: Paul Baran Report on packet switching for secure voice, 1964 NPL (UK): Donald Davies & Roger Scantlebury: Paper on a packet-switching network, 1967 IRIA (France): Louis Pouzin -- Cyclades Bob Braden -- 3 May 2001 3 1969 - 1973: ARPAnet Research Period o ARPAnet: a prototype packet-switching network. -- The unit of multiplexing is a packet of data, bearing a destination address. -- Packet switches ("IMPs") : Minicomputers -- DDP 316, 516 -- High-speed leased lines (56Kbps) -- Distributed adaptive routing algorithm ARPA selected Bolt, Beranek, and Newman (BBN) to design, build, and operate the IMPs and the ARPAnet infrastructure. Bob Braden -- 3 May 2001 4 ARPAnet Protocols o IMP-Host Interface: defined by BBN Report 1822 >> Bit-serial o Communication Service: Reliable delivery to a specified host system of a message of arbitrary bit length. -- I.E., a “reliable datagram” service -- The 8-bit byte not universal yet; computers used 8, 12, 16, 18, 24, 32, 36, 48, ..
    [Show full text]
  • PSOC Tutorial Paper 1 About Layers, More Or Less John Day and Eduard
    About Layers, More or Less John Day and Eduard Grasa Jan 2016 In the ETSI ISG meeting 21 Jan 16, Andy Sutton presented a few slides that sparked considerable discussion on the number of layers and header overhead. As well it might, given that one of the examples showed 8 layers below IP! (Andy’s example is not unique, I have seen them more than once over the last 25 years.) Given that we talked about a recursive architecture, which may have “as many layers as necessary,” this may sound a bit daunting. It is probably worthwhile to explore this. 1. Background on Layers 1.1 Layers in Operating Systems Users First, let us review what we know about layers. The concept of layering first appeared in Dykstra’s paper on the THE User Operating System [1968].1 THE was structured into a stack of Programs layers. Each layer was essentially a black box that used the services of the layer below and provided a service to the layer I/O above but hid its internal workings, so that they could be Console changed without disturbing the adjacent layers. Dykstra said Communications that once a function was provided it didn’t need to be repeated. This idea captured the imagination of early systems Memory designers. It was simple, elegant and brought order to what Management had not been very ordered. Operating Systems were the most Multi- complex software of the day. This was also the period when programming OSs were moving from polled to interrupt driven. Consequently, there were a lot of parallels between the Figure 1.
    [Show full text]
  • Workflow Management Systems Supporting the Engineering of Business Networks
    Workflow Management Systems Supporting the Engineering of Business Networks DIOGO MANUEL RIBEIRO FERREIRA Workflow Management Systems Supporting the Engineering of Business Networks Dissertação apresentada à Faculdade de Engenharia da Universidade do Porto para a obtenção do grau de Doutor em Engenharia Electrotécnica e de Computadores realizada sob a orientação científica do Doutor João José da Silva e Cunha Pinto Ferreira, Professor Associado da Faculdade de Engenharia da Universidade do Porto DEPARTAMENTO DE ENGENHARIA ELECTROTÉCNICA E DE COMPUTADORES FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO 2004 Esta dissertação foi apreciada a 17 de Fevereiro de 2004, na Sala de Actos da Faculdade de Engenharia da Universidade do Porto, e aprovada por unanimidade pelo júri com a seguinte constituição: Presidente: Doutor José Manuel de Araújo Baptista Mendonça, Professor Catedrático da Faculdade de Engenharia da Universidade do Porto Vogais: Doutor Nuno Manuel de Carvalho Ferreira Guimarães, Professor Catedrático da Faculdade de Ciências da Universidade de Lisboa Doutor Francisco Coelho Soares de Moura, Professor Associado da Escola de Engenharia da Universidade do Minho Doutor João José da Cunha e Silva Pinto Ferreira, Professor Associado da Faculdade de Engenharia da Universidade do Porto Doutor Américo Lopes Azevedo, Professor Auxiliar da Faculdade de Engenharia da Universidade do Porto Doutor João Carlos Pascoal de Faria, Professor Auxiliar da Faculdade de Engenharia da Universidade do Porto ISBN 972-9051-32-1 Cover design: CAETSU Publicidade S.A. First printing: July 2003 Second printing: March 2004 Printed in Portugal This document contains information about software products, components, and technologies. In most cases, the names of commercial products are registered trademarks of their respective vendors.
    [Show full text]
  • Table of Contents
    Table of Contents Computer Networking A Top-Down Approach Featuring the Internet James F. Kurose and Keith W. Ross Preface Link to the Addison-Wesley WWW site for this book Link to overheads for this book Online Forum Discussion About This Book - with Voice! 1. Computer Networks and the Internet 1. What is the Internet? 2. What is a Protocol? 3. The Network Edge 4. The Network Core ■ Interactive Programs for Tracing Routes in the Internet ■ Java Applet: Message Switching and Packet Switching 5. Access Networks and Physical Media 6. Delay and Loss in Packet-Switched Networks 7. Protocol Layers and Their Service Models 8. Internet Backbones, NAPs and ISPs 9. A Brief History of Computer Networking and the Internet 10. ATM 11. Summary 12. Homework Problems and Discussion Questions 2. Application Layer 1. Principles of Application-Layer Protocols 2. The World Wide Web: HTTP 3. File Transfer: FTP 4. Electronic Mail in the Internet file:///D|/Downloads/Livros/computação/Computer%20Netw...20Approach%20Featuring%20the%20Internet/Contents-1.htm (1 of 4)20/11/2004 15:51:32 Table of Contents 5. The Internet's Directory Service: DNS ■ Interactive Programs for Exploring DNS 6. Socket Programming with TCP 7. Socket Programming with UDP 8. Building a Simple Web Server 9. Summary 10. Homework Problems and Discussion Questions 3. Transport Layer 1. Transport-Layer Services and Principles 2. Multiplexing and Demultiplexing Applications 3. Connectionless Transport: UDP 4. Principles of Reliable of Data Transfer ■ Java Applet: Flow Control in Action 5. Connection-Oriented Transport: TCP 6. Principles of Congestion Control 7. TCP Congestion Control 8.
    [Show full text]
  • Computer Networking a Top-Down Approach 6Th Edition
    COMPUTER SIXTH EDITION NETWORKING A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Art Director, Cover: Anthony Gemmellaro Marcia Horton Art Coordinator: Janet Theurer/ Editor in Chief: Michael Hirsch Theurer Briggs Design Editorial Assistant: Emma Snider Art Studio: Patrice Rossi Calkin/ Vice President Marketing: Patrice Jones Rossi Illustration and Design Marketing Manager: Yez Alayan Cover Designer: Liz Harasymcuk Marketing Coordinator: Kathryn Ferranti Text Designer: Joyce Cosentino Wells Vice President and Director of Production: Cover Image: ©Fancy/Alamy Vince O’Brien Media Editor: Dan Sandin Managing Editor: Jeff Holcomb Full-Service Vendor: PreMediaGlobal Senior Production Project Manager: Senior Project Manager: Andrea Stefanowicz Marilyn Lloyd Printer/Binder: Edwards Brothers Manufacturing Manager: Nick Sklitsis Cover Printer: Lehigh-Phoenix Color Operations Specialist: Lisa McDowell This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the pub- lisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or like- wise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290.
    [Show full text]
  • Internet Design Principles
    HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY Internet Design Principles Protocol Design – S-38.3157 © 2006 Jörg Ott & Carsten Bormann 1 HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY Origin of Packet Switching ` Concepts show up in the early 1960s ` Devised by multiple, largely independent groups y Paul Baran, Leonard Kleinrock, Donald Davies, Roger Scantlebury ARPANET ` Development sponsored by DARPA ` Motivated by considerations of fail-safe networks ` Applications shall not depend on individual elements in the networks y Clearly based on quite some military thinking in general y But: NOT a particular response to a Soviet nuclear threat © 2006 Jörg Ott & Carsten Bormann 2 HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY Initial ARPANET (1969) UCSB SRI 56kbit/s Digital lines UCLA Univ Utah © 2006 Jörg Ott & Carsten Bormann 3 HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY Common Goals for Early Internet Design ` Scientists interested in sharing and accessing (computing) resources ` Scientists and engineers interested in building an infrastructure to interconnect all computers in the world and make it work ` Designers, users, and operators: common vision and spirit © 2006 Jörg Ott & Carsten Bormann 4 HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY Some Aspects of the Internet Design Philosophy “Has evolved considerably from the first proposal to the current standards…” Dave Clark, 1988 © 2006 Jörg Ott & Carsten Bormann 5 HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY Initial Terminology
    [Show full text]
  • Name: Andrew Lewis Course: CS
    Name: Andrew Lewis Course: CS 125 - Computer Networks Abstract Due Date: 9th September 2018 Date: 9th September 2018 Article Title: Brief History of the Internet Article: https://www.internetsociety.org/internet/history-internet/brief-history-internet/ The paper, 'A Brief History of the Internet' explores the topic of the internet from its origins and initial concepts, to its commercialization and future development. I found it to be an insightful overview of the subject and rewarding to read. The paper starts by explaining the origins of the internet through the first computer network. The computers were linked through a low speed telephone line. This was shown to be inad- equate for the job, and that a new technology (IMP packet switching) would be necessary. However it served as proof that computer networks were possible. Following from this, the first true computer system named ARPANET came into existence. When ARPANET was started around July 1968, the line speeds between sites was 50kbps using Leonard Klein- rocks theory of packet switching and Interface Message Processors (IMP). Soon more and more computers were added to the network at various universities in the US. By 1972 the network had grown greatly in size and presented at the International Computer Communica- tion Conference (ICCC). This was a great success and with the creation of email applications ARPANET started to resemble the internet as we know it today. The next two paragraphs focus on the concepts of the internet and how these concepts were proved. Of this, the four ground-rules that Bob Kahn laid out are especially important.
    [Show full text]
  • Interview of Donald Davies
    Interview of Donald Davies Interviewed by: James L. Pelkey Recorded May 27, 1988 London, England CHM Reference number: X5671.2010 © 2010 James L. Pelkey/Computer History Museum Interview of Donald Davies James Pelkey: How did you come to be involved with packet switching? Donald Davies: I have a very long history in the computer business. So I really hardly have to explain how I came to be talking with Larry Roberts, but it began in 1965, when the International Federation for Information Processing, the IFIP, conference was held in New York. At that time everyone was talking about Project MAC at MIT, and timesharing was all in the news. I'm not sure I met Larry Roberts actually on that visit. I certainly met some of his colleagues at MIT, and we talked, just a little bit, about the communications business, associated with timesharing, but not in great seriousness. On the way back, I happened to meet a friend called Brian Shackel, who suggested that we arrange a meeting at my laboratory, the National Physical Laboratory, so he could get some Project MAC people over to talk to us about this project. We did this. We held a two-day seminar, November 2nd & 3rd of 1965. Larry Roberts was one of the people present, and also a number of other people from MIT. We were talking not so much about communications, but about the concept of timesharing and how it affects the way you do computing and that sort of thing. The communications aspects had interested me, because I had a history of interest in telephone switching and things like that.
    [Show full text]
  • Catalysts for Change
    CHAPTER 1 Catalysts for Change A tourist came in from Orbitville, parked in the air, and said: The creatures of this star are made of metal and glass. Through the transparent parts you can see their guts. Their feet are round and roll on diagrams of long measuring tapes, dark with white lines. They have four eyes. The two in back are red. Sometimes you can see a five-eyed one, with a red eye turning on the top of his head. He must be special— the others respect him and go slow when he passes, winding among them from behind. 2 Chapter 1 Catalysts for Change They all hiss as they glide, like inches, down the marked tapes. Those soft shapes, shadowy inside the hard bodies—are they their guts or their brains? —May Swenson, “Southbound on the Freeway”1 1.1 Introduction Most of us who live in Western democratic nations take technological change for granted. In the past two decades alone, we have witnessed the emergence of exciting new technologies, including cell phones, MP3 players, digital photography, email, and the World Wide Web. There is good reason to say we are living in the Infor- mation Age. Never before have so many people had such easy access to information. The two principal catalysts for the Information Age have been low-cost computers and high- speed communication networks (Figure 1.1). Even in a society accustomed to change, the rate at which computers and communication networks have transformed our lives is breathtaking. In 1950 there were no more than a handful of electronic digital computers in the world.
    [Show full text]