Sie sind auf Seite 1von 437

Internet

PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Thu, 13 Dec 2012 05:08:40 UTC

Contents
Articles
Overview
Internet History of the Internet World Wide Web History of the World Wide Web 1 1 17 42 54 61 61 62 71 73 75 76 77 88 91 95 111 119 119 121 132 151 170 174 182 192 197 197 203 221 223

Precursors and early development


Intergalactic Computer Network ARPANET CSNET ENQUIRE IPPS MILNET NFSNET TELENET UUCP USENET X.25

Today's Internet
"Internet" or "internet"? Internet Protocol Suite Internet access Broadband Internet access Languages used on the Internet List of countries by number of Internet subscriptions List of countries by number of broadband Internet subscriptions Internet governance

Common uses
Timeline of popular Internet services Email Web content File sharing

Search Blogging Microblogging Social networking Remote access Collaborative software Internet phone Internet radio Internet television

228 236 250 253 273 273 283 297 302 308 308 312 325 332 372 372 380 386 388 391 403 403

Social impact
Sociology of the Internet Internet censorship Internet censorship circumvention Internet censorship by country

Organizations
Internet Corporation for Assigned Names and Numbers Internet Society Internet Architecture Board Internet Engineering Task Force Internet Governance Forum

People
Internet pioneers

References
Article Sources and Contributors Image Sources, Licenses and Contributors 416 428

Article Licenses
License 434

Overview
Internet
The Internet (or internet) is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email. Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV). Newspaper, book and other print publishing are adapting to Web site technology, or are reshaped into blogging and web feeds. The Internet has enabled and accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries. The origins of the Internet reach back to research of the 1960s, commissioned by the United States government to build robust, fault-tolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of June 2012, more than 2.4 billion peoplenearly a third of the world's human populationhave used the services of the Internet.[1] The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

Terminology
Internet is a short form of the technical term internetwork,[2] the result of interconnecting computer networks with special gateways or routers. Historically the word has been used, uncapitalized, as a verb and adjective since 1883 to refer to interconnected motions. It was also used from 1974 before the Internet, uncapitalized, as a verb meaning to connect together, especially for networks.[3] The Internet is also often referred to as the Net. The Internet, referring to the specific entire global system of IP networks, is a proper noun and written with an initial capital letter. In the media and common use it is often not capitalized: "the internet". Some guides specify that the word should be capitalized as a noun but not capitalized as an adjective.[4] The terms Internet and World Wide Web are often used interchangeably in everyday speech; it is common to speak of going on the Internet when invoking a browser to view Web pages. However, the Internet is a particular global computer network connecting millions of computing devices; the World Wide Web is just one of many services

Internet running on the Internet. The Web is a collection of interconnected documents (Web pages) and other resources, linked by hyperlinks and URLs.[5] In addition to the Web, a multitude of other services are implemented over the Internet, including e-mail, file transfer, remote computer control, newsgroups, and online games. Web (and other) services can be implemented on any intranet, accessible to network users.

History
Research into packet switching started in the early 1960s and packet switched networks such as Mark I at NPL in the UK,[6] ARPANET, CYCLADES,[7][8] Merit Network,[9] Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks thanks to the work of British scientist Donald Davies whose ground-breaking work on Packet Switching was essential to the system.[10] The first two nodes of what would become the ARPANET were interconnected between Leonard Kleinrock's Network Measurement Center at the UCLA's School of Engineering and Applied Science and Douglas Engelbart's NLS Professor Leonard Kleinrock with system at SRI International (SRI) in Menlo Park, California, on 29 October the first ARPANET Interface 1969.[11] The third site on the ARPANET was the Culler-Fried Interactive Message Processors at UCLA Mathematics center at the University of California at Santa Barbara, and the fourth was the University of Utah Graphics Department. In an early sign of future growth, there were already fifteen sites connected to the young ARPANET by the end of 1971.[12][13] These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing. Early international collaborations on ARPANET were sparse. For various political reasons, European developers were concerned with developing the X.25 networks.[14] Notable exceptions were the Norwegian Seismic Array (NORSAR) in June 1973,[15] followed in 1973 by Sweden with satellite links to the Tanum Earth Station and Peter T. Kirstein's research group in the UK, initially at the Institute of Computer Science, University of London and later at University College London. In December 1974, RFC 675 Specification of Internet Transmission Control Program, by Vinton Cerf, Yogen Dalal, and Carl Sunshine, used the term internet, as a shorthand for internetworking; later RFCs repeat this use, so the word started out as an adjective rather than the noun it is today.[16] Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET). In 1982, the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.

T3 NSFNET Backbone, c. 1992

TCP/IP network access expanded again in 1986 when the National Science Foundation Network (NSFNET) provided access to supercomputer sites in the United States from research and education organizations, first at 56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s.[17] Commercial internet service providers (ISPs) began to emerge in the late 1980s and early 1990s. The ARPANET was decommissioned in 1990. The Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.[18] The Internet started a rapid expansion to Europe and Australia in the mid to late 1980s[19][20] and to Asia in the late 1980s and early 1990s.[21]

Internet

Since the mid-1990s the Internet has had a tremendous impact on culture and commerce, including the rise of near instant communication by email, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web[22] with its discussion forums, blogs, social networking, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.[23]

During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%.[24] This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary open nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network.[25] As of 31 March 2011, the estimated total number of Internet users was 2.095billion (30.2% of world population).[26] It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way telecommunication, by 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.[27]

This NeXT Computer was used by Sir Tim Berners-Lee at CERN and became the world's first Web server.

Technology
Protocols
The communications infrastructure of the Internet consists of its hardware components and a system of software layers that control various aspects of the architecture. While the hardware can often be used to support other software systems, it is the design and the rigorous standardization process of the software architecture that characterizes the Internet and provides the foundation for its scalability and success. The responsibility for the architectural design of the Internet software systems has been delegated to the As the user data is processed down through the protocol stack, each layer adds an Internet Engineering Task Force (IETF).[28] encapsulation at the sending host. Data is transmitted "over the wire" at the link The IETF conducts standard-setting work level, left to right. The encapsulation stack procedure is reversed by the receiving groups, open to any individual, about the host. Intermediate relays remove and add a new link encapsulation for retransmission, and inspect the IP layer for routing purposes. various aspects of Internet architecture. Resulting discussions and final standards are published in a series of publications, each called a Request for Comments (RFC), freely available on the IETF web site. The principal methods of networking that enable the Internet are contained in specially designated RFCs that constitute the Internet Standards. Other less rigorous documents are simply informative, experimental, or historical, or document the best current practices (BCP) when implementing Internet technologies.

Internet The Internet standards describe a framework known as the Internet protocol suite. This is a model architecture that divides methods into a layered system of protocols (RFC 1122, RFC 1123). The layers correspond to the environment or scope in which their services operate. At the top is the application layer, the space for the application-specific networking methods used in software applications, e.g., a web browser program. Below this top layer, the transport layer connects applications on different hosts via the network (e.g., clientserver model) with appropriate data exchange methods. Underlying these layers are the core networking technologies, consisting of two layers. The internet layer enables computers to identify and locate each other via Internet Protocol (IP) addresses, and allows them to connect to one another via intermediate (transit) networks. Last, at the bottom of the architecture, is a software layer, the link layer, that provides connectivity between hosts on the same local network link, such as a local area network (LAN) or a dial-up connection. The model, also known as TCP/IP, is designed to be independent of the underlying hardware, which the model therefore does not concern itself with in any detail. Other models have been developed, such as the Open Systems Interconnection (OSI) model, but they are not compatible in the details of description or implementation; many similarities exist and the TCP/IP protocols are usually included in the discussion of OSI networking. The most prominent component of the Internet model is the Internet Protocol (IP), which provides addressing systems (IP addresses) for computers on the Internet. IP enables internetworking and in essence establishes the Internet itself. IP Version 4 (IPv4) is the initial version used on the first generation of today's Internet and is still in dominant use. It was designed to address up to ~4.3billion (109) Internet hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion, which entered its final stage in 2011,[29] when the global address allocation pool was exhausted. A new protocol version, IPv6, was developed in the mid-1990s, which provides vastly larger addressing capabilities and more efficient routing of Internet traffic. IPv6 is currently in growing deployment around the world, since Internet address registries (RIRs) began to urge all resource managers to plan rapid adoption and conversion.[30] IPv6 is not interoperable with IPv4. In essence, it establishes a parallel version of the Internet not directly accessible with IPv4 software. This means software upgrades or translator facilities are necessary for networking devices that need to communicate on both networks. Most modern computer operating systems already support both versions of the Internet Protocol. Network infrastructures, however, are still lagging in this development. Aside from the complex array of physical connections that make up its infrastructure, the Internet is facilitated by bi- or multi-lateral commercial contracts (e.g., peering agreements), and by technical specifications or protocols that describe how to exchange data over the network. Indeed, the Internet is defined by its interconnections and routing policies.

Routing
Internet Service Providers connect customers (thought of at the "bottom" of the routing hierarchy) to customers of other ISPs. At the "top" of the routing hierarchy are ten or so Tier 1 networks, large telecommunication companies which exchange traffic directly "across" to all other Tier 1 networks via unpaid peering agreements. Tier 2 networks buy Internet transit from other ISP to reach at least some parties on the global
Internet packet routing is accomplished among various tiers of Internet Service Providers.

Internet Internet, though they may also engage in unpaid peering (especially for local partners of a similar size). ISPs can use a single "upstream" provider for connectivity, or use multihoming to provide protection from problems with individual links. Internet exchange points create physical connections between multiple ISPs, often hosted in buildings owned by independent third parties. Computers and routers use routing tables to direct IP packets among locally connected machines. Tables can be constructed manually or automatically via DHCP for an individual computer or a routing protocol for routers themselves. In single-homed situations, a default route usually points "up" toward an ISP providing transit. Higher-level ISPs use the Border Gateway Protocol to sort out paths to any given range of IP addresses across the complex connections of the global Internet. Academic institutions, large companies, governments, and other organizations can perform the same role as ISPs, engaging in peering and purchasing transit on behalf of their internal networks of individual computers. Research networks tend to interconnect into large subnetworks such as GEANT, GLORIAD, Internet2, and the UK's national research and education network, JANET. These in turn are built around smaller networks (see the list of academic computer network organizations). Not all computer networks are connected to the Internet. For example, some classified United States websites are only accessible from separate secure networks.

General structure
The Internet structure and its usage characteristics have been studied extensively. It has been determined that both the Internet IP routing structure and hypertext links of the World Wide Web are examples of scale-free networks.[31] Many computer scientists describe the Internet as a "prime example of a large-scale, highly engineered, yet highly complex system".[32] The Internet is heterogeneous; for instance, data transfer rates and physical characteristics of connections vary widely. The Internet exhibits "emergent phenomena" that depend on its large-scale organization. For example, data transfer rates exhibit temporal self-similarity. The principles of the routing and addressing methods for traffic in the Internet reach back to their origins in the 1960s when the eventual scale and popularity of the network could not be anticipated. Thus, the possibility of developing alternative structures is investigated.[33] The Internet structure was found to be highly robust[34] to random failures and very vulnerable to high degree attacks.[35]

Governance
The Internet is a globally distributed network comprising many voluntarily interconnected autonomous networks. It operates without a central governing body. However, to maintain interoperability, all technical and policy aspects of the underlying core infrastructure and the principal name spaces are administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN is the authority that coordinates the assignment of unique identifiers for use on the Internet, including domain names, Internet Protocol (IP) addresses, application port ICANN headquarters in Marina Del Rey, numbers in the transport protocols, and many other parameters. California, United States Globally unified name spaces, in which names and numbers are uniquely assigned, are essential for the global reach of the Internet. ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. The government of the United States continues to have the primary role in approving changes to the DNS root zone that lies at the heart of the domain name system.[36] ICANN's role in coordinating the assignment of unique identifiers distinguishes it as perhaps the only central

Internet coordinating body on the global Internet. On 16 November 2005, the World Summit on the Information Society, held in Tunis, established the Internet Governance Forum (IGF) to discuss Internet-related issues.

Modern uses
The Internet allows greater flexibility in working hours and location, especially with the spread of unmetered high-speed connections. The Internet can be accessed almost anywhere by numerous means, including through mobile Internet devices. Mobile phones, datacards, handheld game consoles and cellular routers allow users to connect to the Internet wirelessly. Within the limitations imposed by small screens and other limited facilities of such pocket-sized devices, the services of the Internet, including email and the web, may be available. Service providers may restrict the services offered and mobile data charges may be significantly higher than other access methods. Educational material at all levels from pre-school to post-doctoral is available from websites. Examples range from CBeebies, through school and high-school revision guides and virtual universities, to access to top-end scholarly literature through the likes of Google Scholar. For distance education, help with homework and other assignments, self-guided learning, whiling away spare time, or just looking up more detail on an interesting fact, it has never been easier for people to access educational information at any level from anywhere. The Internet in general and the World Wide Web in particular are important enablers of both formal and informal education. The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier, with the help of collaborative software. Not only can a group cheaply communicate and share ideas but the wide reach of the Internet allows such groups more easily to form. An example of this is the free software movement, which has produced, among other things, Linux, Mozilla Firefox, and OpenOffice.org. Internet chat, whether using an IRC chat room, an instant messaging system, or a social networking website, allows colleagues to stay in touch in a very convenient way while working at their computers during the day. Messages can be exchanged even more quickly and conveniently than via email. These systems may allow files to be exchanged, drawings and images to be shared, or voice and video contact between team members. Content management systems allow collaborating teams to work on shared sets of documents simultaneously without accidentally destroying each other's work. Business and project teams can share calendars as well as documents and other information. Such collaboration occurs in a wide variety of areas including scientific research, software development, conference planning, political activism and creative writing. Social and political collaboration is also becoming more widespread as both Internet access and computer literacy spread. The Internet allows computer users to remotely access other computers and information stores easily, wherever they may be. They may do this with or without computer security, i.e. authentication and encryption technologies, depending on the requirements. This is encouraging new ways of working from home, collaboration and information sharing in many industries. An accountant sitting at home can audit the books of a company based in another country, on a server situated in a third country that is remotely maintained by IT specialists in a fourth. These accounts could have been created by home-working bookkeepers, in other remote locations, based on information emailed to them from offices all over the world. Some of these things were possible before the widespread use of the Internet, but the cost of private leased lines would have made many of them infeasible in practice. An office worker away from their desk, perhaps on the other side of the world on a business trip or a holiday, can access their emails, access their data using cloud computing, or open a remote desktop session into their office PC using a secure Virtual Private Network (VPN) connection on the Internet. This can give the worker complete access to all of their normal files and data, including email and other applications, while away from the office. It has been referred to among system administrators as the Virtual Private Nightmare,[37] because it extends the secure perimeter of a corporate network into remote locations and its employees' homes.

Internet

Services
World Wide Web
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous. The World Wide Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers (URIs). URIs symbolically identify services, servers, and other databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web, but it is only one of the hundreds of communication protocols used on the Internet. Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data. World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via hyperlinks embedded in the documents. These documents may also contain any combination of computer data, including graphics, sounds, text, video, multimedia and interactive content that runs while the user is interacting with the page. Client-side software can include animations, games, office applications and scientific demonstrations. Through keyword-driven Internet research using search engines like Yahoo! and Google, users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale. The Web has also enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available. Publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition, however. Many individuals and some companies and groups use web logs or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result. One example of this practice is Microsoft, whose product developers publish their personal blogs in order to pique the public's interest in their work. Collections of personal web pages published by large service providers remain popular, and have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities have existed since the early days of the Web, newer offerings from, for example, Facebook and Twitter currently have large followings. These operations often brand themselves as social network services rather than simply as web page hosts. Advertising on popular web pages can be lucrative, and e-commerce or the sale of products and services directly via the Web continues to grow. When the Web began in the 1990s, a typical web page was stored in completed form on a web server, formatted in HTML, ready to be sent to a user's browser in response to a request. Over time, the process of creating and serving web pages has become more automated and more dynamic. Websites are often created using content management or wiki software with, initially, very little content. Contributors to these systems, who may be paid staff, members of a club or other organization or members of the public, fill underlying databases with content using editing pages designed for that purpose, while casual visitors view and read this content in its final HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors.

Internet

Communication
Email is an important communications service available on the Internet. The concept of sending electronic text messages between parties in a way analogous to mailing letters or memos predates the creation of the Internet. Pictures, documents and other files are sent as email attachments. Emails can be cc-ed to multiple email addresses. Internet telephony is another common communications service made possible by the creation of the Internet. VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all Internet communication. The idea began in the early 1990s with walkie-talkie-like voice applications for personal computers. In recent years many VoIP systems have become as easy to use and as convenient as a normal telephone. The benefit is that, as the Internet carries the voice traffic, VoIP can be free or cost much less than a traditional telephone call, especially over long distances and especially for those with always-on Internet connections such as cable or ADSL. VoIP is maturing into a competitive alternative to traditional telephone service. Interoperability between different providers has improved and the ability to call or receive a call from a traditional telephone is available. Simple, inexpensive VoIP network adapters are available that eliminate the need for a personal computer. Voice quality can still vary from call to call, but is often equal to and can even exceed that of traditional calls. Remaining problems for VoIP include emergency telephone number dialing and reliability. Currently, a few VoIP providers provide an emergency service, but it is not universally available. Traditional phones are line-powered and operate during a power failure; VoIP does not do so without a backup power source for the phone equipment and the Internet access devices. VoIP has also become increasingly popular for gaming applications, as a form of communication between players. Popular VoIP clients for gaming include Ventrilo and Teamspeak. Wii, PlayStation 3, and Xbox 360 also offer VoIP chat features.

Data transfer
File sharing is an example of transferring large amounts of data across the Internet. A computer file can be emailed to customers, colleagues and friends as an attachment. It can be uploaded to a website or FTP server for easy download by others. It can be put into a "shared location" or onto a file server for instant use by colleagues. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-to-peer networks. In any of these cases, access to the file may be controlled by user authentication, the transit of the file over the Internet may be obscured by encryption, and money may change hands for access to the file. The price can be paid by the remote charging of funds from, for example, a credit card whose details are also passed usually fully encrypted across the Internet. The origin and authenticity of the file received may be checked by digital signatures or by MD5 or other message digests. These simple features of the Internet, over a worldwide basis, are changing the production, sale, and distribution of anything that can be reduced to a computer file for transmission. This includes all manner of print publications, software products, news, music, film, video, photography, graphics and the other arts. This in turn has caused seismic shifts in each of the existing industries that previously controlled the production and distribution of these products. Streaming media is the real-time delivery of digital media for the immediate consumption or enjoyment by end users. Many radio and television broadcasters provide Internet feeds of their live audio and video productions. They may also allow time-shift viewing or listening such as Preview, Classic Clips and Listen Again features. These providers have been joined by a range of pure Internet "broadcasters" who never had on-air licenses. This means that an Internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way as was previously possible only with a television or radio receiver. The range of available types of content is much wider, from specialized technical webcasts to on-demand popular multimedia services. Podcasting is a variation on this theme, where usually audio material is downloaded and played back on a computer or shifted to a portable media player to be listened to on the move. These techniques using simple equipment allow anybody, with little censorship or licensing control, to broadcast audio-visual material worldwide.

Internet Digital media streaming increases the demand for network bandwidth. For example, standard image quality needs 1 Mbit/s link speed for SD 480p, HD 720p quality requires 2.5 Mbit/s, and the top-of-the-line HDX quality needs 4.5 Mbit/s for 1080p.[38] Webcams are a low-cost extension of this phenomenon. While some webcams can give full-frame-rate video, the picture either is usually small or updates slowly. Internet users can watch animals around an African waterhole, ships in the Panama Canal, traffic at a local roundabout or monitor their own premises, live and in real time. Video chat rooms and video conferencing are also popular with many uses being found for personal webcams, with and without two-way sound. YouTube was founded on 15 February 2005 and is now the leading website for free streaming video with a vast number of users. It uses a flash-based web player to stream and show video files. Registered users may upload an unlimited amount of video and build their own personal profile. YouTube claims that its users watch hundreds of millions, and upload hundreds of thousands of videos daily.[39]

Access
Common methods of Internet access in homes include dial-up, landline broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite and 3G/4G technology cell phones. Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels now also have public terminals, though these are usually fee-based. These terminals are widely accessed for various usage like ticket booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and therefore can do so to the Internet itself. Hotspots providing such access include Wi-Fi cafes, where would-be users need to bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services covering large city areas are in place in London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be accessed from such places as a park bench.[40] Apart from Wi-Fi, there have been experiments with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular phone networks, and fixed wireless services. High-end mobile phones such as smartphones in general come with Internet access through the phone network. Web browsers such as Opera are available on these advanced handsets, which can also run a wide variety of other Internet software. More mobile phones have Internet access than PCs, though this is not as widely used.[41] An Internet access provider and protocol matrix differentiates the methods used to get online. An Internet blackout or outage can be caused by local signaling interruptions. Disruptions of submarine communications cables may cause blackouts or slowdowns to large areas, such as in the 2008 submarine cable disruption. Less-developed countries are more vulnerable due to a small number of high-capacity links. Land cables are also vulnerable, as in 2011 when a woman digging for scrap metal severed most connectivity for the nation of Armenia.[42] Internet blackouts affecting almost entire countries can be achieved by governments as a form of Internet censorship, as in the blockage of the Internet in Egypt, whereby approximately 93%[43] of networks were without access in 2011 in an attempt to stop mobilization for anti-government protests.[44]

Internet

10

Users
Overall Internet usage has seen tremendous growth. From 2000 to 2009, the number of Internet users globally rose from 394 million to 1.858 billion.[48] By 2010, 22 percent of the world's population had access to computers with 1 billion Google searches every day, 300 million Internet users reading blogs, and 2 billion videos viewed daily on YouTube.[49] The prevalent language for communication on the Internet has been English. This may be a result of the origin of the Internet, as well as the language's role as a lingua franca. Early computer systems were limited to the characters in the American Standard Code for Information Interchange (ASCII), a subset of the Latin alphabet.

Internet users per 100 inhabitantsSource: International Telecommunication UnionITU "Internet users per 100 inhabitants 20012011", International Telecommunications Union, Geneva. Retrieved 4 April 2012

After English (27%), the most requested languages on the World Wide Web are Chinese (23%), Spanish (8%), Japanese (5%), Portuguese and German (4% each), Arabic, French and Russian (3% each), and Korean (2%).[50] By region, 42% of the world's Internet users are based in Asia, 24% in Europe, 14% in North America, 10% in Latin America and the Caribbean taken together, 6% in Africa, 3% in the Middle East and 1% Languages used on the InternetInternet users by language "Number of Internet Users by in Australia/Oceania.[51] The Internet's Language", Internet World Stats, Miniwatts Marketing Group, 31 May 2011. Retrieved technologies have developed enough in 22 April 2012 recent years, especially in the use of Unicode, that good facilities are available for development and communication in the world's widely used languages. However, some glitches such as mojibake (incorrect display of some languages' characters) still remain.

Internet

11

In an American study in 2005, the percentage of men using the Internet was very slightly ahead of the percentage of women, although this difference reversed in those under 30. Men logged on more often, spent more time online, and were more likely to be broadband users, whereas women tended to make more use of opportunities to communicate (such as email). Men were more likely to use the Internet to pay bills, participate in auctions, and for recreation such as downloading music and videos. Men and women were equally likely to use the Internet for shopping and banking.[52] More recent studies Languages used on the InternetWebsite content languages "Usage of content languages for websites". W3Techs.com. . Retrieved 30 December 2011. indicate that in 2008, women significantly outnumbered men on most social networking sites, such as Facebook and Myspace, although the ratios varied with age.[53] In addition, women watched more streaming content, whereas men downloaded more.[54] In terms of blogs, men were more likely to blog in the first place; among those who blog, men were more likely to have a professional blog, whereas women were more likely to have a personal blog.[55]

Social impact
The Internet has enabled entirely new forms of social interaction, activities, and organizing, thanks to its basic features such as widespread usability and access. In the first decade of the 21st century, the first generation is raised with widespread availability of Internet connectivity, bringing consequences and concerns in areas such as personal privacy and identity, and distribution of copyrighted materials. These "digital natives" face a variety of challenges that were not present for prior generations.

Social networking and entertainment


Many people use the World Wide Web to access news, weather and sports reports, to plan and book vacations and to find out more about their interests. People use chat, messaging and email to make and stay in touch with friends worldwide, sometimes in the same way as some previously had pen pals. The Internet has seen a growing number of Web desktops, where users can access their files and settings via the Internet. Social networking websites such as Facebook, Twitter, and MySpace have created new ways to socialize and interact. Users of these sites are able to add a wide variety of information to pages, to pursue common interests, and to connect with others. It is also possible to find existing acquaintances, to allow communication among existing groups of people. Sites like LinkedIn foster commercial and business connections. YouTube and Flickr specialize in users' videos and photographs. The Internet has been a major outlet for leisure activity since its inception, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much traffic. Today, many Internet forums have sections devoted to games and funny videos; short cartoons in the form of Flash movies are also popular. Over 6million people use blogs or message boards as a means of communication and

Internet for the sharing of ideas. The internet pornography and online gambling industries have taken advantage of the World Wide Web, and often provide a significant source of advertising revenue for other websites.[56] Although many governments have attempted to restrict both industries' use of the Internet, in general this has failed to stop their widespread popularity.[57] Another area of leisure activity on the Internet is multiplayer gaming.[58] This form of recreation creates communities, where people of all ages and origins enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. While online gaming has been around since the 1970s, modern modes of online gaming began with subscription services such as GameSpy and MPlayer.[59] Non-subscribers were limited to certain types of game play or certain games. Many people use the Internet to access and download music, movies and other works for their enjoyment and relaxation. Free and fee-based services exist for all of these activities, using centralized servers and distributed peer-to-peer technologies. Some of these sources exercise more care with respect to the original artists' copyrights than others. Internet usage has been correlated to users' loneliness.[60] Lonely people tend to use the Internet as an outlet for their feelings and to share their stories with others, such as in the "I am lonely will anyone speak to me" thread. Cybersectarianism is a new organizational form which involves: "highly dispersed small groups of practitioners that may remain largely anonymous within the larger social context and operate in relative secrecy, while still linked remotely to a larger network of believers who share a set of practices and texts, and often a common devotion to a particular leader. Overseas supporters provide funding and support; domestic practitioners distribute tracts, participate in acts of resistance, and share information on the internal situation with outsiders. Collectively, members and practitioners of such sects construct viable virtual communities of faith, exchanging personal testimonies and engaging in collective study via email, on-line chat rooms and web-based message boards."[61] Cyberslacking can become a drain on corporate resources; the average UK employee spent 57 minutes a day surfing the Web while at work, according to a 2003 study by Peninsula Business Services.[62] Internet addiction disorder is excessive computer use that interferes with daily life. Psychologist Nicolas Carr believe that Internet use has other effects on individuals, for instance improving skills of scan-reading and interfering with the deep thinking that leads to true creativity.[63]

12

Politics and political revolutions


The Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States was notable for its success in soliciting donation via the Internet. Many political groups use the Internet to achieve a new method of organizing in order to carry out their mission, having given rise to Internet activism, most notably practiced by rebels in the Arab Spring.[64][65] The New York Times suggested that social media websites such as Facebook and Twitter helped people organize the political revolutions in Egypt where it helped certain classes of protesters organize protests, communicate grievances, and disseminate information.[66] The potential of the Internet as a civic tool of communicative power was thoroughly explored by Simon R. B. Berdal in his thesis of 2004: As the globally evolving Internet provides ever new access points to virtual discourse forums, it also promotes new civic relations and associations within which communicative power may flow and accumulate. Thus, traditionally ... national-embedded peripheries get entangled into greater, international peripheries, with stronger combined powers... The Internet, as a consequence, changes the topology of the "centre-periphery" model, by stimulating conventional peripheries to interlink into "super-periphery" structures, which enclose and "besiege" several centres at once.[67] Berdal, therefore, extends the Habermasian notion of the Public sphere to the Internet, and underlines the inherent global and civic nature that intervowen Internet technologies provide. To limit the growing civic potential of the

Internet Internet, Berdal also notes how "self-protective measures" are put in place by those threatened by it: If we consider Chinas attempts to filter "unsuitable material" from the Internet, most of us would agree that this resembles a self-protective measure by the system against the growing civic potentials of the Internet. Nevertheless, both types represent limitations to "peripheral capacities". Thus, the Chinese government tries to prevent communicative power to build up and unleash (as the 1989 Tiananmen Square uprising suggests, the government may find it wise to install "upstream measures"). Even though limited, the Internet is proving to be an empowering tool also to the Chinese periphery: Analysts believe that Internet petitions have influenced policy implementation in favour of the publics online-articulated will ...[67]

13

Philanthropy
The spread of low-cost internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites such as DonorsChoose and GlobalGiving allow small-scale donors to direct funds to individual projects of their choice. A popular twist on internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations which post stories and updates on behalf of the borrowers. Lenders can contribute as little as $25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves.[68][69] However, the recent spread of low cost Internet access in developing countries has made genuine international person-to-person philanthropy increasingly feasible. In 2009 the US-based nonprofit Zidisha tapped into this trend to offer the first person-to-person microfinance platform to link lenders and borrowers across international borders without intermediaries. Members can fund loans for as little as a dollar, which the borrowers then use to develop business activities that improve their families' incomes while repaying loans to the members with interest. Borrowers access the internet via public cybercafes, donated laptops in village schools, and even smart phones, then create their own profile pages through which they share photos and information about themselves and their businesses. As they repay their loans, borrowers continue to share updates and dialogue with lenders via their profile pages. This direct web-based connection allows members themselves to take on many of the communication and recording tasks traditionally performed by local organizations, bypassing geographic barriers and dramatically reducing the cost of microfinance services to the entrepreneurs.[70]

Censorship
Some governments, such as those of Burma, Iran, North Korea, the Mainland China, Saudi Arabia, and the United Arab Emirates restrict what people in their countries can access on the Internet, especially political and religious content. This is accomplished through software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention.[71] In Norway, Denmark, Finland, and Sweden, major Internet service providers have voluntarily, possibly to avoid such an arrangement being turned into law, agreed to restrict access to sites listed by authorities. While this list of forbidden URLs is supposed to contain addresses of only known child pornography sites, the content of the list is secret.[72] Many countries, including the United States, have enacted laws against the possession or distribution of certain material, such as child pornography, via the Internet, but do not mandate filtering software. There are many free and commercially available software programs, called content-control software, with which a user can choose to block offensive websites on individual computers or networks, in order to limit a child's access to pornographic materials or depiction of violence.

Internet

14

References
[1] "World Stats" (http:/ / www. internetworldstats. com/ stats. htm). Internet World Stats. Miniwatts Marketing Group. June 30, 2012. . [2] "Internet, n." (http:/ / dictionary. oed. com/ cgi/ entry/ 00304286). Oxford English Dictionary (Draft ed.). March 2009. . Retrieved 26 October 2010. "Shortened < INTERNETWORK n., perhaps influenced by similar words in -net" [3] Oxford English Dictionary, 2md ed., gives ninteenth-century use and pre-Internet verb use] [4] "7.76 Terms like 'web' and 'Internet'" (http:/ / www. chicagomanualofstyle. org/ 16/ ch07/ ch07_sec076. html?para=), Chicago Manual of Style, University of Chicago, 16th edition [5] "Links" (http:/ / www. w3. org/ TR/ html401/ struct/ links. html#h-12. 1). HTML 4.01 Specification. World Wide Web Consortium. HTML 4.01 Specification. . Retrieved 13 August 2008. "[T]he link (or hyperlink, or Web link) [is] the basic hypertext construct. A link is a connection from one Web resource to another. Although a simple concept, the link has been one of the primary forces driving the success of the Web." [6] Celebrating 40 years of the net (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 8331253. stm), by Mark Ward, Technology correspondent, BBC News, 29 October 2009 [7] "A Technical History of CYCLADES" (http:/ / www. cs. utexas. edu/ users/ chris/ think/ Cyclades/ index. shtml), Technical Histories of the Internet & other Network Protocols, Computer Science Department, University of Texas Austin, 11 June 2002 [8] "The Cyclades Experience: Results and Impacts" (http:/ / www. informatik. uni-trier. de/ ~ley/ db/ conf/ ifip/ ifip1977. html#Zimmermann77), Zimmermann, H., Proc. IFIP'77 Congress, Toronto, August 1977, pp. 465469 [9] A Chronicle of Merit's Early History (http:/ / www. merit. edu/ about/ history/ article. php), John Mulcahy, 1989, Merit Network, Ann Arbor, Michigan [10] "A Technical History of National Physical Laboratories (NPL) Network Architecture" (http:/ / www. cs. utexas. edu/ users/ chris/ think/ NPL/ index. shtml), Technical Histories of the Internet & other Network Protocols, Computer Science Department, University of Texas Austin, 11 June 2002 [11] "Roads and Crossroads of Internet History" (http:/ / www. netvalley. com/ intval. html) by Gregory Gromov. 1995 [12] Hafner, Katie (1998). Where Wizards Stay Up Late: The Origins Of The Internet. Simon & Schuster. ISBN0-684-83267-4. [13] Ronda Hauben (2001). From the ARPANET to the Internet (http:/ / www. columbia. edu/ ~rh120/ other/ tcpdigest_paper. txt). . Retrieved 28 May 2009. [14] "Events in British Telecomms History" (http:/ / web. archive. org/ web/ 20030405153523/ http:/ / www. sigtel. com/ tel_hist_brief. html). Events in British TelecommsHistory. Archived from the original (http:/ / www. sigtel. com/ tel_hist_brief. html) on 5 April 2003. . Retrieved 25 November 2005. [15] "NORSAR and the Internet" (http:/ / web. archive. org/ web/ 20110724063000/ http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx). NORSAR. Archived from the original (http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx) on 24 July 2011. . [16] Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff (2003). A Brief History of Internet (http:/ / www. isoc. org/ internet/ history/ brief. shtml). . Retrieved 28 May 2009. [17] NSFNET: A Partnership for High-Speed Networking, Final Report 1987-1995 (http:/ / www. merit. edu/ about/ history/ pdf/ NSFNET_final. pdf), Karen D. Frazer, Merit Network, Inc., 1995 [18] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [19] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [20] Rseaux IP Europens (RIPE) [21] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved 25 December 2005. [22] How the web went world wide (http:/ / news. bbc. co. uk/ 2/ hi/ science/ nature/ 5242252. stm), Mark Ward, Technology Correspondent, BBC News. Retrieved 24 January 2011 [23] "Brazil, Russia, India and China to Lead Internet Growth Through 2011" (http:/ / clickz. com/ showPage. html?page=3626274). Clickz.com. . Retrieved 28 May 2009. [24] Coffman, K. G; Odlyzko, A. M. (2 October 1998) (PDF). The size and growth rate of the Internet (http:/ / www. dtc. umn. edu/ ~odlyzko/ doc/ internet. size. pdf). AT&T Labs. . Retrieved 21 May 2007. [25] Comer, Douglas (2006). The Internet book. Prentice Hall. p.64. ISBN0-13-233553-0. [26] "World Internet Users and Population Stats" (http:/ / www. internetworldstats. com/ stats. htm). Internet World Stats. Miniwatts Marketing Group. 22 June 2011. . Retrieved 23 June 2011. [27] "The Worlds Technological Capacity to Store, Communicate, and Compute Information" (http:/ / www. sciencemag. org/ content/ suppl/ 2011/ 02/ 08/ science. 1200970. DC1/ Hilbert-SOM. pdf), Martin Hilbert and Priscila Lpez (April 2011), Science, 332(6025), 6065. [28] "IETF Home Page" (http:/ / www. ietf. org/ ). Ietf.org. . Retrieved 20 June 2009. [29] Huston, Geoff. "IPv4 Address Report, daily generated" (http:/ / www. potaroo. net/ tools/ ipv4/ index. html). . Retrieved 20 May 2009. [30] "Notice of Internet Protocol version 4 (IPv4) Address Depletion" (https:/ / www. arin. net/ knowledge/ about_resources/ ceo_letter. pdf) (PDF). . Retrieved 7 August 2009.

Internet
[31] A. L. Barabasi, R. Albert; Barabsi, Albert-Lszl (2002). "Statistical mechanics of complex networks" (http:/ / rmp. aps. org/ abstract/ RMP/ v74/ i1/ p47_1). Rev. Mod. Phys 74: 4794. doi:10.1103/RevModPhys.74.47. . [32] Walter Willinger, Ramesh Govindan, Sugih Jamin, Vern Paxson, and Scott Shenker (2002). Scaling phenomena in the Internet (http:/ / www. pnas. org/ cgi/ content/ full/ 99/ suppl_1/ 2573), in Proceedings of the National Academy of Sciences, 99, suppl. 1, 25732580 [33] Jesdanun, Anick (16 April 2007). "Internet Makeover? Some argue it's time" (http:/ / seattletimes. nwsource. com/ html/ businesstechnology/ 2003667811_btrebuildnet16. html). Seattletimes.nwsource.com. . Retrieved 8 August 2011. [34] R. Cohen, K. Erez, D. ben-Avraham, S. Havlin (2000). "Resilience of the Internet to random breakdowns" (http:/ / havlin. biu. ac. il/ Publications. php?keyword=Resilience+ of+ the+ Internet+ to+ random+ breakdowns& year=*& match=all). Phys. Rev. Lett 85: 4625. . [35] R. Cohen, K. Erez, D. ben-Avraham, S. Havlin; Erez, K; Ben-Avraham, D; Havlin, S (2001). "Breakdown of the Internet under intentional attack" (http:/ / havlin. biu. ac. il/ Publications. php?keyword=Breakdown+ of+ the+ Internet+ under+ intentional+ attack& year=*& match=all). Phys. Rev. Lett 86 (16): 36825. doi:10.1103/PhysRevLett.86.3682. PMID11328053. . [36] "Bush administration annexes internet" (http:/ / www. theregister. co. uk/ 2005/ 07/ 01/ bush_net_policy/ ), Kieren McCarthy, The Register, 1 July 2005 [37] "The Virtual Private Nightmare: VPN" (http:/ / librenix. com/ ?inode=5013). Librenix. 4 August 2004. . Retrieved 21 July 2010. [38] Morrison, Geoff (18 November 2010). "What to know before buying a 'connected' TV Technology & science Tech and gadgets Tech Holiday Guide" (http:/ / www. msnbc. msn. com/ id/ 40241749/ ns/ technology_and_science-tech_and_gadgets). MSNBC. . Retrieved 8 August 2011. [39] "YouTube Fact Sheet" (http:/ / www. webcitation. org/ 5qyMMarNd). YouTube, LLC. Archived from the original (http:/ / www. youtube. com/ t/ fact_sheet) on 4 July 2010. . Retrieved 20 January 2009. [40] Pasternak, Sean B. (7 March 2006). "Toronto Hydro to Install Wireless Network in Downtown Toronto" (http:/ / www. bloomberg. com/ apps/ news?pid=10000082& sid=aQ0ZfhMa4XGQ& refer=canada). Bloomberg. . Retrieved 8 August 2011. [41] "By 2013, mobile phones will overtake PCs as the most common Web access device worldwide", according a forecast in "Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond" (http:/ / www. gartner. com/ it/ page. jsp?id=1278413), Gartner, Inc., 13 January 2010 [42] "Georgian woman cuts off web access to whole of Armenia" (http:/ / www. guardian. co. uk/ world/ 2011/ apr/ 06/ georgian-woman-cuts-web-access). The Guardian. 6 April 2011. . Retrieved 11 April 2012. [43] Cowie, James. "Egypt Leaves the Internet" (http:/ / www. renesys. com/ blog/ 2011/ 01/ egypt-leaves-the-internet. shtml). Renesys. Archived (http:/ / www. webcitation. org/ 5w51j0pga) from the original on 28 January 2011. . Retrieved 28 January 2011. [44] "Egypt severs internet connection amid growing unrest" (http:/ / www. bbc. co. uk/ news/ technology-12306041). BBC News. 28 January 2011. . [45] "Internet users per 100 inhabitants 20012011" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2011/ Internet_users_01-11. xls), International Telecommunications Union, Geneva. Retrieved 4 April 2012 [46] "Number of Internet Users by Language" (http:/ / www. internetworldstats. com/ stats7. htm), Internet World Stats, Miniwatts Marketing Group, 31 May 2011. Retrieved 22 April 2012 [47] "Usage of content languages for websites" (http:/ / w3techs. com/ technologies/ overview/ content_language/ all). W3Techs.com. . Retrieved 30 December 2011. [48] Internet users graphs (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ ), Market Information and Statistics, International Telecommunications Union [49] "Google Earth demonstrates how technology benefits RI`s civil society, govt" (http:/ / www. antaranews. com/ en/ news/ 71940/ google-earth-demonstrates-how-technology-benefits-ris-civil-society-govt). Antara News. 2011-05-26. . Retrieved 2012-11-19. [50] Internet World Stats (http:/ / www. internetworldstats. com/ stats7. htm), updated for 30 June 2010. Retrieved 20 February 2011. [51] World Internet Usage Statistics News and Population Stats (http:/ / www. internetworldstats. com/ stats. htm) updated for 30 June 2010. Retrieved 20 February 2011. [52] How men and women use the Internet Pew Research Center 28 December 2005 [53] "Rapleaf Study on Social Network Users" (http:/ / business. rapleaf. com/ company_press_2008_07_29. html). . [54] "Women Ahead Of Men In Online Tv, Dvr, Games, And Social Media." (http:/ / www. entrepreneur. com/ tradejournals/ article/ 178175272. html). Entrepreneur.com. 1 May 2008. . Retrieved 8 August 2011. [55] "Technorati's State of the Blogosphere" (http:/ / technorati. com/ blogging/ state-of-the-blogosphere/ ). Technorati. . Retrieved 8 August 2011. [56] "Internet Pornography Statistics" (http:/ / internet-filter-review. toptenreviews. com/ internet-pornography-statistics. html), Jerry Ropelato, Top Ten Reviews, 2006 [57] "Do It Yourself! Amateur Porn Stars Make Bank" (http:/ / abcnews. go. com/ Business/ SmallBiz/ story?id=4151592), Russell Goldman, ABC News, 22 January 2008 [58] "Top Online Game Trends of the Decade" (http:/ / internetgames. about. com/ od/ gamingnews/ a/ trendsdecade. htm), Dave Spohn, About.com, 15 December 2009 [59] "Internet Game Timeline: 1963 2004" (http:/ / internetgames. about. com/ od/ gamingnews/ a/ timeline. htm), Dave Spohn, About.com, 2 June 2011 [60] Carole Hughes, Boston College. "The Relationship Between Internet Use and Loneliness Among College Students" (https:/ / www2. bc. edu/ ~hughesc/ abstract. html). Boston College. . Retrieved 11 August 2011.

15

Internet
[61] Patricia M. Thornton, "The New Cybersects: Resistance and Repression in the Reform era. In Elizabeth Perry and Mark Selden, eds., Chinese Society: Change, Conflict and Resistance (second edition) (London and New York: Routledge, 2003), pp. 14950. [62] "Net abuse hits small city firms" (http:/ / www. scotsman. com/ news/ net-abuse-hits-small-city-firms-1-892163). The Scotsman (Edinburgh). 11 September 2003. . Retrieved 7 August 2009. [63] The Shallows: What the Internet Is Doing to Our Brains (http:/ / www. theshallowsbook. com/ nicholascarr/ Nicholas_Carrs_The_Shallows. html), Nicholas Carr, W. W. Norton, 7 June 2010, 276 pp., ISBN 0-393-07222-3, ISBN 978-0-393-07222-8 [64] "The Arab Uprising's Cascading Effects" (http:/ / www. miller-mccune. com/ politics/ the-cascading-effects-of-the-arab-spring-28575/ ). Miller-mccune.com. 23 February 2011. . Retrieved 27 February 2011. [65] The Role of the Internet in Democratic Transition: Case Study of the Arab Spring (http:/ / www. etd. ceu. hu/ 2011/ chokoshvili_davit. pdf), Davit Chokoshvili, Master's Thesis, June 2011 [66] Kirkpatrick, David D. (9 February 2011). "Wired and Shrewd, Young Egyptians Guide Revolt" (http:/ / www. nytimes. com/ 2011/ 02/ 10/ world/ middleeast/ 10youth. html). The New York Times. . [67] Berdal, S.R.B. (2004) (PDF), Public deliberation on the Web: A Habermasian inquiry into online discourse (http:/ / www. duo. uio. no/ publ/ informatikk/ 2004/ 20535/ SimonBerdal. pdf), Oslo: University of Oslo, [68] Kiva Is Not Quite What It Seems (http:/ / blogs. cgdev. org/ open_book/ 2009/ 10/ kiva-is-not-quite-what-it-seems. php), by David Roodman, Center for Global Development, 2 October 2009, as accessed 2 & 16 January 2010 [69] Confusion on Where Money Lent via Kiva Goes (http:/ / www. nytimes. com/ 2009/ 11/ 09/ business/ global/ 09kiva. html?_r=1& scp=1& sq=Kiva& st=cse), by Stephanie Strom, in The New York Times, 8 November 2009, as accessed 2 & 16 January 2010 [70] "Zidisha Set to "Expand" in Peer-to-Peer Microfinance", Microfinance Focus, Feb 2010 (http:/ / www. microfinancefocus. com/ news/ 2010/ 02/ 07/ zidisha-set-to-expand-in-peer-to-peer-microfinance-julia-kurnia/ ) [71] Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=12187), Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain (eds), MIT Press, April 2010, ISBN 0-262-51435-4, ISBN 978-0-262-51435-4 [72] "Finland censors anti-censorship site" (http:/ / www. theregister. co. uk/ 2008/ 02/ 18/ finnish_policy_censor_activist/ ). The Register. 18 February 2008. . Retrieved 19 February 2008.

16

External links
Organizations
The Internet Society (http://www.isoc.org/) Berkman Center for Internet and Society (http://cyber.law.harvard.edu/) European Commission Information Society (http://ec.europa.eu/information_society/index_en.htm) Living Internet (http://www.livinginternet.com/), Internet history and related information, including information from many creators of the Internet

Articles, books, and journals


First Monday (http://www.firstmonday.org/), a peer-reviewed journal on the Internet established in 1996 as a Great Cities Initiative of the University Library of the University of Illinois at Chicago, ISSN: 1396-0466 Rise of the Network Society (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1405196866.html), Manual Castells, Wiley-Blackwell, 1996 (1st ed) and 2009 (2nd ed), ISBN 978-1-4051-9686-4 "The Internet: Changing the Way We Communicate" (http://www.nsf.gov/about/history/nsf0050/internet/ internet.htm) in America's Investment in the Future (http://www.nsf.gov/about/history/nsf0050/index.jsp), National Science Foundation, Arlington, Va. USA, 2000 Lessons from the History of the Internet (http://www.oup.com/us/catalog/general/subject/Sociology/ EnvironmentTechnology/?view=usa&ci=9780199255771), Manuel Castells, in The Internet Galaxy, Ch. 1, pp 935, Oxford University Press, 2001, ISBN 978-0-19-925577-1 ISBN10: 0-19-925577-6 "Media Freedom Internet Cookbook" (http://www.osce.org/fom/13836) by the OSCE Representative on Freedom of the Media Vienna, 2004 The Internet Explained (http://www.southbourne.com/articles/internet-explained), Vincent Zegna & Mike Pepper, Sonet Digital, November 2005, Pages 1 7. "How Much Does The Internet Weigh? (http://discovermagazine.com/2007/jun/ how-much-does-the-internet-weigh)", by Stephen Cass, Discover, 2007

Internet "The Internet spreads its tentacles" (http://www.sciencenews.org/view/generic/id/8651/description/ Mapping_a_Medusa_The_Internet_spreads_its_tentacles), Julie Rehmeyer, Science News, Vol. 171, No. 25, pp.387388, 23 June 2007 Internet (http://www.routledge.com/books/details/9780415352277/), Lorenzo Cantoni & Stefano Tardini, Routledge, 2006, ISBN 978-0-203-69888-4

17

History of the Internet


The history of the Internet began with the development of electronic computers in the 1950s. The public was first introduced to the Internet when a message was sent from computer science Professor Leonard KleinRock's laboratory at University of California, Los Angeles (UCLA), after the second piece of network equipment was installed at Stanford Research Institute (SRI). This connection not only enabled the first transmission to be made, but is also considered to be the first Internet backbone. This began the point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet protocol suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET) and again in 1986 when NSFNET provided access to supercomputer sites in the United States from research and education organizations. Commercial Internet 1974 ABC interview with Arthur C. Clarke in service providers (ISPs) began to emerge in the late 1980s and 1990s. which he describes a future of ubiquitous The ARPANET was decommissioned in 1990. The Internet was networked personal computers. commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic. Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near-instant communication by electronic mail, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The research and education community continues to develop and use advanced networks such as NSF's very high speed Backbone Network Service (vBNS), Internet2, and National LambdaRail. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.

History of the Internet

18

Internet history timeline


Early research and development:

1961 First packet-switching papers 1966 Merit Network founded 1966 ARPANET planning starts 1969 ARPANET carries its first packets 1970 Mark I network at NPL (UK) 1970 Network Information Center (NIC) 1971 Merit Network's packet-switched network operational 1971 Tymnet packet-switched network 1972 Internet Assigned Numbers Authority (IANA) established 1973 CYCLADES network demonstrated 1974 Telenet packet-switched network 1976 X.25 protocol approved 1978 Minitel introduced 1979 Internet Activities Board (IAB) 1980 USENET news using UUCP 1980 Ethernet standard introduced 1981 BITNET established Len Kleinrock and the first Interface Message [1] Processor.

Merging the networks and creating the Internet:

1981 Computer Science Network (CSNET) 1982 TCP/IP protocol suite formalized 1982 Simple Mail Transfer Protocol (SMTP) 1983 Domain Name System (DNS) 1983 MILNET split off from ARPANET 1985 First .COM domain name registered 1986 NSFNET with 56 kbit/s links 1986 Internet Engineering Task Force (IETF) 1987 UUNET founded 1988 NSFNET upgraded to 1.5 Mbit/s (T1) 1988 OSI Reference Model released 1988 Morris worm 1989 Border Gateway Protocol (BGP) 1989 PSINet founded, allows commercial traffic 1989 Federal Internet Exchanges (FIXes) 1990 GOSIP (without TCP/IP) 1990 ARPANET decommissioned 1990 Advanced Network and Services (ANS) 1990 UUNET/Alternet allows commercial traffic 1990 Archie search engine 1991 Wide area information server (WAIS) 1991 Gopher 1991 Commercial Internet eXchange (CIX) 1991 ANS CO+RE allows commercial traffic 1991 World Wide Web (WWW) 1992 NSFNET upgraded to 45 Mbit/s (T3)

History of the Internet


1992 Internet Society (ISOC) established 1993 Classless Inter-Domain Routing (CIDR) 1993 InterNIC established 1993 Mosaic web browser released 1994 Full text web search engines 1994 North American Network Operators' Group (NANOG) established

19

Commercialization, privatization, broader access leads to the modern Internet:

1995 New Internet architecture with commercial ISPs connected at NAPs 1995 NSFNET decommissioned 1995 GOSIP updated to allow TCP/IP 1995 very high-speed Backbone Network Service (vBNS) 1995 IPv6 proposed 1998 Internet Corporation for Assigned Names and Numbers (ICANN) 1999 IEEE 802.11b wireless networking 1999 Internet2/Abilene Network 1999 vBNS+ allows broader access 2000 Dot-com bubble bursts 2001 New top-level domain names activated 2001 Code Red I, Code Red II, and Nimda worms 2003 National LambdaRail founded 2006 First meeting of the Internet Governance Forum 2010 First internationalized country code top-level domains registered 2012 ICANN begins accepting applications for new generic top-level domain names Examples of popular Internet services: 1990 IMDb Internet movie database 1995 Amazon.com online retailer 1995 eBay online auction and shopping 1995 Craigslist classified advertisements 1996 Hotmail free web-based e-mail 1997 Babel Fish automatic translation 1998 Google Search 1998 Yahoo! Clubs (now Yahoo! Groups) 1998 PayPal Internet payment system 1999 Napster peer-to-peer file sharing 2001 BitTorrent peer-to-peer file sharing 2001 Wikipedia, the free encyclopedia 2003 LinkedIn business networking 2003 Myspace social networking site 2003 Skype Internet voice calls 2003 iTunes Store 2003 4Chan Anonymous image-based bulletin board 2004 Facebook social networking site 2004 Podcast media file series 2004 Flickr image hosting 2005 YouTube video sharing 2005 Google Earth virtual globe 2006 Twitter microblogging 2007 WikiLeaks anonymous news and information leaks

History of the Internet


2007 Google Street View 2008 Amazon Elastic Compute Cloud (EC2) 2008 Dropbox cloud-based file hosting 2009 Bing search engine 2011 Google+ social networking

20

Precursors
The Internet has precursors that date back to the 19th century, especially the telegraph system, more than a century before the digital Internet became widely used in the second half of the 1990s. The concept of data communication transmitting data between two different places, connected via some kind of electromagnetic medium, such as radio or an electrical wire predates the introduction of the first computers. Such communication systems were typically limited to point to point communication between two end devices. Telegraph systems and telex machines can be considered early precursors of this kind of communication. Fundamental theoretical work in data transmission and information theory was developed by Claude Shannon, Harry Nyquist, and Ralph Hartley, during the early 20th century. Early computers used the technology available at the time to allow communication between the central processing unit and remote terminals. As the technology evolved, new systems were devised to allow communication over longer distances (for terminals) or with higher speed (for interconnection of local devices) that were necessary for the mainframe computer model. Using these technologies it was possible to exchange data (such as files) between remote computers. However, the point to point communication model was limited, as it did not allow for direct communication between any two arbitrary systems; a physical link was necessary. The technology was also deemed as inherently unsafe for strategic and military use, because there were no alternative paths for the communication in case of an enemy attack.

Three terminals and an ARPA


A fundamental pioneer in the call for a global network, J. C. R. Licklider, articulated the ideas in his January 1960 paper, Man-Computer Symbiosis. "A network of such [computers], connected to one another by wide-band communication lines [which provided] the functions of present-day libraries together with anticipated advances in information storage and retrieval and [other] symbiotic functions." J.C.R.Licklider,[2] In August 1962, Licklider and Welden Clark published the paper "On-Line Man Computer Communication", which was one of the first descriptions of a networked future. In October 1962, Licklider was hired by Jack Ruina as Director of the newly established Information Processing Techniques Office (IPTO) within DARPA, with a mandate to interconnect the United States Department of Defense's main computers at Cheyenne Mountain, the Pentagon, and SAC HQ. There he formed an informal group within DARPA to further computer research. He began by writing memos describing a distributed network to the IPTO staff, whom he called "Members and Affiliates of the Intergalactic Computer Network". As part of the information processing office's role, three network terminals had been installed: one for System Development Corporation in Santa Monica, one for Project Genie at the University of California, Berkeley and one for the Compatible Time-Sharing System project at the Massachusetts Institute of Technology (MIT). Licklider's identified need for inter-networking would be made obvious by the apparent waste of resources this caused. "For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. [...] I said, it's

History of the Internet obvious what to do (But I don't want to do it): If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPAnet." Robert W.Taylor, co-writer with Licklider of "The Computer as a Communications Device", in an interview with The New York Times,[3] Although he left the IPTO in 1964, five years before the ARPANET went live, it was his vision of universal networking that provided the impetus that led his successors such as Lawrence Roberts and Robert Taylor to further the ARPANET development. Licklider later returned to lead the IPTO in 1973 for two years.[4]

21

Packet switching
At the tip of the problem lay the issue of connecting separate physical networks to form one logical network. During the 1960s, Paul Baran (RAND Corporation), produced a study of survivable networks for the US military. Information transmitted across Baran's network would be divided into what he called 'message-blocks'. Independently, Donald Davies (National Physical Laboratory, UK), proposed and developed a similar network based on what he called packet-switching, the term that would ultimately be adopted. Leonard Kleinrock (MIT) developed mathematical theory behind this technology. Packet-switching provides better bandwidth utilization and response times than the traditional circuit-switching technology used for telephony, particularly on resource-limited interconnection links.[5] Packet switching is a rapid store-and-forward networking design that divides messages up into arbitrary packets, with routing decisions made per-packet. Early networks used message switched systems that required rigid routing structures prone to single point of failure. This led Tommy Krash and Paul Baran's U.S. military funded research to focus on using message-blocks to include network redundancy.[6] The widespread urban legend that the Internet was designed to resist nuclear attack likely arose as a result of Baran's earlier work on packet switching, which did focus on redundancy in the face of a nuclear "holocaust."[7][8]

Networks that led to the Internet


ARPANET
Promoted to the head of the information processing office at DARPA, Robert Taylor intended to realize Licklider's ideas of an interconnected networking system. Bringing in Larry Roberts from MIT, he initiated a project to build such a network. The first ARPANET link was established between the University of California, Los Angeles (UCLA)and the Stanford Research Institute on 22:30 hours on October 29, 1969. "We set up a telephone connection between us and the guys at SRI ...", Kleinrock ... said in an interview: "We typed the L and we asked on the phone, "Do you see the L?" "Yes, we see the L," came the response. We typed the O, and we asked, "Do you see the O." "Yes, we see the O." Then we typed the G, and the system crashed ... Yet a revolution had begun" ....[9] By December 5, 1969, a 4-node network was connected by adding the University of Utah and the University of California, Santa Barbara. Building on ideas developed in ALOHAnet, the ARPANET grew rapidly. By 1981, the number of hosts had grown to 213, with a new host being added approximately every twenty days.[10][11] ARPANET became the technical core of what would become the Internet, and a primary tool in developing the technologies used. ARPANET development was centered around the Request for Comments (RFC) process, still

History of the Internet used today for proposing and distributing Internet Protocols and Systems. RFC 1, entitled "Host Software", was written by Steve Crocker from the University of California, Los Angeles, and published on April 7, 1969. These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing. International collaborations on ARPANET were sparse. For various political reasons, European developers were concerned with developing the X.25 networks. Notable exceptions were the Norwegian Seismic Array (NORSAR) in 1972, followed in 1973 by Sweden with satellite links to the Tanum Earth Station and Peter Kirstein's research group in the UK, initially at the Institute of Computer Science, London University and later at University College London.[12]

22

NPL
In 1965, Donald Davies of the National Physical Laboratory (United Kingdom) proposed a national data network based on packet-switching. The proposal was not taken up nationally, but by 1970 he had designed and built the Mark I packet-switched network to meet the needs of the multidisciplinary laboratory and prove the technology under operational conditions.[13] By 1976 12 computers and 75 terminal devices were attached and more were added until the network was replaced in 1986.

Merit Network
The Merit Network[14] was formed in 1966 as the Michigan Educational Research Information Triad to explore computer networking between three of Michigan's public universities as a means to help the state's educational and economic development.[15] With initial support from the State of Michigan and the National Science Foundation (NSF), the packet-switched network was first demonstrated in December 1971 when an interactive host to host connection was made between the IBM mainframe computer systems at the University of Michigan in Ann Arbor and Wayne State University in Detroit.[16] In October 1972 connections to the CDC mainframe at Michigan State University in East Lansing completed the triad. Over the next several years in addition to host to host interactive connections the network was enhanced to support terminal to host connections, host to host batch connections (remote job submission, remote printing, batch file transfer), interactive file transfer, gateways to the Tymnet and Telenet public data networks, X.25 host attachments, gateways to X.25 data networks, Ethernet attached hosts, and eventually TCP/IP and additional public universities in Michigan join the network.[16][17] All of this set the stage for Merit's role in the NSFNET project starting in the mid-1980s.

CYCLADES
The CYCLADES packet switching network was a French research network designed and directed by Louis Pouzin. First demonstrated in 1973, it was developed to explore alternatives to the initial ARPANET design and to support network research generally. It was the first network to make the hosts responsible for the reliable delivery of data, rather than the network itself, using unreliable datagrams and associated end-to-end protocol mechanisms.[18][19]

X.25 and public data networks


Based on ARPA's research, packet switching network standards were developed by the International Telecommunication Union (ITU) in the form of X.25 and related standards. While using packet switching, X.25 is built on the concept of virtual circuits emulating traditional telephone connections. In 1974, X.25 formed the basis for the SERCnet network between British academic and research sites, which later became JANET. The initial ITU Standard on X.25 was approved in March 1976.[20] The British Post Office, Western Union International and Tymnet collaborated to create the first international packet switched network, referred to as the International Packet Switched Service (IPSS), in 1978. This network grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. By the 1990s it provided a worldwide networking infrastructure.[21]

History of the Internet Unlike ARPANET, X.25 was commonly available for business use. Telenet offered its Telemail electronic mail service, which was also targeted to enterprise use rather than the general email system of the ARPANET. The first public dial-in networks used asynchronous TTY terminal protocols to reach a concentrator operated in the public network. Some networks, such as CompuServe, used X.25 to multiplex the terminal sessions into their packet-switched backbones, while others, such as Tymnet, used proprietary protocols. In 1979, CompuServe became the first service to offer electronic mail capabilities and technical support to personal computer users. The company broke new ground again in 1980 as the first to offer real-time chat with its CB Simulator. Other major dial-in networks were America Online (AOL) and Prodigy that also provided communications, content, and entertainment features. Many bulletin board system (BBS) networks also provided on-line access, such as FidoNet which was popular amongst hobbyist computer users, many of them hackers and amateur radio operators.

23

UUCP and Usenet


In 1979, two students at Duke University, Tom Truscott and Jim Ellis, came up with the idea of using simple Bourne shell scripts to transfer news and messages on a serial line UUCP connection with nearby University of North Carolina at Chapel Hill. Following public release of the software, the mesh of UUCP hosts forwarding on the Usenet news rapidly expanded. UUCPnet, as it would later be named, also created gateways and links between FidoNet and dial-up BBS hosts. UUCP networks spread quickly due to the lower costs involved, ability to use existing leased lines, X.25 links or even ARPANET connections, and the lack of strict use policies (commercial organizations who might provide bug fixes) compared to later networks like CSnet and Bitnet. All connects were local. By 1981 the number of UUCP hosts had grown to 550, nearly doubling to 940 in 1984. Sublink Network, operating since 1987 and officially founded in Italy in 1989, based its interconnectivity upon UUCP to redistribute mail and news groups messages throughout its Italian nodes (about 100 at the time) owned both by private individuals and small companies. Sublink Network represented possibly one of the first examples of the internet technology becoming progress through popular diffusion.[22]

Merging the networks and creating the Internet (197390)


TCP/IP
With so many different network methods, something was needed to unify them. Robert E. Kahn of DARPA and ARPANET recruited Vinton Cerf of Stanford University to work with him on the problem. By 1973, they had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible. Cerf credits Hubert Zimmerman, Gerard LeLann and Louis Pouzin (designer of the CYCLADES network) with important work on this design.[23] The specification of the resulting protocol, RFC 675 Specification of Internet Transmission Control Program, by Vinton Cerf, Yogen Dalal and Carl Sunshine, Network Working Group, December 1974, contains the first attested use of the term internet, as a shorthand for internetworking; later RFCs repeat this use, so the word started out as an adjective rather than the noun it is today.

Map of the TCP/IP test network in February 1982

History of the Internet

24 With the role of the network reduced to the bare minimum, it became possible to join almost any networks together, no matter what their characteristics were, thereby solving Kahn's initial problem. DARPA agreed to fund development of prototype software, and after several years of work, the first demonstration of a gateway between the Packet Radio network in the SF Bay area and the ARPANET was conducted by the Stanford Research Institute. On November 22, 1977 a three network demonstration was conducted including the ARPANET, the Packet Radio Network and the Atlantic Packet Satellite network.[24][25]

Stemming from the first specifications of TCP in 1974, TCP/IP emerged in mid-late 1978 in nearly final form. By 1981, the associated standards were published as RFCs 791, 792 and 793 and adopted for use. DARPA sponsored or encouraged the development of TCP/IP implementations for many operating systems and then scheduled a migration of all hosts on all of its packet networks to TCP/IP. On January 1, 1983, known as flag day, TCP/IP protocols became the only approved protocol on the ARPANET, replacing the earlier NCP protocol.[26]

A Stanford Research Institute packet radio van, site of the first three-way internetworked transmission.

ARPANET to the federal wide area networks: MILNET, NSI, ESNet, CSNET, and NSFNET
After the ARPANET had been up and running for several years, ARPA looked for another agency to hand off the network to; ARPA's primary mission was funding cutting edge research and development, not running a communications utility. Eventually, in July 1975, the network had been turned over to the Defense Communications Agency, also part of the Department of Defense. In 1983, the U.S. military portion of the ARPANET was broken off as a separate network, the MILNET. MILNET subsequently became the unclassified but military-only NIPRNET, in parallel with the BBN Technologies TCP/IP internet map early 1986 SECRET-level SIPRNET and JWICS for TOP SECRET and above. NIPRNET does have controlled security gateways to the public Internet. The networks based on the ARPANET were government funded and therefore restricted to noncommercial uses such as research; unrelated commercial use was strictly forbidden. This initially restricted connections to military sites and universities. During the 1980s, the connections expanded to more educational institutions, and even to a growing number of companies such as Digital Equipment Corporation and Hewlett-Packard, which were participating in research projects or providing services to those who were. Several other branches of the U.S. government, the National Aeronautics and Space Agency (NASA), the National Science Foundation (NSF), and the Department of Energy (DOE) became heavily involved in Internet research and started development of a successor to ARPANET. In the mid 1980s, all three of these branches developed the first

History of the Internet Wide Area Networks based on TCP/IP. NASA developed the NASA Science Network, NSF developed CSNET and DOE evolved the Energy Sciences Network or ESNet. NASA developed the TCP/IP based NASA Science Network (NSN) in the mid 1980s, connecting space scientists to data and information stored anywhere in the world. In 1989, the DECnet-based Space Physics Analysis Network (SPAN) and the TCP/IP-based NASA Science Network (NSN) were brought together at NASA Ames Research Center creating the first multiprotocol wide area network called the NASA Science Internet, or NSI. NSI was established to provide a totally T3 NSFNET Backbone, c. 1992 integrated communications infrastructure to the NASA scientific community for the advancement of earth, space and life sciences. As a high-speed, multiprotocol, international network, NSI provided connectivity to over 20,000 scientists across all seven continents. In 1981 NSF supported the development of the Computer Science Network (CSNET). CSNET connected with ARPANET using TCP/IP, and ran TCP/IP over X.25, but it also supported departments without sophisticated network connections, using automated dial-up mail exchange. Its experience with CSNET lead NSF to use TCP/IP when it created NSFNET, a 56kbit/s backbone established in 1986, that connected the NSF supported supercomputing centers and regional research and education networks in the United States.[27] However, use of NSFNET was not limited to supercomputer users and the 56kbit/s network quickly became overloaded. NSFNET was upgraded to 1.5Mbit/s in 1988. The existence of NSFNET and the creation of Federal Internet Exchanges (FIXes) allowed the ARPANET to be decommissioned in 1990. NSFNET was expanded and upgraded to 45Mbit/s in 1991, and was decommissioned in 1995 when it was replaced by backbones operated by several commercial Internet Service Providers.

25

Transition towards the Internet


The term "internet" was adopted in the first RFC published on the TCP protocol (RFC 675:[28] Internet Transmission Control Program, December 1974) as an abbreviation of the term internetworking and the two terms were used interchangeably. In general, an internet was any network using TCP/IP. It was around the time when ARPANET was interlinked with NSFNET in the late 1980s, that the term was used as the name of the network, Internet,[29] being a large and global TCP/IP network. As interest in widespread networking grew and new applications for it were developed, the Internet's technologies spread throughout the rest of the world. The network-agnostic approach in TCP/IP meant that it was easy to use any existing network infrastructure, such as the IPSS X.25 network, to carry Internet traffic. In 1984, University College London replaced its transatlantic satellite links with TCP/IP over IPSS.[30] Many sites unable to link directly to the Internet started to create simple gateways to allow transfer of e-mail, at that time the most important application. Sites which only had intermittent connections used UUCP or FidoNet and relied on the gateways between these networks and the Internet. Some gateway services went beyond simple email peering, such as allowing access to FTP sites via UUCP or e-mail.[31] Finally, the Internet's remaining centralized routing aspects were removed. The EGP routing protocol was replaced by a new protocol, the Border Gateway Protocol (BGP). This turned the Internet into a meshed topology and moved

History of the Internet away from the centric architecture which ARPANET had emphasized. In 1994, Classless Inter-Domain Routing was introduced to support better conservation of address space which allowed use of route aggregation to decrease the size of routing tables.[32]

26

TCP/IP goes global (19892010)


CERN, the European Internet, the link to the Pacific and beyond
Between 1984 and 1988 CERN began installation and operation of TCP/IP to interconnect its major internal computer systems, workstations, PCs and an accelerator control system. CERN continued to operate a limited self-developed system CERNET internally and several incompatible (typically proprietary) network protocols externally. There was considerable resistance in Europe towards more widespread use of TCP/IP and the CERN TCP/IP intranets remained isolated from the Internet until 1989. In 1988 Daniel Karrenberg, from Centrum Wiskunde & Informatica (CWI) in Amsterdam, visited Ben Segal, CERN's TCP/IP Coordinator, looking for advice about the transition of the European side of the UUCP Usenet network (much of which ran over X.25 links) over to TCP/IP. In 1987, Ben Segal had met with Len Bosack from the then still small company Cisco about purchasing some TCP/IP routers for CERN, and was able to give Karrenberg advice and forward him on to Cisco for the appropriate hardware. This expanded the European portion of the Internet across the existing UUCP networks, and in 1989 CERN opened its first external TCP/IP connections.[33] This coincided with the creation of Rseaux IP Europens (RIPE), initially a group of IP network administrators who met regularly to carry out co-ordination work together. Later, in 1992, RIPE was formally registered as a cooperative in Amsterdam. At the same time as the rise of internetworking in Europe, ad hoc networking to ARPA and in-between Australian universities formed, based on various technologies such as X.25 and UUCPNet. These were limited in their connection to the global networks, due to the cost of making individual international UUCP dial-up or X.25 connections. In 1989, Australian universities joined the push towards using IP protocols to unify their networking infrastructures. AARNet was formed in 1989 by the Australian Vice-Chancellors' Committee and provided a dedicated IP based network for Australia. The Internet began to penetrate Asia in the late 1980s. Japan, which had built the UUCP-based network JUNET in 1984, connected to NSFNET in 1989. It hosted the annual meeting of the Internet Society, INET'92, in Kobe. Singapore developed TECHNET in 1990, and Thailand gained a global Internet connection between Chulalongkorn University and UUNET in 1992.[34]

History of the Internet

27

Global digital divide


While developed countries with technological infrastructures were joining the Internet, developing countries began to experience a digital divide separating them from the Internet. On an essentially continental basis, they are building organizations for Internet resource administration and sharing operational experience, as more and more transmission facilities go into place. Africa

At the beginning of the 1990s, African countries relied upon X.25 IPSS and 2400 baud modem UUCP links for international and internetwork computer communications.

List of countries by number of Internet usersInternet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union. "Percentage of Individuals using the Internet 2000-2010", International Telecommunications Union, accessed 16 April 2012

In August 1995, InfoMail Uganda, Ltd., a privately held firm in Kampala now known as InfoCom, and NSN Network Services of Avon, Colorado, sold in 1997 and now known as Clear Channel Satellite, established Africa's first native TCP/IP high-speed satellite Internet services. The data connection was originally carried by a C-Band RSCC Russian satellite which connected InfoMail's Kampala offices directly to NSN's MAE-West point of presence using a private network from NSN's leased ground station in New Jersey. InfoCom's first satellite connection was just 64 kbit/s, serving a Sun host computer and twelve US Robotics dial-up modems. In 1996 a USAID funded project, the Leland initiative [36], started work on developing full Internet connectivity for the continent. Guinea, Mozambique, Madagascar and Rwanda gained satellite earth stations in 1997, followed by Cte d'Ivoire and Benin in 1998. Africa is building an Internet infrastructure. AfriNIC, headquartered in Mauritius, manages IP address allocation for the continent. As do the other Internet regions, there is an operational forum, the Internet Community of Operational Networking Specialists.[37] There are a wide range of programs both to provide high-performance transmission plant, and the western and southern coasts have undersea optical cable. High-speed cables join North Africa and the Horn of Africa to intercontinental cable systems. Undersea cable development is slower for East Africa; the original joint effort between New Partnership for Africa's Development (NEPAD) and the East Africa Submarine System (Eassy) has broken off and may become two efforts.[38] Asia and Oceania The Asia Pacific Network Information Centre (APNIC), headquartered in Australia, manages IP address allocation for the continent. APNIC sponsors an operational forum, the Asia-Pacific Regional Internet Conference on Operational Technologies (APRICOT).[39] In 1991, the People's Republic of China saw its first TCP/IP college network, Tsinghua University's TUNET. The PRC went on to make its first global Internet connection in 1994, between the Beijing Electro-Spectrometer Collaboration and Stanford University's Linear Accelerator Center. However, China went on to implement its own digital divide by implementing a country-wide content filter.[40]

History of the Internet Latin America As with the other regions, the Latin American and Caribbean Internet Addresses Registry (LACNIC) manages the IP address space and other resources for its area. LACNIC, headquartered in Uruguay, operates DNS root, reverse DNS, and other key services.

28

Opening the network to commerce


The interest in commercial use of the Internet became a hotly debated topic. Although commercial use was forbidden, the exact definition of commercial use could be unclear and subjective. UUCPNet and the X.25 IPSS had no such restrictions, which would eventually see the official barring of UUCPNet use of ARPANET and NSFNET connections. Some UUCP links still remained connecting to these networks however, as administrators cast a blind eye to their operation. During the late 1980s, the first Internet service provider (ISP) companies were formed. Companies like PSINet, UUNET, Netcom, and Portal Software were formed to provide service to the regional research networks and provide alternate network access, UUCP-based email and Usenet News to the public. The first commercial dialup ISP in the United States was The World, opened in 1989.[42] In 1992, the U.S. Congress passed the Number of Internet hosts worldwide: 1981-2012Source: Internet Systems Consortium. "Internet host count history". Internet Systems Consortium. . Retrieved May 16, 2012. Scientific and Advanced-Technology Act, 42 U.S.C.1862(g) [43], which allowed NSF to support access by the research and education communities to computer networks which were not used exclusively for research and education purposes, thus permitting NSFNET to interconnect with commercial networks.[44][45] This caused controversy within the research and education community, who were concerned commercial use of the network might lead to an Internet that was less responsive to their needs, and within the community of commercial network providers, who felt that government subsidies were giving an unfair advantage to some organizations.[46] By 1990, ARPANET had been overtaken and replaced by newer networking technologies and the project came to a close. New network service providers including PSINet, Alternet, CERFNet, ANS CO+RE, and many others were offering network access to commercial customers. NSFNET was no longer the de facto backbone and exchange point for Internet. The Commercial Internet eXchange (CIX), Metropolitan Area Exchanges (MAEs), and later Network Access Points (NAPs) were becoming the primary interconnections between many networks. The final restrictions on carrying commercial traffic ended on April 30, 1995 when the National Science Foundation ended its sponsorship of the NSFNET Backbone Service and the service ended.[47][48] NSF provided initial support for the NAPs and interim support to help the regional research and education networks transition to commercial ISPs. NSF also sponsored the very high speed Backbone Network Service (vBNS) which continued to provide support for the supercomputing centers and research and education in the United States.[49]

History of the Internet

29

Futurology: Beyond Earth and TCP/IP (2010 and beyond)


The first live Internet link into low earth orbit was established on January 22, 2010 when astronaut T. J. Creamer posted the first unassisted update to his Twitter account from the International Space Station, marking the extension of the Internet into space. (Astronauts at the ISS had used email and Twitter before, but these messages had been relayed to the ground through a NASA data link before being posted by a human proxy.) This personal Web access, which NASA calls the Crew Support LAN, uses the space station's high-speed Ku band microwave link. To surf the Web, astronauts can use a station laptop computer to control a desktop computer on Earth, and they can talk to their families and friends on Earth using Voice over IP equipment.[50] Communication with spacecraft beyond earth orbit has traditionally been over point-to-point links through the Deep Space Network. Each such data link must be manually scheduled and configured. In the late 1990s NASA and Google began working on a new network protocol, Delay-tolerant networking (DTN) which automates this process, allows networking of spaceborn transmission nodes, and takes the fact into account that spacecraft can temporarily lose contact because they move behind the Moon or planets, or because space "weather" disrupts the connection. Under such conditions, DTN retransmits data packages instead of dropping them, as the standard TCP/IP internet protocol does. NASA conducted the first field test of what it calls the "deep space internet" in November 2008.[51] Testing of DTN-based communications between the International Space Station and Earth (now termed Disruption-Tolerant Networking) has been ongoing since March 2009, and is scheduled to continue until March 2014.[52] This network technology is supposed to ultimately enable missions that involve multiple spacecraft where reliable inter-vessel communication might take precedence over vessel-to-earth downlinks. According to a February 2011 statement by Google's Vint Cerf, the so-called "Bundle protocols" have been uploaded to NASA's EPOXI mission spacecraft (which is in orbit around the sun) and communication with Earth has been tested at a distance of approximately 80 light seconds.[53]

Internet governance
As a globally distributed network of voluntarily interconnected autonomous networks, the Internet operates without a central governing body. It has no centralized governance for either technology or policies, and each constituent network chooses what technologies and protocols it will deploy from the voluntary technical standards that are developed by the Internet Engineering Task Force (IETF).[54] However, throughout its entire history, the Internet system has had an "Internet Assigned Numbers Authority" (IANA) for the allocation and assignment of various technical identifiers needed for the operation of the Internet.[55] The Internet Corporation for Assigned Names and Numbers (ICANN) provides oversight and coordination for two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System.

NIC, InterNIC, IANA and ICANN


The IANA function was originally performed by USC Information Sciences Institute, and it delegated portions of this responsibility with respect to numeric network and autonomous system identifiers to the Network Information Center (NIC) at Stanford Research Institute (SRI International) in Menlo Park, California. In addition to his role as the RFC Editor, Jon Postel worked as the manager of IANA until his death in 1998. As the early ARPANET grew, hosts were referred to by names, and a HOSTS.TXT file would be distributed from SRI International to each host on the network. As the network grew, this became cumbersome. A technical solution came in the form of the Domain Name System, created by Paul Mockapetris. The Defense Data NetworkNetwork Information Center (DDN-NIC) at SRI handled all registration services, including the top-level domains (TLDs) of .mil, .gov, .edu, .org, .net, .com and .us, root nameserver administration and Internet number assignments under a United States Department of Defense contract.[55] In 1991, the Defense Information Systems Agency (DISA)

History of the Internet awarded the administration and maintenance of DDN-NIC (managed by SRI up until this point) to Government Systems, Inc., who subcontracted it to the small private-sector Network Solutions, Inc.[56][57] The increasing cultural diversity of the Internet also posed administrative challenges for centralized management of the IP addresses. In October 1992, the Internet Engineering Task Force (IETF) published RFC 1366,[58] which described the "growth of the Internet and its increasing globalization" and set out the basis for an evolution of the IP registry process, based on a regionally distributed registry model. This document stressed the need for a single Internet number registry to exist in each geographical region of the world (which would be of "continental dimensions"). Registries would be "unbiased and widely recognized by network providers and subscribers" within their region. The RIPE Network Coordination Centre (RIPE NCC) was established as the first RIR in May 1992. The second RIR, the Asia Pacific Network Information Centre (APNIC), was established in Tokyo in 1993, as a pilot project of the Asia Pacific Networking Group.[59] Since at this point in history most of the growth on the Internet was coming from non-military sources, it was decided that the Department of Defense would no longer fund registration services outside of the .mil TLD. In 1993 the U.S. National Science Foundation, after a competitive bidding process in 1992, created the InterNIC to manage the allocations of addresses and management of the address databases, and awarded the contract to three organizations. Registration Services would be provided by Network Solutions; Directory and Database Services would be provided by AT&T; and Information Services would be provided by General Atomics.[60] Over time, after consultation with the IANA, the IETF, RIPE NCC, APNIC, and the Federal Networking Council (FNC), the decision was made to separate the management of domain names from the management of IP numbers.[59] Following the examples of RIPE NCC and APNIC, it was recommended that management of IP address space then administered by the InterNIC should be under the control of those that use it, specifically the ISPs, end-user organizations, corporate entities, universities, and individuals. As a result, the American Registry for Internet Numbers (ARIN) was established as in December 1997, as an independent, not-for-profit corporation by direction of the National Science Foundation and became the third Regional Internet Registry.[61] In 1998 both the IANA and remaining DNS-related InterNIC functions were reorganized under the control of ICANN, a California non-profit corporation contracted by the United States Department of Commerce to manage a number of Internet-related tasks. As these tasks involved technical coordination for two principal Internet name spaces (DNS names and IP addresses) created by the IETF, ICANN also signed a memorandum of understanding with the IAB to define the technical work to be carried out by the Internet Assigned Numbers Authority.[62] The management of Internet address space remained with the regional Internet registries, which collectively were defined as a supporting organization within the ICANN structure.[63] ICANN provides central coordination for the DNS system, including policy coordination for the split registry / registrar system, with competition among registry service providers to serve each top-level-domain and multiple competing registrars offering DNS services to end-users.

30

Internet Engineering Task Force


The Internet Engineering Task Force (IETF) is the largest and most visible of several loosely related ad-hoc groups that provide technical direction for the Internet, including the Internet Architecture Board (IAB), the Internet Engineering Steering Group (IESG), and the Internet Research Task Force (IRTF). The IETF is a loosely self-organized group of international volunteers who contribute to the engineering and evolution of Internet technologies. It is the principal body engaged in the development of new Internet standard specifications. Much of the IETF's work is done in Working Groups. It does not "run the Internet", despite what some people might mistakenly say. The IETF does make voluntary standards that are often adopted by Internet users, but it does not control, or even patrol, the Internet.[64][65] The IETF started in January 1986 as a quarterly meeting of U.S. government funded researchers. Non-government representatives were invited starting with the fourth IETF meeting in October 1986. The concept of Working Groups

History of the Internet was introduced at the fifth IETF meeting in February 1987. The seventh IETF meeting in July 1987 was the first meeting with more than 100 attendees. In 1992, the Internet Society, a professional membership society, was formed and IETF began to operate under it as an independent international standards body. The first IETF meeting outside of the United States was held in Amsterdam, The Netherlands, in July 1993. Today the IETF meets three times a year and attendnce is often about 1,300 people, but has been as high as 2,000 upon occasion. Typically one in three IETF meetings are held in Europe or Asia. The number of non-US attendees is roughly 50%, even at meetings held in the United States.[64] The IETF is unusual in that it exists as a collection of happenings, but is not a corporation and has no board of directors, no members, and no dues. The closest thing there is to being an IETF member is being on the IETF or a Working Group mailing list. IETF volunteers come from all over the world and from many different parts of the Internet community. The IETF works closely with and under the supervision of the Internet Engineering Steering Group (IESG)[66] and the Internet Architecture Board (IAB).[67] The Internet Research Task Force (IRTF) and the Internet Research Steering Group (IRSG), peer activities to the IETF and IESG under the general supervision of the IAB, focus on longer term research issues.[64][68] Request for Comments Request for Comments (RFCs) are the main documentation for the work of the IAB, IESG, IETF, and IRTF. RFC 1, "Host Software", was written by Steve Crocker at UCLA in April 1969, well before the IETF was created. Originally they were technical memos documenting aspects of ARPANET development and were edited by the late Jon Postel, the first RFC Editor.[64][69] RFCs cover a wide range of information from proposed standards, draft standards, full standards, best practices, experimental protocols, history, and other informational topics.[70] RFCs can be written by individuals or informal groups of individuals, but many are the product of a more formal Working Group. Drafts are submitted to the IESG either by individuals or by the Working Group Chair. An RFC Editor, appointed by the IAB, separate from IANA, and working in conjunction with the IESG, receives drafts from the IESG and edits, formats, and publishes them. Once an RFC is published, it is never revised. If the standard it describes changes or its information becomes obsolete, the revised standard or updated information will be re-published as a new RFC that "obsoletes" the original.[64][69]

31

The Internet Society


The Internet Society or ISOC is an international, nonprofit organization founded during 1992 to "to assure the open development, evolution and use of the Internet for the benefit of all people throughout the world". With offices near Washington, DC, USA, and in Geneva, Switzerland, ISOC has a membership base comprising more than 80 organizational and more than 50,000 individual members. Members also form "chapters" based on either common geographical location or special interests. There are currently more than 90 chapters around the world.[71] ISOC provides financial and organizational support to and promotes the work of the standards settings bodies for which it is the organizational home: the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), the Internet Engineering Steering Group (IESG), and the Internet Research Task Force (IRTF). ISOC also promotes understanding and appreciation of the Internet model of open, transparent processes and consensus-based decision making.[72]

History of the Internet

32

Globalization and Internet governance in the 21st century


Since the 1990s, the Internet's governance and organization has been of global importance to governments, commerce, civil society, and individuals. The organizations which held control of certain technical aspects of the Internet were the successors of the old ARPANET oversight and the current decision-makers in the day-to-day technical aspects of the network. While recognized as the administrators of certain aspects of the Internet, their roles and their decision making authority are limited and subject to increasing international scrutiny and increasingly objections. These objections have led to the ICANN removing themselves from relationships with first the University of Southern California in 2000,[73] and finally in September 2009, gaining autonomy from the US government by the ending of its longstanding agreements, although some contractual obligations with the U.S. Department of Commerce continued.[74][75][76] The IETF, with financial and organizational support from the Internet Society, continues to serve as the Internet's ad-hoc standards body and issues Request for Comments. In November 2005, the World Summit on the Information Society, held in Tunis, called for an Internet Governance Forum (IGF) to be convened by United Nations Secretary General. The IGF opened an ongoing, non-binding conversation among stakeholders representing governments, the private sector, civil society, and the technical and academic communities about the future of Internet governance. The first IGF meeting was held in October/November 2006 with follow on meetings annually thereafter.[77] Since WSIS, the term "Internet governance" has been broadened beyond narrow technical concerns to include a wider range of Internet-related policy issues.[78][79]

Use and culture


E-mail and Usenet
E-mail is often called the killer application of the Internet. However, it actually predates the Internet and was a crucial tool in creating it. Email started in 1965 as a way for multiple users of a time-sharing mainframe computer to communicate. Although the history is unclear, among the first systems to have such a facility were SDC's Q32 and MIT's CTSS.[80] The ARPANET computer network made a large contribution to the evolution of e-mail. There is one report[81] indicating experimental inter-system e-mail transfers on it shortly after ARPANET's creation. In 1971 Ray Tomlinson created what was to become the standard Internet e-mail address format, using the @ sign to separate user names from host names.[82] A number of protocols were developed to deliver e-mail among groups of time-sharing computers over alternative transmission systems, such as UUCP and IBM's VNET e-mail system. E-mail could be passed this way between a number of networks, including ARPANET, BITNET and NSFNET, as well as to hosts connected directly to other sites via UUCP. See the history of SMTP protocol. In addition, UUCP allowed the publication of text files that could be read by many others. The News software developed by Steve Daniel and Tom Truscott in 1979 was used to distribute news and bulletin board-like messages. This quickly grew into discussion groups, known as newsgroups, on a wide range of topics. On ARPANET and NSFNET similar discussion groups would form via mailing lists, discussing both technical issues and more culturally focused topics (such as science fiction, discussed on the sflovers [83] mailing list). During the early years of the Internet, e-mail and similar mechanisms were also fundamental to allow people to access resources that were not available due to the absence of online connectivity. UUCP was often used to distribute files using the 'alt.binary' groups. Also, FTP e-mail gateways allowed people that lived outside the US and Europe to download files using ftp commands written inside e-email messages. The file was encoded, broken in pieces and sent by e-mail; the receiver had to reassemble and decode it later, and it was the only way for people living overseas to

History of the Internet download items such as the earlier Linux versions using the slow dial-up connections available at the time. After the popularization of the Web and the HTTP protocol such tools were slowly abandoned.

33

From Gopher to the WWW


As the Internet grew through the 1980s and early 1990s, many people realized the increasing need to be able to find and organize files and information. Projects such as Archie, Gopher, WAIS, and the FTP Archive list attempted to create ways to organize distributed data. In the early 1990s, Gopher, invented by Mark P. McCahill offered a viable alternative to the World Wide Web. However, by the mid 1990s it became clear that Gopher and the other projects fell short in being able to accommodate all the existing data types and in being able to grow without bottlenecks. One of the most promising user interface paradigms during this period was hypertext. The technology had been inspired by Vannevar Bush's "Memex"[84] and developed through Ted Nelson's research on Project Xanadu and Douglas Engelbart's research on NLS.[85] Many small self-contained hypertext systems had been created before, such as Apple Computer's HyperCard (1987). Gopher became the first commonly used hypertext interface to the Internet. While Gopher menu items were examples of hypertext, they were not commonly perceived in that way. In 1989, while working at CERN, Tim Berners-Lee invented a network-based implementation of the hypertext concept. By releasing his invention to public use, he ensured the technology would become widespread.[86] For his work in developing the World Wide Web, Berners-Lee received the Millennium technology prize in 2004.[87] One early popular web browser, modeled after HyperCard, was ViolaWWW. A turning point for the World Wide Web began with the introduction[88] of the Mosaic web browser[89] in 1993, a graphical browser developed by a team at the National Center for This NeXT Computer was used by Sir Tim Berners-Lee at CERN and became the world's first Supercomputing Applications at the University of Illinois at Web server. Urbana-Champaign (NCSA-UIUC), led by Marc Andreessen. Funding for Mosaic came from the High-Performance Computing and Communications Initiative, a funding program initiated by the High Performance Computing and Communication Act of 1991 also known as the Gore Bill.[90] Mosaic's graphical interface soon became more popular than Gopher, which at the time was primarily text-based, and the WWW became the preferred interface for accessing the Internet. (Gore's reference to his role in "creating the Internet", however, was ridiculed in his presidential election campaign. See the full article Al Gore and information technology). Mosaic was eventually superseded in 1994 by Andreessen's Netscape Navigator, which replaced Mosaic as the world's most popular browser. While it held this title for some time, eventually competition from Internet Explorer and a variety of other browsers almost completely displaced it. Another important event held on January 11, 1994, was The Superhighway Summit at UCLA's Royce Hall. This was the "first public conference bringing together all of the major industry, government and academic leaders in the field [and] also began the national dialogue about the Information Superhighway and its implications."[91] 24 Hours in Cyberspace, "the largest one-day online event" (February 8, 1996) up to that date, took place on the then-active website, cyber24.com.[92][93] It was headed by photographer Rick Smolan.[94] A photographic exhibition was unveiled at the Smithsonian Institution's National Museum of American History on January 23, 1997, featuring 70 photos from the project.[95]

History of the Internet

34

Search engines
Even before the World Wide Web, there were search engines that attempted to organize the Internet. The first of these was the Archie search engine from McGill University in 1990, followed in 1991 by WAIS and Gopher. All three of those systems predated the invention of the World Wide Web but all continued to index the Web and the rest of the Internet for several years after the Web appeared. There are still Gopher servers as of 2006, although there are a great many more web servers. As the Web grew, search engines and Web directories were created to track pages on the Web and allow people to find things. The first full-text Web search engine was WebCrawler in 1994. Before WebCrawler, only Web page titles were searched. Another early search engine, Lycos, was created in 1993 as a university project, and was the first to achieve commercial success. During the late 1990s, both Web directories and Web search engines were popularYahoo! (founded 1994) and Altavista (founded 1995) were the respective industry leaders. By August 2001, the directory model had begun to give way to search engines, tracking the rise of Google (founded 1998), which had developed new approaches to relevancy ranking. Directory features, while still commonly available, became after-thoughts to search engines. Database size, which had been a significant marketing feature through the early 2000s, was similarly displaced by emphasis on relevancy ranking, the methods by which search engines attempt to sort the best results first. Relevancy ranking first became a major issue circa 1996, when it became apparent that it was impractical to review full lists of results. Consequently, algorithms for relevancy ranking have continuously improved. Google's PageRank method for ordering the results has received the most press, but all major search engines continually refine their ranking methodologies with a view toward improving the ordering of results. As of 2006, search engine rankings are more important than ever, so much so that an industry has developed ("search engine optimizers", or "SEO") to help web-developers improve their search ranking, and an entire body of case law has developed around matters that affect search engine rankings, such as use of trademarks in metatags. The sale of search rankings by some search engines has also created controversy among librarians and consumer advocates.[96] On June 3, 2009, Microsoft launched its new search engine, Bing.[97] The following month Microsoft and Yahoo! announced a deal in which Bing would power Yahoo! Search.[98]

File sharing
Resource or file sharing has been an important activity on computer networks from well before the Internet was established and was supported in a variety of ways including bulletin board systems (1978), Usenet (1980), Kermit (1981), and many others. The File Transfer Protocol (FTP) for use on the Internet was standardized in 1985 and is still in use today.[99] A variety of tools were developed to aid the use of FTP by helping users discover files they might want to transfer, including the Wide Area Information Server (WAIS) in 1991, Gopher in 1991, Archie in 1991, Veronica in 1992, Jughead in 1993, Internet Relay Chat (IRC) in 1988, and eventually the World Wide Web (WWW) in 1991 with Web directories and Web search engines. In 1999 Napster became the first peer-to-peer file sharing system.[100] Napster used a central server for indexing and peer discovery, but the storage and transfer of files was decentralized. A variety of peer-to-peer file sharing programs and services with different levels of decentralization and anonymity followed, including: Gnutella, eDonkey2000, and Freenet in 2000, FastTrack, Kazaa, Limewire, and BitTorrent in 2001, and Poisoned in 2003.[101] All of these tools are general purpose and can be used to share a wide variety of content, but sharing of music files, software, and later movies and videos are major uses.[102] And while some of this sharing is legal, large portions are not. Lawsuits and other legal actions caused Napster in 2001, eDonkey2000 in 2005, Kazza in 2006, and Limewire in 2010 to shutdown or refocus their efforts.[103][104] The Pirate Bay, founded in Sweden in 2003, continues despite a trial and appeal in 2009 and 2010 that resulted in jail terms and large fines for several of its founders.[105] File sharing remains contentious and controversial with charges of theft of intellectual property on the one hand and charges of censorship on the other.[106][107]

History of the Internet

35

Dot-com bubble
Suddenly the low price of reaching millions worldwide, and the possibility of selling to or hearing from those people at the same moment when they were reached, promised to overturn established business dogma in advertising, mail-order sales, customer relationship management, and many more areas. The web was a new killer appit could bring together unrelated buyers and sellers in seamless and low-cost ways. Entrepreneurs around the world developed new business models, and ran to their nearest venture capitalist. While some of the new entrepreneurs had experience in business and economics, the majority were simply people with ideas, and did not manage the capital influx prudently. Additionally, many dot-com business plans were predicated on the assumption that by using the Internet, they would bypass the distribution channels of existing businesses and therefore not have to compete with them; when the established businesses with strong existing brands developed their own Internet presence, these hopes were shattered, and the newcomers were left attempting to break into markets dominated by larger, more established businesses. Many did not have the ability to do so. The dot-com bubble burst in March 2000, with the technology heavy NASDAQ Composite index peaking at 5,048.62 on March 10[108] (5,132.52 intraday), more than double its value just a year before. By 2001, the bubble's deflation was running full speed. A majority of the dot-coms had ceased trading, after having burnt through their venture capital and IPO capital, often without ever making a profit. But despite this, the Internet continues to grow, driven by commerce, ever greater amounts of online information and knowledge and social networking.

Mobile phones and the Internet


The first mobile phone with Internet connectivity was the Nokia 9000 Communicator, launched in Finland in 1996. The viability of Internet services access on mobile phones was limited until prices came down from that model and network providers started to develop systems and services conveniently accessible on phones. NTT DoCoMo in Japan launched the first mobile Internet service, i-mode, in 1999 and this is considered the birth of the mobile phone Internet services. In 2001 the mobile phone email system by Research in Motion for their BlackBerry product was launched in America. To make efficient use of the small screen and tiny keypad and one-handed operation typical of mobile phones, a specific document and networking model was created for mobile devices, the Wireless Application Protocol (WAP). Most mobile device Internet services operate using WAP. The growth of mobile phone services was initially a primarily Asian phenomenon with Japan, South Korea and Taiwan all soon finding the majority of their Internet users accessing resources by phone rather than by PC. Developing countries followed, with India, South Africa, Kenya, Philippines, and Pakistan all reporting that the majority of their domestic users accessed the Internet from a mobile phone rather than a PC. The European and North American use of the Internet was influenced by a large installed base of personal computers, and the growth of mobile phone Internet access was more gradual, but had reached national penetration levels of 2030% in most Western countries. The cross-over occurred in 2008, when more Internet access devices were mobile phones than personal computers. In many parts of the developing world, the ratio is as much as 10 mobile phone users to one PC user.[109]

History of the Internet

36

Online population forecast


A study conducted by JupiterResearch anticipates that a 38 percent increase in the number of people with online access will mean that, by 2011, 22 percent of the Earth's population will surf the Internet regularly. The report says 1.1 billion people have regular Web access. For the study, JupiterResearch defined online users as people who regularly access the Internet from dedicated Internet-access devices, which exclude cellular telephones.[111]
Internet users per 100 inhabitantsSource: International Telecommunications Union. "Internet users per 100 inhabitants 2001-2011", International Telecommunications Union, Geneva, accessed 4 April 2012

Historiography

Some concerns have been raised over the historiography of the Internet's development. Specifically that it is hard to find documentation of much of the Internet's development, for several reasons, including a lack of centralized documentation for much of the early developments that led to the Internet. "The Arpanet period is somewhat well documented because the corporation in charge BBN left a physical record. Moving into the NSFNET era, it became an extraordinarily decentralized process. The record exists in people's basements, in closets. [...] So much of what happened was done verbally and on the basis of individual trust." Doug Gale (2007)[112]

References
[1] Leonard Kleinrock (2005). The history of the Internet (http:/ / www. lk. cs. ucla. edu/ personal_history. html). . Retrieved May 28, 2009. [2] J. C. R. Licklider (1960). Man-Computer Symbiosis. [3] "An Internet Pioneer Ponders the Next Revolution" (http:/ / partners. nytimes. com/ library/ tech/ 99/ 12/ biztech/ articles/ 122099outlook-bobb. html?Partner=Snap). An Internet Pioneer Ponders the Next Revolution. December20,1999. . Retrieved November 25, 2005. [4] Licklider and the Universal Network (http:/ / www. livinginternet. com/ i/ ii_licklider. htm) [5] Ruthfield, Scott (September 1995). "The Internet's History and Development From Wartime Tool to the Fish-Cam" (http:/ / dl. acm. org/ citation. cfm?id=332198. 332202& coll=portal& dl=ACM). Crossroads 2 (1): pp.24. doi:10.1145/332198.332202. Archived (http:/ / web. archive. org/ web/ 20071018045734/ http:/ / www. acm. org/ crossroads/ xrds2-1/ inet-history. html) from the original on October 18, 2007. . Retrieved July 25, 2012. [6] "About Rand" (http:/ / www. rand. org/ about/ history/ baran. html). Paul Baran and the Origins of the Internet. . Retrieved July 25, 2012. [7] Baran, Paul (May 27, 1960) (PDF). Reliable Digital Communications Using Unreliable Network Repeater Nodes (http:/ / www. rand. org/ content/ dam/ rand/ pubs/ papers/ 2008/ P1995. pdf). The RAND Corporation. p.1. . Retrieved July 25, 2012. [8] Johna Till Johnson (June 7, 2004). "'Net was born of economic necessity, not fear" (http:/ / www. networkworld. com/ columnists/ 2004/ 0607johnson. html). . Retrieved July 25, 2012. [9] Gromov, Gregory (1995). "Roads and Crossroads of Internet History" (http:/ / www. netvalley. com/ intval. html). . [10] Hafner, Katie (1998). Where Wizards Stay Up Late: The Origins Of The Internet. Simon & Schuster. ISBN0-684-83267-4. [11] Ronda Hauben (2001). From the ARPANET to the Internet (http:/ / www. columbia. edu/ ~rh120/ other/ tcpdigest_paper. txt). . Retrieved May 28, 2009. [12] "NORSAR and the Internet" (http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx). NORSAR. . Retrieved June 5, 2009. [13] Ward, Mark (October 29, 2009). "Celebrating 40 years of the net" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 8331253. stm). BBC News. .

History of the Internet


[14] The Merit Network, Inc. is an independent non-profit 501(c)(3) corporation governed by Michigan's public universities. Merit receives administrative services under an agreement with the University of Michigan. [15] A Chronicle of Merit's Early History (http:/ / www. merit. edu/ about/ history/ article. php), John Mulcahy, 1989, Merit Network, Ann Arbor, Michigan [16] Merit Network Timeline: 19701979 (http:/ / www. merit. edu/ about/ history/ timeline_1970. php), Merit Network, Ann Arbor, Michigan [17] Merit Network Timeline: 19801989 (http:/ / www. merit. edu/ about/ history/ timeline_1980. php), Merit Network, Ann Arbor, Michigan [18] "A Technical History of CYCLADES" (http:/ / www. cs. utexas. edu/ users/ chris/ think/ Cyclades/ index. shtml). Technical Histories of the Internet & other Network Protocols. Computer Science Department, University of Texas Austin. . [19] "The Cyclades Experience: Results and Impacts" (http:/ / www. informatik. uni-trier. de/ ~ley/ db/ conf/ ifip/ ifip1977. html#Zimmermann77), Zimmermann, H., Proc. IFIP'77 Congress, Toronto, August 1977, pp. 465469 [20] tsbedh. "History of X.25, CCITT Plenary Assemblies and Book Colors" (http:/ / www. itu. int/ ITU-T/ studygroups/ com17/ history. html). Itu.int. . Retrieved June 5, 2009. [21] "Events in British Telecomms History" (http:/ / web. archive. org/ web/ 20030405153523/ http:/ / www. sigtel. com/ tel_hist_brief. html). Events in British TelecommsHistory. Archived from the original (http:/ / www. sigtel. com/ tel_hist_brief. html) on April 5, 2003. . Retrieved November 25, 2005. [22] UUCP Internals Frequently Asked Questions (http:/ / www. faqs. org/ faqs/ uucp-internals/ ) [23] Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff (2003). A Brief History of Internet (http:/ / www. isoc. org/ internet/ history/ brief. shtml). . Retrieved May 28, 2009. [24] "Computer History Museum and Web History Center Celebrate 30th Anniversary of Internet Milestone" (http:/ / www. computerhistory. org/ about/ press_relations/ releases/ 20071101/ ). . Retrieved November 22, 2007. [25] Ogg, Erica (2007-11-08). "'Internet van' helped drive evolution of the Web" (http:/ / news. cnet. com/ Internet-van-helped-drive-evolution-of-the-Web/ 2100-1033_3-6217511. html). CNET. . Retrieved 2011-11-12. [26] Jon Postel, NCP/TCP Transition Plan, RFC 801 [27] David Roessner, Barry Bozeman, Irwin Feller, Christopher Hill, Nils Newman (1997). The Role of NSF's Support of Engineering in Enabling Technological Innovation (http:/ / www. sri. com/ policy/ csted/ reports/ techin/ inter2. html). . Retrieved May 28, 2009. [28] "RFC 675 Specification of internet transmission control program" (http:/ / tools. ietf. org/ html/ rfc675). Tools.ietf.org. . Retrieved May 28, 2009. [29] Tanenbaum, Andrew S. (1996). Computer Networks. Prentice Hall. ISBN0-13-394248-1. [30] Hauben, Ronda (2004). "The Internet: On its International Origins and Collaborative Vision" (http:/ / www. ais. org/ ~jrh/ acn/ ACn12-2. a03. txt). Amateur Computerist 12 (2). . Retrieved May 29, 2009. [31] "Internet Access Provider Lists" (http:/ / ftp. cac. psu. edu/ pub/ internexus/ ACCESS. PROVIDRS). . Retrieved May 10, 2012. [32] "RFC 1871 CIDR and Classful Routing" (http:/ / tools. ietf. org/ html/ rfc1871). Tools.ietf.org. . Retrieved May 28, 2009. [33] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [34] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved December 25, 2005. [35] "Percentage of Individuals using the Internet 2000-2010" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2010/ IndividualsUsingInternet_00-10. xls), International Telecommunications Union, accessed 16 April 2012 [36] http:/ / www. usaid. gov/ regions/ afr/ leland/ chrono. htm [37] "ICONS webpage" (http:/ / icons. afrinic. net/ ). Icons.afrinic.net. . Retrieved May 28, 2009. [38] Nepad, Eassy partnership ends in divorce (http:/ / www. fmtech. co. za/ ?p=209),(South African) Financial Times FMTech, 2007 [39] "APRICOT webpage" (http:/ / www. apricot. net/ ). Apricot.net. May 4, 2009. . Retrieved May 28, 2009. [40] "A brief history of the Internet in China" (http:/ / www. pcworld. idg. com. au/ index. php/ id;854351844;pp;2;fp;2;fpid;1). China celebrates 10 years of being connected to the Internet. . Retrieved December 25, 2005. [41] "Internet host count history" (https:/ / www. isc. org/ solutions/ survey/ history). Internet Systems Consortium. . Retrieved May 16, 2012. [42] "The World internet provider" (http:/ / www. std. com/ ). . Retrieved May 28, 2009. [43] http:/ / www. law. cornell. edu/ uscode/ 42/ 1862(g). html [44] OGC-00-33R Department of Commerce: Relationship with the Internet Corporation for Assigned Names and Numbers (http:/ / www. gao. gov/ new. items/ og00033r. pdf). Government Accountability Office. July 7, 2000. p.6. . [45] Even after the appropriations act was amended in 1992 to give NSF more flexibility with regard to commercial traffic, NSF never felt that it could entirely do away with the AUP and its restrictions on commercial traffic, see the response to Recommendation 5 in NSF's response to the Inspector General's review (a April 19, 1993 memo from Frederick Bernthal, Acting Director, to Linda Sundro, Inspector General, that is included at the end of Review of NSFNET (http:/ / www. nsf. gov/ pubs/ stis1993/ oig9301/ oig9301. txt), Office of the Inspector General, National Science Foundation, March 23, 1993) [46] Management of NSFNET (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false), a transcript of the March 12, 1992 hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, Second Session, Hon. Rick Boucher, subcommittee chairman, presiding

37

History of the Internet


[47] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris, Ph.D., and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [48] "A Brief History of the Internet" (http:/ / www. walthowe. com/ navnet/ history. html). . [49] NSF Solicitation 93-52 (http:/ / w2. eff. org/ Infrastructure/ Govt_docs/ nsf_nren. rfp) Network Access Point Manager, Routing Arbiter, Regional Network Providers, and Very High Speed Backbone Network Services Provider for NSFNET and the NREN(SM) Program, May 6, 1993 [50] NASA Extends the World Wide Web Out Into Space (http:/ / www. nasa. gov/ home/ hqnews/ 2010/ jan/ HQ_M10-011_Hawaii221169. html). NASA media advisory M10-012, January 22, 2010. Archived (http:/ / www. webcitation. org/ 5uaKVooin) [51] NASA Successfully Tests First Deep Space Internet (http:/ / www. nasa. gov/ home/ hqnews/ 2008/ nov/ HQ_08-298_Deep_space_internet. html). NASA media release 08-298, November 18, 2008 Archived (http:/ / www. webcitation. org/ 5uaKpKCGz) [52] Disruption Tolerant Networking for Space Operations (DTN). July 31, 2012 (http:/ / www. nasa. gov/ mission_pages/ station/ research/ experiments/ DTN. html) [53] "Cerf: 2011 will be proving point for 'InterPlanetary Internet'" (http:/ / www. webcitation. org/ 678nhEdYj). Network World interview with Vint Cerf. February 18, 2011. Archived from the original (http:/ / www. networkworld. com/ news/ 2011/ 021811-cerf-interplanetary-internet. html) on December 9, 2012. . [54] "Internet Architecture" (http:/ / www. rfc-editor. org/ rfc/ rfc1958. txt). IAB Architectural Principles of the Internet. . Retrieved April 10, 2012. [55] "DDN NIC" (http:/ / www. rfc-editor. org/ rfc/ rfc1174. txt). IAB Recommended Policy on Distributing Internet Identifier Assignment. . Retrieved December 26, 2005. [56] "GSI-Network Solutions" (http:/ / www. rfc-editor. org/ rfc/ rfc1261. txt). TRANSITION OF NIC SERVICES. . Retrieved December 26, 2005. [57] "Thomas v. NSI, Civ. No. 97-2412 (TFH), Sec. I.A. (DCDC April6,1998)" (http:/ / lw. bna. com/ lw/ 19980428/ 972412. htm). Lw.bna.com. . Retrieved May 28, 2009. [58] "RFC 1366" (http:/ / www. rfc-editor. org/ rfc/ rfc1366. txt). Guidelines for Management of IP Address Space. . Retrieved April 10, 2012. [59] "Development of the Regional Internet Registry System" (http:/ / www. cisco. com/ web/ about/ ac123/ ac147/ archived_issues/ ipj_4-4/ regional_internet_registries. html). Cisco. . Retrieved April 10, 2012. [60] "NIS Manager Award Announced" (http:/ / www. ripe. net/ ripe/ maillists/ archives/ lir-wg/ 1992/ msg00028. html). NSF Network information services awards. . Retrieved December 25, 2005. [61] "Internet Moves Toward Privatization" (http:/ / www. nsf. gov/ news/ news_summ. jsp?cntn_id=102819). http:/ / www. nsf. gov. 24 June 1997. . [62] "RFC 2860" (http:/ / www. rfc-editor. org/ rfc/ rfc2860. txt). Memorandum of Understanding Concerning the Technical Work of the Internet Assigned Numbers Authority. . Retrieved December 26, 2005. [63] "ICANN Bylaws" (http:/ / www. icann. org/ en/ about/ governance/ bylaws). . Retrieved April 10, 2012. [64] "The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force", FYI 17 and RFC 4677, P. Hoffman and S. Harris, Internet Society, September 2006 [65] "A Mission Statement for the IETF", H. Alvestrand, Internet Society, BCP 95 and RFC 3935, October 2004 [66] "An IESG charter", H. Alvestrand, RFC 3710, Internet Society, February 2004 [67] "Charter of the Internet Architecture Board (IAB)", B. Carpenter, BCP 39 and RFC 2850, Internet Society, May 2000 [68] "IAB Thoughts on the Role of the Internet Research Task Force (IRTF)", S. Floyd, V. Paxson, A. Falk (eds), RFC 4440, Internet Society, March 2006 [69] "The RFC Series and RFC Editor", L. Daigle, RFC 4844, Internet Society, July 2007 [70] "Not All RFCs are Standards", C. Huitema, J. Postel, S. Crocker, RFC 1796, Internet Society, April 1995 [71] Internet Society (ISOC) - Introduction to ISOC (http:/ / www. isoc. org/ isoc/ ) [72] Internet Society (ISOC) - ISOC's Standards Activities (http:/ / www. isoc. org/ standards/ ) [73] USC/ICANN Transition Agreement (http:/ / www. icann. org/ en/ general/ usc-icann-transition-agreement. htm) [74] ICANN cuts cord to US government, gets broader oversight: ICANN, which oversees the Internet's domain name system, is a private nonprofit that reports to the US Department of Commerce. Under a new agreement, that relationship will change, and ICANN's accountability goes global (http:/ / arstechnica. com/ tech-policy/ news/ 2009/ 09/ icann-cuts-cord-to-us-government-gets-broader-oversight. ars) Nate Anderson, September 30, 2009 [75] Rhoads, Christopher (October 2, 2009). "U.S. Eases Grip Over Web Body: Move Addresses Criticisms as Internet Usage Becomes More Global" (http:/ / online. wsj. com/ article/ SB125432179022552705. html). . [76] Rabkin, Jeremy; Eisenach, Jeffrey (October 2, 2009). "The U.S. Abandons the Internet: Multilateral governance of the domain name system risks censorship and repression" (http:/ / online. wsj. com/ article/ SB10001424052748704471504574446942665685208. html). . [77] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. p.67. ISBN978-0-262-01459-5. [78] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.7980. ISBN978-0-262-01459-5. [79] DeNardis, Laura, The Emerging Field of Internet Governance (http:/ / ssrn. com/ abstract=1678343) (September 17, 2010). Yale Information Society Project Working Paper Series. [80] "The Risks Digest" (http:/ / catless. ncl. ac. uk/ Risks/ 20. 25. html#subj3). Great moments in e-mail history. . Retrieved April 27, 2006.

38

History of the Internet


[81] "The History of Electronic Mail" (http:/ / www. multicians. org/ thvv/ mail-history. html). The History of Electronic Mail. . Retrieved December 23, 2005. [82] "The First Network Email" (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html). The First Network Email. . Retrieved December 23, 2005. [83] http:/ / www. sflovers. org/ [84] Bush, Vannevar (1945). As We May Think (http:/ / www. theatlantic. com/ doc/ 194507/ bush). . Retrieved May 28, 2009. [85] Douglas Engelbart (1962). Augmenting Human Intellect: A Conceptual Framework (http:/ / www. bootstrap. org/ augdocs/ friedewald030402/ augmentinghumanintellect/ ahi62index. html). . [86] "The Early World Wide Web at SLAC" (http:/ / www. slac. stanford. edu/ history/ earlyweb/ history. shtml). The Early World Wide Web at SLAC: Documentation of the Early Web at SLAC. . Retrieved November 25, 2005. [87] "Millennium Technology Prize 2004 awarded to inventor of World Wide Web" (http:/ / web. archive. org/ web/ 20070830111145/ http:/ / www. technologyawards. org/ index. php?m=2& s=1& id=16& sm=4). Millennium Technology Prize. Archived from the original (http:/ / www. technologyawards. org/ index. php?m=2& s=1& id=16& sm=4) on August 30, 2007. . Retrieved May 25, 2008. [88] "Mosaic Web Browser History NCSA, Marc Andreessen, Eric Bina" (http:/ / www. livinginternet. com/ w/ wi_mosaic. htm). Livinginternet.com. . Retrieved May 28, 2009. [89] "NCSA Mosaic September10,1993 Demo" (http:/ / www. totic. org/ nscp/ demodoc/ demo. html). Totic.org. . Retrieved May 28, 2009. [90] "Vice President Al Gore's ENIAC Anniversary Speech" (http:/ / www. cs. washington. edu/ homes/ lazowska/ faculty. lecture/ innovation/ gore. html). Cs.washington.edu. February 14, 1996. . Retrieved May 28, 2009. [91] "UCLA Center for Communication Policy" (http:/ / www. digitalcenter. org/ webreport94/ apph. htm). Digitalcenter.org. . Retrieved May 28, 2009. [92] Mirror of Official site map (http:/ / undertow. arch. gatech. edu/ homepages/ virtualopera/ cyber24/ SITE/ htm3/ site. htm) [93] Mirror of Official Site (http:/ / undertow. arch. gatech. edu/ homepages/ virtualopera/ cyber24/ SITE/ htm3/ toc. htm?new) [94] "24 Hours in Cyberspace (and more)" (http:/ / www. baychi. org/ calendar/ 19970909/ ). Baychi.org. . Retrieved May 28, 2009. [95] "The human face of cyberspace, painted in random images" (http:/ / archive. southcoasttoday. com/ daily/ 02-97/ 02-22-97/ b02li072. htm). Archive.southcoasttoday.com. . Retrieved May 28, 2009. [96] Randall Stross (22 September 2009). Planet Google: One Company's Audacious Plan to Organize Everything We Know (http:/ / books. google. com/ books?id=xOk3EIUW9VgC). Simon and Schuster. ISBN978-1-4165-4696-2. . Retrieved 9 December 2012. [97] "Microsofts New Search at Bing.com Helps People Make Better Decisions: Decision Engine goes beyond search to help customers deal with information overload (Press Release)" (http:/ / www. microsoft. com/ presspass/ press/ 2009/ may09/ 05-28NewSearchPR. mspx?rss_fdn=Press Releases). Microsoft News Center. May 28, 2009. . Retrieved May 29, 2009. [98] "Microsoft and Yahoo seal web deal" (http:/ / news. bbc. co. uk/ 1/ hi/ business/ 8174763. stm), BBC Mobile News, July 29, 2009. [99] RFC 765: File Transfer Protocol (FTP) (http:/ / www. ietf. org/ rfc/ rfc0959. txt), J. Postel and J. Reynolds, ISI, October 1985 [100] Reliable distributed systems: technologies, Web services, and applications - Kenneth P. Birman - Google Books (http:/ / books. google. ca/ books?id=KeIENcC2BPwC& pg=PA532& lpg=PA532& dq=napster+ first#PPA532,M1). Books.google.ca. 2005-03-25. ISBN9780387215099. . Retrieved 2012-01-20. [101] Menta, Richard (July 20, 2001). "Napster Clones Crush Napster. Take 6 out of the Top 10 Downloads on CNet" (http:/ / www. mp3newswire. net/ stories/ 2001/ topclones. html). MP3 Newswire. . [102] Movie File-Sharing Booming: Study (http:/ / www. srgnet. com/ pdf/ Movie File-Sharing Booming Release Jan 24 07 Final. pdf), Solutions Research Group, Toronto, 24 January 2006 [103] Menta, Richard (December 9, 1999). "RIAA Sues Music Startup Napster for $20 Billion" (http:/ / www. mp3newswire. net/ stories/ napster. html). MP3 Newswire. . [104] "EFF: What Peer-to-Peer Developers Need to Know about Copyright Law" (http:/ / w2. eff. org/ IP/ P2P/ p2p_copyright_wp. php). W2.eff.org. . Retrieved 2012-01-20. [105] Kobie, Nicole (November 26, 2010). "Pirate Bay trio lose appeal against jail sentences" (http:/ / www. pcpro. co. uk/ news/ 363178/ pirate-bay-trio-lose-appeal-against-jail-sentences). pcpro.co.uk (PCPRO). . Retrieved November 26, 2010. [106] "Poll: Young Say File Sharing OK" (http:/ / www. cbsnews. com/ stories/ 2003/ 09/ 18/ opinion/ polls/ main573990. shtml), Bootie Cosgrove-Mather, CBS News, 11 February 2009 [107] Green, Stuart P. (29 March 2012). "OP-ED CONTRIBUTOR; When Stealing Isn't Stealing" (http:/ / www. nytimes. com/ 2012/ 03/ 29/ opinion/ theft-law-in-the-21st-century. html). The New York Times: p.27. . [108] Nasdaq peak of 5,048.62 (http:/ / bigcharts. marketwatch. com/ historical/ default. asp?detect=1& symbol=NASDAQ& close_date=3/ 10/ 00& x=34& y=12) [109] Hillebrand, Friedhelm, ed. (2002). GSM and UMTS, The Creation of Global Mobile Communications. John Wiley & Sons. ISBN0-470-84322-5. [110] "Internet users per 100 inhabitants 2001-2011" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2011/ Internet_users_01-11. xls), International Telecommunications Union, Geneva, accessed 4 April 2012 [111] "Brazil, Russia, India and China to Lead Internet Growth Through 2011" (http:/ / clickz. com/ showPage. html?page=3626274). Clickz.com. . Retrieved May 28, 2009. [112] "An Internet Pioneer Ponders the Next Revolution" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 6959034. stm). Illuminating the net's Dark Ages. August23,2007. . Retrieved February 26, 2008.

39

History of the Internet

40

Further reading
Abbate, Janet. Inventing the Internet (http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=4633), Cambridge: MIT Press, 1999. Bemer, Bob, "A History of Source Concepts for the Internet/Web" (http://web.archive.org/web/ 20041216124504/www.bobbemer.com/CONCEPTS.HTM) Campbell-Kelly, Martin; Aspray, William. Computer: A History of the Information Machine. New York: BasicBooks, 1996. Clark, D. (1988). "The Design Philosophy of the DARPA Internet Protocols" (http://www.cs.princeton.edu/ ~jrex/teaching/spring2005/reading/clark88.pdf). SIGCOMM '88 Symposium proceedings on Communications architectures and protocols (ACM): 106114. doi:10.1145/52324.52336. ISBN0897912799. Retrieved 2011-10-16. Graham, Ian S. The HTML Sourcebook: The Complete Guide to HTML. New York: John Wiley and Sons, 1995. Krol, Ed. Hitchhiker's Guide to the Internet, 1987. Krol, Ed. Whole Internet User's Guide and Catalog. O'Reilly & Associates, 1992. Scientific American Special Issue on Communications, Computers, and Networks, September 1991.

External links
Thomas Greene, Larry James Landweber, George Strawn (2003). A Brief History of NSF and the Internet (http:// www.nsf.gov/od/lpa/news/03/fsnsf_internet.htm). National Science Foundation. Retrieved May 28, 2009. Robert H Zakon. "Hobbes' Internet Timeline v10.1" (http://www.zakon.org/robert/internet/timeline/). Retrieved July 23, 2010. "Principal Figures in the Development of the Internet and the World Wide Web" (http://www.unc.edu/depts/ jomc/academics/dri/pioneers2d.html). University of North Carolina. Retrieved July 3, 2006. "Internet History Timeline" (http://www.computerhistory.org/exhibits/internet_history/). Computer History Museum. Retrieved November 25, 2005. Marcus Kazmierczak (September 24, 1997). "Internet History" (http://web.archive.org/web/20051031200142/ http://www.mkaz.com/ebeab/history/). Archived from the original (http://www.mkaz.com/ebeab/history/) on October 31, 2005. Retrieved November 25, 2005. Harri K. Salminen. "History of the Internet" (http://www.nic.funet.fi/index/FUNET/history/internet/en/ etusivu-en.html). Heureka Science Center, Finland. Retrieved June 11, 2008. "Histories of the Internet" (http://www.isoc.org/internet/history/). Internet Society. Retrieved December 1, 2007. "Living Internet" (http://www.livinginternet.com/i/ii.htm). Retrieved January 1, 2009. Internet History with input from many of the people who helped invent the Internet (http://www.livinginternet.com/tcomments.htm) "Voice of America: Overhearing the Internet" (http://www.eff.org/Net_culture/overhearing_the_internet. article.txt), Robert Wright, The New Republic, September 13, 1993 "How the Internet Came to Be" (http://www.netvalley.com/archives/mirrors/cerf-how-inet.html), by Vinton Cerf, 1993 "Cybertelecom :: Internet History" (http://www.cybertelecom.org/notes/internet_history.htm), focusing on the governmental, legal, and policy history of the Internet "History of the Internet" (http://vimeo.com/2696386?pg=embed&sec=2696386), an animated documentary from 2009 explaining the inventions from time-sharing to filesharing, from Arpanet to Internet "The Roads and Crossroads of Internet History" (http://www.netvalley.com/intval1.html), by Gregory R. Gromov The History of the Internet According to Itself: A Synthesis of Online Internet Histories Available at the Turn of the Century (http://members.cox.net/opfer/Internet.htm), Steven E. Opfer, 1999

History of the Internet "Fool Us Once Shame on YouFool Us Twice Shame on Us: What We Can Learn from the Privatizations of the Internet Backbone Network and the Domain Name System" (http://digitalcommons.law.wustl.edu/lawreview/ vol79/iss1/2), Jay P. Kesan and Rajiv C. Shah, Washington University Law Review, Volume 79, Issue 1 (2001) "How It All Started" (http://www.w3.org/2004/Talks/w3c10-HowItAllStarted/) (slides), Tim Berners-Lee, W3C, December 2004 "A Little History of the World Wide Web: from 1945 to 1995" (http://www.w3.org/History.html), Dan Connolly, W3C, 2000 "The World Wide Web: Past, Present and Future" (http://www.w3.org/People/Berners-Lee/1996/ppf.html), Tim Berners-Lee, August 1996

41

World Wide Web

42

World Wide Web


World Wide Web

The Web's logo designed by Robert Cailliau Inventor Company Availability Tim Berners-Lee CERN Worldwide [1]

The World Wide Web (abbreviated as WWW or W3,[2] commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. Using concepts from his earlier hypertext systems like ENQUIRE, British engineer, computer scientist and at that time employee of CERN, Sir Tim Berners-Lee, now Director of the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At CERN, a European research organisation near Geneva situated on Swiss and French soil,[3] Berners-Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use hypertext "to link and access information of various kinds as a web of nodes in which the user can browse at will",[4] and they publicly introduced the project in December of the same year.[5]

History
In the May 1970 issue of Popular Science magazine, Arthur C. Clarke predicted that satellites would someday "bring the accumulated knowledge of the world to your fingertips" using a console that would combine the functionality of the Xerox, telephone, television and a small computer, allowing data transfer and video conferencing around the globe.[6] In March 1989, Tim Berners-Lee wrote a proposal that referenced ENQUIRE, a database and software project he had built in 1980, and described a more elaborate information management system.[7] With help from Robert Cailliau, he published a more formal proposal (on 12 November 1990) to build a "Hypertext project" called

The NeXT Computer used by Berners-Lee. The handwritten label declares, "This machine is a server. DO NOT POWER IT DOWN!!"

World Wide Web "WorldWideWeb" (one word, also "W3") as a "web" of "hypertext documents" to be viewed by "browsers" using a clientserver architecture.[4] This proposal estimated that a read-only web would be developed within three months and that it would take six months to achieve "the creation of new links and new material by readers, [so that] authorship becomes universal" as well as "the automatic notification of a reader when new material of interest to him/her has become available." While the read-only goal was met, accessible authorship of web content took longer to mature, with the wiki concept, blogs, Web 2.0 and RSS/Atom.[8] The proposal was modeled after the Dynatext SGML reader by Electronic Book Technology, a spin-off from the Institute for Research in Information and Scholarship at Brown University. The Dynatext system, licensed by CERN, was technically advanced and was a key player in the extension of SGML ISO 8879:1986 to Hypermedia within HyTime, but it was considered too expensive and had an inappropriate licensing policy for use in the general high energy physics community, namely a fee for each document and each document alteration. A NeXT Computer was used by Berners-Lee as the world's first web server and also to write the first web browser, WorldWideWeb, in 1990. By Christmas 1990, Berners-Lee had built all the tools necessary for a working Web:[9] the first web browser (which was a web editor as well); the first web server; and the first web pages,[10] which described the project itself. On 6 August 1991, he posted a short summary of the World Wide Web project on the alt.hypertext newsgroup.[11] This date also marked the debut of the Web as a publicly available The CERN datacenter in 2010 housing some service on the Internet. Many newsmedia have reported that the first WWW servers photo on the web was uploaded by Berners-Lee in 1992, an image of the CERN house band Les Horribles Cernettes taken by Silvano de Gennaro; Gennaro has disclaimed this story, writing that media were "totally distorting our words for the sake of cheap sensationalism."[12] The first server outside Europe was set up at the Stanford Linear Accelerator Center (SLAC) in Palo Alto, California, to host the SPIRES-HEP database. Accounts differ substantially as to the date of this event. The World Wide Web Consortium says December 1992,[13] whereas SLAC itself claims 1991.[14][15] This is supported by a W3C document titled A Little History of the World Wide Web.[16] The crucial underlying concept of hypertext originated with older projects from the 1960s, such as the Hypertext Editing System (HES) at Brown University, Ted Nelson's Project Xanadu, and Douglas Engelbart's oN-Line System (NLS). Both Nelson and Engelbart were in turn inspired by Vannevar Bush's microfilm-based "memex", which was described in the 1945 essay "As We May Think".
[17]

43

Berners-Lee's breakthrough was to marry hypertext to the Internet. In his book Weaving The Web, he explains that he had repeatedly suggested that a marriage between the two technologies was possible to members of both technical communities, but when no one took up his invitation, he finally tackled the project himself. In the process, he developed three essential technologies: 1. a system of globally unique identifiers for resources on the Web and elsewhere, the Universal Document Identifier (UDI), later known as Uniform Resource Locator (URL) and Uniform Resource Identifier (URI); 2. the publishing language HyperText Markup Language (HTML); 3. the Hypertext Transfer Protocol (HTTP).[18] The World Wide Web had a number of differences from other hypertext systems that were then available. The Web required only unidirectional links rather than bidirectional ones. This made it possible for someone to link to another resource without action by the owner of that resource. It also significantly reduced the difficulty of implementing web servers and browsers (in comparison to earlier systems), but in turn presented the chronic problem of link rot. Unlike predecessors such as HyperCard, the World Wide Web was non-proprietary, making it possible to develop

World Wide Web servers and clients independently and to add extensions without licensing restrictions. On 30 April 1993, CERN announced that the World Wide Web would be free to anyone, with no fees due.[19] Coming two months after the announcement that the server implementation of the Gopher protocol was no longer free to use, this produced a rapid shift away from Gopher and towards the Web. An early popular web browser was ViolaWWW for Unix and the X Windowing System. Scholars generally agree that a turning point for the World Wide Web began with the introduction[20] of the Mosaic web browser[21] in 1993, a graphical browser developed by a team at the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign (NCSA-UIUC), led by Marc Andreessen. Funding for Mosaic came from the U.S. High-Performance Computing and Communications Initiative and the High Performance Computing and Communication Act of 1991, one of several computing developments initiated by U.S. Senator Al Gore.[22] Prior to the release of Mosaic, Robert Cailliau, Jean-Franois Abramatic of graphics were not commonly mixed with text in web pages and the IBM, and Tim Berners-Lee at the 10th Web's popularity was less than older protocols in use over the Internet, anniversary of the World Wide Web Consortium. such as Gopher and Wide Area Information Servers (WAIS). Mosaic's graphical user interface allowed the Web to become, by far, the most popular Internet protocol. The World Wide Web Consortium (W3C) was founded by Tim Berners-Lee after he left the European Organization for Nuclear Research (CERN) in October 1994. It was founded at the Massachusetts Institute of Technology Laboratory for Computer Science (MIT/LCS) with support from the Defense Advanced Research Projects Agency (DARPA), which had pioneered the Internet; a year later, a second site was founded at INRIA (a French national computer research lab) with support from the European Commission DG InfSo; and in 1996, a third continental site was created in Japan at Keio University. By the end of 1994, while the total number of websites was still minute compared to present standards, quite a number of notable websites were already active, many of which are the precursors or inspiration for today's most popular services. Connected by the existing Internet, other websites were created around the world, adding international standards for domain names and HTML. Since then, Berners-Lee has played an active role in guiding the development of web standards (such as the markup languages in which web pages are composed), and in recent years has advocated his vision of a Semantic Web. The World Wide Web enabled the spread of information over the Internet through an easy-to-use and flexible format. It thus played an important role in popularizing use of the Internet.[23] Although the two terms are sometimes conflated in popular use, World Wide Web is not synonymous with Internet.[24] The Web is a collection of documents and both client and server software using Internet protocols such as TCP/IP and HTTP. Tim Berners-Lee was knighted in 2004 by Queen Elizabeth II for his contribution to the World Wide Web.

44

Function
The terms Internet and World Wide Web are often used in everyday speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The Internet is a global system of interconnected computer networks. In contrast, the Web is one of the services that runs on the Internet. It is a collection of text documents and other resources, linked by hyperlinks and URLs, usually accessed by web browsers from web servers. In short, the Web can be thought of as an application "running" on the Internet.[25] Viewing a web page on the World Wide Web normally begins either by typing the URL of the page into a web browser or by following a hyperlink to that page or resource. The web browser then initiates a series of communication messages, behind the scenes, in order to fetch and display it. As an example, consider accessing a page with the URL http://example.org/wiki/World_Wide_Web .

World Wide Web First, the browser resolves the server-name portion of the URL (example.org) into an Internet Protocol address using the globally distributed database known as the Domain Name System (DNS); this lookup returns an IP address such as 208.80.152.2. The browser then requests the resource by sending an HTTP request across the Internet to the computer at that particular address. It makes the request to a particular application port in the underlying Internet Protocol Suite so that the computer receiving the request can distinguish an HTTP request from other network protocols it may be servicing such as e-mail delivery; the HTTP protocol normally uses port 80. The content of the HTTP request can be as simple as the two lines of text GET /wiki/World_Wide_Web HTTP/1.1 Host: example.org The computer receiving the HTTP request delivers it to web server software listening for requests on port 80. If the web server can fulfill the request it sends an HTTP response back to the browser indicating success, which can be as simple as HTTP/1.0 200 OK Content-Type: text/html; charset=UTF-8 followed by the content of the requested page. The Hypertext Markup Language for a basic web page looks like <html> <head> <title>Example.org The World Wide Web</title> </head> <body> <p>The World Wide Web, abbreviated as WWW and commonly known ...</p> </body> </html> The web browser parses the HTML, interpreting the markup (<title>, <p> for paragraph, and such) that surrounds the words in order to draw the text on the screen. Many web pages use HTML to reference the URLs of other resources such as images, other embedded media, scripts that affect page behavior, and Cascading Style Sheets that affect page layout. The browser will make additional HTTP requests to the web server for these other Internet media types. As it receives their content from the web server, the browser progressively renders the page onto the screen as specified by its HTML and these additional resources.

45

World Wide Web

46

Linking
Most web pages contain hyperlinks to other related pages and perhaps to downloadable files, source documents, definitions and other web resources. In the underlying HTML, a hyperlink looks like <a href="http://example.org/wiki/Main_Page">Example.org, a free encyclopedia</a> Such a collection of useful, related resources, interconnected via hypertext links is dubbed a web of information. Publication on the Internet created what Tim Berners-Lee first called the WorldWideWeb (in its original CamelCase, which was subsequently discarded) in November 1990.[4] The hyperlink structure of the WWW is described by the webgraph: the nodes of the webgraph correspond to the web pages (or URLs) the directed edges between them to the hyperlinks.
Graphic representation of a minute fraction of the Over time, many web resources pointed to by hyperlinks disappear, WWW, demonstrating hyperlinks relocate, or are replaced with different content. This makes hyperlinks obsolete, a phenomenon referred to in some circles as link rot and the hyperlinks affected by it are often called dead links. The ephemeral nature of the Web has prompted many efforts to archive web sites. The Internet Archive, active since 1996, is the best known of such efforts.

Dynamic updates of web pages


JavaScript is a scripting language that was initially developed in 1995 by Brendan Eich, then of Netscape, for use within web pages.[26] The standardised version is ECMAScript.[26] To make web pages more interactive, some web applications also use JavaScript techniques such as Ajax (asynchronous JavaScript and XML). Client-side script is delivered with the page that can make additional HTTP requests to the server, either in response to user actions such as mouse movements or clicks, or based on lapsed time. The server's responses are used to modify the current page rather than creating a new page with each response, so the server needs only to provide limited, incremental information. Multiple Ajax requests can be handled at the same time, and users can interact with the page while data is being retrieved. Web pages may also regularly poll the server to check whether new information is available.[27]

WWW prefix
Many domain names used for the World Wide Web begin with www because of the long-standing practice of naming Internet hosts (servers) according to the services they provide. The hostname for a web server is often www, in the same way that it may be ftp for an FTP server, and news or nntp for a USENET news server. These host names appear as Domain Name System or [domain name server](DNS) subdomain names, as in www.example.com. The use of 'www' as a subdomain name is not required by any technical or policy standard and many web sites do not use it; indeed, the first ever web server was called nxoc01.cern.ch.[28] According to Paolo Palazzi,[29] who worked at CERN along with Tim Berners-Lee, the popular use of 'www' subdomain was accidental; the World Wide Web project page was intended to be published at www.cern.ch while info.cern.ch was intended to be the CERN home page, however the dns records were never switched, and the practice of prepending 'www' to an institution's website domain name was subsequently copied. Many established websites still use 'www', or they invent other subdomain names such as 'www2', 'secure', etc. Many such web servers are set up so that both the domain root (e.g., example.com) and the www subdomain (e.g., www.example.com) refer to the same site; others require one form or the other, or they may map to different web sites. The use of a subdomain name is useful for load balancing incoming web traffic by creating a CNAME record that points to a cluster of web servers. Since, currently, only a subdomain can be used in a CNAME, the same result

World Wide Web cannot be achieved by using the bare domain root. When a user submits an incomplete domain name to a web browser in its address bar input field, some web browsers automatically try adding the prefix "www" to the beginning of it and possibly ".com", ".org" and ".net" at the end, depending on what might be missing. For example, entering 'microsoft' may be transformed to http://www.microsoft.com/ and 'openoffice' to http://www.openoffice.org. This feature started appearing in early versions of Mozilla Firefox, when it still had the working title 'Firebird' in early 2003, from an earlier practice in browsers such as Lynx.[30] It is reported that Microsoft was granted a US patent for the same idea in 2008, but only for mobile devices.[31] In English, www is usually read as double-u double-u double-u. Some users pronounce it dub-dub-dub, particularly in New Zealand. Stephen Fry, in his "Podgrammes" series of podcasts, pronouncing it wuh wuh wuh. The English writer Douglas Adams once quipped in The Independent on Sunday (1999): "The World Wide Web is the only thing I know of whose shortened form takes three times longer to say than what it's short for". In Mandarin Chinese, World Wide Web is commonly translated via a phono-semantic matching to wn wi wng ( ), which satisfies www and literally means "myriad dimensional net",[32] a translation that very appropriately reflects the design concept and proliferation of the World Wide Web. Tim Berners-Lee's web-space states that World Wide Web is officially spelled as three separate words, each capitalised, with no intervening hyphens.[33] Use of the www prefix is declining as Web 2.0 web applications seek to brand their domain names and make them easily pronounceable.[34] As the mobile web grows in popularity, services like Gmail.com, MySpace.com, Facebook.com, Bebo.com and Twitter.com are most often discussed without adding www to the domain (or, indeed, the .com).

47

Scheme specifiers: http and https


The scheme specifier http:// or https:// at the start of a Web URI refers to Hypertext Transfer Protocol or HTTP Secure respectively. Unlike www, which has no specific purpose, these specify the communication protocol to be used for the request and response. The HTTP protocol is fundamental to the operation of the World Wide Web and the added encryption layer in HTTPS is essential when confidential information such as passwords or banking information are to be exchanged over the public Internet. Web browsers usually prepend http:// to addresses too, if omitted.

Web servers
The primary function of a web server is to deliver web pages on the request to clients. This means delivery of HTML documents and any additional content that may be included by a document, such as images, style sheets and scripts.

Privacy
Every time a web page is requested from a web server the server can identify, and usually it logs, the IP address from which the request arrived. Equally, unless set not to do so, most web browsers record the web pages that have been requested and viewed in a history feature, and usually cache much of the content locally. Unless HTTPS encryption is used, web requests and responses travel in plain text across the internet and they can be viewed, recorded and cached by intermediate systems. When a web page asks for, and the user supplies, personally identifiable information such as their real name, address, e-mail address, etc., then a connection can be made between the current web traffic and that individual. If the website uses HTTP cookies, username and password authentication, or other tracking techniques, then it will be able to relate other web visits, before and after, to the identifiable information provided. In this way it is possible for a web-based organisation to develop and build a profile of the individual people who use its site or sites. It may be able to build a record for an individual that includes information about their leisure activities, their shopping

World Wide Web interests, their profession, and other aspects of their demographic profile. These profiles are obviously of potential interest to marketeers, advertisers and others. Depending on the website's terms and conditions and the local laws that apply information from these profiles may be sold, shared, or passed to other organisations without the user being informed. For many ordinary people, this means little more than some unexpected e-mails in their in-box, or some uncannily relevant advertising on a future web page. For others, it can mean that time spent indulging an unusual interest can result in a deluge of further targeted marketing that may be unwelcome. Law enforcement, counter terrorism and espionage agencies can also identify, target and track individuals based on what appear to be their interests or proclivities on the web. Social networking sites make a point of trying to get the user to truthfully expose their real names, interests and locations. This makes the social networking experience more realistic and therefore engaging for all their users. On the other hand, photographs uploaded and unguarded statements made will be identified to the individual, who may regret some decisions to publish these data. Employers, schools, parents and other relatives may be influenced by aspects of social networking profiles that the posting individual did not intend for these audiences. On-line bullies may make use of personal information to harass or stalk users. Modern social networking websites allow fine grained control of the privacy settings for each individual posting, but these can be complex and not easy to find or use, especially for beginners.[35] Photographs and videos posted onto websites have caused particular problems, as they can add a person's face to an on-line profile. With modern and potential facial recognition technology, it may then be possible to relate that face with other, previously anonymous, images, events and scenarios that have been imaged elsewhere. Because of image caching, mirroring and straightforward copying, it is difficult to imagine that an image, once published onto the World Wide Web, can ever actually or totally be removed.

48

Intellectual property
The intellectual property rights for any creative work initially rests with its creator. Web users who want to publish their work onto the World Wide Web, however, need to be aware of the details of the way they do it. If artwork, photographs, writings, poems, or technical innovations are published by their creator onto a privately owned web server, then they may choose the copyright and other conditions freely themselves. This is unusual though; more commonly work is uploaded to web sites and servers that are owned by other organizations. It depends upon the terms and conditions of the site or service provider to what extent the original owner automatically signs over rights to their work by the choice of destination and by the act of uploading. Many users of the web erroneously assume that everything they may find on line is freely available to them as if it was in the public domain. This is almost never the case, unless the web site publishing the work clearly states that it is. On the other hand, content owners are aware of this widespread belief, and expect that sooner or later almost everything that is published will probably be used in some capacity somewhere without their permission. Many publishers therefore embed visible or invisible digital watermarks in their media files, sometimes charging users to receive unmarked copies for legitimate use. Digital rights management includes forms of access control technology that further limit the use of digital content even after it has been bought or downloaded.

Security
The Web has become criminals' preferred pathway for spreading malware. Cybercrime carried out on the Web can include identity theft, fraud, espionage and intelligence gathering.[] Web-based vulnerabilities now outnumber traditional computer security concerns,[36][37] and as measured by Google, about one in ten web pages may contain malicious code.[38] Most Web-based attacks take place on legitimate websites, and most, as measured by Sophos, are hosted in the United States, China and Russia.[39] The most common of all malware threats is SQL injection attacks against websites.[40] Through HTML and URIs the Web was vulnerable to attacks like cross-site scripting (XSS) that came with the introduction of JavaScript[41] and were exacerbated to some degree by Web 2.0 and Ajax web design

World Wide Web that favors the use of scripts.[42] Today by one estimate, 70% of all websites are open to XSS attacks on their users.[43] Proposed solutions vary to extremes. Large security vendors like McAfee already design governance and compliance suites to meet post-9/11 regulations,[44] and some, like Finjan have recommended active real-time inspection of code and all content regardless of its source.[45] Some have argued that for enterprise to see security as a business opportunity rather than a cost center,[46] "ubiquitous, always-on digital rights management" enforced in the infrastructure by a handful of organizations must replace the hundreds of companies that today secure data and networks.[47] Jonathan Zittrain has said users sharing responsibility for computing safety is far preferable to locking down the Internet.[48]

49

Standards
Many formal standards and other technical specifications and software define the operation of different aspects of the World Wide Web, the Internet, and computer information exchange. Many of the documents are the work of the World Wide Web Consortium (W3C), headed by Berners-Lee, but some are produced by the Internet Engineering Task Force (IETF) and other organizations. Usually, when web standards are discussed, the following publications are seen as foundational: Recommendations for markup languages, especially HTML and XHTML, from the W3C. These define the structure and interpretation of hypertext documents. Recommendations for stylesheets, especially CSS, from the W3C. Standards for ECMAScript (usually in the form of JavaScript), from Ecma International. Recommendations for the Document Object Model, from W3C. Additional publications provide definitions of other essential technologies for the World Wide Web, including, but not limited to, the following: Uniform Resource Identifier (URI), which is a universal system for referencing resources on the Internet, such as hypertext documents and images. URIs, often called URLs, are defined by the IETF's RFC 3986 / STD 66: Uniform Resource Identifier (URI): Generic Syntax, as well as its predecessors and numerous URI scheme-defining RFCs; HyperText Transfer Protocol (HTTP), especially as defined by RFC 2616: HTTP/1.1 and RFC 2617: HTTP Authentication, which specify how the browser and server authenticate each other.

Accessibility
There are methods available for accessing the web in alternative mediums and formats, so as to enable use by individuals with disabilities. These disabilities may be visual, auditory, physical, speech related, cognitive, neurological, or some combination therin. Accessibility features also help others with temporary disabilities like a broken arm or the aging population as their abilities change.[49] The Web is used for receiving information as well as providing information and interacting with society. The World Wide Web Consortium claims it essential that the Web be accessible in order to provide equal access and equal opportunity to people with disabilities.[50] Tim Berners-Lee once noted, "The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect."[49] Many countries regulate web accessibility as a requirement for websites.[51] International cooperation in the W3C Web Accessibility Initiative led to simple guidelines that web content authors as well as software developers can use to make the Web accessible to persons who may or may not be using assistive technology.[49][52]

World Wide Web

50

Internationalization
The W3C Internationalization Activity assures that web technology will work in all languages, scripts, and cultures.[53] Beginning in 2004 or 2005, Unicode gained ground and eventually in December 2007 surpassed both ASCII and Western European as the Web's most frequently used character encoding.[54] Originally RFC 3986 allowed resources to be identified by URI in a subset of US-ASCII. RFC 3987 allows more charactersany character in the Universal Character Setand now a resource can be identified by IRI in any language.[55]

Statistics
Between 2005 and 2010, the number of Web users doubled, and was expected to surpass two billion in 2010.[56] Early studies in 1998 and 1999 estimating the size of the web using capture/recapture methods showed that much of the web was not indexed by search engines and the web was much larger than expected.[57][58] According to a 2001 study, there were a massive number, over 550 billion, of documents on the Web, mostly in the invisible Web, or Deep Web.[59] A 2002 survey of 2,024 million Web pages[60] determined that by far the most Web content was in English: 56.4%; next were pages in German (7.7%), French (5.6%), and Japanese (4.9%). A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005.[61] As of March 2009, the indexable web contains at least 25.21 billion pages.[62] On 25 July 2008, Google software engineers Jesse Alpert and Nissan Hajaj announced that Google Search had discovered one trillion unique URLs.[63] As of May 2009, over 109.5 million domains operated.[64] Of these 74% were commercial or other sites operating in the .com generic top-level domain.[64] Statistics measuring a website's popularity are usually based either on the number of page views or on associated server 'hits' (file requests) that it receives.

Speed issues
Frustration over congestion issues in the Internet infrastructure and the high latency that results in slow browsing has led to a pejorative name for the World Wide Web: the World Wide Wait.[65] Speeding up the Internet is an ongoing discussion over the use of peering and QoS technologies. Other solutions to reduce the congestion can be found at W3C.[66] Guidelines for Web response times are:[67] 0.1 second (one tenth of a second). Ideal response time. The user does not sense any interruption. 1 second. Highest acceptable response time. Download times above 1 second interrupt the user experience. 10 seconds. Unacceptable response time. The user experience is interrupted and the user is likely to leave the site or system.

Caching
If a user revisits a Web page after only a short interval, the page data may not need to be re-obtained from the source Web server. Almost all web browsers cache recently obtained data, usually on the local hard drive. HTTP requests sent by a browser will usually ask only for data that has changed since the last download. If the locally cached data are still current, they will be reused. Caching helps reduce the amount of Web traffic on the Internet. The decision about expiration is made independently for each downloaded file, whether image, stylesheet, JavaScript, HTML, or other resource. Thus even on sites with highly dynamic content, many of the basic resources need to be refreshed only occasionally. Web site designers find it worthwhile to collate resources such as CSS data and JavaScript into a few site-wide files so that they can be cached efficiently. This helps reduce page download times and lowers demands on the Web server. There are other components of the Internet that can cache Web content. Corporate and academic firewalls often cache Web resources requested by one user for the benefit of all. (See also caching proxy server.) Some search

World Wide Web engines also store cached content from websites. Apart from the facilities built into Web servers that can determine when files have been updated and so need to be re-sent, designers of dynamically generated Web pages can control the HTTP headers sent back to requesting users, so that transient or sensitive pages are not cached. Internet banking and news sites frequently use this facility. Data requested with an HTTP 'GET' is likely to be cached if other conditions are met; data obtained in response to a 'POST' is assumed to depend on the data that was POSTed and so is not cached.

51

References
[1] Quittner, Joshua (29 March 1999). "Tim Berners Lee Time 100 People of the Century" (http:/ / www. time. com/ time/ magazine/ article/ 0,9171,990627,00. html). Time Magazine. . Retrieved 17 May 2010. "He wove the World Wide Web and created a mass medium for the 21st century. The World Wide Web is Berners-Lee's alone. He designed it. He loosed it on the world. And he more than anyone else has fought to keep it open, nonproprietary and free. ." [2] "World Wide Web Consortium" (http:/ / www. w3. org/ ). . "The World Wide Web Consortium (W3C)..." [3] Le Web a t invent... en France ! Le Point (http:/ / www. lepoint. fr/ technologie/ le-web-a-ete-invente-en-france-31-01-2012-1425943_58. php) [4] "Berners-Lee, Tim; Cailliau, Robert (12 November 1990). "WorldWideWeb: Proposal for a hypertexts Project" (http:/ / w3. org/ Proposal. html). . Retrieved 27 July 2009. [5] Berners-Lee, Tim. "Pre-W3C Web and Internet Background" (http:/ / w3. org/ 2004/ Talks/ w3c10-HowItAllStarted/ ?n=15). World Wide Web Consortium. . Retrieved 21 April 2009. [6] von Braun, Wernher (May 1970). "TV Broadcast Satellite" (http:/ / www. popsci. com/ archive-viewer?id=8QAAAAAAMBAJ& pg=66& query=a+ c+ clarke). Popular Science: 6566. . Retrieved 12 January 2011. [7] Berners-Lee, Tim (March 1989). "Information Management: A Proposal" (http:/ / w3. org/ History/ 1989/ proposal. html). W3C. . Retrieved 27 July 2009. [8] "Tim Berners-Lee's original World Wide Web browser" (http:/ / info. cern. ch/ NextBrowser. html). . "With recent phenomena like blogs and wikis, the web is beginning to develop the kind of collaborative nature that its inventor envisaged from the start." [9] "Tim Berners-Lee: client" (http:/ / w3. org/ People/ Berners-Lee/ WorldWideWeb). W3.org. . Retrieved 27 July 2009. [10] "First Web pages" (http:/ / w3. org/ History/ 19921103-hypertext/ hypertext/ WWW/ TheProject. html). W3.org. . Retrieved 27 July 2009. [11] "Short summary of the World Wide Web project" (http:/ / groups. google. com/ group/ alt. hypertext/ msg/ 395f282a67a1916c). Google. 6 August 1991. . Retrieved 27 July 2009. [12] "Silvano de Gennaro disclaims 'the first photo on the web'" (http:/ / musiclub. web. cern. ch/ MusiClub/ bands/ cernettes/ disclaimer. html). . Retrieved 27 July 2012. "If you read well our website, it says that it was, to our knowledge, the 'first photo of a band'. Dozens of media are totally distorting our words for the sake of cheap sensationalism. Nobody knows which was the first photo on the web." [13] "W3C timeline" (http:/ / w3. org/ 2005/ 01/ timelines/ timeline-2500x998. png). . Retrieved 30 March 2010. [14] "About SPIRES" (http:/ / slac. stanford. edu/ spires/ about/ ). . Retrieved 30 March 2010. [15] "The Early World Wide Web at SLAC" (http:/ / www. slac. stanford. edu/ history/ earlyweb/ history. shtml). . [16] "A Little History of the World Wide Web" (http:/ / www. w3. org/ History. html). . [17] Conklin, Jeff (1987), IEEE Computer 20 (9): 1741 [18] "Inventor of the Week Archive: The World Wide Web" (http:/ / web. mit. edu/ invent/ iow/ berners-lee. html). Massachusetts Institute of Technology: MIT School of Engineering. . Retrieved 23 July 2009. [19] "Ten Years Public Domain for the Original Web Software" (http:/ / tenyears-www. web. cern. ch/ tenyears-www/ Welcome. html). Tenyears-www.web.cern.ch. 30 April 2003. . Retrieved 27 July 2009. [20] "Mosaic Web Browser History NCSA, Marc Andreessen, Eric Bina" (http:/ / livinginternet. com/ w/ wi_mosaic. htm). Livinginternet.com. . Retrieved 27 July 2009. [21] "NCSA Mosaic September 10, 1993 Demo" (http:/ / totic. org/ nscp/ demodoc/ demo. html). Totic.org. . Retrieved 27 July 2009. [22] "Vice President Al Gore's ENIAC Anniversary Speech" (http:/ / cs. washington. edu/ homes/ lazowska/ faculty. lecture/ innovation/ gore. html). Cs.washington.edu. 14 February 1996. . Retrieved 27 July 2009. [23] "Internet legal definition of Internet" (http:/ / legal-dictionary. thefreedictionary. com/ Internet). West's Encyclopedia of American Law, edition 2. Free Online Law Dictionary. 15 July 2009. . Retrieved 25 November 2008. [24] "WWW (World Wide Web) Definition" (http:/ / techterms. com/ definition/ www). TechTerms. . Retrieved 19 February 2010. [25] "The W3C Technology Stack" (http:/ / www. w3. org/ Consortium/ technology). World Wide Web Consortium. . Retrieved 21 April 2009. [26] Hamilton, Naomi (31 July 2008). "The A-Z of Programming Languages: JavaScript" (http:/ / computerworld. com. au/ article/ 255293/ -z_programming_languages_javascript). Computerworld. IDG. . Retrieved 12 May 2009. [27] Buntin, Seth (23 September 2008). "jQuery Polling plugin" (http:/ / buntin. org/ 2008/ sep/ 23/ jquery-polling-plugin/ ). . Retrieved 2009-08-22. [28] Berners-Lee, Tim. "Frequently asked questions by the Press" (http:/ / w3. org/ People/ Berners-Lee/ FAQ. html). W3C. . Retrieved 27 July 2009. [29] Palazzi, P (2011) 'The Early Days of the WWW at CERN' (http:/ / soft-shake. ch/ 2011/ en/ conference/ sessions. html?key=earlydays)

World Wide Web


[30] "automatically adding www.___.com" (http:/ / forums. mozillazine. org/ viewtopic. php?f=9& t=10980). mozillaZine. 16 May 2003. . Retrieved 27 May 2009. [31] Masnick, Mike (7 July 2008). "Microsoft Patents Adding 'www.' And '.com' To Text" (http:/ / techdirt. com/ articles/ 20080626/ 0203581527. shtml). Techdirt. . Retrieved 27 May 2009. [32] "MDBG Chinese-English dictionary Translate" (http:/ / us. mdbg. net/ chindict/ chindict. php?page=translate& trst=0& trqs=World+ Wide+ Web& trlang=& wddmtm=0). . Retrieved 27 July 2009. [33] "Frequently asked questions by the Press Tim BL" (http:/ / w3. org/ People/ Berners-Lee/ FAQ. html). W3.org. . Retrieved 27 July 2009. [34] "It's not your grandfather's Internet" (http:/ / findarticles. com/ p/ articles/ mi_hb6421/ is_4_92/ ai_n56479358/ ). Strategic Finance. 2010. . [35] boyd, danah; Hargittai, Eszter (July 2010). "Facebook privacy settings: Who cares?" (http:/ / www. uic. edu/ htbin/ cgiwrap/ bin/ ojs/ index. php/ fm/ article/ view/ 3086/ 2589). First Monday (University of Illinois at Chicago) 15 (8). . [36] Christey, Steve and Martin, Robert A. (22 May 2007). "Vulnerability Type Distributions in CVE (version 1.1)" (http:/ / cwe. mitre. org/ documents/ vuln-trends/ index. html). MITRE Corporation. . Retrieved 7 June 2008. [37] (PDF) Symantec Internet Security Threat Report: Trends for JulyDecember 2007 (Executive Summary) (http:/ / eval. symantec. com/ mktginfo/ enterprise/ white_papers/ b-whitepaper_exec_summary_internet_security_threat_report_xiii_04-2008. en-us. pdf). XIII. Symantec Corp.. April 2008. pp.12. . Retrieved 11 May 2008. [38] "Google searches web's dark side" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 6645895. stm). BBC News. 11 May 2007. . Retrieved 26 April 2008. [39] "Security Threat Report" (http:/ / www. sophos. com/ sophos/ docs/ eng/ marketing_material/ sophos-threat-report-Q108. pdf) (PDF). Sophos. Q1 2008. . Retrieved 24 April 2008. [40] "Security threat report" (http:/ / www. sophos. com/ sophos/ docs/ eng/ papers/ sophos-security-report-jul08-srna. pdf) (PDF). Sophos. July 2008. . Retrieved 24 August 2008. [41] Fogie, Seth, Jeremiah Grossman, Robert Hansen, and Anton Rager (2007) (PDF). Cross Site Scripting Attacks: XSS Exploits and Defense (http:/ / web. archive. org/ web/ 20080625065121/ http:/ / www. syngress. com/ book_catalog/ / SAMPLE_1597491543. pdf). Syngress, Elsevier Science & Technology. pp.6869, 127. ISBN1-59749-154-3. Archived from the original (http:/ / www. syngress. com/ book_catalog/ / SAMPLE_1597491543. pdf) on 25 June 2008. . Retrieved 6 June 2008. [42] O'Reilly, Tim (30 September 2005). "What Is Web 2.0" (http:/ / www. oreillynet. com/ pub/ a/ oreilly/ tim/ news/ 2005/ 09/ 30/ what-is-web-20. html). O'Reilly Media. pp.45. . Retrieved 4 June 2008. and AJAX web applications can introduce security vulnerabilities like "client-side security controls, increased attack surfaces, and new possibilities for Cross-Site Scripting (XSS)", in Ritchie, Paul (March 2007). "The security risks of AJAX/web 2.0 applications" (http:/ / web. archive. org/ web/ 20080625065122/ http:/ / www. infosecurity-magazine. com/ research/ Sep07_Ajax. pdf) (PDF). Infosecurity (Elsevier). Archived from the original (http:/ / www. infosecurity-magazine. com/ research/ Sep07_Ajax. pdf) on 25 June 2008. . Retrieved 6 June 2008. which cites Hayre, Jaswinder S. and Kelath, Jayasankar (22 June 2006). "Ajax Security Basics" (http:/ / www. securityfocus. com/ infocus/ 1868). SecurityFocus. . Retrieved 6 June 2008. [43] Berinato, Scott (1 January 2007). "Software Vulnerability Disclosure: The Chilling Effect" (http:/ / web. archive. org/ web/ 20080418072230/ http:/ / www. csoonline. com/ article/ 221113). CSO (CXO Media): p.7. Archived from the original (http:/ / www. csoonline. com/ article/ 221113) on 18 April 2008. . Retrieved 7 June 2008. [44] Prince, Brian (9 April 2008). "McAfee Governance, Risk and Compliance Business Unit" (http:/ / www. eweek. com/ c/ a/ Security/ McAfee-Governance-Risk-and-Compliance-Business-Unit/ ). eWEEK (Ziff Davis Enterprise Holdings). . Retrieved 25 April 2008. [45] Ben-Itzhak, Yuval (18 April 2008). "Infosecurity 2008 New defence strategy in battle against e-crime" (http:/ / www. computerweekly. com/ Articles/ 2008/ 04/ 18/ 230345/ infosecurity-2008-new-defence-strategy-in-battle-against. htm). ComputerWeekly (Reed Business Information). . Retrieved 20 April 2008. [46] Preston, Rob (12 April 2008). "Down To Business: It's Past Time To Elevate The Infosec Conversation" (http:/ / www. informationweek. com/ news/ security/ client/ showArticle. jhtml?articleID=207100989). InformationWeek (United Business Media). . Retrieved 25 April 2008. [47] Claburn, Thomas (6 February 2007). "RSA's Coviello Predicts Security Consolidation" (http:/ / www. informationweek. com/ news/ security/ showArticle. jhtml?articleID=197003826). InformationWeek (United Business Media). . Retrieved 25 April 2008. [48] Duffy Marsan, Carolyn (9 April 2008). "How the iPhone is killing the 'Net" (http:/ / www. networkworld. com/ news/ 2008/ 040908-zittrain. html). Network World (IDG). . Retrieved 17 April 2008. [49] "Web Accessibility Initiative (WAI)" (http:/ / www. w3. org/ WAI/ l). World Wide Web Consortium. . Retrieved 7 April 2009. [50] "Developing a Web Accessibility Business Case for Your Organization: Overview" (http:/ / www. w3. org/ WAI/ bcase/ Overview). World Wide Web Consortium. . Retrieved 7 April 2009. [51] "Legal and Policy Factors in Developing a Web Accessibility Business Case for Your Organization" (http:/ / www. w3. org/ WAI/ bcase/ pol). World Wide Web Consortium. . Retrieved 7 April 2009. [52] "Web Content Accessibility Guidelines (WCAG) Overview" (http:/ / www. w3. org/ WAI/ intro/ wcag. php). World Wide Web Consortium. . Retrieved 7 April 2009. [53] "Internationalization (I18n) Activity" (http:/ / www. w3. org/ International/ ). World Wide Web Consortium. . Retrieved 10 April 2009. [54] Davis, Mark (5 April 2008). "Moving to Unicode 5.1" (http:/ / googleblog. blogspot. com/ 2008/ 05/ moving-to-unicode-51. html). Google. . Retrieved 10 April 2009. [55] "World Wide Web Consortium Supports the IETF URI Standard and IRI Proposed Standard" (http:/ / www. w3. org/ 2004/ 11/ uri-iri-pressrelease. html) (Press release). World Wide Web Consortium. 26 January 2005. . Retrieved 10 April 2009.

52

World Wide Web


[56] Lynn, Jonathan (19 October 2010). "Internet users to exceed 2 billion ..." (http:/ / www. reuters. com/ article/ 2010/ 10/ 19/ us-telecoms-internet-idUSTRE69I24720101019). Reuters. . Retrieved 9 February 2011. [57] S. Lawrence, C.L. Giles, "Searching the World Wide Web," Science, 280(5360), 98100, 1998. [58] S. Lawrence, C.L. Giles, "Accessibility of Information on the Web," Nature, 400, 107109, 1999. [59] "The 'Deep' Web: Surfacing Hidden Value" (http:/ / web. archive. org/ web/ 20080404044203/ http:/ / www. brightplanet. com/ resources/ details/ deepweb. html). Brightplanet.com. Archived from the original (http:/ / www. brightplanet. com/ resources/ details/ deepweb. html) on 4 April 2008. . Retrieved 27 July 2009. [60] "Distribution of languages on the Internet" (http:/ / www. netz-tipp. de/ languages. html). Netz-tipp.de. . Retrieved 27 July 2009. [61] Alessio Signorini. "Indexable Web Size" (http:/ / www. cs. uiowa. edu/ ~asignori/ web-size/ ). Cs.uiowa.edu. . Retrieved 27 July 2009. [62] "The size of the World Wide Web" (http:/ / www. worldwidewebsize. com/ ). Worldwidewebsize.com. . Retrieved 27 July 2009. [63] Alpert, Jesse; Hajaj, Nissan (25 July 2008). "We knew the web was big..." (http:/ / googleblog. blogspot. com/ 2008/ 07/ we-knew-web-was-big. html). The Official Google Blog. . [64] "Domain Counts & Internet Statistics" (http:/ / www. domaintools. com/ internet-statistics/ ). Name Intelligence. . Retrieved 17 May 2009. [65] "World Wide Wait" (http:/ / www. techweb. com/ encyclopedia/ defineterm. jhtml?term=world+ wide+ wait). TechEncyclopedia. United Business Media. . Retrieved 10 April 2009. [66] Khare, Rohit and Jacobs, Ian (1999). "W3C Recommendations Reduce 'World Wide Wait'" (http:/ / www. w3. org/ Protocols/ NL-PerfNote. html). World Wide Web Consortium. . Retrieved 10 April 2009. [67] Nielsen, Jakob (from Miller 1968; Card et al. 1991) (1994). "5" (http:/ / www. useit. com/ papers/ responsetime. html). Usability Engineering: Response Times: The Three Important Limits. Morgan Kaufmann. . Retrieved 10 April 2009.

53

Further reading
Niels Brgger, ed. Web History (2010) 362 pages; Historical perspective on the World Wide Web, including issues of culture, content, and preservation. Fielding, R.; Gettys, J.; Mogul, J.; Frystyk, H.; Masinter, L.; Leach, P.; Berners-Lee, T. (June 1999). Hypertext Transfer Protocol HTTP/1.1 (ftp://ftp.isi.edu/in-notes/rfc2616.txt). Request For Comments 2616. Information Sciences Institute. Berners-Lee, Tim; Bray, Tim; Connolly, Dan; Cotton, Paul; Fielding, Roy; Jeckle, Mario; Lilley, Chris; Mendelsohn, Noah; Orchard, David; Walsh, Norman; Williams, Stuart (15 December 2004). Architecture of the World Wide Web, Volume One (http://www.w3.org/TR/webarch/). Version 20041215. W3C. Polo, Luciano (2003). "World Wide Web Technology Architecture: A Conceptual Analysis" (http://newdevices. com/publicaciones/www/). New Devices. Retrieved 31 July 2005. Skau, H.O. (March 1990). "The World Wide Web and Health Information" (http://newdevices.com/ publicaciones/www/). New Devices. Retrieved 1989.

External links
Early archive of the first Web site (http://www.w3.org/History/19921103-hypertext/hypertext/WWW/) Internet Statistics: Growth and Usage of the Web and the Internet (http://www.mit.edu/people/mkgray/net/) Living Internet (http://www.livinginternet.com/w/w.htm) A comprehensive history of the Internet, including the World Wide Web. Web Design and Development (http://www.dmoz.org/Computers/Internet/Web_Design_and_Development/) at the Open Directory Project World Wide Web Consortium (W3C) (http://www.w3.org/) W3C Recommendations Reduce "World Wide Wait" (http://www.w3.org/Protocols/NL-PerfNote.html) World Wide Web Size (http://www.worldwidewebsize.com/) Daily estimated size of the World Wide Web. Antonio A. Casilli, Some Elements for a Sociology of Online Interactions (http://cle.ens-lyon.fr/40528325/0/ fiche___pagelibre/) The Erds Webgraph Server (http://web-graph.org/) offers weekly updated graph representation of a constantly increasing fraction of the WWW.

History of the World Wide Web

54

History of the World Wide Web


The World Wide Web ("WWW" or simply the "Web") is a global information medium which users can read and write via computers connected to the Internet. The term is often mistakenly used as a synonym for the Internet itself, but the Web is a service that operates over the Internet, just as e-mail also does. The history of the Internet dates back significantly further than that of the World Wide Web. The hypertext portion of the Web in particular has an intricate intellectual history; notable influences and precursors include Vannevar Bush's Memex,[1] IBM's Generalized Markup Language,[2] and Ted Nelson's Project Xanadu.[1]

Today, the Web and the Internet allow connectivity from literally everywhere on eartheven ships at sea and in outer space.

The concept of a home-based global information system goes at least as far back as "A Logic Named Joe", a 1946 short story by Murray Leinster, in which computer terminals, called "logics," were in every home. Although the computer system in the story is centralized, the story captures some of the feeling of the ubiquitous information explosion driven by the Web.

19791991: Development of the World Wide Web


"In August, 1984 I wrote a proposal to the SW Group Leader, Les Robertson, for the establishment of a pilot project to install and evaluate TCP/IP protocols on some key non-Unix machines at CERN ... By 1990 CERN had become the largest Internet site in Europe and this fact... positively in Europe and elsewhere... A key result of all these happenings was that by 1989 CERN's Internet facility was ready to become the medium within which Tim Berners-Lee would create the World Wide Web with a truly visionary idea..." Ben Segal. Short History of Internet Protocols at CERN, April 1995 [3] In 1980, Tim Berners-Lee, an independent contractor at the European Organization for Nuclear Research (CERN), Switzerland, built ENQUIRE, as a personal database of people and software models, but also as a way to play with hypertext; each new page of information in ENQUIRE had to be linked to an existing page.[1] In 1984 Berners-Lee returned to CERN, and considered its problems of information presentation: physicists from around the world needed to share data, and with no common machines and no common presentation software. He wrote a proposal in The NeXTcube used by Tim Berners-Lee at CERN March 1989 for "a large hypertext database with typed became the first Web server. links", but it generated little interest. His boss, Mike Sendall, encouraged Berners-Lee to begin implementing his system on a newly acquired NeXT workstation.[4] He considered several names, including Information

History of the World Wide Web Mesh,[5] The Information Mine (turned down as it abbreviates to TIM, the WWW's creator's name) or Mine of Information (turned down because it abbreviates to MOI which is "Me" in French), but settled on World Wide Web.[6] He found an enthusiastic collaborator in Robert Cailliau, who rewrote the proposal (published on November 12, 1990) and sought resources within CERN. Berners-Lee and Cailliau pitched their ideas to the European Conference on Hypertext Technology in September 1990, but found no vendors who could appreciate their vision of marrying hypertext with the Internet. By Christmas 1990, Berners-Lee had built all the tools necessary for a working Web: the HyperText Transfer Protocol (HTTP) 0.9 [7], the HyperText Markup Language (HTML), the first Robert Cailliau, Jean-Franois Abramatic and Tim Berners-Lee at Web browser (named WorldWideWeb, which the 10th anniversary of the WWW Consortium. was also a Web editor), the first HTTP server software (later known as CERN httpd), the first web server (http:/ / info. cern. ch), and the first Web pages that described the project itself. The browser could access Usenet newsgroups and FTP files as well. However, it could run only on the NeXT; Nicola Pellow therefore created a simple text browser that could run on almost any computer called the Line Mode Browser.[8] To encourage use within CERN, Bernd Pollermann put the CERN telephone directory on the web previously users had to log onto the mainframe in order to look up phone numbers.[8] According to Tim Berners-Lee, the Web was mainly invented in the Building 31 at CERN ( 461357N 60242E ) but also at home, in the two houses he lived in during that time (one in France, one in Switzerland).[9] On August 6, 1991,[10] Berners-Lee posted a short summary of the World Wide Web project on the alt.hypertext newsgroup.[11] This date also marked the debut of the Web as a publicly available service on the Internet. The WorldWideWeb (WWW) project aims to allow all links to be made to any information anywhere. [...] The WWW project was started to allow high energy physicists to share data, news, and documentation. We are very interested in spreading the web to other areas, and having gateway servers for other data. Collaborators welcome!" from Tim Berners-Lee's first message Paul Kunz from the Stanford Linear Accelerator Center visited CERN in September 1991, and was captivated by the Web. He brought the NeXT software back to SLAC, where librarian Louise Addis adapted it for the VM/CMS operating system on the IBM mainframe as a way to display SLACs catalog of online documents;[8] this was the first web server outside of Europe and the first in North America.[12] An early CERN-related contribution to the Web was the parody band Les Horribles Cernettes, whose promotional image is believed to be among the Web's first five pictures.[13]

55

History of the World Wide Web

56

19921995: Growth of the WWW


In keeping with its birth at CERN, early adopters of the World Wide Web were primarily university-based scientific departments or physics laboratories such as Fermilab and SLAC. Early websites intermingled links for both the HTTP web protocol and the then-popular Gopher protocol, which provided access to content through hypertext menus presented as a file system rather than through HTML files. Early Web users would navigate either by bookmarking popular directory pages, such as Berners-Lee's first site at http://info.cern.ch/, or by consulting updated lists such as the NCSA "What's New" page. Some sites were also indexed by WAIS, enabling users to submit full-text searches similar to the capability later provided by search engines. There was still no graphical browser available for computers besides the NeXT. This gap was filled in April 1992 with the release of Erwise, an application developed at the Helsinki University of Technology, and in May by ViolaWWW, created by Pei-Yuan Wei, which included advanced features such as embedded graphics, scripting, and animation.[8] ViolaWWW was originally an application for HyperCard. Both programs ran on the X Window System for Unix.[8] Students at the University of Kansas adapted an existing text-only hypertext browser, Lynx, to access the web. Lynx was available on Unix and DOS, and some web designers, unimpressed with glossy graphical websites, held that a website not accessible through Lynx wasnt worth visiting.

Early browsers
The turning point for the World Wide Web was the introduction[14] of the Mosaic web browser[15] in 1993, a graphical browser developed by a team at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign (UIUC), led by Marc Andreessen. Funding for Mosaic came from the High-Performance Computing and Communications Initiative, a funding program initiated by then-Senator Al Gore's High Performance Computing and Communication Act of 1991 also known as the Gore Bill.[16] Remarkably the first Mosaic Browser lacked a "back button" which was proposed in 1992-3 by the same individual who invented the concept of clickable text documents. The request was emailed from the University of Texas computing facility. The browser was intended to be an editor and not simply a viewer, but was to work with computer generated hyper text lists called "search engines". The origins of Mosaic had begun in 1992. In November 1992, the NCSA at the University of Illinois (UIUC) established a website. In December 1992, Andreessen and Eric Bina, students attending UIUC and working at the NCSA, began work on Mosaic. They released an X Window browser in February 1993. It gained popularity due to its strong support of integrated multimedia, and the authors rapid response to user bug reports and recommendations for new features. The first Microsoft Windows browser was Cello, written by Thomas R. Bruce for the Legal Information Institute at Cornell Law School to provide legal information, since more lawyers had more access to Windows than to Unix. Cello was released in June 1993.[8] After graduation from UIUC, Andreessen and James H. Clark, former CEO of Silicon Graphics, met and formed Mosaic Communications Corporation to develop the Mosaic browser commercially. The company changed its name to Netscape in April 1994, and the browser was developed further as Netscape Navigator.

History of the World Wide Web

57

Web organization
In May 1994 the first International WWW Conference, organized by Robert Cailliau,[17][18] was held at CERN;[19] the conference has been held every year since. In April 1993 CERN had agreed that anyone could use the Web protocol and code royalty-free; this was in part a reaction to the perturbation caused by the University of Minnesota announcing that it would begin charging license fees for its implementation of the Gopher protocol. In September 1994, Berners-Lee founded the World Wide Web Consortium (W3C) at the Massachusetts Institute of Technology with support from the Defense Advanced Research Projects Agency (DARPA) and the European Commission. It comprised various companies that were willing to create standards and recommendations to improve the quality of the Web. Berners-Lee made the Web available freely, with no patent and no royalties due. The W3C decided that their standards must be based on royalty-free technology, so they can be easily adopted by anyone. By the end of 1994, while the total number of websites was still minute compared to present standards, quite a number of notable websites were already active, many of which are the precursors or inspiring examples of today's most popular services.

19961998: Commercialization of the WWW


By 1996 it became obvious to most publicly traded companies that a public Web presence was no longer optional. Though at first people saw mainly the possibilities of free publishing and instant worldwide information, increasing familiarity with two-way communication over the "Web" led to the possibility of direct Web-based commerce (e-commerce) and instantaneous group communications worldwide. More dotcoms, displaying products on hypertext webpages, were added into the Web.

19992001: "Dot-com" boom and bust


Low interest rates in 199899 facilitated an increase in start-up companies. Although a number of these new entrepreneurs had realistic plans and administrative ability, most of them lacked these characteristics but were able to sell their ideas to investors because of the novelty of the dot-com concept. Historically, the dot-com boom can be seen as similar to a number of other technology-inspired booms of the past including railroads in the 1840s, automobiles in the early 20th century, radio in the 1920s, television in the 1940s, transistor electronics in the 1950s, computer time-sharing in the 1960s, and home computers and biotechnology in the early 1980s. In 2001 the bubble burst, and many dot-com startups went out of business after burning through their venture capital and failing to become profitable. Many others, however, did survive and thrive in the early 21st century. Many companies which began as online retailers blossomed and became highly profitable. More conventional retailers found online merchandising to be a profitable additional source of revenue. While some online entertainment and news outlets failed when their seed capital ran out, others persisted and eventually became economically self-sufficient. Traditional media outlets (newspaper publishers, broadcasters and cablecasters in particular) also found the Web to be a useful and profitable additional channel for content distribution, and an additional vehicle to generate advertising revenue. The sites that survived and eventually prospered after the bubble burst had two things in common; a sound business plan, and a niche in the marketplace that was, if not unique, particularly well-defined and well-served.

History of the World Wide Web

58

2002present: The Web becomes ubiquitous


In the aftermath of the dot-com bubble, telecommunications companies had a great deal of overcapacity as many Internet business clients went bust. That, plus ongoing investment in local cell infrastructure kept connectivity charges low, and helping to make high-speed Internet connectivity more affordable. During this time, a handful of companies found success developing business models that helped make the World Wide Web a more compelling experience. These include airline booking sites, Google's search engine and its profitable approach to simplified, keyword-based advertising, as well as ebay's do-it-yourself auction site and Amazon.com's online department store. This new era also begot social networking websites, such as MySpace and Facebook, which, though unpopular at first, very rapidly gained acceptance in becoming a major part of youth culture.

Web 2.0
Beginning in 2002, new ideas for sharing and exchanging content ad hoc, such as Weblogs and RSS, rapidly gained acceptance on the Web. This new model for information exchange, primarily featuring DIY user-edited and generated websites, was coined Web 2.0. The Web 2.0 boom saw many new service-oriented startups catering to a new, democratized Web. Some believe it will be followed by the full realization of a Semantic Web. Tim Berners-Lee originally expressed the vision of the Semantic Web as follows:[20] I have a dream for the Web [in which computers] become capable of analyzing all the data on the Web the content, links, and transactions between people and computers. A Semantic Web, which should make this possible, has yet to emerge, but when it does, the day-to-day mechanisms of trade, bureaucracy and our daily lives will be handled by machines talking to machines. The intelligent agents people have touted for ages will finally materialize. Tim Berners-Lee, 1999 Predictably, as the World Wide Web became easier to query, attained a higher degree of usability, and shed its esoteric reputation, it gained a sense of organization and unsophistication which opened the floodgates and ushered in a rapid period of popularization. New sites such as Wikipedia and its sister projects proved revolutionary in executing the User edited content concept. In 2005, 3 ex-PayPal employees formed a video viewing website called YouTube. Only a year later, YouTube was proven the most quickly popularized website in history, and even started a new concept of user-submitted content in major events, as in the CNN-YouTube Presidential Debates. The popularity of YouTube, Facebook, etc., combined with the increasing availability and affordability of high-speed connections has made video content far more common on all kinds of websites. Many video-content hosting and creation sites provide an easy means for their videos to be embedded on third party websites without payment or permission. This combination of more user-created or edited content, and easy means of sharing content, such as via RSS widgets and video embedding, has led to many sites with a typical "Web 2.0" feel. They have articles with embedded video, user-submitted comments below the article, and RSS boxes to the side, listing some of the latest articles from other sites. Continued extension of the World Wide Web has focused on connecting devices to the Internet, coined Intelligent Device Management. As Internet connectivity becomes ubiquitous, manufacturers have started to leverage the expanded computing power of their devices to enhance their usability and capability. Through Internet connectivity, manufacturers are now able to interact with the devices they have sold and shipped to their customers, and customers are able to interact with the manufacturer (and other providers) to access new content. Lending credence to the idea of the ubiquity of the web, Web 2.0 has found a place in the global English lexicon. On June 10, 2009 the Global Language Monitor declared it to be the one-millionth English word.[21]

History of the World Wide Web

59

References
Robert Cailliau, James Gillies, How the Web Was Born: The Story of the World Wide Web, ISBN 978-0-19-286207-5, Oxford University Press (Jan 1, 2000) Tim Berners-Lee with Mark Fischetti, Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor, ISBN 978-0-06-251586-5, HarperSanFrancisco, 1999 978-0-06-251587-X (pbk.), HarperSanFrancisco, 2000 Andrew Herman, The World Wide Web and Contemporary Cultural Theory : Magic, Metaphor, Power, ISBN 978-0-415-92502-0, Routledge, 1st Edition (June 2000) History of computer by Ahmad Abubakar Umar 2010

Footnotes
[1] Berners-Lee, Tim. "Frequently asked questions - Start of the web: Influences" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#Influences). World Wide Web Consortium. . Retrieved 22 July 2010. [2] Berners-Lee, Tim. "Frequently asked questions - Why the //, #, etc?" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#etc). World Wide Web Consortium. . Retrieved 22 July 2010. [3] A Short History of Internet Protocols at CERN (http:/ / ben. home. cern. ch/ ben/ TCPHIST. html) by Ben Segal. 1995 [4] The Next Crossroad of Web History (http:/ / www. netvalley. com/ intvalnext. html) by Gregory Gromov [5] Berners-Lee, Tim (May 1990). "Information Management: A Proposal" (http:/ / www. w3. org/ History/ 1989/ proposal. html). World Wide Web Consortium. . Retrieved 24 August 2010. [6] Tim Berners-Lee, Weaving the Web, HarperCollins, 2000, p.23 [7] http:/ / www. w3. org/ Protocols/ HTTP/ AsImplemented. html [8] Berners-Lee, Tim (ca 1993/1994). "A Brief History of the Web" (http:/ / www. w3. org/ DesignIssues/ TimBook-old/ History. html). World Wide Web Consortium. . Retrieved 17 August 2010. [9] (http:/ / davidgalbraith. org/ uncategorized/ the-exact-location-where-the-web-was-invented/ 2343/ ) Tim Berners-Lee's account of the exact locations at CERN where the Web was invented [10] How the web went world wide (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 5242252. stm), Mark Ward, Technology Correspondent, BBC News. Retrieved 24 January 2011 [11] Berners-Lee, Tim. "Qualifiers on Hypertext links... - alt.hypertext" (http:/ / groups. google. com/ group/ alt. hypertext/ tree/ browse_frm/ thread/ 7824e490ea164c06/ f61c1ef93d2a8398?rnum=1& hl=en& q=group:alt. hypertext+ author:Tim+ author:Berners-Lee& _done=/ group/ alt. hypertext/ browse_frm/ thread/ 7824e490ea164c06/ f61c1ef93d2a8398?tvc=1& q=group:alt. hypertext+ author:Tim+ author:Berners-Lee& hl=en& #doc_06dad279804cb3ba). . Retrieved 11 July 2012. [12] Tim Berners-Lee, Weaving the Web, HarperCollins, 2000, p.46 [13] Heather McCabe (1999-02-09). "Grrl Geeks Rock Out" (http:/ / www. wired. com/ news/ culture/ 0,1294,17821,00. html). Wired magazine. . [14] Mosaic Web Browser History NCSA, Marc Andreessen, Eric Bina (http:/ / www. livinginternet. com/ w/ wi_mosaic. htm) [15] NCSA Mosaic September 10, 1993 Demo (http:/ / www. totic. org/ nscp/ demodoc/ demo. html) [16] Vice President Al Gore's ENIAC Anniversary Speech (http:/ / www. cs. washington. edu/ homes/ lazowska/ faculty. lecture/ innovation/ gore. html). [17] Robert Cailliau (21 July 2010). "A Short History of the Web" (http:/ / www. netvalley. com/ archives/ mirrors/ robert_cailliau_speech. htm). NetValley. . Retrieved 21 July 2010. [18] Tim Berners-Lee. "Frequently asked questions - Robert Cailliau's role" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#Cailliau). World Wide Web Consortium. . Retrieved 22 July 2010. [19] "IW3C2 - Past and Future Conferences" (http:/ / www. iw3c2. org/ conferences). International World Wide Web Conferences Steering Committee. 2010-05-02. . Retrieved 16 May 2010. [20] Berners-Lee, Tim; Fischetti, Mark (1999). Weaving the Web. HarperSanFrancisco. chapter 12. ISBN978-0-06-251587-2. [21] "'Millionth English Word' declared". NEWS.BBC.co.uk (http:/ / news. bbc. co. uk/ 1/ hi/ world/ americas/ 8092549. stm)

History of the World Wide Web

60

External links
First World Web site (http://info.cern.ch/) The World Wide Web History Project (http://www.webhistory.org/home.html) Important Events in the History of the World Wide Web (http://internet-browser-review.toptenreviews.com/ important-events-in-the-history-of-the-world-wide-web.html) Internet History (http://www.computerhistory.org/internet_history/), Computer History Museum

61

Precursors and early development


Intergalactic Computer Network
Intergalactic Computer Network can be said to be the first conception of what would eventually become the Internet. The Internet Society has used a short form Galactic Network for the same thing.[1] J.C.R. Licklider used the term at ARPA in 1963, addressing his colleagues as "Members and Affiliates of the Intergalactic Computer Network".[2]

References
[1] Leiner, Barry M. et al. (2003-12-10). ""Origins of the Internet" in A Brief History of the Internet version 3.32" (http:/ / www. isoc. org/ internet/ history/ brief. shtml#Origins). The Internet Society. . Retrieved 2007-11-03. [2] Licklider, J. C. R. (23 April 1963). "Topics for Discussion at the Forthcoming Meeting, Memorandum For: Members and Affiliates of the Intergalactic Computer Network" (http:/ / www. kurzweilai. net/ articles/ art0366. html?printable=1). Washington, D.C.: Advanced Research Projects Agency, via KurzweilAI.net. . Retrieved 2007-11-03.

Further reading
Jones, Steve (2003). Encyclopedia of New Media (http://books.google.com/books?id=26NyHREJwP8C& pg=PT253). Sage Publications, via Google Books limited preview. p.287. ISBN0-7619-2382-9. Retrieved 2007-11-03. Page, Dan and Cynthia Lee (1999). "Looking Back at Start of a Revolution" (http://web.archive.org/web/ 20071224090235/http://www.today.ucla.edu/1999/990928looking.html). UCLA Today (The Regents of the University of California (UC Regents)). Archived from the original (http://www.today.ucla.edu/1999/ 990928looking.html) on 2007-12-24. Retrieved 2007-11-03. Hauben, Ronda (19 March 2001). "Draft for Comment 1.001, "The Information Processing Techniques Office and the Birth of the Internet"" (http://www.columbia.edu/~rh120/other/misc/lick101.doc) (Microsoft Word). Retrieved 2007-11-03.

ARPANET

62

ARPANET
ARPANET

ARPANET logical map, March 1977 Commercial? No

Type of network data Location Protocols Established Funding Current status USA NCP, TCP/IP 1969 DARPA defunct, superseded by NSFNET in 1990

The Advanced Research Projects Agency Network (ARPANET) was the world's first operational packet switching network and the progenitor of what was to become the global Internet. The network was initially funded by the Advanced Research Projects Agency (ARPA, later DARPA) within the U.S. Department of Defense for use by its projects at universities and research laboratories in the US. The packet switching of the ARPANET was based on designs by British scientist Donald Davies[1][2] and Lawrence Roberts of the Lincoln Laboratory.[3]

History
Packet switching, today the dominant basis for data communications worldwide, was a new concept at the time of the conception of the ARPANET. Prior to the advent of packet switching, both voice and data communications had been based on the idea of circuit switching, as in the traditional telephone circuit, wherein each telephone call is allocated a dedicated, end to end, electronic connection between the two communicating stations. Such stations might be telephones or computers. The (temporarily) dedicated line is typically composed of many intermediary lines which are assembled into a chain that stretches all the way from the originating station to the destination station. With packet switching, a data system could use a single communications link to communicate with more than one machine by collecting data into datagrams and transmitting these as packets onto the attached network link, as soon as the link becomes idle. Thus, not only can the link be shared, much as a single post box can be used to post letters to different destinations, but each packet can be routed independently of other packets.[4] The earliest ideas for a computer network intended to allow general communications among computer users were formulated by computer scientist J. C. R. Licklider, of Bolt, Beranek and Newman (BBN), in August 1962, in memoranda discussing his concept for an "Intergalactic Computer Network". Those ideas contained almost everything that composes the contemporary Internet. In October 1963, Licklider was appointed head of the Behavioral Sciences and Command and Control programs at the Defense Department's Advanced Research Projects Agency ARPA (the initial ARPANET acronym). He then convinced Ivan Sutherland and Bob Taylor that this computer network concept was very important and merited development, although Licklider left ARPA before any

ARPANET contracts were let that worked on this concept.[5] Ivan Sutherland and Bob Taylor continued their interest in creating such a computer communications network, in part, to allow ARPA-sponsored researchers at various corporate and academic locales to put to use the computers ARPA was providing them, and, in part, to make new software and other computer science results quickly and widely available.[6] In his office, Taylor had three computer terminals, each connected to separate computers, which ARPA was funding: the first, for the System Development Corporation (SDC) Q-32, in Santa Monica; the second, for Project Genie, at the University of California, Berkeley; and the third, for Multics, at MIT. Taylor recalls the circumstance: "For each of these three terminals, I had three different sets of user commands. So, if I was talking online with someone at S.D.C., and I wanted to talk to someone I knew at Berkeley, or M.I.T., about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. I said, "Oh Man!", it's obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go. That idea is the ARPANET".[7] Somewhat contemporaneously, several other people had (mostly independently) worked out the aspects of "packet switching", with the first public demonstration presented by the National Physical Laboratory (NPL), on 5 August 1968, in the United Kingdom.[8]

63

Creation
By mid-1968, Taylor had prepared a complete plan for a computer network, and, after ARPA's approval, a Request for Quotation (RFQ) was sent to 140 potential bidders. Most computer science companies regarded the ARPATaylor proposal as outlandish, and only twelve submitted bids to build the network; of the twelve, ARPA regarded only four as top-rank contractors. At year's end, ARPA considered only two contractors, and awarded the contract to build the network to BBN Technologies on 7 April 1969. The initial, seven-man BBN team were much aided by the technical specificity of their response to the ARPA RFQ and thus quickly produced the first working computers. This team was led by Frank Heart. The BBN-proposed network closely followed Taylor's ARPA plan: a network composed of small computers called Interface Message Processors (IMPs), that functioned as gateways (today called routers) interconnecting local resources. At each site, the IMPs performed store-and-forward packet switching functions, Len Kleinrock and the first Interface Message and were interconnected with modems that were connected to [9] Processor. leased lines, initially running at 50kbit/second. The host computers were connected to the IMPs via custom serial communication interfaces. The system, including the hardware and the packet switching software, was designed and installed in nine months.[10] The first-generation IMPs were initially built by BBN Technologies using a rugged computer version of the Honeywell DDP-516 computer configured with 24kB of expandable core memory, and a 16-channel Direct Multiplex Control (DMC) direct memory access unit.[11] The DMC established custom interfaces with each of the host computers and modems. In addition to the front-panel lamps, the DDP-516 computer also features a special set of 24 indicator-lamps showing the status of the IMP communication channels. Each IMP could support up to four local hosts, and could communicate with up to six remote IMPs via leased lines.

ARPANET

64

Misconceptions of design goals


Common ARPANET lore posits that the computer network was designed to survive a nuclear attack. In A Brief History of the Internet, the Internet Society describes the coalescing of the technical ideas that produced the ARPANET: It was from the RAND study that the false rumor started, claiming that the ARPANET was somehow related to building a network resistant to nuclear war. This was never true of the ARPANET, only the unrelated RAND study on secure voice considered nuclear war. However, the later work on Internetting did emphasize robustness and survivability, including the capability to withstand losses of large portions of the underlying networks.[12] Although the ARPANET was designed to survive subordinate-network losses, the principal reason was that the switching nodes and network links were unreliable, even without any nuclear attacks. About the resource scarcity that spurred the creation of the ARPANET, Charles Herzfeld, ARPA Director (19651967), said: The ARPANET was not started to create a Command and Control System that would survive a nuclear attack, as many now claim. To build such a system was, clearly, a major military need, but it was not ARPA's mission to do this; in fact, we would have been severely criticized had we tried. Rather, the ARPANET came out of our frustration that there were only a limited number of large, powerful research computers in the country, and that many research investigators, who should have access to them, were geographically separated from them.[13] Packet switching pioneer Paul Baran affirms this, explaining: "Bob Taylor had a couple of computer terminals speaking to different machines, and his idea was to have some way of having a terminal speak to any of them and have a network. That's really the origin of the ARPANET. The method used to connect things together was an open issue for a time."[14]

ARPANET deployed
The initial ARPANET consisted of four IMPs:[15] University of California, Los Angeles (UCLA), where Leonard Kleinrock had established a Network Measurement Center, with an SDS Sigma 7 being the first computer attached to it; The Stanford Research Institute's Augmentation Research Center, where Douglas Engelbart had created the ground-breaking NLS system, a very important early hypertext system (with the SDS 940 that ran NLS, named "Genie", being the first host attached);

Historical document: First ARPANET IMP log: the first message ever sent via the ARPANET, 10:30pm, 29 October 1969. This IMP Log excerpt, kept at UCLA, describes setting up a message transmission from the UCLA SDS Sigma 7 Host computer to the SRI SDS 940 Host computer

University of California, Santa Barbara (UCSB), with the Culler-Fried Interactive Mathematics Center's IBM 360/75, running OS/MVT being the machine attached; The University of Utah's Computer Science Department, where Ivan Sutherland had moved, running a DEC PDP-10 operating on TENEX. The first message on the ARPANET was sent by UCLA student programmer Charley Kline, at 10:30pm on 29 October 1969, from Boelter Hall 3420.[16] Kline transmitted from the university's SDS Sigma 7 Host computer to the Stanford Research Institute's SDS 940 Host computer. The message text was the word login; the l and the o letters

ARPANET were transmitted, but the system then crashed. Hence, the literal first message over the ARPANET was lo. About an hour later, having recovered from the crash, the SDS Sigma 7 computer effected a full login. The first permanent ARPANET link was established on 21 November 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute. By 5 December 1969, the entire four-node network was established.[17]

65

Growth and evolution


In March 1970, the ARPANET reached the East Coast of the United States, when an IMP at BBN in Cambridge, Massachusetts was connected to the network. Thereafter, the ARPANET grew: 9 IMPs by June 1970 and 13 IMPs by December 1970, then 18 by September 1971 (when the network included 23 university and government hosts); 29 IMPs by August 1972, and 40 by September 1973. By June 1974, there were 46 IMPs, and in July 1975, the network numbered 57 IMPs. By 1981, the number was 213 host computers, with another host connecting approximately every twenty days.[15] In 1973 a transatlantic satellite link connected the Norwegian Seismic Array (NORSAR) to the ARPANET, making Norway the first country outside the US to be connected to the network. At about the same time a terrestrial circuit added a London IMP.[18] In 1975, the ARPANET was declared "operational". The Defense Communications Agency took control since ARPA was intended to fund advanced research.[15] In 1983, the ARPANET was split with U.S. military sites on their own Military Network (MILNET) for unclassified defense department communications. The combination was called the Defense Data Network (DDN).[19] Separating the civil and military networks reduced the 113-node ARPANET by 68 nodes. Gateways relayed electronic mail between the two networks. MILNET later became the NIPRNet.

Rules and etiquette


Because of its government ties, certain forms of traffic were discouraged or prohibited. A 1982 handbook on computing at MIT's AI Lab stated regarding network etiquette:[20] It is considered illegal to use the ARPANet for anything which is not in direct support of Government business ... personal messages to other ARPANet subscribers (for example, to arrange a get-together or check and say a friendly hello) are generally not considered harmful ... Sending electronic mail over the ARPANet for commercial profit or political purposes is both anti-social and illegal. By sending such messages, you can offend many people, and it is possible to get MIT in serious trouble with the Government agencies which manage the ARPANet.[20]

Technology
Support for inter-IMP circuits of up to 230.4 kbit/s was added in 1970, although considerations of cost and IMP processing power meant this capability was not actively used. 1971 saw the start of the use of the non-ruggedized (and therefore significantly lighter) Honeywell 316 as an IMP. It could also be configured as a Terminal Interface Processor (TIP), which provided terminal server support for up to 63 ASCII serial terminals through a multi-line controller in place of one of the hosts.[21] The 316 featured a greater degree of integration than the 516, which made it less expensive and easier to maintain. The 316 was configured with 40 kB of core memory for a TIP. The size of core memory was later increased, to 32 kB for the IMPs, and 56 kB for TIPs, in 1973. In 1975, BBN introduced IMP software running on the Pluribus multi-processor. These appeared in a small number of sites. In 1981, BBN introduced IMP software running on its own C/30 processor product. In 1983, TCP/IP protocols replaced NCP as the ARPANET's principal protocol, and the ARPANET then became one subnet of the early Internet.[22][23]

ARPANET

66

Shutdown and legacy


The original IMPs and TIPs were phased out as the ARPANET was shut down after the introduction of the NSFNet, but some IMPs remained in service as late as 1989.[24] The ARPANET Completion Report, jointly published by BBN and ARPA, concludes that: ...it is somewhat fitting to end on the note that the ARPANET program has had a strong and direct feedback into the support and strength of computer science, from which the network, itself, sprang.[25] In the wake of ARPANET being formally decommissioned on 28 February 1990, Vinton Cerf wrote the following lamentation, entitled "Requiem of the ARPANET":[26] It was the first, and being first, was best, but now we lay it down to ever rest. Now pause with me a moment, shed some tears. For auld lang syne, for love, for years and years of faithful service, duty done, I weep. Lay down thy packet, now, O friend, and sleep. -Vinton Cerf Senator Albert Gore, Jr. began to craft the High Performance Computing and Communication Act of 1991 (commonly referred to as "The Gore Bill") after hearing the 1988 report toward a National Research Network submitted to Congress by a group chaired by Leonard Kleinrock, professor of computer science at UCLA. The bill was passed on 9 December 1991 and led to the National Information Infrastructure (NII) which Al Gore called the "information superhighway". ARPANET was the subject of two IEEE Milestones, both dedicated in 2009.[27][28]

Software and protocols


The starting point for host-to-host communication on the ARPANET in 1969 was the 1822 protocol, which defined the transmission of messages to an IMP.[29] The message format was designed to work unambiguously with a broad range of computer architectures. An 1822 message essentially consisted of a message type, a numeric host address, and a data field. To send a data message to another host, the transmitting host formatted a data message containing the destination host's address and the data message being sent, and then transmitted the message through the 1822 hardware interface. The IMP then delivered the message to its destination address, either by delivering it to a locally connected host, or by delivering it to another IMP. When the message was ultimately delivered to the destination host, the receiving IMP would transmit a Ready for Next Message (RFNM) acknowledgement to the sending, host IMP. Unlike modern Internet datagrams, the ARPANET was designed to reliably transmit 1822 messages, and to inform the host computer when it loses a message; the contemporary IP is unreliable, whereas the TCP is reliable. Nonetheless, the 1822 protocol proved inadequate for handling multiple connections among different applications residing in a host computer. This problem was addressed with the Network Control Program (NCP), which provided a standard method to establish reliable, flow-controlled, bidirectional communications links among different processes in different host computers. The NCP interface allowed application software to connect across the ARPANET by implementing higher-level communication protocols, an early example of the protocol layering concept incorporated to the OSI model.[22] In 1983, TCP/IP protocols replaced NCP as the ARPANET's principal protocol, and the ARPANET then became one component of the early Internet.[23]

ARPANET

67

Network applications
NCP provided a standard set of network services that could be shared by several applications running on a single host computer. This led to the evolution of application protocols that operated, more or less, independently of the underlying network service. When the ARPANET migrated to the Internet protocols in 1983, the major application protocols migrated with it. E-mail: In 1971, Ray Tomlinson, of BBN sent the first network e-mail (RFC 524, RFC 561).[30] By 1973, e-mail constituted 75 percent of ARPANET traffic. File transfer: By 1973, the File Transfer Protocol (FTP) specification had been defined (RFC 354) and implemented, enabling file transfers over the ARPANET. Voice traffic: The Network Voice Protocol (NVP) specifications were defined in 1977 (RFC 741), then implemented, but, because of technical shortcomings, conference calls over the ARPANET never worked well; the contemporary Voice over Internet Protocol (packet voice) was decades away.

ARPANET in film and other media


Contemporary
Steven King (Producer), Peter Chvany (Director/Editor) (1972). Computer Networks: The Heralds of Resource Sharing [31]. Retrieved 20 December 2011. A 30 minute documentary film featuring Fernando J. Corbato, J.C.R. Licklider, Lawrence G. Roberts, Robert Kahn, Frank Heart, William R. Sutherland, Richard W. Watson, John R. Pasta, Donald W. Davies, and economist, George W. Mitchell. Scenario, a February 1985 episode of the U.S. television sitcom Benson (season 6, episode 20), includes a scene in which ARPANET is accessed. This is believed to be the first incidence of a popular TV show referencing the Internet or its progenitors.[32]

Post-ARPANET
In Let the Great World Spin: A Novel, published in 2009 but set in 1974 and written by Colum McCann, a character named The Kid and others use ARPANET from a Palo Alto computer to dial phone booths in New York City to hear descriptions of Philippe Petit's tight rope walk between the World Trade Center Towers. In Metal Gear Solid 3: Snake Eater, a character named Sigint takes part in the development of ARPANET after the events depicted in the game. The Doctor Who Past Doctor Adventures novel Blue Box, written in 2003 but set in 1981, includes a character predicting that by the year 2000 there will be four hundred machines connected to ARPANET. There is an electronic music artist known as Arpanet, Gerald Donald, one of the members of Drexciya. The artist's 2002 album Wireless Internet features commentary on the expansion of the internet via wireless communication, with songs such as NTT DoCoMo, dedicated to the mobile communications giant based in Japan. In numerous The X-Files episodes ARPANET is referenced and usually hacked into by The Lone Gunmen. This is most noticeable in the episode "Unusual Suspects". Thomas Pynchon's 2009 novel Inherent Vice, set in southern California circa 1970, contains a character who accesses the "ARPAnet" throughout the course of the book. The viral marketing campaign for the video game Resistance 2 features a website similar in design and purpose to ARPANET, called SRPANET.

ARPANET

68

References
[1] http:/ / www. thocp. net/ biographies/ davies_donald. htm [2] http:/ / www. internethalloffame. org/ inductees/ donald-davies [3] "Lawrence Roberts Manages The ARPANET Program" (http:/ / www. livinginternet. com/ i/ ii_roberts. htm). Living Internet.com. . Retrieved 6 November 2008. [4] "Packet Switching History" (http:/ / www. livinginternet. com/ i/ iw_packet_inv. htm), Living Internet, retrieved 26 August 2012 [5] "J.C.R. Licklider And The Universal Network" (http:/ / www. livinginternet. com/ i/ ii_licklider. htm), Living Internet [6] "IPTO Information Processing Techniques Office" (http:/ / www. livinginternet. com/ i/ ii_ipto. htm), Living Internet [7] John Markoff (20 December 1999). "An Internet Pioneer Ponders the Next Revolution" (http:/ / partners. nytimes. com/ library/ tech/ 99/ 12/ biztech/ articles/ 122099outlook-bobb. html). The New York Times. Archived (http:/ / web. archive. org/ web/ 20080922095019/ http:/ / partners. nytimes. com/ library/ tech/ 99/ 12/ biztech/ articles/ 122099outlook-bobb. html) from the original on 22 September 2008. . Retrieved 20 September 2008. [8] "The accelerator of the modern age" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 7541123. stm). BBC News. 5 August 2008. Archived (http:/ / web. archive. org/ web/ 20090610082212/ http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 7541123. stm) from the original on 10 June 2009. . Retrieved 19 May 2009. [9] Leonard Kleinrock (2005). The history of the Internet (http:/ / www. lk. cs. ucla. edu/ personal_history. html). . Retrieved May 28, 2009. [10] "IMP Interface Message Processor" (http:/ / www. livinginternet. com/ i/ ii_imp. htm), Living Internet [11] Wise, Adrian. "Honeywell DDP-516" (http:/ / www. old-computers. com/ museum/ computer. asp?c=551). Old-Computers.com. . Retrieved 21 September 2008. [12] "A Brief History of the Internet" (http:/ / www. isoc. org/ internet/ history/ brief. shtml). Internet Society. Archived (http:/ / web. archive. org/ web/ 20080918213304/ http:/ / www. isoc. org/ internet/ history/ brief. shtml) from the original on 18 September 2008. . Retrieved 20 September 2008. [13] "Charles Herzfeld on ARPANET and Computers" (http:/ / inventors. about. com/ library/ inventors/ bl_Charles_Herzfeld. htm). About.com. . Retrieved 21 December 2008. [14] Brand, Stewart (March 2001). "Founding Father" (http:/ / www. wired. com/ wired/ archive/ 9. 03/ baran. html). Wired (9.03). . Retrieved 31 December 2011. [15] "ARPANET The First Internet" (http:/ / www. livinginternet. com/ i/ ii_arpanet. htm), Living Internet [16] Jessica Savio (1 April 2011). "Browsing history: A heritage site is being set up in Boelter Hall 3420, the room the first Internet message originated in" (http:/ / www. dailybruin. com/ index. php/ article/ 2011/ 04/ browsing_history). Daily Bruin (UCLA). . [17] Chris Sutton (2 September 2004). "Internet Began 35 Years Ago at UCLA with First Message Ever Sent Between Two Computers" (http:/ / web. archive. org/ web/ 20080308120314/ http:/ / www. engineer. ucla. edu/ stories/ 2004/ Internet35. htm). UCLA. Archived from the original (http:/ / www. engineer. ucla. edu/ stories/ 2004/ Internet35. htm) on 8 March 2008. . [18] "NORSAR and the Internet" (http:/ / www. norsar. no/ pc-5-30-NORSAR-and-the-Internet. aspx). NORSAR (Norway Seismic Array Research). . Retrieved 25 August 2012. [19] Fritz E. Froehlich; Allen Kent (1990). "ARPANET, the Defense Data Network, and Internet" (http:/ / books. google. com/ books?id=gaRBTHdUKmgC& pg=PA341). The Froehlich/Kent Encyclopedia of Telecommunications. 1. CRC Press. pp.341375. ISBN978-0-8247-2900-4. . [20] Stacy, Christopher C. (7 September 1982). Getting Started Computing at the AI Lab (http:/ / independent. academia. edu/ ChristopherStacy/ Papers/ 1464820/ Getting_Started_Computing_at_the_AI_Lab). AI Lab, Massachusetts Institute of Technology. pp.9. . [21] Kirstein, Peter T. (JulySeptember 2009). "The Early Days of the Arpanet" (http:/ / muse. jhu. edu/ journals/ ahc/ summary/ v031/ 31. 3. kirstein. html). IEEE Annals of the History of Computing 31 (3): 67. ISSN1058-6180. . [22] "NCP Network Control Program" (http:/ / www. livinginternet. com/ i/ ii_ncp. htm), Living Internet [23] "TCP/IP Internet Protocol" (http:/ / www. livinginternet. com/ i/ ii_tcpip. htm), Living Internet [24] "NSFNET National Science Foundation Network" (http:/ / www. livinginternet. com/ i/ ii_nsfnet. htm), Living Internet [25] A History of the ARPANET: The First Decade (http:/ / www. dtic. mil/ cgi-bin/ GetTRDoc?Location=U2& doc=GetTRDoc. pdf& AD=ADA115440) (Report). Arlington, VA: Bolt, Beranek & Newman Inc.. 1 April 1981. p. 132. . section 2.3.4 [26] Abbate, Janet (11 June 1999). Inventing the Internet. Cambridge, MA: MIT Press. ASINB003VPWY6E. ISBN0262011727. [27] "Milestones:Birthplace of the Internet, 1969" (http:/ / www. ieeeghn. org/ wiki/ index. php/ Milestones:Birthplace_of_the_Internet,_1969). IEEE Global History Network. IEEE. . Retrieved 4 August 2011. [28] "Milestones:Inception of the ARPANET, 1969" (http:/ / www. ieeeghn. org/ wiki/ index. php/ Milestones:Inception_of_the_ARPANET,_1969). IEEE Global History Network. IEEE. . Retrieved 4 August 2011. [29] Interface Message Processor: Specifications for the Interconnection of a Host and an IMP (http:/ / www. bitsavers. org/ pdf/ bbn/ imp/ BBN1822_Jan1976. pdf), Report No. 1822, Bolt Beranek and Newman, Inc. (BBN) [30] Tomlinson, Ray. "The First Network Email" (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html). BBN. . Retrieved 6 March 2012. [31] http:/ / documentary. operationreality. org/ 2011/ 08/ 27/ computer-networks-the-heralds-of-resource-sharing [32] "Scenario" (http:/ / www. imdb. com/ title/ tt0789851/ ), Benson, Season 6, Episode 132 of 158, American Broadcasting Company (ABC), Witt/Thomas/Harris Productions, 22 February 1985

ARPANET

69

Further reading
Norberg, Arthur L.; O'Neill, Judy E. (1996). Transforming Computer Technology: Information Processing for the Pentagon, 19621982. Johns Hopkins University. pp.153196. ISBN978-0801863691. A History of the ARPANET: The First Decade (http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2& doc=GetTRDoc.pdf&AD=ADA115440) (Report). Arlington, VA: Bolt, Beranek & Newman Inc.. 1 April 1981. Hafner, Katie; Lyon, Matthew (1996). Where Wizards Stay Up Late: The Origins of the Internet. Simon and Schuster. ISBN0-7434-6837-6. Abbate, Janet (11 June 1999). Inventing the Internet. Cambridge, MA: MIT Press. pp.36111. ASINB003VPWY6E. ISBN0262011727. Banks, Michael A. (2008). On the Way to the Web: The Secret History of the Internet and Its Founders. APress/Springer Verlag. ISBN1-4302-0869-4. Salus, Peter H. (1 May 1995). Casting the Net: from ARPANET to Internet and Beyond. Addison-Wesley. ISBN978-0201876741. Waldrop, M. Mitchell (23 August 2001). The Dream Machine: J. C. R. Licklider and the Revolution That Made Computing Personal. New York: Viking. ASINB00008MNVW. ISBN0670899763. "The Computer History Museum, SRI International, and BBN Celebrate the 40th Anniversary of First ARPANET Transmission" (http://www.computerhistory.org/press/museum-celebrates-arpanet-anniversary.html). Computer History Museum. 27 October 2009.

Oral histories
"Oral history interview with Robert E. Kahn" (http://purl.umn.edu/107387). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 15 May 2008. Focuses on Kahn's role in the development of computer networking from 1967 through the early 1980s. Beginning with his work at Bolt Beranek and Newman (BBN), Kahn discusses his involvement as the ARPANET proposal was being written and then implemented, and his role in the public demonstration of the ARPANET. The interview continues into Kahn's involvement with networking when he moves to IPTO in 1972, where he was responsible for the administrative and technical evolution of the ARPANET, including programs in packet radio, the development of a new network protocol (TCP/IP), and the switch to TCP/IP to connect multiple networks. "Oral history interview with Vinton Cerf" (http://purl.umn.edu/107214). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 1 July 2008. Cerf describes his involvement with the ARPA network, and his relationships with Bolt Beranek and Newman, Robert Kahn, Lawrence Roberts, and the Network Working Group. "Oral history interview with Paul Baran" (http://purl.umn.edu/107101). University of Minnesota, Minneapolis: Charles Babbage Institute. 5 March 1990. Retrieved 1 July 2008. Baran describes his work at RAND, and discusses his interaction with the group at ARPA who were responsible for the later development of the ARPANET. "Oral history interview with Leonard Kleinrock" (http://purl.umn.edu/107411). University of Minnesota, Minneapolis: Charles Babbage Institute. 3 April 1990. Retrieved 1 July 2008. Kleinrock discusses his work on the ARPANET. "Oral history interview with Larry Roberts" (http://purl.umn.edu/107608). University of Minnesota, Minneapolis: Charles Babbage Institute. 4 April 1989. Retrieved 1 July 2008. "Oral history interview with Stephen Lukasik" (http://purl.umn.edu/107446). University of Minnesota, Minneapolis: Charles Babbage Institute. 17 October 1991. Retrieved 1 July 2008. Lukasik discusses his tenure at the Advanced Research Projects Agency (ARPA), the development of computer networks and the ARPANET.

ARPANET

70

Detailed technical reference works


Roberts, Larry; Marrill, Tom (October 1966). "Toward a Cooperative Network of Time-Shared Computers" (http://www.packet.cc/files/toward-coop-net.html). Fall AFIPS Conference. Roberts, Larry (October 1967). "Multiple computer networks and intercomputer communication" (http://www. packet.cc/files/multi-net-inter-comm.html). ACM Symposium on Operating System Principles. Davies, D. W.; Bartlett, K. A.; Scantlebury, R. A.; Wilkinson, P. T. (October 1967). "A digital communications network for computers giving rapid response at remote terminals". ACM Symposium on Operating Systems Principles. Roberts, Larry; Wessler, Barry (May 1970). "Computer Network Development to Achieve Resource Sharing" (http://www.packet.cc/files/arpa/comp-net-dev.html). Proceedings of the Spring Joint Computer Conference, Atlantic City, New Jersey. Heart, Frank; Kahn, Robert; Ornstein, Severo; Crowther, William; Walden, David (1970). "The Interface Message Processor for the ARPA Computer Network" (http://www.walden-family.com/public/ 1970-imp-afips.pdf). 36. 1970 Spring Joint Computer Conference. pp.551567. Carr, Stephen; Crocker, Stephen; Cerf, Vinton (1970). "Host-Host Communication Protocol in the ARPA Network" (http://tools.ietf.org/pdf/rfc33). 36. 1970 Spring Joint Computer Conference. pp.589598. RFC 33. Ornstein, Severo; Heart, Frank; Crowther, William; Russell, S. B.; Rising, H. K.; Michel, A. (1972). "The Terminal IMP for the ARPA Computer Network" (http://dx.doi.org/10.1145/1478873.1478906). 40. 1972 Spring Joint Computer Conference. pp.243254. McQuillan, John; Crowther, William; Cosell, Bernard; Walden, David; Heart, Frank (1972). "Improvements in the Design and Performance of the ARPA Network" (http://dx.doi.org/10.1145/1480083.1480096). 41. 1972 Fall Joint Computer Conference. pp.741754. Feinler, Elizabeth J.; Postel, Jonathan B. (January 1978). ARPANET Protocol Handbook, NIC 7104. Menlo Park: Network Information Center (NIC), SRI International. ASINB000EN742K. Roberts, Larry (November 1978). "The Evolution of Packet Switching" (http://www.packet.cc/files/ ev-packet-sw.html). Proceedings of the IEEE. Roberts, Larry (Sept 1986). The ARPANET & Computer Networks (http://www.packet.cc/files/ arpanet-computernet.html). ACM.

External links
"ARPANET Maps 1969 to 1977" (http://som.csudh.edu/cis/lpress/history/arpamaps/). California State University, Dominguez Hills (CSUDH). 4 January 1978. Retrieved 17 May 2012. Walden, David C. (February 2003). "Looking back at the ARPANET effort, 34 years later" (http://www. livinginternet.com/i/ii_imp_walden.htm). Living Internet. East Sandwich, Massachusetts: livinginternet.com. Retrieved 17 August 2005. "Images of ARPANET from 1964 onwards" (http://www.computerhistory.org/exhibits/internet_history/). The Computer History Museum. Retrieved 29 August 2004. Timeline. "Paul Baran and the Origins of the Internet" (http://www.rand.org/about/history/baran.html). RAND Corporation. Retrieved 3 September 2005. Kleinrock, Leonard. "The Day the Infant Internet Uttered its First Words" (http://www.lk.cs.ucla.edu/ internet_first_words.html). UCLA. Retrieved 11 November 2004. Personal anecdote of the first message ever sent over the ARPANET "Doug Engelbart's Role in ARPANET History" (http://www.dougengelbart.org/firsts/internet.html). 2008. Retrieved 3 September 2009. "Internet Milestones: Timeline of Notable Internet Pioneers and Contributions" (http://www.juliantrubin.com/ schooldirectory/internet_milestones_pioneers.html). Retrieved 6 January 2012. Timeline.

ARPANET Waldrop, Mitch (April 2008). "DARPA and the Internet Revolution" (http://www.darpa.mil/WorkArea/ DownloadAsset.aspx?id=2554). 50 years of Bridging the Gap. DARPA. pp.7885. Retrieved 26 August 2012.

71

CSNET
The Computer Science Network (CSNET) was a computer network that began operation in 1981 in the United States.[1] Its purpose was to extend networking benefits, for computer science departments at academic and research institutions that could not be directly connected to ARPANET, due to funding or authorization limitations. It played a significant role in spreading awareness of, and access to, national networking and was a major milestone on the path to development of the global Internet. CSNET was funded by the National Science Foundation for an initial three-year period from 1981 to 1984.

History
Lawrence Landweber at the University of Wisconsin-Madison prepared the original CSNET proposal, on behalf of a consortium of universities (Georgia Tech, University of Minnesota, University of New Mexico, Oklahoma University, Purdue University, University of California-Berkeley, University of Utah, University of Virginia, University of Washington, University of Wisconsin, and Yale University). The US National Science Foundation (NSF) requested a review from David J. Farber at the University of Delaware. Farber assigned the task to his graduate student Dave Crocker who was already active in the development of electronic mail.[2] The project was deemed interesting but in need of significant refinement. The proposal eventually gained the support of Vinton Cerf and DARPA. In 1980, the NSF awarded $5 million to launch the network. It was an unusually large project for the NSF at the time.[3] A stipulation for the award of the contract was that the network needed to become self-sufficient by 1986.[1] The first management team consisted of Landweber (University of Wisconsin), Farber (University of Delaware), Peter J. Denning (Purdue University), Anthony Hearn (RAND Corporation), and Bill Kern from the NSF.[4] Once CSNET was fully operational, the systems and ongoing network operations were transferred to Bolt Beranek and Newman (BBN) of Cambridge, Massachusetts by 1984.[5] By 1981, three sites were connected: University of Delaware, Princeton University, and Purdue University. By 1982, 24 sites were connected expanding to 84 sites by 1984, including one in Israel. Soon thereafter, connections were established to computer science departments in Australia, Canada, France, Germany, Korea, and Japan. CSNET eventually connected more than 180 institutions.[6] One of the earliest experiments in free software distribution on a network, netlib, was available on CSNET.[7] CSNET was a forerunner of the National Science Foundation Network (NSFNet) which eventually became a backbone of the Internet. CSNET operated autonomously until 1989, when it merged with Bitnet to form the Corporation for Research and Educational Networking (CREN). By 1991, the success of the NSFNET and NSF-sponsored regional networks had rendered the CSNET services redundant, and the CSNET network was shut down in October 1991.[8]

CSNET

72

Components
The CSNET project had three primary components: an email relaying service (Delaware and RAND), a name service (Wisconsin), and TCP/IP-over-X.25 tunnelling technology (Purdue). Initial access was with email relaying, through gateways at Delaware and RAND, over dial-up telephone or X.29/X.25 terminal emulation. Eventually CSNET access added TCP/IP, including running over X.25.[9] The email relaying service was called Phonenet, after the telephone-specific channel of the MMDF software developed by Crocker. The CSNET name service allowed manual and automated email address lookup based on various user attributes, such as name, title, or institution.[10] The X.25 tunneling allowed an institution to connect directly to the ARPANET via a commercial X.25 service (Telenet), by which the institution's TCP/IP traffic would be tunneled to a CSNET computer that acted as a relay between the ARPANET and the commercial X.25 networks. CSNET also developed dialup-on-demand (Dialup IP) software to automatically initiate or disconnect SLIP sessions as needed to remote locations.[11] CSNET was developed on Digital Equipment Corporation (DEC) VAX-11 systems using BSD Unix, but it grew to support a variety of hardware and operating system platforms.

Recognition
At the July 2009 Internet Engineering Task Force meeting in Stockholm, Sweden, the Internet Society recognized the pioneering contribution of CSNET by honoring it with the Jonathan B. Postel Service Award. Crocker accepted the award on behalf of Landweber and the other principal investigators.[12] A recording of the award presentation and acceptance is available.[13]

References
[1] "The InternetFrom Modest Beginnings" (http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ modest. htm). NSF website. . Retrieved September 30, 2011. [2] Dave Crocker (August 18, 2008). "Impact of Email Work at The Rand Corporation in the mid-1970s" (http:/ / bbiw. net/ articles/ rand-email. pdf). . Retrieved September 30, 2011. [3] Douglas Comer (October 1983). "History and overview of CSNET". Communications (Association of Computing Machinery) 26 (10). doi:10.1145/358413.358423. [4] Peter J. Denning; Anthony Hearn; C. William Kern (April 1983). "History and overview of CSNET" (http:/ / www. isoc. org/ internet/ history/ documents/ Comm83. pdf). Proceedings of the symposium on Communications Architectures & Protocols (SIGCOMM, Association of Computing Machinery) 13 (2). doi:10.1145/1035237.1035267. ISBN0-89791-089-3. . [5] Rick Adrion (October 5, 1983). "CSNET Transition Plan Bulletin #1" (http:/ / www. rfc-editor. org/ in-notes/ museum/ csnet-transition-bulletin. n1. 1). email message. National Science Foundation. . Retrieved September 30, 2011. [6] CSNET History (http:/ / www. livinginternet. com/ i/ ii_csnet. htm) [7] Jack J. Dongarra; Eric Grosse (May 1987). "Distribution of mathematical software via electronic mail". Communications (Association of Computing Machinery) 30 (5). doi:10.1145/22899.22904. [8] CSNET-CIC Shutdown Notice (ftp:/ / athos. rutgers. edu/ resource-guide/ chapter6/ section6-6. txt) [9] Craig Partridge; Leo Lanzillo (Feb 1989). "Implementation of Dial-up IP for UNIX Systems". Proceedings of the 1989 Winter USENIX Technical Conference (USENIX Association). [10] Larry Landweber; Michael Litzkow; D. Neuhengen; Marvin Solomon (April 1983). "Architecture of the CSNET name server". Proceedings of the symposium on Communications Architectures & Protocols (SIGCOMM, Association of Computing Machinery) 13 (2). doi:10.1145/1035237.1035268. ISBN0-89791-089-3. [11] Dialup IP 2.0 README (ftp:/ / ftp. isy. liu. se/ pub/ misc/ dialup2. 0. README) [12] "Trailblazing CSNET Network Receives 2009 Jonathan B. Postel Service Award" (http:/ / isoc. org/ wp/ newsletter/ ?p=1098). News release (Internet Society). July 29, 2009. . Retrieved September 30, 2011. [13] Lynn St. Amour, Dave Crocker (July 29, 2009). "Postel Award to CSNET" (http:/ / bbiw. net/ misc/ IETF75-ISOC-Postel-CSNet. mp3). Audio recording. . Retrieved September 30, 2011.

CSNET

73

External links
Living Internet: CSNet (http://livinginternet.com/i/ii_csnet.htm) Exploring the Internet: Round Three, Madison (http://museum.media.org/eti/RoundThree08.html)

ENQUIRE
ENQUIRE
Inventor Tim Berners-Lee

Launch year 1980[1] Company CERN

ENQUIRE was a software project written in 1980 by Tim Berners-Lee at CERN,[2] which was the predecessor to the World Wide Web.[2][3][4] It was a simple hypertext program[4] that had some of the same ideas as the Web and the Semantic Web but was different in several important ways. According to Berners-Lee, the name was inspired by a book entitled Enquire Within Upon Everything.[2][3][5]

The conditions
At that time approximately 10,000 people were working at CERN with different hardware, software and individual requirements. Much work was done by email and file interchange.[4] The scientists needed to keep track of different things[3] and different projects became involved with each other.[2] Berners-Lee started to work for 6 months on 23 June 1980 at CERN while he developed ENQUIRE.[6] The requirements for setting up a new system were compatibility with different networks, disk formats, data formats, and character encoding schemes, which made any attempt to transfer information between dissimilar systems a daunting and generally impractical task.[7] The different hypertext-systems before ENQUIRE were not passing these requirements i.e. Memex and NLS.[7]

Difference to HyperCard
ENQUIRE was similar to Apple's HyperCard which also lacked clickable text and was not "hypertext", but ENQUIRE lacked an image system.[1] The advantage was that it was portable and ran different systems.[1]

Differences to the World Wide Web


It was not supposed to be released to the general public. ENQUIRE had pages called cards and hyperlinks within the cards. The links had different meanings and about a dozen relationships which were displayed to the creator, things, documents and groups described by the card. The relationship between the links could be seen by everybody explaining what the need of the link was or what happen if a card was removed.[4] Everybody was allowed to add new cards but they always needed an existing card.[6]

ENQUIRE

74

Relationship Inverse Relationship made includes uses describes was made by is part of is used by described by

ENQUIRE was closer to a modern wiki than to a web site: database, though a closed system (all of the data could be taken as a workable whole)[2] bidirectional hyperlinks (in Wikipedia and MediaWiki, this is approximated by the What links here feature). This bidirectionality allows ideas, notes, etc. to link to each other without the author being aware of this. In a way, they (or, at least, their relationships) get a life of their own.[4][8] direct editing of the server (like wikis and CMS/blogs)[2] ease of compositing, particularly when it comes to hyperlinking.[2] The World Wide Web was created to unify the different existing systems at CERN like ENQUIRE, the CERNDOC, VMS/Notes and the USENET.[1]

Why ENQUIRE failed


Berners-Lee came back to CERN in 1984 and intensively used his own system.[1][4] He realized that most of the time coordinating the project was to keep information up to date.[4] He recognized that a system similar to ENQUIRE was needed, "but accessible to everybody."[4] There was a need that people be able to create cards independently of others and to link to other cards without updating the linked card. This idea is the big difference and the cornerstone to the World Wide Web.[4] Berners-Lee didn't make ENQUIRE suitable for other persons to use the system successfully, and in other CERN divisions there were similar situations to the division he was in.[1] Another problem was that external links, for example to existing databases, weren't allowed, and that the system wasn't powerful enough to handle enough connections to the database.[1][2] Further development stopped because Berners-Lee gave the ENQUIRE disc to Robert Cailliau, who had been working under Brian Carpenter before he left CERN. Carpenter suspects that the disc was reused for other purposes since nobody was later available to do further work on ENQUIRE.[9]

Technical
The application ran on terminal with plaintext 24x80.[4] The first version was able to hyperlink between files.[2] ENQUIRE was written in the Pascal programming language and implemented on a Norsk Data NORD-10 under SINTRAN III,[2][6][4][8][9] and version 2 was later ported to MS-DOS and to VAX/VMS.[2][4]

References
[1] Berners-Lee, Tim (May 1990). "Information Management: A Proposal" (http:/ / www. w3. org/ History/ 1989/ proposal. html). World Wide Web Consortium. . Retrieved 25 August 2010. [2] Berners-Lee, Tim. "Frequently asked questions Start of the web: Influences" (http:/ / www. w3. org/ People/ Berners-Lee/ FAQ. html#Influences). World Wide Web Consortium. . Retrieved 22 July 2010. [3] Jeffery, Simon; Fenn, Chris; Smith, Bobbie; Coumbe, John (23 October 2009). "A people's history of the internet: from Arpanet in 1969 to today" (http:/ / www. guardian. co. uk/ technology/ interactive/ 2009/ oct/ 23/ internet-arpanet) (Flash). London: The Guardian. pp.See 1980. . Retrieved 7 January 2010. [4] Berners-Lee, Tim (ca. 1993/1994). "A Brief History of the Web" (http:/ / www. w3. org/ DesignIssues/ TimBook-old/ History. html). World Wide Web Consortium. . Retrieved 24 August 2010. [5] Finkelstein, Prof. Anthony (15 August 2003). "ENQUIRE WITHIN UPON EVERYTHING" (http:/ / www. open2. net/ ictportal/ app/ comp_life/ future1. htm). ICT Portal. BBC. . Retrieved 7 January 2010.

ENQUIRE
[6] "History of the Web" (http:/ / www. w3c. rl. ac. uk/ primers/ history/ origins. htm). Oxford Brookes University. 2002. . Retrieved 20 November 2010. [7] Berners-Lee, Tim (August 1996). "The World Wide Web: Past, Present and Future" (http:/ / www. w3. org/ People/ Berners-Lee/ 1996/ ppf. htm). World Wide Web Consortium. . Retrieved 25 August 2010. [8] Cailliau, Robert (1995). "A Little History of the World Wide Web" (http:/ / www. w3. org/ History. html). World Wide Web Consortium. . Retrieved 25 July 2010. [9] Palmer, Sean B.; Berners-Lee, Tim (February/March 2001). "Enquire Manual In HyperText" (http:/ / infomesh. net/ 2001/ enquire/ manual/ #editorial). . Retrieved 30 August 2010.

75

Further reading
Berners-Lee, Tim (2000). Weaving the web. The original design and ultimate destiny of the World Wide Web. New York: Harper Business.

External links
ENQUIRE Manual (http://infomesh.net/2001/enquire/manual/) scanned images of the Enquire Manual from 1980 (http://www.w3.org/History/1980/Enquire/scaled/)

IPPS
The International Packet Switched Service (IPSS) was created in 1978 by a collaboration between the United Kingdom's General Post Office, Western Union International and the United States' Tymnet. This network grew from Europe and the USA to cover Canada, Hong Kong and Australia by 1981, and by the 1990s it provided a worldwide networking infrastructure. Companies and individual users could connect in to the network, via a PSS (Packet Switch Stream) modem, or an X.25 PAD (Packet Assembler/Disassembler), and a dedicated PSS line, and use it to connect to a variety of online databases and mainframe systems. There was a choice of about three different speeds of PSS lines, although a faster line was more costly to rent. By 1984 British Telecomm had joined the PSS global network and was providing IPSS services to customers. Companies including Dynatech, were providers of Interconnectivity and infrastructure devices including line drivers, modems, self configuring modems, 4port, 8port and 16port PADs, and Switches. These were physical boxes delivering full impmentation of x.25, x.28, x.29, x3 protocols with physical connectivity conforming to RS232 synchronous connectivity specification. In 1988 the IPSS directory listed approximately 800 global sites available for connection via X.25

MILNET

76

MILNET
In computer networking, MILNET (Military Network) was the name given to the part of the ARPANET internetwork designated for unclassified United States Department of Defense traffic. MILNET was split off from the ARPANET in 1983: the ARPANET remained in service for the academic research community, but direct connectivity between the networks was severed for security reasons. Gateways relayed electronic mail between the two networks. BBN Technologies built and managed both the MILNET and the ARPANET and the two networks used very similar technology. It is also known as "Military Net." During the 1980s the MILNET expanded to become the Defense Data Network, a worldwide set of military networks running at different security levels. In the 1990s, MILNET became the NIPRNET.

References

NFSNET

77

NFSNET
NSFNET
Commercial? No Type of network Data Location Operator Protocols Established Funding Current status Website USA Merit Network with IBM, MCI, the State of Michigan, and later ANS TCP/IP and OSI 1985 National Science Foundation Decommissioned April 30, 1995, superseded by the commercial Internet NSFNET history
[1]

The National Science Foundation Network (NSFNET) was a program of coordinated, evolving projects sponsored by the National Science Foundation (NSF) beginning in 1985 to promote advanced research and education networking in the United States.[2] NSFNET was also the name given to several nationwide backbone networks that were constructed to support NSF's networking initiatives from 1985-1995. Initially created to link researchers to the nation's NSF-funded supercomputing centers, through further public funding and private industry partnerships it developed into a major part of the Internet backbone.

History
Following the deployment of the Computer Science Network (CSNET), a network that provided Internet services to academic computer science departments, in 1981, the U.S. National Science Foundation (NSF) aimed to create an academic research network facilitating access by researchers to the supercomputing centers funded by NSF in the United States.[3] In 1985, NSF began funding the creation of five new supercomputing centers: the John von Neumann Computing Center at Princeton University, the San Diego Supercomputer Center (SDSC) on the campus of the University of California, San Diego (UCSD), the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, the Cornell Theory Center at Cornell University, and the Pittsburgh Supercomputing Center (PSC), a joint effort of Carnegie Mellon University, the University of Pittsburgh, and Westinghouse. Also in 1985, under the leadership of Dennis Jennings, the NSF established the National Science Foundation Network (NSFNET). NSFNET was to be a general-purpose research network, a hub to connect the five supercomputing centers along with the NSF-funded National Center for Atmospheric Research (NCAR) to each other and to the regional research and education networks that would in turn connect campus networks. Using this three tier network architecture NSFNET would provide access between the supercomputer centers and other sites over the backbone network at no cost to the centers or to the regional networks using the open TCP/IP protocols initially deployed successfully on the ARPANET.

NSF's three tiered network architecture

NFSNET

78

The 56-kbit/s backbone


The NSFNET initiated operations in 1986 using TCP/IP. Its six backbone sites were interconnected with leased 56-kbit/s links, built by a group including the University of Illinois National Center for Supercomputing Applications (NCSA), Cornell University Theory Center, University of Delaware, and Merit Network. PDP-11/73 minicomputers with routing and management software, called Fuzzballs, served as the network routers since they already implemented the TCP/IP standard. This original 56-kbit/s backbone was overseen by the supercomputer centers themselves with the lead taken by Ed Krol at the University of Illinois at Urbana-Champaign. PDP-11/73 Fuzzball routers were configured and run by Hans-Werner Braun at the Merit Network[4] and statistics were collected by Cornell University. Support for NSFNET end-users was provided by the Network Service Center (NNSC), located at BBN Technologies and included publishing the softbound "Internet Manager's Phonebook" which listed the contact information for every issued domain name and IP address in 1990.[5] Incidentally, Ed Krol also authored the Hitchhiker's Guide to the Internet to help users of the NSFNET understand its capabilities.[6] The Hitchhiker's Guide became one of the first help manuals for the Internet. As regional networks grew the 56 K-bit/sec NSFNET backbone experienced rapid increases in network traffic and became seriously congested. In June 1987 NSF issued a new solicitation to upgrade and expand NSFNET.[7]

56K NSFNET Backbone, c. 1988

T1 NSFNET Backbone, c. 1991

The 1.5 Mbit/s (T1) backbone


T3 NSFNET Backbone, c. 1992

As a result of a November 1987 NSF award to the Merit Network, a networking consortium by public universities in Michigan, the original 56-kbit/s network was expanded to include 13 nodes interconnected at 1.5 Mbit/s (T1) by July 1988. The backbone nodes used routers based on a collection of nine IBM RT systems running AOS, IBM's version of Berkeley UNIX. Under its cooperative agreement with NSF the Merit Network was the lead organization in a partnership that included IBM, MCI, and the State of Michigan. Merit provided overall project coordination, network design and engineering, a Network Operations Center (NOC), and information services to assist the regional networks. IBM provided equipment, software development, installation, maintenance and operations support. MCI provided the T1 data circuits at reduced rates. The state of Michigan provided funding for facilities and personnel. Eric M. Aupperle, Merit's President, was the NSFNET Project Director, and Hans-Werner Braun was Co-Principal Investigator.

NSFNET Traffic 1991, NSFNET backbone nodes are shown at the top, regional networks below, traffic volume is depicted from purple (zero bytes) to white (100 billion bytes), visualization by NCSA using traffic data provided by the Merit Network.

NFSNET From 1987 to 1994 Merit organized a series of "Regional-Techs" meetings, where technical staff from the regional networks met to discuss operational issues of common concern with each other and the Merit engineering staff. During this period, but separate from its support for the NSFNET backbone, NSF funded: the NSF Connections Program that helped colleges and universities obtain or upgrade connections to regional networks; regional networks to obtain or upgrade equipment and data communications circuits; the NNSC, and successor Network Information Services Manager (aka InterNIC) information help desks;[8] the International Connections Manager (ICM), a task performed by Sprint, that encouraged connections between the NSFNET backbone and international research and education networks; and various ad hoc grants to organizations such as the Federation of American Research Networks (FARNET). The NSFNET became the principal Internet backbone starting in approximately 1988, when in addition to the five NSF supercomputer centers it included connectivity to the regional networks BARRNet, Merit/MichNet, MIDnet, NCAR, NorthWestNet, NYSERNet, JVNCNet, SESQUINET, SURAnet, and Westnet, which in turn connected about 170 additional networks to the NSFNET.[9] Three new nodes were added as part of the upgrade to T3: NEARNET in Cambridge, Massachusetts; Argone National Laboratory outside of Chicago; and SURAnet in Atlanta, Georgia.[10] NSFNET connected to other federal government networks including the NASA Science Internet, the Energy Science Network (ESNET), and others. Connections were also established to international research and education networks, first to France and Canada, then to NordUnet serving Denmark, Finland, Iceland, Norway, and Sweden, to Mexico, and many others. Two Federal Internet Exchanges (FIXes) were established in June 1989[11] under the auspices of the Federal Engineering Planning Group (FEPG). FIX East, at the University of Maryland in College Park and FIX West, at the NASA Ames Research Center in Mountain View, California. The existence of NSFNET and the FIXes allowed the ARPANET to be phased out in mid-1990.[12] Starting in August 1990 the NSFNET backbone supported the OSI Connectionless Network Protocol (CLNP) in addition to TCP/IP.[13] However, CLNP usage remained low when compared to TCP/IP. Traffic on the network continued its rapid growth, doubling every seven months. Projections indicated that the T1 backbone would become overloaded sometime in 1990. A critical routing technology, Border Gateway Protocol (BGP), originated during this period of Internet history. BGP allowed routers on the NSFNET backbone to differentiate routes originally learned via multiple paths. Prior to BGP, interconnection between IP network was inherently hierarchical, and careful planning was needed to avoid routing loops.[14] BGP turned the Internet into a meshed topology, moving away from the centric architecture which the ARPANET emphasized.

79

The 45-Mbit/s (T3) backbone

NFSNET

80

During 1991 the backbone was upgraded to 45 Mbit/s (T3) transmission speed and expanded to interconnect 16 nodes. The routers on the upgraded backbone were based on an IBM RS/6000 workstation running UNIX. Core nodes were located at MCI facilities with end nodes at the connected regional networks and supercomputing centers. Completed in November 1991, the transition from T1 to T3 did not go as smoothly as the transition from 56K to T1, took longer than planned, and as a result there was at times serious congestion on the overloaded T1 backbone. Following the transition to T3, portions of the T1 backbone were left in place to act as a backup for the new T3 backbone.

Packet Traffic on the NSFNET Backbone, January 1988 to June 1994

In anticipation of the T3 upgrade and the approaching end of the 5-year NSFNET cooperative agreement, in September 1990 Merit, IBM, and MCI formed Advanced Network and Services (ANS), a new non-profit corporation with a more broadly based Board of Directors than the Michigan based Merit Network. Under its cooperative agreement with NSF, Merit remained ultimately responsible for the operation of NSFNET, but subcontracted much of the engineering and operations work to ANS. Both IBM and MCI made substantial new financial and other commitments to help support the new venture. Allan Weis left IBM to become ANS's first President and Managing Director. Douglas Van Houweling, former Chair of the Merit Network Board and Vice Provost for Information Technology at the University of Michigan, was Chairman of the ANS Board of Directors. The new T3 backbone was named ANSNet and provided the physical infrastructure used by Merit to deliver the NSFNET Backbone Service.

Regional networks
In addition to the five NSF supercomputer centers, NSFNET provided connectivity to eleven regional networks and through these networks to many smaller regional and campus networks. The NSFNET regional networks were:[10][15] BARRNet, the Bay Area Regional Research Network in Palo Alto, California; CERFNET, California Education and Research Federation Network in San Diego, California, serving California and Nevada; CICNet, the Committee on Institutional Cooperation Network via the Merit Network in Ann Arbor, Michigan and later as part of the T3 upgrade via Argonne National Laboratory outside of Chicago, serving the Big Ten Universities and the University of Chicago in Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin; Merit/MichNet in Ann Arbor, Michigan serving Michigan, formed in 1966, still in operation as of 2012;[16] MIDnet in Lincoln, Nebraska serving Arkansas, Iowa, Kansas, Missouri, Nebraska, Oklahoma, and South Dakota; NEARNET, the New England Academic and Research Network in Cambridge, Massachusetts, added as part of the upgrade to T3, serving Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island, and Vermont, established in late 1988, operated by BBN under contract to MIT, BBN assumed responsibility for NEARNET on 1 July 1993;[17] NorthWestNet in Seattle, Washington, serving Alaska, Idaho, Montana, North Dakota, Oregon, and Washington, founded in 1987;[18] NYSERNet, New York State Education and Research Network in Ithaca, New York; JVNCNet, the John von Neumann National Supercomputer Center Network in Princeton, New Jersey, serving Delaware and New Jersey;

NFSNET SESQUINET, the Sesquicentennial Network in Houston, Texas, founded during the 150th anniversary of the State of Texas; SURAnet, the Southeastern Universities Research Association network in College Park, Maryland and later as part of the T3 upgrade in Atlanta, Georgia serving Alabama, Florida, Georgia, Kentucky, Louisiana, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, and West Virginia, sold to BBN in 1994; and Westnet in Salt Lake City, Utah and Boulder, Colorado, serving Arizona, Colorado, New Mexico, Utah, and Wyoming.

81

Commercial traffic
The NSF's appropriations act authorized NSF to "foster and support the development and use of computer and other scientific and engineering methods and technologies, primarily for research and education in the sciences and engineering." This allowed NSF to support NSFNET and related networking initiatives, but only to the extent that that support was "primarily for research and education in the sciences and engineering."[19] And this in turn was taken to mean that use of NSFNET for commercial purposes was not allowed.
The NSFNET Backbone Services Acceptable Use Policy June 1992
[20]

1. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

General Principle
NSFNET Backbone services are provided to support open research and education in and among US research and instructional institutions, plus research arms of for-profit firms when engaged in open scholarly communication and research. Use for other purposes is not acceptable.

Specifically Acceptable Uses


Communication with foreign researchers and educators in connection with research or instruction, as long as any network that the foreign user employs for such communication provides reciprocal access to US researchers and educators. Communication and exchange for professional development, to maintain currency, or to debate issues in a field or subfield of knowledge. Use for disciplinary-society, university-association, government-advisory, or standards activities related to the user's research and instructional activities. Use in applying for or administering grants or contracts for research or instruction, but not for other fundraising or public relations activities. Any other administrative communications or activities in direct support of research and instruction. Announcements of new products or services for use in research or instruction, but not advertising of any kind. Any traffic originating from a network of another member agency of the Federal Networking Council if the traffic meets the acceptable use policy of that agency. Communication incidental to otherwise acceptable use, except for illegal or specifically unacceptable use.

Unacceptable Uses
Use for for-profit activities, unless covered by the General Principle or as a specifically acceptable use. Extensive use for private or personal business.

This statement applies to use of the NSFNET Backbone only. NSF expects that connecting networks will formulate their own use policies. The NSF Division of Networking and Communications Research and Infrastructure will resolve any questions about this Policy or its interpretation.

NFSNET

82

Acceptable Use Policy (AUP)


To ensure that NSF support was used appropriately, NSF developed an NSFNET Acceptable Use Policy (AUP) that outlined in broad terms the uses of NSFNET that were and were not allowed.[20] The AUP was revised several times to make it clearer and to allow the broadest possible use of NSFNET, consistent with Congress' wishes as expressed in the appropriations act. A notable feature of the AUP is that it talks about acceptable uses of the network that are not directly related to who or what type of organization is making that use. Use from for-profit organizations is acceptable when it is in support of open research and education. And some uses such as fundraising, advertising, public relations activities, extensive personal or private use, for-profit consulting, and all illegal activities are never acceptable, even when that use is by a non-profit college, university, K-12 school, or library. And while these AUP provisions seem quite reasonable, in specific cases they often proved difficult to interpret and enforce. NSF did not monitor the content of traffic that was sent over NSFNET or actively police the use of the network. And it did not require Merit or the regional networks to do so. NSF, Merit, and the regional networks did investigate possible cases of inappropriate use, when such use was brought to their attention.[21] An example may help to illustrate the problem. Is it acceptable for a parent to exchange e-mail with a child enrolled at a college or university, if that exchange uses the NSFNET backbone? It would be acceptable, if the subject of the e-mail was the student's instruction or a research project. Even if the subject was not instruction or research, the e-mail still might be acceptable as private or personal business as long as the use was not extensive.[22] The prohibition on commercial use of the NSFNET backbone[23] meant that some organizations could not connect to the Internet via regional networks that were connected to the NSFNET backbone, while to be fully connected other organizations (or regional networks on their behalf), including some non-profit research and educational institutions, would need to obtain two connections, one to an NSFNET attached regional network and one to a non-NSFNET attached network provider. In either case the situation was confusing and inefficient. It prevented economies of scale, increased costs, or both. And this slowed the growth of the Internet and its adoption by new classes of users, something no one was happy about.

Commercial ISPs, ANS CO+RE, and the CIX


During the period when NSFNET was being established, Internet service providers that allowed commercial traffic began to emerge, such as Alternet, PSINet, CERFNet, and others. The commercial networks in many cases were interconnected to the NSFNET and routed traffic over the NSFNET nominally accordingly to the NSFNET acceptable use policy[24] Additionally, these early commercial networks often directly interconnected with each other as well as, on a limited basis, with some of the regional Internet networks. In 1991, the Commercial Internet eXchange (CIX, pronounced "kicks") was created by PSINet, UUNET and CERFnet to provide a location at which multiple networks could exchange traffic free from traffic-based settlements and restrictions imposed by an acceptable use policy.[25] In 1991 a new ISP, ANS CO+RE (commercial plus research), raised concerns and unique questions regarding commercial and non-commercial interoperability policies. ANS CO+RE was the for-profit subsidiary of the non-profit Advanced Network and Services (ANS) that had been created earlier by the NSFNET partners, Merit, IBM, and MCI.[26] ANS CO+RE was created specifically to allow commercial traffic on ANSNet without jeopardizing its parent's non-profit status or violating any tax laws. The NSFNET Backbone Service and ANS CO+RE both used and shared the common ANSNet infrastructure. NSF agreed to allow ANS CO+RE to carry commercial traffic subject to several conditions: that the NSFNET Backbone Service was not diminished; that ANS CO+RE recovered at least the average cost of the commercial traffic traversing the network; and

NFSNET that any excess revenues recovered above the cost of carrying the commercial traffic would be placed into an infrastructure pool to be distributed by an allocation committee broadly representative of the networking community to enhance and extend national and regional networking infrastructure and support. For a time ANS CO+RE refused to connect to the CIX and the CIX refused to purchase a connection to ANS CO+RE. In May 1992 Mitch Kapor and Al Weis forged an agreement where ANS would connect to the CIX as a "trial" with the ability to disconnect at a moment's notice and without the need to join the CIX as a member.[27] This compromise resolved things for a time, but later the CIX started to block access from regional networks that had not paid the $10,000 fee to become members of the CIX.[28]

83

An unfortunate state of affairs


The creation of ANS CO+RE and its initial refusal to connect to the CIX was one of the factors that lead to the controversy described later in this article. Other issues had to do with: differences in the cultures of the non-profit research and education community and the for-profit community with ANS trying to be a member of both camps and not being fully accepted by either; differences of opinion about the best approach to take to open the Internet to commercial use and to maintain and encourage a fully interconnected Internet; and differences of opinion about the correct type and level of involvement in Internet networking initiatives by the public and the private sectors. For a time this unfortunate state of affairs kept the networking community as a whole from fully implementing the true vision for the Interneta world-wide network of fully interconnected TCP/IP networks allowing any connected site to communicate with any other connected site. These problems would not be fully resolved until a new network architecture was developed and the NSFNET Backbone Service was turned off in 1995.

Privatization and a new network architecture


The NSFNET Backbone Service was primarily used by academic and educational entities, and was a transitional network bridging the era of the ARPANET and CSNET into the modern Internet of today. On April 30, 1995, the NSFNET Backbone Service had been successfully transitioned to a new architecture[29] and the NSFNET backbone was decommissioned.[30] At this point there were still NSFNET programs, but there was no longer an NSFNET network or network service.

New network architecture, c. 1995

NFSNET

84

After the transition, network traffic was carried on any of several commercial backbone networks, internetMCI, PSINet, SprintLink, ANSNet, and others. Traffic between networks was exchanged at four Network Access Points or NAPs. The NAPs were located in New York (actually New Jersey), Washington, D.C., Chicago, and San Jose and run by Sprint, MFS Datanet, Ameritech, and Pacific Bell.[31] The NAPs were the forerunners of modern Internet exchange points.
NSF's very high speed Backbone Network The former NSFNET regional networks could connect to any of the Service (vBNS) new backbone networks or directly to the NAPs, but in either case they would need to pay for their own connections. NSF provided some funding for the NAPs and interim funding to help the regional networks make the transition, but did not fund the new backbone networks directly.

To help ensure the stability of the Internet during and immediately after the transition from NSFNET, NSF conducted a solicitation to select a Routing Arbiter (RA) and ultimately made a joint award to the Merit Network and USC's Information Science Institute to act as the RA. To continue its promotion of advanced networking technology the NSF conducted a solicitation to create a very high-speed Backbone Network Service (vBNS) that, like NSFNET before it, would focus on providing service to the research and education community. MCI won this award and created a 155 M-bit/sec (OC3c) and later a 622 M-bit/sec (OC12c) and 2.5 G-bit/sec (OC48c) ATM network to carry TCP/IP traffic primarily between the supercomputing centers and their users. NSF support[32] was available to organizations that could demonstrate a need for very high speed networking capabilities and wished to connect to the vBNS or to the Abilene Network, the high speed network operated by the University Corporation for Advanced Internet Development (UCAID, aka Internet2).[33] At the February 1994 regional techs meeting in San Diego, the group revised its charter[34] to include a broader base of network service providers, and subsequently adopted North American Network Operators' Group (NANOG) as its new name. Elise Gerich and Mark Knopper were the founders of NANOG and its first coordinators, followed by Bill Norton, Craig Labovitz, and Susan Harris.[35]

Controversy
For much of the period from 1987 to 1995, following the opening up of the Internet through NSFNET and in particular after the creation of the for-profit ANS CO+RE in May 1991, some Internet stakeholders[36] were concerned over the effects of privatization and the manner in which ANS, IBM, and MCI received a perceived competitive advantage in leveraging federal research money to gain ground in fields in which other companies allegedly were more competitive. The Cook Report on the Internet,[37] which still exists, evolved as one of its largest critics. Other writers, such as Chetly Zarko, a University of Michigan alumnus and freelance investigative writer, offered their own critiques.[38] On March 12, 1992 the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, held a hearing to review the management of NSFNET.[21] Witnesses at the hearing were asked to focus on the agreement(s) that NSF put in place for the operation of the NSFNET backbone, the foundation's plan for recompetition of those agreements, and to help the subcommittee explore whether the NSF's policies provided a level playing field for network service providers, ensured that the network was responsive to user needs, and provided for effective network management. The subcommittee heard from seven witnesses, asked them a number of questions, and received written statements from all seven as well as from three others. At the end of the hearing, speaking to the two witnesses from NSF, Dr. Nico Habermann, Assistant NSF Director for the Computer and Information Science and Engineering Directorate (CISE), and Dr. Stephen Wolff, Director of NSF's Division of Networking &

NFSNET Communications Research & Infrastructure (DNCRI), Representative Boucher, Chairman of the subcommittee, said: " I think you should be very proud of what you have accomplished. Even those who have some constructive criticism of the way that the network is presently managed acknowledge at the outset that you have done a terrific job in accomplishing the goal of this NSFNET, and its user-ship is enormously up, its cost to the users has come down, and you certainly have our congratulations for that excellent success." Subsequently the subcommittee drafted legislation, becoming law on October 23, 1992, which authorized the National Science Foundation to foster and support access by the research and education communities to computer networks which may be used substantially for purposes in addition to research and education in the sciences and engineering, if the additional uses will tend to increase the overall capabilities of the networks to support such research and education activities (that is to say, commercial traffic).[39] This legislation allowed, but did not require, NSF to repeal or modify its existing NSFNET Acceptable Use Policy (AUP)[20] which restricted network use to activities in support of research and education.[23] The hearing also led to a request from Rep. Boucher asking the NSF Inspector General to conduct a review of NSF's administration of NSFNET. The NSF Office of the Inspector General released its report on March 23, 1993.[26] The report concluded by: stating that "[i]n general we were favorably impressed with the NSFNET program and staff"; finding no serious problems with the administration, management, and use of the NSFNET Backbone Service; complimenting the NSFNET partners, saying that "the exchange of views among NSF, the NSFNET provider (Merit/ANS), and the users of NSFNET [via a bulletin board system], is truly remarkable in a program of the federal government"; and making 17 "recommendations to correct certain deficiencies and strengthen the upcoming re-solicitation."

85

References
[1] http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ launch. htm [2] NSFNET: The Partnership That Changed The World (http:/ / www. nsfnet-legacy. org/ ), Web site for an event held to celebrate the NSFNET, November 2007 [3] The Internet - changing the way we communicate (http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ internet. htm), the National Science Foundation's Internet history [4] The Merit Network, Inc. is an independent non-profit 501(c)(3) corporation governed by Michigan's public universities. Merit receives administrative services under an agreement with the University of Michigan. [5] (http:/ / www. mail-archive. com/ list@ifwp. org/ msg08868. html) [6] RFC 1118: The Hitchhikers Guide to the Internet (http:/ / tools. ietf. org/ html/ rfc1118), E. Krol, September 1989 [7] NSF 87-37: Project Solicitation for Management and Operation of the NSFNET Backbone Network, June 15, 1987. [8] InterNIC Review Paper (http:/ / www. codeontheroad. com/ papers/ InterNIC. Review. pdf) [9] NSFNET - National Science Foundation Network (http:/ / www. livinginternet. com/ i/ ii_nsfnet. htm) in the history section of the Living Internet (http:/ / www. livinginternet. com/ ) [10] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [11] Profile: At Home's Milo Medin (http:/ / www. wired. com/ science/ discoveries/ news/ 1999/ 01/ 17425), Wired, January 20, 1999 [12] "The Technology Timetable" (https:/ / babel. hathitrust. org/ cgi/ pt?seq=1& view=image& size=100& id=mdp. 39015035356347& u=1& num=40), Link Letter, Volume 7, No. 1 (July 1994), p.8, Merit/NSFNET Information Services, Merit Network, Ann Arbor [13] Link Letter (http:/ / babel. hathitrust. org/ cgi/ pt?id=mdp. 39015035356347;page=root;view=image;size=100;seq=1;num=1), Volume 4, No. 3 (Sept/Oct 1991), p. 1, NSFNET Information Services, Merit Network, Inc., Ann Arbor [14] "coprorations using BGP for advertising prefixes in mid-1990s" (http:/ / seclists. org/ nanog/ 2011/ May/ 478), e-mail to the NANOG list from Jessica Yu, 13 May 2011 [15] "NSFNET: The Community" (http:/ / www. nsfnet-legacy. org/ archives/ 06--Community. pdf), panel presentation slides, Doug Gale moderator, NSFNET: The Partnership That Changed The World, 29 November 2007 [16] "MeritWho, What, and Why, Part One: The Early Years, 1964-1983" (http:/ / www. merit. edu/ about/ history/ pdf/ MeritHistory. pdf), Eric M. Aupperle, Merit Network, Inc., in Library Hi Tech, vol. 16, No. 1 (1998) [17] "BBN to operate NEARnet" (http:/ / web. mit. edu/ newsoffice/ 1993/ bbn-0714. html), MIT News, 14 July 1993

NFSNET
[18] "About NorthWestNet" (http:/ / www. gutenberg. org/ files/ 40/ 40-ps. ps), NorthWestNet User Services Internet Resource Guide, NorthWestNet Academic Computing Consortium, Inc., 24 March 1992 accessed 3 July 2012 [19] March 16, 1992 memo from Mariam Leder, NSF Assistant General Counsel to Steven Wolff, Division Director, NSF DNCRI (included at page 128 of Management of NSFNET (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false), a transcript of the March 12, 1992 hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, Second Session, Hon. Rick Boucher, subcommittee chairman, presiding) [20] NSFNET Acceptable Use Policy (AUP) (http:/ / www. cybertelecom. org/ notes/ nsfnet. htm#aup), c. 1992 [21] Management of NSFNET (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false), a transcript of the March 12, 1992 hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, Second Session, Hon. Rick Boucher, subcommittee chairman, presiding [22] " I would dearly love to be able to exchange electronic mail with my son in college in Minnesota, but I feel that is probably not acceptable ", Steve Wolff, NSF DNCRI Director, speaking as a witness during the March 12, 1992 Management of NSFNET Congressional Hearing (page 124) (http:/ / www. eric. ed. gov/ ERICWebPortal/ search/ recordDetails. jsp?ERICExtSearch_SearchValue_0=ED350986& searchtype=keyword& ERICExtSearch_SearchType_0=no& _pageLabel=RecordDetails& accno=ED350986& _nfls=false) [23] Even after the appropriations act was amended in 1992 to give NSF more flexibility with regard to commercial traffic, NSF never felt that it could entirely do away with the AUP and its restrictions on commercial traffic, see the response to Recommendation 5 in NSF's response to the Inspector General's review (a April 19, 1993 memo from Frederick Bernthal, Acting Director, to Linda Sundro, Inspector General, that is included at the end of Review of NSFNET (http:/ / www. nsf. gov/ pubs/ stis1993/ oig9301/ oig9301. txt), Office of the Inspector General, National Science Foundation, 23 March 1993) [24] R. Adams UUNET/NSFNET interconnection email (http:/ / www. interesting-people. org/ archives/ interesting-people/ 200912/ msg00032. html) [25] The Commercial Internet eXchange Association Router Agreement (http:/ / www. farooqhussain. org/ projects/ CIX Router Timeline_0905. pdf), c. 2000 [26] Review of NSFNET (http:/ / www. nsf. gov/ pubs/ stis1993/ oig9301/ oig9301. txt), Office of the Inspector General, National Science Foundation, 23 March 1993 [27] "ANS CO+RE and CIX Agree to Interconnect" (http:/ / w2. eff. org/ effector/ effect02. 10), EFFector Online, Issue 2.10, June 9, 1992, Electronic Frontier Foundation, ISSN: 1062-9424 [28] A series of e-mail messages that talk about various aspects of the CIX as seen from MichNet, the regional network operated by Merit in the State of Michigan: 1June1992 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1992-06/ msg00019. html), 29June1992 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1992-06/ msg00015. html), 29Sep1992 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1992-09/ msg00021. html), 4Jan1994 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-01/ msg00000. html), 6Jan1994 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-01/ msg00011. html), and 10Jan1994 (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-01/ msg00016. html) [29] NSF Solicitation 93-52 (http:/ / w2. eff. org/ Infrastructure/ Govt_docs/ nsf_nren. rfp) - Network Access Point Manager, Routing Arbiter, Regional Network Providers, and Very High Speed Backbone Network Services Provider for NSFNET and the NREN(SM) Program, May 6, 1993 [30] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris, Ph.D., and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [31] E-mail regarding Network Access Points from Steve Wolff (NSF) to the com-priv list (http:/ / www. merit. edu/ mail. archives/ mjts/ 1994-03/ msg00001. html), sent 13:51 EST 2 March 1994 [32] NSF Program Solicitation 01-73: High Performance Network Connections for Science and Engineering Research (HPNC) (http:/ / www. nsf. gov/ publications/ pub_summ. jsp?ods_key=nsf0173), Advanced Networking Infrastructure and Research Program, Directorate for Computer and Information Science and Engineering, National Science Foundation, February 16, 2001, 16 pp. [33] E-mail regarding the launch of Internet2's Abillene network (http:/ / www. merit. edu/ mail. archives/ mjts/ 1999-02/ msg00024. html), Merit Joint Technical Staff, 25 February 1999 [34] Original 1994 NANOG Charter (http:/ / www. nanog. org/ governance/ charter/ 1994charter. php) [35] NANOG FAQ (http:/ / www. nanog. org/ about/ faq/ ) [36] Performance Systems International (PSI), AlterNet, Commercial Internet Exchange Association (CIX), Electronic Frontier Foundation (EFF), Gordon Cook, among others, see Cyber Telecom's Web page on "Internet History :: NSFNET" (http:/ / www. cybertelecom. org/ notes/ nsfnet. htm) [37] The Cook Report on the Internet (http:/ / www. cookreport. com) [38] "A Critical Look at the University of Michigan's Role in the 1987 Merit Agreement" (http:/ / www. cookreport. com/ index. php?option=com_content& view=article& id=216:310& catid=53:1995& Itemid=63), Chetly Zarko in The Cook Report on the Internet, January 1995, pp. 9-17 [39] Scientific and Advanced-Technology Act of 1992 (http:/ / thomas. loc. gov/ cgi-bin/ bdquery/ z?d102:S. 1146:), Public Law No: 102-476, 43 U.S.C. 1862(g)

86

NFSNET

87

External links
The Internet - the Launch of NSFNET (http://www.nsf.gov/about/history/nsf0050/internet/launch.htm), National Science Foundation NSFNET: A Partnership for High-Speed Networking, Final Report 1987-1995 (http://www.merit.edu/about/ history/pdf/NSFNET_final.pdf), Karen D. Frazer, Merit Network, Inc., 1995 NSF and the Birth of the Internet (http://www.nsf.gov/news/special_reports/nsf-net/), National Science Foundation, December 2007 NSFNET notes, summary, photos, reflections, and a video (http://hpwren.ucsd.edu/~hwb/NSFNET/), from Hans-Werner Braun, Co-Principal Investigator for the NSFNET Project at Merit Network, and later, Research Scientist at the University of California San Diego, and Adjunct Professor at San Diego State University "Fool Us Once Shame on YouFool Us Twice Shame on Us: What We Can Learn from the Privatizations of the Internet Backbone Network and the Domain Name System" (http://digitalcommons.law.wustl.edu/lawreview/ vol79/iss1/2), Jay P. Kesan and Rajiv C. Shah, Washington University Law Review, Volume 79, Issue 1 (2001) "The Rise of the Internet" (http://www.ibm.com/ibm100/us/en/icons/internetrise/), one of IBMs 100 Icons of Progress (http://www.ibm.com/ibm100/us/en/icons/), by Stephen Grillo, February 11, 2011, highlights IBM's contribution to NSFNET as part of its celebration of IBM's centennial year (http://www.ibm.com/ ibm100/us/en/) Merit Network: A history (http://www.merit.edu/about/history/) NSFNET Link Letter Archive (http://www.nic.funet.fi/pub/netinfo/NSFNET/Linkletter/), April 1988 (Vol. 1 No. 1) to July 1994 (Vol. 7 No. 1), text only, a web and FTP site provided by the Finnish IT center for science (http://www.csc.fi/english) Full copies of volumes 4-7, 1991-1994 (http://hdl.handle.net/2027/mdp.39015035356347) are also available from the Hathi Trust Digital Library Reflection on NSFNet (http://www.universalsubtitles.org/es/videos/ap3npBCf4nir/info/reflection-on-nsfnet/ )

TELENET

88

TELENET
Telenet was a commercial packet switched network which went into service in 1974.[1] It was the first packet-switched network service that was available to the general public.[2] Various commercial and government interests paid monthly fees for dedicated lines connecting their computers and local networks to this backbone network. Free public dialup access to Telenet, for those who wished to access these systems, was provided in hundreds of cities throughout the United States. The original founding company, Telenet Inc., was established by Bolt Beranek and Newman (BBN) and recruited Larry Roberts (former head of the ARPANet) as President of the company, and Barry Wessler. GTE acquired Telenet in 1979.[3] It was later acquired by Sprint and called "Sprintnet". Sprint migrated customers from Telenet to the modern-day Sprintlink[4] IP network, one of many networks composing today's Internet. Telenet had its first offices in downtown Washington DC, then moved to McLean, Virginia. It was acquired by GTE while in McLean, and then moved offices in Reston, Virginia. Under the various names, the company operated a public network, and also sold its packet switching equipment to other carriers and to large enterprise networks.

History
After establishing "value added carriers" was legalized in the U.S., Bolt Beranek and Newman (BBN) who were the private contractors for ARPANET set out to create a private sector version. In January 1975, Telenet Communications Corporation announced that they had acquired the necessary venture capital after a two year quest, and on August 16 of the same year they began operating the first public packet-switching network.[5] [6]

Coverage
Originally, the public network had switching nodes in seven US cities:[7] Washington, D.C. (network operations center as well as switching) Boston, Massachusetts New York, New York Chicago, Illinois Dallas, Texas San Francisco, California Los Angeles, California

The switching nodes were fed by Telenet Access Controller (TAC) terminal concentrators both colocated and remote from the switches. By 1980, there were over 1000 switches in the public network. At that time, the next largest network using Telenet switches was that of Southern Bell, which had approximately 250 switches.

Internal Network Technology


The initial network used statically-defined hop-by-hop routing, using Prime commercial minicomputers as switches, but then migrated to a purpose-built multiprocessing switch based on 6502 microprocessors. Among the innovations of this second-generation switch was a patented arbitrated bus interface that created a switched fabric among the microprocessors.[8] By contrast, a typical microprocessor-based system of the time used a bus; switched fabrics did not become common until about twenty years later, with the advent of PCI Express and HyperTransport. Most interswitch lines ran at 56 kbit/s, with a few, such as New York-Washington, at T1 (i.e., 1.544 Mbit/s). The main internal protocol was a proprietary variant on X.75; Telenet also ran standard X.75 gateways to other packet switching networks.

TELENET Originally, the switching tables could not be altered separately from the main executable code, and topology updates had to be made by deliberately crashing the switch code and forcing a reboot from the network management center. Improvements in the software allowed new tables to be loaded, but the network never used dynamic routing protocols. Multiple static routes, on a switch-by-switch basis, could be defined for fault tolerance. Network management functions continued to run on Prime minicomputers. Its X.25 host interface was the first in the industry and Telenet helped standardize X.25 in the CCITT.

89

Accessing the Network


Basic Asynchronous Access
Users could use modems on the Public Switched Telephone Network to dial TAC ports, calling either from "dumb" terminals or from computers emulating such terminals. Organizations with a large number of local terminals could install a TAC on their own site, which used a dedicated line, at up to 56 kbit/s, to connect to a switch at the nearest Telenet location. Dialup modems supported had a maximum speed of 1200 bit/s, and later 4800 bit/s.

Computer Access
Computers supporting the X.25 protocol could connect directly to switching centers. These connections ranged from 2.4 to 56 kbit/s.

Other Access Protocols


Telenet supported remote concentrators for IBM 3270 family intelligent terminals, which communicated, via X.25 to Telenet-written software that ran in IBM 370x series front-end processors. Telenet also supported Block Mode Terminal Interfaces (BMTI) for IBM Remote Job Entry terminals supporting the 2780/3780 and HASP Bisync protocols.

PC Pursuit
In the late 1980s, Telenet offered a service called PC Pursuit. For a flat monthly fee, customers could dial into the Telenet network in one city, then dial out on the modems in another city to access bulletin board systems and other services. PC Pursuit was popular among computer hobbyists because it sidestepped long-distance charges. In this sense, PC Pursuit was similar to the Internet. Cities accessible by PC Pursuit
City Code Area Code(s) AZPHO CAGLE CALAN CODEN CTHAR FLMIA GAATL ILCHI MABOS MIDET MNMIN 602 818 213 303 203 305 404 312, 815 617 313 612 City Phoenix, Arizona Glendale, California Los Angeles, California Denver, Colorado Hartford, Connecticut Miami, Florida Atlanta, Georgia Chicago, Illinois Boston, Massachusetts Detroit, Michigan Minneapolis, Minnesota

TELENET

90
NCRTP NJNEW NYNYO OHCLV ORPOR PAPHI TXDAL TXHOU WIMIL 919 201 212, 718 216 503 215 214, 817 713 414 Research Triangle Park, North Carolina Newark, New Jersey New York City Cleveland, Ohio Portland, Oregon Philadelphia, Pennsylvania Dallas, Texas Houston, Texas Milwaukee, Wisconsin

References
[1] C. J. P. Moschovitis, H. Poole, T. Schuyler, T. M. Senft, History of the Internet: A Chronology, 1843 to the Present, p. 79-80 (The Moschovitis Group, Inc 1999) [2] Stephen Segaller, NERDS 2.0.1: A Brief History of the Internet, p. 115 (TV Books Publisher 1998) [3] Robert Cannon. "Industry :: Genuity" (http:/ / www. cybertelecom. org/ industry/ genuity. htm). Cybertelecom. . Retrieved 2011-12-21. [4] "Sprintlink.net" (http:/ / www. sprintlink. net/ ). Sprintlink.net. . Retrieved 2011-12-21. [5] "Electronic post for switching data." Timothy Johnson. New Scientist. May 13, 1976 [6] Mathison, S.L. Roberts, L.G. ; Walker, P.M., The history of telenet and the commercialization of packet switching in the U.S. (http:/ / ieeexplore. ieee. org/ xpl/ articleDetails. jsp?arnumber=6194380), Communications Magazine, IEEE, May 2012 [7] Telenet inaugurates service (http:/ / portal. acm. org/ citation. cfm?id=1015671. 1015674& coll=GUIDE& dl=GUIDE& CFID=31545796& CFTOKEN=18757936),ACM Computer Communications Review, Stuart L. Mathison, 1975 [8] Byars, S. J.; Carr, WN (31 January), "Patent Bus Interface" (http:/ / patft. uspto. gov/ netacgi/ nph-Parser?Sect1=PTO2& Sect2=HITOFF& u=/ netahtml/ PTO/ search-adv. htm& r=8& f=G& l=50& d=PTXT& p=1& p=1& S1=908056& OS=908056& RS=908056), US Patent 4,802,161 (U.S. Patent and Trademark Office), , retrieved 2007-09-18

UUCP

91

UUCP
UUCP is an abbreviation of Unix-to-Unix Copy.[1] The term generally refers to a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, a command named uucp is one of the programs in the suite; it provides a user interface for requesting file copy operations. The UUCP suite also includes uux (user interface for remote command execution), uucico (the communication program that performs the file transfers), uustat (reports statistics on recent activity), uuxqt (execute commands sent from remote machines), and uuname (reports the UUCP name of the local system). Although UUCP was originally developed on Unix and is most closely associated with Unix-like systems, UUCP implementations exist for several non-Unix-like operating systems, including Microsoft's MS-DOS, Digital's VAX/VMS, Commodore's AmigaOS, classic Mac OS, and even CP/M.

Technology
UUCP can use several different types of physical connections and link layer protocols, but was most commonly used over dial-up connections. Before the widespread availability of Internet connectivity, computers were only connected by smaller private networks within a company or organization. They were also often equipped with modems so they could be used remotely from character-mode terminals via dial-up lines. UUCP uses the computers' modems to dial out to other computers, establishing temporary, point-to-point links between them. Each system in a UUCP network has a list of neighbor systems, with phone numbers, login names and passwords, etc. When work (file transfer or command execution requests) is queued for a neighbor system, the uucico program typically calls that system to process the work. The uucico program can also poll its neighbors periodically to check for work queued on their side; this permits neighbors without dial-out capability to participate. Today, UUCP is rarely used over dial-up links, but is occasionally used over TCP/IP.[2][3] One example of the current use of UUCP is in the retail industry by Epicor CRS Retail Systems [4] for transferring batch files between corporate and store systems via TCP and dial-up on SCO OpenServer, Red Hat Linux, and Microsoft Windows (with Cygwin). The number of systems involved, as of early 2006, ran between 1500 and 2000 sites across 60 enterprises. UUCP's longevity can be attributed to its low/zero cost, extensive logging, native failover to dialup, and persistent queue management.

History
UUCP was originally written at AT&T Bell Laboratories by Mike Lesk. By 1978 it was in use on 82 UNIX machines inside the Bell system, primarily for software distribution. It was released in 1979 as part of Version 7 Unix.[5] The original UUCP was rewritten by AT&T researchers Peter Honeyman, David A. Nowitz, and Brian E. Redman. The rewrite is referred to as HDB or HoneyDanBer uucp, which was later enhanced, bug fixed, and repackaged as BNU UUCP ("Basic Network Utilities"). Each of these versions was distributed as proprietary software, which inspired Ian Lance Taylor to write a new free software version from scratch in 1991.[6] Taylor UUCP was released under the GNU General Public License and became the most stable and bug free version. In particular, Taylor UUCP addressed security holes which allowed some of the original internet worms to remotely execute unexpected shell commands. Taylor UUCP also incorporates features of all previous versions of UUCP, allowing it to communicate with any other version with the greatest level of compatibility and even use similar config file formats from other versions. UUCP was also implemented for non-UNIX operating systems, most-notably MS-DOS systems. Packages such as UUSLAVE/GNUUCP (John Gilmore, Garry Paxinos, Tim Pozar), UUPC (Drew Derbyshire) and FSUUCP (Christopher Ambler of IODesign), brought early Internet connectivity to personal computers, expanding the

UUCP network beyond the interconnected university systems. FSUUCP formed the basis for many BBS packages such as Galacticomm's Major BBS and Mustang Software's Wildcat! BBS to connect to the UUCP network and exchange email and Usenet traffic. As an example, UFGATE (John Galvin, Garry Paxinos, Tim Pozar) was a package that provided a gateway between networks running Fidonet and UUCP protocols. FSUUCP was notable for being the only other implementation of Taylor's enhanced 'i' protocol, a significant improvement over the standard 'g' protocol used by most UUCP implementations.

92

UUCP for mail routing


The uucp and uuxqt capabilities could be used to send email between machines, with suitable mail user interface and delivery agent programs. A simple UUCP mail address was formed from the adjacent machine name, an exclamation mark or bang, followed by the user name on the adjacent machine. For example, the address barbox!user would refer to user user on adjacent machine barbox. Mail could furthermore be routed through the network, traversing any number of intermediate nodes before arriving at its destination. Initially, this had to be done by specifying the complete path, with a list of intermediate host names separated by bangs. For example, if machine barbox is not connected to the local machine, but it is known that barbox is connected to machine foovax which does communicate with the local machine, the appropriate address to send mail to would be foovax!barbox!user. User barbox!user might publish their UUCP email address in a form such as !bigsite!foovax!barbox!user. This directs people to route their mail to machine bigsite (presumably a well-known and well-connected machine accessible to everybody) and from there through the machine foovax to the account of user user on barbox. Many users would suggest multiple routes from various large well-known sites, providing even better and perhaps faster connection service from the mail sender.

Bang path
An email address of this form was known as a bang path. Bang paths of eight to ten machines (or hops) were not uncommon in 1981, and late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. Some hosts went so far as to try to "rewrite" the path, sending mail via "faster" routesthis practice tended to be frowned upon. The "pseudo-domain" ending .uucp was sometimes used to designate a hostname as being reachable by UUCP networking, although this was never formally in the Internet root as a top-level domain. This would not have made sense anyway, because the DNS system is only appropriate for hosts reachable directly by TCP/IP. Additionally, uucp as a community administers itself and does not mesh well with the administration methods and regulations governing the DNS; .uucp works where it needs to; some hosts punt mail out of SMTP queue into uucp queues on gateway machines if a .uucp address is recognized on an incoming SMTP connection Usenet traffic was originally transmitted over the UUCP protocol using bang paths. These are still in use within Usenet message format Path header lines. They now have only an informational purpose, and are not used for routing, although they can be used to ensure that loops do not occur. In general, this form of e-mail address has now been superseded by the "@ notation", even by sites still using UUCP.

UUCPNET and mapping


UUCPNET was the name for the totality of the network of computers connected through UUCP. This network was very informal, maintained in a spirit of mutual cooperation between systems owned by thousands of private companies, universities, and so on. Often, particularly in the private sector, UUCP links were established without official approval from the companies' upper management. The UUCP network was constantly changing as new systems and dial-up links were added, others were removed, etc.

UUCP The UUCP Mapping Project was a volunteer, largely successful effort to build a map of the connections between machines that were open mail relays and establish a managed namespace. Each system administrator would submit, by e-mail, a list of the systems to which theirs would connect, along with a ranking for each such connection. These submitted map entries were processed by an automatic program that combined them into a single set of files describing all connections in the network. These files were then published monthly in a newsgroup dedicated to this purpose. The UUCP map files could then be used by software such as "pathalias" to compute the best route path from one machine to another for mail, and to supply this route automatically. The UUCP maps also listed contact information for the sites, and so gave sites seeking to join UUCPNET an easy way to find prospective neighbors.

93

Connections with the Internet


Many UUCP hosts, particularly those at universities, were also connected to the Internet in its early years, and e-mail gateways between Internet SMTP-based mail and UUCP mail were developed. A user at a system with UUCP connections could thereby exchange mail with Internet users, and the Internet links could be used to bypass large portions of the slow UUCP network. A "UUCP zone" was defined within the Internet domain namespace to facilitate these interfaces. With this infrastructure in place, UUCP's strength was that it permitted a site to gain Internet e-mail and Usenet connectivity with only a dial-up modem link to another cooperating computer. This was at a time when true Internet access required a leased data line providing a connection to an Internet Point of Presence, both of which were expensive and difficult to arrange. By contrast, a link to the UUCP network could usually be established with a few phone calls to the administrators of prospective neighbor systems. Neighbor systems were often close enough to avoid all but the most basic charges for telephone calls.

Remote commands
uux is remote command execution over UUCP. The uux command is used to execute a command on a remote system, or to execute a command on the local system using files from remote systems. The command is run by the uucico daemon which is not instant.

Decline
UUCP usage began to die out with the rise of ISPs offering inexpensive SLIP and PPP services. The UUCP Mapping Project was formally shut down late in 2000. The UUCP protocol has now mostly been replaced by the Internet TCP/IP based protocols SMTP for mail and NNTP Usenet news. In July 2012, Dutch Internet provider XS4ALL closed down its UUCP service, claiming it was "probably one of the last providers in the world that still offered it"; it still had 13 users at that time, and new users had been refused for several years already.[7]

UUCP

94

Last uses and legacy


One surviving feature of UUCP is the chat file format, largely inherited by the expect software package. UUCP was in use over special-purpose high cost links (e.g. marine satellite links) long after its disappearance elsewhere,[8] and still remains in legacy use. In the mid 2000s, UUCP over TCP/IP (often encrypted, using the SSH protocol[3]) was proposed for use when a computer does not have any fixed IP addresses but is still willing to run a standard mail transfer agent (MTA) like Sendmail or Postfix. Bang paths are still in use within the Usenet network, though not for routing; they are used to record the nodes through which a message has passed, rather than to direct where it will go next. "Bang path" is also used as an expression for any explicitly specified routing path between network hosts. That usage is not necessarily limited to UUCP, IP routing, email messaging, or Usenet.

References
[1] (pdf) UNIX(TM) TIME-SHARING SYSTEM: UNIX PROGRAMMERS MANUAL, Seventh Edition, Volume 1 (http:/ / cm. bell-labs. com/ 7thEdMan/ v7vol1. pdf). Murray Hill, New Jersey: Bell Telephone Laboratories, Incorporated. January 1979. . Retrieved 2011-07-13. [2] Ian Lance Taylor (June 2003). "UUCP 'f' Protocol" (http:/ / www. airs. com/ ian/ uucp-doc/ uucp_7. html#SEC99). . Retrieved 2008-08-04. [3] Fabien Penso. "UUCPssh" (http:/ / uucpssh. org/ ). . Retrieved 2009-08-09 [dead as on 2010-01-07]. [4] http:/ / www. epicor. com/ www/ products/ retail/ RetailSolutions. htm [5] Version 7 Unix manual: "UUCP Implementation Description" by D. A. Nowitz, and "A Dial-Up Network of UNIX Systems" by D. A. Nowitz and M. E. Lesk (http:/ / cm. bell-labs. com/ 7thEdMan/ v7vol2b. pdf) [6] Ian Lance Taylor (September 1991). "Beta release of new UUCP package available" (http:/ / groups. google. com/ group/ comp. mail. uucp/ browse_thread/ thread/ a59ccd63afcade57). . Retrieved 2009-01-19. [7] Goodbye to UUCP (https:/ / blog. xs4all. nl/ 2012/ 07/ 30/ afscheid-van-uucp/ ), XS4ALL blog. (Dutch) [8] Randolph Bentson (August 1995). "Linux Goes To Sea" (http:/ / www. linuxjournal. com/ article/ 1111). . Retrieved 2009-02-21.

External links
Using & Managing UUCP. Ed Ravin, Tim O'Reilly, Dale Doughtery, and Grace Todino. 1996, O'Reilly & Associates, Inc. ISBN 1-56592-153-4 Mark Horton (1986). RFC 976: UUCP Mail Interchange Format Standard. Internet Engineering Task Force Requests for Comment. UUCP Internals Frequently Asked Questions (http://www.faqs.org/faqs/uucp-internals/) Setting up Taylor UUCP + qmail on FreeBSD 5.1 (http://ece.iisc.ernet.in/FAQ) Taylor UUCP (http://www.airs.com/ian/uucp.html) is a GPL licensed UUCP package. Taylor UUCP Documentation (http://www.airs.com/ian/uucp-doc/uucp.html) useful information about UUCP in general and various uucp protocols. The UUCP Project: History (http://www.uucp.org/history/) The UUCP Mapping Project (http://www.uucp.org/uumap/) UUHECNET - Hobbyist UUCP network that offers free feeds (http://www.uuhec.net/)

USENET

95

USENET
Usenet is a worldwide distributed Internet discussion system. It was developed from the general purpose UUCP architecture of the same name. Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980.[1] Users read and post messages (called articles or posts, and collectively termed news) to one or more categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects, and is the precursor to the various Internet forums that are widely used today. Usenet can be superficially regarded as a hybrid between email and web forums. Discussions are threaded, with modern news reader software, as with web forums and BBSes, though posts are stored on the server sequentially.

One notable difference between a BBS or web forum and Usenet is the absence of a central server and dedicated administrator. Usenet is distributed among a large, constantly changing conglomeration of servers that store and forward messages to one another in so-called news feeds. Individual users may read messages from and post messages to a local server operated by a commercial usenet provider, their Internet service provider, university, or employer.

A diagram of Usenet servers and clients. The blue, green, and red dots on the servers represent the groups they carry. Arrows between servers indicate newsgroup group exchanges (feeds). Arrows between clients and servers indicate that a user is subscribed to a certain group and reads or submits articles.

Introduction
Usenet is one of the oldest computer network communications systems still in widespread use. It was conceived in 1979 and publicly established in 1980 at the University of North Carolina at Chapel Hill and Duke University,[1] over a decade before the World Wide Web was developed and the general public got access to the Internet. It was originally built on the "poor man's ARPANET," employing UUCP as its transport protocol to offer mail and file transfers, as well as announcements through the newly developed news software such as A News. The name Usenet emphasized its creators' hope that the USENIX organization would take an active role in its operation.[2] The articles that users post to Usenet are organized into topical categories called newsgroups, which are themselves logically organized into hierarchies of subjects. For instance, [news:sci.math sci.math] and [news:sci.physics sci.physics] are within the sci hierarchy, for science. When a user subscribes to a newsgroup, the news client software keeps track of which articles that user has read.[3] In most newsgroups, the majority of the articles are responses to some other article. The set of articles which can be traced to one single non-reply article is called a thread. Most modern newsreaders display the articles arranged into threads and subthreads. When a user posts an article, it is initially only available on that user's news server. Each news server talks to one or more other servers (its "newsfeeds") and exchanges articles with them. In this fashion, the article is copied from server to server and (if all goes well) eventually reaches every server in the network. The later peer-to-peer networks operate on a similar principle; but for Usenet it is normally the sender, rather than the receiver, who initiates transfers. Some have noted that this seems an inefficient protocol in the era of abundant high-speed network access.

USENET Usenet was designed under conditions when networks were much slower, and not always available. Many sites on the original Usenet network would connect only once or twice a day to batch-transfer messages in and out.[4] Usenet has significant cultural importance in the networked world, having given rise to, or popularized, many widely recognized concepts and terms such as "FAQ" and "spam".[5] The format and transmission of Usenet articles is similar to that of Internet e-mail messages. The difference between the two is that Usenet articles can be read by any user whose news server carries the group to which the message was posted, as opposed to email messages which have one or more specific recipients.[6] Today, Usenet has diminished in importance with respect to Internet forums, blogs and mailing lists. Usenet differs from such media in several ways: Usenet requires no personal registration with the group concerned; information need not be stored on a remote server; archives are always available; and reading the messages requires not a mail or web client, but a news client. The groups in alt.binaries are still widely used for data transfer.

96

ISPs, news servers, and newsfeeds


Many Internet service providers, and many other Internet sites, operate news servers for their users to access. ISPs that do not operate their own servers directly will often offer their users an account from another provider that specifically operates newsfeeds. In early news implementations, the server and newsreader were a single program suite, running on the same system. Today, one uses separate newsreader client software, a program that resembles an email client but accesses Usenet servers instead. Some clients such as Mozilla Thunderbird and Outlook Express provide both abilities. Not all ISPs run news servers. A news server is one of the most difficult Internet services to administer well because of the large amount of data involved, small customer base (compared to mainstream Internet services such as email and web access), and a disproportionately high volume of customer support incidents (frequently complaining of missing news articles that are not the ISP's fault). Some ISPs outsource news operation to specialist sites, which will usually appear to a user as though the ISP ran the server itself. Many sites carry a restricted newsfeed, with a limited number of newsgroups. Commonly omitted from such a newsfeed are foreign-language newsgroups and the alt.binaries hierarchy which largely carries software, music, videos and images, and accounts for over 99 percent of article data. There are also Usenet providers that specialize in offering service to users whose ISPs do not carry news, or that carry a restricted feed. See also news server operation for an overview of how news systems are implemented.

Newsreaders
Newsgroups are typically accessed with newsreaders: applications that allow users to read and reply to postings in newsgroups. These applications act as clients to one or more news servers. Newsreaders are available for all major operating systems.[7] Modern mail clients or "communication suites" commonly also have an integrated newsreader. Often, however, these integrated clients are of low quality, compared to standalone newsreaders, and incorrectly implement Usenet protocols, standards and conventions. Many of these integrated clients, for example the one in Microsoft's Outlook Express, are disliked by purists because of their misbehavior.[8] With the rise of the World Wide Web (WWW), web front-ends (web2news) have become more common. Web front ends have lowered the technical entry barrier requirements to that of one application and no Usenet NNTP server account. There are numerous websites now offering web based gateways to Usenet groups, although some people have begun filtering messages made by some of the web interfaces for one reason or another.[9][10] Google Groups[11] is one such web based front end and some web browsers can access Google Groups via news: protocol links directly.[12]

USENET

97

Moderated and unmoderated newsgroups


A minority of newsgroups are moderated, meaning that messages submitted by readers are not distributed directly to Usenet, but instead are emailed to the moderators of the newsgroup for approval. The moderator is to receive submitted articles, review them, and inject approved articles so that they can be properly propagated worldwide. Articles approved by a moderator must bear the Approved: header line. Moderators ensure that the messages that readers see in the newsgroup conform to the charter of the newsgroup, though they are not required to follow any such rules or guidelines.[13] Typically, moderators are appointed in the proposal for the newsgroup, and changes of moderators follow a succession plan.[14] Historically, a mod.* hierarchy existed before Usenet reorganization.[15] Now, moderated newsgroups may appear in any hierarchy. Usenet newsgroups in the Big-8 hierarchy are created by proposals called a Request for Discussion, or RFD. The RFD is required to have the following information: newsgroup name, checkgroups file entry, and moderated or unmoderated status. If the group is to be moderated, then at least one moderator with a valid email address must be provided. Other information which is beneficial but not required includes: a charter, a rationale, and a moderation policy if the group is to be moderated.[16] Discussion of the new newsgroup proposal follows, and is finished with the members of the Big-8 Management Board making the decision, by vote, to either approve or disapprove the new newsgroup. Unmoderated newsgroups form the majority of Usenet newsgroups, and messages submitted by readers for unmoderated newsgroups are immediately propagated for everyone to see. Minimal editorial content filtering vs propagation speed form one crux of the Usenet community. One little cited defense of propagation is canceling a propagated message, but few Usenet users use this command and some news readers do not offer cancellation commands, in part because article storage expires in relatively short order anyway. Creation of moderated newsgroups often becomes a hot subject of controversy, raising issues regarding censorship and the desire of a subset of users to form an intentional community.

Technical details
Usenet is a set of protocols for generating, storing and retrieving news "articles" (which resemble Internet mail messages) and for exchanging them among a readership which is potentially widely distributed. These protocols most commonly use a flooding algorithm which propagates copies throughout a network of participating servers. Whenever a message reaches a server, that server forwards the message to all its network neighbors that haven't yet seen the article. Only one copy of a message is stored per server, and each server makes it available on demand to the (typically local) readers able to access that server. The collection of Usenet servers has thus a certain peer-to-peer character in that they share resources by exchanging them, the granularity of exchange however is on a different scale than a modern peer-to-peer system and this characteristic excludes the actual users of the system who connect to the news servers with a typical client-server application, much like an email reader. RFC 850 was the first formal specification of the messages exchanged by Usenet servers. It was superseded by RFC 1036 and subsequently by RFC 5536 and RFC 5537. In cases where unsuitable content has been posted, Usenet has support for automated removal of a posting from the whole network by creating a cancel message, although due to a lack of authentication and resultant abuse, this capability is frequently disabled. Copyright holders may still request the manual deletion of infringing material using the provisions of World Intellectual Property Organization treaty implementations, such as the United States Online Copyright Infringement Liability Limitation Act. On the Internet, Usenet is transported via the Network News Transfer Protocol (NNTP) on TCP Port 119 for standard, unprotected connections and on TCP port 563 for SSL encrypted connections which is offered only by a few sites.

USENET

98

Organization
The major set of worldwide newsgroups is contained within nine hierarchies, eight of which are operated under consensual guidelines that govern their administration and naming. The current Big Eight are: comp.* computer-related discussions (comp.software, comp.sys.amiga) humanities.* fine arts, literature, and philosophy (humanities.classics, humanities.design.misc) misc.* miscellaneous topics (misc.education, misc.forsale, misc.kids) news.* discussions and announcements about news (meaning Usenet, not current events) (news.groups, news.admin) rec.* recreation and entertainment (rec.music, rec.arts.movies) sci.* science related discussions (sci.psychology, sci.research) soc.* social discussions (soc.college.org, soc.culture.african) talk.* talk about various controversial topics (talk.religion, talk.politics, talk.origins) See also the Great Renaming. The alt.* hierarchy is not subject to the procedures controlling groups in the Big Eight, and it is as a result less organized. Groups in the alt.* hierarchy tend to be more specialized or specificfor example, there might be a newsgroup under the Big Eight which contains discussions about children's books, but a group in the alt hierarchy may be dedicated to one specific author of children's books. Binaries are posted in alt.binaries.*, making it the largest of all the hierarchies. Many other hierarchies of newsgroups are distributed alongside these. Regional and language-specific hierarchies such as japan.*, malta.* and ne.* serve specific countries and regions such as Japan, Malta and New England. Companies and projects administer their own hierarchies to discuss their products and offer community technical support, such as the historical gnu.* hierarchy from the Free Software Foundation. Microsoft closed its newsserver in June 2010, providing support for its products over forums now.[17] Some users prefer to use the term "Usenet" to refer only to the Big Eight hierarchies; others include alt as well. The more general term "netnews" incorporates the entire medium, including private organizational news systems. Informal sub-hierarchy conventions also exist. *.answers are typically moderated cross-post groups for FAQs. An FAQ would be posted within one group and a cross post to the *.answers group at the head of the hierarchy seen by some as a refining of information in that news group. Some subgroups are recursiveto the point of some silliness in alt.*.

USENET

99

Binary content
Usenet was originally created to distribute text content encoded in the 7-bit ASCII character set. With the help of programs that encode 8-bit values into ASCII, it became practical to distribute binary files as content. Binary posts, due to their size and often-dubious copyright status, were in time restricted to specific newsgroups, making it easier for administrators to allow or disallow the traffic.

A visual example of the many complex steps required to prepare data to be uploaded to Usenet newsgroups. These steps must be done again in reverse to download data from Usenet.

The oldest widely used encoding method for binary content is uuencode, from the Unix UUCP package. In the late 1980s, Usenet articles were often limited to 60,000 characters, and larger hard limits exist today. Files are therefore commonly split into sections that require reassembly by the reader. With the header extensions and the Base64 and Quoted-Printable MIME encodings, there was a new generation of binary transport. In practice, MIME has seen increased adoption in text messages, but it is avoided for most binary attachments. Some operating systems with metadata attached to files use specialized encoding formats. For Mac OS, both Binhex and special MIME types are used. Other lesser known encoding systems that may have been used at one time were BTOA, XX encoding, BOO, and USR encoding. In an attempt to reduce file transfer times, an informal file encoding known as yEnc was introduced in 2001. It achieves about a 30% reduction in data transferred by assuming that most 8-bit characters can safely be transferred across the network without first encoding into the 7-bit ASCII space. The standard method of uploading binary content to Usenet is to first archive the files into RAR archives (for large files usually in 15 MB, 50 MB or 100 MB parts) then create Parchive files. Parity files are used to recreate missing data. This is needed often, as not every part of the files reaches a server. These are all then encoded into yEnc and uploaded to the selected binary groups.

USENET Binary retention time Each newsgroup is generally allocated a certain amount of storage space for post content. When this storage has been filled, each time a new post arrives, old posts are deleted to make room for the new content. If the network bandwidth available to a server is high but the storage allocation is small, it is possible for a huge flood of incoming content to overflow the allocation and push out everything that was in the group before it. If the flood is large enough, the beginning of the flood will begin to be deleted even before the last part of the flood has been posted. Binary newsgroups are only able to function reliably if there is sufficient This is a list of some of the biggest binary groups. With 1317+ days retention, the storage allocated to a group to allow (binary) Usenet storage (which binsearch.info indexes) is more than 9 petabytes (9000 [18] readers enough time to download all terabytes). parts of a binary posting before it is flushed out of the group's storage allocation. This was at one time how posting of undesired content was countered; the newsgroup would be flooded with random garbage data posts, of sufficient quantity to push out all the content to be suppressed. This has been compensated by service providers allocating enough storage to retain everything posted each day, including such spam floods, without deleting anything. The average length of time that posts are able to stay in the group before being deleted is commonly called the retention time. Generally the larger Usenet servers have enough capacity to archive several years of binary content even when flooded with new data at the maximum daily speed available. A good binaries service provider must not only accommodate users of fast connections (3 megabit) but also users of slow connections (256 kilobit or less) who need more time to download content over a period of several days or weeks. Major NSPs have a retention time of more than 4 years.[19] This results in more than 9 petabytes (9000 terabytes) of storage. [20] In part because of such long retention times, as well as growing Internet upload speeds, Usenet is also used by individual users to store backup data in a practice called Usenet backup, or uBackup.[21] While commercial providers offer more easy to use online backup services, storing data on Usenet is free of charge (although access to Usenet itself may not be). The method requires the user to manually select, prepare and upload the data. Because anyone can potentially download the backup files, the data is typically encrypted. After the files are uploaded, the uploader does not have any control over them; the files are automatically copied to all Usenet providers, so there will be multiple copies of it spread over different geographical locations around the world desirable in a backup scheme.

100

USENET Legal issues While binary newsgroups can be used to distribute completely legal user-created works, open-source software, and public domain material, some binary groups are used to illegally distribute commercial software, copyrighted media, and obscene material. ISP-operated Usenet servers frequently block access to all alt.binaries.* groups to both reduce network traffic and to avoid related legal issues. Commercial Usenet service providers claim to operate as a telecommunications service, and assert that they are not responsible for the user-posted binary content transferred via their equipment. In the United States, Usenet providers can qualify for protection under the DMCA Safe Harbor regulations, provided that they establish a mechanism to comply with and respond to takedown notices from copyright holders.[22] Removal of copyrighted content from the entire Usenet network is a nearly impossible task, due to the rapid propagation between servers and the retention done by each server. Petitioning a Usenet provider for removal only removes it from that one server's retention cache, but not any others. It is possible for a special post cancellation message to be distributed to remove it from all servers, but many providers ignore cancel messages by standard policy, because they can be easily falsified and submitted by anyone.[23][24] For a takedown petition to be most effective across the whole network, it would have to be issued to the origin server to which the content has been posted, before it has been propagated to other servers. Removal of the content at this early stage would prevent further propagation, but with modern high speed links, content can be propagated as fast as it arrives, allowing no time for content review and takedown issuance by copyright holders.[25] Establishing the identity of the person posting illegal content is equally difficult due to the trust-based design of the network. Like SMTP email, servers generally assume the header and origin information in a post is true and accurate. However, as in SMTP email, Usenet post headers are easily falsified so as to obscure the true identity and location of the message source.[26] In this manner, Usenet is significantly different from modern P2P services; most P2P users distributing content are typically immediately identifiable to all other users by their network address, but the origin information for a Usenet posting can be completely obscured and unobtainable once it has propagated past the original server.[27] Also unlike modern P2P services, the identity of the downloaders is hidden from view. On P2P services a downloader is identifiable to all others by their network address. On Usenet, the downloader connects directly to a server, and only the server knows the address of who is connecting to it. Some Usenet providers do keep usage logs, but not all make this logged information casually available to outside parties such as the Recording Industry Association of America.[28][29]

101

History
Newsgroup experiments first occurred in 1979. Tom Truscott and Jim Ellis of Duke University came up with the idea as a replacement for a local announcement program, and established a link with nearby University of North Carolina using Bourne shell scripts written by Steve Bellovin. The public release of news was in the form of conventional compiled software, written by Steve Daniel and Truscott.[30] In 1980, Usenet was connected to ARPANET through UC Berkeley which had connections to both Usenet and ARPANET. Michael Horton, the graduate student that set up the connection, began feeding mailing lists from the ARPANET into Usenet with the fa identifier. As a result, the number of people on Usenet increased dramatically; however, it was still a while longer before Usenet users could contribute to ARPANET.[31] After 32 years, the Usenet news service link at the University of North Carolina at Chapel Hill (news.unc.edu) was finally retired on February 4, 2011.

USENET

102

Network
UUCP networks spread quickly due to the lower costs involved, and the ability to use existing leased lines, X.25 links or even ARPANET connections. By 1983, the number of UUCP hosts had grown to 550, nearly doubling to 940 in 1984.[32] As the mesh of UUCP hosts rapidly expanded, it became desirable to distinguish the Usenet subset from the overall network. A vote was taken at the 1982 USENIX conference to choose a new name. The name Usenet was retained, but it was established that it only applied to news.[33] The name UUCPNET became the common name for the overall network. In addition to UUCP, early Usenet traffic was also exchanged with Fidonet and other dial-up BBS networks. Widespread use of Usenet by the BBS community was facilitated by the introduction of UUCP feeds made possible by MS-DOS implementations of UUCP such as UFGATE (UUCP to FidoNet Gateway), FSUUCP and UUPC. The Network News Transfer Protocol, or NNTP, was introduced in 1985 to distribute Usenet articles over TCP/IP as a more flexible alternative to informal Internet transfers of UUCP traffic. Since the Internet boom of the 1990s, almost all Usenet distribution is over NNTP.[34]

Software
Early versions of Usenet used Duke's A News software. Soon, at UC Berkeley, Matt Glickman and Mark Horton produced an improved version called B News. With a message format that offered compatibility with Internet mail and improved performance, it became the dominant server software. C News, developed by Geoff Collyer and Henry Spencer at the University of Toronto, was comparable to B News in features but offered considerably faster processing. In the early 1990s, InterNetNews by Rich Salz was developed to take advantage of the continuous message flow made possible by NNTP versus the batched store-and-forward design of UUCP. Since that time INN development has continued, and other news server software has also been developed.[35]

Public venue
Usenet was the initial Internet community and the place for many of the most important public developments in the commercial Internet. It was the place where Tim Berners-Lee announced the launch of the World Wide Web,[36] where Linus Torvalds announced the Linux project,[37] and where Marc Andreessen announced the creation of the Mosaic browser and the introduction of the image tag,[38] which revolutionized the World Wide Web by turning it into a graphical medium.

Internet jargon and history


Many jargon terms now in common use on the Internet originated or were popularized on Usenet.[39] Likewise, many conflicts which later spread to the rest of the Internet, such as the ongoing difficulties over spamming, began on Usenet.[40] "Usenet is like a herd of performing elephants with diarrhea. Massive, difficult to redirect, awe-inspiring, entertaining, and a source of mind-boggling amounts of excrement when you least expect it." Gene Spafford, 1992

Decline in growth rate


Sascha Segan of PC Magazine said in 2008 "Usenet has been dying for years[...]" Segan said that some people pointed to the Eternal September in 1993 as the beginning of Usenet's decline. Segan said that the "eye candy" on the World Wide Web and the marketing funds spent by owners of websites convinced Internet users to use profit-making websites instead of Usenet servers. In addition, DejaNews and Google Groups made conversations searchable, and Segan said that this removed the obscurity of previously obscure Internet groups on Usenet. Segan

USENET explained that when pornographers and software pirates began putting large files on Usenet, by the late 1990s this caused Usenet disk space and traffic to increase. Internet service providers allocated space to Usenet libraries, and Internet service providers questioned why they needed to host space for pornography and pirated software. Segan said that the hosting of porn and pirated software was "likely when Usenet became truly doomed" and "[i]t's the porn that's putting nails in Usenet's coffin." AOL discontinued Usenet access in 2005. When the State of New York opened an investigation on child pornographers who used Usenet, many ISPs dropped all Usenet access or access to the alt. hierarchy. Segan concluded "It's hard to completely kill off something as totally decentralized as Usenet; as long as two servers agree to share the NNTP protocol, it'll continue on in some fashion. But the Usenet I mourn is long gone[...]"[41] In response, John Biggs of TechCrunch said "Is Usenet dead, as Sascha posits? I dont think so. As long as there are folks who think a command line is better than a mouse, the original text-only social network will live on." Biggs added that while many Internet service providers terminated access, "the real pros know where to go to get their angst-filled, nit-picking, obsessive fix."[42] In May 2010, Duke University, whose implementation had kicked off Usenet more than 30 years earlier, decommissioned its Usenet server, citing low usage and rising costs.[43][44]

103

Usenet traffic changes


Over time, the amount of Usenet traffic has steadily increased. As of 2010 the number of all text posts made in all Big-8 newsgroups averaged 1,800 new messages every hour, with an average of 25,000 messages per day.[45] However, these averages are minuscule in comparison to the traffic in the binary groups.[46] Much of this traffic increase reflects not an increase in discrete users or newsgroup discussions, but instead the combination of massive automated spamming and an increase in the use of .binaries newsgroups[45] in which large files are often posted publicly. A small sampling of the change (measured in feed size per day) follows:

USENET

104

Daily Volume

Date

Source Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com Altopia.com

4.5 GB 1996-12 9 GB 1997-07 12 GB 1998-01 26 GB 1999-01 82 GB 2000-01 181 GB 2001-01 257 GB 2002-01 492 GB 2003-01 969 GB 2004-01

1.30 TB 2004-09-30 Octanews.net 1.38 TB 2004-12-31 Octanews.net 1.52 TB 2005-01 Altopia.com

1.34 TB 2005-01-01 Octanews.net 1.30 TB 2005-01-01 Newsreader.com 1.81 TB 2005-02-28 Octanews.net 1.87 TB 2005-03-08 Newsreader.com 2.00 TB 2005-03-11 Various sources 2.27 TB 2006-01 2.95 TB 2007-01 3.07 TB 2008-01 Altopia.com Altopia.com Altopia.com

3.80 TB 2008-04-16 Newsdemon.com 4.60 TB 2008-11-01 Giganews.com 4.65 TB 2009-01 6.00 TB 2009-12 5.42 TB 2010-01 8.00 TB 2010-09 7.52 TB 2011-01 8.25 TB 2011-10 9.29 TB 2012-01 Altopia.com Newsdemon.com Altopia.com Newsdemon.com Altopia.com Thecubenet.com Altopia.com

In 2008, Verizon Communications, Time Warner Cable and Sprint Nextel signed an agreement with Attorney General of New York Andrew Cuomo to shut down access to sources of child pornography.[47] Time Warner Cable stopped offering access to Usenet. Verizon reduced its access to the "Big 8" hierarchies. Sprint stopped access to the alt.* hierarchies. AT&T stopped access to the alt.binaries.* hierarchies. Cuomo never specifically named Usenet in his anti-child pornography campaign. David DeJean of PC World said that some worry that the ISPs used Cuomo's campaign as an excuse to end portions of Usenet access, as it is costly for the Internet service providers and not in high demand by customers. In 2008 AOL, which no longer offered Usenet access, and the four providers that responded to the Cuomo campaign were the five largest Internet service providers in the United States; they had more than 50% of the U.S. ISP marketshare.[48] On June 8, 2009, AT&T announced that it would no longer provide access to the Usenet service as of July 15, 2009.[49]

USENET AOL announced that it would discontinue its integrated Usenet service in early 2005, citing the growing popularity of weblogs, chat forums and on-line conferencing.[50] The AOL community had a tremendous role in popularizing Usenet some 11 years earlier.[51] In August, 2009, Verizon announced that it would discontinue access to Usenet on September 30, 2009.[52][53] JANET(UK) announced it will discontinue Usenet service, effective July 31, 2010, citing Google Groups as an alternative.[54] Microsoft announced that it would discontinue support for its public newsgroups (msnews.microsoft.com) from June 1, 2010, offering web forums as an alternative.[55] Primary reasons cited for the discontinuance of Usenet service by general ISPs include the decline in volume of actual readers due to competition from blogs, along with cost and liability concerns of increasing proportion of traffic devoted to file-sharing and spam on unused or discontinued groups.[56][57] Some ISPs did not include pressure from Attorney General of New York Andrew Cuomo's aggressive campaign against child pornography as one of their reasons for dropping Usenet feeds as part of their services.[58] ISPs Cox and Atlantic Communications resisted the 2008 trend but both did eventually drop their respective Usenet feeds in 2010.[59][60][61]

105

Archives
Public archives of Usenet articles have existed since the early days of Usenet, such as the system created by Kenneth Almquist in late 1982.[62] Distributed archiving of Usenet posts was suggested in November 1982 by Scott Orshan, who proposed that "Every site should keep all the articles it posted, forever."[63] Also in November of that year, Rick Adams responded to a post asking "Has anyone archived netnews, or does anyone plan to?"[64] by stating that he was, "afraid to admit it, but I started archiving most 'useful' newsgroups as of September 18."[65] In June 1982, Gregory G. Woodbury proposed an "automatic access to archives" system that consisted of "automatic answering of fixed-format messages to a special mail recipient on specified machines." [66] In 1985, two news archiving systems and one RFC were posted to the Internet. The first system, called keepnews, by Mark M. Swenson of The University of Arizona, was described as "a program that attempts to provide a sane way of extracting and keeping information that comes over Usenet." The main advantage of this system was to allow users to mark articles as worthwhile to retain.[67] The second system, YA News Archiver by Chuq Von Rospach, was similar to keepnews, but was "designed to work with much larger archives where the wonderful quadratic search time feature of the Unix ... becomes a real problem."[68] Von Rospach in early 1985 posted a detailed RFC for "archiving and accessing usenet articles with keyword lookup." This RFC described a program that could "generate and maintain an archive of Usenet articles and allow looking up articles based on the article-id, subject lines, or keywords pulled out of the article itself." Also included was C code for the internal data structure of the system.[69] The desire to have a fulltext search index of archived news articles is not new either, one such request having been made in April 1991 by Alex Martelli who sought to "build some sort of keyword index for [the news archive]."[70] In early May, Mr. Martelli posted a summary of his responses to Usenet, noting that the "most popular suggestion award must definitely go to 'lq-text' package, by Liam Quin, recently posted in alt.sources."[71] Today, the archiving of Usenet has led to a fear of loss of privacy.[72] An archive simplifies ways to profile people. This has partly been countered with the introduction of the X-No-Archive: Yes header, which is itself controversial.[73]

USENET

106

Archives by Google Groups and DejaNews


Web-based archiving of Usenet posts began in 1995 at Deja News with a very large, searchable database. In 2001, this database was acquired by Google.[74] Google Groups hosts an archive of Usenet posts dating back to May 1981. The earliest posts, which date from May 1981 to June 1991, were donated to Google by the University of Western Ontario with the help of David Wiseman and others,[75] and were originally archived by Henry Spencer at the University of Toronto's Zoology department.[76] The archives for late 1991 through early 1995 were provided by Kent Landfield from the NetNews CD series[77] and Jrgen Christoffel from GMD.[78] The archive of posts from March 1995 onward was originally started by the company DejaNews (later Deja), which was purchased by Google in February 2001. Google began archiving Usenet posts for itself starting in the second week of August 2000. Already during the DejaNews era the archive had become a popular constant in Usenet culture, and remains so today.

References
[1] From Usenet to CoWebs: interacting with social information spaces, Christopher Lueg, Danyel Fisher, Springer (2003), ISBN 1-85233-532-7, ISBN 978-1-85233-532-8 [2] "Invitation to a General Access UNIX Network (http:/ / www. newsdemon. com/ first-official-announcement-usenet. php)", James Ellis and Tom Truscott, in First Official Announcement of USENET, NewsDemon (K&L Technologies, Inc), 1979 [3] Lehnert, Wendy G.; Kopec, Richard (2007). Web 101. Addison Wesley. p. 291. [4] "Store And Forward Communication: UUCP and FidoNet" (http:/ / www. cs. cmu. edu/ ~dga/ 15-849/ store_and_forward. html). Archived (http:/ / archive. is/ 20120630/ http:/ / www. cs. cmu. edu/ ~dga/ 15-849/ store_and_forward. html) from the original on 2012-06-30. .. Carnegie Mellon School of Computer Science. [5] "USENET Newsgroup Terms - SPAM" (http:/ / www. newsdemon. com/ usenet_term_spam. php). Archived (http:/ / archive. is/ 20120915/ http:/ / www. newsdemon. com/ usenet_term_spam. php) from the original on 2012-09-15. . [6] Kozierok, Charles M. (2005). The TCP/IP guide: a comprehensive, illustrated Internet protocols reference. No Starch Press. p. 1401. [7] "Open Directory Usenet Clients" (http:/ / www. dmoz. org/ Computers/ Software/ Internet/ Clients/ Usenet/ ). Dmoz.org. October 9, 2008. Archived (http:/ / archive. is/ 20120730/ http:/ / www. dmoz. org/ Computers/ Software/ Internet/ Clients/ Usenet/ ) from the original on 2012-07-30. . Retrieved December 14, 2010. [8] Jain, Dominik (July 30, 2006). "OE-QuoteFix Description" (http:/ / home. in. tum. de/ ~jain/ software/ oe-quotefix/ ). Archived (http:/ / archive. is/ 20120921/ http:/ / home. in. tum. de/ ~jain/ software/ oe-quotefix/ ) from the original on 2012-09-21. . Retrieved June 4, 2007. [9] "Improve-Usenet" (http:/ / improve-usenet. org). October 13, 2008. Archived (http:/ / archive. is/ 20120713/ http:/ / improve-usenet. org) from the original on 2012-07-13. . [10] "Improve-Usenet Comments" (http:/ / web. archive. org/ web/ 20080426174022/ http:/ / improve-usenet. org/ voices1. html). October 13, 2008. Archived from the original (http:/ / improve-usenet. org/ voices1. html) on April 26, 2008. . Retrieved June 29, 2009. [11] "Google Groups" (http:/ / groups. google. com/ ). Groups.google.com. Archived (http:/ / archive. is/ 20120525/ http:/ / groups. google. com/ ) from the original on 2012-05-25. . Retrieved December 14, 2010. [12] "News: links to Google Groups" (http:/ / mykzilla. blogspot. com/ 2008/ 11/ news-links-to-google-groups. html). Archived (http:/ / archive. is/ 20120712/ http:/ / mykzilla. blogspot. com/ 2008/ 11/ news-links-to-google-groups. html) from the original on 2012-07-12. . [13] "Who can force the moderators to obey the group charter?" (http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#Who_can_force_the_moderators_to_obey_the_group_charter. 3F). Big-8.org. Archived (http:/ / archive. is/ 20120804/ http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#Who_can_force_the_moderators_to_obey_the_group_charter. 3F) from the original on 2012-08-04. . Retrieved December 14, 2010. [14] "How does a group change moderators?" (http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#How_does_a_group_change_moderators. 3F). Big-8.org. Archived (http:/ / archive. is/ 20120719/ http:/ / www. big-8. org/ wiki/ Moderated_Newsgroups#How_does_a_group_change_moderators. 3F) from the original on 2012-07-19. . Retrieved December 14, 2010. [15] "Early Usenet Newsgroup Hierarchies" (http:/ / www. livinginternet. com/ u/ ui_early. htm). Livinginternet.com. October 25, 1990. Archived (http:/ / archive. is/ 20120921/ http:/ / www. livinginternet. com/ u/ ui_early. htm) from the original on 2012-09-21. . Retrieved December 14, 2010. [16] "How to Create a New Big-8 Newsgroup" (http:/ / www. big-8. org/ wiki/ How_to_Create_a_New_Big-8_Newsgroup). Big-8.org. July 7, 2010. Archived (http:/ / archive. is/ 20120722/ http:/ / www. big-8. org/ wiki/ How_to_Create_a_New_Big-8_Newsgroup) from the original on 2012-07-22. . Retrieved December 14, 2010. [17] Microsoft Responds to the Evolution of Communities (http:/ / www. microsoft. com/ communities/ newsgroups/ default. mspx), Announcement, undated. "Microsoft hitting 'unsubscribe' on newsgroups" (http:/ / news. cnet. com/ 8301-13860_3-20004109-56. html). Archived (http:/ / archive. is/ 20120712/ http:/ / news. cnet. com/ 8301-13860_3-20004109-56. html) from the original on 2012-07-12. ., CNET, May 4, 2010.

USENET
[18] "Usenet storage is more than 9 [[petabyte|petabytes (https:/ / www. binsearch. info/ groupinfo. php)] (9000 terabytes)"]. binsearch.info. Archived (http:/ / archive. is/ 20120921/ https:/ / www. binsearch. info/ groupinfo. php) from the original on 2012-09-21. . Retrieved June 5, 2012. [19] "Giganews FAQ - How long are articles available?" (http:/ / www. giganews. com/ faq. html#q0. 4). Giganews.com. Archived (http:/ / archive. is/ 20120904/ http:/ / www. giganews. com/ faq. html#q0. 4) from the original on 2012-09-04. . Retrieved October 23, 2012. [20] "9 petabyte of usenet storage on giganews.com" (http:/ / www. giganews. com/ blog/ 2011/ 05/ announcing-1000-days-retention-prize. html). giganews.com. Archived (http:/ / archive. is/ 20120921/ http:/ / www. giganews. com/ blog/ 2011/ 05/ announcing-1000-days-retention-prize. html) from the original on 2012-09-21. . Retrieved February 14, 2012. [21] "usenet backup (uBackup)" (http:/ / www. wikihow. com/ Backup-Your-Data-on-Usenet-(Ubackup)). Wikihow.com. Archived (http:/ / archive. is/ 20120918/ http:/ / www. wikihow. com/ Backup-Your-Data-on-Usenet-(Ubackup)) from the original on 2012-09-18. . Retrieved February 14, 2012. [22] "The [[Supernews_(Usenet_provider) SuperNews (http:/ / www. supernews. com/ docs/ dmca. html)] DMCA notifications page shows a typical example of Usenet provider DMCA takedown compliance."]. Archived (http:/ / archive. is/ 20120910/ http:/ / www. supernews. com/ docs/ dmca. html) from the original on 2012-09-10. . [23] "Cancel Messages FAQ" (http:/ / web. archive. org/ web/ 20071212175002/ http:/ / www. killfile. org/ faqs/ cancel. html). Archived from the original (http:/ / wiki. killfile. org/ projects/ usenet/ faqs/ cancel/ ) on December 12, 2007. . Retrieved June 29, 2009. "...Until authenticated cancels catch on, there are no options to avoid forged cancels and allow unforged ones..." [24] Microsoft knowledgebase article stating that many servers ignore cancel messages "Support.microsoft.com" (http:/ / support. microsoft. com/ kb/ q164420/ ). Archived (http:/ / archive. is/ 20120719/ http:/ / support. microsoft. com/ kb/ q164420/ ) from the original on 2012-07-19. . [25] "Microsoft Word - Surmacz.doc" (http:/ / www. measurement. sk/ 2005/ S1/ Surmacz. pdf) (PDF). . Retrieved December 14, 2010. [26] ...every part of a Usenet post may be forged apart from the left most portion of the "Path:" header... "By-users.co.uk" (http:/ / www. by-users. co. uk/ faqs/ email/ headers/ ). Archived (http:/ / archive. is/ 20120723/ http:/ / www. by-users. co. uk/ faqs/ email/ headers/ ) from the original on 2012-07-23. . [27] "tUPidfuk01@uunet.uu.net Better living through forgery (news:S)". [news:news.admin.misc news.admin.misc]. 1995-06-10. Retrieved June 08 2012. [28] "Giganews Privacy Policy" (http:/ / www. giganews. com/ legal/ privacy. html). Giganews.com. Archived (http:/ / archive. is/ 20120731/ http:/ / www. giganews. com/ legal/ privacy. html) from the original on 2012-07-31. . Retrieved December 14, 2010. [29] "Logging Policy" (http:/ / aioe. org/ index. php?logging-policy). Aioe.org. June 9, 2005. Archived (http:/ / archive. is/ 20120708/ http:/ / aioe. org/ index. php?logging-policy) from the original on 2012-07-08. . Retrieved December 14, 2010. [30] LaQuey, Tracy (1990). The User's directory of computer networks. Digital Press. p. 386. [31] Hauben, Michael and Hauben, Rhonda. Netizens: On the History and Impact of Usenet and the Internet, On the Early Days of Usenet: The Roots of the Cooperative Online Culture. First Monday vol. 3 num.August 8, 3 1998 [32] Haddadi, H. (2006). "Network Traffic Inference Using Sampled Statistics." University College London. [33] Horton, Mark (December 11, 1990). "Arachnet" (http:/ / communication. ucsd. edu/ bjones/ Usenet. Hist/ Nethist/ 0111. html). Archived (http:/ / archive. is/ 20120921/ http:/ / communication. ucsd. edu/ bjones/ Usenet. Hist/ Nethist/ 0111. html) from the original on 2012-09-21. . Retrieved June 4, 2007. [34] Huston, Geoff (1999). ISP survival guide: strategies for running a competitive ISP. Wiley. p. 439. [35] "Unix/Linux news servers" (http:/ / www. newsreaders. com/ unix/ servers. html). Newsreaders.com. Archived (http:/ / archive. is/ 20120905/ http:/ / www. newsreaders. com/ unix/ servers. html) from the original on 2012-09-05. . Retrieved December 14, 2010. [36] Tim Berners-Lee (August 6, 1991). "@cernvax.cern.ch WorldWideWeb: Summary (news:6487)". lt.hypertext alt.hypertext (news:a). Retrieved June 4, 2007. [37] Torvalds, Linus. "ug25.205708.9541@klaava.Helsinki.FI What would you like to see most in minix? (news:1991A)". [news:comp.os.minix comp.os.minix]. Retrieved September 9, 2006. [38] Marc Andreessen (March 15, 1993). "r14225600@wintermute.ncsa.uiuc.edu NCSA Mosaic for X 0.10 available. (news:MARCA. 93Ma)". [news:comp.infosystems.gopher, comp.infosystems.wais, comp.infosystems, alt.hypertext, comp.windows.x comp.infosystems.gopher, comp.infosystems.wais, comp.infosystems, alt.hypertext, comp.windows.x]. Retrieved June 4, 2007. [39] Kaltenbach, Susan (2000-12). "The Evolution of the Online Discourse Community" (http:/ / noonuniverse. com/ Linked_work/ online_discourse. pdf). . ""Verb Doubling: Doubling a verb may change its semantics, Soundalike Slang: Punning jargon, The -P convention: A LISPy way to form questions, Overgeneralization: Standard abuses of grammar, Spoken Inarticulations: Sighing and <*sigh*&rt;ing, Anthropomorphization: online components were named "Homunculi," daemons," etc., and there were also "confused" programs. Comparatives: Standard comparatives for design quality"" [40] Campbell, K.K. (October 1, 1994). "Chatting With Martha Siegel of the Internet's Infamous Canter & Siegel" (http:/ / web. archive. org/ web/ 20071125201904/ http:/ / w2. eff. org/ legal/ cases/ Canter_Siegel/ c-and-s_summary. article). Electronic Frontier Foundation. Archived from the original (http:/ / w2. eff. org/ legal/ cases/ Canter_Siegel/ c-and-s_summary. article) on November 25, 2007. . Retrieved September 24, 2010. [41] Sascha Segan (July 31, 2008). "R.I.P Usenet: 1980-2008" (http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp). PC Magazine: p.2. Archived (http:/ / archive. is/ 20120909/ http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp) from the original on 2012-09-09. . Retrieved May 8, 2011.

107

USENET
[42] " "Reports of Usenet's Death Are Greatly Exaggerated" (http:/ / techcrunch. com/ 2008/ 08/ 01/ the-reports-of-usenets-death-are-greatly-exaggerated/ ). Archived (http:/ / archive. is/ 20120716/ http:/ / techcrunch. com/ 2008/ 08/ 01/ the-reports-of-usenets-death-are-greatly-exaggerated/ ) from the original on 2012-07-16. .." TechCrunch. August 1, 2008. Retrieved on May 8, 2011. [43] Cara Bonnett (May 17, 2010). "A Piece of Internet History" (http:/ / news. duke. edu/ 2010/ 05/ usenet. html). Duke Today. Archived (http:/ / archive. is/ 20120711/ http:/ / news. duke. edu/ 2010/ 05/ usenet. html) from the original on 2012-07-11. . Retrieved May 24, 2010. [44] Andrew Orlowski (May 20, 2010). "Usenet's home shuts down today" (http:/ / www. theregister. co. uk/ 2010/ 05/ 20/ usenet_duke_server/ ). The Register. Archived (http:/ / archive. is/ 20120921/ http:/ / www. theregister. co. uk/ 2010/ 05/ 20/ usenet_duke_server/ ) from the original on 2012-09-21. . Retrieved May 24, 2010. [45] "Top 100 text newsgroups by postings" (http:/ / www. newsadmin. com/ top100tmsgs. asp). NewsAdmin. Archived (http:/ / archive. is/ 20120905/ http:/ / www. newsadmin. com/ top100tmsgs. asp) from the original on 2012-09-05. . Retrieved December 14, 2010. [46] "Top 100 binary newsgroups by postings" (http:/ / www. newsadmin. com/ top100bmsgs. asp). NewsAdmin. Archived (http:/ / archive. is/ 20120904/ http:/ / www. newsadmin. com/ top100bmsgs. asp) from the original on 2012-09-04. . Retrieved December 14, 2010. [47] Rosencrance, Lisa. " "3 top ISPs to block access to sources of child porn" (http:/ / www. computerworld. com/ action/ article. do?command=viewArticleBasic& articleId=9095778). Archived (http:/ / archive. is/ 20120722/ http:/ / www. computerworld. com/ action/ article. do?command=viewArticleBasic& articleId=9095778) from the original on 2012-07-22. .." Computer World. June 8, 2008. Retrieved on April 30, 2009. [48] DeJean, David. "Usenet: Not Dead Yet." PC World. Tuesday October 7, 2008. "2" (http:/ / www. pcworld. com/ businesscenter/ article/ 151989-2/ usenet_not_dead_yet. html). Archived (http:/ / archive. is/ 20120921/ http:/ / www. pcworld. com/ businesscenter/ article/ 151989-2/ usenet_not_dead_yet. html) from the original on 2012-09-21. .. Retrieved on April 30, 2009. [49] "ATT Announces Discontinuation of USENET Newsgroup Services" (http:/ / www. newsdemon. com/ blog/ 2009/ 06/ 09/ att-announces-discontinuation-of-usenet-newsgroup-services/ ). NewsDemon. June 9, 2009. Archived (http:/ / archive. is/ 20120921/ http:/ / www. newsdemon. com/ blog/ 2009/ 06/ 09/ att-announces-discontinuation-of-usenet-newsgroup-services/ ) from the original on 2012-09-21. . Retrieved June 18, 2009. [50] Hu, Jim. " "AOL shutting down newsgroups" (http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html). Archived (http:/ / archive. is/ 20120723/ http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html) from the original on 2012-07-23. .." CNet. January 25, 2005. Retrieved on May 1, 2009. [51] "AOL Pulls Plug on Newsgroup Service" (http:/ / www. betanews. com/ article/ AOL-Pulls-Plug-on-Newsgroup-Service/ 1106664611). Betanews.com. Archived (http:/ / archive. is/ 20120722/ http:/ / www. betanews. com/ article/ AOL-Pulls-Plug-on-Newsgroup-Service/ 1106664611) from the original on 2012-07-22. . Retrieved December 14, 2010. [52] Bode, Karl. " "Verizon To Discontinue Newsgroups September 30" (http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227). Archived (http:/ / archive. is/ 20120731/ http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227) from the original on 2012-07-31. .". DSLReports. August 31, 2009. Retrieved on October 24, 2009. [53] " "Verizon Newsgroup Service Has Been Discontinued" (http:/ / www22. verizon. com/ ResidentialHelp/ HighSpeed/ General Support/ Top Questions/ QuestionsOne/ 125159. htm). Archived (http:/ / archive. is/ 20120921/ http:/ / www22. verizon. com/ ResidentialHelp/ HighSpeed/ General+ Support/ Top+ Questions/ QuestionsOne/ 125159. htm) from the original on 2012-09-21. ." Verizon Central Support. Retrieved on October 24, 2009. [54] Ukerna.ac.uk (http:/ / www. ukerna. ac. uk/ services/ news/ index. html) [55] "Microsoft Responds to the Evolution of Communities" (http:/ / www. microsoft. com/ communities/ newsgroups/ default. mspx#EV). microsoft.com. Archived (http:/ / archive. is/ 20120904/ http:/ / www. microsoft. com/ communities/ newsgroups/ default. mspx#EV) from the original on 2012-09-04. . Retrieved September 1, 2011. [56] "AOL shutting down newsgroups" (http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html). cnet.com/. January 25, 2005. Archived (http:/ / archive. is/ 20120723/ http:/ / news. cnet. com/ AOL-shutting-down-newsgroups/ 2100-1032_3-5550036. html) from the original on 2012-07-23. . Retrieved September 1, 2011. [57] "Verizon To Discontinue Newsgroups" (http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227). dslreports.com. August 31, 2009. Archived (http:/ / archive. is/ 20120731/ http:/ / www. dslreports. com/ shownews/ Verizon-To-Discontinue-Newsgroups-September-30-104227) from the original on 2012-07-31. . Retrieved September 1, 2011. [58] "The Comcast Newsgroups Service Discontinued" (http:/ / www. dslreports. com/ forum/ r21120658-The-Comcast-Newsgroups-Service-Discontinued). dslreports.com. dslreports.com. Archived (http:/ / archive. is/ 20120731/ http:/ / www. dslreports. com/ forum/ r21120658-The-Comcast-Newsgroups-Service-Discontinued) from the original on 2012-07-31. . Retrieved September 1, 2011. [59] "Cox to Drop Free Usenet Service June 30th" (http:/ / www. zeropaid. com/ news/ 88729/ cox-to-drop-free-usenet-service-june-30th/ ). Zeropaid.com. April 22, 2010. Archived (http:/ / archive. is/ 20120921/ http:/ / www. zeropaid. com/ news/ 88729/ cox-to-drop-free-usenet-service-june-30th/ ) from the original on 2012-09-21. . Retrieved September 3, 2011. [60] "Cox Discontinues Usenet, Starting In June" (http:/ / news. slashdot. org/ story/ 10/ 04/ 21/ 210224/ Cox-Discontinues-Usenet-Starting-In-June). Geeknet, Inc. April 21, 2010. Archived (http:/ / archive. is/ 20120921/ http:/ / news. slashdot. org/ story/ 10/ 04/ 21/ 210224/ Cox-Discontinues-Usenet-Starting-In-June) from the original on 2012-09-21. . Retrieved September 1, 2011.

108

USENET
[61] "Cox Communications and Atlantic Broadband Discontinue Usenet Access" (http:/ / www. thundernews. com/ blog/ tag/ isp/ ). thundernews.com. April 27, 2010. Archived (http:/ / archive. is/ 20120912/ http:/ / www. thundernews. com/ blog/ tag/ isp/ ) from the original on 2012-09-12. . Retrieved September 1, 2011. [62] "How to obtain back news items". December 21, 1982. bnews.spanky.138. [63] "Distributed archiving of netnews" (http:/ / groups. google. com/ group/ net. news/ msg/ e8145eace8aa0529?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120708/ http:/ / groups. google. com/ group/ net. news/ msg/ e8145eace8aa0529?dmode=source& output=gplain) from the original on 2012-07-08. . Retrieved December 14, 2010. [64] "Archive of netnews" (http:/ / groups. google. com/ group/ net. news/ msg/ a9ad42b15688b910?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120724/ http:/ / groups. google. com/ group/ net. news/ msg/ a9ad42b15688b910?dmode=source& output=gplain) from the original on 2012-07-24. . Retrieved December 14, 2010. [65] "Re: Archive of netnews" (http:/ / groups. google. com/ group/ net. news/ msg/ 87c9160730b36989?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120715/ http:/ / groups. google. com/ group/ net. news/ msg/ 87c9160730b36989?dmode=source& output=gplain) from the original on 2012-07-15. . Retrieved December 14, 2010. [66] "Automatic access to archives" (http:/ / groups. google. com/ group/ net. general/ msg/ a377e12ab1a829ff?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120712/ http:/ / groups. google. com/ group/ net. general/ msg/ a377e12ab1a829ff?dmode=source& output=gplain) from the original on 2012-07-12. . Retrieved December 14, 2010. [67] "keepnews -- A Usenet news archival system" (http:/ / groups. google. com/ group/ net. sources/ msg/ 737d29fd3af2d5ae?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120717/ http:/ / groups. google. com/ group/ net. sources/ msg/ 737d29fd3af2d5ae?dmode=source& output=gplain) from the original on 2012-07-17. . Retrieved December 14, 2010. [68] "YA News Archiver" (http:/ / groups. google. com/ group/ net. sources/ msg/ d5c0cec804f745dd?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120709/ http:/ / groups. google. com/ group/ net. sources/ msg/ d5c0cec804f745dd?dmode=source& output=gplain) from the original on 2012-07-09. . Retrieved December 14, 2010. [69] "RFC usenet article archive program with keyword lookup" (http:/ / groups. google. com/ group/ net. news/ msg/ f26190057834ed87?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120715/ http:/ / groups. google. com/ group/ net. news/ msg/ f26190057834ed87?dmode=source& output=gplain) from the original on 2012-07-15. . Retrieved December 14, 2010. [70] "Looking for fulltext indexing software for archived news" (http:/ / groups. google. com/ group/ news. software. nn/ msg/ 16381a7e3fd611d4?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120921/ http:/ / groups. google. com/ group/ news. software. nn/ msg/ 16381a7e3fd611d4?dmode=source& output=gplain) from the original on 2012-09-21. . Retrieved December 14, 2010. [71] "Summary: search for fulltext indexing software for archived news" (http:/ / groups. google. com/ group/ news. software. nn/ msg/ f503efa9034f1c1d?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120708/ http:/ / groups. google. com/ group/ news. software. nn/ msg/ f503efa9034f1c1d?dmode=source& output=gplain) from the original on 2012-07-08. . Retrieved December 14, 2010. [72] Segan, Sascha (January 1, 1970). "R.I.P Usenet: 1980-2008 - Usenet's Decline - Columns by PC Magazine" (http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp). Pcmag.com. Archived (http:/ / archive. is/ 20120909/ http:/ / www. pcmag. com/ article2/ 0,2817,2326849,00. asp) from the original on 2012-09-09. . Retrieved December 14, 2010. [73] Strawbridge, Matthew (2006). Netiquette: Internet Etiquette in the Age of the Blog. Software Reference. p. 53. [74] Cullen, Drew (February 12, 2001). "Google saves Deja.com Usenet service" (http:/ / www. theregister. co. uk/ 2001/ 02/ 12/ google_saves_deja_com_usenet/ ). Archived (http:/ / archive. is/ 20120921/ http:/ / www. theregister. co. uk/ 2001/ 02/ 12/ google_saves_deja_com_usenet/ ) from the original on 2012-09-21. .. The Register. [75] Wiseman, David. "Magi's NetNews Archive Involvement" (http:/ / www. csd. uwo. ca/ ~magi/ personal/ usenet. html), csd.uwo.ca [76] Mieszkowski, Katharine. " "The Geeks Who Saved Usenet" (http:/ / archive. salon. com/ tech/ feature/ 2002/ 01/ 07/ saving_usenet/ index. html). Archived (http:/ / archive. is/ 20120710/ http:/ / archive. salon. com/ tech/ feature/ 2002/ 01/ 07/ saving_usenet/ index. html) from the original on 2012-07-10. .", archive.salon.com (January 7, 2002). [77] Feldman, Ian. ""Usenet on a CD-ROM, no longer a fable"" (http:/ / db. tidbits. com/ article/ 3229). Archived (http:/ / archive. is/ 20120707/ http:/ / db. tidbits. com/ article/ 3229) from the original on 2012-07-07. ., "TidBITS" (February 10, 1992) [78] " "Google Groups Archive Information" (http:/ / groups. google. com/ group/ news. admin. misc/ msg/ 6dec509043e7b3c7?dmode=source& output=gplain). Archived (http:/ / archive. is/ 20120709/ http:/ / groups. google. com/ group/ news. admin. misc/ msg/ 6dec509043e7b3c7?dmode=source& output=gplain) from the original on 2012-07-09. ." (December 21, 2001)

109

USENET

110

Further reading
Bruce Jones, archiver (1997). USENET History mailing list archive (http://communication.ucsd.edu/bjones/ Usenet.Hist/Nethist/index.html) covering 19901997. communication.ucsd.edu Michael Hauben, Ronda Hauben, and Thomas Truscott (April 27, 1997). Netizens: On the History and Impact of Usenet and the Internet (Perspectives). Wiley-IEEE Computer Society P. ISBN0-8186-7706-6. Bryan Pfaffenberger (December 31, 1994). The USENET Book: Finding, Using, and Surviving Newsgroups on the Internet. Addison Wesley. ISBN0-201-40978-X. Kate Gregory, Jim Mann, Tim Parker, and Noel Estabrook (June 1995). Using Usenet Newsgroups. Que. ISBN0-7897-0134-0. Mark Harrison (July 1995). The USENET Handbook (Nutshell Handbook). O'Reilly. ISBN1-56592-101-1. Henry Spencer, David Lawrence (January 1998). Managing Usenet. O'Reilly. ISBN1-56592-198-4. Don Rittner (June 1997). Rittner's Field Guide to Usenet. MNS Publishing. ISBN0-937666-50-5. Konstan, J., Miller, B., Maltz, D., Herlocker, J., Gordon, L., and Riedl, J. (March 1997). "GroupLens: applying collaborative filtering to Usenet news" (http://portal.acm.org/citation.cfm?doid=245108.245126). Communications of the ACM 40 (3): 7787. doi:10.1145/245108.245126. Retrieved June 29, 2009. Miller, B., Riedl, J., and Konstan, J. (January 1997). "Experiences with GroupLens: Making Usenet useful again" (http://www.grouplens.org/papers/pdf/usenix97.pdf). Proceedings of the 1997 Usenix Winter Technical Conference. "20 Year Usenet Timeline" (http://www.google.com/googlegroups/archive_announce_20.html). Google. Retrieved June 27, 2006. "Web 2.0, Meet Usenet 1.0" (http://www.linux-mag.com/id/2675/). Linux Magazine. Retrieved February 13, 2007. Schwartz, Randal (June 15, 2006). "Web 2.0, Meet Usenet 1.0" (http://www.linux-mag.com/id/2675/). Retrieved June 4, 2007. Kleiner, Dmytri; Wyrick, Brian (January 29, 2007). "InfoEnclosure 2.0" (http://www.metamute.org/ InfoEnclosure-2.0). Retrieved June 4, 2007.

External links
Usenet information, software, and service providers (http://www.dmoz.org/Computers/Usenet/) at the Open Directory Project Usenet servers (http://www.dmoz.org/Computers/Software/Internet/Servers/Usenet/) at the Open Directory Project Public News Servers (http://www.dmoz.org/Computers/Usenet/Public_News_Servers/) at the Open Directory Project IETF working group USEFOR (http://tools.ietf.org/wg/usefor/) (USEnet article FORmat), tools.ietf.org son-of-1036 (http://purl.net/xyzzy/home/test/son-of-1.036) (287 KB, historical RFC 1036 bis draft), purl.net A-News Archive (http://quux.org:70/Archives/usenet-a-news/): Early Usenet news articles: 1981 to 1982., quux.org UTZoo Archive (http://www.skrenta.com/rt/utzoo-usenet/): 2,000,000 articles from early 1980s to July 1991 "Netscan" (http://web.archive.org/web/*/http://netscan.research.microsoft.com). Archived from the original (http://research.microsoft.com/en-us/groups/scg/) on June 29, 2009. Social Accounting Reporting Tool Living Internet (http://www.livinginternet.com/u/u.htm) A comprehensive history of the Internet, including Usenet. livinginternet.com Usenet Glossary (http://www.harley.com/usenet/usenet-tutorial/glossary.html) A comprehensive list of Usenet terminology

USENET "Big 8 Management Board" (http://web.archive.org/web/20080130015435/http://www.big-8.org/). Archived from the original (http://big-8.org/) on January 30, 2008. Group creation and maintenance in the Big 8 hierarchies. Michael Hauben (Fall 1992). "The Evolution Of Usenet News: The Poor Man's Arpanet" (http://www. virtualschool.edu/mon/Internet/HaubenEvolutionNetnews.html). Retrieved May 24, 2010. "Giganews Deconstructs Cuomo's Child Porn 'Crackdown'" (http://www.dslreports.com/shownews/ Giganews-Deconstructs-Cuomos-Child-Porn-Crackdown-98446). Retrieved September 1, 2011. "Latest Child Porn Fight Mostly Empty Rhetoric" (http://www.dslreports.com/shownews/96203). Retrieved September 1, 2011. "N.Y. AG says AOL will curb access to Usenet. It already did" (http://news.cnet.com/ 8301-13578_3-9988278-38.html?hhTest=1=rss&subj=news&tag=2547-1_3-0-20). Retrieved September 1, 2011. "Analysis of Cuomo Crusade shows little results." (http://www.giganews.com/blog/2008/09/ clearing-air-usenet-abuse-eliminating.html). Retrieved September 1, 2011.

111

X.25
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication. An X.25 WAN consists of packet-switching exchange (PSE) nodes as the networking hardware, and leased lines, plain old telephone service connections or ISDN connections as physical links. X.25 is a family of protocols that was popular during the 1980s with telecommunications companies and in financial transaction systems such as automated teller machines. X.25 was originally defined by the International Telegraph and Telephone Consultative Committee (CCITT, now ITU-T) in a series of drafts[1] and finalized in a publication known as The Orange Book in 1976.[2]

X.25 network diagram.

While X.25 has been, to a large extent, replaced by less complex protocols, especially the Internet protocol (IP), the service is still used and available in niche and legacy applications.

History
X.25 is one of the oldest packet-switched services available. It was developed before the OSI Reference Model.[3] The protocol suite is designed as three conceptual layers, which correspond closely to the lower three layers of the seven-layer OSI model.[4] It also supports functionality not found in the OSI network layer.[5][6] X.25 was developed in the ITU-T (formerly CCITT) Study Group VII based upon a number of emerging data network projects.[7] Various updates and additions were worked into the standard, eventually recorded in the ITU series of technical books describing the telecommunication systems. These books were published every fourth year with different-colored covers. The X.25 specification is only part of the larger set of X-Series[8] specifications on public data networks.[9]

X.25 The public data network was the common name given to the international collection of X.25 providers. Their combined network had large global coverage during the 1980s and into the 1990s.[10] Publicly-accessible X.25 networks (Compuserve, Tymnet, Euronet, PSS, Datapac, Datanet 1 and Telenet) were set up in most countries during the 1970s and 80s, to lower the cost of accessing various online services. Beginning in the early 1990s in North America, use of X.25 networks (predominated by Telenet and Tymnet)[10] began being replaced with Frame Relay service offered by national telephone companies.[11] Most systems that required X.25 now utilize TCP/IP, however it is possible to transport X.25 over IP when necessary [12] X.25 networks are still in use throughout the world. A variant called AX.25 is also used widely by amateur packet radio. Racal Paknet, now known as Widanet, is still in operation in many regions of the world, running on an X.25 protocol base. In some countries, like the Netherlands or Germany, it is possible to use a stripped version of X.25 via the D-channel of an ISDN-2 (or ISDN BRI) connection for low volume applications such as point-of-sale terminals; but, the future of this service in the Netherlands is uncertain. Additionally X.25 is still under heavy use in the aeronautical business (especially in the Asian region) even though a transition to modern protocols like X.400 is without option as X.25 hardware becomes increasingly rare and costly. As recently as March 2006, the National Airspace Data Interchange Network has used X.25 to interconnect remote airfields with Air Route Traffic Control Centers. France is one of the only countries that still has a commercial end-user service known as Minitel which is based on Videotex which in turn runs on X.25. In 2002 Minitel had about 9 million users, and in 2011 it still accounts for about 2 million users in France though France Tlcom has announced it will completely shut down the service by 30 June 2012.[13]

112

Architecture
The general concept of X.25 was to create a universal and global packet-switched network. Much of the X.25 system is a description of the rigorous error correction needed to achieve this, as well as more efficient sharing of capital-intensive physical resources. The X.25 specification defines only the interface between a subscriber (DTE) and an X.25 network (DCE). X.75, a very similar protocol to X.25, defines the interface between two X.25 networks to allow connections to traverse two or more networks. X.25 does not specify how the network operates internallymany X.25 network implementations used something very similar to X.25 or X.75 internally, but others used quite different protocols internally. The ISO equivalent protocol to X.25, ISO 8208, is compatible with X.25, but additionally includes provision for two X.25 DTEs to be directly connected to each other with no network in between. By separating the Packet-Layer Protocol, ISO 8208 permits operation over additional networks such as ISO 8802 LLC2 (ISO LAN) and the OSI data link layer.[14] X.25 originally defined three basic protocol levels or architectural layers. In the original specifications these were referred to as levels and also had a level number, whereas all ITU-T X.25 recommendations and ISO 8208 standards released after 1984 refer to them as layers.[15] The layer numbers were dropped to avoid confusion with the OSI Model layers.[1] Physical layer: This layer specifies the physical, electrical, functional and procedural characteristics to control the physical link between a DTE and a DCE. Common implementations use X.21, EIA-232, EIA-449 or other serial protocols. Data link layer: The data link layer consists of the link access procedure for data interchange on the link between a DTE and a DCE. In its implementation, the Link Access Procedure, Balanced (LAPB) is a data link protocol that manages a communication session and controls the packet framing. It is a bit-oriented protocol that provides error correction and orderly delivery.

X.25 Packet layer: This layer defined a packet-layer protocol for exchanging control and user data packets to form a packet-switching network based on virtual calls, according to the Packet Layer Protocol. The X.25 model was based on the traditional telephony concept of establishing reliable circuits through a shared network, but using software to create "virtual calls" through the network. These calls interconnect "data terminal equipment" (DTE) providing endpoints to users, which looked like point-to-point connections. Each endpoint can establish many separate virtual calls to different endpoints. For a brief period, the specification also included a connectionless datagram service, but this was dropped in the next revision. The "fast select with restricted response facility" is intermediate between full call establishment and connectionless communication. It is widely used in query-response transaction applications involving a single request and response limited to 128 bytes of data carried each way. The data is carried in an extended call request packet and the response is carried in an extended field of the call reject packet, with a connection never being fully established. Closely related to the X.25 protocol are the protocols to connect asynchronous devices (such as dumb terminals and printers) to an X.25 network: X.3, X.28 and X.29. This functionality was performed using a Packet Assembler/Disassembler or PAD (also known as a Triple-X device, referring to the three protocols used).

113

Relation to the OSI Reference Model


Although X.25 predates the OSI Reference Model (OSIRM), the physical Layer of the OSI model corresponds to the X.25 physical layer, the data link layer to the X.25 data link layer, and the network layer to the X.25 packet layer.[9] The X.25 data link layer, LAPB, provides a reliable data path across a data link (or multiple parallel data links, multilink) which may not be reliable itself. The X.25 packet layer, provides the virtual call mechanisms, running over X.25 LAPB. The packet layer includes mechanisms to maintain virtual calls and to signal data errors in the event that the data link layer cannot recover from data transmission errors. All but the earliest versions of X.25 include facilities[16] which provide for OSI network layer Addressing (NSAP addressing, see below).[17]

User device support


X.25 was developed in the era of computer terminals connecting to host computers, although it also can be used for communications between computers. Instead of dialing directly into the host computer which would require the host to have its own pool of modems and phone lines, and require non-local callers to make long-distance calls the host could have an X.25 connection to a network service provider. Now dumb-terminal users could dial into the network's local PAD (Packet Assembly/Disassembly facility), a gateway device connecting modems and serial lines to the X.25 link as defined by the X.29 and X.3 standards.

Having connected to the PAD, the dumb-terminal user tells the PAD which host to connect to, by giving a phone-number-like address in the X.121 address format (or by giving a host name, if the service provider allows for names that map to X.121 addresses). The PAD then places an X.25 call to the host, establishing a virtual call. Note that X.25 provides for virtual calls, so appears to be a circuit switched network, even though in fact the data itself is packet switched internally, similar to the way TCP provides connections even though the underlying data is packet switched. Two X.25 hosts could, of course, call one another directly; no PAD is involved in this case. In theory, it doesn't matter whether the X.25 caller and X.25 destination are both connected to the same carrier, but in practice it was not always possible to make calls from one carrier to another.

A Televideo terminal model 925 made around 1982

X.25 For the purpose of flow-control, a sliding window protocol is used with the default window size of 2. The acknowledgements may have either local or end to end significance. A D bit (Data Delivery bit) in each data packet indicates if the sender requires end to end acknowledgement. When D=1, it means that the acknowledgement has end to end significance and must take place only after the remote DTE has acknowledged receipt of the data. When D=0, the network is permitted (but not required) to acknowledge before the remote DTE has acknowledged or even received the data. While the PAD function defined by X.28 and X.29 specifically supported asynchronous character terminals, PAD equivalents were developed to support a wide range of proprietary intelligent communications devices, such as those for IBM System Network Architecture (SNA).

114

Error control
Error recovery procedures at the packet layer assume that the data link layer is responsible for retransmitting data received in error. Packet layer error handling focuses on resynchronizing the information flow in calls, as well as clearing calls that have gone into unrecoverable states: Level 3 Reset packets, which re-initializes the flow on a virtual call (but does not break the virtual call) Restart packet, which clears down all virtual calls on the data link and resets all permanent virtual circuits on the data link

Addressing and virtual circuits


X.25 supports two types of virtual circuits, virtual calls (VC) and permanent virtual circuits (PVC). Virtual calls are established on an as-needed basis. For example, a VC is established when a call is placed and torn down after the call is complete. VCs are established through a call establishment and clearing procedure. On the other hand, permanent virtual circuits are preconfigured into the network.[18] PVCs are seldom torn down and thus provide a dedicated connection between end points.

An X.25 Modem once used to connect to the German Datex-P network.

VC may be established using X.121 addresses. The X.121 address consists of a three-digit data country code (DCC) plus a network digit, together forming the four-digit data network identification code (DNIC), followed by the national terminal number (NTN) of at most ten digits. Note the use of a single network digit, seemingly allowing for only 10 network carriers per country, but some countries are assigned more than one DCC to avoid this limitation. Networks often used fewer than the full NTN digits for routing, and made the spare digits available to the subscriber (sometimes called the sub-address) where they could be used to identify applications or for further routing on the subscribers networks. NSAP addressing facility was added in the X.25(1984) revision of the specification, and this enabled X.25 to better meet the requirements of OSI Connection Oriented Network Service (CONS).[19] Public X.25 networks were not required to make use of NSAP addressing, but, to support OSI CONS, were required to carry the NSAP addresses and other ITU-T specified DTE facilities transparently from DTE to DTE.[20] Later revisions allowed multiple addresses in addition to X.121 addresses to be carried on the same DTE-DCE interface: Telex addressing (F.69), PSTN addressing (E.163), ISDN addressing (E.164), Internet Protocol addresses (IANA ICP), and local IEEE 802.2 MAC addresses.[21] PVCs are permanently established in the network and therefore do not require the use of addresses for call setup. PVCs are identified at the subscriber interface by their logical channel identifier (see below). However, in practice not many of the national X.25 networks supported PVCs.

X.25 One DTE-DCE interface to an X.25 network has a maximum of 4095 logical channels on which it is allowed to establish virtual calls and permanent virtual circuits,[22] although networks are not expected to support a full 4095 virtual circuits.[23] For identifying the channel to which a packet is associated, each packet contains a 12 bit logical channel identifier made up of an 8-bit logical channel number and a 4-bit logical channel group number.[22] Logical channel identifiers remain assigned to a virtual circuit for the duration of the connection.[22] Logical channel identifiers identify a specific logical channel between the DTE (subscriber appliance) and the DCE (network), and only has local significance on the link between the subscriber and the network. The other end of the connection at the remote DTE is likely to have assigned a different logical channel identifier. The range of possible logical channels is split into 4 groups: channels assigned to permanent virtual circuits, assigned to incoming virtual calls, two-way (incoming or outgoing) virtual calls, and outgoing virtual calls.[24] (Directions refer to the direction of virtual call initiation as viewed by the DTEthey all carry data in both directions.)[25] The ranges allowed a subscriber to be configured to handle significantly differing numbers of calls in each direction while reserving some channels for calls in one direction. All International networks are required to implement support for permanent virtual circuits, two-way logical channels and one-way logical channels outgoing; one-way logical channels incoming is an additional optional facility.[26] DTE-DCE interfaces are not required to support more than one logical channel.[24] Logical channel identifier zero will not be assigned to a permanent virtual circuit or virtual call.[27] The logical channel identifier of zero is used for packets which don't relate to a specific virtual circuit (e.g. packet layer restart, registration, and diagnostic packets).

115

Billing
In public networks, X.25 was typically billed as a flat monthly service fee depending on link speed, and then a price-per-segment on top of this.[28] Link speeds varied, typically from 2400 bit/s up to 2 Mbit/s, although speeds above 64 kbit/s were uncommon in the public networks. A segment was 64 bytes of data (rounded up, with no carry-over between packets),[29] charged to the caller[30] (or callee in the case of reverse charged calls, where supported).[31] Calls invoking the Fast Select facility (allowing 128 bytes of data in call request, call confirmation and call clearing phases)[32] would generally attract an extra charge, as might use of some of the other X.25 facilities. PVCs would have a monthly rental charge and a lower price-per-segment than VCs, making them cheaper only where large volumes of data are passed.

X.25 packet types


Packet Type DCE DTE DTE DCE Call Request Call Accepted Clear Request Clear Confirmation Data Interrupt Interrupt Confirmation RR RNR REJ Reset Request Reset Confirmation Service VC PVC X X X X X X X X X X X X X X X X X X X X

Call setup and Clearing Incoming Call Call Connected Clear Indication Clear Confirmation Data and Interrupt Data Interrupt Interrupt Confirmation Flow Control and Reset RR RNR REJ Reset Indication Reset Confirmation

X.25

116
Restart Restart Indication Restart Confirmation Diagnostic Registration Diagnostic Registration Confirmation Registration Request Restart Request Restart Confirmation X X X X

X.25 details
The network may allow the selection of the maximal length in range 16 to 4096 octets (2n values only) per virtual circuit by negotiation as part of the call setup procedure. The maximal length may be different at the two ends of the virtual circuit. Data terminal equipment constructs control packets which are encapsulated into data packets. The packets are sent to the data circuit-terminating equipment, using LAPB Protocol. Data circuit-terminating equipment strips the layer-2 headers in order to encapsulate packets to the internal network protocol.

X.25 facilities
X.25 provides a set of user facilities defined and described in ITU-T Recommendation X.2.[33] The X.2 user facilities fall into five categories: essential facilities; additional facilities; conditional facilities; mandatory facilities; and, optional facilities.

X.25 also provides X.25 and ITU-T specified DTE optional user facilities defined and described in ITU-T Recommendation X.7.[34] The X.7 optional user facilities fall into four categories of user facilities that require: subscription only; subscription followed by dynamic invocation; subscription or dynamic invocation; and, dynamic invocation only.

X.25 protocol versions


The CCITT/ITU-T versions of the protocol specifications are for public data networks (PDN).[35] The ISO/IEC versions address additional features for private networks (e.g. local area networks (LAN) use) while maintaining compatibility with the CCITT/ITU-T specifications.[36] The user facilities and other features supported by each version of X.25 and ISO/IEC 8208 have varied from edition to edition.[37] Several major protocol versions of X.25 exist:[38] CCITT Recommendation X.25 (1976) Orange Book CCITT Recommendation X.25 (1980) Yellow Book CCITT Recommendation X.25 (1984) Red Book CCITT Recommendation X.25 (1988) Blue Book ITU-T Recommendation X.25 (1993) White Book[39] ITU-T Recommendation X.25 (1996) Grey Book[40]

The X.25 Recommendation allows many options for each network to choose when deciding which features to support and how certain operations are performed. This means each network needs to publish its own document giving the specification of its X.25 implementation, and most networks required DTE appliance manufacturers to

X.25 undertake protocol conformance testing, which included testing for strict adherence and enforcement of their network specific options. (Network operators were particularly concerned about the possibility of a badly behaving or misconfigured DTE appliance taking out parts of the network and affecting other subscribers.) Therefore, subscriber's DTE appliances have to be configured to match the specification of the particular network to which they are connecting. Most of these were sufficiently different to prevent interworking if the subscriber didn't configure their appliance correctly or the appliance manufacturer didn't include specific support for that network. In spite of protocol conformance testing, this often lead to interworking problems when initially attaching an appliance to a network. In addition to the CCITT/ITU-T versions of the protocol, four editions of ISO/IEC 8208 exist:[37] ISO/IEC 8208 : 1987, First Edition, compatible with X.25 (1980) and (1984) ISO/IEC 8208 : 1990, Second Edition, compatible with 1st Ed. and X.25 (1988). ISO/IEC 8208 : 1995, Third Edition, compatible with 2nd Ed. and X.25 (1993). ISO/IEC 8208 : 2000, Fourth Edition, compatible with 3rd Ed. and X.25 (1996).

117

References
[1] CCITT, Study Group VII, Draft Recommendation X-25, March 1976 [2] History of X.25, CCITT Plenary Assemblies and Book Colors (http:/ / www. itu. int/ ITU-T/ studygroups/ com17/ history. html) [3] (Friend et al. 1988, p.242) [4] (Friend et al. 1988, p.243) [5] ITU-T Recommendation X.28 (http:/ / www. itu. int/ rec/ T-REC-X. 28/ en/ ). [6] ITU-T Recommendation X.3 (http:/ / www. itu. int/ rec/ T-REC-X. 3/ en/ ). [7] "X.25 Virtual Circuits Transpac in France Pre-Internet Data Networking" (http:/ / remi. despres. free. fr/ Publications/ X25-TPC. html). . [8] X-Series recommendations (http:/ / www. itu. int/ rec/ T-REC-X/ en/ ) [9] (Friend et al. 1988, p.230) [10] (Schatt 1991, p.200). [11] (Schatt 1991, p.207). [12] Running X.25 over tcpip using Cisco routers (http:/ / www. techrepublic. com/ article/ running-x25-over-tcpip-on-cisco-routers/ 1056023), 1 Februari 2001, visited 4 April 2011 [13] (French) Presse, Agence France (21 July 2011). "Le Minitel disparatra en juin 2012 [Minitel will disappear in June 2012]" (http:/ / www. lefigaro. fr/ flash-actu/ 2011/ 07/ 21/ 97001-20110721FILWWW00446-le-minitel-disparaitra-en-juin-2012. php) (in French). Le Figaro. . [14] ISO 8208:2000 [15] ISO 8208, Annex B. [16] ITU-T Recommendation X.25 (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), G.3.2 Called address extension facility, pp. 141142. [17] ITU-T Recommendation X.223 (http:/ / www. itu. int/ rec/ T-REC-X. 223/ en/ ), Appendix II. [18] ITU-T Recommendation X.7 (04/2004) (http:/ / www. itu. int/ rec/ T-REC-X. 7-200404-I/ en/ ), pp. 1718. [19] ITU-T Recommendation X.223 (http:/ / www. itu. int/ rec/ T-REC-X. 223/ en/ ). [20] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), Annex G, p. 140. [21] ITU-T Recommendation X.213 (http:/ / www. itu. int/ rec/ T-REC-X. 213-200110-I/ en/ ), Annex A. [22] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), p. 45. [23] ITU-T Recommendation X.283 (12/97) (http:/ / www. itu. int/ rec/ T-REC-X. 283-199712-I/ en/ ), p. 42. [24] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), Annex A, pp. 119120. [25] ISO/IEC 8208 : 2000, Fourth Edition, p. 61. [26] ITU-T Recommendation X.2 (03/2000) (http:/ / www. itu. int/ rec/ T-REC-X. 2-200003-I/ en/ ), p. 4. [27] ISO/IEC 8208 : 2000, Fourth Edition, 3.7.1, p. 7. [28] ITU-T Recommendation D.11 (03/91) (http:/ / www. itu. int/ rec/ T-REC-D. 11-199103-I/ en/ ), p. 2. [29] ITU-T Recommendation D.12 (11/88) (http:/ / www. itu. int/ rec/ T-REC-D. 12-198811-I/ en/ ), p. 1. [30] ITU-T Recommendation X.7 (04/2004) (http:/ / www. itu. int/ rec/ T-REC-X. 7-200404-I/ en/ ), p. 42. [31] ITU-T Recommendation D.11 (03/91) (http:/ / www. itu. int/ rec/ T-REC-D. 11-199103-I/ en/ ), p. 3. [32] ITU-T Recommendation X.7 (04/2004) (http:/ / www. itu. int/ rec/ T-REC-X. 7-200404-I/ en/ ), p. 38. [33] ITU-T Recommendation X.2 (http:/ / www. itu. int/ rec/ T-REC-X. 2/ en/ ) [34] ITU-T Recommendation X.7 (http:/ / www. itu. int/ rec/ T-REC-X. 7/ en/ ) [35] ITU-T Recommendation X.25 (10/96) (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ ), Summary, p. v. [36] ISO/IEC 8208 : 2000, Fourth Edition, Section 1: Scope, p. 1.

X.25
[37] [38] [39] [40] ISO/IEC 8208 : 2000, Fourth Edition, Annex C. ITU-T Recommendation X.25 (http:/ / www. itu. int/ rec/ T-REC-X. 25/ en/ ). ITU-T Recommendation X.25 (1993) White Book (http:/ / www. itu. int/ rec/ T-REC-X. 25-199303-S/ en/ ) ITU-T Recommendation X.25 (1996) Grey Book (http:/ / www. itu. int/ rec/ T-REC-X. 25-199610-I/ en/ )

118

Further reading
Computer Communications, lecture notes by Prof. Chaim Ziegler PhD, Brooklyn College Motorola Codex (1992). The Basics Book of X.25 Packet Switching. The Basics Book Series (2nd ed.). Reading, MA: Addison-Wesley. ISBN0-201-56369-X. Deasington, Richard (1985). X.25 Explained. Computer Communications and Networking (2nd ed.). Chichester UK: Ellis Horwood. ISBN978-0-85312-626-3. Friend, George E.; Fike, John L.; Baker, H. Charles; Bellamy, John C. (1988). Understanding Data Communications (2nd ed.). Indianapolis: Howard W. Sams & Company. ISBN0-672-27270-9. Pooch, Udo W.; William H. Greene, Gary G. Moss (1983). Telecommunications and Networking. Boston: Little, Brown and Company. ISBN0-316-71498-4. Schatt, Stan (1991). Linking LANs: A Micro Manager's Guide. McGraw-Hill. ISBN0-8306-3755-9. Thorpe, Nicolas M.; Ross, Derek (1992). X.25 Made Easy. Prentice Hall. ISBN0-13-972183-5.

External links
Recommendation X.25 (10/96) (http://www.itu.int/rec/T-REC-X.25/en) at ITU-T Cisco X.25 Reference (http://www.cisco.com/en/US/docs/internetworking/technology/handbook/X25. html) An X.25 Networking Guide with comparisons to TCP/IP (http://www.farsite.com/X.25/X.25_info/X.25. htm) X.25 Directory & Informational Resource (http://softtechinfo.com/network/x25.html) RFCs and other resources by Open Directory (http://search.dmoz.org/cgi-bin/search?search=X.25)

119

Today's Internet
"Internet" or "internet"?
Publishers have different conventions regarding the capitalization of "Internet" or "internet", when referring to the Internet/internet, as distinct from generic internets, or internetworks. Since the widespread deployment of the Internet Protocol Suite in the early 1980s, the Internet standards-setting bodies and technical infrastructure organizations, such as the Internet Engineering Task Force (IETF), the Internet Society, the Internet Corporation for Assigned Names and Numbers (ICANN), the World Wide Web Consortium, and others, have consistently spelled the name of the world-wide network, the Internet, with an initial capital letter and treated it as a proper noun in the English language. Before the transformation of the ARPANET into the modern Internet, the term internet in its lower case spelling was a common short form of the term internetwork, and this spelling and use may still be found in discussions of networking. Many publications today disregard the historical development and use the term in its common noun spelling, arguing that it has become a generic medium of communication.

Name as Internet versus generic internets


The Internet standards community has historically differentiated between the Internet and an internet (or internetwork), the first being treated as a proper noun with a capital letter, and the latter as a common noun with lower-case first letter. An internet is any internetwork or inter-connected Internet Protocol networks. The distinction is evident in a large number of the Request for Comments documents from the early 1980s, when the transition from the ARPANET to the Internet was in progress, although it was not applied with complete uniformity.[1][2] Another example is IBM's TCP/IP Tutorial and Technical Overview (ISBN 0-7384-2165-0) from 1989, which stated that: The words internetwork and internet is [sic] simply a contraction of the phrase interconnected network. However, when written with a capital "I," the Internet refers to the worldwide set of interconnected networks. Hence, the Internet is an internet, but the reverse does not apply. The Internet is sometimes called the connected Internet. The Internet/internet distinction fell out of common use after the Internet Protocol Suite was widely deployed in commercial networks in the 1990s. In the RFC documents that defined the evolving Internet Protocol (IP) standards, the term was introduced as a noun adjunct, apparently a shortening of "internetworking"[3] and is mostly used in this way. As the impetus behind IP grew, it became more common to regard the results of internetworking as entities of their own, and internet became a noun, used both in a generic sense (any collection of computer networks connected through internetworking) and in a specific sense (the collection of computer networks that internetworked with ARPANET, and later NSFNET, using the IP standards, and that grew into the connectivity service we know today). In its generic sense, internet is a common noun, a synonym for internetwork; therefore, it has a plural form (first appearing in the RFC series in RFC 870, RFC 871, and RFC 872), and is not capitalized. In its specific sense, it is a proper noun, and therefore, without a plural form and traditionally capitalized.

"Internet" or "internet"?

120

Argument for common noun usage


In 2002, a New York Times column said that Internet has been changing from a proper noun to a generic term.[4] Words for new technologies, such as Phonograph in the 19th century, are sometimes capitalized at first, later becoming uncapitalized.[4] In 1999, another column suggested that Internet might, like some other commonly used proper nouns, lose its capital letter.[5] Capitalization of the word as an adjective also varies. Some guides specify that the word should be capitalized as a noun but not capitalized as an adjective, e.g., "internet resources".[6][7]

Usage examples
Examples of media publications and news outlets that capitalize the term include The New York Times, the Associated Press, Time, and The Times of India. In addition, many peer-reviewed journals and professional publications such as Communications of the ACM capitalize "Internet," and this style guideline is also specified by the American Psychological Association in its electronic media spelling guide. The Modern Language Association's MLA Handbook does not specifically mention capitalization of Internet, but its consistent practice is to capitalize it.[8] More recently, a significant number of publications have switched to not capitalizing the noun internet. Among them are The Economist, the Financial Times, The Times, the Guardian, the Observer[9] and the Sydney Morning Herald. As of 2011, most publications using "internet" appear to be located outside of North America, but the gap is closing. Wired News, an American news source, adopted the lower-case spelling in 2004.[10] Around April 2010, CNN shifted its house style to adopt the lowercase spelling. As Internet connectivity has expanded, it has started to be seen as a service similar to television, radio, and telephone, and the word has come to be used in this way (e.g. "I have the internet at home" and "I found it on the internet").

References
[1] RFC 871 (1982) "The 'network' composed of the concatenation of such subnets is sometimes called 'a catenet,' though more oftenand less picturesquelymerely 'an internet.'" [2] RFC 872 (1982) "[TCP's] next most significant property is that it is designed to operate in a 'catenet' (also known as the, or an, 'internet')" [3] The form first occurring in the RFC series is "internetworking protocol," RFC 604: "Four of the reserved link numbers are hereby assigned for experimental use in the testing of an internetworking protocol." The first use of "internet" is in RFC 675, in the form "internet packet". [4] Schwartz, John (29 December 2002). "Who Owns the Internet? You and i Do" (http:/ / www. nytimes. com/ 2002/ 12/ 29/ weekinreview/ 29SCHW. html). The New York Times. . Retrieved 2009-04-19. "Allan M. Siegal, a co-author of The New York Times Manual of Style and Usage and an assistant managing editor at the newspaper, said that 'there is some virtue in the theory' that Internet is becoming a generic term, 'and it would not be surprising to see the lowercase usage eclipse the uppercase within a few years.'" [5] Wilbers, Stephen (13 September 1999). "Errors put a wall between you and your readers". Orange County Register (Santa Ana, California): p.c.20. "If you like being ahead of the game, you might prefer to spell Internet and Web as internet and web, but according to standard usage they should be capitalized. Keep in mind, however, that commonly used proper nouns sometimes lose their capital letters over time and that Internet and Web may someday go the way of the french fry." [6] E.g. "MIT Libraries House Style" (http:/ / libstaff. mit. edu/ publications/ housestyle. html). MIT Libraries Staff Web. Last updated 14 August 2008. . Retrieved 2009-04-19. [7] Donovan, Melissa (16 November 2007). "Capitalization" (http:/ / www. writingforward. com/ grammar/ capitalization). Writing Forward. . Retrieved 2009-04-19. [8] MLA Handbook for Writers of Research Papers (Seventh Edition ed.). New York: Modern Language Association of America. 2009. ISBN9781603290241. [9] "Guardian and Observer style guide" (http:/ / www. guardian. co. uk/ styleguide/ i#id-3026449). Guardian News and Media Limited. . Retrieved 2008-04-19. "internet, net, web, world wide web. See websites." [10] Long, Tony (16 August 2004). "It's Just the 'internet' Now" (http:/ / www. wired. com/ culture/ lifestyle/ news/ 2004/ 08/ 64596). Wired. . Retrieved 2009-04-19. "... what the internet is: another medium for delivering and receiving information."

"Internet" or "internet"?

121

External links
Internet, Web, and Other Post-Watergate Concerns (http://www.chicagomanualofstyle.org/CMS_FAQ/ InternetWebandOtherPost-WatergateConcerns/InternetWebandOtherPost-WatergateConcerns16.html), The Chicago Manual of Style

Internet Protocol Suite


The Internet protocol suite is the set of communications protocols used for the Internet and similar networks, and generally the most popular protocol stack for wide area networks. It is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in this standard. It is occasionally known as the DoD model due to the foundational influence of the ARPANET in the 1970s (operated by DARPA, an agency of the United States Department of Defense). TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. It has four abstraction layers, each with its own protocols.[1][2] From lowest to highest, the layers are: 1. 2. 3. 4. The link layer (commonly Ethernet) contains communication technologies for a local network. The internet layer (IP) connects local networks, thus establishing internetworking. The transport layer (TCP) handles host-to-host communication. The application layer (for example HTTP) contains all protocols for specific data communications services on a process-to-process level (for example how a web browser communicates with a web server).

The TCP/IP model and related protocols are maintained by the Internet Engineering Task Force (IETF).

History
Early research
The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the early 1970s. After initiating the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and Diagram of the first internetworked connection recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET. By the summer of 1973, Kahn and Cerf had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and, instead of the network being responsible for reliability, as in the ARPANET, the

Internet Protocol Suite

122

hosts became responsible. Cerf credits Hubert Zimmerman and Louis Pouzin, designer of the CYCLADES network, with important influences on this design. The network's design included the recognition it should provide only the functions of efficiently transmitting and routing traffic between end nodes and that all other intelligence should be located at the edge of the network, in the end nodes. Using a simple design, it became possible to connect almost any network to the ARPANET, irrespective of their A Stanford Research Institute packet radio van, local characteristics, thereby solving Kahn's initial problem. One site of the first three-way internetworked transmission. popular expression is that TCP/IP, the eventual product of Cerf and Kahn's work, will run over "two tin cans and a string." As a joke, the IP over Avian Carriers formal protocol specification was created and successfully tested. A computer called a router is provided with an interface to each network. It forwards packets back and forth between them.[3] Originally a router was called gateway, but the term was changed to avoid confusion with other types of gateways.

Specification
From 1973 to 1974, Cerf's networking research group at Stanford worked out details of the idea, resulting in the first TCP specification.[4] A significant technical influence was the early networking work at Xerox PARC, which produced the PARC Universal Packet protocol suite, much of which existed around that time. DARPA then contracted with BBN Technologies, Stanford University, and the University College London to develop operational versions of the protocol on different hardware platforms. Four versions were developed: TCP v1, TCP v2, TCP v3 and IP v3, and TCP/IP v4. The last protocol is still in use today. In 1975, a two-network TCP/IP communications test was performed between Stanford and University College London (UCL). In November, 1977, a three-network TCP/IP test was conducted between sites in the US, the UK, and Norway. Several other TCP/IP prototypes were developed at multiple research centers between 1978 and 1983. The migration of the ARPANET to TCP/IP was officially completed on flag day January 1, 1983, when the new protocols were permanently activated.[5]

Adoption
In March 1982, the US Department of Defense declared TCP/IP as the standard for all military computer networking.[6] In 1985, the Internet Architecture Board held a three-day workshop on TCP/IP for the computer industry, attended by 250 vendor representatives, promoting the protocol and leading to its increasing commercial use. In 1985, the first Interop conference was held, focusing on network interoperability via further adoption of TCP/IP. It was founded by Dan Lynch, an early Internet activist. From the beginning, it was attended by large corporations, such as IBM and DEC. Interoperability conferences have been held every year since then. Every year from 1985 through 1993, the number of attendees tripled. IBM, ATT and DEC were the first major corporations to adopt TCP/IP, despite having competing internal protocols (SNA, XNS, etc.). In IBM, from 1984, Barry Appelman's group did TCP/IP development. (Appelman later moved to AOL to be the head of all its development efforts.) They navigated the corporate politics to get a stream of TCP/IP products for various IBM systems, including MVS, VM, and OS/2. At the same time, several smaller companies began offering TCP/IP stacks for DOS and MS Windows, such as the company FTP Software, and the Wollongong Group.[7] The first VM/CMS TCP/IP stack came from the University of Wisconsin.[8]

Internet Protocol Suite Back then, most of these TCP/IP stacks were written single-handedly by a few talented programmers. For example, John Romkey of FTP Software was the author of the MIT PC/IP package.[9] John Romkey's PC/IP implementation was the first IBM PC TCP/IP stack. Jay Elinsky and Oleg Vishnepolsky of IBM Research wrote TCP/IP stacks for VM/CMS and OS/2, respectively.[10] The spread of TCP/IP was fueled further in June 1989, when AT&T agreed to put into the public domain the TCP/IP code developed for UNIX. Various vendors, including IBM, included this code in their own TCP/IP stacks. Many companies sold TCP/IP stacks for Windows until Microsoft released its own TCP/IP stack in Windows 95. This event was a little late in the evolution of the Internet, but it cemented TCP/IP's dominance over other protocols, which eventually disappeared. These protocols included IBM's SNA, OSI, Microsoft's native NetBIOS, and Xerox' XNS.

123

Key architectural principles


An early architectural document, RFC 1122, emphasizes architectural principles over layering.[11] End-to-end principle: This principle has evolved over time. Its original expression put the maintenance of state and overall intelligence at the edges, and assumed the Internet that connected the edges retained no state and concentrated on speed and simplicity. Real-world needs for firewalls, network address translators, web content caches and the like have forced changes in this principle.[12] Robustness Principle: "In general, an implementation must be conservative in its sending behavior, and liberal in its receiving behavior. That is, it must be careful to send well-formed datagrams, but must accept any datagram that it can interpret (e.g., not object to technical errors where the meaning is still clear)." [13] "The second part of the principle is almost as important: software on other hosts may contain deficiencies that make it unwise to exploit legal but obscure protocol features." [14]

Internet Protocol Suite

124

Layers in the Internet protocol suite


The Internet protocol suite uses encapsulation to provide abstraction of protocols and services. Encapsulation is usually aligned with the division of the protocol suite into layers of general functionality. In general, an application (the highest level of the model) uses a set of protocols to send its data down the layers, being further encapsulated at each level. The "layers" of the protocol suite near the top are logically closer to the user application, while those near the bottom are logically closer to the physical transmission of the data. Viewing layers as providing or consuming a service is a method of abstraction to isolate upper layer protocols from the nitty-gritty detail of transmitting bits over, for example, Ethernet and collision detection, while the lower layers avoid having to know the details of each and every application and its protocol. Even when the layers are examined, the assorted architectural documentsthere is no single architectural model such as ISO 7498, the Open Systems Interconnection (OSI) modelhave fewer and less rigidly defined layers than the OSI model, and thus provide an easier fit for real-world protocols. In point of fact, one frequently referenced document, RFC 1958, does not contain a stack of layers. The lack of emphasis on layering is a strong difference between the IETF and OSI approaches. It only refers to the existence of the "internetworking layer" and generally to "upper layers"; this document was intended as a 1996 "snapshot" of the architecture: "The Internet and its

Two Internet hosts connected via two routers and the corresponding layers used at each hop. The application on each host executes read and write operations as if the processes were directly connected to each other by some kind of data pipe. Every other detail of the communication is hidden from each process. The underlying mechanisms that transmit data between the host computers are located in the lower protocol layers.

Encapsulation of application data descending through the layers described in RFC 1122

Internet Protocol Suite architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture." RFC 1122, entitled Host Requirements, is structured in paragraphs referring to layers, but the document refers to many other architectural principles not emphasizing layering. It loosely defines a four-layer model, with the layers having names, not numbers, as follows: Application layer (process-to-process): This is the scope within which applications create user data and communicate this data to other processes or applications on another or the same host. The communications partners are often called peers. This is where the "higher level" protocols such as SMTP, FTP, SSH, HTTP, etc. operate. Transport layer (host-to-host): The transport layer constitutes the networking regime between two network hosts, either on the local network or on remote networks separated by routers. The transport layer provides a uniform networking interface that hides the actual topology (layout) of the underlying network connections. This is where flow-control, error-correction, and connection protocols exist, such as TCP. This layer deals with opening and maintaining connections between Internet hosts. Internet layer (internetworking): The internet layer has the task of exchanging datagrams across network boundaries. It is therefore also referred to as the layer that establishes internetworking, indeed, it defines and establishes the Internet. This layer defines the addressing and routing structures used for the TCP/IP protocol suite. The primary protocol in this scope is the Internet Protocol, which defines IP addresses. Its function in routing is to transport datagrams to the next IP router that has the connectivity to a network closer to the final data destination. Link layer: This layer defines the networking methods within the scope of the local network link on which hosts communicate without intervening routers. This layer describes the protocols used to describe the local network topology and the interfaces needed to effect transmission of Internet layer datagrams to next-neighbor hosts. (cf. the OSI data link layer). The Internet protocol suite and the layered protocol stack design were in use before the OSI model was established. Since then, the TCP/IP model has been compared with the OSI model in books and classrooms, which often results in confusion because the two models use different assumptions, including about the relative importance of strict layering. This abstraction also allows upper layers to provide services that the lower layers cannot, or choose not, to provide. Again, the original OSI model was extended to include connectionless services (OSIRM CL).[15] For example, IP is not designed to be reliable and is a best effort delivery protocol. This means that all transport layer implementations must choose whether or not to provide reliability and to what degree. UDP provides data integrity (via a checksum) but does not guarantee delivery; TCP provides both data integrity and delivery guarantee (by retransmitting until the receiver acknowledges the reception of the packet). This model lacks the formalism of the OSI model and associated documents, but the IETF does not use a formal model and does not consider this a limitation, as in the comment by David D. Clark, "We reject: kings, presidents and voting. We believe in: rough consensus and running code." Criticisms of this model, which have been made with respect to the OSI model, often do not consider ISO's later extensions to that model. 1. For multiaccess links with their own addressing systems (e.g. Ethernet) an address mapping protocol is needed. Such protocols can be considered to be below IP but above the existing link system. While the IETF does not use the terminology, this is a subnetwork dependent convergence facility according to an extension to the OSI model, the internal organization of the network layer (IONL).[16] 2. ICMP & IGMP operate on top of IP but do not transport data like UDP or TCP. Again, this functionality exists as layer management extensions to the OSI model, in its Management Framework (OSIRM MF) [17]

125

Internet Protocol Suite 3. The SSL/TLS library operates above the transport layer (uses TCP) but below application protocols. Again, there was no intention, on the part of the designers of these protocols, to comply with OSI architecture. 4. The link is treated like a black box here. This is fine for discussing IP (since the whole point of IP is it will run over virtually anything). The IETF explicitly does not intend to discuss transmission systems, which is a less academic but practical alternative to the OSI model. The following is a description of each layer in the TCP/IP networking model starting from the lowest level.

126

Link layer
The link layer is the networking scope of the local network connection to which a host is attached. This regime is called the link in Internet literature. This is the lowest component layer of the Internet protocols, as TCP/IP is designed to be hardware independent. As a result TCP/IP is able to be implemented on top of virtually any hardware networking technology. The link layer is used to move packets between the Internet layer interfaces of two different hosts on the same link. The processes of transmitting and receiving packets on a given link can be controlled both in the software device driver for the network card, as well as on firmware or specialized chipsets. These will perform data link functions such as adding a packet header to prepare it for transmission, then actually transmit the frame over a physical medium. The TCP/IP model includes specifications of translating the network addressing methods used in the Internet Protocol to data link addressing, such as Media Access Control (MAC), however all other aspects below that level are implicitly assumed to exist in the link layer, but are not explicitly defined. This is also the layer where packets may be selected to be sent over a virtual private network or other networking tunnel. In this scenario, the link layer data may be considered application data which traverses another instantiation of the IP stack for transmission or reception over another IP connection. Such a connection, or virtual link, may be established with a transport protocol or even an application scope protocol that serves as a tunnel in the link layer of the protocol stack. Thus, the TCP/IP model does not dictate a strict hierarchical encapsulation sequence.

Internet layer
The internet layer has the responsibility of sending packets across potentially multiple networks. Internetworking requires sending data from the source network to the destination network. This process is called routing.[18] In the Internet protocol suite, the Internet Protocol performs two basic functions: Host addressing and identification: This is accomplished with a hierarchical addressing system (see IP address). Packet routing: This is the basic task of sending packets of data (datagrams) from source to destination by sending them to the next network node (router) closer to the final destination. The internet layer is not only agnostic of application data structures at the transport layer, but it also does not distinguish between operation of the various transport layer protocols. So, IP can carry data for a variety of different upper layer protocols. These protocols are each identified by a unique protocol number: for example, Internet Control Message Protocol (ICMP) and Internet Group Management Protocol (IGMP) are protocols 1 and 2, respectively. Some of the protocols carried by IP, such as ICMP (used to transmit diagnostic information about IP transmission) and IGMP (used to manage IP Multicast data) are layered on top of IP but perform internetworking functions. This illustrates the differences in the architecture of the TCP/IP stack of the Internet and the OSI model. The internet layer only provides an unreliable datagram transmission facility between hosts located on potentially different IP networks by forwarding the transport layer datagrams to an appropriate next-hop router for further relaying to its destination. With this functionality, the internet layer makes possible internetworking, the interworking of different IP networks, and it essentially establishes the Internet. The Internet Protocol is the principal component of the internet layer, and it defines two addressing systems to identify network hosts computers, and to

Internet Protocol Suite locate them on the network. The original address system of the ARPANET and its successor, the Internet, is Internet Protocol version 4 (IPv4). It uses a 32-bit IP address and is therefore capable of identifying approximately four billion hosts. This limitation was eliminated by the standardization of Internet Protocol version 6 (IPv6) in 1998, and beginning production implementations in approximately 2006.

127

Transport layer
The transport layer establishes host-to-host connectivity, meaning it handles the details of data transmission that are independent of the structure of user data and the logistics of exchanging information for any particular specific purpose. Its responsibility includes end-to-end message transfer independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing (port numbers). End to end message transmission or connecting applications at the transport layer can be categorized as either connection-oriented, implemented in TCP, or connectionless, implemented in UDP. The transport layer can be thought of as a transport mechanism, e.g., a vehicle with the responsibility to make sure that its contents (passengers/goods) reach their destination safely and soundly, unless another protocol layer is responsible for safe delivery. The layer simply establishes a basic data channel that an application uses in its task-specific data exchange. For this purpose the layer establishes the concept of the port, a numbered logical construct allocated specifically for each of the communication channels an application needs. For many types of services, these port numbers have been standardized so that client computers may address specific services of a server computer without the involvement of service announcements or directory services. Since IP provides only a best effort delivery, the transport layer is the first layer of the TCP/IP stack to offer reliability. IP can run over a reliable data link protocol such as the High-Level Data Link Control (HDLC). For example, the TCP is a connection-oriented protocol that addresses numerous reliability issues to provide a reliable byte stream: data arrives in-order data has minimal error (i.e. correctness) duplicate data is discarded lost/discarded packets are resent includes traffic congestion control

The newer Stream Control Transmission Protocol (SCTP) is also a reliable, connection-oriented transport mechanism. It is message-stream-oriented not byte-stream-oriented like TCP and provides multiple streams multiplexed over a single connection. It also provides multi-homing support, in which a connection end can be represented by multiple IP addresses (representing multiple physical interfaces), such that if one fails, the connection is not interrupted. It was developed initially for telephony applications (to transport SS7 over IP), but can also be used for other applications. User Datagram Protocol is a connectionless datagram protocol. Like IP, it is a best effort, "unreliable" protocol. Reliability is addressed through error detection using a weak checksum algorithm. UDP is typically used for applications such as streaming media (audio, video, Voice over IP etc.) where on-time arrival is more important than reliability, or for simple query/response applications like DNS lookups, where the overhead of setting up a reliable connection is disproportionately large. Real-time Transport Protocol (RTP) is a datagram protocol that is designed for real-time data such as streaming audio and video. The applications at any given network address are distinguished by their TCP or UDP port. By convention certain well known ports are associated with specific applications. (See List of TCP and UDP port numbers.)

Internet Protocol Suite

128

Application layer
The application layer contains the higher-level protocols used by most applications for network communication. Examples of application layer protocols include the File Transfer Protocol (FTP) and the Simple Mail Transfer Protocol (SMTP).[19] Data coded according to application layer protocols are then encapsulated into one or (occasionally) more transport layer protocols (such as TCP or UDP), which in turn use lower layer protocols to effect actual data transfer. Since the IP stack defines no layers between the application and transport layers, the application layer must include any protocols that act like the OSI's presentation and session layer protocols. This is usually done through libraries. Application layer protocols generally treat the transport layer (and lower) protocols as black boxes which provide a stable network connection across which to communicate, although the applications are usually aware of key qualities of the transport layer connection such as the end point IP addresses and port numbers. As noted above, layers are not necessarily clearly defined in the Internet protocol suite. Application layer protocols are most often associated with clientserver applications, and the commoner servers have specific ports assigned to them by the IANA: HTTP has port 80; Telnet has port 23; etc. Clients, on the other hand, tend to use ephemeral ports, i.e. port numbers assigned at random from a range set aside for the purpose. Transport and lower level layers are largely unconcerned with the specifics of application layer protocols. Routers and switches do not typically "look inside" the encapsulated traffic to see what kind of application protocol it represents, rather they just provide a conduit for it. However, some firewall and bandwidth throttling applications do try to determine what's inside, as with the Resource Reservation Protocol (RSVP). It's also sometimes necessary for Network Address Translation (NAT) facilities to take account of the needs of particular application layer protocols. (NAT allows hosts on private networks to communicate with the outside world via a single visible IP address using port forwarding, and is an almost ubiquitous feature of modern domestic broadband routers).

Layer names and number of layers in the literature


The following table shows various networking models. The number of layers varies between three and seven.
[20] Kurose, [21] Forouzan Five layers [22] Comer, [23] Kozierok Four+one layers Stallings [24] Tanenbaum [25] RFC 1122, Cisco Internet STD Academy[26] 3 (1989) Four layers Four layers Mike Padlipsky's 1982 "Arpanet Reference Model" (RFC 871) Three layers OSI model

Five layers

Five layers

Seven layers OSI model

"Five-layer Internet model" or "TCP/IP protocol suite" Application

"TCP/IP 5-layer "TCP/IP reference model" model"

"TCP/IP 5-layer reference model"

"Internet model"

"Internet model"

"Arpanet reference model"

Application

Application

Application

Application

Application

Application/Process

Application Presentation Session

Transport

Transport

Host-to-host or transport Internet Network access

Transport

Transport

Transport

Host-to-host

Transport

Network Data link

Internet Data link (Network interface) (Hardware)

Internet Data link

Internet Link

Internetwork Network interface Network interface

Network Data link

Physical

Physical

Physical

Physical

Internet Protocol Suite Some of the networking models are from textbooks, which are secondary sources that may contravene the intent of RFC 1122 and other IETF primary sources.[27]

129

OSI and TCP/IP layering differences


The three top layers in the OSI modelthe application layer, the presentation layer and the session layerare not distinguished separately in the TCP/IP model where it is just the application layer. While some pure OSI protocol applications, such as X.400, also combined them, there is no requirement that a TCP/IP protocol stack must impose monolithic architecture above the transport layer. For example, the NFS application protocol runs over the eXternal Data Representation (XDR) presentation protocol, which, in turn, runs over a protocol called Remote Procedure Call (RPC). RPC provides reliable record transmission, so it can run safely over the best-effort UDP transport. Different authors have interpreted the RFCs differently, about whether the link layer (and the TCP/IP model) covers OSI model layer 1 (physical layer) issues, or if a hardware layer is assumed below the link layer. Several authors have attempted to incorporate the OSI model's layers 1 and 2 into the TCP/IP model, since these are commonly referred to in modern standards (for example, by IEEE and ITU). This often results in a model with five layers, where the link layer or network access layer is split into the OSI model's layers 1 and 2. The session layer roughly corresponds to the Telnet virtual terminal functionality, which is part of text based protocols such as the HTTP and SMTP TCP/IP model application layer protocols. It also corresponds to TCP and UDP port numbering, which is considered as part of the transport layer in the TCP/IP model. Some functions that would have been performed by an OSI presentation layer are realized at the Internet application layer using the MIME standard, which is used in application layer protocols such as HTTP and SMTP. The IETF protocol development effort is not concerned with strict layering. Some of its protocols may not fit cleanly into the OSI model, although RFCs sometimes refer to it and often use the old OSI layer numbers. The IETF has repeatedly stated that Internet protocol and architecture development is not intended to be OSI-compliant. RFC 3439, addressing Internet architecture, contains a section entitled: "Layering Considered Harmful".[27] Conflicts are apparent also in the original OSI model, ISO 7498, when not considering the annexes to this model (e.g., ISO 7498/4 Management Framework), or the ISO 8648 Internal Organization of the Network layer (IONL). When the IONL and Management Framework documents are considered, the ICMP and IGMP are neatly defined as layer management protocols for the network layer. In like manner, the IONL provides a structure for "subnetwork dependent convergence facilities" such as ARP and RARP. IETF protocols can be encapsulated recursively, as demonstrated by tunneling protocols such as Generic Routing Encapsulation (GRE). GRE uses the same mechanism that OSI uses for tunneling at the network layer.

Implementations
No specific hardware or software implementation is required by the protocols or the layered model, so there are many. Most computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP implementation. A minimally acceptable implementation includes the following protocols, listed from most essential to least essential: IP, ARP, ICMP, UDP, TCP and sometimes IGMP. In principle, it is possible to support only one transport protocol, such as UDP, but this is rarely done, because it limits usage of the whole implementation. IPv6, beyond its own version of ARP (NDP), ICMP (ICMPv6) and IGMP (IGMPv6), has some additional required functions, and often is accompanied by an integrated IPSec security layer. Other protocols could be easily added later (possibly being implemented entirely in userspace), such as DNS for resolving domain names to IP addresses, or DHCP for automatically configuring network interfaces. Normally, application programmers are concerned only with interfaces in the application layer and often also in the transport layer, while the layers below are services provided by the TCP/IP stack in the operating system. Most IP

Internet Protocol Suite implementations are accessible to programmers through sockets and APIs. Unique implementations include Lightweight TCP/IP, an open source stack designed for embedded systems, and KA9Q NOS, a stack and associated protocols for amateur packet radio systems and personal computers connected via serial lines. Microcontroller firmware in the network adapter typically handles link issues, supported by driver software in the operational system. Non-programmable analog and digital electronics are normally in charge of the physical components below the link layer, typically using an application-specific integrated circuit (ASIC) chipset for each network interface or other physical standard. High-performance routers are to a large extent based on fast non-programmable digital electronics, carrying out link level switching.

130

References
[1] [2] [3] [4] [5] [6] RFC 1122, Requirements for Internet Hosts Communication Layers, R. Braden (ed.), October 1989 RFC 1123, Requirements for Internet Hosts Application and Support, R. Braden (ed.), October 1989 RFC 1812, Requirements for IP Version 4 Routers, F. Baker (June 1995) RFC 675, Specification of Internet Transmission Control Protocol, V. Cerf et al. (December 1974) Internet History (http:/ / www. livinginternet. com/ i/ ii. htm) Ronda Hauben. "From the ARPANET to the Internet" (http:/ / www. columbia. edu/ ~rh120/ other/ tcpdigest_paper. txt). TCP Digest (UUCP). . Retrieved 2007-07-05.

[7] Wollongong (http:/ / support. microsoft. com/ kb/ 108007) [8] A Short History of Internet Protocols at CERN (http:/ / www. weblab. isti. cnr. it/ education/ ssfs/ lezioni/ slides/ archives/ cern. htm) [9] About | "romkey" (http:/ / www. romkey. com/ about/ ) [10] Barry Appelman [11] Architectural Principles of the Internet (ftp:/ / ftp. rfc-editor. org/ in-notes/ rfc1958. txt), RFC 1958, B. Carpenter, June 1996 [12] Rethinking the design of the Internet: The end to end arguments vs. the brave new world (http:/ / www. csd. uoc. gr/ ~hy558/ papers/ Rethinking_2001. pdf), Marjory S. Blumenthal, David D. Clark, August 2001 [13] p.23 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Jon Postel Editor (http:/ / www. ietf. org/ rfc/ rfc0791. txt?number=791) [14] Requirements for Internet Hosts -- Communication Layers p.13 October 1989 R. Braden, Editor (http:/ / tools. ietf. org/ html/ rfc1122#page-12) [15] [ OSI: Reference Model Addendum 1: Connectionless-mode Transmission,ISO7498/AD1],ISO7498/AD1, May 1986 [16] Information processing systems -- Open Systems Interconnection -- Internal organization of the Network Layer (http:/ / www. iso. org/ iso/ home/ store/ catalogue_tc/ catalogue_detail. htm?csnumber=16011), ISO 8648:1988. [17] Information processing systems -- Open Systems Interconnection -- Basic Reference Model -- Part 4: Management framework (http:/ / www. iso. org/ iso/ home/ store/ catalogue_tc/ catalogue_detail. htm?csnumber=14258), ISO 7498-4:1989. [18] IP Packet Structure (http:/ / www. comsci. us/ datacom/ ippacket. html) [19] TCP/IP Illustrated: the protocols (http:/ / www. kohala. com/ start/ tcpipiv1. html), ISBN 0-201-63346-9, W. Richard Stevens, February 1994 [20] James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, 2008, ISBN 0-321-49770-8 (http:/ / www. pearsonhighered. com/ educator/ academic/ product/ 0,,0321497708,00+ en-USS_01DBC. html) [21] Behrouz A. Forouzan, Data Communications and Networking, 2003 (http:/ / books. google. com/ books?id=U3Gcf65Pu9IC& printsec=frontcover& dq=forouzan+ "computer+ networks"& ei=RPZ9SOCvMofctAO02di0AQ& hl=en& sig=ACfU3U2Hh_n83pPtf5uCreCih0HnWvNcxg#PPA29,M1) [22] Douglas E. Comer, Internetworking with TCP/IP: Principles, Protocols and Architecture, Pearson Prentice Hall 2005, ISBN 0-13-187671-6 (http:/ / books. google. com/ books?id=jonyuTASbWAC& pg=PA155& hl=sv& source=gbs_toc_r& cad=0_0& sig=ACfU3U18gHAia1pU_Pxn-rhkCnH1v70M6Q#PPA161,M1) [23] Charles M. Kozierok, "The TCP/IP Guide", No Starch Press 2005 (http:/ / books. google. com/ books?id=Pm4RgYV2w4YC& pg=PA131& dq="TCP/ IP+ model+ layers"& lr=& hl=sv& sig=ACfU3U3ofMwYAbZfGz1BmAXc2oNNFC2b8A#PPA129,M1) [24] William Stallings, Data and Computer Communications, Prentice Hall 2006, ISBN 0-13-243310-9 (http:/ / books. google. com/ books?id=c_AWmhkovR0C& pg=PA35& dq="internet+ layer"+ "network+ access+ layer"& ei=-O99SI3EJo32sgOQpPThDw& hl=en& sig=ACfU3U38aXznzeAnQdbLcPFXfCgxAd4lFg) [25] Andrew S. Tanenbaum, Computer Networks, Prentice Hall 2002, ISBN 0-13-066102-3 (http:/ / books. google. com/ books?id=Pd-z64SJRBAC& pg=PA42& vq=internet+ layer& dq=networks& hl=sv& source=gbs_search_s& sig=ACfU3U3DHANeIz0sOsd5NK4VXSrgNFYVAw#PPA42,M1) [26] Mark Dye, Mark A. Dye, Wendell, Network Fundamentals: CCNA Exploration Companion Guide, 2007, ISBN 1-58713-208-7

Internet Protocol Suite


[27] R. Bush; D. Meyer (December 2002), Some Internet Architectural Guidelines and Philosophy (http:/ / www. ietf. org/ rfc/ rfc3439. txt), Internet Engineering Task Force,

131

Further reading
Douglas E. Comer. Internetworking with TCP/IP - Principles, Protocols and Architecture. ISBN 86-7991-142-9 Joseph G. Davies and Thomas F. Lee. Microsoft Windows Server 2003 TCP/IP Protocols and Services. ISBN 0-7356-1291-9 Forouzan, Behrouz A. (2003). TCP/IP Protocol Suite (2nd ed.). McGraw-Hill. ISBN0-07-246060-1. Craig Hunt TCP/IP Network Administration. O'Reilly (1998) ISBN 1-56592-322-7 Maufer, Thomas A. (1999). IP Fundamentals. Prentice Hall. ISBN0-13-975483-0. Ian McLean. Windows(R) 2000 TCP/IP Black Book. ISBN 1-57610-687-X Ajit Mungale Pro .NET 1.1 Network Programming. ISBN 1-59059-345-6 W. Richard Stevens. TCP/IP Illustrated, Volume 1: The Protocols. ISBN 0-201-63346-9 W. Richard Stevens and Gary R. Wright. TCP/IP Illustrated, Volume 2: The Implementation. ISBN 0-201-63354-X W. Richard Stevens. TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols. ISBN 0-201-63495-3 Andrew S. Tanenbaum. Computer Networks. ISBN 0-13-066102-3 Clark, D. (1988). "The Design Philosophy of the DARPA Internet Protocols" (http://www.cs.princeton.edu/ ~jrex/teaching/spring2005/reading/clark88.pdf). SIGCOMM '88 Symposium proceedings on Communications architectures and protocols (ACM): 106114. doi:10.1145/52324.52336. Retrieved 2011-10-16.

External links
Internet History (http://www.livinginternet.com/i/ii.htm)Pages on Robert Kahn, Vinton Cerf, and TCP/IP (reviewed by Cerf and Kahn). RFC 675 (http://www.ietf.org/rfc/rfc0675.txt) - Specification of Internet Transmission Control Program, December 1974 Version TCP/IP State Transition Diagram (http://www.night-ray.com/TCPIP_State_Transition_Diagram.pdf) (PDF) RFC 1180 A TCP/IP Tutorial - from the Internet Engineering Task Force (January 1991) TCP/IP FAQ (http://www.itprc.com/tcpipfaq/) The TCP/IP Guide (http://www.tcpipguide.com/free/) - A comprehensive look at the protocols and the procedures/processes involved A Study of the ARPANET TCP/IP Digest (http://www.columbia.edu/~rh120/other/tcpdigest_paper.txt) TCP/IP Sequence Diagrams (http://www.eventhelix.com/RealtimeMantra/Networking/) The Internet in Practice (http://www.searchandgo.com/articles/internet/internet-practice-4.php) TCP/IP - Directory & Informational Resource (http://softtechinfo.com/network/tcpip.html) Daryl's TCP/IP Primer (http://www.ipprimer.com/) - Intro to TCP/IP LAN administration, conversational style Introduction to TCP/IP (http://www.linux-tutorial.info/MContent-142) TCP/IP commands from command prompt (http://blog.webgk.com/2007/10/ dns-tcpip-commands-from-command-prompt.html) cIPS (http://sourceforge.net/projects/cipsuite/) Robust TCP/IP stack for embedded devices without an Operating System

Internet access

132

Internet access
Internet access is the means by which individual terminals, computers, mobile devices, and local area networks are connected to the global Internet. Internet access is usually sold by Internet Service Providers (ISPs) that use many different technologies offering a wide range of data rates to the end user. Consumer use first became popular through dial-up connections in the 1980s and 1990s. By the first decade of the 21st century, many consumers had switched away from dial-up to dedicated connections, most Internet access products were being marketed using the term "broadband", and broadband penetration was being treated as a key economic indicator.[1][2]

History
The Internet began as a network funded by the U.S. government to support projects within the government and at universities and research laboratories in the US - but grew over time to include most of the world's large universities and the research arms of many technology companies.[3][4][5] Use by a wider audience only came in 1995 when restrictions on the use of the Internet to carry commercial traffic were lifted.[6] In the early to mid-1980s, most Internet access was from personal computers and workstations directly connected to local area networks or from dial-up connections using modems and analog telephone lines. LANs typically operated at 10 Mbit/s and grew to support 100 and 1000 Mbit/s, while modem data rates grew from 1200 and 2400 bit/s in the 1980s, to 28 and 56 kbit/s by the mid to late 1990s. Initially dial-up connections were made from terminals or computers running terminal emulation software to terminal servers on LANs. These dial-up connections did not support end-to-end use of the Internet protocols and only provided terminal to host connections. The introduction of network access servers (NASs) supporting the Serial Line Internet Protocol (SLIP) and later the Point-to-point protocol (PPP) extended the Internet protocols and made the full range of Internet services available to dial-up users, subject only to limitations imposed by the lower data rates available using dial-up. Broadband Internet access, often shortened to just broadband and also known as high-speed Internet access, are services that provide bit-rates considerably higher than that available using a 56 kbit/s modem. In the U.S. National Broadband Plan of 2009, the Federal Communications Commission (FCC) defined broadband access as "Internet access that is always on and faster than the traditional dial-up access",[7] although the FCC has defined it differently through the years.[8] The term broadband was originally a reference to multi-frequency communication, as opposed to narrowband or baseband. Broadband is now a marketing term that telephone, cable, and other companies use to sell their more expensive higher data rate products.[9] Most broadband services provide a continuous "always on" connection; there is no dial-in process required, and it does not hog phone lines.[10] Broadband provides improved access to Internet services such as: Faster world wide web browsing Faster downloading of documents, photographs, videos, and other large files Telephony, radio, television, and videoconferencing Virtual private networks and remote system administration Online gaming, especially massively multiplayer online role-playing games which are interaction-intensive

In the 1990s, the National Information Infrastructure initiative in the U.S. made broadband Internet access a public policy issue.[11] In 2000, most Internet access to homes was provided using dial-up, while many businesses and schools were using broadband connections. In 2000 there were just under 150 million dial-up subscriptions in the 34 OECD countries[1] and fewer than 20 million broadband subscriptions. By 2004, broadband had grown and dial-up had declined so that the number of subscriptions were roughly equal at 130 million each. In 2010, in the OECD countries, over 90% of the Internet access subscriptions used broadband, broadband had grown to more than 300 million subscriptions, and dial-up subscriptions had declined to fewer than 30 million.[12]

Internet access The broadband technologies in widest use are ADSL and cable Internet access. Newer technologies include VDSL and optical fibre extended closer to the subscriber in both telephone and cable plants. Fibre-optic communication, while only recently being used in premises and to the curb schemes, has played a crucial role in enabling broadband Internet access by making transmission of information at very high data rates over longer distances much more cost-effective than copper wire technology. In areas not served by ADSL or cable, some community organizations and local governments are installing Wi-Fi networks. Wireless and satellite Internet are often used in rural, undeveloped, or other hard to serve areas where wired Internet is not readily available. Newer technologies being deployed for fixed (stationary) and mobile broadband access include WiMAX, LTE, and fixed wireless, e.g., Motorola Canopy. Starting in roughly 2006, mobile broadband access is increasingly available at the consumer level using "3G" and "4G" technologies such as HSPA, EV-DO, HSPA+, and LTE.

133

Availability
In addition to access from home, school, and the workplace Internet access may be available from public places such as libraries and Internet cafes, where computers with Internet connections are available. Some libraries provide stations for connecting users' laptops to local area networks (LANs). Wireless Internet access points are available in public places such as airport halls, in some cases just for brief use while standing. Some access points may also provide coin operated computers. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels also have public terminals, usually fee based. Coffee shops, shopping malls, and other venues increasingly offer wireless access to computer networks, referred to as hotspots, for users who bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. And Mobile broadband access allows smart phones and other digital devices to connect to the Internet from any location from which a mobile phone call can be made.

Data rates
Data rate units (SI) Unit Kilobit per second Megabit/s Gigabit/s Terabit/s Petabit/s Unit Kilobyte per second (103) Megabyte/s (106) (103) (106) (109) Symbol Bits kbit/s Mbit/s Gbit/s 1,000 bit/s 1,000 kbit/s 1,000 Mbit/s 1,000 Gbit/s 1,000 Tbit/s Bytes 125 bytes/s 125 kB/s 125 MB/s 125 GB/s 125 TB/s Bytes 1,000 bytes/s 1,000 kB/s

(1012) Tbit/s (1015) Pbit/s

Symbol Bits kB/s MB/s 8,000 bit/s 8,000 kbit/s

Internet access

134
Gigabyte/s Terabyte/s Petabyte/s GB/s 8,000 Mbit/s 1,000 MB/s 8,000 Gbit/s 1,000 GB/s 8,000 Tbit/s 1,000 TB/s

(109)

(1012) TB/s (1015) PB/s

The bit rates for dial-up modems range from as little as 110 bit/s in the late 1950s, to a maximum of from 33 to 64 kbit/s (V.90 and V.92) in the late 1990s. Dial-up connections generally require the dedicated use of a telephone line. Data compression can boost the effective bit rate for a dial-up modem connection to from 220 (V.42bis) to 320 (V.44) kbit/s.[13] However, the effectiveness of data compression is quite variable, depending on the type of data being sent, the condition of the telephone line, and a number of other factors. In reality, the overall data rate rarely exceeds 150 kbit/s.[14] Broadband technologies supply considerably higher bit rates than dial-up, generally without disrupting regular telephone use. Various minimum data rates and maximum latencies have been used in definitions of broadband, ranging from 64kbit/s up to 4.0Mbit/s.[15] In 1988 the CCITT standards body defined "broadband service" as requiring transmission channels capable of supporting bit rates greater than the primary rate which ranged from about 1.5 to 2Mbit/s.[16] A 2006 Organization for Economic Co-operation and Development (OECD) report defined broadband as having download data transfer rates equal to or faster than 256kbit/s.[1] And in 2010 the U.S. Federal Communications Commission (FCC) defined "Basic Broadband" as data transmission speeds of at least 4 Mbit/s downstream (from the Internet to the users computer) and 1Mbit/s upstream (from the users computer to the Internet).[17] The trend is to raise the threshold of the broadband definition as higher data rate services become available.[18] The higher data rate dial-up modems and many broadband services are "asymmetric"supporting much higher data rates for download (toward the user) than for upload (toward the Internet). Data rates, including those given in this article, are usually defined and advertised in terms of the maximum or peak download rate. In practice, these maximum data rates are not always reliably available to the customer.[19] Actual end-to-end data rates can be lower due to a number of factors.[20] Physical link quality can vary with distance and for wireless access with terrain, weather, building construction, antenna placement, and interference from other radio sources. Network bottlenecks may exist at points anywhere on the path from the end-user to the remote server or service being used and not just on the first or last link providing Internet access to the end-user. Users may share access over a common network infrastructure. Since most users do not use their full connection capacity all of the time, this aggregation strategy (known as contended service) usually works well and users can burst to their full data rate at least for brief periods. However, peer-to-peer (P2P) file sharing and high quality streaming video can require high data rates for extended periods, which violates these assumptions and can cause a service to become oversubscribed, resulting in congestion and poor performance. The TCP protocol includes flow-control mechanisms that automatically throttle back on the bandwidth being used during periods of network congestion. This is fair in the sense that all users that experience congestion receive less bandwidth, but it can be frustrating for customers and a major problem for ISPs. In some cases the amount of bandwidth actually available may fall below the threshold required to support a particular service such as video conferencing or streaming live videoeffectively making the service unavailable. When traffic is particularly heavy, an ISP can deliberately throttle back the bandwidth available to classes of users or for particular services. This is known as traffic shaping and careful use can ensure a better quality of service for time critical services even on extremely busy networks. However, overuse can lead to concerns about fairness and network neutrality or even charges of censorship, when some types of traffic are severely or completely blocked.

Internet access

135

Technologies
Access technologies generally use a modem, which converts digital data to analog for transmission over analog networks such as the telephone and cable networks.[10]

Local Area Networks


Local area networks (LANs) provide Internet access to computers and other devices in a limited area such as a home, school, computer laboratory, or office building, usually at relatively high data rates that typically range from 10 to 1000 Mbit/s.[21] There are wired and wireless LANs. Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies used to build LANs today, but ARCNET, Token Ring, Localtalk, FDDI, and other technologies were used in the past. Most Internet access today is through a LAN, often a very small LAN with just one or two devices attached. And while LANs are an important form of Internet access, this begs the question of how and at what data rate the LAN itself is connected to the rest of the global Internet. The technologies described below are used to make these connections.

Dial-up access
Dial-up access uses a modem and a phone call placed over the public switched telephone network (PSTN) to connect to a pool of modems operated by an ISP. The modem converts a computer's digital signal into an analog signal that travels over a phone line's local loop until it reaches a telephone company's switching facilities or central office (CO) where it is switched to another phone line that connects to another modem at the remote end of the connection.[22] Operating on a single channel, a dial-up connection monopolizes the phone line and is one of the slowest methods of accessing the Internet. Dial-up is often the only form of Internet access available in rural areas as it requires no new infrastructure beyond the already existing telephone network, to connect to the Internet. Typically, dial-up connections do not exceed a speed of 56 kbit/s, as they are primarily made using modems that operate at a maximum data rate of 56 kbit/s downstream (towards the end user) and 34 or 48 kbit/s upstream (toward the global Internet).[10]

Broadband access
The term broadband includes a broad range of technologies, all of which provide higher data rate access to the Internet. These technologies use wires or fiber optic cables in contrast to wireless broadband described later. Multilink dial-up Multilink dial-up provides increased bandwidth by bonding two or more dial-up connections together and treating them as a single data channel.[23] It requires two or more modems, phone lines, and dial-up accounts, as well as an ISP that supports multilinking - and of course any line and data charges are also doubled. This inverse multiplexing option was briefly popular with some high-end users before ISDN, DSL and other technologies became available. Diamond and other vendors created special modems to support multilinking.[24]

Internet access Integrated Services Digital Network (ISDN) Integrated Services Digital Network (ISDN), a switched telephone service capable of transporting voice and digital data, is one of the oldest Internet access methods. ISDN has been used for voice, video conferencing, and broadband data applications. ISDN was very popular in Europe, but less common in North America. Its use peaked in the late 1990s before the availability of DSL and cable modem technologies.[25] Basic rate ISDN, known as ISDN-BRI, has two 64 kbit/s "bearer" or "B" channels. These channels can be used separately for voice or data calls or bonded together to provide a 128kbit/s service. Multiple ISDN-BRI lines can be bonded together to provide data rates above 128 kbit/s. Primary rate ISDN, known as ISDN-PRI, has 23 bearer channels (64 kbit/s each) for a combined data rate of 1.5Mbit/s (US standard). An ISDN E1 (European standard) line has 30 bearer channels and a combined data rate of 1.9Mbit/s. Leased lines Leased lines are dedicated lines used primarily by ISPs, business, and other large enterprises to connect LANs and campus networks to the Internet using the existing infrastructure of the public telephone network or other providers. Delivered using wire, optical fiber, and radio, leased lines are used to provide Internet access directly as well as the building blocks from which several other forms of Internet access are created.[26] T-carrier technology dates to 1957 and provides data rates that range from 56 and 64 kbit/s (DS0) to 1.5 Mbit/s (DS1 or T1), to 45 Mbit/s (DS3 or T3). A T1 line carries 24 voice or data channels (24 DS0s), so customers may use some channels for data and others for voice traffic or use all 24 channels for clear channel data. A DS3 (T3) line carries 28 DS1 (T1) channels. Fractional T1 lines are also available in multiples of a DS0 to provide data rates between 56 and 1,500 kbit/s. T-carrier lines require special termination equipment that may be separate from or integrated into a router or switch and which may be purchased or leased from an ISP.[27] In Japan the equivalent standard is J1/J3. In Europe, a slightly different standard, E-carrier, provides 32 user channels (64 kbit/s) on an E1 (2.0 Mbit/s) and 512 user channels or 16 E1s on an E3 (34.4 Mbit/s). Synchronous Optical Networking (SONET, in the U.S. and Canada) and Synchronous Digital Hierarchy (SDH, in the rest of the world) are the standard multiplexing protocols used to carry high data rate digital bit streams over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs). At lower transmission rates data can also be transferred via an electrical interface. The basic unit of framing is an OC-3c (optical) or STS-3c (electrical) which carries 155.520 Mbit/s. Thus an OC-3c will carry three OC-1 (51.84 Mbit/s) payloads each of which has enough capacity to include a full DS3. Higher data rates are delivered in OC-3c multiples of four providing OC-12c (622.080 Mbit/s), OC-48c (2.488 Gbit/s), OC-192c (9.953 Gbit/s), and OC-768c (39.813 Gbit/s). The "c" at the end of the OC labels stands for "concatenated" and indicates a single data stream rather than several multiplexed data streams.[26] The 1, 10, 40, and 100 Gigabit Ethernet (GbE, 10GbE, 40GbE, and 100GbE) IEEE standards (802.3) allow digital data to be delivered over copper wiring at distances to 100 m and over optical fiber at distances to 40km.[28] Cable Internet access Cable Internet or cable modem access provides Internet access via Hybrid Fiber Coaxial wiring originally developed to carry television signals. Either fiber-optic or coaxial copper cable may connect a node to a customer's location at a connection known as a cable drop. In a cable modem termination system, all nodes for cable subscribers in a neighborhood connect to a cable company's central office, known as the "head end." The cable company then connects to the Internet using a variety of means usually fiber optic cable or digital satellite and microwave transmissions.[29] Like DSL, broadband cable provides a continuous connection with an ISP. Downstream, the direction toward the user, bit rates can be as much as 400Mbit/s for business connections, and 100Mbit/s for residential service in some countries. Upstream traffic, originating at the user, ranges from 384kbit/s to more than 20Mbit/s. Broadband cable access tends to service fewer business customers because existing

136

Internet access television cable networks tend to service residential buildings and commercial buildings do not always include wiring for coaxial cable networks.[30] In addition, because broadband cable subscribers share the same local line, communications may be intercepted by neighboring subscribers. Cable networks regularly provide encryption schemes for data traveling to and from customers, but these schemes may be thwarted.[29] Digital subscriber line (DSL, ADSL, SDSL, and VDSL)
DSL technologies Standard ADSL ANSI T1.413 Issue 2 ITU G.992.1 (G.DMT) ITU G.992.2 (G.Lite) ITU G.992.3 ITU G.992.4 ITU G.992.3 Annex J ITU G.992.3 Annex L

137

ADSL2

ADSL2+ ITU G.992.5 ITU G.992.5 Annex M HDSL HDSL2 IDSL MSDSL PDSL RADSL SDSL SHDSL UDSL VDSL VDSL2 ITU G.993.1 ITU G.993.2 ITU G.991.2 ITU G.991.1

Digital Subscriber Line (DSL) service provides a connection to the Internet through the telephone network. Unlike dial-up, DSL can operate using a single phone line without preventing normal use of the telephone line for voice phone calls. DSL uses the high frequencies, while the low (audible) frequencies of the line are left free for regular telephone communication.[10] These frequency bands are subsequently separated by filters installed at the customer's premises. DSL originally stood for "digital subscriber loop". In telecommunications marketing, the term digital subscriber line is widely understood to mean Asymmetric Digital Subscriber Line (ADSL), the most commonly installed variety of DSL. The data throughput of consumer DSL services typically ranges from 256kbit/s to 20Mbit/s in the direction to the customer (downstream), depending on DSL technology, line conditions, and service-level implementation. In ADSL, the data throughput in the upstream direction, (i.e. in the direction to the service provider) is lower than that in the downstream direction (i.e. to the customer), hence the designation of asymmetric.[31] With a symmetric digital subscriber line (SDSL), the downstream and upstream data rates are equal.[32] Very-high-bit-rate digital subscriber line (VDSL or VHDSL, ITU G.993.1)[33] is a digital subscriber line (DSL) standard approved in 2001 that provides data rates up to 52 Mbit/s downstream and 16 Mbit/s upstream over copper wires[34] and up to 85 Mbit/s down- and upstream on coaxial cable.[35] VDSL is capable of supporting applications

Internet access such as high-definition television, as well as telephone services (voice over IP) and general Internet access, over a single physical connection. VDSL2 (ITU-T G.993.2) is a second-generation version and an enhancement of VDSL.[36] Approved in February 2006, it is able to provide data rates exceeding 100 Mbit/s simultaneously in both the upstream and downstream directions. However, the maximum data rate is achieved at a range of about 300 meters and performance degrades as distance and loop attenuation increases. DSL Rings DSL Rings (DSLR) or Bonded DSL Rings is a ring topology that uses DSL technology over existing copper telephone wires to provide data rates of up to 400Mbit/s.[37] Fiber to the home Fiber-to-the-home (FTTH) is one member of the Fiber-to-the-x (FTTx) family that includes Fiber-to-the-building or basement (FTTB), Fiber-to-the-premises (FTTP), Fiber-to-the-desk (FTTD), Fiber-to-the-curb (FTTC), and Fiber-to-the-node (FTTN).[38] These methods all bring data closer to the end user on optical fibers. The differences between the methods have mostly to do with just how close to the end user the delivery on fiber comes. All of these delivery methods are similar to hybrid fiber-coaxial (HFC) systems used to provide cable Internet access. The use of optical fiber offers much higher data rates over relatively longer distances. Most high-capacity Internet and cable television backbones already use fiber optic technology, with data switched to other technologies (DSL, cable, POTS) for final delivery to customers.[39] Australia has already begun rolling out its National Broadband Network across the country using fiber-optic cables to 93 percent of Australian homes, schools, and businesses.[40] Similar efforts are underway in Italy, Canada, India, and many other countries (see Fiber to the premises by country).,[41][42][43][44] Power-line Internet Power-line Internet, also known as Broadband over power lines (BPL), carries Internet data on a conductor that is also used for electric power transmission. Because of the extensive power line infrastructure already in place, this technology can provide people in rural and low population areas access the Internet with little cost in terms of new transmission equipment, cables, or wires. Data rates are asymmetric and generally range from 256 kbit/s to 2.7 Mbit/s.[45] Because these systems use parts of the radio spectrum allocated to other over-the-air communication services, interference between the services is a limiting factor in the introduction of power-line Internet systems. The IEEE P1901 standard specifies that all powerline protocols must detect existing usage and avoid interfering with it.[45] Power-line Internet has developed faster in Europe than in the U.S. due to a historical difference in power system design philosophies. Data signals cannot pass through the step-down transformers used and so a repeater must be installed on each transformer.[45] In the U.S. a transformer serves a small clusters of from one to a few houses. In Europe, it is more common for a somewhat larger transformer to service larger clusters of from 10 to 100 houses. Thus a typical U.S. city requires an order of magnitude more repeaters than in a comparable European city.[46] ATM and Frame Relay Asynchronous Transfer Mode (ATM) and Frame Relay are wide area networking standards that can be used to provide Internet access directly or as building blocks of other access technologies. For example many DSL implementations use an ATM layer over the low-level bitstream layer to enable a number of different technologies over the same link. Customer LANs are typically connected to an ATM switch or a Frame Relay node using leased lines at a wide range of data rates.[47][48]

138

Internet access While still widely used, with the advent of Ethernet over optical fiber, MPLS, VPNs and broadband services such as cable modem and DSL, ATM and Frame Relay no longer play the prominent role they once did.

139

Wireless broadband access


Wireless broadband is used to provide both fixed and mobile Internet access. Wi-Fi Wi-Fi is the popular name for a "wireless local area network" that uses one of the IEEE 802.11 standards. It is a trademark of the Wi-Fi Alliance. Individual homes and businesses often use Wi-Fi to connect laptops and smart phones to the Internet. Wi-Fi Hotspots may be found in coffee shops and various other public establishments. Wi-Fi is used to create campus-wide and city-wide wireless networks.[49][50][51]
Wi-Fi logo Wi-Fi networks are built using one or more wireless routers called Access Points. "Ad hoc" computer to computer Wi-Fi" networks are also possible. The Wi-Fi network is connected to the larger Internet using DSL, cable modem, and other Internet access technologies. Data rates range from 6 to 600 Mbit/s. Wi-Fi service range is fairly short, typically 20 to 250 meters or from 65 to 820 feet. Both data rate and range are quite variable depending on the Wi-Fi protocol, location, frequency, building construction, and interference from other devices.[52] Using directional antennas and with careful engineering Wi-Fi can be extended to operate over distances of up to several kilometers, see Wireless ISP below.

Wireless ISP Wireless ISPs typically employ low-cost 802.11 Wi-Fi radio systems to link up remote locations over great distances, but may use other higher-power radio communications systems as well. Traditional 802.11b is an unlicensed omnidirectional service designed to span between 100 and 150 meters (300 to 500ft). By focusing the radio signal using a directional antenna 802.11b can operate reliably over a distance of many kilometres (miles), although the technology's line-of-sight requirements hamper connectivity in areas with hilly or heavily foliated terrain. In addition, compared to hard-wired connectivity, there are security risks (unless robust security protocols are enabled); data rates are significantly slower (2 to 50 times slower); and the network can be less stable, due to interference from other wireless devices and networks, weather and line-of-sight problems.[53] Rural Wireless-ISP installations are typically not commercial in nature and are instead a patchwork of systems built up by hobbyists mounting antennas on radio masts and towers, agricultural storage silos, very tall trees, or whatever other tall objects are available. There are currently a number of companies that provide this service.[54] Motorola Canopy and other proprietary technologies offer wireless access to rural and other markets that are hard to reach using Wi-Fi or WiMAX.

Internet access WiMAX

140

Worldwide Interoperability for Microwave Access


WiMAX Forum logo

WiMAX (Worldwide Interoperability for Microwave Access) is a set of interoperable implementations of the IEEE 802.16 family of wireless-network standards certified by the WiMAX Forum. WiMAX enables "the delivery of last mile wireless broadband access as an alternative to cable and DSL".[55] The original IEEE 802.16 standard, now called "Fixed WiMAX", was published in 2001 and provided 30 to 40 megabit-per-second data rates.[56] Mobility support was added in 2005. A 2011 update provides data rates up to 1 Gbit/s for fixed stations. WiMax offers a metropolitan area network with a signal radius of about 50km (30 miles), far surpassing the 30-metre (100-foot) wireless range of a conventional Wi-Fi local area network (LAN). WiMAX signals also penetrate building walls much more effectively than Wi-Fi. Satellite broadband Satellites can provide fixed, portable, and mobile Internet access. It is among the most expensive forms of broadband Internet access, but may be the only choice available in remote areas.[57] Data rates range from 2 kbit/s to 1 Gbit/s downstream and from 2 kbit/s to 10 Mbit/s upstream. Satellite communication typically requires a clear line of sight, will not work well through trees and other vegetation, is adversely affected by moisture, rain, and snow (known as rain fade), and may require a fairly large, carefully aimed, directional antenna. Satellites in geostationary Earth orbit (GEO) operate in a fixed position Satellite Internet access via VSAT in Ghana 35,786km (22,236 miles) above the earth's equator. Even at the speed of light (about 300,000km/s or 186,000 miles per second), it takes a quarter of a second for a radio signal to travel from the earth to the satellite and back. When other switching and routing delays are added and the delays are doubled to allow for a full round-trip transmission, the total delay can be 0.75 to 1.25 seconds. This latency is large when compared to other forms of Internet access with typical latencies that range from 0.015 to 0.2 seconds. Long latencies can make some applications, such as video conferencing, voice over IP, multiplayer games, and remote control of equipment, that require a real-time response impracticable via satellite. TCP tuning and TCP acceleration techniques can mitigate some of these problems. GEO satellites do not cover the earth's polar regions.[58] HughesNet and ViaSat are GEO systems. Satellites in Low Earth orbit (LEO, below 2000km or 1243 miles) and Medium earth orbit (MEO, between 2000 and 35,786km or 1,243 and 22,236 miles) are less common, operate at lower altitudes, and are not fixed in their position above the earth. Lower altitudes allow lower latencies and make real-time interactive Internet applications feasible. LEO systems include Globalstar and Iridium. The O3b Satellite Constellation is a proposed MEO system with a latency of 125 ms. COMMStellation is a LEO system, scheduled for launch in 2015, that is expected to have a latency of just 7ms.

Internet access Mobile broadband Mobile broadband is the marketing term for wireless Internet access delivered through mobile phone towers to computers, mobile phones (called "cell phones" in North America and South Africa), and other digital devices using portable modems. Some mobile services allow more than one device to be connected to the Internet using a single cellular connection using a process called tethering. The modem may be built into laptop computers, tablets, mobile phones, and other devices, added to some devices using PC cards, USB modems, and USB sticks or dongles, or separate wireless modems can be used.[59] Roughly every ten years new mobile phone technology and infrastructure involving a change in the fundamental nature of the service, non-backwards-compatible transmission technology, higher peak data rates, new frequency bands, wider channel frequency bandwidth in Hertz becomes available. These transitions are referred to as generations:
Second generation (2G) from 1991: first mobile data services GSM CSD (2G): 9.6 kbit/s GSM GPRS (2.5G): 56 to 115 kbit/s GSM EDGE (2.75G): up to 237 kbit/s Third generation (3G) from 2001: UMTS W-CDMA: 0.4 Mbit/s down and up UMTS HSPA: 14.4 Mbit/s down; 5.8 Mbit/s up UMTS TDD: 16 Mbit/s down and up CDMA2000 1xRTT: 0.3 Mbit/s down; 0.15 Mbit/s up CDMA2000 EV-DO: 2.5 to 4.9 Mbit/s down; 0.15 to 1.8 up GSM EDGE-Evolution: 1.6 Mbit/s down; 0.5 Mbit/s up Fourth generation (4G) from 2006: HSPA+: 21 to 672 Mbit/s down; 5.8 to 168 Mbit/s up Mobile WiMAX (802.16): 37 to 365 Mbit/s down; 17 to 376 Mbit/s up LTE: 100 to 300 Mbit/s down; 50 to 75 Mbit/s up LTE-Advanced: 100 Mbit/s moving at higher speeds to 1 Gbit/s not moving or moving at low speeds MBWA: (802.20): 80 Mbit/s

141

The download (to the user) and upload (to the Internet) data rates given above are peak or maximum rates and end users will typically experience lower data rates. WiMAX (described in more detail above) was originally developed to deliver fixed wireless service with wireless mobility added in 2005. CDMA2000 EV-DO and MBWA (Mobile Broadband Wireless Access) are no longer being actively developed. In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage.[60] Local Multipoint Distribution Service Local Multipoint Distribution Service (LMDS) is a broadband wireless access technology that uses microwave signals operating between 26GHz and 29GHz.[61] Originally designed for digital television transmission (DTV), it is conceived as a fixed wireless, point-to-multipoint technology for utilization in the last mile. Data rates range from 64 kbit/s to 155 Mbit/s.[62] Distance is typically limited to about 1.5 miles (2.4km), but links of up to 5 miles (8km) from the base station are possible in some circumstances.[63] LMDS has been surpassed in both technological and commercial potential by the LTE and WiMAX standards.

Pricing
Dial-up users pay the costs for making local or long distance phone calls, usually pay a monthly subscription fee, and may be subject to additional per minute or traffic based charges, and connect time limits by their ISP. Though less common today than in the past, some dial-up access is offered for "free" in return for watching banner ads as part of the dial-up service. NetZero, BlueLight, Juno, Freenet (NZ), and Free-nets are examples of services providing free access. Some Wireless community networks continue the tradition of providing free Internet access.

Internet access Fixed broadband Internet access is often sold under an "unlimited" or flat rate pricing model, with price determined by the maximum data rate chosen by the customer, rather than a per minute or traffic based charge. Per minute and traffic based charges and traffic caps are common for mobile broadband Internet access. With increased consumer demand for streaming content such as video on demand and peer-to-peer file sharing, demand for bandwidth has increased rapidly and for some ISPs the flat rate pricing model may become unsustainable. However, with fixed costs estimated to represent 80-90% of the cost of providing broadband service, the marginal cost to carry additional traffic is low. Most ISPs do not disclose their costs, but the cost to transmit a gigabyte of data in 2011 was estimated to be about $0.03.[64] Some ISPs estimate that about 5% of their users consume about 50% of the total bandwidth.[65] To ensure these high-bandwidth users do not slow down the network for everyone, some ISPs are considering, are experimenting with, or have implemented combinations of traffic based pricing, time of day or "peak" and "off peak" pricing, and bandwidth or traffic caps.[66][67] In Canada, Rogers Hi-Speed Internet and Bell Canada have imposed bandwidth caps.[65] Time Warner experimented with usage-based pricing in Beaumont, Texas.[68] An effort by Time Warner to expand usage-based pricing into the Rochester, New York area met with public resistance, however, and was abandoned.[69]

142

Growth in number of users


Worldwide Internet users 2006 2011a

World population 6.5 billion 7 billion Not using the Internetb Using the Internetb Users in the developing worldb Users in the developed worldb Users in Chinab
a

82% 18% 8% 10% 2%

65% 35% 22% 13% 8%

Estimate. b Share of world population. [60] Source: International Telecommunications Union.

Internet users by region 2006b Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a

2011a,b 13% 56% 29% 27% 48% 74%

3% 39% 11% 11% 13% 50%

Estimate. b Share of regional population. [60] Source: International Telecommunications Union.

Internet access Access to the Internet grew from an estimated 10 million people in 1993, to almost 40 million in 1995, to 670 million in 2002, and to 2.45 billion in 2011.[60] With market saturation, growth in the number of Internet users is slowing in industrialized countries, but continues in Asia,[70] Africa, Latin America, the Caribbean, and the Middle East. There were roughly 0.6 billion fixed broadband subscribers and almost 1.2 billion mobile broadband subscribers in 2011.[71] In developed countries people frequently use both fixed and mobile broadband networks. In developing countries mobile broadband is often the only access method available.[60]

143

Digital Divide
Despite its tremendous growth, Internet access is not distributed equally within or between [60][72] countries. The digital divide refers to the gap between people with effective access to information and communications technology (ICT), and those with very limited or no access. The gap between people with Internet access and those without is one of many aspects of the List of countries by number of Internet usersInternet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union. digital divide.[73] Whether someone has access to the Internet can depend greatly on financial status, geographical location as well as government policies. Low-income, rural, and minority populations have received special scrutiny as the technological "have-nots."[74] Government policies play a tremendous role in bringing Internet access to or limiting access for underserved groups, regions, and countries. For example in Pakistan, which is pursuing an aggressive IT policy aimed at boosting its drive for economic modernization, the number of Internet users grew from 133,900 (0.1% of the population) in 2000 to 31 million (17.6% of the population) in 2011.[75] In countries such as North Korea and Cuba there is relatively little access to the Internet due to the governments' fear of political instability that might accompany the benefits of access to the global Internet.[76] The U.S. trade embargo is another barrier limiting Internet access in Cuba.[77] In the United States, billions of dollars has been invested in efforts to narrow the digital divide and bring Internet access to more people in low-income and rural areas of the United States. The Obama administration has continued this commitment to narrowing the digital divide through the use of stimulus funding.[74] The National Center for Education Statistics reported that 98% of all U.S. classroom computers had Internet access in 2008 with roughly one computer with Internet access available for every three students. The percentage and ratio of students to computers was the same for rural schools (98% and 1 computer for every 2.9 students).[78] Access to computers is a dominant factor in determining the level of Internet access. In 2011, in developing countries, 25% of households had a computer and 20% had Internet access, while in developed countries the figures were 74% of households had a computer and 71% had Internet access.[60] When buying computers was legalized in Cuba in 2007, the private ownership of computers soared (there were 630,000 computers available on the island in 2008, a 23% increase over 2007).[79][80] Internet access has changed the way in which many people think and has become an integral part of peoples economic, political, and social lives. Providing Internet access to more people in the world allow will them to take advantage of the political, social, economic, educational, and career opportunities available over the Internet.[72] Several of the 67 principles adopted at the World Summit on the Information Society convened by the United

Internet access Nations in Geneva in 2003, directly address the digital divide.[81] To promote economic development and a reduction of the digital divide, national broadband plans have been and are being developed to increase the availability of affordable high-speed Internet access throughout the world.

144

Rural access
One of the great challenges for Internet access in general and for broadband access in particular is to provide service to potential customers in areas of low population density, such as to farmers, ranchers, and small towns. In cities where the population density is high, it is easier for a service provider to recover equipment costs, but each rural customer may require expensive equipment to get connected. While 66% of Americans had an Internet connection in 2010, that figure was only 50% in rural areas, according to the Pew Internet & American Life Project.[82] Virgin Media advertised over 100 towns across the United Kingdom "from Cwmbran to Clydebank" that have access to their 100Mbit/s service.[19] Wireless Internet Service Provider (WISPs) are rapidly becoming a popular broadband option for rural areas.[83] The technology's line-of-sight requirements may hamper connectivity in some areas with hilly and heavily foliated terrain. However, the Tegola project, a successful pilot in remote Scotland, demonstrates that wireless can be a viable option.[84] The Broadband for Rural Nova Scotia initiative is the first program in North America to guarantee access to "100% of civic addresses" in a region. It is based on Motorola Canopy technology. As of November 2011, under 1000 households have reported access problems. Deployment of a new cell network by one Canopy provider (Eastlink) was expected to provide the alternative of 3G/4G service, possibly at a special unmetered rate, for areas harder to serve by Canopy.[85]

Access as a human right


Several countries have adopted laws that make Internet access a right by requiring the state to work to ensure that Internet access is broadly available and/or preventing states from unreasonably restricting an individual's access to information and the Internet: Costa Rica: A 30 July 2010 ruling by the Supreme Court of Costa Rica stated: "Without fear of equivocation, it can be said that these technologies [information technology and communication] have impacted the way humans communicate, facilitating the connection between people and institutions worldwide and eliminating barriers of space and time. At this time, access to these technologies becomes a basic tool to facilitate the exercise of fundamental rights and democratic participation (e-democracy) and citizen control, education, freedom of thought and expression, access to information and public services online, the right to communicate with government electronically and administrative transparency, among others. This includes the fundamental right of access to these technologies, in particular, the right of access to the Internet or World Wide Web."[86] Estonia: In 2000, the parliament passed a law declaring Internet access a fundamental human right and launched a massive program to expand access to the countryside. The Internet, the government argues, is essential for life in the 21st century.[87] Finland: By July 2010, every person in Finland was to have the right to a one-megabit per second broadband connection, according to the Ministry of Transport and Communications. And by 2015, access to a 100 Mbit/s connection will be a legal right.[88] France: In June 2009, the Constitutional Council, France's highest court, declared access to the Internet to be a basic human right in a strongly-worded decision that struck down portions of the HADOPI law, a law that would have tracked abusers and without judicial review automatically cut off network access to those who continued to download illicit material after two warnings[89] Greece: Article 5A of the Constitution of Greece states that all persons has a right to participate in the Information Society and that the state has an obligation to facilitate the production, exchange, diffusion, and access to

Internet access electronically transmitted information.[90] Spain: Starting in 2011, Telefnica, the former state monopoly that holds the country's "universal service" contract, has to guarantee to offer "reasonably" priced broadband of at least one megabyte per second throughout Spain.[91] In December 2003, the World Summit on the Information Society (WSIS) was convened under the auspice of the United Nations. After lengthy negotiations between governments, businesses and civil society representatives the WSIS Declaration of Principles was adopted reaffirming the importance of the Information Society to maintaining and strengthening human rights:[] [92] 1. We, the representatives of the peoples of the world, assembled in Geneva from 1012 December 2003 for the first phase of the World Summit on the Information Society, declare our common desire and commitment to build a people-centred, inclusive and development-oriented Information Society, where everyone can create, access, utilize and share information and knowledge, enabling individuals, communities and peoples to achieve their full potential in promoting their sustainable development and improving their quality of life, premised on the purposes and principles of the Charter of the United Nations and respecting fully and upholding the Universal Declaration of Human Rights. 3. We reaffirm the universality, indivisibility, interdependence and interrelation of all human rights and fundamental freedoms, including the right to development, as enshrined in the Vienna Declaration. We also reaffirm that democracy, sustainable development, and respect for human rights and fundamental freedoms as well as good governance at all levels are interdependent and mutually reinforcing. We further resolve to strengthen the rule of law in international as in national affairs. The WSIS Declaration of Principles makes specific reference to the importance of the right to freedom of expression in the "Information Society" in stating: 4. We reaffirm, as an essential foundation of the Information Society, and as outlined in Article 19 of the Universal Declaration of Human Rights, that everyone has the right to freedom of opinion and expression; that this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Communication is a fundamental social process, a basic human need and the foundation of all social organisation. It is central to the Information Society. Everyone, everywhere should have the opportunity to participate and no one should be excluded from the benefits of the Information Society offers."[92] A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[93] conducted for the BBC World Service between 30 November 2009 and 7 February 2010 found that almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right.[94] 50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion.[95] The 88 recommendations made by the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression in a May 2011 report to the Human Rights Council of the United Nations General Assembly include several that bear on the question of the right to Internet access:[96] 67. Unlike any other medium, the Internet enables individuals to seek, receive and impart information and ideas of all kinds instantaneously and inexpensively across national borders. By vastly expanding the capacity of individuals to enjoy their right to freedom of opinion and expression, which is an enabler of other human rights, the Internet boosts economic, social and political development, and contributes to the progress of humankind as a whole. In this regard, the Special Rapporteur encourages other Special Procedures mandate holders to engage on the issue of the Internet with respect to their particular mandates. 78. While blocking and filtering measures deny users access to specific content on the Internet, States have also taken measures to cut off access to the Internet entirely. The Special Rapporteur considers cutting off users from Internet access, regardless of the justification provided, including on the grounds of violating

145

Internet access intellectual property rights law, to be disproportionate and thus a violation of article 19, paragraph 3, of the International Covenant on Civil and Political Rights. 79. The Special Rapporteur calls upon all States to ensure that Internet access is maintained at all times, including during times of political unrest. 85. Given that the Internet has become an indispensable tool for realizing a range of human rights, combating inequality, and accelerating development and human progress, ensuring universal access to the Internet should be a priority for all States. Each State should thus develop a concrete and effective policy, in consultation with individuals from all sections of society, including the private sector and relevant Government ministries, to make the Internet widely available, accessible and affordable to all segments of population. These statements, opinions, and recommendations have led to the suggestion that Internet access itself is or should become a fundamental human right.[97][98]

146

Natural Disasters and Access


Natural disasters disrupt internet access in profound ways. This is importantnot only for telecommunication companies who own the networks and the businesses who use them, but for emergency crew and displaced citizens as well. The situation is worsened when hospitals or other buildings necessary to disaster response lose their connection. Knowledge gained from studying past internet disruptions by natural disasters could be put to use in planning or recovery. Additionally, because of both natural and man-made disasters, studies in network resiliency are now being conducted to prevent large-scale outages.[99] One way natural disasters impact internet connection is by damaging end sub-networks (subnets), making them unreachable. A study on local networks after Hurricane Katrina found that 26% of subnets within the storm coverage were unreachable.[100] At Hurricane Katrinas peak intensity, almost 35% of networks in Mississippi were without power, while around 14% of Louisianas networks were disrupted.[101] Of those unreachable subnets, 73% were disrupted for four weeks or longer and 57% were at network edges where important emergency organizations such as hospitals and government agencies are mostly located.[100] Extensive infrastructure damage and inaccessible areas were two explanations for the long delay in returning service.[100] The company Cisco has revealed a Network Emergency Response Vehicle (NERV), a truck that makes portable communications possible for emergency responders despite traditional networks being disrupted.[102] A second way natural disasters destroy internet connectivity is by severing submarine cablesfiber-optic cables placed on the ocean floor that provide international internet connection. The 2006 undersea earthquake near Taiwan (Richter scale 7.2) cut six out of seven international cables connected to that country and caused a tsunami that wiped out one of its cable and landing stations.[103][104] The impact slowed or disabled internet connection for five days within the Asia-Pacific region as well as between the region and the United States and Europe.[105] With the rise in popularity of cloud computing, concern has grown over access to cloud-hosted data in the event of a natural disaster. Amazon Web Services (AWS) has been in the news for major network outages in April 2011 and June 2012.[106][107] AWS, like other major cloud hosting companies, prepares for typical outages and large-scale natural disasters with backup power as well as backup data centers in other locations. AWS divides the globe into five regions and then splits each region into availability zones. A data center in one availability zone should be backed up by a data center in a different availability zone. Theoretically, a natural disaster would not affect more than one availability zone.[108] This theory plays out as long as human error is not added to the mix. The June 2012 major storm only disabled the primary data center, but human error disabled the secondary and tertiary backups, affecting companies such as Netflix, Pinterest, Reddit, and Instagram.[109][110]

Internet access

147

References
[1] The 34 OECD countries are: Australia, Austria, Belgium, Canada, Chile, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. OECD members (http:/ / www. oecd. org/ pages/ 0,3417,en_36734052_36761800_1_1_1_1_1,00. html), accessed 31 April 2012 [2] "OECD Broadband Report Questioned" (http:/ / www. websiteoptimization. com/ bw/ 0705/ ). Website Optimization. . Retrieved June 6, 2009. [3] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [4] Rseaux IP Europens (RIPE) [5] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved 25 December 2005. [6] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [7] "What is Broadband?" (http:/ / www. broadband. gov/ about_broadband. html/ ). The National Broadband Plan. US Federal Communications Commission. . Retrieved July 15, 2011. [8] "Inquiry Concerning the Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion, and Possible Steps to Accelerate Such Deployment Pursuant to Section 706 of the Telecommunications Act of 1996, as Amended by the Broadband Data Improvement Act" (http:/ / transition. fcc. gov/ Daily_Releases/ Daily_Business/ 2010/ db0806/ FCC-10-148A1. pdf). GN Docket No. 10-159, FCC-10-148A1. Federal Communications Commission. August 6, 2010. . Retrieved July 12, 2011. [9] Naveen Bisht; James Connor. "Broadband to the Home: Trends and Issues" (http:/ / books. google. com/ books?id=ipmF3npkMngC& pg=PA1). Broadband Services, Applications, and Networks: Enabling Technologies and Business Models. International Engineering Consortium. p.1. ISBN978-1-931695-24-4. . [10] "How Broadband Works" (http:/ / www. explainthatstuff. com/ howbroadbandworks. html), Chris Woodford, Explain that Stuff, 20 August 2008. Retrieved 19 January. [11] Jeffrey A. Hart; Robert R. Reed; Franois Bar (November 1992). "The building of the internet: Implications for the future of broadband networks". Telecommunications Policy 16 (8): 666689. doi:10.1016/0308-5961(92)90061-S. [12] The Future of the Internet Economy: A Statistical Profile (http:/ / www. oecd. org/ dataoecd/ 24/ 5/ 48255770. pdf), Organization for Economic Co-Operation and Development (OECD), June 2011 [13] Willdig, Karl; Patrik Chen (August 1994). "What You Need to Know about Modems" (http:/ / fndcg0. fnal. gov/ Net/ modm8-94. txt). . Retrieved 2008-03-02. [14] Mitronov, Pavel (2001-06-29). "Modem compression: V.44 against V.42bis" (http:/ / www. digit-life. com/ articles/ compressv44vsv42bis/ ). Digit-Life.com. . Retrieved 2008-03-02. [15] "Birth of Broadband" (http:/ / www. itu. int/ osg/ spu/ publications/ birthofbroadband/ faq. html). ITU. September 2003. . Retrieved July 12, 2011. [16] "Recommendation I.113, Vocabulary of Terms for Broadband aspects of ISDN" (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 113-199706-I!!PDF-E). ITU-T. June 1997 (originally 1988). . Retrieved 19 July 2011. [17] "Sixth Broadband Deployment Report" (http:/ / hraunfoss. fcc. gov/ edocs_public/ attachmatch/ FCC-10-129A1. pdf). FCC. . Retrieved July 23, 2010. [18] Patel, Nilay (March 19, 2008). "FCC redefines "broadband" to mean 768kbit/s, "fast" to mean "kinda slow"" (http:/ / www. engadget. com/ 2008/ 03/ 19/ fcc-redefines-broadband-to-mean-768kbps-fast-to-mean-kinda/ ). Engadget. . Retrieved June 6, 2009. [19] "Virgin Medias ultrafast 100Mb broadband now available to over four million UK homes" (http:/ / mediacentre. virginmedia. com/ Stories/ Virgin-Media-s-ultrafast-100Mb-broadband-now-available-to-over-four-million-UK-homes-211c. aspx). News release. Virgin Media. June 10, 2011. . Retrieved August 18, 2011. [20] Tom Phillips (August 25, 2010). "'Misleading' BT broadband ad banned" (http:/ / www. metro. co. uk/ tech/ 839014-misleading-bt-broadband-ad-banned). UK Metro. . Retrieved July 24, 2011. [21] Gary A. Donahue (June 2007). Network Warrior (http:/ / shop. oreilly. com/ product/ 9780596101510. do). O'Reilly. p.600. ISBN0-596-10151-1. . [22] Dean, Tamara (2010). Network+ Guide to Networks, 5th Ed. [23] "Bonding: 112K, 168K, and beyond " (http:/ / www. 56k. com/ reports/ bonding. shtml), 56K.com [24] "Diamond 56k Shotgun Modem" (http:/ / www. maximumpc. com/ article/ features/ top_tech_blunders_10_products_massively_failed), maximumpc.com [25] William Stallings (1999). ISDN and Broadband ISDN with Frame Relay and ATM (http:/ / www. pearsonhighered. com/ educator/ product/ ISDN-and-Broadband-ISDN-with-Frame-Relay-and-ATM-4E/ 9780139737442. page) (4th ed.). Prentice Hall. p.542. ISBN0139737448. . [26] Telecommunications and Data Communications Handbook (http:/ / www. wiley. com/ WileyCDA/ WileyTitle/ productCd-0470396075. html), Ray Horak, 2nd edition, Wiley-Interscience, 2008, 791 p., ISBN 0-470-39607-5 [27] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . pp 312-315.

Internet access
[28] "IEEE 802.3 Ethernet Working Group" (http:/ / www. ieee802. org/ 3/ ), web page, IEEE 802 LAN/MAN Standards Committee, accessed 8 May 2012 [29] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . p 322. [30] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . p 323. [31] "ADSL Theory" (http:/ / whirlpool. net. au/ wiki/ ?tag=ADSL_Theory), Australian broadband news and information, Whirlpool, accessed 3 May 2012 [32] "SDSL" (http:/ / docwiki. cisco. com/ wiki/ Digital_Subscriber_Line#SDSL), Internetworking Technology Handbook, Cisco DocWiki, 17 December 2009, accessed 3 May 2012 [33] "KPN starts VDSL trials" (http:/ / www. kpn. com/ artikel. htm?contentid=2895). KPN. . [34] "VDSL Speed" (http:/ / computer. howstuffworks. com/ vdsl2. htm). HowStuffWorks. . [35] "Industrial VDSL Ethernet Extender Over Coaxial Cable, ED3331" (http:/ / www. etherwan. com/ Product/ ViewProduct. asp?View=64). EtherWAN. . [36] "New ITU Standard Delivers 10x ADSL Speeds: Vendors applaud landmark agreement on VDSL2" (http:/ / www. itu. int/ newsroom/ press_releases/ 2005/ 06. html). News release (International Telecommunication Union). 27 May 2005. . Retrieved 22 September 2011. [37] Sturgeon, Jamie (October 18, 2010). "A smarter route to high-speed Net" (http:/ / www. financialpost. com/ entrepreneur/ smarter+ route+ high+ speed/ 3687154/ story. html). FP Entrepreneur (National Post). . Retrieved January 7, 2011. [38] "FTTH Council - Definition of Terms" (http:/ / ftthcouncil. eu/ documents/ Reports/ FTTH-Definitions-Revision_January_2009. pdf). FTTH Council. January 9, 2009. . Retrieved September 1, 2011. [39] "FTTx Primer" (http:/ / www. fiopt. com/ primer. php), Fiopt Communication Services (Calgary), July 2008 [40] "Big gig: NBN to be 10 times faster" (http:/ / www. abc. net. au/ news/ 2010-08-12/ big-gig-nbn-to-be-10-times-faster/ 941408), Emma Rodgers, ABC News, Australian Broadcasting Corporation, 12 August 2010 [41] "Italy gets fiber back on track" (http:/ / www. telecomseurope. net/ content/ italy-gets-fiber-back-track), Michael Carroll, TelecomsEMEA.net, 20 September 2010 [42] "Pirelli Broadband Solutions, the technology partner of fastweb network Ngan" (http:/ / www. freevoipcallsolution. com/ 2010/ 08/ pirelli-broadband-solutions-technology. html), 2 August 2010 [43] "Telecom Italia rolls out 100 Mbps FTTH services in Catania" (http:/ / www. fiercetelecom. com/ story/ telecom-italia-rolls-out-100-mbps-ftth-services-catania/ 2010-11-03?utm_medium=rss& utm_source=rss), Sean Buckley, FierceTelecom, 3 November 2010 [44] "SaskTel Announces 2011 Network Investment and Fiber to the Premises Program" (http:/ / www. sasktel. com/ about-us/ news/ 2011-news-releases/ sasktel-announces-2011-network-investment-and-fiber-to-the-premises. html), SaskTel, Saskatchewan Telecommunications Holding Corporation, 5 April 2011 [45] "How Broadband Over Powerlines Works" (http:/ / computer. howstuffworks. com/ bpl. htm), Robert Valdes, How Stuff Works, accessed 5 May 2012 [46] "North American versus European distribution systems" (http:/ / electrical-engineering-portal. com/ north-american-versus-european-distribution-systems), Edvard, Technical articles, Electrical Engineering Portal, 17 November 2011 [47] B-ISDN asynchronous transfer mode functional characteristics (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 150-199902-I!!PDF-E& type=items), ITU-T Recommendation I.150, February 1999, International Telecommunications Union [48] "Frame Relay" (http:/ / searchenterprisewan. techtarget. com/ definition/ frame-relay), Margaret Rouse, TechTarget, September 2005 [49] "Wi-Fi (wireless networking technology)" (http:/ / www. britannica. com/ EBchecked/ topic/ 1473553/ Wi-Fi). Encyclopdia Britannica. . Retrieved 2010-02-03. [50] Lemstra, Wolter; Hayes, Vic; Groenewegen, John (2010), The Innovation Journey of Wi-Fi: The Road To Global Success, Cambridge University Press, ISBN0-521-19971-9. [51] Discover and Learn (http:/ / www. wi-fi. org/ discover-and-learn), The Wi-Fi Alliance, , retrieved 6 May 2012. [52] "802.11n Delivers Better Range" (http:/ / www. wi-fiplanet. com/ tutorials/ article. php/ 3680781). Wi-Fi Planet. 2007-05-31. . [53] Joshua Bardwell; Devin Akin (2005). Certified Wireless Network Administrator Official Study Guide (http:/ / books. google. com/ books?id=QnMunBGVDuMC& printsec=frontcover& dq=cwna+ official+ study+ guide& hl=en& ei=EJaXTpSaFMPSiALTu4HCDQ& sa=X& oi=book_result& ct=result& resnum=1& ved=0CDAQ6AEwAA#v=onepage& q& f=false) (Third ed.). McGraw-Hill. p.418. ISBN978-0-07-225538-6. . [54] "Member Directory" (http:/ / www. wispa. org/ member-directory), Wireless Internet Service Providers Association (WISPA), accessed 5 May 2012 [55] "WiMax Forum - Technology" (http:/ / www. wimaxforum. org/ technology/ ). . Retrieved 2008-07-22. [56] Carl Weinschenk (April 16, 2010). "Speeding Up WiMax". IT Business Edge. "Today the initial WiMax system is designed to provide 30 to 40 megabit-per-second data rates." [57] "Internet in the Sky" (http:/ / iml. jou. ufl. edu/ projects/ Fall99/ Coffey/ ), D.J. Coffey, accessed 8 May 2012 [58] "How does satellite Internet operate?" (http:/ / computer. howstuffworks. com/ question606. htm), How Stuff Works, Retrieved 5 March 2009.

148

Internet access
[59] Mustafa Ergen (2009). Mobile Broadband: including WiMAX and LTE (http:/ / www. springerlink. com/ content/ 978-0-387-68189-4). Springer Science+Business Media. ISBN978-0-387-68189-4. . [60] "The World in 2011: ITC Facts and Figures" (http:/ / www. itu. int/ ITU-D/ ict/ facts/ 2011/ material/ ICTFactsFigures2011. pdf), International Telecommunications Unions (ITU), Geneva, 2011 [61] "Local Multipoint Distribution Service (LDMS)" (http:/ / www. cse. wustl. edu/ ~jain/ cis788-99/ ftp/ lmds/ index. html), Vinod Tipparaju, November 23, 1999 [62] "LMDS: Broadband Out of Thin Air " (http:/ / www. angelfire. com/ nd/ ramdinchacha/ DEC00. html), Niraj K Gupta, from My Cell, Voice & Data, December 2000 [63] "Review and Analysis of Local Multipoint Distribution System (LMDS) to Deliver Voice, Data, Internet, and Video Services" (http:/ / www. ijest. info/ docs/ IJEST09-01-01. pdf), S.S. Riaz Ahamed, International Journal of Engineering Science and Technology, Vol. 1(1), October 2009, pp. 1-7 [64] "What is a fair price for Internet service?" (http:/ / www. theglobeandmail. com/ news/ technology/ gadgets-and-gear/ hugh-thompson/ what-is-a-fair-price-for-internet-service/ article1890596/ ), Hugh Thompson, Globe and Mail (Toronto), 1 February 2011 [65] Hansell, Saul (January 17, 2008). "Time Warner: Download Too Much and You Might Pay $30 a Movie" (http:/ / bits. blogs. nytimes. com/ 2008/ 01/ 17/ time-warner-download-too-much-and-you-might-pay-30-a-movie/ ?ref=technology). The New York Times. . Retrieved June 6, 2009. [66] "On- and Off-Peak Quotas" (http:/ / www. comparebroadband. com. au/ article_64_On--and-Off-Peak-Quotas. htm), Compare Broadband, 12 July 2009 [67] Cauley, Leslie (April 20, 2008). "Comcast opens up about how it manages traffic" (http:/ / abcnews. go. com/ Technology/ Story?id=4692338& page=1). ABC News. . Retrieved June 6, 2009. [68] Lowry, Tom (March 31, 2009). "Time Warner Cable Expands Internet Usage Pricing" (http:/ / www. businessweek. com/ technology/ content/ mar2009/ tc20090331_726397. htm?campaign_id=rss_daily). BusinessWeek. . Retrieved June 6, 2009. [69] Axelbank, Evan (April 16, 2009). "Time Warner Drops Internet Plan" (http:/ / rochesterhomepage. net/ fulltext?nxd_id=85011). Rochester Homepage. . Retrieved December 6, 2010. [70] "The lives of Asian youth" (http:/ / www. synovate. com/ changeagent/ index. php/ site/ full_story/ the_lives_of_asian_youth/ ), Change Agent, August 2005 [71] Giga.com (http:/ / gigaom. com/ 2010/ 07/ 09/ worldwide-broadband-subscribers/ ) Nearly Half a Billion Broadband Subscribers [72] Amir Hatem Ali, A. (2011). "The power of social media in developing nations" (http:/ / harvardhrj. com/ wp-content/ uploads/ 2009/ 09/ 185-220. pdf), Human Rights Journal, Harvard Law School, Vol. 24, Issue 1 (2011), pp. 185-219 [73] Wattal, S.; Yili Hong; Mandviwalla, M.; Jain, A., "Technology Diffusion in the Society: Analyzing Digital Divide in the Context of Social Class (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=5718600)", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), pp.1-10, 47 January 2011, ISBN 978-0-7695-4282-9 [74] McCollum, S., "Getting Past the 'Digital Divide'" (http:/ / www. tolerance. org/ magazine/ number-39-spring-2011/ getting-past-digital-divide), Teaching Tolerance, No. 39 (Spring 2011), pp. 46-49, and Education Digest, Vol. 77 No. 2 (October 2011), pp. 52-55 [75] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union, March 2010. Accessed on 21 October 2011. [76] Zeller Jr, Tom (October 23, 2006). "LINK BY LINK; The Internet Black Hole That Is North Korea" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9E0CEEDF173FF930A15753C1A9609C8B63& n=Top/ Reference/ Times Topics/ People/ K/ Kim Jong Il). The New York Times. . Retrieved May 5, 2010. [77] The state of the Internet in Cuba, January 2011 (http:/ / som. csudh. edu/ fac/ lpress/ cuba/ chapters/ lpdraft2. docx), Larry Press, Professor of Information Systems at California State University, January 2011 [78] "Table 108: Number and internet access of instructional computers and rooms in public schools, by selected school characteristics: Selected years, 1995 through 2008" (http:/ / nces. ed. gov/ programs/ digest/ d10/ tables/ dt10_108. asp), 2010 Tables and Figures, National Center for Education Statistics, U.S. Department of Education, August 2010, accessed 28 April 2012 [79] "Changes in Cuba: From Fidel to Raul Castro" (http:/ / books. google. com/ books?id=Q2qQZfkOCNsC& pg=PA114& lpg=PA114& dq=Private+ ownership+ of+ computers+ in+ Cuba& source=bl& ots=bKMn5ZraA6& sig=8CcYmtODxcyXSr9LxtjatH_vkdE& hl=en& ei=ydWPTuKbLcaWtweR_qCNDA& sa=X& oi=book_result& ct=result& resnum=4& ved=0CDAQ6AEwAw#v=onepage& q=Private ownership computers& f=false), Perceptions of Cuba: Canadian and American policies in comparative perspective, Lana Wylie, University of Toronto Press Incorporated, 2010, p. 114, ISBN 978-1-4426-4061-0 [80] "Cuba to keep internet limits" (http:/ / www. allbusiness. com/ media-telecommunications/ internet-www/ 11795551-1. html). Agence France-Presse (AFP). 9 February 2009. . [81] "Declaration of Principles" (http:/ / www. itu. int/ wsis/ docs/ geneva/ official/ dop. html), WSIS-03/GENEVA/DOC/4-E, World Summit on the Information Society, Geneva, 12 December 2003 [82] Scott, Aaron (August 11, 2011). "Trends in broadband adoption" (http:/ / www. pewinternet. org/ Reports/ 2010/ Home-Broadband-2010/ Part-1/ Broadband-adoption-among-African-Americans-grew-significantly-between-2009-and-2010. aspx). Home Broadband 2010. Pew Internet & American Life Project. . Retrieved December 23, 2011. [83] Wireless World: Wi-Fi now in rural areas (http:/ / www. physorg. com/ news71497509. html) July 7, 2006

149

Internet access
[84] "Tegola project linking Skye, Knoydart and Loch Hourne" (http:/ / www. tegola. org. uk). . Retrieved 2010-03-16. [85] "Broadband for Rural Nova Scotia" (http:/ / www. gov. ns. ca/ econ/ broadband/ ), Economic and Rural Development, Nova Soctia, Canada, access 27 April 2012 [86] "Judgement 12790 of the Supreme Court" (http:/ / 200. 91. 68. 20/ pj/ scij/ busqueda/ jurisprudencia/ jur_texto_sentencia. asp?nValor2=483874& tem1=013141& param7=0& lResultado=3& nValor1=1& strTipM=T& strLib=LIB), File 09-013141-0007-CO, 30 July 2010. ( English translation (http:/ / www. google. com/ translate_c?langpair=en& u=http:/ / 200. 91. 68. 20/ pj/ scij/ busqueda/ jurisprudencia/ jur_texto_sentencia. asp?nValor2=483874& tem1=013141& param7=0& lResultado=3& nValor1=1& strTipM=T& strLib=LIB)) [87] "Estonia, where being wired is a human right" (http:/ / www. csmonitor. com/ 2003/ 0701/ p07s01-woeu. html), Colin Woodard, Christian Science Monitor, 1 July 2003 [88] "Finland makes 1Mb broadband access a legal right" (http:/ / news. cnet. com/ 8301-17939_109-10374831-2. html), Don Reisinger, CNet News, 14 October 2009 [89] "Top French Court Declares Internet Access 'Basic Human Right'" (http:/ / www. foxnews. com/ story/ 0,2933,525993,00. html). London Times (Fox News). 12 June 2009. . [90] Constitution of Greece As revised by the parliamentary resolution of May 27th 2008 of the VIIIth Revisionary Parliament (http:/ / www. hellenicparliament. gr/ UserFiles/ f3c70a23-7696-49db-9148-f24dce6a27c8/ 001-156 aggliko. pdf), English language translation, Hellenic Parliament [91] Sarah Morris (17 November 2009). "Spain govt to guarantee legal right to broadband" (http:/ / www. reuters. com/ article/ idUSLH61554320091117). Reuters. . [92] Klang, Mathias; Murray, Andrew (2005). Human Rights in the Digital Age (http:/ / www. psypress. com/ 9781904385318). Routledge. p.1. . [93] For the BBC poll Internet users are those who used the Internet within the previous six months. [94] "BBC Internet Poll: Detailed Findings" (http:/ / news. bbc. co. uk/ 1/ shared/ bsp/ hi/ pdfs/ 08_03_10_BBC_internet_poll. pdf), BBC World Service, 8 March 2010 [95] "Internet access is 'a fundamental right'" (http:/ / news. bbc. co. uk/ 2/ hi/ 8548190. stm), BBC News, 8 March 2010 [96] "VI. Conclusions and recommendations" (http:/ / www2. ohchr. org/ english/ bodies/ hrcouncil/ docs/ 17session/ A. HRC. 17. 27_en. pdf), Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, Human Rights Council, Seventeenth session Agenda item 3, United Nations General Assembly, 16 May 2011 [97] "Can the Internet be a Human Right?" (http:/ / www. du. edu/ gsis/ hrhw/ volumes/ 2004/ best-2004. pdf), Michael L. Best, Human rights & Human Welfare, Vol. 4 (2004) [98] Kravets, David (June 3, 2011). "U.N. Report Declares Internet Access a Human Right" (http:/ / www. wired. com/ threatlevel/ 2011/ 06/ internet-a-human-right/ ). Wired. . [99] Measuring the Resilience of the Global Internet Infrastructure System (http:/ / www. stevens-tech. edu/ csr/ fileadmin/ csr/ Publications/ Omer_Measuring_the_Resilience_of_the_Global_Internet__Infrastructure. pdf), 2009 3rd Annual IEEE Systems Conference, 156-162. [100] Inference of Network-Service Disruption upon Natural Disasters (http:/ / users. ece. gatech. edu/ ~jic/ katrina. pdf), accessed 12/05/12. [101] Impact of Hurricane Katrina on Internet Infrastructure (http:/ / www. renesys. com/ tech/ presentations/ pdf/ Renesys-Katrina-Report-9sep2005. pdf), Renesys Report, 9 September 2005, accessed 12/05/2012. [102] Cisco trucks help restore internet after disasters (http:/ / abclocal. go. com/ kgo/ story?section=news/ business& id=8867345), ABC News report, 30 October 2012, accessed 12/05/2012. [103] Taiwans Earthquake and Tsunami Caused Internet accesss Interference (http:/ / www. telkom. co. id/ media-corner/ press-release/ taiwan-s-earthquake-and-tsunami-caused-internet-access-s-interference. html), Telkom Indonesia Press Release, 27 December 2006, accessed 12/05/2012. [104] Impact of Taiwan Earthquake on Internet Access (http:/ / www. ust. hk/ itsc/ channel/ 2007feb/ earthquake. html), Choy, C. (2007). Channel, The Hong Kong University of Science & Technology, 46. Accessed 12/05/2012. [105] Understanding and Mitigating Catastrophic Disruption and Attack (http:/ / www. noblis. org/ NewsPublications/ Publications/ TechnicalPublications/ SigmaJournal/ Documents/ Sigma_RE_UnderstandingAndMitigating. pdf), Masi, D., Smith E., Fischer M. Telecommunications and Cybersecurity, Noblis. Accessed 12/05/2012. [106] Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region (http:/ / aws. amazon. com/ message/ 65648/ ), AWS message, 29 April 2011, accessed 12/05/2012. [107] [ https:/ / aws. amazon. com/ message/ 67457/ Summary of the AWS Service Event in the US East Region], AWS message, 2 July 2012, accessed 12/05/2012. [108] AWS is down: Why the sky is falling (http:/ / justinsb. posterous. com/ aws-down-why-the-sky-is-falling), justinsb's posterous, 21 April 2011, accessed 12/05/2012. [109] Amazon Web Services June 2012 Outage Explained (http:/ / cloud-computing-today. com/ 2012/ 06/ 18/ amazon-web-services-june-2012-outage-explained/ ), Cloud Computing Today, 18 June 2012, accessed 12/05/2012. [110] Will Natural Disasters Kill the Cloud? (http:/ / crashcloud. com/ will-natural-disasters-kill-cloud/ ), CrashCloud, 21 August 2012, accessed 12/05/2012.

150

Internet access

151

External links
European broadband (http://ec.europa.eu/information_society/eeurope/i2010/digital_divide/index_en. htm#European_broadband_portal) Corporate vs. Community Internet (http://www.alternet.org/story/22216/), AlterNet, June 14, 2005, - on the clash between US cities' attempts to expand municipal broadband and corporate attempts to defend their markets Broadband data (http://www.google.com/publicdata/directory#!q=broadband), from Google public data US National Broadband Maps (http://broadbandmap.gov)

Broadband Internet access


Internet access is the means by which individual terminals, computers, mobile devices, and local area networks are connected to the global Internet. Internet access is usually sold by Internet Service Providers (ISPs) that use many different technologies offering a wide range of data rates to the end user. Consumer use first became popular through dial-up connections in the 1980s and 1990s. By the first decade of the 21st century, many consumers had switched away from dial-up to dedicated connections, most Internet access products were being marketed using the term "broadband", and broadband penetration was being treated as a key economic indicator.[1][2]

History
The Internet began as a network funded by the U.S. government to support projects within the government and at universities and research laboratories in the US - but grew over time to include most of the world's large universities and the research arms of many technology companies.[3][4][5] Use by a wider audience only came in 1995 when restrictions on the use of the Internet to carry commercial traffic were lifted.[6] In the early to mid-1980s, most Internet access was from personal computers and workstations directly connected to local area networks or from dial-up connections using modems and analog telephone lines. LANs typically operated at 10 Mbit/s and grew to support 100 and 1000 Mbit/s, while modem data rates grew from 1200 and 2400 bit/s in the 1980s, to 28 and 56 kbit/s by the mid to late 1990s. Initially dial-up connections were made from terminals or computers running terminal emulation software to terminal servers on LANs. These dial-up connections did not support end-to-end use of the Internet protocols and only provided terminal to host connections. The introduction of network access servers (NASs) supporting the Serial Line Internet Protocol (SLIP) and later the Point-to-point protocol (PPP) extended the Internet protocols and made the full range of Internet services available to dial-up users, subject only to limitations imposed by the lower data rates available using dial-up. Broadband Internet access, often shortened to just broadband and also known as high-speed Internet access, are services that provide bit-rates considerably higher than that available using a 56 kbit/s modem. In the U.S. National Broadband Plan of 2009, the Federal Communications Commission (FCC) defined broadband access as "Internet access that is always on and faster than the traditional dial-up access",[7] although the FCC has defined it differently through the years.[8] The term broadband was originally a reference to multi-frequency communication, as opposed to narrowband or baseband. Broadband is now a marketing term that telephone, cable, and other companies use to sell their more expensive higher data rate products.[9] Most broadband services provide a continuous "always on" connection; there is no dial-in process required, and it does not hog phone lines.[10] Broadband provides improved access to Internet services such as: Faster world wide web browsing Faster downloading of documents, photographs, videos, and other large files Telephony, radio, television, and videoconferencing Virtual private networks and remote system administration Online gaming, especially massively multiplayer online role-playing games which are interaction-intensive

Broadband Internet access In the 1990s, the National Information Infrastructure initiative in the U.S. made broadband Internet access a public policy issue.[11] In 2000, most Internet access to homes was provided using dial-up, while many businesses and schools were using broadband connections. In 2000 there were just under 150 million dial-up subscriptions in the 34 OECD countries[1] and fewer than 20 million broadband subscriptions. By 2004, broadband had grown and dial-up had declined so that the number of subscriptions were roughly equal at 130 million each. In 2010, in the OECD countries, over 90% of the Internet access subscriptions used broadband, broadband had grown to more than 300 million subscriptions, and dial-up subscriptions had declined to fewer than 30 million.[12] The broadband technologies in widest use are ADSL and cable Internet access. Newer technologies include VDSL and optical fibre extended closer to the subscriber in both telephone and cable plants. Fibre-optic communication, while only recently being used in premises and to the curb schemes, has played a crucial role in enabling broadband Internet access by making transmission of information at very high data rates over longer distances much more cost-effective than copper wire technology. In areas not served by ADSL or cable, some community organizations and local governments are installing Wi-Fi networks. Wireless and satellite Internet are often used in rural, undeveloped, or other hard to serve areas where wired Internet is not readily available. Newer technologies being deployed for fixed (stationary) and mobile broadband access include WiMAX, LTE, and fixed wireless, e.g., Motorola Canopy. Starting in roughly 2006, mobile broadband access is increasingly available at the consumer level using "3G" and "4G" technologies such as HSPA, EV-DO, HSPA+, and LTE.

152

Availability
In addition to access from home, school, and the workplace Internet access may be available from public places such as libraries and Internet cafes, where computers with Internet connections are available. Some libraries provide stations for connecting users' laptops to local area networks (LANs). Wireless Internet access points are available in public places such as airport halls, in some cases just for brief use while standing. Some access points may also provide coin operated computers. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels also have public terminals, usually fee based. Coffee shops, shopping malls, and other venues increasingly offer wireless access to computer networks, referred to as hotspots, for users who bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. And Mobile broadband access allows smart phones and other digital devices to connect to the Internet from any location from which a mobile phone call can be made.

Data rates

Broadband Internet access


Data rate units (SI) Unit Kilobit per second Megabit/s Gigabit/s Terabit/s Petabit/s Unit Kilobyte per second (103) Megabyte/s Gigabyte/s Terabyte/s Petabyte/s (106) (109) (103) (106) (109) Symbol Bits kbit/s Mbit/s Gbit/s 1,000 bit/s 1,000 kbit/s 1,000 Mbit/s 1,000 Gbit/s 1,000 Tbit/s Bytes 125 bytes/s 125 kB/s 125 MB/s 125 GB/s 125 TB/s Bytes 1,000 bytes/s 1,000 kB/s

153

(1012) Tbit/s (1015) Pbit/s

Symbol Bits kB/s MB/s GB/s 8,000 bit/s 8,000 kbit/s

8,000 Mbit/s 1,000 MB/s 8,000 Gbit/s 1,000 GB/s 8,000 Tbit/s 1,000 TB/s

(1012) TB/s (1015) PB/s

The bit rates for dial-up modems range from as little as 110 bit/s in the late 1950s, to a maximum of from 33 to 64 kbit/s (V.90 and V.92) in the late 1990s. Dial-up connections generally require the dedicated use of a telephone line. Data compression can boost the effective bit rate for a dial-up modem connection to from 220 (V.42bis) to 320 (V.44) kbit/s.[13] However, the effectiveness of data compression is quite variable, depending on the type of data being sent, the condition of the telephone line, and a number of other factors. In reality, the overall data rate rarely exceeds 150 kbit/s.[14] Broadband technologies supply considerably higher bit rates than dial-up, generally without disrupting regular telephone use. Various minimum data rates and maximum latencies have been used in definitions of broadband, ranging from 64kbit/s up to 4.0Mbit/s.[15] In 1988 the CCITT standards body defined "broadband service" as requiring transmission channels capable of supporting bit rates greater than the primary rate which ranged from about 1.5 to 2Mbit/s.[16] A 2006 Organization for Economic Co-operation and Development (OECD) report defined broadband as having download data transfer rates equal to or faster than 256kbit/s.[1] And in 2010 the U.S. Federal Communications Commission (FCC) defined "Basic Broadband" as data transmission speeds of at least 4 Mbit/s downstream (from the Internet to the users computer) and 1Mbit/s upstream (from the users computer to the Internet).[17] The trend is to raise the threshold of the broadband definition as higher data rate services become available.[18] The higher data rate dial-up modems and many broadband services are "asymmetric"supporting much higher data rates for download (toward the user) than for upload (toward the Internet). Data rates, including those given in this article, are usually defined and advertised in terms of the maximum or peak download rate. In practice, these maximum data rates are not always reliably available to the customer.[19] Actual end-to-end data rates can be lower due to a number of factors.[20] Physical link quality can vary with distance and for wireless access with terrain, weather, building construction, antenna placement, and interference from other radio sources. Network bottlenecks may exist at points anywhere on the path from the end-user to the remote server or service being used and not just on the first or last link providing Internet access to the end-user. Users may share access over a common network infrastructure. Since most users do not use their full connection capacity all of the time, this aggregation strategy (known as contended service) usually works well and users can burst to their full data rate at least for brief periods. However, peer-to-peer (P2P) file sharing and high quality

Broadband Internet access streaming video can require high data rates for extended periods, which violates these assumptions and can cause a service to become oversubscribed, resulting in congestion and poor performance. The TCP protocol includes flow-control mechanisms that automatically throttle back on the bandwidth being used during periods of network congestion. This is fair in the sense that all users that experience congestion receive less bandwidth, but it can be frustrating for customers and a major problem for ISPs. In some cases the amount of bandwidth actually available may fall below the threshold required to support a particular service such as video conferencing or streaming live videoeffectively making the service unavailable. When traffic is particularly heavy, an ISP can deliberately throttle back the bandwidth available to classes of users or for particular services. This is known as traffic shaping and careful use can ensure a better quality of service for time critical services even on extremely busy networks. However, overuse can lead to concerns about fairness and network neutrality or even charges of censorship, when some types of traffic are severely or completely blocked.

154

Technologies
Access technologies generally use a modem, which converts digital data to analog for transmission over analog networks such as the telephone and cable networks.[10]

Local Area Networks


Local area networks (LANs) provide Internet access to computers and other devices in a limited area such as a home, school, computer laboratory, or office building, usually at relatively high data rates that typically range from 10 to 1000 Mbit/s.[21] There are wired and wireless LANs. Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies used to build LANs today, but ARCNET, Token Ring, Localtalk, FDDI, and other technologies were used in the past. Most Internet access today is through a LAN, often a very small LAN with just one or two devices attached. And while LANs are an important form of Internet access, this begs the question of how and at what data rate the LAN itself is connected to the rest of the global Internet. The technologies described below are used to make these connections.

Dial-up access
Dial-up access uses a modem and a phone call placed over the public switched telephone network (PSTN) to connect to a pool of modems operated by an ISP. The modem converts a computer's digital signal into an analog signal that travels over a phone line's local loop until it reaches a telephone company's switching facilities or central office (CO) where it is switched to another phone line that connects to another modem at the remote end of the connection.[22] Operating on a single channel, a dial-up connection monopolizes the phone line and is one of the slowest methods of accessing the Internet. Dial-up is often the only form of Internet access available in rural areas as it requires no new infrastructure beyond the already existing telephone network, to connect to the Internet. Typically, dial-up connections do not exceed a speed of 56 kbit/s, as they are primarily made using modems that operate at a maximum data rate of 56 kbit/s downstream (towards the end user) and 34 or 48 kbit/s upstream (toward the global Internet).[10]

Broadband Internet access

155

Broadband access
The term broadband includes a broad range of technologies, all of which provide higher data rate access to the Internet. These technologies use wires or fiber optic cables in contrast to wireless broadband described later. Multilink dial-up Multilink dial-up provides increased bandwidth by bonding two or more dial-up connections together and treating them as a single data channel.[23] It requires two or more modems, phone lines, and dial-up accounts, as well as an ISP that supports multilinking - and of course any line and data charges are also doubled. This inverse multiplexing option was briefly popular with some high-end users before ISDN, DSL and other technologies became available. Diamond and other vendors created special modems to support multilinking.[24] Integrated Services Digital Network (ISDN) Integrated Services Digital Network (ISDN), a switched telephone service capable of transporting voice and digital data, is one of the oldest Internet access methods. ISDN has been used for voice, video conferencing, and broadband data applications. ISDN was very popular in Europe, but less common in North America. Its use peaked in the late 1990s before the availability of DSL and cable modem technologies.[25] Basic rate ISDN, known as ISDN-BRI, has two 64 kbit/s "bearer" or "B" channels. These channels can be used separately for voice or data calls or bonded together to provide a 128kbit/s service. Multiple ISDN-BRI lines can be bonded together to provide data rates above 128 kbit/s. Primary rate ISDN, known as ISDN-PRI, has 23 bearer channels (64 kbit/s each) for a combined data rate of 1.5Mbit/s (US standard). An ISDN E1 (European standard) line has 30 bearer channels and a combined data rate of 1.9Mbit/s. Leased lines Leased lines are dedicated lines used primarily by ISPs, business, and other large enterprises to connect LANs and campus networks to the Internet using the existing infrastructure of the public telephone network or other providers. Delivered using wire, optical fiber, and radio, leased lines are used to provide Internet access directly as well as the building blocks from which several other forms of Internet access are created.[26] T-carrier technology dates to 1957 and provides data rates that range from 56 and 64 kbit/s (DS0) to 1.5 Mbit/s (DS1 or T1), to 45 Mbit/s (DS3 or T3). A T1 line carries 24 voice or data channels (24 DS0s), so customers may use some channels for data and others for voice traffic or use all 24 channels for clear channel data. A DS3 (T3) line carries 28 DS1 (T1) channels. Fractional T1 lines are also available in multiples of a DS0 to provide data rates between 56 and 1,500 kbit/s. T-carrier lines require special termination equipment that may be separate from or integrated into a router or switch and which may be purchased or leased from an ISP.[27] In Japan the equivalent standard is J1/J3. In Europe, a slightly different standard, E-carrier, provides 32 user channels (64 kbit/s) on an E1 (2.0 Mbit/s) and 512 user channels or 16 E1s on an E3 (34.4 Mbit/s). Synchronous Optical Networking (SONET, in the U.S. and Canada) and Synchronous Digital Hierarchy (SDH, in the rest of the world) are the standard multiplexing protocols used to carry high data rate digital bit streams over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs). At lower transmission rates data can also be transferred via an electrical interface. The basic unit of framing is an OC-3c (optical) or STS-3c (electrical) which carries 155.520 Mbit/s. Thus an OC-3c will carry three OC-1 (51.84 Mbit/s) payloads each of which has enough capacity to include a full DS3. Higher data rates are delivered in OC-3c multiples of four providing OC-12c (622.080 Mbit/s), OC-48c (2.488 Gbit/s), OC-192c (9.953 Gbit/s), and OC-768c (39.813 Gbit/s). The "c" at the end of the OC labels stands for "concatenated" and indicates a single data stream rather than several multiplexed data streams.[26] The 1, 10, 40, and 100 Gigabit Ethernet (GbE, 10GbE, 40GbE, and 100GbE) IEEE standards (802.3) allow digital data to be delivered over copper wiring at distances to 100 m and over optical fiber at distances to 40km.[28]

Broadband Internet access Cable Internet access Cable Internet or cable modem access provides Internet access via Hybrid Fiber Coaxial wiring originally developed to carry television signals. Either fiber-optic or coaxial copper cable may connect a node to a customer's location at a connection known as a cable drop. In a cable modem termination system, all nodes for cable subscribers in a neighborhood connect to a cable company's central office, known as the "head end." The cable company then connects to the Internet using a variety of means usually fiber optic cable or digital satellite and microwave transmissions.[29] Like DSL, broadband cable provides a continuous connection with an ISP. Downstream, the direction toward the user, bit rates can be as much as 400Mbit/s for business connections, and 100Mbit/s for residential service in some countries. Upstream traffic, originating at the user, ranges from 384kbit/s to more than 20Mbit/s. Broadband cable access tends to service fewer business customers because existing television cable networks tend to service residential buildings and commercial buildings do not always include wiring for coaxial cable networks.[30] In addition, because broadband cable subscribers share the same local line, communications may be intercepted by neighboring subscribers. Cable networks regularly provide encryption schemes for data traveling to and from customers, but these schemes may be thwarted.[29] Digital subscriber line (DSL, ADSL, SDSL, and VDSL)
DSL technologies Standard ADSL ANSI T1.413 Issue 2 ITU G.992.1 (G.DMT) ITU G.992.2 (G.Lite) ITU G.992.3 ITU G.992.4 ITU G.992.3 Annex J ITU G.992.3 Annex L

156

ADSL2

ADSL2+ ITU G.992.5 ITU G.992.5 Annex M HDSL HDSL2 IDSL MSDSL PDSL RADSL SDSL SHDSL UDSL VDSL VDSL2 ITU G.993.1 ITU G.993.2 ITU G.991.2 ITU G.991.1

Digital Subscriber Line (DSL) service provides a connection to the Internet through the telephone network. Unlike dial-up, DSL can operate using a single phone line without preventing normal use of the telephone line for voice phone calls. DSL uses the high frequencies, while the low (audible) frequencies of the line are left free for regular telephone communication.[10] These frequency bands are subsequently separated by filters installed at the customer's premises.

Broadband Internet access DSL originally stood for "digital subscriber loop". In telecommunications marketing, the term digital subscriber line is widely understood to mean Asymmetric Digital Subscriber Line (ADSL), the most commonly installed variety of DSL. The data throughput of consumer DSL services typically ranges from 256kbit/s to 20Mbit/s in the direction to the customer (downstream), depending on DSL technology, line conditions, and service-level implementation. In ADSL, the data throughput in the upstream direction, (i.e. in the direction to the service provider) is lower than that in the downstream direction (i.e. to the customer), hence the designation of asymmetric.[31] With a symmetric digital subscriber line (SDSL), the downstream and upstream data rates are equal.[32] Very-high-bit-rate digital subscriber line (VDSL or VHDSL, ITU G.993.1)[33] is a digital subscriber line (DSL) standard approved in 2001 that provides data rates up to 52 Mbit/s downstream and 16 Mbit/s upstream over copper wires[34] and up to 85 Mbit/s down- and upstream on coaxial cable.[35] VDSL is capable of supporting applications such as high-definition television, as well as telephone services (voice over IP) and general Internet access, over a single physical connection. VDSL2 (ITU-T G.993.2) is a second-generation version and an enhancement of VDSL.[36] Approved in February 2006, it is able to provide data rates exceeding 100 Mbit/s simultaneously in both the upstream and downstream directions. However, the maximum data rate is achieved at a range of about 300 meters and performance degrades as distance and loop attenuation increases. DSL Rings DSL Rings (DSLR) or Bonded DSL Rings is a ring topology that uses DSL technology over existing copper telephone wires to provide data rates of up to 400Mbit/s.[37] Fiber to the home Fiber-to-the-home (FTTH) is one member of the Fiber-to-the-x (FTTx) family that includes Fiber-to-the-building or basement (FTTB), Fiber-to-the-premises (FTTP), Fiber-to-the-desk (FTTD), Fiber-to-the-curb (FTTC), and Fiber-to-the-node (FTTN).[38] These methods all bring data closer to the end user on optical fibers. The differences between the methods have mostly to do with just how close to the end user the delivery on fiber comes. All of these delivery methods are similar to hybrid fiber-coaxial (HFC) systems used to provide cable Internet access. The use of optical fiber offers much higher data rates over relatively longer distances. Most high-capacity Internet and cable television backbones already use fiber optic technology, with data switched to other technologies (DSL, cable, POTS) for final delivery to customers.[39] Australia has already begun rolling out its National Broadband Network across the country using fiber-optic cables to 93 percent of Australian homes, schools, and businesses.[40] Similar efforts are underway in Italy, Canada, India, and many other countries (see Fiber to the premises by country).,[41][42][43][44] Power-line Internet Power-line Internet, also known as Broadband over power lines (BPL), carries Internet data on a conductor that is also used for electric power transmission. Because of the extensive power line infrastructure already in place, this technology can provide people in rural and low population areas access the Internet with little cost in terms of new transmission equipment, cables, or wires. Data rates are asymmetric and generally range from 256 kbit/s to 2.7 Mbit/s.[45] Because these systems use parts of the radio spectrum allocated to other over-the-air communication services, interference between the services is a limiting factor in the introduction of power-line Internet systems. The IEEE P1901 standard specifies that all powerline protocols must detect existing usage and avoid interfering with it.[45] Power-line Internet has developed faster in Europe than in the U.S. due to a historical difference in power system design philosophies. Data signals cannot pass through the step-down transformers used and so a repeater must be installed on each transformer.[45] In the U.S. a transformer serves a small clusters of from one to a few houses. In

157

Broadband Internet access Europe, it is more common for a somewhat larger transformer to service larger clusters of from 10 to 100 houses. Thus a typical U.S. city requires an order of magnitude more repeaters than in a comparable European city.[46] ATM and Frame Relay Asynchronous Transfer Mode (ATM) and Frame Relay are wide area networking standards that can be used to provide Internet access directly or as building blocks of other access technologies. For example many DSL implementations use an ATM layer over the low-level bitstream layer to enable a number of different technologies over the same link. Customer LANs are typically connected to an ATM switch or a Frame Relay node using leased lines at a wide range of data rates.[47][48] While still widely used, with the advent of Ethernet over optical fiber, MPLS, VPNs and broadband services such as cable modem and DSL, ATM and Frame Relay no longer play the prominent role they once did.

158

Wireless broadband access


Wireless broadband is used to provide both fixed and mobile Internet access. Wi-Fi Wi-Fi is the popular name for a "wireless local area network" that uses one of the IEEE 802.11 standards. It is a trademark of the Wi-Fi Alliance. Individual homes and businesses often use Wi-Fi to connect laptops and smart phones to the Internet. Wi-Fi Hotspots may be found in coffee shops and various other public establishments. Wi-Fi is used to create campus-wide and city-wide wireless networks.[49][50][51]
Wi-Fi logo Wi-Fi networks are built using one or more wireless routers called Access Points. "Ad hoc" computer to computer Wi-Fi" networks are also possible. The Wi-Fi network is connected to the larger Internet using DSL, cable modem, and other Internet access technologies. Data rates range from 6 to 600 Mbit/s. Wi-Fi service range is fairly short, typically 20 to 250 meters or from 65 to 820 feet. Both data rate and range are quite variable depending on the Wi-Fi protocol, location, frequency, building construction, and interference from other devices.[52] Using directional antennas and with careful engineering Wi-Fi can be extended to operate over distances of up to several kilometers, see Wireless ISP below.

Wireless ISP Wireless ISPs typically employ low-cost 802.11 Wi-Fi radio systems to link up remote locations over great distances, but may use other higher-power radio communications systems as well. Traditional 802.11b is an unlicensed omnidirectional service designed to span between 100 and 150 meters (300 to 500ft). By focusing the radio signal using a directional antenna 802.11b can operate reliably over a distance of many kilometres (miles), although the technology's line-of-sight requirements hamper connectivity in areas with hilly or heavily foliated terrain. In addition, compared to hard-wired connectivity, there are security risks (unless robust security protocols are enabled); data rates are significantly slower (2 to 50 times slower); and the network can be less stable, due to interference from other wireless devices and networks, weather and line-of-sight problems.[53] Rural Wireless-ISP installations are typically not commercial in nature and are instead a patchwork of systems built up by hobbyists mounting antennas on radio masts and towers, agricultural storage silos, very tall trees, or whatever other tall objects are available. There are currently a number of companies that provide this service.[54] Motorola Canopy and other proprietary technologies offer wireless access to rural and other markets that are hard to reach using Wi-Fi or WiMAX.

Broadband Internet access WiMAX

159

Worldwide Interoperability for Microwave Access


WiMAX Forum logo

WiMAX (Worldwide Interoperability for Microwave Access) is a set of interoperable implementations of the IEEE 802.16 family of wireless-network standards certified by the WiMAX Forum. WiMAX enables "the delivery of last mile wireless broadband access as an alternative to cable and DSL".[55] The original IEEE 802.16 standard, now called "Fixed WiMAX", was published in 2001 and provided 30 to 40 megabit-per-second data rates.[56] Mobility support was added in 2005. A 2011 update provides data rates up to 1 Gbit/s for fixed stations. WiMax offers a metropolitan area network with a signal radius of about 50km (30 miles), far surpassing the 30-metre (100-foot) wireless range of a conventional Wi-Fi local area network (LAN). WiMAX signals also penetrate building walls much more effectively than Wi-Fi. Satellite broadband Satellites can provide fixed, portable, and mobile Internet access. It is among the most expensive forms of broadband Internet access, but may be the only choice available in remote areas.[57] Data rates range from 2 kbit/s to 1 Gbit/s downstream and from 2 kbit/s to 10 Mbit/s upstream. Satellite communication typically requires a clear line of sight, will not work well through trees and other vegetation, is adversely affected by moisture, rain, and snow (known as rain fade), and may require a fairly large, carefully aimed, directional antenna. Satellites in geostationary Earth orbit (GEO) operate in a fixed position Satellite Internet access via VSAT in Ghana 35,786km (22,236 miles) above the earth's equator. Even at the speed of light (about 300,000km/s or 186,000 miles per second), it takes a quarter of a second for a radio signal to travel from the earth to the satellite and back. When other switching and routing delays are added and the delays are doubled to allow for a full round-trip transmission, the total delay can be 0.75 to 1.25 seconds. This latency is large when compared to other forms of Internet access with typical latencies that range from 0.015 to 0.2 seconds. Long latencies can make some applications, such as video conferencing, voice over IP, multiplayer games, and remote control of equipment, that require a real-time response impracticable via satellite. TCP tuning and TCP acceleration techniques can mitigate some of these problems. GEO satellites do not cover the earth's polar regions.[58] HughesNet and ViaSat are GEO systems. Satellites in Low Earth orbit (LEO, below 2000km or 1243 miles) and Medium earth orbit (MEO, between 2000 and 35,786km or 1,243 and 22,236 miles) are less common, operate at lower altitudes, and are not fixed in their position above the earth. Lower altitudes allow lower latencies and make real-time interactive Internet applications feasible. LEO systems include Globalstar and Iridium. The O3b Satellite Constellation is a proposed MEO system with a latency of 125 ms. COMMStellation is a LEO system, scheduled for launch in 2015, that is expected to have a latency of just 7ms.

Broadband Internet access Mobile broadband Mobile broadband is the marketing term for wireless Internet access delivered through mobile phone towers to computers, mobile phones (called "cell phones" in North America and South Africa), and other digital devices using portable modems. Some mobile services allow more than one device to be connected to the Internet using a single cellular connection using a process called tethering. The modem may be built into laptop computers, tablets, mobile phones, and other devices, added to some devices using PC cards, USB modems, and USB sticks or dongles, or separate wireless modems can be used.[59] Roughly every ten years new mobile phone technology and infrastructure involving a change in the fundamental nature of the service, non-backwards-compatible transmission technology, higher peak data rates, new frequency bands, wider channel frequency bandwidth in Hertz becomes available. These transitions are referred to as generations:
Second generation (2G) from 1991: first mobile data services GSM CSD (2G): 9.6 kbit/s GSM GPRS (2.5G): 56 to 115 kbit/s GSM EDGE (2.75G): up to 237 kbit/s Third generation (3G) from 2001: UMTS W-CDMA: 0.4 Mbit/s down and up UMTS HSPA: 14.4 Mbit/s down; 5.8 Mbit/s up UMTS TDD: 16 Mbit/s down and up CDMA2000 1xRTT: 0.3 Mbit/s down; 0.15 Mbit/s up CDMA2000 EV-DO: 2.5 to 4.9 Mbit/s down; 0.15 to 1.8 up GSM EDGE-Evolution: 1.6 Mbit/s down; 0.5 Mbit/s up Fourth generation (4G) from 2006: HSPA+: 21 to 672 Mbit/s down; 5.8 to 168 Mbit/s up Mobile WiMAX (802.16): 37 to 365 Mbit/s down; 17 to 376 Mbit/s up LTE: 100 to 300 Mbit/s down; 50 to 75 Mbit/s up LTE-Advanced: 100 Mbit/s moving at higher speeds to 1 Gbit/s not moving or moving at low speeds MBWA: (802.20): 80 Mbit/s

160

The download (to the user) and upload (to the Internet) data rates given above are peak or maximum rates and end users will typically experience lower data rates. WiMAX (described in more detail above) was originally developed to deliver fixed wireless service with wireless mobility added in 2005. CDMA2000 EV-DO and MBWA (Mobile Broadband Wireless Access) are no longer being actively developed. In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage.[60] Local Multipoint Distribution Service Local Multipoint Distribution Service (LMDS) is a broadband wireless access technology that uses microwave signals operating between 26GHz and 29GHz.[61] Originally designed for digital television transmission (DTV), it is conceived as a fixed wireless, point-to-multipoint technology for utilization in the last mile. Data rates range from 64 kbit/s to 155 Mbit/s.[62] Distance is typically limited to about 1.5 miles (2.4km), but links of up to 5 miles (8km) from the base station are possible in some circumstances.[63] LMDS has been surpassed in both technological and commercial potential by the LTE and WiMAX standards.

Pricing
Dial-up users pay the costs for making local or long distance phone calls, usually pay a monthly subscription fee, and may be subject to additional per minute or traffic based charges, and connect time limits by their ISP. Though less common today than in the past, some dial-up access is offered for "free" in return for watching banner ads as part of the dial-up service. NetZero, BlueLight, Juno, Freenet (NZ), and Free-nets are examples of services providing free access. Some Wireless community networks continue the tradition of providing free Internet access.

Broadband Internet access Fixed broadband Internet access is often sold under an "unlimited" or flat rate pricing model, with price determined by the maximum data rate chosen by the customer, rather than a per minute or traffic based charge. Per minute and traffic based charges and traffic caps are common for mobile broadband Internet access. With increased consumer demand for streaming content such as video on demand and peer-to-peer file sharing, demand for bandwidth has increased rapidly and for some ISPs the flat rate pricing model may become unsustainable. However, with fixed costs estimated to represent 80-90% of the cost of providing broadband service, the marginal cost to carry additional traffic is low. Most ISPs do not disclose their costs, but the cost to transmit a gigabyte of data in 2011 was estimated to be about $0.03.[64] Some ISPs estimate that about 5% of their users consume about 50% of the total bandwidth.[65] To ensure these high-bandwidth users do not slow down the network for everyone, some ISPs are considering, are experimenting with, or have implemented combinations of traffic based pricing, time of day or "peak" and "off peak" pricing, and bandwidth or traffic caps.[66][67] In Canada, Rogers Hi-Speed Internet and Bell Canada have imposed bandwidth caps.[65] Time Warner experimented with usage-based pricing in Beaumont, Texas.[68] An effort by Time Warner to expand usage-based pricing into the Rochester, New York area met with public resistance, however, and was abandoned.[69]

161

Growth in number of users


Worldwide Internet users 2006 2011a

World population 6.5 billion 7 billion Not using the Internetb Using the Internetb Users in the developing worldb Users in the developed worldb Users in Chinab
a

82% 18% 8% 10% 2%

65% 35% 22% 13% 8%

Estimate. b Share of world population. [60] Source: International Telecommunications Union.

Internet users by region 2006b Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a

2011a,b 13% 56% 29% 27% 48% 74%

3% 39% 11% 11% 13% 50%

Estimate. b Share of regional population. [60] Source: International Telecommunications Union.

Broadband Internet access Access to the Internet grew from an estimated 10 million people in 1993, to almost 40 million in 1995, to 670 million in 2002, and to 2.45 billion in 2011.[60] With market saturation, growth in the number of Internet users is slowing in industrialized countries, but continues in Asia,[70] Africa, Latin America, the Caribbean, and the Middle East. There were roughly 0.6 billion fixed broadband subscribers and almost 1.2 billion mobile broadband subscribers in 2011.[71] In developed countries people frequently use both fixed and mobile broadband networks. In developing countries mobile broadband is often the only access method available.[60]

162

Digital Divide
Despite its tremendous growth, Internet access is not distributed equally within or between [60][72] countries. The digital divide refers to the gap between people with effective access to information and communications technology (ICT), and those with very limited or no access. The gap between people with Internet access and those without is one of many aspects of the List of countries by number of Internet usersInternet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union. digital divide.[73] Whether someone has access to the Internet can depend greatly on financial status, geographical location as well as government policies. Low-income, rural, and minority populations have received special scrutiny as the technological "have-nots."[74] Government policies play a tremendous role in bringing Internet access to or limiting access for underserved groups, regions, and countries. For example in Pakistan, which is pursuing an aggressive IT policy aimed at boosting its drive for economic modernization, the number of Internet users grew from 133,900 (0.1% of the population) in 2000 to 31 million (17.6% of the population) in 2011.[75] In countries such as North Korea and Cuba there is relatively little access to the Internet due to the governments' fear of political instability that might accompany the benefits of access to the global Internet.[76] The U.S. trade embargo is another barrier limiting Internet access in Cuba.[77] In the United States, billions of dollars has been invested in efforts to narrow the digital divide and bring Internet access to more people in low-income and rural areas of the United States. The Obama administration has continued this commitment to narrowing the digital divide through the use of stimulus funding.[74] The National Center for Education Statistics reported that 98% of all U.S. classroom computers had Internet access in 2008 with roughly one computer with Internet access available for every three students. The percentage and ratio of students to computers was the same for rural schools (98% and 1 computer for every 2.9 students).[78] Access to computers is a dominant factor in determining the level of Internet access. In 2011, in developing countries, 25% of households had a computer and 20% had Internet access, while in developed countries the figures were 74% of households had a computer and 71% had Internet access.[60] When buying computers was legalized in Cuba in 2007, the private ownership of computers soared (there were 630,000 computers available on the island in 2008, a 23% increase over 2007).[79][80] Internet access has changed the way in which many people think and has become an integral part of peoples economic, political, and social lives. Providing Internet access to more people in the world allow will them to take advantage of the political, social, economic, educational, and career opportunities available over the Internet.[72] Several of the 67 principles adopted at the World Summit on the Information Society convened by the United

Broadband Internet access Nations in Geneva in 2003, directly address the digital divide.[81] To promote economic development and a reduction of the digital divide, national broadband plans have been and are being developed to increase the availability of affordable high-speed Internet access throughout the world.

163

Rural access
One of the great challenges for Internet access in general and for broadband access in particular is to provide service to potential customers in areas of low population density, such as to farmers, ranchers, and small towns. In cities where the population density is high, it is easier for a service provider to recover equipment costs, but each rural customer may require expensive equipment to get connected. While 66% of Americans had an Internet connection in 2010, that figure was only 50% in rural areas, according to the Pew Internet & American Life Project.[82] Virgin Media advertised over 100 towns across the United Kingdom "from Cwmbran to Clydebank" that have access to their 100Mbit/s service.[19] Wireless Internet Service Provider (WISPs) are rapidly becoming a popular broadband option for rural areas.[83] The technology's line-of-sight requirements may hamper connectivity in some areas with hilly and heavily foliated terrain. However, the Tegola project, a successful pilot in remote Scotland, demonstrates that wireless can be a viable option.[84] The Broadband for Rural Nova Scotia initiative is the first program in North America to guarantee access to "100% of civic addresses" in a region. It is based on Motorola Canopy technology. As of November 2011, under 1000 households have reported access problems. Deployment of a new cell network by one Canopy provider (Eastlink) was expected to provide the alternative of 3G/4G service, possibly at a special unmetered rate, for areas harder to serve by Canopy.[85]

Access as a human right


Several countries have adopted laws that make Internet access a right by requiring the state to work to ensure that Internet access is broadly available and/or preventing states from unreasonably restricting an individual's access to information and the Internet: Costa Rica: A 30 July 2010 ruling by the Supreme Court of Costa Rica stated: "Without fear of equivocation, it can be said that these technologies [information technology and communication] have impacted the way humans communicate, facilitating the connection between people and institutions worldwide and eliminating barriers of space and time. At this time, access to these technologies becomes a basic tool to facilitate the exercise of fundamental rights and democratic participation (e-democracy) and citizen control, education, freedom of thought and expression, access to information and public services online, the right to communicate with government electronically and administrative transparency, among others. This includes the fundamental right of access to these technologies, in particular, the right of access to the Internet or World Wide Web."[86] Estonia: In 2000, the parliament passed a law declaring Internet access a fundamental human right and launched a massive program to expand access to the countryside. The Internet, the government argues, is essential for life in the 21st century.[87] Finland: By July 2010, every person in Finland was to have the right to a one-megabit per second broadband connection, according to the Ministry of Transport and Communications. And by 2015, access to a 100 Mbit/s connection will be a legal right.[88] France: In June 2009, the Constitutional Council, France's highest court, declared access to the Internet to be a basic human right in a strongly-worded decision that struck down portions of the HADOPI law, a law that would have tracked abusers and without judicial review automatically cut off network access to those who continued to download illicit material after two warnings[89] Greece: Article 5A of the Constitution of Greece states that all persons has a right to participate in the Information Society and that the state has an obligation to facilitate the production, exchange, diffusion, and access to

Broadband Internet access electronically transmitted information.[90] Spain: Starting in 2011, Telefnica, the former state monopoly that holds the country's "universal service" contract, has to guarantee to offer "reasonably" priced broadband of at least one megabyte per second throughout Spain.[91] In December 2003, the World Summit on the Information Society (WSIS) was convened under the auspice of the United Nations. After lengthy negotiations between governments, businesses and civil society representatives the WSIS Declaration of Principles was adopted reaffirming the importance of the Information Society to maintaining and strengthening human rights:[] [92] 1. We, the representatives of the peoples of the world, assembled in Geneva from 1012 December 2003 for the first phase of the World Summit on the Information Society, declare our common desire and commitment to build a people-centred, inclusive and development-oriented Information Society, where everyone can create, access, utilize and share information and knowledge, enabling individuals, communities and peoples to achieve their full potential in promoting their sustainable development and improving their quality of life, premised on the purposes and principles of the Charter of the United Nations and respecting fully and upholding the Universal Declaration of Human Rights. 3. We reaffirm the universality, indivisibility, interdependence and interrelation of all human rights and fundamental freedoms, including the right to development, as enshrined in the Vienna Declaration. We also reaffirm that democracy, sustainable development, and respect for human rights and fundamental freedoms as well as good governance at all levels are interdependent and mutually reinforcing. We further resolve to strengthen the rule of law in international as in national affairs. The WSIS Declaration of Principles makes specific reference to the importance of the right to freedom of expression in the "Information Society" in stating: 4. We reaffirm, as an essential foundation of the Information Society, and as outlined in Article 19 of the Universal Declaration of Human Rights, that everyone has the right to freedom of opinion and expression; that this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Communication is a fundamental social process, a basic human need and the foundation of all social organisation. It is central to the Information Society. Everyone, everywhere should have the opportunity to participate and no one should be excluded from the benefits of the Information Society offers."[92] A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[93] conducted for the BBC World Service between 30 November 2009 and 7 February 2010 found that almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right.[94] 50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion.[95] The 88 recommendations made by the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression in a May 2011 report to the Human Rights Council of the United Nations General Assembly include several that bear on the question of the right to Internet access:[96] 67. Unlike any other medium, the Internet enables individuals to seek, receive and impart information and ideas of all kinds instantaneously and inexpensively across national borders. By vastly expanding the capacity of individuals to enjoy their right to freedom of opinion and expression, which is an enabler of other human rights, the Internet boosts economic, social and political development, and contributes to the progress of humankind as a whole. In this regard, the Special Rapporteur encourages other Special Procedures mandate holders to engage on the issue of the Internet with respect to their particular mandates. 78. While blocking and filtering measures deny users access to specific content on the Internet, States have also taken measures to cut off access to the Internet entirely. The Special Rapporteur considers cutting off users from Internet access, regardless of the justification provided, including on the grounds of violating

164

Broadband Internet access intellectual property rights law, to be disproportionate and thus a violation of article 19, paragraph 3, of the International Covenant on Civil and Political Rights. 79. The Special Rapporteur calls upon all States to ensure that Internet access is maintained at all times, including during times of political unrest. 85. Given that the Internet has become an indispensable tool for realizing a range of human rights, combating inequality, and accelerating development and human progress, ensuring universal access to the Internet should be a priority for all States. Each State should thus develop a concrete and effective policy, in consultation with individuals from all sections of society, including the private sector and relevant Government ministries, to make the Internet widely available, accessible and affordable to all segments of population. These statements, opinions, and recommendations have led to the suggestion that Internet access itself is or should become a fundamental human right.[97][98]

165

Natural Disasters and Access


Natural disasters disrupt internet access in profound ways. This is importantnot only for telecommunication companies who own the networks and the businesses who use them, but for emergency crew and displaced citizens as well. The situation is worsened when hospitals or other buildings necessary to disaster response lose their connection. Knowledge gained from studying past internet disruptions by natural disasters could be put to use in planning or recovery. Additionally, because of both natural and man-made disasters, studies in network resiliency are now being conducted to prevent large-scale outages.[99] One way natural disasters impact internet connection is by damaging end sub-networks (subnets), making them unreachable. A study on local networks after Hurricane Katrina found that 26% of subnets within the storm coverage were unreachable.[100] At Hurricane Katrinas peak intensity, almost 35% of networks in Mississippi were without power, while around 14% of Louisianas networks were disrupted.[101] Of those unreachable subnets, 73% were disrupted for four weeks or longer and 57% were at network edges where important emergency organizations such as hospitals and government agencies are mostly located.[100] Extensive infrastructure damage and inaccessible areas were two explanations for the long delay in returning service.[100] The company Cisco has revealed a Network Emergency Response Vehicle (NERV), a truck that makes portable communications possible for emergency responders despite traditional networks being disrupted.[102] A second way natural disasters destroy internet connectivity is by severing submarine cablesfiber-optic cables placed on the ocean floor that provide international internet connection. The 2006 undersea earthquake near Taiwan (Richter scale 7.2) cut six out of seven international cables connected to that country and caused a tsunami that wiped out one of its cable and landing stations.[103][104] The impact slowed or disabled internet connection for five days within the Asia-Pacific region as well as between the region and the United States and Europe.[105] With the rise in popularity of cloud computing, concern has grown over access to cloud-hosted data in the event of a natural disaster. Amazon Web Services (AWS) has been in the news for major network outages in April 2011 and June 2012.[106][107] AWS, like other major cloud hosting companies, prepares for typical outages and large-scale natural disasters with backup power as well as backup data centers in other locations. AWS divides the globe into five regions and then splits each region into availability zones. A data center in one availability zone should be backed up by a data center in a different availability zone. Theoretically, a natural disaster would not affect more than one availability zone.[108] This theory plays out as long as human error is not added to the mix. The June 2012 major storm only disabled the primary data center, but human error disabled the secondary and tertiary backups, affecting companies such as Netflix, Pinterest, Reddit, and Instagram.[109][110]

Broadband Internet access

166

References
[1] The 34 OECD countries are: Australia, Austria, Belgium, Canada, Chile, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. OECD members (http:/ / www. oecd. org/ pages/ 0,3417,en_36734052_36761800_1_1_1_1_1,00. html), accessed 31 April 2012 [2] "OECD Broadband Report Questioned" (http:/ / www. websiteoptimization. com/ bw/ 0705/ ). Website Optimization. . Retrieved June 6, 2009. [3] Ben Segal (1995). A Short History of Internet Protocols at CERN (http:/ / www. cern. ch/ ben/ TCPHIST. html). . [4] Rseaux IP Europens (RIPE) [5] "Internet History in Asia" (http:/ / www. apan. net/ meetings/ busan03/ cs-history. htm). 16th APAN Meetings/Advanced Network Conference in Busan. . Retrieved 25 December 2005. [6] "Retiring the NSFNET Backbone Service: Chronicling the End of an Era" (http:/ / www. merit. edu/ networkresearch/ projecthistory/ nsfnet/ nsfnet_article. php), Susan R. Harris and Elise Gerich, ConneXions, Vol. 10, No. 4, April 1996 [7] "What is Broadband?" (http:/ / www. broadband. gov/ about_broadband. html/ ). The National Broadband Plan. US Federal Communications Commission. . Retrieved July 15, 2011. [8] "Inquiry Concerning the Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion, and Possible Steps to Accelerate Such Deployment Pursuant to Section 706 of the Telecommunications Act of 1996, as Amended by the Broadband Data Improvement Act" (http:/ / transition. fcc. gov/ Daily_Releases/ Daily_Business/ 2010/ db0806/ FCC-10-148A1. pdf). GN Docket No. 10-159, FCC-10-148A1. Federal Communications Commission. August 6, 2010. . Retrieved July 12, 2011. [9] Naveen Bisht; James Connor. "Broadband to the Home: Trends and Issues" (http:/ / books. google. com/ books?id=ipmF3npkMngC& pg=PA1). Broadband Services, Applications, and Networks: Enabling Technologies and Business Models. International Engineering Consortium. p.1. ISBN978-1-931695-24-4. . [10] "How Broadband Works" (http:/ / www. explainthatstuff. com/ howbroadbandworks. html), Chris Woodford, Explain that Stuff, 20 August 2008. Retrieved 19 January. [11] Jeffrey A. Hart; Robert R. Reed; Franois Bar (November 1992). "The building of the internet: Implications for the future of broadband networks". Telecommunications Policy 16 (8): 666689. doi:10.1016/0308-5961(92)90061-S. [12] The Future of the Internet Economy: A Statistical Profile (http:/ / www. oecd. org/ dataoecd/ 24/ 5/ 48255770. pdf), Organization for Economic Co-Operation and Development (OECD), June 2011 [13] Willdig, Karl; Patrik Chen (August 1994). "What You Need to Know about Modems" (http:/ / fndcg0. fnal. gov/ Net/ modm8-94. txt). . Retrieved 2008-03-02. [14] Mitronov, Pavel (2001-06-29). "Modem compression: V.44 against V.42bis" (http:/ / www. digit-life. com/ articles/ compressv44vsv42bis/ ). Digit-Life.com. . Retrieved 2008-03-02. [15] "Birth of Broadband" (http:/ / www. itu. int/ osg/ spu/ publications/ birthofbroadband/ faq. html). ITU. September 2003. . Retrieved July 12, 2011. [16] "Recommendation I.113, Vocabulary of Terms for Broadband aspects of ISDN" (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 113-199706-I!!PDF-E). ITU-T. June 1997 (originally 1988). . Retrieved 19 July 2011. [17] "Sixth Broadband Deployment Report" (http:/ / hraunfoss. fcc. gov/ edocs_public/ attachmatch/ FCC-10-129A1. pdf). FCC. . Retrieved July 23, 2010. [18] Patel, Nilay (March 19, 2008). "FCC redefines "broadband" to mean 768kbit/s, "fast" to mean "kinda slow"" (http:/ / www. engadget. com/ 2008/ 03/ 19/ fcc-redefines-broadband-to-mean-768kbps-fast-to-mean-kinda/ ). Engadget. . Retrieved June 6, 2009. [19] "Virgin Medias ultrafast 100Mb broadband now available to over four million UK homes" (http:/ / mediacentre. virginmedia. com/ Stories/ Virgin-Media-s-ultrafast-100Mb-broadband-now-available-to-over-four-million-UK-homes-211c. aspx). News release. Virgin Media. June 10, 2011. . Retrieved August 18, 2011. [20] Tom Phillips (August 25, 2010). "'Misleading' BT broadband ad banned" (http:/ / www. metro. co. uk/ tech/ 839014-misleading-bt-broadband-ad-banned). UK Metro. . Retrieved July 24, 2011. [21] Gary A. Donahue (June 2007). Network Warrior (http:/ / shop. oreilly. com/ product/ 9780596101510. do). O'Reilly. p.600. ISBN0-596-10151-1. . [22] Dean, Tamara (2010). Network+ Guide to Networks, 5th Ed. [23] "Bonding: 112K, 168K, and beyond " (http:/ / www. 56k. com/ reports/ bonding. shtml), 56K.com [24] "Diamond 56k Shotgun Modem" (http:/ / www. maximumpc. com/ article/ features/ top_tech_blunders_10_products_massively_failed), maximumpc.com [25] William Stallings (1999). ISDN and Broadband ISDN with Frame Relay and ATM (http:/ / www. pearsonhighered. com/ educator/ product/ ISDN-and-Broadband-ISDN-with-Frame-Relay-and-ATM-4E/ 9780139737442. page) (4th ed.). Prentice Hall. p.542. ISBN0139737448. . [26] Telecommunications and Data Communications Handbook (http:/ / www. wiley. com/ WileyCDA/ WileyTitle/ productCd-0470396075. html), Ray Horak, 2nd edition, Wiley-Interscience, 2008, 791 p., ISBN 0-470-39607-5 [27] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . pp 312-315.

Broadband Internet access


[28] "IEEE 802.3 Ethernet Working Group" (http:/ / www. ieee802. org/ 3/ ), web page, IEEE 802 LAN/MAN Standards Committee, accessed 8 May 2012 [29] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . p 322. [30] Dean, Tamara (2009). Network+ Guide to Networks (http:/ / www. cengage. com/ search/ productOverview. do?N=0& Ntk=P_Isbn13& Ntt=9781423902454) (5th ed.). Course Technology, Cengage Learning. ISBN1-4239-0245-9. . p 323. [31] "ADSL Theory" (http:/ / whirlpool. net. au/ wiki/ ?tag=ADSL_Theory), Australian broadband news and information, Whirlpool, accessed 3 May 2012 [32] "SDSL" (http:/ / docwiki. cisco. com/ wiki/ Digital_Subscriber_Line#SDSL), Internetworking Technology Handbook, Cisco DocWiki, 17 December 2009, accessed 3 May 2012 [33] "KPN starts VDSL trials" (http:/ / www. kpn. com/ artikel. htm?contentid=2895). KPN. . [34] "VDSL Speed" (http:/ / computer. howstuffworks. com/ vdsl2. htm). HowStuffWorks. . [35] "Industrial VDSL Ethernet Extender Over Coaxial Cable, ED3331" (http:/ / www. etherwan. com/ Product/ ViewProduct. asp?View=64). EtherWAN. . [36] "New ITU Standard Delivers 10x ADSL Speeds: Vendors applaud landmark agreement on VDSL2" (http:/ / www. itu. int/ newsroom/ press_releases/ 2005/ 06. html). News release (International Telecommunication Union). 27 May 2005. . Retrieved 22 September 2011. [37] Sturgeon, Jamie (October 18, 2010). "A smarter route to high-speed Net" (http:/ / www. financialpost. com/ entrepreneur/ smarter+ route+ high+ speed/ 3687154/ story. html). FP Entrepreneur (National Post). . Retrieved January 7, 2011. [38] "FTTH Council - Definition of Terms" (http:/ / ftthcouncil. eu/ documents/ Reports/ FTTH-Definitions-Revision_January_2009. pdf). FTTH Council. January 9, 2009. . Retrieved September 1, 2011. [39] "FTTx Primer" (http:/ / www. fiopt. com/ primer. php), Fiopt Communication Services (Calgary), July 2008 [40] "Big gig: NBN to be 10 times faster" (http:/ / www. abc. net. au/ news/ 2010-08-12/ big-gig-nbn-to-be-10-times-faster/ 941408), Emma Rodgers, ABC News, Australian Broadcasting Corporation, 12 August 2010 [41] "Italy gets fiber back on track" (http:/ / www. telecomseurope. net/ content/ italy-gets-fiber-back-track), Michael Carroll, TelecomsEMEA.net, 20 September 2010 [42] "Pirelli Broadband Solutions, the technology partner of fastweb network Ngan" (http:/ / www. freevoipcallsolution. com/ 2010/ 08/ pirelli-broadband-solutions-technology. html), 2 August 2010 [43] "Telecom Italia rolls out 100 Mbps FTTH services in Catania" (http:/ / www. fiercetelecom. com/ story/ telecom-italia-rolls-out-100-mbps-ftth-services-catania/ 2010-11-03?utm_medium=rss& utm_source=rss), Sean Buckley, FierceTelecom, 3 November 2010 [44] "SaskTel Announces 2011 Network Investment and Fiber to the Premises Program" (http:/ / www. sasktel. com/ about-us/ news/ 2011-news-releases/ sasktel-announces-2011-network-investment-and-fiber-to-the-premises. html), SaskTel, Saskatchewan Telecommunications Holding Corporation, 5 April 2011 [45] "How Broadband Over Powerlines Works" (http:/ / computer. howstuffworks. com/ bpl. htm), Robert Valdes, How Stuff Works, accessed 5 May 2012 [46] "North American versus European distribution systems" (http:/ / electrical-engineering-portal. com/ north-american-versus-european-distribution-systems), Edvard, Technical articles, Electrical Engineering Portal, 17 November 2011 [47] B-ISDN asynchronous transfer mode functional characteristics (http:/ / www. itu. int/ rec/ dologin_pub. asp?lang=e& id=T-REC-I. 150-199902-I!!PDF-E& type=items), ITU-T Recommendation I.150, February 1999, International Telecommunications Union [48] "Frame Relay" (http:/ / searchenterprisewan. techtarget. com/ definition/ frame-relay), Margaret Rouse, TechTarget, September 2005 [49] "Wi-Fi (wireless networking technology)" (http:/ / www. britannica. com/ EBchecked/ topic/ 1473553/ Wi-Fi). Encyclopdia Britannica. . Retrieved 2010-02-03. [50] Lemstra, Wolter; Hayes, Vic; Groenewegen, John (2010), The Innovation Journey of Wi-Fi: The Road To Global Success, Cambridge University Press, ISBN0-521-19971-9. [51] Discover and Learn (http:/ / www. wi-fi. org/ discover-and-learn), The Wi-Fi Alliance, , retrieved 6 May 2012. [52] "802.11n Delivers Better Range" (http:/ / www. wi-fiplanet. com/ tutorials/ article. php/ 3680781). Wi-Fi Planet. 2007-05-31. . [53] Joshua Bardwell; Devin Akin (2005). Certified Wireless Network Administrator Official Study Guide (http:/ / books. google. com/ books?id=QnMunBGVDuMC& printsec=frontcover& dq=cwna+ official+ study+ guide& hl=en& ei=EJaXTpSaFMPSiALTu4HCDQ& sa=X& oi=book_result& ct=result& resnum=1& ved=0CDAQ6AEwAA#v=onepage& q& f=false) (Third ed.). McGraw-Hill. p.418. ISBN978-0-07-225538-6. . [54] "Member Directory" (http:/ / www. wispa. org/ member-directory), Wireless Internet Service Providers Association (WISPA), accessed 5 May 2012 [55] "WiMax Forum - Technology" (http:/ / www. wimaxforum. org/ technology/ ). . Retrieved 2008-07-22. [56] Carl Weinschenk (April 16, 2010). "Speeding Up WiMax". IT Business Edge. "Today the initial WiMax system is designed to provide 30 to 40 megabit-per-second data rates." [57] "Internet in the Sky" (http:/ / iml. jou. ufl. edu/ projects/ Fall99/ Coffey/ ), D.J. Coffey, accessed 8 May 2012 [58] "How does satellite Internet operate?" (http:/ / computer. howstuffworks. com/ question606. htm), How Stuff Works, Retrieved 5 March 2009.

167

Broadband Internet access


[59] Mustafa Ergen (2009). Mobile Broadband: including WiMAX and LTE (http:/ / www. springerlink. com/ content/ 978-0-387-68189-4). Springer Science+Business Media. ISBN978-0-387-68189-4. . [60] "The World in 2011: ITC Facts and Figures" (http:/ / www. itu. int/ ITU-D/ ict/ facts/ 2011/ material/ ICTFactsFigures2011. pdf), International Telecommunications Unions (ITU), Geneva, 2011 [61] "Local Multipoint Distribution Service (LDMS)" (http:/ / www. cse. wustl. edu/ ~jain/ cis788-99/ ftp/ lmds/ index. html), Vinod Tipparaju, November 23, 1999 [62] "LMDS: Broadband Out of Thin Air " (http:/ / www. angelfire. com/ nd/ ramdinchacha/ DEC00. html), Niraj K Gupta, from My Cell, Voice & Data, December 2000 [63] "Review and Analysis of Local Multipoint Distribution System (LMDS) to Deliver Voice, Data, Internet, and Video Services" (http:/ / www. ijest. info/ docs/ IJEST09-01-01. pdf), S.S. Riaz Ahamed, International Journal of Engineering Science and Technology, Vol. 1(1), October 2009, pp. 1-7 [64] "What is a fair price for Internet service?" (http:/ / www. theglobeandmail. com/ news/ technology/ gadgets-and-gear/ hugh-thompson/ what-is-a-fair-price-for-internet-service/ article1890596/ ), Hugh Thompson, Globe and Mail (Toronto), 1 February 2011 [65] Hansell, Saul (January 17, 2008). "Time Warner: Download Too Much and You Might Pay $30 a Movie" (http:/ / bits. blogs. nytimes. com/ 2008/ 01/ 17/ time-warner-download-too-much-and-you-might-pay-30-a-movie/ ?ref=technology). The New York Times. . Retrieved June 6, 2009. [66] "On- and Off-Peak Quotas" (http:/ / www. comparebroadband. com. au/ article_64_On--and-Off-Peak-Quotas. htm), Compare Broadband, 12 July 2009 [67] Cauley, Leslie (April 20, 2008). "Comcast opens up about how it manages traffic" (http:/ / abcnews. go. com/ Technology/ Story?id=4692338& page=1). ABC News. . Retrieved June 6, 2009. [68] Lowry, Tom (March 31, 2009). "Time Warner Cable Expands Internet Usage Pricing" (http:/ / www. businessweek. com/ technology/ content/ mar2009/ tc20090331_726397. htm?campaign_id=rss_daily). BusinessWeek. . Retrieved June 6, 2009. [69] Axelbank, Evan (April 16, 2009). "Time Warner Drops Internet Plan" (http:/ / rochesterhomepage. net/ fulltext?nxd_id=85011). Rochester Homepage. . Retrieved December 6, 2010. [70] "The lives of Asian youth" (http:/ / www. synovate. com/ changeagent/ index. php/ site/ full_story/ the_lives_of_asian_youth/ ), Change Agent, August 2005 [71] Giga.com (http:/ / gigaom. com/ 2010/ 07/ 09/ worldwide-broadband-subscribers/ ) Nearly Half a Billion Broadband Subscribers [72] Amir Hatem Ali, A. (2011). "The power of social media in developing nations" (http:/ / harvardhrj. com/ wp-content/ uploads/ 2009/ 09/ 185-220. pdf), Human Rights Journal, Harvard Law School, Vol. 24, Issue 1 (2011), pp. 185-219 [73] Wattal, S.; Yili Hong; Mandviwalla, M.; Jain, A., "Technology Diffusion in the Society: Analyzing Digital Divide in the Context of Social Class (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=5718600)", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), pp.1-10, 47 January 2011, ISBN 978-0-7695-4282-9 [74] McCollum, S., "Getting Past the 'Digital Divide'" (http:/ / www. tolerance. org/ magazine/ number-39-spring-2011/ getting-past-digital-divide), Teaching Tolerance, No. 39 (Spring 2011), pp. 46-49, and Education Digest, Vol. 77 No. 2 (October 2011), pp. 52-55 [75] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union, March 2010. Accessed on 21 October 2011. [76] Zeller Jr, Tom (October 23, 2006). "LINK BY LINK; The Internet Black Hole That Is North Korea" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9E0CEEDF173FF930A15753C1A9609C8B63& n=Top/ Reference/ Times Topics/ People/ K/ Kim Jong Il). The New York Times. . Retrieved May 5, 2010. [77] The state of the Internet in Cuba, January 2011 (http:/ / som. csudh. edu/ fac/ lpress/ cuba/ chapters/ lpdraft2. docx), Larry Press, Professor of Information Systems at California State University, January 2011 [78] "Table 108: Number and internet access of instructional computers and rooms in public schools, by selected school characteristics: Selected years, 1995 through 2008" (http:/ / nces. ed. gov/ programs/ digest/ d10/ tables/ dt10_108. asp), 2010 Tables and Figures, National Center for Education Statistics, U.S. Department of Education, August 2010, accessed 28 April 2012 [79] "Changes in Cuba: From Fidel to Raul Castro" (http:/ / books. google. com/ books?id=Q2qQZfkOCNsC& pg=PA114& lpg=PA114& dq=Private+ ownership+ of+ computers+ in+ Cuba& source=bl& ots=bKMn5ZraA6& sig=8CcYmtODxcyXSr9LxtjatH_vkdE& hl=en& ei=ydWPTuKbLcaWtweR_qCNDA& sa=X& oi=book_result& ct=result& resnum=4& ved=0CDAQ6AEwAw#v=onepage& q=Private ownership computers& f=false), Perceptions of Cuba: Canadian and American policies in comparative perspective, Lana Wylie, University of Toronto Press Incorporated, 2010, p. 114, ISBN 978-1-4426-4061-0 [80] "Cuba to keep internet limits" (http:/ / www. allbusiness. com/ media-telecommunications/ internet-www/ 11795551-1. html). Agence France-Presse (AFP). 9 February 2009. . [81] "Declaration of Principles" (http:/ / www. itu. int/ wsis/ docs/ geneva/ official/ dop. html), WSIS-03/GENEVA/DOC/4-E, World Summit on the Information Society, Geneva, 12 December 2003 [82] Scott, Aaron (August 11, 2011). "Trends in broadband adoption" (http:/ / www. pewinternet. org/ Reports/ 2010/ Home-Broadband-2010/ Part-1/ Broadband-adoption-among-African-Americans-grew-significantly-between-2009-and-2010. aspx). Home Broadband 2010. Pew Internet & American Life Project. . Retrieved December 23, 2011. [83] Wireless World: Wi-Fi now in rural areas (http:/ / www. physorg. com/ news71497509. html) July 7, 2006

168

Broadband Internet access


[84] "Tegola project linking Skye, Knoydart and Loch Hourne" (http:/ / www. tegola. org. uk). . Retrieved 2010-03-16. [85] "Broadband for Rural Nova Scotia" (http:/ / www. gov. ns. ca/ econ/ broadband/ ), Economic and Rural Development, Nova Soctia, Canada, access 27 April 2012 [86] "Judgement 12790 of the Supreme Court" (http:/ / 200. 91. 68. 20/ pj/ scij/ busqueda/ jurisprudencia/ jur_texto_sentencia. asp?nValor2=483874& tem1=013141& param7=0& lResultado=3& nValor1=1& strTipM=T& strLib=LIB), File 09-013141-0007-CO, 30 July 2010. ( English translation (http:/ / www. google. com/ translate_c?langpair=en& u=http:/ / 200. 91. 68. 20/ pj/ scij/ busqueda/ jurisprudencia/ jur_texto_sentencia. asp?nValor2=483874& tem1=013141& param7=0& lResultado=3& nValor1=1& strTipM=T& strLib=LIB)) [87] "Estonia, where being wired is a human right" (http:/ / www. csmonitor. com/ 2003/ 0701/ p07s01-woeu. html), Colin Woodard, Christian Science Monitor, 1 July 2003 [88] "Finland makes 1Mb broadband access a legal right" (http:/ / news. cnet. com/ 8301-17939_109-10374831-2. html), Don Reisinger, CNet News, 14 October 2009 [89] "Top French Court Declares Internet Access 'Basic Human Right'" (http:/ / www. foxnews. com/ story/ 0,2933,525993,00. html). London Times (Fox News). 12 June 2009. . [90] Constitution of Greece As revised by the parliamentary resolution of May 27th 2008 of the VIIIth Revisionary Parliament (http:/ / www. hellenicparliament. gr/ UserFiles/ f3c70a23-7696-49db-9148-f24dce6a27c8/ 001-156 aggliko. pdf), English language translation, Hellenic Parliament [91] Sarah Morris (17 November 2009). "Spain govt to guarantee legal right to broadband" (http:/ / www. reuters. com/ article/ idUSLH61554320091117). Reuters. . [92] Klang, Mathias; Murray, Andrew (2005). Human Rights in the Digital Age (http:/ / www. psypress. com/ 9781904385318). Routledge. p.1. . [93] For the BBC poll Internet users are those who used the Internet within the previous six months. [94] "BBC Internet Poll: Detailed Findings" (http:/ / news. bbc. co. uk/ 1/ shared/ bsp/ hi/ pdfs/ 08_03_10_BBC_internet_poll. pdf), BBC World Service, 8 March 2010 [95] "Internet access is 'a fundamental right'" (http:/ / news. bbc. co. uk/ 2/ hi/ 8548190. stm), BBC News, 8 March 2010 [96] "VI. Conclusions and recommendations" (http:/ / www2. ohchr. org/ english/ bodies/ hrcouncil/ docs/ 17session/ A. HRC. 17. 27_en. pdf), Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, Human Rights Council, Seventeenth session Agenda item 3, United Nations General Assembly, 16 May 2011 [97] "Can the Internet be a Human Right?" (http:/ / www. du. edu/ gsis/ hrhw/ volumes/ 2004/ best-2004. pdf), Michael L. Best, Human rights & Human Welfare, Vol. 4 (2004) [98] Kravets, David (June 3, 2011). "U.N. Report Declares Internet Access a Human Right" (http:/ / www. wired. com/ threatlevel/ 2011/ 06/ internet-a-human-right/ ). Wired. . [99] Measuring the Resilience of the Global Internet Infrastructure System (http:/ / www. stevens-tech. edu/ csr/ fileadmin/ csr/ Publications/ Omer_Measuring_the_Resilience_of_the_Global_Internet__Infrastructure. pdf), 2009 3rd Annual IEEE Systems Conference, 156-162. [100] Inference of Network-Service Disruption upon Natural Disasters (http:/ / users. ece. gatech. edu/ ~jic/ katrina. pdf), accessed 12/05/12. [101] Impact of Hurricane Katrina on Internet Infrastructure (http:/ / www. renesys. com/ tech/ presentations/ pdf/ Renesys-Katrina-Report-9sep2005. pdf), Renesys Report, 9 September 2005, accessed 12/05/2012. [102] Cisco trucks help restore internet after disasters (http:/ / abclocal. go. com/ kgo/ story?section=news/ business& id=8867345), ABC News report, 30 October 2012, accessed 12/05/2012. [103] Taiwans Earthquake and Tsunami Caused Internet accesss Interference (http:/ / www. telkom. co. id/ media-corner/ press-release/ taiwan-s-earthquake-and-tsunami-caused-internet-access-s-interference. html), Telkom Indonesia Press Release, 27 December 2006, accessed 12/05/2012. [104] Impact of Taiwan Earthquake on Internet Access (http:/ / www. ust. hk/ itsc/ channel/ 2007feb/ earthquake. html), Choy, C. (2007). Channel, The Hong Kong University of Science & Technology, 46. Accessed 12/05/2012. [105] Understanding and Mitigating Catastrophic Disruption and Attack (http:/ / www. noblis. org/ NewsPublications/ Publications/ TechnicalPublications/ SigmaJournal/ Documents/ Sigma_RE_UnderstandingAndMitigating. pdf), Masi, D., Smith E., Fischer M. Telecommunications and Cybersecurity, Noblis. Accessed 12/05/2012. [106] Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region (http:/ / aws. amazon. com/ message/ 65648/ ), AWS message, 29 April 2011, accessed 12/05/2012. [107] [ https:/ / aws. amazon. com/ message/ 67457/ Summary of the AWS Service Event in the US East Region], AWS message, 2 July 2012, accessed 12/05/2012. [108] AWS is down: Why the sky is falling (http:/ / justinsb. posterous. com/ aws-down-why-the-sky-is-falling), justinsb's posterous, 21 April 2011, accessed 12/05/2012. [109] Amazon Web Services June 2012 Outage Explained (http:/ / cloud-computing-today. com/ 2012/ 06/ 18/ amazon-web-services-june-2012-outage-explained/ ), Cloud Computing Today, 18 June 2012, accessed 12/05/2012. [110] Will Natural Disasters Kill the Cloud? (http:/ / crashcloud. com/ will-natural-disasters-kill-cloud/ ), CrashCloud, 21 August 2012, accessed 12/05/2012.

169

Broadband Internet access

170

External links
European broadband (http://ec.europa.eu/information_society/eeurope/i2010/digital_divide/index_en. htm#European_broadband_portal) Corporate vs. Community Internet (http://www.alternet.org/story/22216/), AlterNet, June 14, 2005, - on the clash between US cities' attempts to expand municipal broadband and corporate attempts to defend their markets Broadband data (http://www.google.com/publicdata/directory#!q=broadband), from Google public data US National Broadband Maps (http://broadbandmap.gov)

Languages used on the Internet


Languages used on the Internet provides information on the number of Internet users and the number of Web sites on the Internet by language.

Languages used
Most web pages on the Internet are in English. A study made by W3Techs shows that as of December 2011 more than 56% of all websites use English as their content language. Other top languages which are used at least in 2% of websites are German, Russian, Japanese, Spanish, Chinese, French, Italian and Portuguese. Note that those figures account for the one million web sites (e.g. 0.27% of the total web sites according to figures of Dec. 2011) the most visited, according to Alexa.com, and language is identified using only the home page of the sites in most of the cases. As a consequence those figures offer a significantly higher percentage for many languages (especially for English) as compared to the real figures for the whole universe (which remain unknown as of today but that some sources estimate below 50% for English - See for instance NET.LANG: Towards a multilingual cyberspace [1]). The use of English online has increased by around 281% over the past ten years, however this is far less than Spanish (743%), Chinese (1,277%), Russian (1,826%) or Arabic (showing a growth of 2,501% over the same period).[2] The foreign language internet is rapidly expanding, with English being used by only 27% of users worldwide. A study on the presence of Romance languages on the Internet, published by the Latin Union in collaboration with FUNREDES, showed that as of November 2007, 45% of the webpages were written in English, 7.8% in Spanish, 4.41% in French, 2.66% in Italian, 1.39% in Portuguese, 0.28% in Romanian and 5.9% in German.[3]

Languages used on the Internet

171

Internet users by language


Estimates of the number of Internet users by language as of 31 May 2011:[4]

Percentage of Internet users by language

Rank Language

Internet users 565,004,000 27% 509,965,000 25% 164,969,000 99,182,000 82,587,000 75,423,000 65,365,000 59,779,000 59,700,000 39,440,000 8% 5% 4% 4% 3% 3% 3% 2%

1 2 3 4 5 6 7 8 9 10

English Chinese Spanish Japanese Portuguese German Arabic French Russian Korean Others

350,557,000 17%

Languages used on the Internet

172

Content languages for websites


Estimates of the percentages of Web sites using various content languages as of 30 December 2011:[5]

Content languages for websites

Rank 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Language English German Russian Japanese Spanish Chinese French Italian Portuguese Polish Arabic Dutch Turkish Swedish Persian Czech Romanian Korean Greek Hungarian Thai

Percentage 56.6% 6.5% 4.8% 4.7% 4.6% 4.5% 3.9% 2.1% 2.0% 1.4% 1.3% 1.1% 1.1% 0.7% 0.7% 0.5% 0.4% 0.3% 0.3% 0.3% 0.3%

Languages used on the Internet

173
22 23 24 25 26 27 28 29 30 31 32 33 34 35 Vietnamese 0.3% Danish Indonesian Finnish Norwegian Bulgarian Slovak Hebrew Croatian Lithuanian Serbian Catalan Slovenian Ukrainian 0.3% 0.3% 0.2% 0.2% 0.2% 0.2% 0.1% 0.1% 0.1% 0.1% 0.1% 0.1% 0.1%

All other languages are used in less than 0.1% of websites.

References
[1] http:/ / net-lang. net/ lang_en [2] Rotaru, Alexandru. "The foreign language internet is good for business" (http:/ / www. scottmclay. co. uk/ foreign-language-internet-good-business/ ). . Retrieved 21 June 2011. [3] "Limbile i culturile pe Internet - Studiu 2007 (Languages and cultures on the Internet - 2007 study)" (http:/ / dtil. unilat. org/ LI/ 2007/ ro/ resultados_ro. htm) (in Romanian). Latin Union. . Retrieved 2011-02-02. [4] "Number of Internet Users by Language" (http:/ / www. internetworldstats. com/ stats7. htm), Internet World Stats, Miniwatts Marketing Group, 31 May 2011, accessed 22 April 2012 [5] "Usage of content languages for websites" (http:/ / w3techs. com/ technologies/ overview/ content_language/ all). W3Techs.com. . Retrieved 30 December 2011.

External links
Internet World Stats (http://www.internetworldstats.com) Internet World Stats Global Internet usage by language (http://www.internetworldstats.com/stats7.htm) Latest stats Internet World Stats Internet users in the world by years (http://www.internetworldstats.com/emarketing. htm) European Travel Commission New Media Trend Watch (http://www.newmediatrendwatch.com/) Estimation of English and non-English Language Use on the WWW, 2000 (http://arxiv.org/abs/cs.cl/ 0006032), web pages, 32 Latin character languages World GDP by Language (http://unicode.org/notes/tn13/) Internet Users Map 2005 (http://explomap.free.fr/?p=3) CIA - The World Factbook (https://www.cia.gov/library/publications/the-world-factbook/) Writing the Webs Future in Many Languages - NYTimes.com (http://www.nytimes.com/2008/12/31/ technology/internet/31hindi.html?partner=rss&emc=rss) English translation of the 23rd CNNIC Statistical Survey Report on Internet Usage in China (http://www. nanjingmarketinggroup.com/knowledge/23rd-report-internet-development-in-China) List of CNNIC statistical reports (http://www.cnnic.cn/en/index/0O/02/index.htm)

Languages used on the Internet Measuring Linguistic Diversity on the Internet (http://www.uis.unesco.org/ev.php?ID=6341_201& ID2=DO_TOPIC), UNESCO (2006) Twelve years of measuring linguistic diversity in the Internet (http://unesdoc.unesco.org/images/0018/ 001870/187016e.pdf), UNESCO (2009) Language Observatory (http://gii2.nagaokaut.ac.jp/gii/blog/lopdiary.php/), Japan Science and Technology Agency FUNREDES Observatory of linguistic and cultural diversity on the Internet (http://funredes.org/lc/english/ inicio/)

174

List of countries by number of Internet subscriptions


This is a sortable list of countries by number of Internet users in 2011, mostly. Internet users are persons using the Internet from any device (including mobile phones) in the last 12 months. Estimates are derived from either household surveys or from Internet subscription data.[1] Note: All United Nations member states are included, except South Sudan. Taiwan is listed as a sovereign country.
Rank Country Internet [2] users Percentage Year of [3] population 38.4 2011 78.3 2011 12.4 2011 80.0 2011 42.2 2011 82.7 2011 44.3 2011 22.4 2011 84.1 2011 77.2 2011 26.5 2011 36.5 2011 82.7 2011 53.30 2012 58.7 2011 44.4 2012 34.1 2011 65.6 2011 15.5 2011 67.0 2011 81.6 2011

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

China United States India Japan Brazil Germany Russia Indonesia United Kingdom France Nigeria Mexico Korea, South Iran Italy Turkey Vietnam Spain Pakistan Argentina Canada

513,100,000 245,203,319 150,000,000 101,228,736 81,798,000 67,364,898 63,450,004 55,000,000 52,731,209 50,290,226 45,039,711 42,000,000 40,329,660 42,000,000 35,800,000 35,000,000 30,858,742 30,654,678 29,128,970 28,000,000 27,757,540

List of countries by number of Internet subscriptions

175
25,000,000 23,852,486 21,691,776 19,554,832 17,723,000 16,685,471 33,600,000 16,303,864 15,812,676 15,371,396 13,811,220 12,412,559 11,744,181 11,115,096 10,675,864 10,290,847 9,642,383 9,116,147 8,494,837 8,270,742 8,136,552 7,928,527 7,787,031 7,435,798 6,688,285 6,557,389 6,375,892 5,950,449 5,885,877 5,702,872 5,470,903 5,425,269 5,306,268 5,231,136 5,131,601 5,066,494 4,976,899 4,712,306 4,700,192 55.9 2011 62.0 2011 26.4 2011 89.8 2011 61.7 2011 72.00 2011 33.0 2011 51.00 2011 23.70 2011 92.30 2011 30.60 2011 47.50 2011 28.00 2011 40.22 2011 36.50 2011 21.00 2011 44.02 2011 53.89 2011 30.20 2011 91.00 2011 78.00 2011 5.00 2011 45.00 2011 72.97 2011 85.20 2011 79.80 2011 19.00 2011 55.30 2011 59.00 2011 53.00 2011 12.00 2011 20.38 2011 74.50 2011 70.00 2011 14.00 2011 22.50 2011 90.00 2011 31.40 2011 89.37 2011

22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59

Colombia Poland Egypt Australia Malaysia Taiwan Philippines Morocco Thailand Netherlands Ukraine Saudi Arabia Kenya Venezuela Peru South Africa Romania Chile Uzbekistan Sweden Belgium Bangladesh Kazakhstan Czech Republic Switzerland Austria Sudan Portugal Hungary Greece Tanzania Nepal Hong Kong Israel Algeria Syria Denmark Ecuador Finland

List of countries by number of Internet subscriptions

176
4,698,640 4,408,931 4,237,239 4,156,012 4,077,107 3,935,090 3,825,957 3,689,698 3,617,754 3,604,065 3,597,097 3,588,244 3,534,610 3,401,619 3,192,587 3,170,498 3,085,054 3,035,605 2,592,409 2,575,587 2,329,415 2,324,141 2,299,873 2,271,387 2,212,665 2,154,413 2,059,012 1,927,648 1,925,956 1,897,236 1,779,211 1,700,587 1,676,596 1,621,250 1,594,060 1,580,335 1,543,829 1,543,715 1,519,979 50.00 2011 93.97 2011 13.01 2011 39.10 2011 74.44 2011 75.00 2011 39.60 2011 86.00 2011 51.00 2011 70.00 2011 14.91 2011 76.82 2011 35.50 2011 14.11 2011 15.00 2011 70.71 2011 42.20 2011 30.00 2011 14.78 2011 23.23 2011 60.00 2011 55.00 2011 65.05 2011 34.90 2011 17.50 2011 52.00 2011 68.00 2011 42.12 2011 74.20 2011 15.70 2011 48.00 2011 51.40 2011 36.56 2011 11.73 2011 86.20 2011 71.68 2011 11.50 2011 23.90 2011 5.00 2011

60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Azerbaijan Norway Uganda Tunisia Slovakia Singapore Belarus New Zealand Bulgaria United Arab Emirates Yemen Ireland Dominican Republic Ghana Sri Lanka Croatia Serbia Bolivia Angola Cuba Bosnia and Herzegovina Palestinian Authority Lithuania Jordan Senegal Lebanon Oman Costa Rica Kuwait Zimbabwe Puerto Rico Uruguay Georgia Guatemala Qatar Latvia Zambia Paraguay Iraq

List of countries by number of Internet subscriptions

177
1,487,878 1,477,617 1,467,387 1,440,066 1,403,766 1,294,827 1,177,845 1,090,155 1,074,012 993,824 986,801 985,565 981,467 980,307 974,476 935,323 903,540 860,554 807,615 795,930 677,583 646,298 626,664 600,628 582,949 529,198 528,779 502,544 473,092 457,451 455,753 455,649 453,952 406,998 368,248 332,342 326,376 300,648 295,567 5.00 2011 42.70 2011 49.00 2011 72.00 2011 38.00 2011 15.90 2011 56.70 2011 20.00 2011 17.69 2011 13.03 2011 4.30 2011 5.00 2011 76.50 2011 17.00 2011 1.10 2011 77.00 2011 31.50 2011 1.20 2011 8.37 2010 7.00 2011 55.20 2011 57.68 2011 20.00 2011 10.60 2011 9.00 2011 0.98 2011 3.33 2011 3.00 2011 2.20 2011 90.89 2011 3.10 2011 34.95 2011 15.30 2009 1.90 2011 6.20 2011 58.00 2011 3.50 2011 2.00 2011 95.02 2011

97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134

Afghanistan Panama Albania Slovenia Moldova Honduras Macedonia Kyrgyzstan El Salvador Tajikistan Mozambique Cameroon Estonia Libya Ethiopia Bahrain Jamaica Congo, Democratic Republic of the Haiti Rwanda Trinidad and Tobago Cyprus Mongolia Nicaragua Laos Burma Malawi Burkina Faso Cte d'Ivoire Luxembourg Cambodia Mauritius Armenia Madagascar Eritrea Macau Benin Mali Iceland

List of countries by number of Internet subscriptions

178
282,648 264,723 257,710 249,875 248,458 247,275 238,326 237,660 237,020 225,058 205,756 205,423 204,420 203,653 195,433 177,011 165,152 148,770 147,674 144,578 137,813 134,300 133,127 128,138 126,133 124,071 123,752 113,603 113,400 108,901 81,323 80,684 72,065 68,708 67,854 60,668 60,557 54,418 52,995 69.22 2011 40.00 2011 12.00 2011 5.00 2011 18.13 2011 28.00 2011 32.00 2011 5.60 2011 3.50 2011 56.00 2011 71.77 2011 1.30 2011 1.90 2011 65.00 2011 10.87 2011 32.00 2011 32.00 2011 21.00 2011 4.50 2011 7.00 2011 1.30 2011 34.00 2011 49.00 2011 50.00 2011 8.00 2011 1.25 2011 2.00 2011 3.00 2011 1.11 2011 2.20 2011 4.22 2011 50.64 2009 82.00 2011 81.00 2011 42.00 2011 88.34 2011 57.07 2011 83.63 2011 7.00 2011

135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167

Malta Montenegro Namibia Turkmenistan Swaziland Fiji Guyana Congo, Republic of the Togo Brunei Barbados Niger Chad Bahamas, The Gambia, The Suriname Cape Verde Bhutan Mauritania Botswana Guinea Maldives French Polynesia New Caledonia Gabon Somalia Papua New Guinea Liberia Burundi Central African Republic Lesotho Guam Antigua and Barbuda Andorra Saint Lucia Bermuda Aruba Guernsey Djibouti

List of countries by number of Internet subscriptions

179
44,674 44,033 42,663 39,774 39,704 39,042 38,497 37,922 37,443 36,909 36,191 36,076 35,694 34,313 33,898 30,959 29,234 26,479 22,940 21,431 19,620 18,821 15,781 13,440 13,344 10,967 10,074 10,039 7,176 5,438 3,163 2,908 2,541 2,288 1,802 1,383 1,337 1,125 43.01 2011 14.00 2010 2.67 2011 80.73 2011 5.50 2011 6.00 2010 43.16 2011 76.00 2010 51.31 2011 64.00 2011 20.16 2011 33.46 2010 69.47 2011 6.00 2011 36.00 2011 85.00 2011 27.40 2009 25.00 2011 75.00 2010 20.00 2010 8.00 2010 65.00 2011 49.60 2011 7.00 2010 0.26 2009 37.00 2010 10.00 2011 0.90 2011 48.60 2010 26.97 2004 30.00 2011 96.38 2011 33.00 2011 3.55 2009 1.21 2000 26.90 2011 8.68 2011 74.48 2009 0.00 2009

168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192

Saint Vincent and the Grenadines Belize Guinea-Bissau Faroe Islands Comoros Equatorial Guinea Seychelles Saint Kitts and Nevis Dominica Greenland So Tom and Prncipe Grenada Cayman Islands Solomon Islands Jersey Liechtenstein Virgin Islands, U.S. Tonga Monaco Micronesia, Federated States of Vanuatu Gibraltar San Marino Samoa Sierra Leone Virgin Islands, British Kiribati East Timor Anguilla Palau Tuvalu [4] Falkland Islands Saint Helena Marshall Islands Mayotte Montserrat Wallis and Futuna Niue Korea, North [5]

605

List of countries by number of Internet subscriptions

180
556 6.00 2010 36.00 2011 1.50 2003

193

Nauru Ascension Tokelau [6]

318 20

Worldwide Internet users 2006 2011a

World population 6.5 billion 7 billion Not using the Internetb Using the Internetb Users in the developing worldb Users in the developed worldb Users in Chinab
a

82% 18% 8% 10% 2%

65% 35% 22% 13% 8%

Estimate. b Share of world population. [7] Source: International Telecommunications Union.

Internet users by region 2006b Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a

2011a,b 13% 56% 29% 27% 48% 74%

3% 39% 11% 11% 13% 50%

Estimate. b Share of regional population. [8] Source: International Telecommunications Union.

List of countries by number of Internet subscriptions

181

References
[1] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union, March 2010. Accessed on 30 September 2011. [2] Population estimates obtained from Internet world stats (http:/ / www. internetworldstats. com/ list2. htm), Miniwatts marketing group, accessed on 06 October 2012. Population for India obtained from (http:/ / www. bbc. co. uk/ news/ technology-20297872), Internet and Mobile Association of India (IAMAI), accessed on 12 November 2012. Population for Falkland Islands obtained from World Population Prospects: The 2010 Revision (http:/ / esa. un. org/ unpd/ wpp/ index. htm), Population Division of the Department of Economic and Social Affairs of the United Nations Secretariat, accessed on 19 August 2012. Population for Ascension Island obtained from About Ascension (http:/ / www. ascension-island. gov. ac/ about), Ascension Island Government, accessed on 19 August 2012. [3] Percentage of Individuals using the Internet 2000-2011 (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ Individuals using the Internet2000-2011. xls), International Telecommunication Union, accessed on 19 August 2012. [4] Population for 2010 was used. [5] Figure of "605" is the mean number of Internet users given a percentage between 0.0000000 and 0.0049999, both of which can be rounded down to 0.00. [6] Population for 31 March 2010 was used. [7] "The World in 2011: ITC Facts and Figures" (http:/ / www. itu. int/ ITU-D/ ict/ facts/ 2011/ material/ ICTFactsFigures2011. pdf), International Telecommunications Unions (ITU), Geneva, 2011 [8] "Internet Users" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ at_glance/ KeyTelecom. html), Key ICT indicators for the ITU/BDT regions, International Telecommunications Unions (ITU), Geneva, 16 November 2011

Internet users per 100 inhabitantsSource: International Telecommunications Union. "Internet users per 100 inhabitants 2001-2011", International Telecommunications Union, Geneva, accessed 4 April 2012

Internet users in 2010 as a percentage of a country's populationSource: International Telecommunications Union.

Number of Internet users in 2010Source: International Telecommunications Union.

[9] "Internet users per 100 inhabitants 2001-2011" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2011/ Internet_users_01-11. xls), International Telecommunications Union, Geneva, accessed 4 April 2012

List of countries by number of broadband Internet subscriptions

182

List of countries by number of broadband Internet subscriptions


Worldwide broadband subscriptions 2007a World population Fixed broadband Developing world Developed world Mobile broadband Developing world Developed world
a

2011a,b 7.0 billion 8.5% 4.8% 25.7% 17.0% 8.5% 56.5%

6.6 billion 5.3% 2.3% 18.3% 4.0% 0.8% 18.5%

Share of regional population. b Estimate. [1] Source: International Telecommunications Union.

Broadband subscriptions Fixed subscriptions: Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe Mobile subscriptions: Africa Americas Arab States Asia and Pacific Commonwealth of Independent States Europe
a

2007a 0.1% 11.0% 0.9% 3.3% 2.3% 18.4% 2007a 0.2% 6.4% 0.8% 3.1% 0.2% 14.7%

2011a,b 0.2% 15.5% 2.2% 6.2% 9.6% 25.8% 2011a,b 3.8% 30.5% 13.3% 10.7% 14.9% 54.1%

Share of regional population. b Estimate. [1] Source: International Telecommunications Union.

List of countries by number of broadband Internet subscriptions

183

This is a list of countries by number of broadband Internet subscriptions.

Countries by number of fixed broadband subscriptions


The following is a list of countries by fixed (wired) broadband Internet subscriptions and penetration rate, compiled by the International Telecommunication Union mostly for the year 2010. It refers to subscriptions to high-speed access to the public Internet (a TCP/IP connection), at downstream speeds equal to, or greater than, 256 kbit/s. This can include for example cable modem, DSL, fibre-to-the-home/building and other fixed (wired) broadband subscriptions. This total is measured irrespective of the method of payment. It excludes subscriptions that have access to data communications (including the Internet) via mobile cellular networks.[2] Note: Because an Internet subscription may be shared by many people, the penetration rate will not reflect the actual level of access to broadband Internet of the population.

Millions of DSL lines by countries at the end of 2005, compared to the previous year.

Worldwide major ADSL operators in number of lines, at the end of the first 2005 half.

Rank

Country or territory

Fixed Per 100 Year [3] broadband inhabitants [3] subscriptions 126,337,000 85,723,155 34,044,729 26,089,800 21,345,000 19,579,823 17,193,570 15,700,000 13,266,310 13,259,398 11,325,022 10,990,000 10,534,492 10,138,741 7,079,792 6,330,000 5,385,000 9.42 2010 27.62 2010 26.91 2010 31.70 2010 34.00 2010 31.56 2010 35.68 2010 10.98 2010 6.81 2010 21.90 2010 9.98 2010 0.9 2010 22.86 2010 29.81 2010 9.73 2010 38.10 2010 24.18 2010

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

China United States Japan Germany France United Kingdom Korea, South Russia Brazil Italy Mexico India Spain Canada Turkey Netherlands Australia

List of countries by number of broadband Internet subscriptions

184
5,265,026 4,960,528 3,862,354 3,631,396 3,373,143 3,188,618 2,987,008 2,980,000 2,954,556 2,908,119 2,594,055 2,257,110 2,111,109 2,092,379 2,078,500 2,052,930 2,002,000 1,956,218 1,900,300 1,864,900 1,788,490 1,723,678 1,722,400 1,665,889 1,556,485 1,532,700 1,521,000 1,496,607 1,449,904 1,426,800 1,268,800 1,089,000 1,088,286 941,405 911,635 900,000 858,219 803,823 786,818 22.68 2010 12.96 2010 9.56 2010 4.13 2010 31.49 2010 4.61 2010 31.85 2010 13.87 2010 6.50 2010 37.94 2010 5.60 2010 19.87 2010 29.93 2010 37.70 2010 7.32 2010 19.23 2010 23.85 2010 19.59 2010 0.79 2010 25.14 2010 10.45 2010 35.30 2010 1.85 2010 17.36 2010 5.37 2010 28.57 2010 14.50 2010 5.45 2010 1.79 2010 8.90 2010 24.94 2010 24.93 2010 14.52 2010 21.06 2010 3.14 2010 2.54 2010 11.18 2010 18.25 2010 10.47 2010

18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55

Taiwan Poland Argentina Vietnam Belgium Thailand Sweden Romania Ukraine Switzerland Colombia Greece Hong Kong Denmark Malaysia Portugal Austria Hungary Indonesia Israel Chile Norway Philippines Belarus Venezuela Finland Czech Republic Saudi Arabia Egypt Kazakhstan Singapore New Zealand Bulgaria Ireland Peru Algeria Serbia Croatia United Arab Emirates

List of countries by number of broadband Internet subscriptions

185
743,000 694,414 684,057 551,520 531,787 500,000 498,682 492,115 481,810 460,000 434,876 367,480 360,039 336,323 307,489 288,236 275,639 269,067 259,000 256,943 253,916 228,316 200,000 197,890 195,784 194,455 175,274 168,368 164,500 145,028 144,057 131,372 116,685 116,569 109,212 105,519 99,108 95,937 89,100 1.48 2010 12.71 2010 20.58 2010 14.71 2010 0.31 2010 0.68 2010 1.56 2010 24.25 2010 4.60 2010 5.01 2010 19.31 2010 10.91 2010 3.63 2010 25.08 2010 8.18 2010 6.19 2010 7.84 2010 7.53 2010 1.80 2010 12.47 2010 5.83 2010 1.09 2010 4.73 2010 1.37 2010 3.16 2010 17.62 2010 2.83 2010 33.18 2010 0.38 2010 10.81 2010 8.19 2010 24.16 2010 4.26 2010 27.99 2010 34.11 2010 3.29 2010 0.06 2010 0.97 2010 0.32 2010

56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92

South Africa Slovakia Lithuania Puerto Rico Pakistan Iran Morocco Slovenia Tunisia Azerbaijan Latvia Uruguay Dominican Republic Estonia Bosnia and Herzegovina Costa Rica Panama Moldova Guatemala Macedonia, Republic of Georgia Sri Lanka Lebanon Ecuador Jordan Cyprus El Salvador Luxembourg Sudan Trinidad and Tobago Qatar Macao Jamaica Malta Iceland Albania Nigeria Bolivia Uzbekistan

List of countries by number of broadband Internet subscriptions

186
85,177 84,000 79,227 78,647 76,000 72,800 71,709 67,625 67,564 60,000 58,435 56,190 55,648 54,804 52,400 50,082 47,600 46,000 45,449 40,100 38,196 35,666 33,000 32,247 30,186 28,147 24,702 24,502 23,250 23,000 21,699 20,180 20,000 19,217 18,852 16,400 16,269 15,971 15,672 2.75 2010 0.35 2010 6.10 2010 0.63 2010 1.00 2010 1.15 2010 2.60 2010 5.36 2010 0.33 2010 0.04 2010 0.20 2010 20.56 2010 1.49 2007 0.16 2010 8.30 2010 0.21 2010 0.82 2010 1.68 2010 1.63 2010 61.75 2010 15.23 2010 0.25 2010 0.26 2010 11.91 2010 13.39 2009 0.44 2010 7.20 2010 28.87 2010 2.70 2010 63.83 2010 5.44 2010 11.58 2010 0.10 2010 17.88 2010 33.53 2010 0.03 2010 33.40 2010 3.22 2010 2.99 2010

93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123

Armenia Yemen Mauritius Senegal Honduras Libya Mongolia Bahrain Syria Bangladesh Nepal Barbados Palestinian Authority Uganda Montenegro Ghana Nicaragua Kuwait Oman Bermuda New Caledonia Cambodia Zimbabwe French Polynesia French Guiana Paraguay Bahamas Andorra Fiji Liechtenstein Brunei Saint Lucia Angola Aruba Cayman Islands Burma Faroe Islands Cape Verde Suriname

List of countries by number of broadband Internet subscriptions

187
15,400 15,148 14,633 14,600 14,437 14,193 13,800 12,502 12,328 12,025 11,978 11,193 10,433 10,267 10,100 9,640 9,391 9,100 8,915 8,675 8,673 8,058 7,900 7,119 6,624 6,278 6,100 5,359 5,120 4,700 4,155 4,107 4,082 3,852 3,707 3,706 3,653 3,569 3,150 0.29 2010 4.80 2010 0.06 2010 27.86 2010 13.82 2010 0.09 2010 38.98 2010 11.43 2010 21.52 2010 0.19 2010 0.60 2010 1.48 2010 35.68 2010 0.08 2010 32.03 2010 0.42 2010 13.86 2010 8.34 2010 2.86 2010 1.20 2010 0.01 2010 0.91 2010 0.04 2010 8.03 2010 0.19 2010 7.26 2010 0.09 2010 0.03 2010 0.03 2010 0.07 2010 0.01 2010 0.00 2010 0.27 2010 0.06 2010 0.02 2010 0.03 2010 24.79 2008 0.04 2010 0.01 2010

124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158

Kyrgyzstan Maldives Mozambique Saint Kitts and Nevis Grenada Burkina Faso Monaco Saint Vincent and the Grenadines Greenland Laos Botswana Guyana Gibraltar Zambia San Marino Namibia Dominica Virgin Islands, U.S. Belize Bhutan Congo, Democratic Republic of the Djibouti Cte d'Ivoire Antigua and Barbuda Mauritania Seychelles Papua New Guinea Madagascar Malawi Tajikistan Kenya Ethiopia Gabon Togo Niger Cuba Anguilla Benin Tanzania

List of countries by number of broadband Internet subscriptions

188
3,000 2,640 2,314 2,000 1,675 1,626 1,500 1,186 1,174 1,061 1,000 1,000 998 900 723 582 537 500 500 500 400 400 350 320 313 239 200 200 186 150 150 124 118 77 50 N/A 1.67 2010 0.02 2010 0.02 2010 0.37 2010 8.26 2010 0.14 2010 0.00 2010 0.17 2010 38.91 2010 7.82 2010 0.01 2010 0.96 2010 0.90 2010 0.90 2010 0.01 2010 0.35 2010 13.04 2010 0.01 2010 0.04 2010 0.21 2010 0.02 2010 3.90 2010 0.02 2010 3.26 2010 2010 1.17 2010 0.00 2010 0.11 2010 0.00 2010 0.00 2010 0.02 2010 0.00 2010 0.00 2010 0.00 2010 0.84 2010

159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186

Guam Rwanda Mali Solomon Islands Cook Islands Swaziland Afghanistan Equatorial Guinea Falkland Islands Wallis and Futuna Cameroon Tonga Micronesia, Federated States of Kiribati Turkmenistan So Tom and Prncipe Saint Helena Guinea Timor-Leste Vanuatu Lesotho Nauru Gambia Tuvalu Ascension Island Palau Burundi Samoa Liberia Chad Comoros Congo, Republic of the Eritrea Iraq Montserrat

List of countries by number of broadband Internet subscriptions

189

Countries by number of broadband Internet users


Abbreviations p.p. population penetration Total p.p. Total population penetration = Total subscribers / Total country population. H.p. Household penetration = Total home subscribers / Total number of households in the country.
Rank World[4] 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Switzerland China [4] [6] Country DSL p.p. Cable p.p. Other p.p. Total p.p. 4.5% 6.3% 10.9% 7.3% [6] 27.9% 29.7% [6] 24.1% 5.9% 5.4% [4] N/A N/A 14.6% 4.2% 3.2% 1.6% 6.4% 10.6% N/A 1.9% N/A 0.0% 2.2% 4.1% 16.9% 0.3% 14.8% 4.1% N/A 4.0% 2.3% 13.2% N/A N/A 6.4% N/A 10.4% N/A N/A 1.7% 14.8% 0.3% 0.1% 0.0% 17.9% N/A 1.5% N/A 0.5% 0.1% 0.1% 0.0% 0.1% 0.9% 0.1% N/A 1.4% 2.5% 0.1% N/A N/A 7.9% N/A 0.8% 7.0% 7.7% 27.2% 26.3% 31.3% 31.4% 30.5% 34.4% H.p. Total subscribers N/A N/A N/A N/A N/A N/A N/A N/A 523,070,000 Date Dec. 2010

116,650,000 Mar. 2011 [5] 83,344,927 33,537,796 25,599,360 20,257,000 18,827,700 16,789,170 16,500,000 16,500,000 [10] Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Mar. 2011 Dec. 2011 May. 2012 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Mar. 2011 Jun. 2010 Jun. 2010 Dec. 2009 Jun. 2010 Dec. 2010 Jun. 2010 Oct. 2010 Dec. 2009 Jun. 2010 Dec. 2009 Jun. 2010

United States Japan [6]

Germany France

[6]

United Kingdom South Korea Russia Brazil India Italy [7] [6]

11.5% 27.2%[8] 8.1% 0.9% 21.3% 10.1% 22.2% 30.1% 12.3% 37.8% 23.4% 21.6% 13.1% 11.2% 30.0% 64.6% 3.4% 31.8% 13.4% 37.1% N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A

[9]

4.7% N/A 20.9%

[11]

14,310,000 12,849,074 10,843,812 10,261,933 10,138,741 9,098,755 6,245,000 5,167,000 5,001,000 4,982,882 4,507,703 3,237,052 3,210,700 3,013,000 2,966,384 2,934,762 2,894,830

[6] [6]

Mexico Spain

7.8% 18.0% 13.1% 9.0 [6] 22.0% 19.3% [4] 10.1% 7.6%

[6] [6]

Canada Turkey

[6]

Netherlands Australia [6]

Republic of China (Taiwan) Poland [6] [12]

Argentina Belgium

6.4% 16.7% N/A 3.3% 17.5% 3.7% 25.9%

[6] [13]

Malaysia Vietnam Sweden

[4]

[6] [4] [6]

Romania

List of countries by number of broadband Internet subscriptions

190
34.3% 5.1% 19.9% 37.3% 18.9% 1.18% 23.0% 4.1% 18.7% 10.2% 1.9% 34.2% 24.3% [18] 2,417,654 2,309,688 2,252,653 2,062,000 2,013,528 2,009,593 1,921,445 1,872,900 1,870,149 1,729,575 1,722,407 1,653,837 1,560,000 1,460,149 1,446,900 1,407,500 1,048,518 1,029,063 912,323 907,859 651,268 437,207 400,000 382,948 300,000 242,134 169,757 122,522 106,258 101,000 N/A N/A Dec. 2009 Mar. 2010 Jan. 2011 Jun. 2010 Jun. 2010 April 2012 Jun. 2010 Dec. 2009 Jun. 2010 Jun. 2010 Dec. 2009 Jun. 2010 Dec. 2007 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Dec. 2007 2008 Dec. 2010 2008 Oct. 2010 Jun. 2010 Jun. 2010 Jun. 2010 Dec. 2007 Dec. 2007 Dec. 2008

27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 N/A N/A

Hong Kong Colombia Greece

[4]

19.3% 3.3% 19.9% 22.3% 10.5% N/A 15.9% 1.8% 8.2% 5.4%

N/A 1.6% 0.0% 10.0% 7.6% N/A 6.9% N/A 8.7% 4.8% N/A 9.2% N/A N/A 4.5% 4.3% 1.5% N/A N/A 3.9 1.6% N/A N/A N/A N/A N/A 5.8% 0.1% 0.0% N/A N/A N/A

N/A 0.2% 0.0% 5.1% 0.7% N/A 0.2% N/A 1.8% 0.0% N/A 4.9% N/A N/A 1.5% 0.3% 0.1% N/A N/A 0.1 3.4% N/A N/A N/A N/A N/A 0.3% 0.2% 2.8% N/A N/A N/A

N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 70.02% N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 93.8% 99.9%

[14]

[15] [6]

Denmark Portugal Pakistan Austria

[6] [16]

[6] [4] [6]

Ukraine

Hungary Chile [6]

Philippines Norway Israel [6]

[4]

1.6% 20.2% 14.9%

[17] [19] [6]

Venezuela

N/A 7.7% 21.8%

5.0% 13.7% 26.4% 24.5% 23.00% 3.3% 20.3% 12.0% 0.5% 0.18% [18] [22]

Czech Republic Finland [6]

New Zealand Croatia Peru [20]

[6]

23.0% N/A N/A [6] 16.3 7.0% N/A N/A N/A N/A

[21]

Republic of Ireland Slovakia Egypt [6]

[17] [22]

Indonesia Uruguay Iran [22]

[23]

11.0% 0.41% [22]

Ecuador

[24] [6]

N/A 28.0% 0.8% 30.5% N/A N/A N/A

1.6% 34.1% 1.1% 33.3% 1.0% [18]

Luxembourg Bolivia Iceland [25]

[6] [17] [17] [26]

Belarus

Monaco

38.0% N/A

Singapore

List of countries by number of broadband Internet subscriptions

191
82.5% Dec. 2007

N/A

Macau

[17]

N/A

N/A

N/A

N/A

N/A

References
[1] "Key Global Telecom Indicators for the World Telecommunication Service Sector" (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ at_glance/ keytelecom. html), International Telecommunications Unions (ITU), Geneva, 2011 [2] Definitions of World Telecommunication/ICT Indicators, March 2010 (http:/ / www. itu. int/ ITU-D/ ict/ material/ TelecomICT_Indicators_Definition_March2010_for_web. pdf), International Telecommunication Union. Accessed on 30 September 2011. [3] Fixed broadband subscriptions (http:/ / www. itu. int/ ITU-D/ ict/ statistics/ material/ excel/ 2010/ FixedBroadbandInternetSubscriptions_00-10. xls), International Telecommunication Union. Accessed on 8 April 2012. [4] "World Broadband Statistics:Short Report Q4 2010" (http:/ / broadband. cti. gr/ el/ download/ broadbandshortreport2010. pdf). Point Topic. March 2010. . Retrieved January 25, 2011. [5] http:/ / china-screen-news. com/ 2011/ 04/ china-telcos-announce-march-2011-subscribers-totals/ [6] Total fixed and wireless broadband subscriptions by country (June 2010) (http:/ / www. oecd. org/ dataoecd/ 22/ 15/ 39574806. xls) and Fixed and wireless broadband subscriptions per 100 inhabitants (June 2010) (http:/ / www. oecd. org/ dataoecd/ 21/ 35/ 39574709. xls). OECD. Retrieved January 25, 2011 [7] "Residential Broadband Statistics" (http:/ / www. acm-consulting. com/ data-downloads/ cat_view/ 16-broadband. html). AC&M-Consulting. 23 June 2011. . Retrieved 19 July 2011. [8] By September 2010 [9] "Dados informativos Banda Larga Fixa" (http:/ / www. anatel. gov. br/ Portal/ verificaDocumentos/ documento. asp?numeroPublicacao=257088& assuntoPublicacao=Dados informativos - Banda Larga& caminhoRel=null& filtro=1& documentoPath=257088. pdf) (in Portuguese) (Press release). ANATEL. 2011-02-23. . Retrieved 2011-03-19. [10] http:/ / www. teleco. com. br/ blarga. asp [11] http:/ / www. trai. gov. in/ WriteReadData/ PressRealease/ Document/ PR-TSD-May12. pdf [12] "Accesos a Internet" (http:/ / www. indec. mecon. ar/ nuevaweb/ cuadros/ 14/ internet_03_11. pdf) (in Spanish) (PDF) (Press release). INDEC. March 15, 2011. . Retrieved March 16, 2011. [13] (http:/ / www. internetworldstats. com/ asia/ my. htm). [14] "Informe de Conectividad 1T-2010" (http:/ / www. mintic. gov. co/ mincom/ documents/ portal/ documents/ root/ informes del sector/ informes de conectividad/ INFORMEDECONECTIVIDAD1T-2010. pdf) (in Spanish) (PDF) (Press release). Ministerio de Tecnologas de la Informacin y las Comunicaciones. August 2010. . Retrieved January 25, 2011. [15] http:/ / news. in. gr/ science-technology/ article/ ?aid=1231106170 [16] (http:/ / www. pta. gov. pk/ index. php?option=com_content& view=article& id=269:telecom-indicators& catid=124:industry-report& Itemid=599), Pakistan Telecommunication Authority. [17] World Broadband Statistics Report Q4 2009 (http:/ / point-topic. com/ contentDownload/ dslanalysis/ world broadband statistics q407. pdf), Point Topic. [18] Total population penetration rate obtained using July 2007 population estimates by the CIA's The World Factbook (https:/ / www. cia. gov/ library/ publications/ the-world-factbook/ fields/ 2119. html), updated on March 6, 2008. [19] "Venezuela logra crecimiento del 18% en banda ancha durante primer semestre de 2010" (http:/ / www. hispanicbusiness. com/ marketwire/ espanol/ 2010/ 12/ 16/ venezuela_logra_crecimiento_del_18_en. htm). HispanicBusiness.com. December 16, 2010. . Retrieved January 25, 2011. [20] "HAKOM Croatian Post and Electronic Communications Agency" (http:/ / www. hakom. hr/ default. aspx?id=60). . [21] "Banda Ancha Crece 9,4% en el Per durante primer semestre de 2010" (http:/ / www. tecnologiahechapalabra. com/ comunicaciones/ internet/ articulo. asp?i=5319) (in Spanish). Tecnologa Hecha Palabra. December 24, 2010. . Retrieved January 25, 2011. [22] http:/ / www. itu. int/ ITU-D/ icteye/ Reporting/ ShowReportFrame. aspx?ReportName=/ WTI/ InformationTechnologyPublic& RP_intYear=2008& RP_intLanguageID=1 [23] "Cifras de los servicios ms solicitado" (http:/ / www. ursec. gub. uy/ scripts/ templates/ portada_principal. asp?nota=portadahome. asp) (in Spanish). URSEC. . Retrieved April 25, 2011. [24] "Ecuador registra un incremento del 57% en el acceso a Internet" (http:/ / www. conatel. gob. ec/ site_conatel/ index. php?option=com_content& view=article& id=1336:ecuador-registra-un-incremento-del-57-en-el-acceso-a-internet& catid=46:noticias-articulos& Itemid=184) (in Spanish). SENATEL. . Retrieved March 19, 2011. [25] "Bases para un Plan Nacional de Banda Ancha de Internet" (http:/ / att. gob. bo/ attachments/ 807_ATT Parte 2. ppt) (in Spanish). Autoridad de Fiscalizacin y Control Social de Telecomunicaciones y Transportes. November 9, 2010. . Retrieved March 19, 2011. [26] "S'poreans are biggest online shoppers in Asia-Pacific region: Poll". The Straits Times. 10 June 2009. "Singapore is now the most wired nation on earth, with the household broadband penetration rate hitting 99.9 per cent last December"

Internet governance

192

Internet governance
Internet governance is the development and application of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. This article describes how the Internet was and is currently governed, some of the controversies that occurred along the way, and the ongoing debates about how the Internet should or should not be governed in the future. Internet governance should not be confused with E-Governance which refers to technology driven governance.

Background
The Internet is a globally distributed network comprising many voluntarily interconnected autonomous networks. It operates without a central governing body. However, to help ensure interoperability, several key technical and policy aspects of the underlying core infrastructure and the principal namespaces are administered by the Internet Corporation for Assigned Names and Numbers (ICANN), headquartered in Marina del Rey, California. ICANN oversees the assignment of globally unique identifiers on the Internet, including domain names, Internet Protocol (IP) addresses, application port numbers in the transport protocols, and many other parameters. This seeks to create a globally unified namespace to ensure the global reach of the Internet. ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. However, the National Telecommunications and Information Administration, an agency of the United States Department of Commerce, continues to have final approval over changes to the DNS root zone.[1][2] This authority over the root zone file makes ICANN one of a few bodies with global, centralized influence over the otherwise distributed Internet.[3] On 16 November 2005, the World Summit on the Information Society, held in Tunis, established the Internet Governance Forum (IGF) to open an ongoing, non-binding conversation among multiple stakeholders about the future of Internet governance.[4] Since WSIS, the term "Internet governance" has been broadened beyond narrow technical concerns to include a wider range of Internet-related policy issues.[5][6]

Definition
The definition of Internet governance has been contested by differing groups across political and ideological lines. One of the main debates concerns the authority and participation of certain actors, such as national governments, corporate entities and civil society, to play a role in the Internet's governance. A Working group established after a United Nations-initiated World Summit on the Information Society (WSIS) proposed the following definition of Internet governance as part of its June 2005 report: Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.[7] Law professor Yochai Benkler developed a conceptualization of Internet governance by the idea of three "layers" of governance: the "physical infrastructure" layer through which information travels; the "code" or "logical" layer that controls the infrastructure; and the "content" layer, which contains the information that signals through the network.[8]

Internet governance

193

History
To understand how the Internet is managed today, it is necessary to know some of the main events of Internet governance.

Formation and growth of the network


The original ARPANET, one of the components which evolved eventually into the Internet, connected four Universities: University of California Los Angeles, University of California Santa Barbara, Stanford Research Institute and Utah University. The IMPs, interface minicomputers, were built during 1969 by Bolt, Beranek and Newman in accord with a proposal by the US Department of Defense Advanced Research Projects Agency, which funded the system as an experiment. By 1973 it connected many more systems and included satellite links to Hawaii and Scandinavia, and a further link from Norway to London. ARPANET continued to grow in size, becoming more a utility than a research project. For this reason, in 1975 it was transferred to the US Defense Communications Agency. During the development of ARPANET, a numbered series of Request for Comments (RFCs) memos documented technical decisions and methods of working as they evolved. The standards of today's Internet are still documented by RFCs, produced through the very process which evolved on ARPANET. Outside of the USA the dominant technology was X.25. The International Packet Switched Service, created during 1978, used X.25 and extended to Europe, Australia, Hong Kong, Canada, and the USA. It allowed individual users and companies to connect to a variety of mainframe systems, including Compuserve. Between 1979 and 1984, a system known as Unix to Unix Copy Program(UUCP) grew to connect 940 hosts, using methods like X.25 links, ARPANET connections, and leased lines. Usenet News, a distributed discussion system, was a major use of UUCP. The Internet protocol suite, developed between 1973 and 1977 with funding from ARPA, was intended to hide the differences between different underlying networks and allow many different applications to be used over the same network. RFC 801 describes how the US Department of Defense organized the replacement of ARPANET's Network Control Program by the new Internet Protocol during January 1983. During the same year, the military systems were removed to a distinct MILNET, and the Domain Name System was invented to manage the names and addresses of computers on the "ARPA Internet". The familiar top-level domains .gov, .mil, .edu, .org, .net, .com, and .int, and the two-letter country code top-level domains were deployed during 1984. Between 1984 and 1986 the US National Science Foundation created the NSFNET backbone, using TCP/IP, to connect their supercomputing facilities. The combined network became generally known as the Internet. By the end of 1989 Australia, Germany, Israel, Italy, Japan, Mexico, the Netherlands, New Zealand, and the United Kingdom had connected to the Internet, which now contained over 160,000 hosts. During 1990, ARPANET formally terminated, and during 1991 the NSF ended its restrictions on commercial use of its part of the Internet. Commercial network providers began to interconnect, extending the Internet. Today almost all Internet infrastructure is provided and owned by the private sector. Traffic is exchanged between these networks, at major interconnect points, in accordance with established Internet standards and commercial agreements.

Internet governance

194

Governors
During 1979 the Internet Configuration Control Board was founded by DARPA to oversee the network's development. During 1984 it was renamed the Internet Advisory Board (IAB), and during 1986 it became the Internet Activities Board. The Internet Engineering Task Force (IETF) was formed during 1986 by the US Government to develop and promote Internet standards. It consisted initially of researchers, but by the end of the year participation was available to anyone, and its business was performed largely by email. From the early days of the network until his death during 1998, Jon Postel oversaw address allocation and other Internet protocol numbering and assignments in his capacity as Director of the Computer Networks Division at the Information Sciences Institute of the University of Southern California, under a contract from the Dept. of Defense. This function eventually became known as the Internet Assigned Numbers Authority (IANA), and as it expanded to include management of the global Domain Name System (DNS) root servers, a small organization grew. Postel also served as RFC Editor. Allocation of IP addresses was delegated to four Regional Internet Registries (RIRs): American Registry for Internet Numbers (ARIN) for North America Rseaux IP Europens - Network Coordination Centre (RIPE NCC) for Europe, the Middle East, and Central Asia Asia-Pacific Network Information Centre (APNIC) for Asia and the Pacific region Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and the Caribbean region In 2004 a new RIR, AfriNIC, was created to manage allocations for Africa. After Jon Postel's death during 1998, the IANA became part of the Internet Corporation for Assigned Names and Numbers (ICANN), a newly created Californian non-profit corporation, initiated during September 1998 by the US Government and awarded a contract by the US Department of Commerce. Initially two board members were elected by the Internet community at large, though this was changed by the rest of the board during 2002 in a little- attended public meeting in Accra, Ghana.[9] During 1992 the Internet Society (ISOC) was founded, with a mission to "assure the open development, evolution and use of the Internet for the benefit of all people throughout the world". Its members include individuals (anyone may join) as well as corporations, organizations, governments, and universities. The IAB was renamed the Internet Architecture Board, and became part of ISOC. The Internet Engineering Task Force also became part of the ISOC. The IETF is overseen currently by the Internet Engineering Steering Group (IESG), and longer term research is carried on by the Internet Research Task Force and overseen by the Internet Research Steering Group. During 2002, a restructuring of the Internet Society gave more control to its corporate members. At the first World Summit on the Information Society (WSIS) in Geneva 2003 the topic of Internet governance was discussed. ICANN's status as a private corporation under contract to the U.S. government created controversy among other governments, especially Brazil, China, South Africa and some Arab states. Since no general agreement existed even on the definition of what comprised Internet governance, United Nations Secretary General Kofi Annan initiated a Working Group on Internet Governance (WGIG) to clarify the issues and report before the second part of the World Summit on the Information Society in Tunis 2005. After much controversial debate, during which the US delegation refused to consider surrendering the US control of the Root Zone file, participants agreed on a compromise to allow for wider international debate on the policy principles. They agreed to establish an Internet Governance Forum, to be convened by United Nations Secretary General before the end of the second quarter of the year 2006. [10] The Greek government volunteered to host the first such meeting.

Internet governance

195

Globalization and governance controversy


The position of the US Department of Commerce as the controller of the Internet gradually attracted criticism from those who felt that control should be more international. A hands-off philosophy by the US Dept. of Commerce helped limit this criticism, but this was undermined in 2005 when the Bush administration intervened to help kill the .xxx top level domain proposal. When the IANA functions were given to a new US non-profit Corporation called ICANN, controversy increased. ICANN's decision-making process was criticised by some observers as being secretive and unaccountable. When the directors' posts which had previously been elected by the "at-large" community of Internet users were abolished, some feared that ICANN would become illegitimate and its qualifications questionable, due to the fact that it was now losing the aspect of being a neutral governing body. ICANN stated that they were merely streamlining decision-making processes, and developing a structure suitable for the modern Internet. Other topics of controversy included the creation and control of generic top-level domains (.com, .org, and possible new ones, such as .biz or .xxx), the control of country-code domains, recent proposals for a large increase in ICANN's budget and responsibilities, and a proposed "domain tax" to pay for the increase. There were also suggestions that individual governments should have more control, or that the International Telecommunication Union or the United Nations should have a function in Internet governance.[11] One such proposal, resulting from a September 2011 summit between India, Brazil, and South Africa (IBSA), would seek to move internet governance into their sphere of dominance.[12] The move is a reaction to a perception that the principles of the 2005 Tunis Agenda for the Information Society have not been met.[12][13] The statement calls for the subordination of independent technical organizations such as ICANN and the ITU to a political organization operating under the auspices of the United Nations.[12]

References
[1] Klein, Hans. (2004). "ICANN and Non-Territorial Sovereignty: Government Without the Nation State." (http:/ / www. ip3. gatech. edu/ research/ KLEIN_ICANN+ Sovereignty. doc) Internet and Public Policy Project. Georgia Institute of Technology. [2] Packard, Ashley (2010). Digital Media Law. Wiley-Blackwell. pp.65. ISBN978-1-4051-8169-3. [3] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.61. ISBN978-0-262-01459-5. [4] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.67. ISBN978-0-262-01459-5. [5] Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. pp.7980. ISBN978-0-262-01459-5. [6] DeNardis, Laura, The Emerging Field of Internet Governance (http:/ / ssrn. com/ abstract=1678343) (September 17, 2010). Yale Information Society Project Working Paper Series. [7] "Report of the Working Group on Internet Governance (WGIG)" (http:/ / www. wgig. org/ docs/ WGIGREPORT. pdf), June 2005), p.4. [8] Yochai Benkler, "From Consumers to Users: Shifting the Deeper Structures of Regulation Towards Sustainable Commons and User Access" (http:/ / www. law. indiana. edu/ fclj/ pubs/ v52/ no3/ benkler1. pdf), 52 Fed. Comm. L.J. 561, (2000). [9] "Net governance chief will step down next year" (http:/ / business. highbeam. com/ 437235/ article-1G1-106850793/ net-governance-chief-step-down-next-year), David McGuire, Washingtonpost.com, 28 May 2002. [10] Gore, Innocent Internet governance: U.S., Developing countries strike deal, Africa News Service Nov. 21, 2005, Gale Canada in Context.Web, 29 Oct 2011. [11] Goldsmith/Wu, Jack/Tim (2006). Who Control the Internet? Illusions of a Borderless World. New York: Oxford University Press Inc.. pp.171. ISBN978-0-19-515266-1. [12] "Recommendations from the IBSA (India-Brazil-South Africa) Multistakeholder meeting on Global Internet Governance" (http:/ / www. culturalivre. org. br/ artigos/ IBSA_recommendations_Internet_Governance. pdf), 1-2 September 2011, Rio de Janeiro, Brazil [13] "Tunis Agenda for the Information Society" (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. html), World Summit on the Information Society, 18 November 2005

Internet governance

196

Further reading
Ruling the Root: Internet Governance and the Taming of Cyberspace (http://mitpress.mit.edu/catalog/item/ default.asp?ttype=2&tid=10205/) by Milton Mueller, MIT Press, 2002. The definitive study of DNS and ICANN's early history. Protocol Politics (http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=11893/), Laura DeNardis, MIT Press, 2009. IP addressing and the migration to IPv6 "One History of DNS" (http://www.byte.org/one-history-of-dns.pdf) by Ross W. Rader. April 2001. Article contains historic facts about DNS and explains the reasons behind the so called "dns war". "The Emerging Field of Internet Governance" (http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1678343), by Laura DeNardis. September 2010. Suggests a framework for understanding problems in Internet governance. Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance (http://www. scribd.com/doc/58805571/ Launching-the-DNS-War-Dot-Com-Privatization-and-the-Rise-of-Global-Internet-Governance) by Craig Simon. December 2006. Ph.D. dissertation containing an extensive history of events which sparked the so-called "dns war". "Habermas@discourse.net: Toward a Critical Theory of Cyberspace" (http://papers.ssrn.com/sol3/papers. cfm?abstract_id=363840), by A. Michael Froomkin, 116 Harv. L. Rev. 749 (2003). Argues that the Internet standards process undertaken by the IETF fulfils Jrgen Habermas's conditions for the best practical discourse. Mueller, Milton L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press. ISBN978-0-262-01459-5. Dutton, William H.; Malcolm Peltu (2007-03). "The emerging Internet governance mosaic: Connecting the pieces". Information Polity: The International Journal of Government & Democracy in the Information Age 12 (1/2): 6381. ISSN15701255.

External links
Internet Governance Project (http://www.internetgovernance.org/) Diplo Internet Governance Community (http://www.diplointernetgovernance.org/) Global Internet Governance Academic Network (GigaNet) (http://www.gig-net.org/) "The Politics and Issues of Internet Governance" (http://www.institut-gouvernance.org/en/analyse/ fiche-analyse-265.html), Milton L. Mueller, April 2007, analysis from the Institute of research and debate on Governance (Institut de recherche et dbat sur la gouvernance) ICANN - the Internet Corporation for Assigned Names and Numbers (http://www.icann.org) World Summit on the Information Society: Geneva 2003 and Tunis 2005 (http://www.itu.int/wsis) The Internet Governance Forum (IGF) (http://www.wgig.org), Working Group on Internet Governance (WGIG) The Future of Global Internet governance (http://www.iit.cnr.it/en/taxonomy/term/334/), Institute of Informatics and Telematics - Consiglio Nazionale delle Ricercha (IIT-CNR), Pisa CircleID: Internet Governance (http://www.circleid.com/topics/internet_governance) "United States cedes control of the internet - but what now? - Review of an extraordinary meeting" (http://www. theregister.co.uk/2006/07/27/ntia_icann_meeting/), Kieren McCarthy, The Register, July 2006 APC Internet Rights Charter (http://www.apc.org/en/pubs/about-apc/apc-internet-rights-charter), Association for Progressive Communications, November 2006

197

Common uses
Timeline of popular Internet services
2011
Google+, a social networking system by Google, integrating several of the company's existing services, such as Google Buzz and Picasa Web Albums. Duolingo, a free language-learning website and crowdsourced text translation platform.

2010
OnLive, a cloud gaming platform where the video games are synchronized, rendered, and stored on remote servers and delivered via the Internet. Diaspora, a free personal web server that implements a distributed social networking service. Flattr, a microdonation system.

2009
Google Docs, a free, Web-based word processor, spreadsheet, presentation, form, and data storage service offered by Google goes out of beta. Wolfram Alpha, the answer engine is born. Kickstarter, an online threshold pledge system for funding creative projects. Web 2.0 Suicide Machine, a service to automatically delete private content and friend relationships from many social networking sites at once.

2008
Encyclopedia of Life, a free, online collaborative encyclopedia intended to document all of the 1.8 million living species known to science. GitHub, a web-based hosting service for software development projects that use the Git revision control system TinEye, a reverse image search engine. Spotify, a DRM-based music streaming service offering unlimited streaming of selected music from a range of major and independent record labels. Jinni, a semantic search and recommendation engine for movies, TV shows and short films. Amazon Elastic Compute Cloud (EC2), a cloud computing platform that allows users to rent virtual computers on which to run their own computer applications. Dropbox, a file hosting service that uses cloud computing to enable users to store and share files and folders with others across the Internet using file synchronization.

Timeline of popular Internet services

198

2007
Google Street View, a technology featured in Google Maps and Google Earth that provides panoramic views from various positions along many streets in the world. Kindle, the e-book reader by Amazon.com is launched together with the e-book virtual bookshop. In July 2010 Amazon announced that e-book sales for its Kindle reader outnumbered sales of hardcover books. Tumblr is a microblogging platform that allows users to post text, images, videos, links, quotes and audio to their tumblelog, a short-form blog. Experience Project, a free social networking website of online communities premised on connecting people through shared life experiences. SoundCloud, an online audio distribution platform which allows collaboration, promotion and distribution of audio recordings.

2006
WikiLeaks, an international non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Twitter is a social networking and micro-blogging service that enables its users to send and read other users' updates, tweets, which are text-based posts of up to 140 characters in length. IMSLP, the International Music Score Library Project. Spokeo, a social network aggregator web site that aggregates data from many online and offline sources launches, raising many privacy concerns. YouPorn, a free pornographic video sharing website. Mint.com is a free web-based personal financial management service for the US and Canada. Khan Academy, free educational video repository with more than 3,000 micro lectures, automated exercises, and tutoring.

2005
YouTube is a video sharing website. Google Earth is a virtual globe computer program. Megaupload, allows users to upload and download files. Musopen, an online music library of copyright-free (public domain) music. OpenID, an open standard that describes how users can be authenticated in a decentralized manner eyeOS, an open source web desktop following the cloud computing concept. Etsy, an e-commerce website focused on handmade or vintage items as well as art and craft supplies. Pandora Radio, an online radio and music recommendation system based on the Music Genome Project.

2004
OpenStreetMap, a collaborative project to create a free editable map of the world. Podcast: A downloadable audio file for listening to on a portable media player. A bit like a radio program that you can save and listen to at your convenience. "Podcast" is a portmanteau of the words "iPod" and "broadcast". Podcasting began to catch hold in late 2004, though the ability to distribute audio and video files easily has been around since before the dawn of the Internet. Facebook is a social networking website. World of Warcraft (WoW) is a massively multiplayer online role-playing game (MMORPG). Flickr is a photo/ video sharing website.

Timeline of popular Internet services

199

2003
Skype, a software application that allows users to make voice calls over the Internet. iTunes is an online store which sells music and videos in downloadable form. MySpace is a social networking website. Steam, a digital distribution, digital rights management, multiplayer and communications platform for computer games developed by Valve Corporation. Second Life is a virtual world. 4chan is created. CouchSurfing, a hospitality exchange network. The Pirate Bay, a Swedish website that hosts torrent files.

2002
Tor, a system intended to enable online anonymity is released. Last.fm, a music recommender system. LinkedIn, a business-oriented social networking site is founded and launched next year. TinyURL, a URL shortening service.

Skyscanner, a flight search engine that allows users to browse for flights via price and location.

2001
Wikipedia, an online encyclopedia. StumbleUpon, a discovery engine that uses collaborative filtering to recommend web content to its users. PartyPoker.com, a set of online poker card rooms. Meetup, an online social networking portal that facilitates offline group meetings in various localities around the world.

2000
Blogger is a blog publishing service that allows private or multi-user blogs with time-stamped entries. Geocaching.com starts its activity. This outdoor sport activity with online support can be considered one of the early forms of geosocial networking. deviantArt, an online community showcasing various forms of user-made artwork. TripAdvisor, travel site that assists customers in gathering travel information, posting reviews and opinions of travel related content and engaging in interactive travel forums.

1999
RSS, the first version of the web feed formats used to publish frequently updated works is created at Netscape. Monster.com, an employment website. SourceForge, a web-based source code repository. It acts as a centralized location for software developers to control and manage open source software development. SETI@home, an internet-based public volunteer computing project. Its purpose is to analyze radio signals, searching for signs of extra terrestrial intelligence. Napster (now defunct) was an online music peer-to-peer file sharing service

Timeline of popular Internet services

200

1998
Google Inc. launched a search engine for web sites of the World Wide Web, subsequently extending search facilities to many types of media, including books, magazines, forums, email, news. Yahoo! Groups a community-driven Internet communication tool, a hybrid between an electronic mailing list and an Internet forum starts off as Yahoo! Clubs PayPal, an e-commerce business allowing payments and money transfers to be made through the Internet.

1997
Babel Fish launched by AltaVista. It was the first language translation service for web content, with technology provided by SYSTRAN. Netflix, an American corporation that offers both on-demand video streaming over the internet, and flat rate online video rental. Go Daddy, an Internet domain registrar and Web hosting company. About.com, an online resource for original information and advice.

1996
Ultima Online (UO), a graphical massively multiplayer online role-playing game (MMORPG). Internet Archive is an archive of periodically cached versions of websites. Hotmail, a free web-based email service. Ticketmaster, a ticket sales and distribution company goes online and sells its first ticket through their platform. Shopzilla, a price comparison service.

1995
Ebay is an auction and shopping website. Wiki: A website that anyone can edit. Craigslist, a centralized network of online communities, featuring free online classified advertisements. AltaVista, a web search engine owned by Yahoo!. It was once one of the most popular search engines but its popularity declined with the rise of Google.

1994
Amazon.com is an online retailer, best known for selling books, but now sells all kinds of goods. GeoCities a free web hosting service, now defunct, founded as Beverly Hills Internet (BHI) by David Bohnett and John Rezner . The Yahoo! website started off as a web directory and soon became a webportal offering all kinds of Internet services. Match.com, an online dating company. FedEx.com launches, being the first transportation web site to offer online package tracking.

Timeline of popular Internet services

201

1993
Blog: A blog (a contraction of the term weblog) is a type of website which resembles an online diary. Entries are commonly displayed in reverse-chronological order. Originally hand-coded, there are now blogging tools (a kind of content management system) to facilitate searching and linking to other blogs. CDDB, a database for software applications to look up audio CD (compact disc) information over the Internet. Hutchison Paging email gateway allows emails to be sent to message pagers in the UK. This same system worked with Orange mobile phones when they were launched in 1994, emails would arrive as texts.

1992
HTML was developed by a British engineer, Tim Berners-Lee while working in CERN. This was devised so that reports from CERN, including photographs, graphs and tables could be shared (served) across the web. Veronica (search engine) provides an index of files on Gopher servers.

1991
arXiv, an open access archive for electronic preprints of scientific papers. Gopher: A hypertext system which was soon largely replaced by the World Wide Web.

1990
ARPANET was retired and merged into the NSFNET. IMDb, the Internet Movie Database. The Archie search engine lists names of files on FTP sites.

1988
Internet Relay Chat (IRC): A form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message.

1986
LISTSERV the first electronic mailing list software application,

1983
Internet: A global computer network which was created by interconnecting various existing networks with the TCP/IP protocol suite.

1982
First standardization of the Simple Mail Transfer Protocol, a network transmission standard for the transport of email.

Timeline of popular Internet services

202

1979
Usenet: A distributed threaded discussion and file sharing system; a collection of forums known as newsgroups, that was a precursor to today's web-based forums. One notable difference from a BBS or web forum is that there is no central system owner. Usenet is distributed among a large, constantly changing conglomeration of servers which store and forward messages to one another.

1978
MUD: First real-time, multi-player MUD adventure game was developed by Roy Trubshaw and Richard Bartle at Essex University, England.

1973
E-mail: First proposal for standardization of electronic mail message format in RFC 561. ARPANET made its first international connection between University college in London and Royal Radar establishment in Norway.

1971
FTP: File Transfer Protocol Project Gutenberg, a volunteer effort to digitize and archive cultural works.

1969
Telnet: A system for logging in, over a network, to a computer situated in another location. ARPANET connected Stanford research Institute in Santa Barbara to the University of Utah, the internet was born, although the first attempt actually crashed on the 'g' of the word 'Login'

1960s
Email: Electronic mail applications are developed on timesharing main frame computers for communication between system users. The beginning of the internet can be traced back to 1962, when the RAND (America's military think tank) tackled the problem of how they could communicate in the aftermath of a nuclear attack, their thinking was prompted by the Cuban Missile Crisis.

Email

203

Email
Electronic mail, commonly referred to as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. Historically, the term electronic mail was used generically for any electronic The at sign, a part of every SMTP email [1] address document transmission. For example, several writers in the early 1970s used the term to describe fax document transmission.[2][3] As a result, it is difficult to find the first citation for the use of the term with the more specific meaning it has today. An Internet email message[4] consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. Originally a text-only (7-bit ASCII and others) communications medium, email was extended to carry multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME). Electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating it,[5] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today. Network-based email was initially exchanged on the ARPANET in extensions to the File Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and body) itself.

Spelling
Electronic mail has several English spelling options that occasionally prove cause for vehement disagreement.[6][7] email is the form required by IETF Requests for Comment and working groups[8] and increasingly by style guides.[9][10][11] This spelling also appears in most dictionaries.[12][13][14][15][16][17] e-mail is a form previously recommended by some prominent journalistic and technical style guides. According to Corpus of Contemporary American English data, this is the form that appears most frequently in edited, published American English writing.[18] mail was the form used in the original RFC. The service is referred to as mail and a single piece of electronic mail is called a message.[19][20][21] eMail, capitalizing only the letter M, was common among ARPANET users and the early developers of Unix, CMS, AppleLink, eWorld, AOL, GEnie, and Hotmail.

Email EMail is a traditional form that has been used in RFCs for the "Author's Address",[20][21] and is expressly required "for historical reasons".[22] E-mail is sometimes used, capitalizing the initial letter E as in similar abbreviations like E-piano, E-guitar, A-bomb, H-bomb, and C-section.[23] There is also some variety in the plural form of the term. In US English email is used as a mass noun (like the term mail for items sent through the postal system), but in British English it is more commonly used as a count noun with the plural emails.

204

Origin
Precursors
Sending text messages electronically could be said to date back to the Morse code telegraph of the mid 1800s; and the 1939 New York World's Fair, where IBM sent a letter of congratulations from San Francisco to New York on an IBM radio-type, calling it a high-speed substitute for mail service in the world of tomorrow.[24] Teleprinters were used in Germany during World War II,[25] and use spread until the late 1960s when there was a worldwide Telex network. Additionally, there was the similar but incompatible American TWX, which remained important until the late 1980s.[26] By the early 1970s, the United States Department of Defense AUTODIN network provided message service between 1,350 terminals, handling 30 million messages per month, with an average message length of approximately 3,000 characters. Autodin was supported by 18 large computerized switches, and was connected to the United States General Services Administration Advanced Record System, which provided similar services to roughly 2,500 terminals.[27]

Host-based mail systems


With the introduction of MIT's Compatible Time-Sharing System (CTSS) in 1961[28] for the first time multiple users were able to log into a central system[29] from remote dial-up terminals, and to store, and share, files on the central disk.[30] Informal methods of using this to pass messages developed and were expanded to create the first true email system: MIT's CTSS MAIL, in 1965.[31] Other early time-sharing systems soon had their own email applications: 1972 Unix mail program[32][33] 1972 APL Mailbox by Larry Breed[34][35] 1974 The PLATO IV Notes on-line message board system was generalized to offer 'personal notes' (email) in August, 1974.[27][36] 1978 EMAIL at University of Medicine and Dentistry of New Jersey[37] 1981 PROFS by IBM[38][39] 1982 ALL-IN-1[40] by Digital Equipment Corporation Although similar in concept, all these original email systems had widely different features and ran on incompatible systems. They allowed communication only between users logged into the same host or "mainframe" although this could be hundreds or even thousands of users within an organization.

Email

205

Email networks
Soon systems were developed to link compatible mail programs between different organisations over dialup modems or leased lines, creating local and global networks. In 1971 the first ARPANET email was sent,[41] and through RFC 561, RFC 680, RFC 724 and finally 1977's RFC 733, became a standardized working system. Other separate networks were also being created including: Unix mail was networked by 1978's uucp,[42] which was also used for USENET newsgroup postings IBM mainframe email was linked by BITNET in 1981[43] IBM PCs running DOS in 1984 could link with FidoNet for email and shared bulletin board posting

LAN email systems


In the early 1980s, networked personal computers on LANs became increasingly important. Server-based systems similar to the earlier mainframe systems were developed. Again these systems initially allowed communication only between users logged into the same server infrastructure. Examples include: cc:Mail Lantastic WordPerfect Office Microsoft Mail Banyan VINES Lotus Notes

Eventually these systems too could also be linked between different organizations, as long as they ran the same email system and proprietary protocol.[44]

Attempts at interoperability
Early interoperability among independent systems included: ARPANET, the forerunner of today's Internet, defined the first protocols for dissimilar computers to exchange email uucp implementations for non-Unix systems were used as an open "glue" between differing mail systems, primarily over dialup telephones CSNet used dial-up telephone access to link additional sites to the ARPANET and then Internet Later efforts at interoperability standardization included: Novell briefly championed the open MHS protocol but abandoned it after purchasing the non-MHS WordPerfect Office (renamed Groupwise) The Coloured Book protocols on UK academic networks until 1992 X.400 in the 1980s and early 1990s was promoted by major vendors and mandated for government use under GOSIP but abandoned by all but a few in favor of Internet SMTP by the mid-1990s.

From SNDMSG to MSG


In the early 1970s, Ray Tomlinson updated an existing utility called SNDMSG so that it could copy messages (as files) over the network. Lawrence Roberts, the project manager for the ARPANET development, took the idea of READMAIL, which dumped all "recent" messages onto the user's terminal, and wrote a program for TENEX in TECO macros called RD which permitted accessing individual messages.[45] Barry Wessler then updated RD and called it NRD.[46]

Email Marty Yonke combined rewrote NRD to include reading, access to SNDMSG for sending, and a help system, and called the utility WRD which was later known as BANANARD. John Vittal then updated this version to include 3 important commands: Move (combined save/delete command), Answer (determined to whom a reply should be sent) and Forward (send an email to a person who was not already a recipient). The system was called MSG. With inclusion of these features, MSG is considered to be the first integrated modern email program, from which many other applications have descended.[45]

206

Rise of ARPANET mail


The ARPANET computer network made a large contribution to the development of email. There is one report that indicates experimental inter-system email transfers began shortly after its creation in 1969.[31] Ray Tomlinson is generally credited as having sent the first email across a network, initiating the use of the "@" sign to separate the names of the user and the user's machine in 1971, when he sent a message from one Digital Equipment Corporation DEC-10 computer to another DEC-10. The two machines were placed next to each other.[47][48] Tomlinson's work was quickly adopted across the ARPANET, which significantly increased the popularity of email. For many years, email was the killer app of the ARPANET and then the Internet. Most other networks had their own email protocols and address formats; as the influence of the ARPANET and later the Internet grew, central sites often hosted email gateways that passed mail between the Internet and these other networks. Internet email addressing is still complicated by the need to handle mail destined for these older networks. Some well-known examples of these were UUCP (mostly Unix computers), BITNET (mostly IBM and VAX mainframes at universities), FidoNet (personal computers), DECNET (various networks) and CSNet, a forerunner of NSFNet. An example of an Internet email address that routed mail to a user at a UUCP host: hubhost!middlehost!edgehost!user@uucpgateway.somedomain.example.com This was necessary because in early years UUCP computers did not maintain (and could not consult central servers for) information about the location of all hosts they exchanged mail with, but rather only knew how to communicate with a few network neighbors; email messages (and other data such as Usenet News) were passed along in a chain among hosts who had explicitly agreed to share data with each other. (Eventually the UUCP Mapping Project would provide a form of network routing database for email.)

Operation overview
The diagram to the right shows a typical sequence of events[49] that takes place when Alice composes a message using her mail user agent (MUA). She enters the email address of her correspondent, and hits the "send" button.

Email

207

1. Her MUA formats the message in email format and uses the Submission Protocol (a profile of the Simple Mail Transfer Protocol (SMTP), see RFC 6409) to send the message to the local mail submission agent (MSA), in this case smtp.a.org, run by Alice's internet service provider (ISP). 2. The MSA looks at the destination address provided in the SMTP protocol (not from the message header), in this case bob@b.org. An Internet email address is a string of the form localpart@exampledomain. The part before the @ sign is the local part of the address, often the username of the recipient, and the part after the @ sign is a domain name or a fully qualified domain name. The MSA resolves a domain name to determine the fully qualified domain name of the mail exchange server in the Domain Name System (DNS). 3. The DNS server for the b.org domain, ns.b.org, responds with any MX records listing the mail exchange servers for that domain, in this case mx.b.org, a message transfer agent (MTA) server run by Bob's ISP. 4. smtp.a.org sends the message to mx.b.org using SMTP. This server may need to forward the message to other MTAs before the message reaches the final message delivery agent (MDA). 1. The MDA delivers it to the mailbox of the user bob. 2. Bob presses the "get mail" button in his MUA, which picks up the message using either the Post Office Protocol (POP3) or the Internet Message Access Protocol (IMAP4). That sequence of events applies to the majority of email users. However, there are many alternative possibilities and complications to the email system: Alice or Bob may use a client connected to a corporate email system, such as IBM Lotus Notes or Microsoft Exchange. These systems often have their own internal email format and their clients typically communicate with the email server using a vendor-specific, proprietary protocol. The server sends or receives email via the Internet through the product's Internet mail gateway which also does any necessary reformatting. If Alice and Bob work for the same company, the entire transaction may happen completely within a single corporate email system. Alice may not have a MUA on her computer but instead may connect to a webmail service. Alice's computer may run its own MTA, so avoiding the transfer at step 1. Bob may pick up his email in many ways, for example logging into mx.b.org and reading it directly, or by using a webmail service. Domains usually have several mail exchange servers so that they can continue to accept mail when the main mail exchange server is not available. Email messages are not secure if email encryption is not used correctly.

Email Many MTAs used to accept messages for any recipient on the Internet and do their best to deliver them. Such MTAs are called open mail relays. This was very important in the early days of the Internet when network connections were unreliable. If an MTA couldn't reach the destination, it could at least deliver it to a relay closer to the destination. The relay stood a better chance of delivering the message at a later time. However, this mechanism proved to be exploitable by people sending unsolicited bulk email and as a consequence very few modern MTAs are open mail relays, and many MTAs don't accept messages from open mail relays because such messages are very likely to be spam.

208

Message format
The Internet email message format is now defined by RFC 5322, with multi-media content attachments being defined in RFC 2045 through RFC 2049, collectively called Multipurpose Internet Mail Extensions or MIME. RFC 5322 replaced the earlier RFC 2822 in 2008, and in turn RFC 2822 in 2001 replaced RFC 822 which had been the standard for Internet email for nearly 20 years. Published in 1982, RFC 822 was based on the earlier RFC 733 for the ARPANET.[50] Internet email messages consist of two major sections: Header Structured into fields such as From, To, CC, Subject, Date, and other information about the email. Body The basic content, as unstructured text; sometimes containing a signature block at the end. This is exactly the same as the body of a regular letter. The header is separated from the body by a blank line.

Message header
Each message has exactly one header, which is structured into fields. Each field has a name and a value. RFC 5322 specifies the precise syntax. Informally, each line of text in the header that begins with a printable character begins a separate field. The field name starts in the first character of the line and ends before the separator character ":". The separator is then followed by the field value (the "body" of the field). The value is continued onto subsequent lines if those lines have a space or tab as their first character. Field names and values are restricted to 7-bit ASCII characters. Non-ASCII values may be represented using MIME encoded words. Header fields Email header fields can be multi-line, and each line should be at most 78 characters long and in no event more than 998 characters long.[51] Header fields defined by RFC 5322 can only contain US-ASCII characters; for encoding characters in other sets, a syntax specified in RFC 2047 can be used.[52] Recently the IETF EAI working group has defined some standards track extensions,[53][54] replacing previous experimental extensions, to allow UTF-8 encoded Unicode characters to be used within the header. In particular, this allows email addresses to use non-ASCII characters. Such characters must only be used by servers that support these extensions. The message header must include at least the following fields:[55] From: The email address, and optionally the name of the author(s). In many email clients not changeable except through changing account settings. Date: The local time and date when the message was written. Like the From: field, many email clients fill this in automatically when sending. The recipient's client may then display the time in the format and time zone local to him/her. The message header should include at least the following fields:[56] Message-ID: Also an automatically generated field; used to prevent multiple delivery and for reference in In-Reply-To: (see below).

Email In-Reply-To: Message-ID of the message that this is a reply to. Used to link related messages together. This field only applies for reply messages. RFC 3864 describes registration procedures for message header fields at the IANA; it provides for permanent [57] and provisional [58] message header field names, including also fields defined for MIME, netnews, and http, and referencing relevant RFCs. Common header fields for email include: To: The email address(es), and optionally name(s) of the message's recipient(s). Indicates primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below. Subject: A brief summary of the topic of the message. Certain abbreviations are commonly used in the subject, including "RE:" and "FW:". Bcc: Blind Carbon Copy; addresses added to the SMTP delivery list but not (usually) listed in the message data, remaining invisible to other recipients. Cc: Carbon copy; Many email clients will mark email in your inbox differently depending on whether you are in the To: or Cc: list. Content-Type: Information about how the message is to be displayed, usually a MIME type. Precedence: commonly with values "bulk", "junk", or "list"; used to indicate that automated "vacation" or "out of office" responses should not be returned for this mail, e.g. to prevent vacation notices from being sent to all other subscribers of a mailinglist. Sendmail uses this header to affect prioritization of queued email, with "Precedence: special-delivery" messages delivered sooner. With modern high-bandwidth networks delivery priority is less of an issue than it once was. Microsoft Exchange respects a fine-grained automatic response suppression mechanism, the X-Auto-Response-Suppress header.[59] References: Message-ID of the message that this is a reply to, and the message-id of the message the previous reply was a reply to, etc. Reply-To: Address that should be used to reply to the message. Sender: Address of the actual sender acting on behalf of the author listed in the From: field (secretary, list manager, etc.). Archived-At: A direct link to the archived form of an individual email message.[60] Note that the To: field is not necessarily related to the addresses to which the message is delivered. The actual delivery list is supplied separately to the transport protocol, SMTP, which may or may not originally have been extracted from the header content. The "To:" field is similar to the addressing at the top of a conventional letter which is delivered according to the address on the outer envelope. In the same way, the "From:" field does not have to be the real sender of the email message. Some mail servers apply email authentication systems to messages being relayed. Data pertaining to server's activity is also part of the header, as defined below. SMTP defines the trace information of a message, which is also saved in the header using the following two fields:[61] Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last to first). Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at the top of the header. Other header fields that are added on top of the header by the receiving server may be called trace fields, in a broader sense.[62] Authentication-Results: when a server carries out authentication checks, it can save the results in this field for consumption by downstream agents.[63] Received-SPF: stores the results of SPF checks.[64] Auto-Submitted: is used to mark automatically generated messages.[65] VBR-Info: claims VBR whitelisting[66]

209

Email

210

Message body
Content encoding Email was originally designed for 7-bit ASCII.[67] Most email software is 8-bit clean but must assume it will communicate with 7-bit servers and mail readers. The MIME standard introduced character set specifiers and two content transfer encodings to enable transmission of non-ASCII data: quoted printable for mostly 7 bit content with a few characters outside that range and base64 for arbitrary binary data. The 8BITMIME and BINARY extensions were introduced to allow transmission of mail without the need for these encodings, but many mail transport agents still do not support them fully. In some countries, several encoding schemes coexist; as the result, by default, the message in a non-Latin alphabet language appears in non-readable form (the only exception is coincidence, when the sender and receiver use the same encoding scheme). Therefore, for international character sets, Unicode is growing in popularity. Plain text and HTML Most modern graphic email clients allow the use of either plain text or HTML for the message body at the option of the user. HTML email messages often include an automatically generated plain text copy as well, for compatibility reasons. Advantages of HTML include the ability to include in-line links and images, set apart previous messages in block quotes, wrap naturally on any display, use emphasis such as underlines and italics, and change font styles. Disadvantages include the increased size of the email, privacy concerns about web bugs, abuse of HTML email as a vector for phishing attacks and the spread of malicious software.[68] Some web based Mailing lists recommend that all posts be made in plain-text, with 72 or 80 characters per line[69][70] for all the above reasons, but also because they have a significant number of readers using text-based email clients such as Mutt. Some Microsoft email clients allow rich formatting using RTF, but unless the recipient is guaranteed to have a compatible email client this should be avoided.[71] In order to ensure that HTML sent in an email is rendered properly by the recipient's client software, an additional header must be specified when sending: "Content-type: text/html". Most email programs send this header automatically.

Servers and client applications


Messages are exchanged between hosts using the Simple Mail Transfer Protocol with software programs called mail transfer agents (MTAs); and delivered to a mail store by programs called mail delivery agents (MDAs, also sometimes called local delivery agents, LDAs). Users can retrieve their messages from servers using standard protocols such as POP or IMAP, or, as is more likely in a large corporate environment, with a proprietary protocol specific to Novell Groupwise, Lotus Notes or Microsoft Exchange Servers. Webmail

The interface of an email client, Thunderbird.

Email interfaces allow users to access their mail with any standard web browser, from any computer, rather than relying on an email client. Programs used by users for retrieving, reading, and managing email are called mail user agents (MUAs). Mail can be stored on the client, on the server side, or in both places. Standard formats for mailboxes include Maildir and mbox. Several prominent email clients use their own proprietary format and require conversion software to transfer email between them. Server-side storage is often in a proprietary format but since access is through a standard protocol such as IMAP, moving email from one server to another can be done with any MUA supporting the protocol. Accepting a message obliges an MTA to deliver it,[72] and when a message cannot be delivered, that MTA must send a bounce message back to the sender, indicating the problem.

211

Filename extensions
Upon reception of email messages, email client applications save messages in operating system files in the file system. Some clients save individual messages as separate files, while others use various database formats, often proprietary, for collective storage. A historical standard of storage is the mbox format. The specific format used is often indicated by special filename extensions: eml Used by many email clients including Microsoft Outlook Express, Windows Mail and Mozilla Thunderbird. The files are plain text in MIME format, containing the email header as well as the message contents and attachments in one or more of several formats. emlx Used by Apple Mail. msg Used by Microsoft Office Outlook and OfficeLogic Groupware. mbx Used by Opera Mail, KMail, and Apple Mail based on the mbox format. Some applications (like Apple Mail) leave attachments encoded in messages for searching while also saving separate copies of the attachments. Others separate attachments from messages and save them in a specific directory.

URI scheme mailto:


The URI scheme, as registered with the IANA, defines the mailto: scheme for SMTP email addresses. Though its use is not strictly defined, URLs of this form are intended to be used to open the new message window of the user's mail client when the URL is activated, with the address as defined by the URL in the To: field.[73]

Types
Main article: Email types

Web-based email (webmail)


This is the type of email that most users are familiar with. Many free email providers host their serves as web-based email (e.g. Hotmail, Yahoo, Gmail, AOL). This allows users to log into the email account by using an Internet browser to send and receive their email. Its main disadvantage is the need to be connected to the internet while using it. Other software tools exist which integrate parts of the webmail functionality into the OS (e.g. creating messages directly from third party applications via MAPI).

Email

212

POP3 email services


POP3 is the acronym for Post Office Protocol 3. It is a leading email account type on the Internet. In a POP3 email account, your email messages are downloaded to your computer and then they are deleted from the mail server. It is difficult to save and view your messages on multiple computers. Also, the messages you send from the computer are not copied to the Sent Items folder on the computers. The messages are deleted from the server to make room for more incoming messages. POP supports simple download-and-delete requirements for access to remote mailboxes (termed maildrop in the POP RFC's).[3] Although most POP clients have an option to leave messages on the server after downloading a copy of them, most e-mail clients using POP3 simply connect, retrieve all messages, store them on the user's computer as new messages, delete them from the server, and then disconnect. Other protocols, notably IMAP, (Internet Message Access Protocol) provide more complete and complex remote access to typical mailbox operations. Many e-mail clients support POP as well as IMAP to retrieve messages; however, fewer Internet Service Providers (ISPs) support IMAP

IMAP email servers


IMAP refers to Internet Message Access Protocol. It is an alternative to the POP3 email. With an Internet Message Protocol (IMAP) account, you have access to mail folders on the mail server and you can use any computer to read your messages wherever you are. It shows the headers of your messages, the sender and the subject and you choose to download only those messages you need to read. Usually mail is saved on a mail server, therefore it is safer and it is backed up on an email server.

MAPI email servers


Messaging Application Programming Interface (MAPI) is a messaging architecture and a Component Object Model based API for Microsoft Windows.

Use
Flaming Flaming occurs when a person sends a message with angry or antagonistic content. The term is derived from the use of the word Incendiary to describe particularly heated email discussions. Flaming is assumed to be more common today because of the ease and impersonality of email communications: confrontations in person or via telephone require direct interaction, where social norms encourage civility, whereas typing a message to another person is an indirect interaction, so civility may be forgotten. Flaming is generally looked down upon by Internet communities as it is considered rude and non-productive. Email bankruptcy Also known as "email fatigue", email bankruptcy is when a user ignores a large number of email messages after falling behind in reading and answering them. The reason for falling behind is often due to information overload and a general sense there is so much information that it is not possible to read it all. As a solution, people occasionally send a boilerplate message explaining that the email inbox is being cleared out. Harvard University law professor Lawrence Lessig is credited with coining this term, but he may only have popularized it.[74]

Email

213

In business
Email was widely accepted by the business community as the first broad electronic communication medium and was the first 'e-revolution' in business communication. Email is very simple to understand and like postal mail, email solves two basic problems of communication: logistics and synchronization (see below). LAN based email is also an emerging form of usage for business. It not only allows the business user to download mail when offline, it also allows the small business user to have multiple users' email IDs with just one email connection. Pros The problem of logistics: Much of the business world relies upon communications between people who are not physically in the same building, area or even country; setting up and attending an in-person meeting, telephone call, or conference call can be inconvenient, time-consuming, and costly. Email provides a way to exchange information between two or more people with no set-up costs and that is generally far less expensive than physical meetings or phone calls. The problem of synchronisation: With real time communication by meetings or phone calls, participants have to work on the same schedule, and each participant must spend the same amount of time in the meeting or call. Email allows asynchrony: each participant may control their schedule independently. Cons Most business workers today spend from one to two hours of their working day on email: reading, ordering, sorting, 're-contextualizing' fragmented information, and writing email.[75] The use of email is increasing due to increasing levels of globalisation labour division and outsourcing amongst other things. Email can lead to some well-known problems: Loss of context: which means that the context is lost forever; there is no way to get the text back. Information in context (as in a newspaper) is much easier and faster to understand than unedited and sometimes unrelated fragments of information. Communicating in context can only be achieved when both parties have a full understanding of the context and issue in question. Information overload: Email is a push technology the sender controls who receives the information. Convenient availability of mailing lists and use of "copy all" can lead to people receiving unwanted or irrelevant information of no use to them. Inconsistency: Email can duplicate information. This can be a problem when a large team is working on documents and information while not in constant contact with the other members of their team. Liability. Statements made in an email can be deemed legally binding and be used against a party in a court of law.[76] Despite these disadvantages, email has become the most widely used medium of communication within the business world. In fact, a 2010 study on workplace communication [77], found that 83% of U.S. knowledge workers felt that email was critical to their success and productivity at work.[78] Research on email marketing Research suggests that email marketing can be viewed as useful by consumers if it contains information such as special sales offerings and new product information. Offering interesting hyperlinks or generic information on consumer trends is less useful.[79] This research by Martin et al. (2003) also shows that if consumers find email marketing useful, they are likely to visit a store thereby overcoming limitations of Internet marketing such as not being able to touch or try on a product.

Email

214

Problems
Attachment size limitation
Email messages may have one or more attachments. Attachments serve the purpose of delivering binary or text files of unspecified size. In principle there is no technical intrinsic restriction in the SMTP protocol limiting the size or number of attachments. In practice, however, email service providers implement various limitations on the permissible size of files or the size of an entire message. Furthermore, due to technical reasons, often a small attachment can increase in size when sent,[80] which can be confusing to senders when trying to assess whether they can or cannot send a file by email, and this can result in their message being rejected. As larger and larger file sizes are being created and traded, many users are either forced to upload and download their files using an FTP server, or more popularly, use online file sharing facilities or services, usually over web-friendly HTTP, in order to send and receive them.

Information overload
A December 2007 New York Times blog post described information overload as "a $650 Billion Drag on the Economy",[81] and the New York Times reported in April 2008 that "E-MAIL has become the bane of some peoples professional lives" due to information overload, yet "none of the current wave of high-profile Internet start-ups focused on email really eliminates the problem of email overload because none helps us prepare replies".[82] GigaOm posted a similar article in September 2010, highlighting research [83] that found 57% of knowledge workers were overwhelmed by the volume of email they received.[78] Technology investors reflect similar concerns.[84] In October 2010, CNN published an article titled "Happy Information Overload Day" that compiled research on email overload from IT companies and productivity experts. According to Basex, the average knowledge worker receives 93 emails a day. Subsequent studies have reported higher numbers.[85] Marsha Egan, an email productivity expert, called email technology both a blessing and a curse in the article. She stated, "Everyone just learns that they have to have it dinging and flashing and open just in case the boss e-mails," she said. "The best gift any group can give each other is to never use e-mail urgently. If you need it within three hours, pick up the phone."[86]

Spamming and computer viruses


The usefulness of email is being threatened by four phenomena: email bombardment, spamming, phishing, and email worms. Spamming is unsolicited commercial (or bulk) email. Because of the minuscule cost of sending email, spammers can send hundreds of millions of email messages each day over an inexpensive Internet connection. Hundreds of active spammers sending this volume of mail results in information overload for many computer users who receive voluminous unsolicited email each day.[87][88] Email worms use email as a way of replicating themselves into vulnerable computers. Although the first email worm affected UNIX computers, the problem is most common today on the more popular Microsoft Windows operating system. The combination of spam and worm programs results in users receiving a constant drizzle of junk email, which reduces the usefulness of email as a practical tool. A number of anti-spam techniques mitigate the impact of spam. In the United States, U.S. Congress has also passed a law, the Can Spam Act of 2003, attempting to regulate such email. Australia also has very strict spam laws restricting the sending of spam from an Australian ISP,[89] but its impact has been minimal since most spam comes from regimes that seem reluctant to regulate the sending of spam.

Email

215

Email spoofing
Email spoofing occurs when the header information of an email is altered to make the message appear to come from a known or trusted source. It is often used as a ruse to collect personal information.

Email bombing
Email bombing is the intentional sending of large volumes of messages to a target address. The overloading of the target email address can render it unusable and can even cause the mail server to crash.

Privacy concerns
Today it can be important to distinguish between Internet and internal email systems. Internet email may travel and be stored on networks and computers without the sender's or the recipient's control. During the transit time it is possible that third parties read or even modify the content. Internal mail systems, in which the information never leaves the organizational network, may be more secure, although information technology personnel and others whose function may involve monitoring or managing may be accessing the email of other employees. Email privacy, without some security precautions, can be compromised because: email messages are generally not encrypted. email messages have to go through intermediate computers before reaching their destination, meaning it is relatively easy for others to intercept and read messages. many Internet Service Providers (ISP) store copies of email messages on their mail servers before they are delivered. The backups of these can remain for up to several months on their server, despite deletion from the mailbox. the "Received:"-fields and other information in the email can often identify the sender, preventing anonymous communication. There are cryptography applications that can serve as a remedy to one or more of the above. For example, Virtual Private Networks or the Tor anonymity network can be used to encrypt traffic from the user machine to a safer network while GPG, PGP, SMEmail,[90] or S/MIME can be used for end-to-end message encryption, and SMTP STARTTLS or SMTP over Transport Layer Security/Secure Sockets Layer can be used to encrypt communications for a single mail hop between the SMTP client and the SMTP server. Additionally, many mail user agents do not protect logins and passwords, making them easy to intercept by an attacker. Encrypted authentication schemes such as SASL prevent this. Finally, attached files share many of the same hazards as those found in peer-to-peer filesharing. Attached files may contain trojans or viruses.

Tracking of sent mail


The original SMTP mail service provides limited mechanisms for tracking a transmitted message, and none for verifying that it has been delivered or read. It requires that each mail server must either deliver it onward or return a failure notice (bounce message), but both software bugs and system failures can cause messages to be lost. To remedy this, the IETF introduced Delivery Status Notifications (delivery receipts) and Message Disposition Notifications (return receipts); however, these are not universally deployed in production. (A complete Message Tracking mechanism was also defined, but it never gained traction; see RFCs 3885 through 3888.) Many ISPs now deliberately disable non-delivery reports (NDRs) and delivery receipts due to the activities of spammers: Delivery Reports can be used to verify whether an address exists and so is available to be spammed If the spammer uses a forged sender email address (email spoofing), then the innocent email address that was used can be flooded with NDRs from the many invalid email addresses the spammer may have attempted to mail.

Email These NDRs then constitute spam from the ISP to the innocent user There are a number of systems that allow the sender to see if messages have been opened.[91][92][93][94] The receiver could also let the sender know that the emails have been opened through an "Okay" button. A check sign can appear in the sender's screen when the receiver's "Okay" button is pressed.

216

U.S. government
The U.S. federal government has been involved in email in several different ways. Starting in 1977, the U.S. Postal Service (USPS) recognized that electronic mail and electronic transactions posed a significant threat to First Class mail volumes and revenue. Therefore, the USPS initiated an experimental email service known as E-COM. Electronic messages were transmitted to a post office, printed out, and delivered as hard copy. To take advantage of the service, an individual had to transmit at least 200 messages. The delivery time of the messages was the same as First Class mail and cost 26 cents. Both the Postal Regulatory Commission and the Federal Communications Commission opposed E-COM. The FCC concluded that E-COM constituted common carriage under its jurisdiction and the USPS would have to file a tariff.[95] Three years after initiating the service, USPS canceled E-COM and attempted to sell it off.[96][97][98][99][100][101] The early ARPANET dealt with multiple email clients that had various, and at times incompatible, formats. For example, in the Multics, the "@" sign meant "kill line" and anything before the "@" sign was ignored, so Multics users had to use a command-line option to specify the destination system.[31] The Department of Defense DARPA desired to have uniformity and interoperability for email and therefore funded efforts to drive towards unified inter-operable standards. This led to David Crocker, John Vittal, Kenneth Pogran, and Austin Henderson publishing RFC 733, "Standard for the Format of ARPA Network Text Message" (November 21, 1977), which was apparently not effective. In 1979, a meeting was held at BBN to resolve incompatibility issues. Jon Postel recounted the meeting in RFC 808, "Summary of Computer Mail Services Meeting Held at BBN on 10 January 1979" (March 1, 1982), which includes an appendix listing the varying email systems at the time. This, in turn, lead to the release of David Crocker's RFC 822, "Standard for the Format of ARPA Internet Text Messages" (August 13, 1982).[102] The National Science Foundation took over operations of the ARPANET and Internet from the Department of Defense, and initiated NSFNet, a new backbone for the network. A part of the NSFNet AUP forbade commercial traffic.[103] In 1988, Vint Cerf arranged for an interconnection of MCI Mail with NSFNET on an experimental basis. The following year Compuserve email interconnected with NSFNET. Within a few years the commercial traffic restriction was removed from NSFNETs AUP, and NSFNET was privatised. In the late 1990s, the Federal Trade Commission grew concerned with fraud transpiring in email, and initiated a series of procedures on spam, fraud, and phishing.[104] In 2004, FTC jurisdiction over spam was codified into law in the form of the CAN SPAM Act.[105] Several other U.S. federal agencies have also exercised jurisdiction including the Department of Justice and the Secret Service. NASA has provided email capabilities to astronauts aboard the Space Shuttle and International Space Station since 1991 when a Macintosh Portable was used aboard Space Shuttle mission STS-43 to send the first email via AppleLink.[106][107][108] Today astronauts aboard the International Space Station have email capabilities through the via wireless networking throughout the station and are connected to the ground at 3 Mbit/s Earth to station and 10 Mbit/s station to Earth, comparable to home DSL connection speeds.[109]

Email

217

Notes
[1] "RFC 5321 Simple Mail Transfer Protocol" (http:/ / tools. ietf. org/ html/ rfc5321#section-2. 3. 11). Network Working Group. . Retrieved 2010-02=October 2008. [2] Ron Brown, Fax invades the mail market, New Scientist (http:/ / books. google. com/ books?id=Ry64sjvOmLkC& pg=PA218), Vol. 56, No. 817 (Oct., 26, 1972), pages 218-221. [3] Herbert P. Luckett, What's News: Electronic-mail delivery gets started, Popular Science (http:/ / books. google. com/ books?id=cKSqa8u3EIoC& pg=PA85), Vol. 202, No. 3 (March 1973); page 85 [4] Unless explicitly qualified, any technical descriptions in this article will refer to current Internet e-mail rather than to earlier email systems. [5] See (Partridge 2008) for early history of email, from origins through 1991. [6] Long, Tony (23 October 2000). A Matter of (Wired News) Style (http:/ / www. nettime. org/ Lists-Archives/ nettime-bold-0010/ msg00471. html). Wired magazine. . [7] Readers on (Wired News) Style (http:/ / www. wired. com/ culture/ lifestyle/ news/ 2000/ 10/ 39651). Wired magazine. 24 October 2000. . [8] "RFC Editor Terms List" (http:/ / www. rfc-editor. org/ rfc-style-guide/ terms-online. txt). IETF. . [9] Yahoo style guide (http:/ / styleguide. yahoo. com/ word-list/ e) [10] AP Stylebook editors share big changes (http:/ / www. aces2011. org/ sessions/ 18/ the-ap-stylebook-editors-visit-aces-2011/ ) from the American Copy Editors Society [11] Gerri Berendzen; Daniel Hunt. "AP changes e-mail to email" (http:/ / www. aces2011. org/ sessions/ 18/ the-ap-stylebook-editors-visit-aces-2011/ ). 15th National Conference of the American Copy Editors Society (2011, Phoenix). ACES. . Retrieved 23 March 2011. [12] AskOxford Language Query team. "What is the correct way to spell 'e' words such as 'email', 'ecommerce', 'egovernment'?" (http:/ / www. askoxford. com/ asktheexperts/ faq/ aboutspelling/ email). FAQ. Oxford University Press. . Retrieved 4 September 2009. "We recommend email, as this is now by far the most common form" [13] Reference.com (http:/ / dictionary. reference. com/ browse/ email) [14] Random House Unabridged Dictionary, 2006 [15] The American Heritage Dictionary of the English Language, Fourth Edition [16] Princeton University WordNet 3.0 [17] The American Heritage Science Dictionary, 2002 [18] ""Email" or "e-mail"" (http:/ / english. stackexchange. com/ questions/ 1925/ email-or-e-mail). English Language & Usage Stack Exchange. August 25, 2010. . Retrieved September 26, 2010. [19] RFC 821 (rfc821) Simple Mail Transfer Protocol (http:/ / www. faqs. org/ rfcs/ rfc821. html) [20] RFC 1939 (rfc1939) Post Office Protocol Version 3 (http:/ / www. faqs. org/ rfcs/ rfc1939. html) [21] RFC 3501 (rfc3501) Internet Message Access Protocol version 4rev1 (http:/ / www. faqs. org/ rfcs/ rfc3501. html) [22] "RFC Style Guide", Table of decisions on consistent usage in RFC (http:/ / www. rfc-editor. org/ rfc-style-guide/ terms-online. txt) [23] Excerpt from the FAQ list of the Usenet newsgroup alt.usage.english (http:/ / alt-usage-english. org/ excerpts/ fxhowdoy. html) [24] "The Watsons: IBM's Troubled Legacy" (http:/ / hbswk. hbs. edu/ item/ 4138. html) [25] See File:Gestapo anti-gay telex.jpg [26] "Telex and TWX History" (http:/ / www. baudot. net/ docs/ kimberlin--telex-twx-history. pdf), Donald E. Kimberlin, 1986 [27] USPS Support Panel, Louis T Rader, Chair, Chapter IV: Systems, Electronic Message Systems for the U.S. Postal Service (http:/ / books. google. com/ books?id=5TQrAAAAYAAJ& pg=PA27), National Academy of Sciences, Washington, D.C., 1976; pages 27-35. [28] "CTSS, Compatible Time-Sharing System" (September 4, 2006), University of South Alabama, USA-CTSS (http:/ / www. cis. usouthal. edu/ faculty/ daigle/ project1/ ctss. htm). [29] an IBM 7094 [30] Tom Van Vleck, "The IBM 7094 and CTSS" (September 10, 2004), Multicians.org (Multics), web: Multicians-7094 (http:/ / www. multicians. org/ thvv/ 7094. html). [31] Tom Van Vleck. "The History of Electronic Mail" (http:/ / www. multicians. org/ thvv/ mail-history. html). . [32] Version 3 Unix mail(1) manual page from 10/25/1972 (http:/ / minnie. tuhs. org/ cgi-bin/ utree. pl?file=V3/ man/ man1/ mail. 1) [33] Version 6 Unix mail(1) manual page from 2/21/1975 (http:/ / minnie. tuhs. org/ cgi-bin/ utree. pl?file=V6/ usr/ man/ man1/ mail. 1) [34] APL Quotations and Anecdotes (http:/ / www. jsoftware. com/ papers/ APLQA. htm), including Leslie Goldsmith's story of the Mailbox [35] History of the Internet, including Carter/Mondale use of email (http:/ / www. actewagl. com. au/ Education/ communications/ Internet/ historyOfTheInternet/ InternetOnItsInfancy. aspx) [36] David Wooley, PLATO: The Emergence of an Online Community (http:/ / www. thinkofit. com/ plato/ dwplato. htm#pnotes), 1994. [37] Stromberg, Joseph (22 February 2012). "A Piece of Email History Comes to the American History Museum" (http:/ / blogs. smithsonianmag. com/ aroundthemall/ 2012/ 02/ a-piece-of-email-history-comes-to-the-american-history-museum/ ). Smithsonian Institution. . Retrieved 11 June 2012. [38] "...PROFS changed the way organizations communicated, collaborated and approached work when it was introduced by IBMs Data Processing Division in 1981..." (http:/ / www. ibm. com/ ibm100/ us/ en/ icons/ networkbus/ ), IBM.com [39] "1982 The National Security Council (NSC) staff at the White House acquires a prototype electronic mail system, from IBM, called the Professional Office System (PROFs)...." (http:/ / www. fas. org/ spp/ starwars/ offdocs/ reagan/ chron. txt), fas.org

Email
[40] Gordon Bell's timeline of Digital Equipment Corporation (https:/ / research. microsoft. com/ en-us/ um/ people/ gbell/ Digital/ timeline/ 1982. htm) [41] Ray Tomlinson. "The First Network Email" (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html). . [42] Version 7 Unix manual: "UUCP Implementation Description" by D. A. Nowitz, and "A Dial-Up Network of UNIX Systems" by D. A. Nowitz and M. E. Lesk (http:/ / cm. bell-labs. com/ 7thEdMan/ vol2/ uucp. bun) [43] "BITNET History" (http:/ / www. livinginternet. com/ u/ ui_bitnet. htm), livinginternet.com [44] with various vendors supplying gateway software to link these incompatible systems [45] Email History (http:/ / www. livinginternet. com/ e/ ei. htm) [46] "The Technical Development of Internet Email" (http:/ / www. ir. bbn. com/ ~craig/ email. pdf) Craig Partridge, AprilJune 2008, p.5 [47] The First Email (http:/ / openmap. bbn. com/ ~tomlinso/ ray/ firstemailframe. html) [48] Wave New World,Time Magazine, October 19, 2009, p.48 [49] How E-mail Works (http:/ / www. webcastr. com/ videos/ informational/ how-email-works. html) (internet video). howstuffworks.com. 2008. . [50] Simpson, Ken (October 3, 2008). "An update to the email standards" (http:/ / blog. mailchannels. com/ 2008/ 10/ update-to-email-standards. html). Mail Channels Blog Entry. . [51] P. Resnick, Ed. (October 2008). "RFC 5322, Internet Message Format" (http:/ / tools. ietf. org/ html/ rfc5322). IETF. . [52] Moore, K (November 1996). "MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text" (http:/ / tools. ietf. org/ html/ rfc2047). IETF. . Retrieved 2012-01-21. [53] A Yang, Ed. (February 2012). "RFC 6532, Internationalized Email Headers" (http:/ / tools. ietf. org/ html/ rfc6532). IETF. ISSN2070-1721. . [54] J. Yao, Ed., W. Mao, Ed. (February 2012). "RFC 6531, SMTP Extension for Internationalized Email Addresses" (http:/ / tools. ietf. org/ html/ rfc6531). IETF. ISSN2070-1721. . [55] RFC 5322, 3.6. Field Definitions (http:/ / tools. ietf. org/ html/ rfc5322#section-3. 6) [56] RFC 5322, 3.6.4. Identification Fields (http:/ / tools. ietf. org/ html/ rfc5322#section-3. 6. 4) [57] http:/ / www. iana. org/ assignments/ message-headers/ perm-headers. html [58] http:/ / www. iana. org/ assignments/ message-headers/ prov-headers. html [59] Microsoft, Auto Response Suppress, 2010, microsoft reference (http:/ / msdn. microsoft. com/ en-us/ library/ ee219609(v=EXCHG. 80). aspx), 2010 Sep 22 [60] RFC 5064 (http:/ / tools. ietf. org/ html/ rfc5064) [61] John Klensin (October 2008). "Trace Information" (https:/ / tools. ietf. org/ html/ rfc5321& #035;section-4. 4). Simple Mail Transfer Protocol (https:/ / tools. ietf. org/ html/ rfc5321). IETF. sec.4.4. RFC 5321. . [62] John Levine (14 January 2012). "Trace headers" (http:/ / www. ietf. org/ mail-archive/ web/ apps-discuss/ current/ msg04115. html). email message. IETF. . Retrieved 16 January 2012. "there are many more trace headers than those two" [63] This extensible field was defined by RFC 5451, that also defined a IANA registry of Email Authentication Parameters (http:/ / www. iana. org/ assignments/ email-auth/ email-auth. xml). [64] RFC 4408. [65] Defined in RFC 3834, and updated by RFC 5436. [66] RFC 5518. [67] Craig Hunt (2002). TCP/IP Network Administration. O'Reilly Media. p.70. ISBN978-0-596-00297-8. [68] "Email policies that prevent viruses" (http:/ / advosys. ca/ papers/ mail-policies. html). . [69] "When posting to a RootsWeb mailing list..." (http:/ / helpdesk. rootsweb. com/ listadmins/ plaintext. html) [70] "...Plain text, 72 characters per line..." (http:/ / www. openbsd. org/ mail. html) [71] How to Prevent the Winmail.dat File from Being Sent to Internet Users (http:/ / support. microsoft. com/ kb/ 138053) [72] In practice, some accepted messages may nowadays not be delivered to the recipient's InBox, but instead to a Spam or Junk folder which, especially in a corporate environment, may be inaccessible to the recipient [73] RFC 2368 section 3 : by Paul Hoffman in 1998 discusses operation of the "mailto" URL. [74] Barrett, Grant (December 23, 2007). "All We Are Saying." (http:/ / www. nytimes. com/ 2007/ 12/ 23/ weekinreview/ 23buzzwords. html?ref=weekinreview). New York Times. . Retrieved 2007-12-24. [75] "Email Right to Privacy Why Small Businesses Care" (http:/ / www. smallbiztrends. com/ 2007/ 06/ email-has-right-to-privacy-why-small-businesses-care. html). Anita Campbell. 2007-06-19. . [76] C. J. Hughes (February 17, 2011). "E-Mail May Be Binding, State Court Rules" (http:/ / www. nytimes. com/ 2011/ 02/ 20/ realestate/ 20posting. html). New York Times. . Retrieved 2011-02-20. [77] http:/ / www. plantronics. com/ north_america/ en_US/ howwework/ [78] By Om Malik, GigaOm. " Is Email a Curse or a Boon? (http:/ / gigaom. com/ collaboration/ is-email-a-curse-or-a-boon/ )" September 22, 2010. Retrieved October 11, 2010. [79] Martin, Brett A. S., Joel Van Durme, Mika Raulas, and Marko Merisavo (2003), "E-mail Marketing: Exploratory Insights from Finland" (http:/ / www. basmartin. com/ wp-content/ uploads/ 2010/ 08/ Martin-et-al-2003. pdf), Journal of Advertising Research, 43 (3), 293-300. [80] "Exchange 2007: Attachment Size Increase,..." (http:/ / technet. microsoft. com/ en-us/ magazine/ 2009. 01. exchangeqa. aspx?pr=blog). TechNet Magazine, Microsoft.com US. 2010-03-25. .

218

Email
[81] Lohr, Steve (2007-12-20). "Is Information Overload a $650 Billion Drag on the Economy?" (http:/ / bits. blogs. nytimes. com/ 2007/ 12/ 20/ is-information-overload-a-650-billion-drag-on-the-economy). New York Times. . Retrieved May 1, 2010. [82] Stross, Randall (2008-04-20). "Struggling to Evade the E-Mail Tsunami" (http:/ / www. nytimes. com/ 2008/ 04/ 20/ technology/ 20digi. html?_r=2& oref=slogin& oref=slogin). New York Times. . Retrieved May 1, 2010. [83] http:/ / gigaom. com/ collaboration/ is-email-a-curse-or-a-boon/ [84] "Did Darwin Skip Over Email?" (http:/ / www. foundrygroup. com/ blog/ archives/ 2008/ 04/ did-darwin-skip-over-email. php). Foundry Group. 2008-04-28. . [85] Radicati, Sara. "Email Statistics Report, 2010" (http:/ / www. radicati. com/ wp/ wp-content/ uploads/ 2010/ 04/ Email-Statistics-Report-2010-2014-Executive-Summary2. pdf). . [86] Gross, Doug (July 26, 2011). "Happy Information Overload Day!" (http:/ / articles. cnn. com/ 2010-10-20/ tech/ information. overload. day_1_mails-marsha-egan-rss?_s=PM:TECH). CNN. . [87] Rich Kawanagh. The top ten email spam list of 2005. ITVibe news, 2006, January 02, ITvibe.com (http:/ / itvibe. com/ news/ 3837/ ) [88] How Microsoft is losing the war on spam Salon.com (http:/ / dir. salon. com/ story/ tech/ feature/ 2005/ 01/ 19/ microsoft_spam/ index. html) [89] Spam Bill 2003 ( PDF (http:/ / www. aph. gov. au/ library/ pubs/ bd/ 2003-04/ 04bd045. pdf)) [90] M. Toorani, SMEmail A New Protocol for the Secure E-mail in Mobile Environments (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=4783292), Proceedings of the Australian Telecommunications Networks and Applications Conference (ATNAC'08), pp. 3944, Adelaide, Australia, December 2008. (arXiv:1002.3176) [91] Amy Harmon (2000-11-22). "Software That Tracks E-Mail Is Raising Privacy Concerns" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=940CE0D9143AF931A15752C1A9669C8B63& sec=& spon=& pagewanted=print). The New York Times. . Retrieved 2012-01-13. [92] About.com (http:/ / email. about. com/ od/ emailbehindthescenes/ a/ html_return_rcp. htm) [93] Webdevelopersnotes.com (http:/ / www. webdevelopersnotes. com/ tips/ yahoo/ notification-when-yahoo-email-is-opened. php) [94] Microsoft.com (http:/ / support. microsoft. com/ kb/ 222163) [95] In re Request for declaratory ruling and investigation by Graphnet Systems, Inc., concerning the proposed E-COM service, FCC Docket No. 79-6 (September 4, 1979) [96] History of the United States Postal Service, USPS (http:/ / www. usps. com/ history/ history/ his1. htm) [97] Hardy, Ian R; The Evolution of ARPANET Email (http:/ / www. archive. org/ web/ */ http:/ www. ifla. org/ documents/ internet/ hari1. txt); 1996-05-13; History Thesis Paper; University of California at Berkeley [98] James Bovard, The Law Dinosaur: The US Postal Service, CATO Policy Analysis (February 1985) [99] Jay Akkad, The History of Email (http:/ / www. cs. ucsb. edu/ ~almeroth/ classes/ F04. 176A/ homework1_good_papers/ jay-akkad. html) [100] US Postal Service: Postal Activities and Laws Related to Electronic Commerce, GAO-00-188 (http:/ / www. gao. gov/ archive/ 2000/ gg00188. pdf) [101] Implications of Electronic Mail and Message Systems for the U.S. Postal Service , Office of Technology Assessment, Congress of the United States, August 1982 (http:/ / govinfo. library. unt. edu/ ota/ Ota_4/ DATA/ 1982/ 8214. PDF) [102] Email History, How Email was Invented, Living Internet (http:/ / www. livinginternet. com/ e/ ei. htm) [103] Cybertelecom : Internet History (http:/ / www. cybertelecom. org/ notes/ internet_history80s. htm) [104] Cybertelecom : SPAM Reference (http:/ / www. cybertelecom. org/ spam/ Spamref. htm) [105] Cybertelecom : Can Spam Act (http:/ / www. cybertelecom. org/ spam/ canspam. htm) [106] 2001: A Space Laptop | SpaceRef Your Space Reference (http:/ / www. spaceref. com/ news/ viewnews. html?id=213) [107] The Mac Observer This Week in Apple History August 2231: "Welcome, IBM. Seriously," Too Late to License (http:/ / www. macobserver. com/ columns/ thisweek/ 2004/ 20040831. shtml) [108] Linzmayer, Owen W. (2004). Apple confidential 2.0 : the definitive history of the world's most colorful company ([Rev. 2. ed.]. ed.). San Francisco, Calif.: No Starch Press. ISBN1-59327-010-0. [109] Bilton, Nick (January 22, 2010). "First Tweet from Space" (http:/ / bits. blogs. nytimes. com/ 2010/ 01/ 22/ first-tweet-from-space/ ). New York Times. .

219

Email

220

References Further reading


Cemil Betanov, Introduction to X.400, Artech House, ISBN 0-89006-597-7. Marsha Egan, " Inbox Detox and The Habit of Email Excellence (http://www.inboxdetox.com)", Acanthus Publishing ISBN 978-0-9815589-8-1 Lawrence Hughes, Internet e-mail Protocols, Standards and Implementation, Artech House Publishers, ISBN 0-89006-939-5. Kevin Johnson, Internet Email Protocols: A Developer's Guide, Addison-Wesley Professional, ISBN 0-201-43288-9. Pete Loshin, Essential Email Standards: RFCs and Protocols Made Practical, John Wiley & Sons, ISBN 0-471-34597-0. Partridge, Craig (AprilJune 2008). "The Technical Development of Internet Email" (http://www.ir.bbn.com/ ~craig/email.pdf) (PDF). IEEE Annals of the History of Computing (Berlin: IEEE Computer Society) 30 (2). ISSN1934-1547 Sara Radicati, Electronic Mail: An Introduction to the X.400 Message Handling Standards, Mcgraw-Hill, ISBN 0-07-051104-7. John Rhoton, Programmer's Guide to Internet Mail: SMTP, POP, IMAP, and LDAP, Elsevier, ISBN 1-55558-212-5. John Rhoton, X.400 and SMTP: Battle of the E-mail Protocols, Elsevier, ISBN 1-55558-165-X. David Wood, Programming Internet Mail, O'Reilly, ISBN 1-56592-479-7. Yoram M. Kalman & Sheizaf Rafaeli, Online Pauses and Silence: Chronemic Expectancy Violations in Written Computer-Mediated Communication (http://rafaeli.net/KalmanRafaeliChronemics2011.pdf), Communication Research, Vol. 38, pp.5469, 2011

External links
E-mail (http://www.dmoz.org/Computers/Internet/E-mail//) at the Open Directory Project IANA's list of standard header fields (http://www.iana.org/assignments/message-headers/perm-headers.html) The History of Email (http://emailhistory.org/) is Dave Crocker's attempt at capturing the sequence of 'significant' occurrences in the evolution of email; a collaborative effort that also cites this page. The History of Electronic Mail (http://www.multicians.org/thvv/mail-history.html) is a personal memoir by the implementer of an early email system The Official MCI Mail Blog! (http://mcimail.blogspot.com/) a blog about MCI Mail, one of the early commercial electronic mail services

Web content

221

Web content
Web content is the textual, visual or aural content that is encountered as part of the user experience on websites. It may include, among other things: text, images, sounds, videos and animations. In Information Architecture for the World Wide Web, Lou Rosenfeld and Peter Morville write, "We define content broadly as 'the stuff in your Web site.' This may include documents, data, applications, e-services, images, audio and video files, personal Web pages, archived e-mail messages, and more. And we include future stuff as well as present stuff."[1]

Beginnings of web content


While the Internet began with a U.S. Government research project in the late 1950s, the web in its present form did not appear on the Internet until after Tim Berners-Lee and his colleagues at the European laboratory (CERN) proposed the concept of linking documents with hypertext. But it was not until Mosaic, the forerunner of the famous Netscape Navigator, appeared that the Internet become more than a file serving system. The use of hypertext, hyperlinks and a page-based model of sharing information, introduced with Mosaic and later Netscape, helped to define web content, and the formation of websites. Largely, today we categorize websites as being a particular type of website according to the content a website contains.

The page concept


Web content is dominated by the "page" concept. Having its beginnings in an academic settings, and in a setting dominated by type-written pages, the idea of the web was to link directly from one academic paper to another academic paper. This was a completely revolutionary idea in the late 1980s and early 1990s when the best a link could be made was to cite a reference in the midst of a type written paper and name that reference either at the bottom of the page or on the last page of the academic paper. When it was possible for any person to write and own a Mosaic page, the concept of a "home page" blurred the idea of a page.[2] It was possible for anyone to own a "Web page" or a "home page" which in many cases the website contained many physical pages in spite of being called "a page". People often cited their "home page" to provide credentials, links to anything that a person supported, or any other individual content a person wanted to publish. Even though "the web" may be the resource we commonly use to "get to" particular locations online, many different protocols[3] are invoked to access embedded information. When we are given an address, such as http:/ / www. youtube. com, we expect to see a range of web pages, but in each page we have embedded tools to watch "video clips".

HTML web content


Even though we may embed various protocols within web pages, the "web page" composed of "html" (or some variation) content is still the dominant way whereby we share content. And while there are many web pages with localized proprietary structure (most usually, business websites), many millions of websites abound that are structured according to a common core idea. Blogs are a type of website that contain mainly web pages authored in html (although the blogger may be totally unaware that the web pages are composed using html due to the blogging tool that may be in use). Millions of people use blogs online; a blog is now the new "home page", that is, a place where a persona can reveal personal information, and/or build a concept as to who this persona is. Even though a blog may be written for other purposes, such as promoting a business, the core of a blog is the fact that it is written by a "person" and that person reveals information from her/his perspective.

Web content Search engine sites are composed mainly of html content, but also has a typically structured approach to revealing information. A search engine results page (SERP) displays a heading, usually the name of the search engine, and then a list of websites and their addresses. What is being listed are the results from a query that may be defined as keywords. The results page lists webpages that are connected in some way with those keywords used in the query. Discussion boards are sites composed of "textual" content organized by html or some variation that can be viewed in a web browser. The driving mechanism of a discussion board is the fact that users are registered and once registered can write posts. Often a discussion board is made up of posts asking some type of question to which other users may provide answers to those questions. Ecommerce sites are largely composed of textual material and embedded with graphics displaying a picture of the item(s) for sale. However, there are extremely few sites that are composed page-by-page using some variant of HTML. Generally, webpages are composed as they are being served from a database to a customer using a web browser. However, the user sees the mainly text document arriving as a webpage to be viewed in a web browser. Ecommerce sites are usually organized by software we identify as a "shopping cart".

222

A wider view of web content


While there are many millions of pages that are predominantly composed of HTML, or some variation, in general we view data, applications, E-Services, images (graphics), audio and video files, personal web pages, archived e-mail messages, and many more forms of file and data systems as belonging to websites and web pages. While there are many hundreds of ways to deliver information on a website, there is a common body of knowledge of search engine optimization that needs to be read as an advisory of ways that anything but text should be delivered. Currently search engines are text based and are one of the common ways people using a browser locate sites of interest.

Content is king
The phrase can be interpreted to mean that - without original and desirable content, or consideration for the rights and commercial interests of content creators - any media venture is likely to fail through lack of appealing content, regardless of other design factors. Content can mean any creative work, such as text, graphics, images or video. "Content is King" is a current meme when organizing or building a website[4] (although Andrew Odlyzko in "Content is Not King" argues otherwise). Text content is particularly important for search engine placement. Without original text content, most search engines will be unable to match search terms to the content of a site.

Content management
Because websites are often complex, a term "content management" appeared in the late 1990s identifying a method or in some cases a tool to organize all the diverse elements to be contained on a website. [5] Content management often means that within a business there is a range of people who have distinct roles to do with content management, such as content author, editor, publisher, and administrator. But it also means there may be a content management system whereby each of the different roles are organized whereby to provide their assistance in operating the system and organizing the information for a website. Even though a business may organize to collect, contain and represent that information online, content needs organization in such a manner to provide the reader (browser) with an overall "customer experience" that is easy to use, the site can be navigated with ease, and the website can fulfill the role assigned to it by the business, that is, to sell to customers, or to market products and services, or to inform customers.

Web content

223

Geo targeting of web content


Geo targeting of web content in internet marketing and geo marketing is the method of determining the geolocation (the physical location) of a website visitor with geolocation software and delivering different content to that visitor based on his or her location, such as country, region/state, city, metro code/zip code, organization, Internet Protocol (IP) address, ISP or other criteria. Different content by choice A typical example for different content by choice in geo targeting is the FedEx website at FedEx.com where users have the choice to select their country location first and are then presented with different site or article content depending on their selection. Automated different content With automated different content in internet marketing and geomarketing the delivery of different content based on the geographical geolocation and other personal information is automated.

References
[1] Information Architecture for the World Wide Web (http:/ / www. oreilly. com/ catalog/ infotecture/ ), second edition, page 219 [2] NetValley (http:/ / www. netvalley. com/ archives/ mirrors/ davemarsh-timeline-1. htm) [3] Internet Tutorial - What Is the World Wide Web? (http:/ / www. centerspan. org/ tutorial/ www. htm#tour) [4] "Content is king - importance of good content - content is king - page content" (http:/ / www. akamarketing. com/ content-is-king. html). akamarketing. . Retrieved 2009-04-15. [5] Is Content King? (http:/ / www. skyrme. com/ updates/ u59_f2. htm)

File sharing
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images and video), documents, or electronic books. It may be implemented through a variety of ways. Common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking.

Types of file sharing


Peer-to-peer file sharing
Users can use software that connects in to a peer-to-peer network to search for shared files on the computers of other users (i.e. peers) connected to the network. Files of interest can then be downloaded directly from other users on the network. Typically, large files are broken down into smaller chunks, which may be obtained from multiple peers and then reassembled by the downloader. This is done while the peer is simultaneously uploading the chunks it already has to other peers.

History
Files were first exchanged on removable media. Computers were able to access remote files using filesystem mounting, bulletin board systems (1978), Usenet (1979), and FTP servers (1985). Internet Relay Chat (1988) and Hotline (1997) enabled users to communicate remotely through chat and to exchange files. The mp3 encoding, which was standardized in 1991 and which substantially reduced the size of audio files, grew to widespread use in the late 1990s. In 1998, MP3.com and Audiogalaxy were established, the Digital Millennium Copyright Act was

File sharing unanimously passed, and the first mp3 player devices were launched. In June 1999, Napster was released as a centralized unstructured peer-to-peer system,[1] requiring a central server for indexing and peer discovery. It is generally credited as being the first peer-to-peer file sharing system. Gnutella, eDonkey2000, and Freenet were released in 2000, as MP3.com and Napster were facing litigation. Gnutella, released in March, was the first decentralized file sharing network. In the gnutella network, all connecting software was considered equal, and therefore the network had no central point of failure. In July, Freenet was released and became the first anonymity network. In September the eDonkey2000 client and server software was released. In 2001, Kazaa and Poisoned for the Mac was released. Its FastTrack network was distributed, though unlike gnutella, it assigned more traffic to 'supernodes' to increase routing efficiency. The network was proprietary and encrypted, and the Kazaa team made substantial efforts to keep other clients such as Morpheus off of the FastTrack network. In July 2001, Napster was sued by several recording companies and lost in A&M Records, Inc. v. Napster, Inc..[2] In the case of Napster, it has been ruled that an online service provider could not use the "transitory network transmission" safe harbor in the DMCA if they had control of the network with a server.[3] Shortly after its loss in court, Napster was shut down to comply with a court order. This drove users to other P2P applications and file sharing continued its growth.[4] The Audiogalaxy Satellite client grew in popularity, and the LimeWire client and BitTorrent protocol were released. Until its decline in 2004, Kazaa was the most popular file sharing program despite bundled malware and legal battles in the Netherlands, Australia, and the United States. In 2002, a Tokyo district court ruling shut down File Rogue, and the Recording Industry Association of America (RIAA) filed a lawsuit that effectively shut down Audiogalaxy. From 2002 through 2003, a number of BitTorrent services were established, including Suprnova.org, isoHunt, TorrentSpy, and The Pirate Bay. In 2002, the RIAA was filing lawsuits against Kazaa users. As a result of such lawsuits, many universities added file sharing regulations in their school administrative codes (though some students managed to circumvent them during after school hours). With the shutdown of eDonkey in 2005, eMule became the dominant client of the eDonkey network. In 2006, police raids took down the Razorback2 eDonkey server and temporarily took down The Pirate Bay.

224

In 2009, the Pirate Bay trial ended in a guilty verdict for the primary founders of the tracker. The decision was appealed, leading to a second guilty verdict in November 2010. In October 2010, Limewire was forced to shut down following a court order in Arista Records LLC v. Lime Group LLC but the gnutella network remains active through open source clients like Frostwire and gtk-gnutella. Furthermore, multi-protocol file sharing software such as MLDonkey and Shareaza adapted in order to support all the major file sharing protocols, so users no longer had to install and configure multiple file sharing programs. On 19 January 2012, the United States Department of Justice shut down the popular domain of Megaupload (established 2005). The file sharing site has claimed to have over 50,000,000 people a day.[5] Kim Dotcom (formerly Kim Schmitz) was arrested in New Zealand and is awaiting extradition.[6] The case involving the downfall of the world's largest and most popular file sharing site was not well received, with hacker group Anonymous bringing down several sites associated with the take-down.[5] In the days following this, other file sharing sites began to cease services; Filesonic blocked public downloads on January 22, with Fileserve following suit on January 23.

Demonstrators protesting The Pirate Bay raid, 2006.

File sharing

225

Legality of file sharing


The legal debate surrounding file sharing has caused many lawsuits. In the United States, some of these lawsuits have even reached the Supreme Court in MGM v. Grokster. In that particular lawsuit, the Supreme Court has ruled that the creators of P2P networks can be held responsible if the intent of their program is clearly to infringe on copyright laws. On the other hand, file sharing is not necessarily illegal, even if the works being shared are covered by copyright. For example, some artists may choose to support freeware, shareware, open source, or anti-copyright, and advocate the use of file sharing as a free promotional tool. Nearly all freeware, and open source software may be shared, under the rules specified in the license for that specific piece of software. Content in the public domain can also be freely shared.

Ethics of file sharing


In 2004 there were an estimated 70 million people participating in online file sharing.[7] According to a CBS News poll in 2009, 58% of Americans who follow the file sharing issue, considered it acceptable "if a person owns the music CD and shares it with a limited number of friends and acquaintances"; with 18 to 29 year olds this percentage reached as much as 70%.[8]

Effects of file sharing


According to David Glenn, writing in The Chronicle of Higher Education, "A majority of economic studies have concluded that file sharing hurts sales".[9] A literature review by Professor Peter Tschmuck found 22 independent studies on the effects of music file sharing. "Of these 22 studies, 14 roughly two-thirds conclude that unauthorized downloads have a 'negative or even highly negative impact' on recorded music sales. Three of the studies found no significant impact while the remaining five found a positive impact."[10][11][12] A study by economists Felix Oberholzer-Gee and Koleman Strumpf in 2004 concluded that music file sharing's effect on sales was "statistically indistinguishable from zero".[13][14] This research was disputed by other economists, most notably Stan Liebowitz, who said Oberholzer-Gee and Strumpf had made multiple assumptions about the music industry "that are just not correct."[13][15][16] In June 2010, Billboard reported that Oberholzer-Gee and Strumpf had "changed their minds", now finding "no more than 20% of the recent decline in sales is due to sharing".[17] However, citing Nielsen SoundScan as their source, the co-authors maintained that illegal downloading had not deterred people from being original. "In many creative industries, monetary incentives play a reduced role in motivating authors to remain creative. Data on the supply of new works are consistent with the argument that file sharing did not discourage authors and publishers. Since the advent of file sharing, the production of music, books, and movies has increased sharply."[18] Glenn Peoples of Billboard disputed the underlying data, saying "SoundScan's number for new releases in any given year represents new commercial titles, not necessarily new creative works."[19] The RIAA likewise responded that "new releases" and "new creative works" are two separate things. "[T]his figure includes re-releases, new compilations of existing songs, and new digital-only versions of catalog albums. SoundScan has also steadily increased the number of retailers (especially non-traditional retailers) in their sample over the years, better capturing the number of new releases brought to market. What Oberholzer and Strumpf found was better ability to track new album releases, not greater incentive to create them."[20] A 2006 study prepared by Birgitte Andersen and Marion Frenz, published by Industry Canada, was "unable to discover any direct relationship between P2P file-sharing and CD purchases in Canada".[21] The results of this survey were similarly criticized by academics and a subsequent revaluation of the same data by Dr. George R. Barker of the Australian National University reached the opposite conclusion.[22] "In total, 75% of P2P downloaders responded that if P2P were not available they would have purchased either through paid sites only (9%), CDs only (17%) or through CDs and pay sites (49%). Only 25% of people say they would not have bought the music if it were not

File sharing available on P2P for free. This clearly suggests P2P network availability is reducing music demand of 75% of music downloaders which is quite contrary to Andersen and Frenz's much published claim."[23]

226

Market dominance
A paper in journal Management Science found that file sharing decreased the chance of survival for low ranked albums on music charts and increased exposure to albums that were ranked high on the music charts, allowing popular and well known artists to remain on the music charts more often. This had a negative impact for new and less known artists while promoting the work of already popular artists and celebrities.[24] A more recent study that examined pre-release file sharing of music albums, using BitTorrent software, also discovered positive impacts for "established and popular artists but not newer and smaller artists." According to Robert G. Hammond of North Carolina State University, an album that leaked one month early would see a modest increase in sales. "This increase in sales is small relative to other factors that have been found to affect album sales." "File-sharing proponents commonly argue that file sharing democratizes music consumption by 'leveling the playing field' for new/small artists relative to established/popular artists, by allowing artists to have their work heard by a wider audience, lessening the advantage held by established/popular artists in terms of promotional and other support. My results suggest that the opposite is happening, which is consistent with evidence on file-sharing behavior."[25] Billboard cautioned that this research looked only at the pre-release period and not continuous file sharing following a release date. "The problem in believing piracy helps sales is deciding where to draw the line between legal and illegal. ... Implicit in the study is the fact that both buyers and sellers are required in order for pre-release file sharing to have a positive impact on album sales. Without iTunes, Amazon and Best Buy, file-sharers would be just file sharers rather than purchasers. If you carry out the 'file sharing should be legal' argument to its logical conclusion, today's retailers will be tomorrow's file-sharing services that integrate with their respective cloud storage services."[26]

Availability
Many argue that file-sharing has forced the owners of entertainment content to make it more widely available legally through fee or advertising on demand on the internet, rather than remain static with TV, radio, DVD's, CD's, and the theater. Content for purchase has been higher than illegal in North America aggregate internet traffic since at least 2009.[27]As content becomes more available for pay streaming and legal action continues against illegal file sharing, illegal file sharing will likely decline further.[28]

References
[1] "Reliable distributed systems: technologies, Web services, and applications - Kenneth P. Birman - Google Books" (http:/ / books. google. ca/ books?id=KeIENcC2BPwC& pg=PA532& lpg=PA532& dq=napster+ first#PPA532,M1). Books.google.ca. . Retrieved 2012-01-20. [2] Menta, Richard (December 9, 1999). "RIAA Sues Music Startup Napster for $20 Billion" (http:/ / www. mp3newswire. net/ stories/ napster. html). MP3 Newswire. . [3] "EFF: What Peer-to-Peer Developers Need to Know about Copyright Law" (http:/ / w2. eff. org/ IP/ P2P/ p2p_copyright_wp. php). W2.eff.org. . Retrieved 2012-01-20. [4] Menta, Richard (July 20, 2001). "Napster Clones Crush Napster. Take 6 out of the Top 10 Downloads on CNet" (http:/ / www. mp3newswire. net/ stories/ 2001/ topclones. html). MP3 Newswire. . [5] "Department of Justice site hacked after Megaupload shutdown, Anonymous claims credit. Washington Post" (http:/ / www. washingtonpost. com/ business/ economy/ department-of-justice-site-hacked-after-megaupload-shutdown-anonymous-claims-credit/ 2012/ 01/ 20/ gIQAl5MNEQ_story. html?tid=pm_business_pop). Washingtonpost.com. . Retrieved 2012-01-30. [6] Schneider, Joe (2012-01-24). "Megauploads Dotcom in Custody as New Zealand Awaits Extradition Request, Bloomberg" (http:/ / www. bloomberg. com/ news/ 2012-01-24/ megaupload-s-dotcom-in-custody-as-new-zealand-awaits-extradition-request. html). Bloomberg.com. . Retrieved 2012-01-30. [7] "Law professors examine ethical controversies of peer-to-peer file sharing" (http:/ / news-service. stanford. edu/ news/ 2004/ march17/ fileshare-317. html). News-service.stanford.edu. 2004-03-17. . Retrieved 2012-01-20.

File sharing
[8] "Poll: Young Say File Sharing OK" (http:/ / www. cbsnews. com/ stories/ 2003/ 09/ 18/ opinion/ polls/ main573990. shtml). CBS News. 2009-02-11. . Retrieved 2012-01-20. [9] Glenn, David. Dispute Over the Economics of File Sharing Intensifies, Chronicle.com, July 17, 2008. [10] Hart, Terry. More Evidence for Copyright Protection (http:/ / www. copyhype. com/ 2012/ 02/ more-evidence-for-copyright-protection/ ), copyhype.com, February 1, 2012. "The literature review looked at a 23rd study but did not classify it here since the author presented a mixed conclusion: the overall effect of unauthorized downloads is insignificant, but for unknown artists, there is a 'strongly negative' effect on recorded music sales." [11] AJ Sokolov, Daniel . Wissenschaftler: Studien ber Tauschbrsen unbrauchbar (http:/ / www. heise. de/ ct/ meldung/ Wissenschaftler-Studien-ueber-Tauschboersen-unbrauchbar-1020532. html), c't magazine, June 11, 2010. [12] Tschmuck, Peter. The Economics of Music File Sharing A Literature Overview, Vienna Music Business Research Days, University of Music and Performing Arts, Vienna, June 9-10, 2010. [13] Levine, Robert. Free Ride: How the Internet Is Destroying the Culture Business and How the Culture Business Can Fight Back, Bodley Head, February 2011. [14] Oberholzer, Felix; Koleman Strumpf. "The Effect of File Sharing on Record Sales: An Empirical Analysis" (http:/ / www. unc. edu/ ~cigar/ papers/ FileSharing_March2004. pdf) (PDF). . Retrieved 2008-06-13. [15] Liebowitz, Stan J.. How Reliable is the Oberholzer-Gee and Strumpf Paper on File-Sharing?. SSRN1014399. [16] Liebowitz, Stan J.. "The Key Instrument in the Oberholzer-Gee/Strumpf File-Sharing Paper is Defective" (http:/ / musicbusinessresearch. files. wordpress. com/ 2010/ 06/ paper-stan-j-liebowitz1. pdf) (PDF). . Retrieved 2008-06-13. [17] Peoples, Glenn. Researchers Change Tune, Now Say P2P Has Negative Impact (http:/ / www. billboard. biz/ bbbiz/ content_display/ industry/ e3i82a006de3290b1a63323f3e4ee910ca9) Billboard. June 22, 2010. [18] Oberholzer & Strumpf. "File Sharing and Copyright" NBER Innovation Policy & the Economy, Vol. 10, No. 1, 2010. "Artists receive a significant portion of their remuneration not in monetary form many of them enjoy fame, admiration, social status, and free beer in bars suggesting a reduction in monetary incentives might possibly have a reduced impact on the quantity and quality of artistic production." [19] Peoples, Glenn. Analysis: Are Musicians Losing the Incentive to Create? (http:/ / www. billboard. biz/ bbbiz/ content_display/ industry/ e3ic193b6eacf48409b52f1ab027d2d2b6c) Billboard. July 26, 2010. [20] Friedlander, Joshua P. & Lamy, Jonathan. Illegal Downloading = Fewer Musicians (http:/ / www. ifpi. org/ content/ library/ view_35. pdf) ifpi.org, July 19, 2010. [21] The Impact of Music Downloads and P2P File-Sharing on the Purchase of Music: A Study for Industry Canada (http:/ / strategis. ic. gc. ca/ epic/ site/ ippd-dppi. nsf/ en/ h_ip01456e. html), Birgitte Andersen and Marion Frenz [22] Peoples, Glenn. A New Look at an Old Survey Finds P2P Hurts Music Purchases (http:/ / www. billboard. biz/ bbbiz/ industry/ digital-and-mobile/ business-matters-a-new-look-at-an-old-survey-1006083952. story), Billboard. February 2, 2012. [23] Barker, George R. Evidence of the Effect of Free Music Downloads on the Purchase of Music CDs (http:/ / papers. ssrn. com/ sol3/ papers. cfm?abstract_id=1990153) Social Science Research Network. January 23, 2012. [24] Bhattacharjee, Sudip., Gopal, Ram D., Lertwachara, Kaveepan. Marsden, James R. & Telang, Rahul. The Effect of Digital Sharing Technologies on Music Markets: A Survival Analysis of Albums on Ranking Charts (http:/ / mansci. journal. informs. org/ content/ 53/ 9/ 1359. full. pdf+ html) Management Science 2007. [25] Hammond. Robert G. " Profit Leak? Pre-Release File Sharing and the Music Industry (http:/ / www4. ncsu. edu/ ~rghammon/ Hammond_File_Sharing_Leak. pdf)" May 2012. File sharing benets mainstream albums such as pop music but not albums in niche genres such as indie music. ... Further, the finding that le sharing redistributes sales toward established/popular artists is inconsistent with claims made by proponents of le sharing that le sharing democratizes music consumption." [26] Peoples, Glenn. Business Matters: Pre-release File Sharing Helps Album Sales, Says a Study. So Why Not Replicate This Legally? (http:/ / www. billboard. biz/ bbbiz/ industry/ record-labels/ business-matters-pre-release-file-sharing-1007125352. story) Billboard. May 22, 2012. [27] Global Internet Phenomena Report - Spring 2011 (http:/ / www. wired. com/ images_blogs/ epicenter/ 2011/ 05/ SandvineGlobalInternetSpringReport2011. pdf) Sandvine Global Internet Waterloo, Ontario, Canada. May 12, 2011 [28] Ryan Singel Most content online is now paid for, thanks to Netflix (http:/ / www. cnn. com/ 2011/ TECH/ web/ 05/ 18/ netflix. piracy. wired/ index. html) Wired via CNN.com May 18, 2011.

227

File sharing

228

Further reading
Levine, Robert. Free Ride: How the Internet Is Destroying the Culture Business and How the Culture Business Can Fight Back, Bodley Head, February 2011. Ghosemajumder, Shuman. Advanced Peer-Based Technology Business Models (http://shumans.com/ p2p-business-models.pdf). MIT Sloan School of Management, 2002 Silverthorne, Sean. Music Downloads: Pirates- or Customers? (http://hbswk.hbs.edu/item.jhtml?id=4206& t=innovation). Harvard Business School Working Knowledge, 2004. Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer Systems and Applications (http://www.peer-to-peer.info/). ISBN 3-540-29192-X, Lecture Notes in Computer Science, Volume 3485, September 2005 Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies (http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html). ACM Computing Surveys, 36(4):335371, December 2004. doi:10.1145/1041680.1041681. Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems (http://www.cs.ucsb.edu/~almeroth/classes/F02.276/papers/p2p-measure.pdf). Technical Report # UW-CSE-01-06-02. Department of Computer Science & Engineering. University of Washington. Seattle, WA, USA. Selected Papers (http://www.cs.huji.ac.il/labs/danss/p2p/resources.html) A collection of academic papers.

External links
Digital Britain (http://interactive.bis.gov.uk/digitalbritain/digital-economy-bill/.)

Search
A web search engine is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERP's). The information may be a specialist in web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler.

History
Timeline (full list) Year Engine Current status Inactive Inactive Active, Aggregator Active, Yahoo Search Active

1993 W3Catalog Aliweb 1994 WebCrawler Go.com Lycos

Search

229
1995 AltaVista Daum Magellan Excite SAPO Yahoo! 1996 Dogpile Inktomi HotBot Ask Jeeves 1997 Northern Light Yandex 1998 Google MSN Search 1999 AlltheWeb GenieKnows Naver Teoma Vivisimo 2000 Baidu Exalead 2002 Inktomi 2003 Info.com 2004 Yahoo! Search Active, Yahoo Search Active Inactive Active Active Active, Launched as a directory Active, Aggregator Acquired by Yahoo! Active (lycos.com) Active (rebranded ask.com) Inactive Active Active Active as Bing Inactive (URL redirected to Yahoo!) Active, rebranded Yellowee.com Active Active Inactive Active Inactive Acquired by Yahoo! Active Active, Launched own web search (see Yahoo! Directory, 1995) Inactive Active Active Active Active Inactive Inactive Active Active Active as Bing, Launched as rebranded MSN Search Active Active

A9.com Sogou 2005 AOL Search Ask.com GoodSearch SearchMe 2006 wikiseek Quaero Ask.com Live Search

ChaCha Guruji.com

Search

230
2007 wikiseek Sproose Wikia Search Blackle.com 2008 Powerset Picollator Viewzi Boogami LeapFish Forestle 2009 Bing Inactive Inactive Inactive Active Inactive (redirects to Bing) Inactive Inactive Inactive Inactive Inactive (redirects to Ecosia) Active, Launched as rebranded Live Search Active Inactive due to a lack of funding Active Active Inactive Active, Launched global (English) search Active Active as Interredu Active, Launched Turkey search Active Active

Yebol Mugurdy Goby 2010 Blekko Cuil Yandex

Yummly 2011 Interred Yandex 2012 Volunia Interredu

During the early development of the web, there was a list of webservers edited by Tim Berners-Lee and hosted on the CERN webserver. One historical snapshot from 1992 remains.[1] As more webservers went online the central list could not keep up. On the NCSA site new servers were announced under the title "What's New!"[2] The very first tool used for searching on the Internet was Archie.[3] The name stands for "archive" without the "v". It was created in 1990 by Alan Emtage, Bill Heelan and J. Peter Deutsch, computer science students at McGill University in Montreal. The program downloaded the directory listings of all the files located on public anonymous FTP (File Transfer Protocol) sites, creating a searchable database of file names; however, Archie did not index the contents of these sites since the amount of data was so limited it could be readily searched manually. The rise of Gopher (created in 1991 by Mark McCahill at the University of Minnesota) led to two new search programs, Veronica and Jughead. Like Archie, they searched the file names and titles stored in Gopher index systems. Veronica (Very Easy Rodent-Oriented Net-wide Index to Computerized Archives) provided a keyword search of most Gopher menu titles in the entire Gopher listings. Jughead (Jonzy's Universal Gopher Hierarchy Excavation And Display) was a tool for obtaining menu information from specific Gopher servers. While the name of the search engine "Archie" was not a reference to the Archie comic book series, "Veronica" and "Jughead" are characters in the series, thus referencing their predecessor. In the summer of 1993, no search engine existed yet for the web, though numerous specialized catalogues were maintained by hand. Oscar Nierstrasz at the University of Geneva wrote a series of Perl scripts that would periodically mirror these pages and rewrite them into a standard format which formed the basis for W3Catalog, the

Search web's first primitive search engine, released on September 2, 1993.[4] In June 1993, Matthew Gray, then at MIT, produced what was probably the first web robot, the Perl-based World Wide Web Wanderer, and used it to generate an index called 'Wandex'. The purpose of the Wanderer was to measure the size of the World Wide Web, which it did until late 1995. The web's second search engine Aliweb appeared in November 1993. Aliweb did not use a web robot, but instead depended on being notified by website administrators of the existence at each site of an index file in a particular format. JumpStation (released in December 1993[5]) used a web robot to find web pages and to build its index, and used a web form as the interface to its query program. It was thus the first WWW resource-discovery tool to combine the three essential features of a web search engine (crawling, indexing, and searching) as described below. Because of the limited resources available on the platform on which it ran, its indexing and hence searching were limited to the titles and headings found in the web pages the crawler encountered. One of the first "all text" crawler-based search engines was WebCrawler, which came out in 1994. Unlike its predecessors, it let users search for any word in any webpage, which has become the standard for all major search engines since. It was also the first one to be widely known by the public. Also in 1994, Lycos (which started at Carnegie Mellon University) was launched and became a major commercial endeavor. Soon after, many search engines appeared and vied for popularity. These included Magellan, Excite, Infoseek, Inktomi, Northern Light, and AltaVista. Yahoo! was among the most popular ways for people to find web pages of interest, but its search function operated on its web directory, rather than full-text copies of web pages. Information seekers could also browse the directory instead of doing a keyword-based search. In 1996, Netscape was looking to give a single search engine an exclusive deal to be the featured search engine on Netscape's web browser. There was so much interest that instead a deal was struck with Netscape by five of the major search engines, where for $5 million per year each search engine would be in rotation on the Netscape search engine page. The five engines were Yahoo!, Magellan, Lycos, Infoseek, and Excite.[6][7] Search engines were also known as some of the brightest stars in the Internet investing frenzy that occurred in the late 1990s.[8] Several companies entered the market spectacularly, receiving record gains during their initial public offerings. Some have taken down their public search engine, and are marketing enterprise-only editions, such as Northern Light. Many search engine companies were caught up in the dot-com bubble, a speculation-driven market boom that peaked in 1999 and ended in 2001. Around 2000, Google's search engine rose to prominence.[9] The company achieved better results for many searches with an innovation called PageRank. This iterative algorithm ranks web pages based on the number and PageRank of other web sites and pages that link there, on the premise that good or desirable pages are linked to more than others. Google also maintained a minimalist interface to its search engine. In contrast, many of its competitors embedded a search engine in a web portal. By 2000, Yahoo! was providing search services based on Inktomi's search engine. Yahoo! acquired Inktomi in 2002, and Overture (which owned AlltheWeb and AltaVista) in 2003. Yahoo! switched to Google's search engine until 2004, when it launched its own search engine based on the combined technologies of its acquisitions. Microsoft first launched MSN Search in the fall of 1998 using search results from Inktomi. In early 1999 the site began to display listings from Looksmart blended with results from Inktomi except for a short time in 1999 when results from AltaVista were used instead. In 2004, Microsoft began a transition to its own search technology, powered by its own web crawler (called msnbot). Microsoft's rebranded search engine, Bing, was launched on June 1, 2009. On July 29, 2009, Yahoo! and Microsoft finalized a deal in which Yahoo! Search would be powered by Microsoft Bing technology.

231

Search

232

How web search engines work


A search engine operates in the following order: 1. Web crawling 2. Indexing 3. Searching[10] Web search engines work by storing information about many web pages, which they retrieve from the HTML itself. These pages are retrieved by a Web crawler (sometimes also known as a spider) an automated Web browser which follows every link on the site. Exclusions can be made by the use of robots.txt. The contents of each page are then analyzed to determine how it should be indexed (for example, words can be extracted from the titles, page content, headings, or special fields called meta tags). Data about web pages are stored in an index database for use in later queries. A query can be a single word. The purpose of an index is to allow information to be found as quickly as possible.[10] Some search engines, such as Google, store all or part of the source page (referred to as a cache) as well as information about the web pages, whereas others, such as AltaVista, store every word of every page they find. This cached page always holds the actual search text since it is the one that was actually indexed, so it can be very useful when the content of the current page has been updated and the search terms are no longer in it.[10] This problem might be considered to be a mild form of linkrot, and Google's handling of it increases usability by satisfying user expectations that the search terms will be on the returned webpage. This satisfies the principle of least astonishment since the user normally expects the search terms to be on the returned pages. Increased search relevance makes these cached pages very useful, even beyond the fact that they may contain data that may no longer be available elsewhere. When a user enters a query into a search engine (typically by using keywords), the engine examines its index and provides a listing of best-matching web pages according to its criteria, usually with a short summary containing the document's title and sometimes parts of the text. The index is built from the information stored with the data and the method by which the information is indexed.[10] As early as 2007 the Google.com search engine has allowed one to search by date by clicking 'Show search tools' in the leftmost column of the initial search results page, and then selecting the desired date range. Most search High-level architecture of a standard Web crawler engines support the use of the boolean operators AND, OR and NOT to further specify the search query. Boolean operators are for literal searches that allow the user to refine and extend the terms of the search. The engine looks for the words or phrases exactly as entered. Some search engines provide an advanced feature called proximity search which allows users to define the distance between keywords.[10] There is also concept-based searching where the research involves using statistical analysis on pages containing the words or phrases you search for. As well, natural language queries allow the user to type a question in the same form one would ask it to a human. A site like this would be ask.com. The usefulness of a search engine depends on the relevance of the result set it gives back. While there may be millions of web pages that include a particular word or phrase, some pages may be more relevant, popular, or authoritative than others. Most search engines employ methods to rank the results to provide the "best" results first. How a search engine decides which pages are the best matches, and what order the results should be shown in, varies widely from one engine to another.[10] The methods also change over time as Internet usage changes and new techniques evolve. There are two main types of search engine that have evolved: one is a system of predefined and hierarchically ordered keywords that humans have programmed extensively. The other is a system that generates an "inverted index" by analyzing texts it locates. This first form relies much more heavily on the computer itself to do the bulk of the work.

Search Most Web search engines are commercial ventures supported by advertising revenue and, as a result, some employ, the practice of allowing advertisers to pay money to have their listings ranked higher in search results. Those search engines which do not accept money for their search engine results make money by running search related ads alongside the regular search engine results. The search engines make money every time someone clicks on one of these ads.

233

Market share
Search engine Market share in May 2011 Market share in December 2010[11] Google Yahoo! Baidu Bing Yandex Ask AOL 82.80% 6.42% 4.89% 3.91% 1.7% 0.52% 0.3% 84.65% 6.69% 3.39% 3.29% 1.3% 0.56% 0.42%

Google's worldwide market share peaked at 86.3% in April 2010.[12] Yahoo!, Bing and other search engines are more popular in the US than in Europe. According to Hitwise, market share in the U.S. for October 2011 was Google 65.38%, Bing-powered (Bing and Yahoo!) 28.62%, and the remaining 66 search engines 6%. However, an Experian Hit wise report released in August 2011 gave the "success rate" of searches sampled in July. Over 80 percent of Yahoo! and Bing searches resulted in the users visiting a web site, while Google's rate was just under 68 percent.[13][14] In the People's Republic of China, Baidu held a 61.6% market share for web search in July 2009.[15] In Russian Federation, Yandex holds around 60% of the market share as of April 2012.[16]

Search engine bias


Although search engines are programmed to rank websites based on their popularity and relevancy, empirical studies indicate various political, economic, and social biases in the information they provide.[17][18] These biases could be a direct result of economic and commercial processes (e.g., companies that advertise with a search engine can become also more popular in its organic search results), and political processes (e.g., the removal of search results in order to comply with local laws).[19] Google Bombing is one example of an attempt to manipulate search results for political, social or commercial reasons.

Customized results and filter bubbles


Many search engines such as Google and Bing provide customized results based on the user's activity history. This leads to an effect that has been called a filter bubble. The term describes a phenomenon in which websites use algorithms to selectively guess what information a user would like to see, based on information about the user (such as location, past click behaviour and search history). As a result, websites tend to show only information which agrees with the user's past viewpoint, effectively isolating the user in a bubble that tends to exclude contrary information. Prime examples are Google's personalized search results and Facebook's personalized news stream. According to Eli Pariser, who coined the term, users get less exposure to conflicting viewpoints and are isolated intellectually in their own informational bubble. Pariser related an example in which one user searched Google for "BP" and got investment news about British Petroleum while another searcher got information about the Deepwater

Search Horizon oil spill and that the two search results pages were "strikingly different."[20][21][22] The bubble effect may have negative implications for civic discourse, according to Pariser.[23] Since this problem has been identified, competing search engines have emerged that seek to avoid this problem by not tracking[24] or "bubbling"[25] users.

234

References
[1] "World-Wide Web Servers" (http:/ / www. w3. org/ History/ 19921103-hypertext/ hypertext/ DataSources/ WWW/ Servers. html). W3.org. . Retrieved 2012-05-14. [2] "What's New! February 1994" (http:/ / home. mcom. com/ home/ whatsnew/ whats_new_0294. html). Home.mcom.com. . Retrieved 2012-05-14. [3] "Internet History - Search Engines" (from Search Engine Watch), Universiteit Leiden, Netherlands, September 2001, web: LeidenU-Archie (http:/ / www. internethistory. leidenuniv. nl/ index. php3?c=7). [4] Oscar Nierstrasz (2 September 1993). "Searchable Catalog of WWW Resources (experimental)" (http:/ / groups. google. com/ group/ comp. infosystems. www/ browse_thread/ thread/ 2176526a36dc8bd3/ 2718fd17812937ac?hl=en& lnk=gst& q=Oscar+ Nierstrasz#2718fd17812937ac). . [5] "Archive of NCSA what's new in December 1993 page" (http:/ / web. archive. org/ web/ 20010620073530/ http:/ / archive. ncsa. uiuc. edu/ SDG/ Software/ Mosaic/ Docs/ old-whats-new/ whats-new-1293. html). Web.archive.org. 2001-06-20. . Retrieved 2012-05-14. [6] "Yahoo! And Netscape Ink International Distribution Deal" (http:/ / files. shareholder. com/ downloads/ YHOO/ 701084386x0x27155/ 9a3b5ed8-9e84-4cba-a1e5-77a3dc606566/ YHOO_News_1997_7_8_General. pdf). [7] Browser Deals Push Netscape Stock Up 7.8% (http:/ / articles. latimes. com/ 1996-04-01/ business/ fi-53780_1_netscape-home). Los Angeles Times. 1 April 1996. [8] Gandal, Neil (2001). "The dynamics of competition in the internet search engine market". International Journal of Industrial Organization 19 (7): 11031117. doi:10.1016/S0167-7187(01)00065-0. [9] "Our History in debth" (http:/ / www. google. com/ about/ company/ history/ ). W3.org. . Retrieved 2012-10-31. [10] Jawadekar, Waman S (2011), "8. Knowledge Management: Tools and Technology" (http:/ / books. google. com/ books?id=XmGx4J9daUMC& pg=PA278& dq="search+ engine+ operates"& hl=en& sa=X& ei=a-muUJ6UC4aeiAfI24GYAw& sqi=2& ved=0CDgQ6AEwBA), Knowlege Management: Text & Cases (http:/ / books. google. com/ books?id=XmGx4J9daUMC& printsec=frontcover& dq=knowledge+ management:+ text& hl=en& sa=X& ei=ou6uUP-cNqWTiAe2oICoAw& sqi=2& ved=0CDIQ6AEwAA), New Delhi: Tata McGraw-Hill Education Private Ltd, p.278, ISBN978-0-07-07-0086-4, , retrieved November 23 2012 [11] "Net Marketshare - World" (http:/ / marketshare. hitslink. com/ search-engine-market-share. aspx?qprid=4). Marketshare.hitslink.com. . Retrieved 2012-05-14. [12] "Net Market share - Google" (http:/ / marketshare. hitslink. com/ report. aspx?qprid=5& qpcustom=Google - Global& qptimeframe=M& qpsp=120& qpnp=25). Marketshare.hitslink.com. . Retrieved 2012-05-14. [13] "Google Remains Ahead of Bing, But Relevance Drops" (http:/ / news. yahoo. com/ google-remains-ahead-bing-relevance-drops-210457139. html). August 12, 2011. . [14] Experian Hitwise reports Bing-powered share of searches at 29 percent in October 2011 (http:/ / www. hitwise. com/ us/ about-us/ press-center/ press-releases/ bing-powered-share-of-searches-at-29-percent), Experian Hitwise, November 16, 2011 [15] "Search Engine Market Share July 2009 | Rise to the Top Blog" (http:/ / risetothetop. techwyse. com/ internet-marketing/ search-engine-market-share-july-2009/ ). Risetothetop.techwyse.com. 2009-08-04. . Retrieved 2012-05-14. [16] Pavliva, Halia (2012-04-02). "Yandex Internet Search Share Gains, Google Steady: Liveinternet" (http:/ / www. bloomberg. com/ news/ 2012-04-02/ yandex-internet-search-share-gains-google-steady-liveinternet. html). Bloomberg.com. . Retrieved 2012-05-14. [17] Segev, Elad (2010). Google and the Digital Divide: The Biases of Online Knowledge, Oxford: Chandos Publishing. [18] Vaughan, L. & Thelwall, M. (2004). Search engine coverage bias: evidence and possible causes, Information Processing & Management, 40(4), 693-707. [19] Berkman Center for Internet & Society (2002), Replacement of Google with Alternative Search Systems in China: Documentation and Screen Shots (http:/ / cyber. law. harvard. edu/ filtering/ china/ google-replacements/ ), Harvard Law School. [20] Parramore, Lynn (10 October 2010). "The Filter Bubble" (http:/ / www. theatlantic. com/ daily-dish/ archive/ 2010/ 10/ the-filter-bubble/ 181427/ ). The Atlantic. . Retrieved 2011-04-20. "Since Dec. 4, 2009, Google has been personalized for everyone. So when I had two friends this spring Google "BP," one of them got a set of links that was about investment opportunities in BP. The other one got information about the oil spill...." [21] Weisberg, Jacob (10 June 2011). "Bubble Trouble: Is Web personalization turning us into solipsistic twits?" (http:/ / www. slate. com/ id/ 2296633/ ). Slate. . Retrieved 2011-08-15. [22] Gross, Doug (May 19, 2011). "What the Internet is hiding from you" (http:/ / articles. cnn. com/ 2011-05-19/ tech/ online. privacy. pariser_1_google-news-facebook-internet/ 2?_s=PM:TECH). CNN. . Retrieved 2011-08-15. "I had friends Google BP when the oil spill was happening. These are two women who were quite similar in a lot of ways. One got a lot of results about the environmental consequences of what was happening and the spill. The other one just got investment information and nothing about the spill at all."

Search
[23] Zhang, Yuan Cao; Saghdha, Diarmuid ; Quercia, Daniele; Jambor, Tamas (February 2012). "Auralist: Introducing Serendipity into Music Recommendation" (http:/ / www-typo3. cs. ucl. ac. uk/ fileadmin/ UCL-CS/ research/ Research_Notes/ RN_11_21. pdf). ACM WSDM. . [24] "donttrack.us" (http:/ / donttrack. us). . Retrieved 2012-04-29. [25] "dontbubble.us" (http:/ / dontbubble. us). . Retrieved 2012-04-29.

235

GBMW: Reports of 30-day punishment, re: Car maker BMW had its German website bmw.de delisted from Google, such as: Slashdot-BMW (http://slashdot.org/article.pl?sid=06/02/05/235218) (05-Feb-2006). INSIZ: Maximum size of webpages indexed by MSN/Google/Yahoo! ("100-kb limit"): Max Page-size (http:// www.sitepoint.com/article/indexing-limits-where-bots-stop) (28-Apr-2006).

Further reading
For a more detailed history of early search engines, see Search Engine Birthdays (http://searchenginewatch. com/showPage.html?page=3071951) (from Search Engine Watch), Chris Sherman, September 2003. Steve Lawrence; C. Lee Giles (1999). "Accessibility of information on the web". Nature 400 (6740): 1079. doi:10.1038/21987. PMID10428673. Bing Liu (2007), Web Data Mining: Exploring Hyperlinks, Contents and Usage Data (http://www.cs.uic.edu/ ~liub/WebMiningBook.html). Springer, ISBN 3-540-37881-2 Bar-Ilan, J. (2004). The use of Web search engines in information science research. ARIST, 38, 231-288. Levene, Mark (2005). An Introduction to Search Engines and Web Navigation. Pearson. Hock, Randolph (2007). The Extreme Searcher's Handbook. ISBN 978-0-910965-76-7 Javed Mostafa (February 2005). "Seeking Better Web Searches" (http://www.sciam.com/article. cfm?articleID=0006304A-37F4-11E8-B7F483414B7F0000). Scientific American Magazine. Ross, Nancy; Wolfram, Dietmar (2000). "End user searching on the Internet: An analysis of term pair topics submitted to the Excite search engine". Journal of the American Society for Information Science 51 (10): 949958. doi:10.1002/1097-4571(2000)51:10<949::AID-ASI70>3.0.CO;2-5. Xie, M. et al. (1998). "Quality dimensions of Internet search engines". Journal of Information Science 24 (5): 365372. doi:10.1177/016555159802400509. Information Retrieval: Implementing and Evaluating Search Engines (http://www.ir.uwaterloo.ca/book/). MIT Press. 2010.

External links
Search Engines (http://www.dmoz.org/Computers/Internet/Searching/Search_Engines//) at the Open Directory Project

Blogging

236

Blogging
A blog (a portmanteau of the term web log)[1] is a discussion or informational site published on the World Wide Web and consisting of discrete entries ("posts") typically displayed in reverse chronological order (the most recent post appears first). Until 2009 blogs were usually the work of a single individual, occasionally of a small group, and often were themed on a single subject. More recently "multi-author blogs" (MABs) have developed, with posts written by large numbers of authors and professionally edited. MABs from newspapers, other media outlets, universities, think tanks, interest groups and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into societal newstreams. Blog can also be used as a verb, meaning to maintain or add content to a blog. The emergence and growth of blogs in the late 1990s coincided with the advent of web publishing tools that facilitated the posting of content by non-technical users. (Previously, a knowledge of such technologies as HTML and FTP had been required to publish content on the Web.) Although not a requirement, most good quality blogs are interactive, allowing visitors to leave comments and even message each other via GUI widgets on the blogs, and it is this interactivity that distinguishes them from other static websites.[2] In that sense, blogging can be seen as a form of social networking. Indeed, bloggers do not only produce content to post on their blogs, but also build social relations with their readers and other bloggers.[3] Many blogs provide commentary on a particular subject; others function as more personal online diaries; others function more as online brand advertising of a particular individual or company. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important contribution to the popularity of many blogs. Most blogs are primarily textual, although some focus on art (art blogs), photographs (photoblogs), videos (video blogs or "vlogs"), music (MP3 blogs), and audio (podcasts). Microblogging is another type of blogging, featuring very short posts. In education, blogs can be used as instructional resources. These blogs are referred to as edublogs. As of 16 February 2011, there were over 156million public blogs in existence.[4] On October 13, 2012, there were around 77 million Tumblr[5] and 56.6 million WordPress[6] blogs in existence worldwide.

Blogging

237

History
The term "weblog" was coined by Jorn Barger[7] on 17 December 1997. The short form, "blog," was coined by Peter Merholz, who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in April or May 1999.[8][9][10] Shortly thereafter, Evan Williams at Pyra Labs used "blog" as both a noun and verb ("to blog," meaning "to edit one's weblog or to post to one's weblog") and devised the term "blogger" in connection with Pyra Labs' Blogger product, leading to the popularization of the terms.[11]

Origins
Before blogging became popular, digital communities took many forms, including Early example of a "diary" style blog consisting of text and images transmitted Usenet, commercial online services such as wirelessly in real time from a wearable computer with headup display, 1995 GEnie, BiX and the early CompuServe, February 22nd e-mail lists[12] and Bulletin Board Systems (BBS). In the 1990s, Internet forum software, created running conversations with "threads". Threads are topical connections between messages on a virtual "corkboard". From June 14, 1993 Mosaic Communications Corporation maintained their "Whats New" [13] list of new websites, updated daily and archived monthly. The page was accessible by a special "What's New" button in the Mosaic web browser. The modern blog evolved from the online diary, where people would keep a running account of their personal lives. Most such writers called themselves diarists, journalists, or journalers. Justin Hall, who began personal blogging in 1994 while a student at Swarthmore College, is generally recognized as one of the earlier bloggers,[14] as is Jerry Pournelle.[15] Dave Winer's Scripting News is also credited with being one of the older and longer running weblogs.[16][17] The Australian Netguide magazine maintained the Daily Net News [18] on their web site from 1996. Daily Net News ran links and daily reviews of new websites, mostly in Australia. Another early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site in 1994. This practice of semi-automated blogging with live video together with text was referred to as sousveillance, and such journals were also used as evidence in legal matters. Early blogs were simply manually updated components of common Web sites. However, the evolution of tools to facilitate the production and maintenance of Web articles posted in reverse chronological order made the publishing process feasible to a much larger, less technical, population. Ultimately, this resulted in the distinct class of online publishing that produces blogs we recognize today. For instance, the use of some sort of browser-based software is now a typical aspect of "blogging". Blogs can be hosted by dedicated blog hosting services, or they can be run using blog software, or on regular web hosting services. Some early bloggers, such as The Misanthropic Bitch, who began in 1997, actually referred to their online presence as a zine, before the term blog entered common usage.

Blogging

238

Rise in popularity
After a slow start, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near-simultaneous arrival of the first hosted blog tools: Bruce Ableson launched Open Diary in October 1998, which soon grew to thousands of online diaries. Open Diary innovated the reader comment, becoming the first blog community where readers could add comments to other writers' blog entries. Brad Fitzpatrick started LiveJournal in March 1999. Andrew Smales created Pitas.com in July 1999 as an easier alternative to maintaining a "news page" on a Web site, followed by Diaryland in September 1999, focusing more on a personal diary community.[19] Evan Williams and Meg Hourihan (Pyra Labs) launched Blogger.com in August 1999 (purchased by Google in February 2003)

Political impact
An early milestone in the rise in importance of blogs came in 2002, when many bloggers focused on comments by U.S. Senate Majority Leader Trent Lott.[20] Senator Lott, at a party honoring U.S. Senator Strom Thurmond, praised Senator Thurmond by suggesting that the United States would have been better off had Thurmond been elected president. Lott's critics saw these comments as a tacit approval of racial segregation, a policy advocated by Thurmond's 1948 presidential campaign. This view was reinforced by documents and recorded interviews dug up by bloggers. (See Josh Marshall's Talking Points Memo.) Though Lott's comments were made at a public event attended by the media, no major media organizations reported on his controversial comments until after blogs broke the story. Blogging helped to create a political crisis that forced Lott to step down as majority leader. Similarly, blogs were among the driving forces behind the "Rathergate" scandal. To wit: (television journalist) Dan Rather presented documents (on the CBS show 60 Minutes) that conflicted with accepted accounts of President Bush's military service record. Bloggers declared the documents to be forgeries and presented evidence and arguments in support of that view. Consequently, CBS apologized for what it said were inadequate reporting techniques (see Little Green Footballs). Many bloggers view this scandal as the advent of blogs' acceptance by the mass media, both as a news source and opinion and as means of applying political pressure. The impact of these stories gave greater credibility to blogs as a medium of news dissemination. Though often seen as partisan gossips, bloggers sometimes lead the way in bringing key information to public light, with mainstream media having to follow their lead. More often, however, news blogs tend to react to material already published by the mainstream media. Meanwhile, an increasing number of experts blogged, making blogs a source of in-depth analysis. In Russia, some political bloggers have started to challenge the dominance of official, overwhelmingly pro-government media. Bloggers such as Rustem Adagamov and Alexey Navalny have many followers and the latter's nickname for the ruling United Russia party as the "party of crooks and thieves" and been adopted by anti-regime protesters.[21] This led to the Wall Street Journal calling Navalny "the man Vladimir Putin fears most" in March 2012.[22]

Mainstream popularity
By 2004, the role of blogs became increasingly mainstream, as political consultants, news services, and candidates began using them as tools for outreach and opinion forming. Blogging was established by politicians and political candidates to express opinions on war and other issues and cemented blogs' role as a news source. (See Howard Dean and Wesley Clark.) Even politicians not actively campaigning, such as the UK's Labour Party's MP Tom Watson, began to blog to bond with constituents.

Blogging In January 2005, Fortune magazine listed eight bloggers whom business people "could not ignore": Peter Rojas, Xeni Jardin, Ben Trott, Mena Trott, Jonathan Schwartz, Jason Goldman, Robert Scoble, and Jason Calacanis.[23] Israel was among the first national governments to set up an official blog.[24] Under David Saranga, the Israeli Ministry of Foreign Affairs became active in adopting Web 2.0 initiatives, including an official video blog[24] and a political blog.[25] The Foreign Ministry also held a microblogging press conference via Twitter about its war with Hamas, with Saranga answering questions from the public in common text-messaging abbreviations during a live worldwide press conference.[26] The questions and answers were later posted on IsraelPolitik, the country's official political blog.[27] The impact of blogging upon the mainstream media has also been acknowledged by governments. In 2009, the presence of the American journalism industry had declined to the point that several newspaper corporations were filing for bankruptcy, resulting in less direct competition between newspapers within the same circulation area. Discussion emerged as to whether the newspaper industry would benefit from a stimulus package by the federal government. U.S. President Barack Obama acknowledged the emerging influence of blogging upon society by saying "if the direction of the news is all blogosphere, all opinions, with no serious fact-checking, no serious attempts to put stories in context, then what you will end up getting is people shouting at each other across the void but not a lot of mutual understanding.[28]

239

Types
There are many different types of blogs, differing not only in the type of content, but also in the way that content is delivered or written. Personal blogs The personal blog, an ongoing diary or commentary by an individual, is the traditional, most common blog. Personal bloggers usually take pride in their blog posts, even if their blog is never read. Blogs often become more than a way to just communicate; they become a way to reflect on life, or works of art. Blogging can have a sentimental quality. Few personal blogs rise to fame and the mainstream but some personal blogs quickly garner an extensive following. One type of personal blog, referred to as a microblog, is extremely detailed and seeks to capture a moment in time. Some sites, such as Twitter, allow bloggers to share thoughts and feelings instantaneously with friends and family, and are much faster than emailing or writing. Microblogging Microblogging is the practice of posting small pieces of digital contentwhich could be text, pictures, links, short videos, or other mediaon the Internet. Microblogging offers a portable communication mode that feels organic and spontaneous to many and has captured the public imagination. Friends use it to keep in touch, business associates use it to coordinate meetings or share useful resources, and celebrities and politicians (or their publicists) microblog about concert dates, lectures, book releases, or tour schedules. A wide and growing range of add-on tools enables sophisticated updates and interaction with other applications, and the resulting profusion of functionality is helping to define new possibilities for this type of communication.[29] Corporate and organizational blogs A blog can be private, as in most cases, or it can be for business purposes. Blogs used internally to enhance the communication and culture in a corporation or externally for marketing, branding or public relations purposes are called corporate blogs. Similar blogs for clubs and societies are called club blogs, group blogs, or by similar names; typical use is to inform members and other interested parties of club and member activities. By genre Some blogs focus on a particular subject, such as political blogs, health blogs, travel blogs (also known as travelogs), gardening blogs, house blogs,[30][31] fashion blogs, project blogs, education blogs, niche blogs, classical music blogs, quizzing blogs and legal blogs (often referred to as a blawgs) or dreamlogs. Two

Blogging common types of genre blogs are art blogs and music blogs. A blog featuring discussions especially about home and family is not uncommonly called a mom blog and one made popular is by Erica Diamond who created Womenonthefence.com which is syndicated to over two million readers monthly.[32][33][34][35][36][37] While not a legitimate type of blog, one used for the sole purpose of spamming is known as a Splog. By media type A blog comprising videos is called a vlog, one comprising links is called a linklog, a site containing a portfolio of sketches is called a sketchblog or one comprising photos is called a photoblog.[38] Blogs with shorter posts and mixed media types are called tumblelogs. Blogs that are written on typewriters and then scanned are called typecast or typecast blogs; see typecasting (blogging). A rare type of blog hosted on the Gopher Protocol is known as a Phlog. By device Blogs can also be defined by which type of device is used to compose it. A blog written by a mobile device like a mobile phone or PDA could be called a moblog.[39] One early blog was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, video, and pictures transmitted live from a wearable computer and EyeTap device to a web site. This practice of semi-automated blogging with live video together with text was referred to as sousveillance. Such journals have been used as evidence in legal matters. Reverse blog A Reverse Blog is composed by its users rather than a single blogger. This system has the characteristics of a blog, and the writing of several authors. These can be written by several contributing authors on a topic, or opened up for anyone to write. There is typically some limit to the number of entries to keep it from operating like a Web Forum.

240

Community and cataloging


The Blogosphere The collective community of all blogs is known as the blogosphere. Since all blogs are on the internet by definition, they may be seen as interconnected and socially networked, through blogrolls, comments, linkbacks (refbacks, trackbacks or pingbacks) and backlinks. Discussions "in the blogosphere" are occasionally used by the media as a gauge of public opinion on various issues. Because new, untapped communities of bloggers and their readers can emerge in the space of a few years, Internet marketers pay close attention to "trends in the blogosphere".[40] Blog search engines Several blog search engines are used to search blog contents, such as Bloglines, BlogScope, and Technorati. Technorati, which is among the more popular blog search engines, provides current information on both popular searches and tags used to categorize blog postings.[41] The research community is working on going beyond simple keyword search, by inventing new ways to navigate through huge amounts of information present in the blogosphere, as demonstrated by projects like BlogScope. Blogging communities and directories Several online communities exist that connect people to blogs and bloggers to other bloggers, including BlogCatalog and MyBlogLog.[42] Interest-specific blogging platforms are also available. For instance, Blogster has a sizable community of political bloggers among its members. Global Voices aggregates international bloggers, "with emphasis on voices that are not ordinarily heard in international mainstream media."[43] Blogging and advertising

Blogging It is common for blogs to feature advertisements either to financially benefit the blogger or to promote the blogger's favorite causes. The popularity of blogs has also given rise to "fake blogs" in which a company will create a fictional blog as a marketing tool to promote a product.[44]

241

Popularity
Researchers have analyzed the dynamics of how blogs become popular. There are essentially two measures of this: popularity through citations, as well as popularity through affiliation (i.e., blogroll). The basic conclusion from studies of the structure of blogs is that while it takes time for a blog to become popular through blogrolls, permalinks can boost popularity more quickly, and are perhaps more indicative of popularity and authority than blogrolls, since they denote that people are actually reading the blog's content and deem it valuable or noteworthy in specific cases.[45] The blogdex project was launched by researchers in the MIT Media Lab to crawl the Web and gather data from thousands of blogs in order to investigate their social properties. It gathered this information for over 4 years, and autonomously tracked the most contagious information spreading in the blog community, ranking it by recency and popularity. It can therefore be considered the first instantiation of a memetracker. The project was replaced by tailrank.com which in turn has been replaced by spinn3r.com [46]. Blogs are given rankings by Technorati based on the number of incoming links and Alexa Internet based on the Web hits of Alexa Toolbar users. In August 2006, Technorati found that the most linked-to blog on the internet was that of Chinese actress Xu Jinglei.[47] Chinese media Xinhua reported that this blog received more than 50 million page views, claiming it to be the most popular blog in the world.[48] Technorati rated Boing Boing to be the most-read group-written blog.[47]

Blurring with the mass media


Many bloggers, particularly those engaged in participatory journalism, differentiate themselves from the mainstream media, while others are members of that media working through a different channel. Some institutions see blogging as a means of "getting around the filter" and pushing messages directly to the public. Some critics worry that bloggers respect neither copyright nor the role of the mass media in presenting society with credible news. Bloggers and other contributors to user-generated content are behind Time magazine naming their 2006 person of the year as "You". Many mainstream journalists, meanwhile, write their own blogs well over 300, according to CyberJournalist.net's J-blog list. The first known use of a blog on a news site was in August 1998, when Jonathan Dube of The Charlotte Observer published one chronicling Hurricane Bonnie.[49] Some bloggers have moved over to other media. The following bloggers (and others) have appeared on radio and television: Duncan Black (known widely by his pseudonym, Atrios), Glenn Reynolds (Instapundit), Markos Moulitsas Zniga (Daily Kos), Alex Steffen (Worldchanging), Ana Marie Cox (Wonkette), Nate Silver (FiveThirtyEight.com), and Ezra Klein (Ezra Klein blog in The American Prospect, now in the Washington Post). In counterpoint, Hugh Hewitt exemplifies a mass media personality who has moved in the other direction, adding to his reach in "old media" by being an influential blogger. Similarly, it was Emergency Preparedness and Safety Tips On Air and Online blog articles that captured Surgeon General of the United States Richard Carmona's attention and earned his kudos for the associated broadcasts by talk show host Lisa Tolliver and Westchester Emergency Volunteer Reserves-Medical Reserve Corps Director Marianne Partridge.[50][51][52][53] Blogs have also had an influence on minority languages, bringing together scattered speakers and learners; this is particularly so with blogs in Gaelic languages. Minority language publishing (which may lack economic feasibility) can find its audience through inexpensive blogging.

Blogging There are many examples of bloggers who have published books based on their blogs, e.g., Salam Pax, Ellen Simonetti, Jessica Cutler, ScrappleFace. Blog-based books have been given the name blook. A prize for the best blog-based book was initiated in 2005,[54] the Lulu Blooker Prize.[55] However, success has been elusive offline, with many of these books not selling as well as their blogs. Only blogger Tucker Max made the New York Times Bestseller List.[56] The book based on Julie Powell's blog "The Julie/Julia Project" was made into the film Julie & Julia, apparently the first to do so.

242

Consumer-generated advertising in blogs


Consumer-generated advertising is a relatively new and controversial development and it has created a new model of marketing communication from businesses to consumers. Among the various forms of advertising on blog, the most controversial are the sponsored posts.[57] These are blog entries or posts and may be in the form of feedback, reviews, opinion, videos, etc. and usually contain a link back to the desired site using a keyword/s. Blogs have led to some disintermediation and a breakdown of the traditional advertising model where companies can skip over the advertising agencies (previously the only interface with the customer) and contact the customers directly themselves. On the other hand, new companies specialised in blog advertising have been established, to take advantage of this new development as well. However, there are many people who look negatively on this new development. Some believe that any form of commercial activity on blogs will destroy the blogospheres credibility.[58]

Legal and social consequences


Blogging can result in a range of legal liabilities and other unforeseen consequences.[59]

Defamation or liability
Several cases have been brought before the national courts against bloggers concerning issues of defamation or liability. U.S. payouts related to blogging totaled $17.4 million by 2009; in some cases these have been covered by umbrella insurance.[60] The courts have returned with mixed verdicts. Internet Service Providers (ISPs), in general, are immune from liability for information that originates with third parties (U.S. Communications Decency Act and the EU Directive 2000/31/EC). In Doe v. Cahill, the Delaware Supreme Court held that stringent standards had to be met to unmask the anonymous bloggers, and also took the unusual step of dismissing the libel case itself (as unfounded under American libel law) rather than referring it back to the trial court for reconsideration.[61] In a bizarre twist, the Cahills were able to obtain the identity of John Doe, who turned out to be the person they suspected: the town's mayor, Councilman Cahill's political rival. The Cahills amended their original complaint, and the mayor settled the case rather than going to trial. In January 2007, two prominent Malaysian political bloggers, Jeff Ooi and Ahiruddin Attan, were sued by a pro-government newspaper, The New Straits Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin bin Aun and Brenden John a/l John Pereira over an alleged defamation. The plaintiff was supported by the Malaysian government.[62] Following the suit, the Malaysian government proposed to "register" all bloggers in Malaysia in order to better control parties against their interest.[63] This is the first such legal case against bloggers in the country. In the United States, blogger Aaron Wall was sued by Traffic Power for defamation and publication of trade secrets in 2005.[64] According to Wired Magazine, Traffic Power had been "banned from Google for allegedly rigging search engine results."[65] Wall and other "white hat" search engine optimization consultants had exposed Traffic Power in what they claim was an effort to protect the public. The case addressed the murky legal question of who is liable for comments posted on blogs.[66] The case was dismissed for lack of personal jurisdiction, and Traffic Power failed to appeal within the allowed time.[67]

Blogging In 2009, a controversial and landmark decision by The Hon. Mr Justice Eady refused to grant an order to protect the anonymity of Richard Horton. Horton was a police officer in the United Kingdom who blogged about his job under the name "NightJack".[68] In 2009, NDTV issued a legal notice to Indian blogger Kunte for a blog post criticizing their coverage of the Mumbai attacks.[69] The blogger unconditionally withdrew his post, which resulted in several Indian bloggers criticizing NDTV for trying to silence critics.[70]

243

Employment
Employees who blog about elements of their place of employment can begin to affect the brand recognition of their employer. In general, attempts by employee bloggers to protect themselves by maintaining anonymity have proved ineffective.[71] Delta Air Lines fired flight attendant Ellen Simonetti because she posted photographs of herself in uniform on an airplane and because of comments posted on her blog "Queen of Sky: Diary of a Flight Attendant" which the employer deemed inappropriate.[72][73] This case highlighted the issue of personal blogging and freedom of expression versus employer rights and responsibilities, and so it received wide media attention. Simonetti took legal action against the airline for "wrongful termination, defamation of character and lost future wages".[74] The suit was postponed while Delta was in bankruptcy proceedings (court docket).[75] In early 2006, Erik Ringmar, a tenured senior lecturer at the London School of Economics, was ordered by the convenor of his department to "take down and destroy" his blog in which he discussed the quality of education at the school.[76] Mark Cuban, owner of the Dallas Mavericks, was fined during the 2006 NBA playoffs for criticizing NBA officials on the court and in his blog.[77] Mark Jen was terminated in 2005 after 10 days of employment as an Assistant Product Manager at Google for discussing corporate secrets on his personal blog, then called 99zeros and hosted on the Google-owned Blogger service.[78] He blogged about unreleased products and company finances a week before the company's earnings announcement. He was fired two days after he complied with his employer's request to remove the sensitive material from his blog.[79] In India, blogger Gaurav Sabnis resigned from IBM after his posts questioned the claims of a management school IIPM.[80] Jessica Cutler, aka "The Washingtonienne",[81] blogged about her sex life while employed as a congressional assistant. After the blog was discovered and she was fired,[82] she wrote a novel based on her experiences and blog: The Washingtonienne: A Novel. Cutler is presently being sued by one of her former lovers in a case that could establish the extent to which bloggers are obligated to protect the privacy of their real life associates.[83] Catherine Sanderson, a.k.a. Petite Anglaise, lost her job in Paris at a British accountancy firm because of blogging.[84] Although given in the blog in a fairly anonymous manner, some of the descriptions of the firm and some of its people were less than flattering. Sanderson later won a compensation claim case against the British firm, however.[85] On the other hand, Penelope Trunk wrote an upbeat article in the Boston Globe back in 2006, entitled "Blogs 'essential' to a good career".[86] She was one of the first journalists to point out that a large portion of bloggers are professionals and that a well-written blog can help attract employers.

Blogging

244

Political dangers
Blogging can sometimes have unforeseen consequences in politically sensitive areas. Blogs are much harder to control than broadcast or even print media. As a result, totalitarian and authoritarian regimes often seek to suppress blogs and/or to punish those who maintain them. In Singapore, two ethnic Chinese were imprisoned under the countrys anti-sedition law for posting anti-Muslim remarks in their blogs.[87] Egyptian blogger Kareem Amer was charged with insulting the Egyptian president Hosni Mubarak and an Islamic institution through his blog. It is the first time in the history of Egypt that a blogger was prosecuted. After a brief trial session that took place in Alexandria, the blogger was found guilty and sentenced to prison terms of three years for insulting Islam and inciting sedition, and one year for insulting Mubarak.[88] Egyptian blogger Abdel Monem Mahmoud was arrested in April 2007 for anti-government writings in his blog.[89] Monem is a member of the then banned Muslim Brotherhood. After the 2011 Egyptian revolution, the Egyptian blogger Maikel Nabil Sanad was charged with insulting the military for an article he wrote on his personal blog and sentenced to 3 [90][91][92][93][94][95][96][97][98][99][100][101][102][103] years. After expressing opinions in his personal blog about the state of the Sudanese armed forces, Jan Pronk, United Nations Special Representative for the Sudan, was given three days notice to leave Sudan. The Sudanese army had demanded his deportation.[104][105][106] In Myanmar, Nay Phone Latt, a blogger, was sentenced to 20 years in jail for posting a cartoon critical of head of state Than Shwe.[107]

Personal safety
One consequence of blogging is the possibility of attacks or threats against the blogger, sometimes without apparent reason. Kathy Sierra, author of the innocuous blog "Creating Passionate Users",[108] was the target of such vicious threats and misogynistic insults that she canceled her keynote speech at a technology conference in San Diego, fearing for her safety.[109] While a blogger's anonymity is often tenuous, Internet trolls who would attack a blogger with threats or insults can be emboldened by anonymity. Sierra and supporters initiated an online discussion aimed at countering abusive online behavior[110] and developed a blogger's code of conduct.

Behavior
The Blogger's Code of Conduct is a proposal by Tim O'Reilly for bloggers to enforce civility on their blogs by being civil themselves and moderating comments on their blog. The code was proposed due to threats made to blogger Kathy Sierra.[111] The idea of the code was first reported by BBC News, who quoted O'Reilly saying, "I do think we need some code of conduct around what is acceptable behaviour, I would hope that it doesn't come through any kind of regulation it would come through self-regulation."[112] O'Reilly and others came up with a list of seven proposed ideas:[113][114][115][116][117] 1. 2. 3. 4. 5. 6. Take responsibility not just for your own words, but for the comments you allow on your blog. Label your tolerance level for abusive comments. Consider eliminating anonymous comments. Ignore the trolls. Take the conversation offline, and talk directly, or find an intermediary who can do so. If you know someone who is behaving badly, tell them so.

7. Don't say anything online that you wouldn't say in person.

Blogging

245

References
[1] Blood, Rebecca (September 7, 2000). "Weblogs: A History And Perspective" (http:/ / www. rebeccablood. net/ essays/ weblog_history. html). . [2] Mutum, Dilip; Wang, Qing (2010). "Consumer Generated Advertising in Blogs". In Neal M. Burns, Terry Daugherty, Matthew S. Eastin. Handbook of Research on Digital Media and Advertising: User Generated Content Consumption. 1. IGI Global. pp.248261. [3] Gaudeul, Alexia and Peroni, Chiara (2010). "Reciprocal attention and norm of reciprocity in blogging networks" (http:/ / ideas. repec. org/ a/ ebl/ ecbull/ eb-10-00198. html). Economics Bulletin 30 (3): 22302248. . [4] "BlogPulse" (http:/ / www. blogpulse. com/ ). The Nielsen Company. February 16, 2011. . Retrieved 2011-02-17. [5] About Tumblr.com. Accessed October 13, 2012 (http:/ / www. tumblr. com/ about) [6] WordPress.com Stats. Accessed October 13, 2012 (http:/ / www. wordpress. com/ stats) [7] "After 10 Years of Blogs, the Future's Brighter Than Ever" (http:/ / www. wired. com/ entertainment/ theweb/ news/ 2007/ 12/ blog_anniversary). Wired. 2007-12-17. . Retrieved 2008-06-05. [8] "It's the links, stupid" (http:/ / www. economist. com/ surveys/ displaystory. cfm?story_id=6794172). The Economist. 2006-04-20. . Retrieved 2008-06-05. [9] Merholz, Peter (1999). "Peterme.com" (http:/ / web. archive. org/ web/ 19991013021124/ http:/ / peterme. com/ index. html). The Internet Archive. Archived from the original (http:/ / peterme. com/ index. html) on 1999-10-13. . Retrieved 2008-06-05. [10] Kottke, Jason (2003-08-26). "kottke.org" (http:/ / www. kottke. org/ 03/ 08/ its-weblog-not-web-log). . Retrieved 2008-06-05. [11] Origins of "Blog" and "Blogger" (http:/ / listserv. linguistlist. org/ cgi-bin/ wa?A2=ind0804C& L=ADS-L& P=R16795& I=-3), American Dialect Society Mailing List (Apr. 20, 2008). [12] The term "e-log" has been used to describe journal entries sent out via e-mail since as early as March 1996.Norman, David (2005-07-13). "Users confused by blogs" (http:/ / web. archive. org/ web/ 20070607235110/ http:/ / lists. drupal. org/ archives/ development/ 2005-07/ msg00208. html) ( Scholar search (http:/ / scholar. google. co. uk/ scholar?hl=en& lr=& q=author:Norman+ intitle:Users+ confused+ by+ blogs& as_publication=& as_ylo=2005& as_yhi=2005& btnG=Search)). Archived from the original (http:/ / lists. drupal. org/ archives/ development/ 2005-07/ msg00208. html) on 2007-06-07. . Retrieved 2008-06-05 "Research staff and students welcome E-Log" (http:/ / www. ucl. ac. uk/ news-archive/ archive/ 2003/ december-2003/ latest/ newsitem. shtml?03120901). University College London. December 2003. . Retrieved 2008-06-05. [13] http:/ / home. mcom. com/ home/ whats-new. html [14] Harmanci, Reyhan (2005-02-20). "Time to get a life pioneer blogger Justin Hall bows out at 31" (http:/ / www. sfgate. com/ cgi-bin/ article. cgi?file=/ c/ a/ 2005/ 02/ 20/ MNGBKBEJO01. DTL). San Francisco Chronicle. . Retrieved 2008-06-05. [15] Pournelle, Jerry. "Chaos Manor in Perspective" (http:/ / www. jerrypournelle. com/ #whatabout). Jerry Pournelle's blog. . [16] Paul Festa (2003-02-25). "Newsmaker: Blogging comes to Harvard" (http:/ / news. cnet. com/ 2008-1082-985714. html). CNET. . Retrieved 2007-01-25. [17] "...Dave Winer... whose Scripting News (scripting.com) is one of the oldest blogs."David F. Gallagher (2002-06-10). "Technology; A rift among bloggers" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9E0DE3DE103DF933A25755C0A9649C8B63). New York Times. . [18] http:/ / web. archive. org/ web/ 19961112042649/ http:/ / netguide. aust. com/ daily/ index. html [19] Jensen, Mallory A Brief History of Weblogs (http:/ / cjrarchives. org/ issues/ 2003/ 5/ blog-jensen. asp?printerfriendly=yes) [20] Massing, Michael (2009-08-13). "The News About the Internet" (http:/ / www. nybooks. com/ articles/ 22960). New York Review of Books (The New York Review of Books) 56 (13): 2932. . Retrieved 2009-10-10. [21] Daniel Sandford, BBC News: "Russians tire of corruption spectacle", http:/ / www. bbc. co. uk/ news/ world-europe-15972326 [22] Matthew Kaminski (March 3, 2012). "The Man Vladimir Putin Fears Most (the weekend interview)" (http:/ / online. wsj. com/ article/ SB10001424052970203986604577257321601811092. html). The Wall Street Journal. . [23] {{cite journal|journal=Fortune|date=January 2005|website=Fortune.com|url=http:/ / www. fortune. com/ fortune/ technology/ articles/ 0,15114,1011763-1,00. html| [24] Israel Video Blog aims to show the world 'the beautiful face of real Israel' (http:/ / www. ynetnews. com/ articles/ 0,7340,L-3220593,00. html), Ynet, February 24, 2008. [25] Latest PR venture of Israel's diplomatic mission in New York attracts large Arab audience (http:/ / www. ynetnews. com/ articles/ 0,7340,L-3220593,00. html), Ynet, June 21, 2007. [26] Battlefront Twitter (http:/ / fr. jpost. com/ servlet/ Satellite?cid=1230456533492& pagename=JPost/ JPArticle/ ShowFull), Haviv Rettig Gur, The Jerusalem Post, December 30, 2008. [27] The Toughest Qs Answered in the Briefest Tweets (http:/ / www. nytimes. com/ 2009/ 01/ 04/ weekinreview/ 04cohen. html), Noam Cohen, The New York Times, January 3, 2009. Retrieved January 5, 2009. [28] Journalists deserve subsidies too (http:/ / www. delawareonline. com/ article/ 20091103/ OPINION16/ 91102031/ 1004/ OPINION/ Journalists-deserve-subsidies-too), Robert W. Mcchesney and John Nichols, Delaware Online, November 3, 2009. Retrieved November 10, 2009. [29] "7 Things You Should Know About Microblogging" (http:/ / www. educause. edu/ library/ resources/ 7-things-you-should-know-about-microblogging). Educause.Edu. 2009-07-07. . Retrieved 2012-10-25. [30] Stephan Metcalf, "Fixing a Hole", New York Times, March 2006 [31] Jennifer Saranow, "Blogwatch: This Old House", Wall Street Journal, September 2007

Blogging
[32] Casserly, Meghan and Goudreau, Jenna. Top 100 Websites For Women 2011 (http:/ / www. forbes. com/ 2011/ 06/ 23/ 100-best-web-sites-for-women-blogs-2011. html), Forbes, June 23, 2011 [33] Paul, Pamela (2004-04-12). "The New Family Album" (http:/ / www. time. com/ time/ magazine/ article/ 0,9171,993832-3,00. html). TIME. . Retrieved 2010-03-31. [34] Carpenter, MacKenzie (2007-10-31). "More women are entering the blogosphere satirizing, sharing and reaching a key demographic" (http:/ / www. post-gazette. com/ pg/ 07304/ 829747-51. stm). Post-gazette.com. . Retrieved 2010-03-31. [35] Brown, Jonathan (2005-02-05). "The drooling minutiae of childhood revealed for all to see as 'Mommy blogs' come of age" (http:/ / www. independent. co. uk/ news/ science/ the-drooling-minutiae-of-childhood-revealed-for-all-to-see-as-mommy-blogs-come-of-age-485573. html). The Independent (London). . Retrieved 2010-03-30. [36] "Living" (http:/ / www. omaha. com/ index. php?u_page=1219& u_sid=10322842). Omaha.com. . Retrieved 2010-03-31. [37] Jesella, Kara (2008-07-27). "Bloggings Glass Ceiling" (http:/ / www. nytimes. com/ 2008/ 07/ 27/ fashion/ 27blogher. html?_r=2& sq=blogher women blogging& st=cse& adxnnl=1& scp=1& adxnnlx=1228493929-MAKTyKJ3qiW/ + fidCwXbFg). The New York Times. . Retrieved 2010-03-26. [38] "What is a photoblog" (http:/ / wiki. photoblogs. org/ wiki/ What_is_a_Photoblog). Photoblogs.org Wiki. . Retrieved 2006-06-25. [39] "Blogging goes mobile" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 2783951. stm). BBC News. 2003-02-23. . Retrieved 2008-06-05. [40] See for instance: Mesure, Susie (2009-08-23). "Is it a diary? Is it an ad? It's a mummy blog" (http:/ / www. independent. co. uk/ life-style/ gadgets-and-tech/ news/ is-it-a-diary-is-it-an-ad-its-a-mummy-blog-1776163. html). The Independent (London): p.11. . Retrieved 2009-10-10. [41] "Welcome to Technorati" (http:/ / web. archive. org/ web/ 20080505011927/ http:/ / www. technorati. com/ about). unknown. Archived from the original (http:/ / technorati. com/ about) on May 5, 2008. . Retrieved 2008-06-25. [42] "About MyBlogLog" (http:/ / www. mybloglog. com/ buzz/ help/ #a200502282152271). MyBlogLog. . Retrieved 2007-06-29. [43] "Global Voices: About" (http:/ / globalvoicesonline. org/ about/ ). GlobalVoices.org. . Retrieved 2011-04-02. [44] Gogoi, Pallavi (2006-10-09). "Wal-Mart's Jim and Laura: The Real Story" (http:/ / www. businessweek. com/ bwdaily/ dnflash/ content/ oct2006/ db20061009_579137. htm). BusinessWeek. . Retrieved 2008-08-06. [45] Marlow, C. Audience, structure and authority in the weblog community (http:/ / alumni. media. mit. edu/ ~cameron/ cv/ pubs/ 04-01. pdf). Presented at the International Communication Association Conference, May, 2004, New Orleans, LA. [46] http:/ / spinn3r. com [47] Fickling, David, Internet killed the TV star (http:/ / blogs. guardian. co. uk/ news/ archives/ 2006/ 08/ 15/ internet_killed_the_tv_star. html), The Guardian NewsBlog, 15 August 2006 [48] "Xu Jinglei most popular blogger in world" (http:/ / www. chinadaily. com. cn/ china/ 2006-08/ 24/ content_672747. htm). China Daily. 2006-08-24. . Retrieved 2008-06-05. [49] "Blogging Bonnie." (http:/ / www. poynter. org/ column. asp?id=52& aid=48413/ ). Poynter.org. 2003-09-18. . [50] "National Safety Month" (http:/ / www. nsc. org/ nsc_events/ Nat_Safe_Month/ Pages/ home. aspx). Nsc.org. . Retrieved 2010-04-09. [51] "Flavor Flav Celebrates National Safety Month" (http:/ / blogcritics. org/ archives/ 2006/ 06/ 21/ 173419. php). Blogcritics. . [52] "Lisa Tolliver show notes" (http:/ / tolliveretips. blogspot. com/ 2006/ 06/ lisa-tolliver-show-guests-flavor-flav. html). Emergency Preparedness and Safety Tips On Air and Online. . [53] "Lisa Tolliver's Show Notes" (http:/ / lisatolliver. blogspot. com/ 2006/ 05/ how-my-radio-shows-publications-and. html). Lisa Tolliver On Air and Online. . [54] "Blooker rewards books from blogs" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 4326908. stm). BBC News. 2005-10-11. . Retrieved 2008-06-05. [55] "Blooker prize honours best blogs" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 6446271. stm). BBC News. 2007-03-17. . Retrieved 2008-06-05. [56] St, Warren (2006-04-16). "Dude, here's my book" (http:/ / www. nytimes. com/ 2006/ 04/ 16/ fashion/ sundaystyles/ 16CADS. html?ex=1302840000& en=778087aa367d0620& ei=5090& partner=rssuserland& emc=rss). Nytimes.com. . Retrieved 2010-07-31. [57] Mutum, Dilip and Wang, Qing (2010). Consumer Generated Advertising in Blogs. In Neal M. Burns, Terry Daugherty, Matthew S. Eastin (Eds) Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (Vol 1), IGI Global, 248-261. [58] Techchrunch.com (http:/ / www. techcrunch. com/ 2006/ 06/ 30/ payperpostcom-offers-to-buy-your-soul/ ): Payperpost.com offers to sell your soul, Kirkpatrick, M. (2006, June 30). [59] "Article Window" (http:/ / epaper. timesofindia. com/ Default/ Scripting/ ArticleWin. asp?From=Search& Key=ETBG/ 2008/ 01/ 25/ 12/ Ar01201. xml& CollName=ET_BANGALORE_ARCHIVE_2007& DOCID=108812& Keyword=(<many><stem>Chandu<and><many><stem>Gopalakrishnan<and><many><stem>libel<and><many><stem>blog)& skin=pastissues2& AppName=2& ViewMode=HTML). Epaper.timesofindia.com. . Retrieved 2012-10-25. [60] McQueen MP. (2009). Bloggers, Beware: What You Write Can Get You Sued (http:/ / online. wsj. com/ article/ SB124287328648142113. html). WSJ. [61] Doe v. Cahill (http:/ / caselaw. lp. findlaw. com/ data2/ delawarestatecases/ 266-2005. pdf), 884 A.2d 451 (Del. 2005). [62] "New Straits Times staffers sue two bloggers" (http:/ / web. archive. org/ web/ 20080608220312/ http:/ / www. rsf. org/ article. php3?id_article=20489). Reporters Without Borders. 2007-01-19. Archived from the original (http:/ / www. rsf. org/ article. php3?id_article=20489) on 2008-06-08. . Retrieved 2008-06-05.

246

Blogging
[63] "Government plans to force bloggers to register" (http:/ / web. archive. org/ web/ 20080611025330/ http:/ / www. rsf. org/ article. php3?id_article=21606). Reporters Without Borders. 2007-04-06. Archived from the original (http:/ / www. rsf. org/ article. php3?id_article=21606) on 2008-06-11. . Retrieved 2008-06-05. [64] Kesmodel, David (2005-08-31). Wall Street Journal "Blogger Faces Lawsuit Over Comments Posted by Readers" (http:/ / online. wsj. com/ public/ article/ SB112541909221726743-_vX2YpePQV7AOIl2Jeebz4FAfS4_20060831. html?mod=blogs). Wall Street Journal Online. Wall Street Journal. Retrieved 2008-06-05. [65] Wired Magazine, Legal Showdown in Search Fracas (http:/ / www. wired. com/ culture/ lifestyle/ news/ 2005/ 09/ 68799), Sept 8, 2005 [66] "Slashdot, Aug 31" (http:/ / yro. slashdot. org/ yro/ 05/ 08/ 31/ 1427228. shtml?tid=123). Yro.slashdot.org. 2005-08-31. . Retrieved 2010-07-31. [67] Sullivan, Danny (2006-04-13). "SearchEngineWatch" (http:/ / blog. searchenginewatch. com/ blog/ 060413-084431). Blog.searchenginewatch.com. . Retrieved 2010-07-31. [68] Ruling on NightJack author Richard Horton kills blogger anonymity (http:/ / technology. timesonline. co. uk/ tol/ news/ tech_and_web/ the_web/ article6509677. ece) [69] "Barkha versus blogger" (http:/ / www. thehoot. org/ web/ home/ story. php?storyid=3629& mod=1& pg=1& sectionId=6& valid=true). The Hoot. . Retrieved 2009-02-02. [70] Indian bloggers criticizing NDTV (http:/ / www. abhishekarora. com/ 2009/ 02/ chyetanya-kunte-vs-burkha-dutt-ndtv. html) [71] Sanderson, Cathrine (2007-04-02). "Blogger beware!" (http:/ / commentisfree. guardian. co. uk/ catherine_sanderson/ 2007/ 04/ blogger_beware. html). London: Guardian Unlimited. . Retrieved 2007-04-02. [72] Twist, Jo (2004-11-03). "US Blogger Fired by her Airline" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 3974081. stm). BBC News. . Retrieved 2008-06-05. [73] "Delta employee fired for blogging sues airline" (http:/ / www. usatoday. com/ travel/ news/ 2005-09-08-delta-blog_x. htm). USA Today. 2005-09-08. . Retrieved 2008-06-05. [74] "Queen of the Sky gets marching orders" (http:/ / www. theregister. co. uk/ 2004/ 11/ 03/ airline_blogger_sacked/ ). The Register. 2004-11-03. . Retrieved 2008-06-05. [75] Deltadocket.com (http:/ / deltadocket. com/ delta_downloads/ delta_downloads_CourtFiledDocuments/ Twelfth_OmnibusClaimsObjection. pdf) [76] MacLeod, Donald (2006-05-03). "Lecturer's Blog Sparks Free Speech Row" (http:/ / education. guardian. co. uk/ higher/ news/ story/ 0,,1766663,00. html). London: The Guardian. . Retrieved 2008-06-05. See also Forget the Footnotes (http:/ / ringmar. net/ forgethefootnotes/ ) [77] "NBA fines Cuban $200K for antics on, off court" (http:/ / sports. espn. go. com/ nba/ playoffs2006/ news/ story?id=2440355). ESPN. 2006-05-11. . Retrieved 2008-06-05. [78] Hansen, Evan (2005-02-08). "Google blogger has left the building" (http:/ / news. cnet. com/ Google-blogger-has-left-the-building/ 2100-1038_3-5567863. html). CNET News. . Retrieved 2007-04-04. [79] "Official Story, straight from the source" (http:/ / blog. plaxoed. com/ 2005/ 02/ 11/ the-official-story-straight-from-the-source/ ). . [80] "Express India" (http:/ / cities. expressindia. com/ fullstory. php?newsid=152721). Cities.expressindia.com. . Retrieved 2011-01-30. [81] Washingtoniennearchive.blogspot.com (http:/ / washingtoniennearchive. blogspot. com/ ) [82] "The Hill's Sex Diarist Reveals All (Well, Some)" (http:/ / www. washingtonpost. com/ wp-dyn/ articles/ A48909-2004May22. html). The Washington Post. 2004-05-23. . Retrieved 2008-06-05. [83] "Steamy D.C. Sex Blog Scandal Heads to Court" (http:/ / www. msnbc. msn. com/ id/ 16366256/ ). The Associated Press, MSNBC. 2006-12-27. . Retrieved 2008-06-05. [84] "Bridget Jones Blogger Fire Fury" (http:/ / edition. cnn. com/ 2006/ WORLD/ europe/ 07/ 19/ france. blog/ index. html?section=cnn_tech). CNN. 2006-07-19. . Retrieved 2008-06-05. [85] "Sacked "petite anglaise" blogger wins compensation claim" (http:/ / findarticles. com/ p/ articles/ mi_kmafp/ is_200703/ ai_n18772706). AFP. 2007-03-30. Archived from the original (http:/ / news. yahoo. com/ s/ afp/ 20070330/ tc_afp/ lifestyleinternet_070330205230) on 2007-03-30. . Retrieved 2008-06-05. [86] Boston.com (http:/ / www. boston. com/ business/ globe/ articles/ 2006/ 04/ 16/ blogs_essential_to_a_good_career/ ) [87] Kierkegaard, Sylvia (2006). "Blogs, lies and the doocing: The next hotbed of litigation?". Computer Law & Security Report 22 (2): 127. doi:10.1016/j.clsr.2006.01.002. [88] "Egypt blogger jailed for "insult"" (http:/ / news. bbc. co. uk/ 2/ hi/ middle_east/ 6385849. stm). BBC News. 2007-02-22. . Retrieved 2008-06-05. [89] Ana-ikhwan.blogspot.com (http:/ / www. ana-ikhwan. blogspot. com/ ) [90] VOA News: Imprisoned Egyptian Blogger's Hunger Strike Fights Military Rule (http:/ / www. voanews. com/ english/ news/ middle-east/ Imprisoned-Egyptian-Bloggers-Hunger-Strike-Fights-Military-Rule-131793268. html) (13 October 2011) [91] "EGYPT: Egyptian pacifist Maikel Nabil Sanad arrested for insulting the military | War Resisters' International" (http:/ / www. wri-irg. org/ node/ 12513). Wri-irg.org. . Retrieved 2011-08-14. [92] "Maikel Nabil Sanad : The Army and The People Were Never One Hand" (http:/ / www. maikelnabil. com/ 2011/ 03/ army-and-people-wasnt-ever-one-hand. html). Maikelnabil.com. 2011-03-08. . Retrieved 2011-08-14. [93] "EGYPT: Imprisoned pacifist blogger Maikel Nabil Sanad in solitary confinement | War Resisters' International" (http:/ / www. wri-irg. org/ node/ 13004). Wri-irg.org. . Retrieved 2011-08-14.

247

Blogging
[94] "Advocates: Egyptian blogger Nabil on hunger strike may only have days left Politics Egypt Ahram Online" (http:/ / english. ahram. org. eg/ NewsContent/ 1/ 64/ 22687/ Egypt/ Politics-/ Advocates-Egyptian-blogger-Nabil-on-hunger-strike-. aspx). English.ahram.org.eg. . Retrieved 2012-10-25. [95] "Maikel Nabil Sanads two-year jail term "insults spirit of Egyptian revolution"" (http:/ / en. rsf. org/ egypte-maikel-nabil-sanad-s-two-year-jail-14-12-2011,41301. html). Reporters Without Borders. . Retrieved 2011-12-29. [96] "Maikel Nabil Sanad, On Hunger Strike in Egypt, Is Dying" (http:/ / www. huffingtonpost. com/ 2011/ 09/ 15/ hunger-strike-egyptian-pr_n_963916. html). http:/ / www. huffingtonpost. com. . Retrieved 2011-12-29. [97] "Press Release: The Imminent Death of Blogger Maikel Nabil, Imprisoned by the Egyptian Military" (http:/ / en. nomiltrials. com/ 2011/ 12/ press-release-imminent-death-of-blogger. html). No Military Trials for Civilians. . Retrieved 2011-12-29. [98] "The Story of Maikel Nabil SCAF Crimes" (http:/ / www. youtube. com/ watch?v=vBHs1Xs2lF4). www.youtube.com. . Retrieved 2011-12-29. [99] Jack Shenker (22 January 2012). "Egypt pardons jailed blogger as generals brace for anniversary protests" (http:/ / www. guardian. co. uk/ world/ 2012/ jan/ 22/ egypt-pardons-blogger-anniversary-protests?newsfeed=true). The Guardian. . Retrieved 23 January 2012. [100] Amnesty International: Egypt military court toying with life of jailed blogger (https:/ / www. amnesty. org/ en/ news-and-updates/ egypt-military-court-toying-life-jailed-blogger-2011-10-13) (13 October 2011) [101] Amnesty International: Egypt blogger on hunger strike must be released as health fails (https:/ / www. amnesty. org/ en/ news-and-updates/ egypt-blogger-hunger-strike-must-be-released-health-fails-2011-09-26) (26 September 2011) [102] Reporters Without Borders: The blogger and conscientious objector Maikel Nabil Sanad arrested (http:/ / en. rsf. org/ + the-blogger-and-conscientious+ . html) (28 March 2011) [103] Reporters Without Borders: Authorities urged to free blogger at military court appeal (http:/ / en. rsf. org/ egypt-jailed-blogger-resumes-hunger-17-09-2011,41015. html) (3 October 2011) [104] "Sudan expels U.N. envoy for blog" (http:/ / www. cnn. com/ 2006/ WORLD/ africa/ 10/ 22/ sudan. darfur. un/ index. html). CNN. 2006-10-22. . Retrieved 2007-03-14. [105] "UN envoy leaves after Sudan row" (http:/ / news. bbc. co. uk/ 2/ hi/ africa/ 6076022. stm). BBC NEWS (BBC). 23 October 2006. . Retrieved 2006-10-24. [106] "Annan confirms Pronk will serve out his term as top envoy for Sudan" (http:/ / www. un. org/ apps/ news/ story. asp?NewsID=20396& Cr=sudan& Cr1=). UN News Centre (UN). 27 October 2006. . Retrieved 2008-06-05. [107] "Burma blogger jailed for 20 years" (http:/ / news. bbc. co. uk/ 2/ hi/ asia-pacific/ 7721271. stm). BBC News. 2008-11-11. . Retrieved 2010-03-26. [108] Headrush.typepad.com (http:/ / headrush. typepad. com/ ) [109] Pham, Alex (2007-03-31). "Abuse, threats quiet bloggers' keyboards" (http:/ / web. archive. org/ web/ 20080625081401/ http:/ / www. imsafer. com/ images/ LAtimes_3_31_07. pdf). Los Angeles Times. Archived from the original (http:/ / www. latimes. com/ business/ la-fi-internet31mar31,0,4064392. story?coll=la-home-headlines) on 2007-04-02. . Retrieved 2008-06-05. [110] "Blog death threats spark debate" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 6499095. stm). BBC News. 2007-03-27. . Retrieved 2008-06-05. [111] Tim O'Reilly (2007-03-03). "Call for a Blogger's Code of Conduct" (http:/ / radar. oreilly. com/ archives/ 2007/ 03/ call_for_a_blog_1. html). O'Reilly Radar. . Retrieved 2007-04-14. [112] "Call for blogging code of conduct" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 6502643. stm). BBC News. 2007-03-28. . Retrieved 2007-04-14. [113] "Draft Blogger's Code of Conduct" (http:/ / radar. oreilly. com/ archives/ 2007/ 04/ draft_bloggers_1. html). Radar.oreilly.com. . Retrieved 2011-01-30. [114] "Blogger's Code of Conduct at Blogging Wikia" (http:/ / blogging. wikia. com/ wiki/ Blogger's_Code_of_Conduct). Blogging.wikia.com. . Retrieved 2011-01-30. [115] "MilBlogs Rules of Engagement" (http:/ / www. yankeesailor. us/ ?p=113). Yankeesailor.us. 2005-05-20. . Retrieved 2011-01-30. [116] Code of Conduct: Lessons Learned So Far (http:/ / radar. oreilly. com/ archives/ 2007/ 04/ code_of_conduct. html), by Tim O'Reilly [117] "Blogger Content Policy" (http:/ / www. blogger. com/ content. g). Blogger.com. . Retrieved 2011-01-30.

248

Blogging

249

Further reading
Alavi, Nasrin. We Are Iran: The Persian Blogs, Soft Skull Press, New York, 2005. ISBN 1-933368-05-5. Bruns, Axel, and Joanne Jacobs, eds. Uses of Blogs, Peter Lang, New York, 2006. ISBN 0-8204-8124-6. Blood, Rebecca. "Weblogs: A History and Perspective" (http://www.rebeccablood.net/essays/weblog_history. html). "Rebecca's Pocket". Kline, David; Burstein, Dan. Blog!: How the Newest Media Revolution is Changing Politics, Business, and Culture, Squibnocket Partners, L.L.C., 2005. ISBN 1-59315-141-1. Michael Gorman. "Revenge of the Blog People!" (http://www.libraryjournal.com/article/CA502009.html). Library Journal. Ringmar, Erik. A Blogger's Manifesto: Free Speech and Censorship in the Age of the Internet (http://www. archive.org/download/ABloggersManifestoFreeSpeechAndCensorshipInTheAgeOfTheInternet/ ErikRingmarABloggersManifesto.pdf) (London: Anthem Press, 2007). Rosenberg, Scott, Say Everything: how blogging Began, what it's becoming, and why it matters (http://books. google.com/books?id=opmZQrBNPssC&printsec=frontcover), New York : Crown Publishers, 2009. ISBN 978-0-307-45136-1

External links
Computer Law and Security Report Volume 22 Issue 2, Pages 127-136 (http://www.sciencedirect.com/ science?_ob=ArticleURL&_udi=B6VB3-4JH47F6-5&_user=10& _handle=V-WA-A-W-AB-MsSAYZW-UUA-U-AAVYYUUEZC-AAVZBYADZC-YBADCWEZW-AB-U& _fmt=summary&_coverDate=12/31/2006&_rdoc=5&_orig=browse& _srch=#toc#5915#2006#999779997#619171!&_cdi=5915&view=c&_acct=C000050221&_version=1& ;_urlVersion=0&_userid=10&md5=3a78d26b9ff73d0a9c37060c8bed6dbc) blogs, Lies and the Doocing by Sylvia Kierkegaard (2006) Legal Guide for bloggers (http://www.eff.org/bloggers/lg/) by the Electronic Frontier Foundation

Microblogging

250

Microblogging
Microblogging is a broadcast medium in the form of blogging. A microblog differs from a traditional blog in that its content is typically smaller in both actual and aggregate file size. Microblogs "allow users to exchange small elements of content such as short sentences, individual images, or video links".[1] These small messages are sometimes called microposts.[2][3] As with traditional blogging, microbloggers post about topics ranging from the simple, such as "what I'm doing right now," to the thematic, such as "sports cars." Commercial microblogs also exist, to promote websites, services and/or products, and to promote collaboration within an organization. Some microblogging services offer features such as privacy settings, which allow users to control who can read their microblogs, or alternative ways of publishing entries besides the web-based interface. These may include text messaging, instant messaging, E-mail, digital audio or digital video.

Services
The first microblogs were known as tumblelogs. The term was coined by why the lucky stiff in a blog post on April12, 2005, while describing Christian Neukirchen's Anarchaia.[4]

Blogging has mutated into simpler forms (specifically, link- and mob- and aud- and vid- variant), but I dont think Ive seen a blog like Chris Neukirchens Anarchaia, which fudges together a bunch of disparate forms of citation (links, quotes, flickrings) into a very long and narrow and distracted tumblelog.

Jason Kottke described tumblelogs on October 19, 2005:[5]


A tumblelog is a quick and dirty stream of consciousness, a bit like a remaindered links style linklog but with more than just links. They remind me of an older style of blogging, back when people did sites by hand, before Movable Type made post titles all but mandatory, blog entries turned into short magazine articles, and posts belonged to a conversation distributed throughout the entire blogosphere. Robot Wisdom and Bifurcated Rivets are two older style weblogs that feel very much like these tumblelogs with minimal commentary, little cross-blog chatter, the barest whiff of a finished published work, almost pure editing...really just a way to quickly publish the "stuff" that you run across every day on the web

However, by 2006 and 2007, the term microblog came into greater usage for such services provided by Tumblr and Twitter. In May 2007, 111 microblogging sites were counted internationally. Among the most notable services are Twitter, Tumblr, Cif2.net, Plurk, Jaiku and identi.ca. Varieties of services and software with the feature of microblogging have been developed. Plurk has a timeline view which integrates video and picture sharing. Flipter uses microblogging as a platform for people to post topics and gather audience's opinions. Emote.in has a concept of sharing emotions, built over microblogging, with a timeline. PingGadget is a location based microblogging service. Pownce, developed by Digg founder Kevin Rose among others, integrates microblogging with file sharing and event invitations. Pownce was merged into SixApart in December 2008.[6] Other leading social networking websites Facebook, MySpace, LinkedIn, Diaspora*, JudgIt, Yahoo Pulse, Google Buzz, Google+ and XING, also have their own microblogging feature, better known as "status updates". Services such as Lifestream and Profilactic will aggregate microblogs from multiple social networks into a single list while other services, such as Ping.fm, will send out your microblog to multiple social networks. Internet users in China are facing a different situation. Foreign microblogging services like Twitter, Facebook, Plurk, and Google+ are censored in China. The users use Chinese weibo services such as Sina Weibo and Tencent Weibo. Tailored to Chinese people, these weibos are like hybrids of Twitter and Facebook, they implement basic features of Twitter and, allow users to comment to others' posts, post with graphical emoticons or attach image, music, video files.

Microblogging

251

Usage
Several studies, most notably by Harvard Business School and Sysomos, have tried to analyze the usage behavior of microblogging services.[7][8] Several of these studies show that for services such as Twitter, there is a small group of active users contributing to most of the activity.[9] Sysomos' Inside Twitter [8] survey, based on more than 11 million users, shows that 10% of Twitter users account for 86% of all activity. Twitter, Facebook, and other microblogging services are also becoming a platform for marketing and public relations,[10] with a sharp growth in the number of social media marketers. The Sysomos study shows that this specific group of marketers on Twitter is much more active than general user population, with 15% following more than 2,000 people. This is in sharp contrast to only 0.29% of overall Twitter users who follow more than 2,000 people.[8] Microblogging services have also emerged as an important source of real-time news updates for recent crisis situations, such as the Mumbai terror attacks or Iran protests.[11][12] The short nature of updates allow users to post news items quickly, reaching its audience in seconds. Microblogging services have revolutionized the way information is consumed. It has empowered citizens themselves to act as sensors or sources of data which could lead to important pieces of information. People now share what they observe in their surroundings, information about events, and what their opinions are about certain topics, for example government policies in healthcare. Moreover, these services store various metadata from these posts, such as the location and time of these shared posts. Aggregate analysis of this data includes different dimensions like space, time, theme, sentiment, network structure etc., and gives researchers an opportunity to understand social perceptions of the people about certain events of interest.[13] Microblogging also promotes authorship. On the microblogging platform Tumblr the reblogging feature links the post back to the original creator. The findings of a study by Emily Pronin of Princeton University and Harvard University's Daniel Wegner have been cited as a possible explanation for the rapid growth of microblogging. The study suggests a link between short bursts of activity and feelings of elation, power and creativity.[14]

Microblogging for organizational usage


Users and organizations can set up their own microblogging service: free and open source software is available for this purpose.[15] Hosted microblogging platforms are also available for commercial and organizational use. Microblogging has the potential to become a new, informal communication medium, especially for collaborative work within organizations.[16][17] Over the last few years communication patterns have shifted primarily from face-to-face to more online communication in email, IM, text messaging, and other tools. However, some argue that email is now a slow and inefficient way to communicate.[18] For instance, time-consuming 'email chains' can develop, whereby two or more people are involved in lengthy communications for simple matters, such as arranging a meeting.[19] The 'one-to-many' broadcasting offered by microblogs is thought to increase productivity by circumventing this. Another implication of remote collaboration is that there are fewer opportunities for face-to-face informal conversations. However, microblogging has the potential to support informal communication among coworkers. Many individuals like sharing their whereabouts and status updates with microblogging. Microblogging is therefore expected to improve the social and emotional welfare of the workforce, as well as streamline the information flow within an organization.[16] It can increase opportunities to share information,[17][20] help realize and utilize expertise within the workforce,[17] and help build and maintain common ground between coworkers.[16] As microblogging use continues to grow every year, it is quickly becoming a core component of Enterprise Social Software.

Microblogging

252

Issues with microblogging


Some issues with microblogging are privacy, security, and integration.[16] Privacy is arguably a major issue because users may broadcast sensitive personal information to anyone who views their public feed. Microblog platform providers can also cause privacy issues through altering or presetting users' privacy options in a way users feel compromises their personal information. An example would be Googles Buzz platform which incited controversy in 2010 by automatically publicizing users email contacts as followers.[21] Google later amended these settings. Security concerns have been voiced within the business world, since there is potential for sensitive work information to be publicized on microblogging sites such as Twitter.[22][23] This includes information which may be subject to a superinjunction.[24] Integration could be the hardest issue to overcome, since it can be argued that corporate culture must change to accommodate microblogging.

Related concepts
Live Blogging is a derivative of microblogging that generates a continuous feed on a specific web page. Instant messaging systems display status, but generally only one of a few choices, such as: available, off-line, away. Away messages (messages displayed when the user is away) form a kind of microblogging. In the Finger protocol, the .project and .plan files are sometimes used for status updates similar to microblogging.

References
[1] Kaplan Andreas M., Haenlein Michael (2011) The early bird catches the news: Nine things you should know about micro-blogging, Business Horizons, 54(2). [2] (http:/ / research. hypios. com/ msm2011/ ) [3] S. Lohmann et al. (2012). "'Visual Analysis of Microblog Content Using Time-Varying Co-occurrence Highlighting in Tag Clouds'" (http:/ / www. vis. uni-stuttgart. de/ ~lohmansn/ publications/ MicroblogAnalyzer. pdf). AVI 2012 Conference. . [4] (http:/ / redhanded. hobix. com/ inspect/ tumbleloggingAssortedLarvae. html) [5] Tumblelogs (kottke.org) (http:/ / www. kottke. org/ 05/ 10/ tumblelogs) [6] Pownce website (http:/ / www. pownce. com/ ) [7] "New Twitter Research: Men Follow Men and Nobody Tweets" (http:/ / blogs. harvardbusiness. org/ cs/ 2009/ 06/ new_twitter_research_men_follo. html). Harvard Business School. 2009-06-01. . Retrieved 2009-06-23. [8] "Inside Twitter: An In-depth Look Inside the Twitter World" (http:/ / www. sysomos. com/ insidetwitter/ ). Sysomos. 2009-06-10. . Retrieved 2009-06-23. [9] "The More Followers You Have, The More You Tweet. Or Is It The Other Way Around?" (http:/ / www. techcrunch. com/ 2009/ 06/ 10/ the-more-followers-you-have-the-more-you-tweet-or-is-it-the-other-way-around/ ). TechCrunch. 2009-06-10. . Retrieved 2010-06-23. [10] Jin, Liyun (2009-06-21). "Businesses using Twitter, Facebook to market goods" (http:/ / www. post-gazette. com/ pg/ 09172/ 978727-96. stm). Pittsburgh Post-Gazette. . Retrieved 2009-06-23. [11] "First Hand Accounts Of Terrorist Attacks In India On Twitter, Flickr" (http:/ / www. techcrunch. com/ 2008/ 11/ 26/ first-hand-accounts-of-terrorist-attacks-in-india-on-twitter/ ). TechCrunch. 2008-11-26. . Retrieved 2009-06-23. [12] "Twitter on Iran: A Go-to Source or Almost Useless?" (http:/ / www. findingdulcinea. com/ news/ technology/ 2009/ June/ Twitter-on-Iran-a-Go-to-Source-or-Almost-Useless. html). 2009-06-22. . Retrieved 2009-06-23. [13] M. Nagarajan et. al. "'Spatio-Temporal-Thematic Analysis of Citizen-Sensor Data Challenges and Experiences'" (http:/ / knoesis. wright. edu/ library/ resource. php?id=00559). WISE 2009 Conference. . [14] "Could this be a factor in the allure of microblogs?" (http:/ / thelaughingbuddha. wordpress. com/ 2009/ 04/ 19/ could-this-be-a-factor-in-the-allure-of-microblogs/ ). . [15] "StatusNet Open Source microblogging service" (http:/ / status. net/ ). . Retrieved 2010-01-05. [16] Dejin Zhao & Mary Beth Rosson (May 2009). "'How and why people Twitter: the role that micro-blogging plays in informal communication at work'" (http:/ / portal. acm. org/ citation. cfm?id=1531710). ACM GROUP2009 Conference. . [17] D. Zhao, et al. (May 2011). "'Microblogging's impact on collaboration awareness: A field study of microblogging within and between project teams'" (http:/ / ieeexplore. ieee. org/ xpl/ login. jsp?tp=& arnumber=5928662& url=http:/ / ieeexplore. ieee. org/ xpls/ abs_all. jsp?arnumber=5928662). IEEE CTS2011 Conference. .

Microblogging
[18] Ross Mayfield (October 15, 2008). "'Email hell'" (http:/ / www. forbes. com/ 2008/ 10/ 15/ cio-email-manage-tech-cio-cx_rm_1015email. html). Forbes. . Retrieved March 25, 2010. [19] "Delicious Productivity Improvements For This Flavor Partner" (http:/ / www. socialtext. com/ customers/ casestudy_fona. php). Socialtext.com. . Retrieved March 25, 2010. [20] Joab Jackson (November 20, 2009). "NASA program proves the benefits of social networking" (http:/ / gcn. com/ Articles/ 2009/ 11/ 30/ A-Space-side-NASA-social-networking. aspx?Page=1). Government Computer News. . Retrieved March 25, 2010. [21] "'Google Buzz redesigned after privacy complaints'" (http:/ / www. telegraph. co. uk/ technology/ google/ 7240754/ Google-Buzz-redesigned-after-privacy-complaints. html). The Telegraph (London). February 15, 2010. . Retrieved March 25, 2010. [22] Emma Barnett (March 20, 2010). "'Have business networking sites finally come of age?'" (http:/ / www. telegraph. co. uk/ technology/ 7482116/ Have-business-networking-sites-finally-come-of-age. html). The Telegraph (London). . Retrieved March 25, 2010. [23] "'A world of connections'" (http:/ / www. economist. com/ specialreports/ displaystory. cfm?story_id=15351002). The Economist. Jan 28, 2010. . Retrieved March 25, 2010. [24] "Twitter outings undermine "super injunctions"" (http:/ / uk. reuters. com/ article/ 2011/ 05/ 09/ uk-britain-superinjunctions-twitter-idUKTRE7481YV20110509). Reuters. 2011-05-09. .

253

Social networking
A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those that contain category places (such as former school year or classmates), means to connect with friends (usually with self-description pages), and a recommendation system linked to trust. Popular methods now combine many of these, with American-based services Facebook, Google+, and Twitter widely used worldwide; Nexopia in Canada;[1] Badoo,[2] Bebo,[3] VKontakte, Draugiem.lv (mostly in Latvia), Hi5, Hyves (mostly in The Netherlands), iWiW (mostly in Hungary), Nasza-Klasa (mostly in Poland), Skyrock, The Sphere, StudiVZ (mostly in Germany), Tagged, Tuenti (mostly in Spain), and XING[4] in parts of Europe;[5] Hi5 and Orkut in South America and Central America;[6] LAGbook in Africa;[7] and Cyworld, Mixi, Orkut, renren,weibo and Wretch in Asia and the Pacific Islands. There have been attempts to standardize these services to avoid the need to duplicate entries of friends and interests (see the FOAF standard and the Open Source Initiative). A 2011 survey found that 47% of American adults use a social networking service.[8]

History
The potential for computer networking to facilitate newly improved forms of computer-mediated social interaction was suggested early on.[9] Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet,[10] ARPANET, LISTSERV, and bulletin board services (BBS). Many prototypical features of social networking sites were also present in online services such as America Online, Prodigy, CompuServe, ChatNet, and The WELL.[11] Early social networking on the World Wide Web began in the form of generalized online communities such as Theglobe.com (1995),[12] Geocities (1994) and Tripod.com (1995). Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to-use publishing tools and free or inexpensive webspace. Some communities - such as Classmates.com - took a different approach by simply having people link to each other via email addresses. In the late 1990s, user profiles became a central feature

Social networking of social networking sites, allowing users to compile lists of "friends" and search for other users with similar interests. New social networking methods were developed by the end of the 1990s, and many sites began to develop more advanced features for users to find and manage friends.[13] This newer generation of social networking sites began to flourish with the emergence of SixDegrees.com in 1997,[14] followed by Makeoutclub in 2000,[15][16] Hub Culture and Friendster in 2002,[17] and soon became part of the Internet mainstream. Friendster was followed by MySpace and LinkedIn a year later, and eventually Bebo. Attesting to the rapid increase in social networking sites' popularity, by 2005, it was reported that MySpace was getting more page views than Google. Facebook,[18] launched in 2004, became the largest social networking site in the world[19] in early 2009.[20]

254

Social impact
Web-based social networking services make it possible to connect people who share interests and activities across political, economic, and geographic borders.[21] Through e-mail and instant messaging, online communities are created where a gift economy and reciprocal altruism are encouraged through cooperation. Information is particularly suited to gift economy, as information is a nonrival good and can be gifted at practically no cost.[22][23] Facebook and other social networking tools are increasingly the object of scholarly research. Scholars in many fields have begun to investigate the impact of social-networking sites, investigating how such sites may play into issues of identity, privacy,[24] social capital, youth culture, and education.[25] Several websites are beginning to tap into the power of the social networking model for philanthropy. Such models provide a means for connecting otherwise fragmented industries and small organizations without the resources to reach a broader audience with interested users.[26] Social networks are providing a different way for individuals to communicate digitally. These communities of hypertexts allow for the sharing of information and ideas, an old concept placed in a digital environment. In 2011, HCL Technologies conducted research that showed that 50% of British employers had banned the use of social networking sites/services during office hours.[27][28]

Features
Typical features
According to Boyd and Ellison's (2007) article, "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life", social networking sites (SNSs) share a variety of technical features that allows individuals to: construct a public/semi-public profile, articulate list of other users that they share a connection with, and view their list of connections within the system (6). The most basic of these are visible profiles with a list of "friends" who are also users of the site. In an article entitled "Social Network Sites: Definition, History, and Scholarship," Boyd and Ellison adopt Sunden's (2003) description of profiles as unique pages where one can "type oneself into being."[29] A profile is generated from answers to questions, such as age, location, interests, etc. Some sites allow users to upload pictures, add multimedia content or modify the look and feel of the profile. Others, e.g., Facebook, allow users to enhance their profile by adding modules or "Applications."[29] Many sites allow users to post blog entries, search for others with similar interests and compile and share lists of contacts. User profiles often have a section dedicated to comments from friends and other users. To protect user privacy, social networks typically have controls that allow users to choose who can view their profile, contact them, add them to their list of contacts, and so on.

Social networking

255

Additional features
Some social networks have additional features, such as the ability to create groups that share common interests or affiliations, upload or stream live videos, and hold discussions in forums. Geosocial networking co-opts Internet mapping services to organize user participation around geographic features and their attributes. There is a trend towards more interoperability between social networks led by technologies such as OpenID and OpenSocial. In most mobile communities, mobile phone users can now create their own profiles, make friends, participate in chat rooms, create chat rooms, hold private conversations, share photos and videos, and share blogs by using their mobile phone. Some companies provide wireless services that allow their customers to build their own mobile community and brand it; one of the most popular wireless services for social networking in North America is Facebook Mobile.

Emerging trends

The things you share are things that make you look good, things which you are happy to tie into your identity.

[30]

Hilary Mason, chief data scientist, bitly, VentureBeat, 2012

As the increase in popularity of social networking is on a constant rise,[31] new uses for the technology are constantly being observed. At the forefront of emerging trends in social networking sites is the concept of "real-time web" and "location-based." Real-time allows users to contribute content, which is then broadcast as it is being uploaded - the concept is analogous to live radio and television broadcasts. Twitter set the trend for "real-time" services, wherein users can broadcast to the world what they are doing, or what is on their minds within a 140-character limit. Facebook followed suit with their "Live Feed" where users' activities are streamed as soon as it happens. While Twitter focuses on words, Clixtr, another real-time service, focuses on group photo sharing wherein users can update their photo streams with photos while at an event. Facebook, however, remains the largest photo sharing site - Facebook application and photo aggregator Pixable estimates that Facebook will have 100 billion photos by Summer 2011.[32] In April, 2012, the image-based social media network Pinterest had become the third largest social network in the United States.[33] Companies have begun to merge business technologies and solutions, such as cloud computing, with social networking concepts. Instead of connecting individuals based on social interest, companies are developing interactive communities that connect individuals based on shared business needs or experiences. Many provide specialized networking tools and applications that can be accessed via their websites, such as LinkedIn. Others companies, such as Monster.com, have been steadily developing a more "socialized" feel to their career center sites to harness some of the power of social networking sites. These more business related sites have their own nomenclature for the most part but the most common naming conventions are "Vocational Networking Sites" or "Vocational Media Networks", with the former more closely tied to individual networking relationships based on social networking principles. Foursquare gained popularity as it allowed for users to "check-in" to places that they are frequenting at that moment. Gowalla is another such service that functions in much the same way that Foursquare does, leveraging the GPS in phones to create a location-based user experience. Clixtr, though in the real-time space, is also a location-based social networking site, since events created by users are automatically geotagged, and users can view events occurring nearby through the Clixtr iPhone app. Recently, Yelp announced its entrance into the location-based social networking space through check-ins with their mobile app; whether or not this becomes detrimental to Foursquare or Gowalla is yet to be seen, as it is still considered a new space in the Internet technology industry.[34]

Social networking One popular use for this new technology is social networking between businesses. Companies have found that social networking sites such as Facebook and Twitter are great ways to build their brand image. According to Jody Nimetz, author of Marketing Jive,[35] there are five major uses for businesses and social media: to create brand awareness, as an online reputation management tool, for recruiting, to learn about new technologies and competitors, and as a lead generation tool to intercept potential prospects.[35] These companies are able to drive traffic to their own online sites while encouraging their consumers and clients to have discussions on how to improve or change products or services.

256

Social networks and science


One other use that is being discussed is the use of social networks in the science communities. Julia Porter Liebeskind et al. have published a study on how new biotechnology firms are using social networking sites to share exchanges in scientific knowledge.[36] They state in their study that by sharing information and knowledge with one another, they are able to "increase both their learning and their flexibility in ways that would not be possible within a self-contained hierarchical organization." Social networking is allowing scientific groups to expand their knowledge base and share ideas, and without these new means of communicating their theories might become "isolated and irrelevant".

Social networks and education


The advent of social networking platforms may also be impacting the way(s) in which learners engage with technology in general. For a number of years, Prensky's (2001) dichotomy between Digital Natives and Digital Immigrants has been considered a relatively accurate representation of the ease with which people of a certain age rangein particular those born before and after 1980use technology. Prensky's theory has been largely disproved, however, and not least on account of the burgeoning popularity of social networking sites and other metaphors such as White and Le Cornu's "Visitors" and "Residents" (2011) are greater currency.

The European Southern Observatory uses social networks to engage people in astronomical [37] observations.

The use of online social networks by school libraries is also increasingly prevalent and they are being used to communicate with potential library users, as well as extending the services provided by individual school libraries. Social networks and their educational uses are of interest to many researchers. According to Livingstone and Brake (2010), Social networking sites, like much else on the internet, represent a moving target for researchers and policy makers.[38] Recent trends indicate that 47% of American adults use a social network.[39] A national survey in 2009 found that 73% of online teenagers use SNS, which is an increase from 55% three years earlier. (Lenhart, Purcell, Smith, & Zickuhr, 2010)[40] Recent studies have shown that social network services provide opportunities within professional education, curriculum education, and learning. However, there are constraints in this area. Professional uses within education Professional use of social networking services refers to the employment of a network site to connect with other professionals within a given field of interest. SNSs like LinkedIn, a social networking website geared towards companies and industry professionals looking to make new business contacts or keep in touch with previous co-workers, affiliates, and clients. Other network sites are now being used in this manner, Twitter has become [a] mainstay for professional development as well as promotion[41] and online SNSs support both the maintenance of existing social ties and the formation of new connections. Much of the early research on online communities assume that individuals using these systems would be connecting with others outside their preexisting social group or

Social networking location, liberating them to form communities around shared interests, as opposed to shared geography.[42] Other researchers have suggested that the professional use of network sites produce social capital. For individuals, social capital allows a person to draw on resources from other members of the networks to which he or she belongs. These resources can take the form of useful information, personal relationships, or the capacity to organize groups. As well, networks within these services also can be established or built by joining special interest groups that others have made, or creating one and asking others to join.[43] Curriculum uses within education According to Doering, Beach and OBrien, a future English curriculum needs to recognize a major shift in how adolescents are communicating with each other.[44] Curriculum uses of social networking services also can include sharing curriculum-related resources. Educators tap into user-generated content to find and discuss curriculum-related content for students. Responding to the popularity of social networking services among many students, teachers are increasingly using social networks to supplement teaching and learning in traditional classroom environments as they can provide new opportunities for enriching existing curriculum through creative, authentic and/or flexible, non-linear learning experiences.[45] Some social networks, such as English, baby! and LiveMocha, are explicitly education-focused and couple instructional content with an educational peer environment.[46] The new Web 2.0 technologies built into most social networking services promote conferencing, interaction, creation, research on a global scale, enabling educators to share, remix, and repurpose curriculum resources. In short, social networking services can become research networks as well as learning networks.[47] Learning uses within education Educators and advocates of new digital literacies are confident that social networking encourages the development of transferable, technical, and social skills of value in formal and informal learning.[48] In a formal learning environment, goals or objectives are determined by an outside department or agency. Tweeting, instant messaging, or blogging enhances student involvement. Students who would not normally participate in class are more apt to partake through social network services. Networking allows participants the opportunity for just-in-time learning and higher levels of engagement.[49] The use of SNSs allow educators to enhance the prescribed curriculum. When learning experiences are infused into a website, students utilize everyday for fun, students realize that learning can and should be a part of everyday life. It does not have to be separate and unattached.[50] Informal learning consists of the learner setting the goals and objectives. It has been claimed that media no longer just influence our culture. They are our culture.[51] With such a high number of users between the ages of 13-18, a number of skills are developed. Participants hone technical skills in choosing to navigate through social networking services. This includes elementary items such as sending an instant message or updating a status. The development of new media skills are paramount in helping youth navigate the digital world with confidence. Social networking services foster learning through what Jenkins (2006) describes as a "Participatory Culture."[52] A participatory culture consists of a space that allows engagement, sharing, mentoring, and an opportunity for social interaction. Participants of social network services avail of this opportunity. Informal learning, in the forms of participatory and social learning online, is an excellent tool for teachers to sneak in material and ideas that students will identify with and therefore, in a secondary manner, students will learn skills that would normally be taught in a formal setting in the more interesting and engaging environment of social learning.[53] Sites like Twitter provide students with the opportunity to converse and collaborate with others in real time. Social networking services provide a virtual space for learners. James Gee (2004) suggests that affinity spaces instantiate participation, collaboration, distribution, and dispersion of expertise, and relatedness.[54] Registered users share and search for knowledge which contributes to informal learning.

257

Social networking Constraints of social networking services in education In the past social networking services were viewed as a distraction and offered no educational benefit. Blocking these social networks was a form of protection for students against wasting time, bullying, and privacy protection. In an education setting, Facebook is seen by many instructors and educators as a frivolous, time-wasting distraction from schoolwork, and it is not uncommon to have Facebook banned at junior high or high school computer labs.[50] Cyberbullying has become an issue of concern with social networking services. According to the UK Children Go Online survey of 9-19 year olds found that a third have received bullying comments online.[55] To avoid this problem, many school districts/boards have blocked access to social networking services like Facebook, MySpace, Twitter, and so on, within the school environment. Social networking services often include a lot of personal information posted publicly and many believe that sharing personal information is a window into privacy theft. Schools have taken action to protect students from this. It is believed that this outpouring of identifiable information and the easy communication vehicle that social networking services opens the door to sexual predators, cyberbullying, and cyberstalking.[56] However, there is evidence to contradict this. 69% of social media using teens and 85% of adults believe that people are mostly kind to one another on social network sites[40] Recent research suggests that there has been a shift in blocking the use of social networking services. In many cases, the opposite is occurring as the potential of online networking services is being realized. It has been suggested that if schools block them [social networking services], theyre preventing students from learning the skills they need.[41] Banning social networking [] is not only inappropriate but also borderline irresponsible when it comes to providing the best educational experiences for students.[57] Schools and school districts have the option of educating safe media usage as well as incorporating digital media into the classroom experience, thus preparing students for the literacy they will encounter in the future.

258

Social networks and grassroots organizing


Social networks are being used by activists as a means of low-cost grassroots organizing. Extensive use of an array of social networking sites enabled organizers of the 2009 National Equality March to mobilize an estimated 200,000 participants to march on Washington with a cost savings of up to 85% per participant over previous methods.[58] The August 2011 England riots were similarly considered to have escalated and been fuelled by this type of grassroots organization.

Social networks and employment


A final rise in social network use is being driven by college students using the services to network with professionals for internship and job opportunities. Many studies have been done on the effectiveness of networking online in a college setting, and one notable one is by Phipps Arabie and Yoram Wind published in Advances in Social Network Analysis.[59] Many schools have implemented online alumni directories which serve as makeshift social networks that current and former students can turn to for career advice. However, these alumni directories tend to suffer from an oversupply of advice-seekers and an undersupply of advice providers. One new social networking service, Ask-a-peer, aims to solve this problem by enabling advice seekers to offer modest compensation to advisers for their time.

Social network hosting service


A social network hosting service is a web hosting service that specifically hosts the user creation of web-based social networking services, alongside related applications. Such services are also known as vertical social networks due to the creation of SNSes that cater to specific user interests and niches; like larger, interest-agnostic SNSes, such niche networking services may also possess the ability to create increasingly niche groups of users. An example for this is Ning.

Social networking

259

Business model
Few social networks currently charge money for membership. In part, this may be because social networking is a relatively new service, and the value of using them has not been firmly established in customers' minds. Companies such as MySpace and Facebook sell online advertising on their site. Their business model is based upon large membership count, and charging for membership would be counterproductive.[60] Some believe that the deeper information that the sites have on each user will allow much better targeted advertising than any other site can currently provide.[61] Social networks operate under an autonomous business model, in which a social network's members serve dual roles as both the suppliers and the consumers of content. This is in contrast to a traditional business model, where the suppliers and consumers are distinct agents. Revenue is typically gained in the autonomous business model via advertisements, but subscription-based revenue is possible when membership and content levels are sufficiently high.[62]

Social Interaction
Put simply, social networking is a way for one person to meet up with other people on the net. People use social networking sites for meeting new friends, finding old friends, or locating people who have the same problems or interests they have, called niche networking. More and more relationships and friendships are being formed online and then carried to an offline setting. Psychologist and University of Hamburg professor Erich H. Witte says that relationships which start online are much more likely to succeed. Witte has said that in less than 10 years, online dating will be the predominant way for people to start a relationship.[63] One online dating site claims that 2% of all marriages begin at its site, the equivalent of 236 marriages a day. Other sites claim 1 in 5 relationships begin online. Social networking sites play a vital role in this area as well. Being able to meet someone as a "friend" and see what common interests you share and how you have built up your friend base and "likes" you can truly see a fuller picture of the person you are talking with. Most sites are free instead of being pay based which allows younger people with stricter budgets to enjoy some of the same features as those of adults who are more likely to be able to afford pay based sites. While not the intended or original use for these social sites, a large area of their current function has stemmed from people wanting to meet other people in person and with the extremely busy schedules of most people, it is a fast, reliable and easy way in which to do so that costs you little time and money (if any). Users do not necessarily share with others the content which is of most interest to them, but rather that which projects a good impression of themselves.[30]

New trends in social networking


Nextdoor is a new private social networking site aimed at neighborhoods to help strength and enhance social ties. This SNS will help to bring together communities since neighbors drifted away because of the digital era.[64] More and more Americans are using social networking sites as their primary sources for information. The percentage of those who have used social networking sites to find news has increased, and nearly doubled, from 9% to 19% since 2010. This percentage is higher than those who get their news from other social media sites, new blogs and news podcasts.[65]

Social networking

260

Issues
Privacy
Privacy concerns with social networking services have been raised growing concerns amongst users on the dangers of giving out too much personal information and the threat of sexual predators. Users of these services also need to be aware of data theft or viruses. However, large services, such as MySpace and Netlog, often work with law enforcement to try to prevent such incidents. In addition, there is a perceived privacy threat in relation to placing too much personal information in the hands of large corporations or governmental bodies, allowing a profile to be produced on an individual's behavior on which decisions, detrimental to an individual, may be taken. Furthermore, there is an issue over the control of datainformation that was altered or removed by the user may in fact be retained and/or passed to third parties. This danger was highlighted when the controversial social networking site Quechup harvested e-mail addresses from users' e-mail accounts for use in a spamming operation.[66] In medical and scientific research, asking subjects for information about their behaviors is normally strictly scrutinized by institutional review boards, for example, to ensure that adolescents and their parents have informed consent. It is not clear whether the same rules apply to researchers who collect data from social networking sites. These sites often contain a great deal of data that is hard to obtain via traditional means. Even though the data are public, republishing it in a research paper might be considered invasion of privacy.[67] Privacy on social networking sites can be undermined by many factors. For example, users may disclose personal information, sites may not take adequate steps to protect user privacy, and third parties frequently use information posted on social networks for a variety of purposes. "For the Net generation, social networking sites have become the preferred forum for social interactions, from posturing and role playing to simply sounding off. However, because such forums are relatively easy to access, posted content can be reviewed by anyone with an interest in the users' personal information".[68][69][70] Following plans by the UK government to monitor traffic on social networks[71] schemes similar to E-mail jamming have been proposed for networks such as Twitter and Facebook. These would involve "friending" and "following" large numbers of random people to thwart attempts at network analysis.

Data mining
Through data mining, companies are able to improve their sales and profitability. With this data, companies create customer profiles that contain customer demographics and online behavior. A recent strategy has been the purchase and production of "network analysis software". This software is able to sort out through the influx of social networking data for any specific company.[72] Facebook has been especially important to marketing strategists. Facebook's controversial and new "Social Ads" program gives companies access to the millions of profiles in order to tailor their ads to a Facebook user's own interests and hobbies. However, rather than sell actual user information, Facebook sells tracked "social actions". That is, they track the websites a user uses outside of Facebook through a program called Facebook Beacon.[73]

Social networking

261

Notifications on websites
There has been a trend for social networking sites to send out only 'positive' notifications to users. For example sites such as Bebo, Facebook, and MySpace will not send notifications to users when they are removed from a person's friends list. Likewise, Bebo will send out a notification if a user is moved to the top of another user's friends list but no notification is sent if they are moved down the list. This allows users to purge undesirables from their list extremely easily and often without confrontation since a user will rarely notice if one person disappears from their friends list. It also enforces the general positive atmosphere of the website without drawing attention to unpleasant happenings such as friends falling out, rejection and failed relationships.

Access to information
Many social networking services, such as Facebook, provide the user with a choice of who can view their profile. This prevents unauthorized user(s) from accessing their information.[74] Parents who want to access their child's MySpace or Facebook account have become a big problem for teenagers who do not want their profile seen by their parents. By making their profile private, teens can select who may see their page, allowing only people added as "friends" to view their profile and preventing unwanted viewing of the profile by parents. Most teens are constantly trying to create a structural barrier between their private life and their parents.[75] To edit information on a certain social networking service account, the social networking sites require you to login or provide a password. This prevents unauthorized user(s) from adding, changing, or removing personal information, pictures, and/or other data. See also: Unauthorized access in online social networks

Potential for misuse


The relative freedom afforded by social networking services has caused concern regarding the potential of its misuse by individual patrons. In October 2006, a fake MySpace profile created in the name of Josh Evans by Lori Janine Drew led to the suicide of Megan Meier.[76][77] The event incited global concern regarding the use of social networking services for bullying purposes. In July 2008, a Briton, Grant Raphael, was ordered to pay a total of GBP 22,000 (about USD $44,000) for libel and breach of privacy. Raphael had posted a fake page on Facebook purporting to be that of a former schoolfriend Matthew Firsht, with whom Raphael had fallen out in 2000. The page falsely claimed that Firsht was homosexual and that he was dishonest. At the same time, genuine use of social networking services has been treated with suspicion on the ground of the services' misuse. In September 2008, the profile of Australian Facebook user Elmo Keep was banned by the site's administrators on the grounds that it violated the site's terms of use. Keep is one of several users of Facebook who were banned from the site on the presumption that their names aren't real, as they bear resemblance to the names of characters like Sesame Street's Elmo.[78]

Social networking

262

Risk for child safety


Citizens and governments have been concerned with misuse by child and teenagers of social networking services, in particular in relation to online sexual predators. Overuse of social networking may also make children more susceptible to depression and anxiety.[79] A certain number of actions have been engaged by governments to better understand the problem and find some solutions. A 2008 panel concluded that technological fixes such as age verification and scans are relatively ineffective means of apprehending online predators.[80] In May 2010, a child pornography social networking site with hundreds of members was dismantled by law enforcement. It was deemed "the largest crimes against children case brought anywhere by anyone."[81] Social networking can also be a risk to child safety in another way; parents can get addicted to games and neglect their children. One instance in South Korea resulted in the death of a child from starvation.[82]

Trolling
A common misuse of social networking sites such as Facebook is that it is occasionally used to emotionally abuse individuals. Such actions are often referred to as trolling. It is not rare for confrontations in the real world to be translated online. Trolling can occur in many different forms, such as (but not limited to) defacement of deceased person(s) tribute pages, name calling, playing online pranks on volatile individuals and controversial comments with the intention to cause anger and cause arguments. Trolling is not to be confused with cyber-bullying.

Online bullying
Online bullying, also called cyber-bullying, is a relatively common occurrence and it can often result in emotional trauma for the victim. Depending on the networking outlet, up to 39% of users admit to being cyber-bullied.[83] Danah Boyd, a researcher of social networks quotes a teenager in her article, Why Youth (Heart) Social Network Sites. The teenager expresses frustration towards networking sites like MySpace because it causes drama and too much emotional stress.[84] There are not many limitations as to what individuals can post when online. Individuals are given the power to post offensive remarks or pictures that could potentially cause a great amount of emotional pain for another individual.

Interpersonal communication
Interpersonal communication has been a growing issue as more and more people have turned to social networking as a means of communication. "Benniger (1987) describes how mass media has gradually replaced interpersonal communication as a socializing force. Further, social networking sites have become popular sites for youth culture to explore themselves, relationships, and share cultural artifacts".[85] Many teens and social networking users may be harming their interpersonal communication by using sites such as Facebook and MySpace. Stated by Baroness Greenfield, an Oxford University Neuroscientist, "My fear is that these technologies are infantilizing the brain into the state of small children who are attracted by buzzing noises and bright lights, who have a small attention span and who live for the moment."[86] The convenience that social network sites give users to communicate with one another can also damage their interpersonal communication. Sherry Turkle, the founder and director of the MIT Initiative on Technology and Self, stated, Networked, we are together, but so lessened are our expectations of each other that we feel utterly alone. And there is the risk that we come to see others as objects to be accessed--and only for the parts we find useful, comforting, or amusing.[87] Furthermore, social network sites can create insincere friendships, Turkle also noted, They nurture friendships on social-networking sites and then wonder if they are among friends. They become confused about companionship.[88]

Social networking

263

Psychological effects of social networking


As social networking sites have risen in popularity over the past years, people have been spending an excessive amount of time on the Internet in general and social networking sites in specific. This has led researchers to debate the establishment of Internet addiction as an actual clinical disorder.[89] Social networking can also affect the extent to which a person feels lonely. In a Newsweek article, Johannah Cornblatt explains Social-networking sites like Facebook and MySpace may provide people with a false sense of connection that ultimately increases loneliness in people who feel alone. John T. Cacioppo, a neuroscientist at the University of Chicago, claims that social networking can foster feelings of sensitivity to disconnection, which can lead to loneliness.[90] However some scholars have expressed that concerns about social networking are often exaggerated and poorly researched .[91]

Patents
There has been rapid growth in the number of US patent applications that cover new technologies related to social networking. The number of published applications has been growing rapidly since 2003. There are now over 3500 published applications. As many as 7000 applications may be currently on file including those that haven't been published yet.[92] Only about 400[93] of these applications have issued as patents, however, due largely to the multi-year backlog in examination of business method patents and the difficulty in getting these patent applications allowed.[94] It has been reported that social networking patents are important for the published per year and patents issued per year establishment of new start-up companies.[95] It has also been reported, however, that social networking patents inhibit innovation.[96] On June 15, 2010, the United States Patent and Trademark Office awarded Amazon.com a patent for a "Social Networking System" based on its ownership of PlanetAll.[97] The patent describes a Social Networking System as A networked computer system provides various services for assisting users in locating, and establishing contact relationships with, other users. For example, in one embodiment, users can identify other users based on their affiliations with particular schools or other organizations. The system also provides a mechanism for a user to selectively establish contact relationships or connections with other users, and to grant permissions for such other users to view personal information of the user. The system may also include features for enabling users to identify contacts of their respective contacts. In addition, the system may automatically notify users of personal information updates made by their respective contacts.[98] The patent has garnered attention due to its similarity to the popular social networking site Facebook.[99]
Number of US social network patent applications

Worker's rights
What types of speech workers are protected from being fired for on social networking websites has been an issue for American companies with over 100 complaints as of 2011 on this topic having been made to the National Labor Relations Board (NLRB).[100] The National Labor Relations Act protects workers from being fired for "protected concerted activity," which prevents workers from being fired for collective action, while allowing companies the right to fire workers for individual actions they take against the company.[100] Companies are concerned with the potential damage comments online can do to public image due to their visibility and accessibility, but despite over 100 cases being presented thus far to NLRB only 1 has led to a formal ruling, leaving uncertainty as to the boundaries of what types of speech the NLRB will ultimately put in place.[100]

Social networking

264

Decentralized architecture
Most of the existing SNS sites use one or multiple dedicated data centers to serve its all users. Such infrastructure-based systems faces over-provisioning during non-peak hours, while may encounter service outage during peak hours, due to the highly dynamic of SNS users' activities. There are several proposals, leveraging a decentralized architecture to ensure the scalability of SNS sites with low infrastructure cost. These proposals include Fethr[101] uaOSN ,[102] and Cuckoo .[103]

Investigations
Social networking services are increasingly being used in legal and criminal investigations. Information posted on sites such as MySpace and Facebook has been used by police (forensic profiling), probation, and university officials to prosecute users of said sites. In some situations, content posted on MySpace has been used in court.[104] Facebook is increasingly being used by school administrations and law enforcement agencies as a source of evidence against student users. This site being the number one online destination for college students, allows users to create profile pages with personal details. These pages can be viewed by other registered users from the same school, which often include resident assistants and campus police who have signed up for the service.[105] One UK police force has sifted pictures from Facebook and arrested some people who had been photographed in a public place holding a weapon such as a knife (having a weapon in a public place is illegal).[106]

Application domains
Government applications
Social networking is more recently being used by various government agencies. Social networking tools serve as a quick and easy way for the government to get the opinion of the public and to keep the public updated on their activity. The Centers for Disease Control demonstrated the importance of vaccinations on the popular children's site Whyville and the National Oceanic and Atmospheric Administration has a virtual island on Second Life where people can explore underground caves or explore the effects of global warming.[107] Likewise, NASA has taken advantage of a few social networking tools, including Twitter and Flickr. They are using these tools to aid the Review of U.S. Human Space Flight Plans Committee, whose goal it is to ensure that the nation is on a vigorous and sustainable path to achieving its boldest aspirations in space.[108]

Business applications
The use of social networking services in an enterprise context presents the potential of having a major impact on the world of business and work (Fraser & Dutta 2008). Social networks connect people at low cost; this can be beneficial for entrepreneurs and small businesses looking to expand their contact bases. These networks often act as a customer relationship management tool for companies selling products and services. Companies can also use social networks for advertising in the form of banners and text ads. Since businesses operate globally, social networks can make it easier to keep in touch with contacts around the world. Two examples of social networking being used for business purposes are LinkedIn.com and Youngblackprofessionals.org [109]. LinkedIn aims to interconnect professionals. LinkedIn has over 100 million users in over 200 countries.[110] Youngblackprofessionals.org or YBP aims to do the same thing, but is targeted toward professional minorities. .[111] Another is the use of physical spaces available to members of a social network such as Hub Culture, an invitation-only social network for entrepreneurs, and other business influentials, with Pavilions in major cities such as London, UK. Having a physical presence allows members to network in the real world, as well as the virtual,

Social networking adding extra business value. Applications for social networking sites have extended toward businesses and brands are creating their own, high functioning sites, a sector known as brand networking. It is the idea that a brand can build its consumer relationship by connecting their consumers to the brand image on a platform that provides them relative content, elements of participation, and a ranking or score system. Brand networking is a new way to capitalize on social trends as a marketing tool. The power of social networks it beginning to permeate into internal culture of businesses where they are finding uses for collaboration, file sharing and knowledge transfer. The term Enterprise Social Software is becoming increasingly popular for these types of applications.

265

Dating applications
Many social networks provide an online environment for people to communicate and exchange personal information for dating purposes. Intentions can vary from looking for a one time date, short-term relationships, and long-term relationships.[112] Most of these social networks, just like online dating services, require users to give out certain pieces of information. This usually includes a user's age, gender, location, interests, and perhaps a picture. Releasing very personal information is usually discouraged for safety reasons.[113] This allows other users to search or be searched by some sort of criteria, but at the same time people can maintain a degree of anonymity similar to most online dating services. Online dating sites are similar to social networks in the sense that users create profiles to meet and communicate with others, but their activities on such sites are for the sole purpose of finding a person of interest to date. Social networks do not necessarily have to be for dating; many users simply use it for keeping in touch with friends, and colleagues.[114] However, an important difference between social networks and online dating services is the fact that online dating sites usually require a fee, where social networks are free.[115] This difference is one of the reasons the online dating industry is seeing a massive decrease in revenue due to many users opting to use social networking services instead. Many popular online dating services such as Match.com, Yahoo Personals, and eHarmony.com are seeing a decrease in users, where social networks like MySpace and Facebook are experiencing an increase in users.[116] The number of Internet users in the U.S. that visit online dating sites has fallen from a peak of 21% in 2003 to 10% in 2006.[117] Whether its the cost of the services, the variety of users with different intentions, or any other reason, it is undeniable that social networking sites are quickly becoming the new way to find dates online.

Educational applications
The National School Boards Association reports that almost 60 percent of students who use social networking talk about education topics online, and more than 50 percent talk specifically about schoolwork. Yet the vast majority of school districts have stringent rules against nearly all forms of social networking during the school day even though students and parents report few problem behaviors online. Social networks focused on supporting relationships between teachers and their students are now used for learning, educator professional development, and content sharing. Ning for teachers, TermWiki, Learn Central,[118] TeachStreet and other sites are being built to foster relationships that include educational blogs, eportfolios, formal and ad hoc communities, as well as communication such as chats, discussion threads, and synchronous forums. These sites also have content sharing and rating features. Social networks are also emerging as online yearbooks, both public and private. One such service is MyYearbook, which allows anyone from the general public to register and connect. A new trend emerging is private label yearbooks accessible only by students, parents, and teachers of a particular school, similar to Facebook's beginning within Harvard.

Social networking

266

Finance applications
The use of virtual currency systems inside social networks create new opportunities for global finance. Hub Culture operates a virtual currency Ven used for global transactions among members, product sales[119] and financial trades in commodities and carbon credits.[120][121] In May 2010, Carbon pricing contracts were introduced to the weighted basket of currencies and commodities that determine the floating exchange value of Ven. The introduction of carbon to the calculation price of the currency made Ven the first and only currency that is linked to the environment.[122]

Medical and health applications


Social networks are beginning to be adopted by healthcare professionals as a means to manage institutional knowledge, disseminate peer to peer knowledge and to highlight individual physicians and institutions. The advantage of using a dedicated medical social networking site is that all the members are screened against the state licensing board list of practitioners.[123] A new trend is emerging with social networks created to help its members with various physical and mental ailments.[124] For people suffering from life altering diseases, PatientsLikeMe offers its members the chance to connect with others dealing with similar issues and research patient data related to their condition. For alcoholics and addicts, SoberCircle gives people in recovery the ability to communicate with one another and strengthen their recovery through the encouragement of others who can relate to their situation. DailyStrength is also a website that offers support groups for a wide array of topics and conditions, including the support topics offered by PatientsLikeMe and SoberCircle. Some social networks aim to encourage healthy lifestyles in their users. SparkPeople offers community and social networking tools for peer support during weight loss. Fitocracy and QUENTIQ are focused on exercise, enabling users to share their own workouts and comment on those of other users.

Social and political applications


Social networking sites have recently showed a value in social and political movements.[125] In the Egyptian revolution, Facebook and Twitter both played a pivotal role in keeping people connected to the revolt. Egyptian activists have credited social networking sites with providing a platform for planning protest and sharing news from Tahrir Square in real time. By presenting a platform for thousands of people to instantaneously share videos of mainly events featuring brutality, social networking proves to be a vital tool in revolutions.[126]

Open source software


There are a number of projects that aim to develop free and open source software to use for social networking services. The projects include Anahita Social Networking Engine,[127] Diaspora, Appleseed Project,[128] OneSocialWeb,[129] Kune and StatusNet. These technologies are often referred to as Social engine or Social networking engine software.

Market share
According to ComScore, up to end of November 2011:[130]

Social networking

267

Worldwide

Unique Visitors Percentage 55.1% 11.7% 6.6% 17.7% 4.2% 17.8% 100 %

Facebook.com 792,999,000 Twitter.com 167,903,000

LinkedIn.com 94,823,000 Google+ MySpace Others Total 250,000,000 61,037,000 255,539,000 1,438,877,000

World Usage
According to ComScore,[131] as of December 2011, Israel leads the world in the time spent in social networks online, followed closely by Argentina.

In the media
In December 2010, Time Magazine named Facebook CEO Mark Zuckerberg as person of the year. Released in 2010, The Social Network is a film dramatizing the origin of Facebook.

References
Boyd, Danah; Ellison, Nicole (2007). "Social Network Sites: Definition, History, and Scholarship" [132]. Journal of Computer-Mediated Communication 13 (1). Boyd, Danah (2006). "Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites" [133]. First Monday 11 (12). Ellison, Nicole B.; Steinfield, Charles; Lampe, Cliff (2007). "The benefits of Facebook "friends": Exploring the relationship between college students' use of online social networks and social capital" [134]. Journal of Computer-Mediated Communication 12 (4). Fraser, Matthew; Dutta, Soumitra (2008). Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World [135]. Wiley. ISBN978-0-470-74014-9. Mazer, J. P.; Murphy, R. E.; Simonds, C. J. (2007). "I'll See You On "Facebook": The Effects of Computer-Mediated Teacher Self-Disclosure on Student Motivation, Affective Learning, and Classroom Climate" [136] . Communication Education 56 (1): 117. doi:10.1080/03634520601009710. Prensky, Marc (2001). "Digital Natives, Digital Immigrants" [137]. On the Horizon 9 (5). White, D.S.; Le Cornu, A. (2011). "Visitors and Residents: A New Typology for Online Engagement" [138]. First Monday 16 (9).

Social networking

268

Notes
[1] "Nexopia stats on" (http:/ / www. alexa. com/ data/ details/ traffic_details/ nexopia. com). Alexa.com. . Retrieved 2011-03-13. [2] Elevator Pitch: Why Badoo wants to be the next word in social networking (http:/ / blogs. guardian. co. uk/ digitalcontent/ 2008/ 03/ elevator_pitch_why_badoo_wants. html), Mark Sweney , The Guardian, December 24, 2007 , Accessed March 2008. [3] Bebo (http:/ / www. techcrunch. com/ 2007/ 08/ 20/ windows-live-messaging-coming-to-bebo/ ) - most popular of its kind in UK,(August 2007): TechCrunch website. Retrieved on January 15, 2008. [4] German Xing Plans Invasion of LinkedIn Turf (http:/ / www. marketingvox. com/ german-xing-plans-invasion-of-linkedin-turf-030727/ ): article from the MarketingVox website. [5] Hi5 popular in Europe (http:/ / www. pbs. org/ mediashift/ 2007/ 06/ try_try_againorkut_friendster. html): article from the PBS MediaShift website. Retrieved on January 18, 2008. [6] "Why Users Love Orkut" (http:/ / usability. about. com/ od/ websiteaudiences/ a/ Orkut. htm) - 55% of users are Brazilian: About.com website. Retrieved on January 15, 2008, [7] Kucera, Von Gregor (August 9, 2012). "Wundersame Welt der Netzwerke" (http:/ / www. wienerzeitung. at/ nachrichten/ kultur/ medien/ 478619_Wundersame-Welt-der-Netzwerke. html). Wiener Zeitung. . [8] finance.yahoo.com (http:/ / finance. yahoo. com/ family-home/ article/ 112952/ family-that-tweets-wsj?mod=family-kids_parents) [9] The Network Nation 2 by S. Roxanne Hiltz and Murray Turoff (Addison-Wesley, 1978, 1993) [10] Michael Hauben, Ronda Hauben, and Thomas Truscott (1997-04-27). Netizens: On the History and Impact of Usenet and the Internet (Perspectives). Wiley-IEEE Computer Society P. ISBN 0-8186-7706-6 [11] Katie Hafner, The WELL: A Story of Love, Death and Real Life in the Seminal Online Community (2001) Carroll & Graf Publishers ISBN 0-7867-0846-8 [12] Cotriss, David (2008-05-29). "Where are they now: TheGlobe.com" (http:/ / www. thestandard. com/ news/ 2008/ 05/ 29/ where-are-they-now-theglobe-com). The Industry Standard. . [13] Romm-Livermore, C. & Setzekorn, K. (2008). Social Networking Communities and E-Dating Services: Concepts and Implications. IGI Global. p.271 [14] mcmc.indiana.edu (http:/ / jcmc. indiana. edu/ vol13/ issue1/ boyd. ellison. html) [15] longislandpress.com (http:/ / www. longislandpress. com/ 2010/ 09/ 30/ from-friendster-to-myspace-to-facebook-the-evolution-and-deaths-of-social-networks/ ) [16] bnet.com (http:/ / www. bnet. com/ videos/ gibby-miller-inventing-the-social-network/ 239462) [17] Knapp, E. (2006). A Parent's Guide to MySpace. DayDream Publishers. ISBN 1-4196-4146-8 [18] Steve Rosenbush (2005). News Corp.'s Place in MySpace (http:/ / www. businessweek. com/ technology/ content/ jul2005/ tc20050719_5427_tc119. htm), BusinessWeek, July 19, 2005. (MySpace Page Views figures) [19] "Social graph-iti" (http:/ / www. economist. com/ business/ displaystory. cfm?story_id=9990635): Facebook's social network graphing: article from The Economist's website. Retrieved on January 19, 2008. [20] Social Networks: Facebook Takes Over Top Spot, Twitter Climbs (http:/ / blog. compete. com/ 2009/ 02/ 09/ facebook-myspace-twitter-social-network/ ) [21] "Social networking goes global" (http:/ / www. comscore. com/ press/ release. asp?press=1555). Reston, VAR: comscore.com. 2007. . Retrieved September 9, 2007. [22] Mackaay, Ejan (1990). "Economic Incentives in Markets for Information and Innovation". Harvard Journal of Law & Public Policy 13 (909): 867910. [23] Heylighen, Francis (2007). "Why is Open Access Development so Successful?". In B. Lutterbeck, M. Barwolff, and R. A. Gehring. Open Source Jahrbuch. Lehmanns Media. [24] Gross, R and Acquisti, A (2005). Information Revelation and Privacy in Online Social Networks (The Facebook case) (http:/ / www. heinz. cmu. edu/ ~acquisti/ papers/ privacy-facebook-gross-acquisti. pdf). Pre-proceedings version. ACM Workshop on Privacy in the Electronic Society (WPES) [25] Danah Boyd, (2007), Why Youth (Heart) Social Network Sites (http:/ / www. mitpressjournals. org/ doi/ pdf/ 10. 1162/ dmal. 9780262524834. 119), MacArthur Foundation Series on Digital Learning - Youth, Identity, and Digital Media Volume (ed. David Buckingham). MIT Press [26] "A New Generation Reinvents Philanthropy" (http:/ / online. wsj. com/ public/ article/ SB118765256378003494. html), Wall Street Journal website. [27] "Half of employees banned from Facebook at work" (http:/ / www. telegraph. co. uk/ technology/ facebook/ 8506380/ Half-of-employees-banned-from-Facebook-at-work. html). The Daily Telegraph (London). 2011-05-11. . [28] news.searchofficespace.com (http:/ / news. searchofficespace. com/ sos-news/ 50-of-british-employers-have-banned-facebook-from-the-office-what-do-you-think. html) [29] boyd, D. M., & Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship (http:/ / jcmc. indiana. edu/ vol13/ issue1/ boyd. ellison. html). Journal of Computer-Mediated Communication, 13(1), article 11. Retrieved on: 2012-01-30. [30] Byrne, Ciara (23 August 2012). "What you read is not what you share" (http:/ / venturebeat. com/ 2012/ 08/ 23/ bitly-realtime-hilary-mason/ ). VentureBeat. . Retrieved 10 September 2012. [31] Search for "e-commerce, social networking" (http:/ / www. google. com/ trends?q=e-commerce,+ social+ networking& ctab=0& geo=all& date=all& sort=1). Google Trends. Accessed 26 October 2009.

Social networking
[32] mashable.com (http:/ / mashable. com/ 2011/ 02/ 14/ facebook-photo-infographic/ ?asid=c228f21b) [33] (http:/ / mashable. com/ 2012/ 04/ 06/ pinterest-number-3-social-network/ ) Pinterest is Now the No. 3 Social Network in the U.S via Mashable.com [34] MG Siegler Jan 15, 2010 (2010-01-15). "Yelp Enables Check-Ins On Its iPhone App; Foursquare, Gowalla Ousted As Mayors" (http:/ / www. techcrunch. com/ 2010/ 01/ 15/ yelp-iphone-app-4-check-ins/ ). Techcrunch.com. . Retrieved 2011-03-13. [35] Nimetz, Jody. "Jody Nimetz on Emerging Trends in B2B Social Networking" (http:/ / www. marketing-jive. com/ 2007/ 11/ jody-nimetz-on-emerging-trends-in-b2b. html). Marketing Jive, November 18, 2007. Accessed 26 October 2009. [36] Liebeskind, Julia Porter, et al. "Social Networks, Learning, and Flexibility: Sourcing Scientific Knowledge in New Biotechnology Firms" (http:/ / www. jstor. org/ pss/ 2635102). Organization Science, Vol. 7, No. 4 (JulyAugust 1996), pp. 428443. [37] "Choose What the VLT Observes & Tweet Your Way to the VLT!" (http:/ / www. eso. org/ public/ news/ eso1232/ ). ESO Press Release. . Retrieved 8 August 2012. [38] Livingstone, Sonia; Brake, David R (December 2010). "On the Rapid Rise of Social Networking Sites: New Findings and Policy Implications" (http:/ / eprints. Ise. ac. uk/ 30124/ ). Children & Society 24 (1): 7583. doi:10.1111/j.1099-0860.2009.00243.x. . Retrieved July 16, 2012. [39] Wikipedia. "Social Networking service" (http:/ / en. wikipedia. org/ w/ index. php?title=Social_networking_service). . Retrieved July 17, 2012. [40] Lenhart, Amanda. "Social Media & Mobile Internet Use Among Teens and Young Adults" (http:/ / pewinternet. org/ Reports/ 2010/ Social-Media-and-Young-Adults. aspx). Pew Research Center. . Retrieved July 16, 2012. [41] Davis, Michelle R.. "Social Networking Goes to School" (http:/ / www. edweek. org/ dd/ articles/ 2010/ 06/ 16/ 03networking. h03. html?print=1). Education Week. . Retrieved July 17, 2012. [42] Ellison, Nicole B.; Steinfield, Charles; Lampe, Cliff (2007). "The Benefits of Facebook "Friends:" Social Capital and College Student's Use of Online Social Network Sites" (http:/ / www. elkhealth. pbworks. com/ f/ Ellison,+ Steinfield,+ and+ Lampe+ (2007). pdf). Journal of Computer-Mediated Communication 12: 11431168. doi:10.1111/j.1083-6101.2007.00367.x. . Retrieved July 16, 2012. [43] Knobel, Michelle., Lankshear, Colin (2008). Digital Literacy and Participation in Online Social Networking Spaces. New York: Peter Lang. pp.249278. [44] Doering, Aaron; Beach, Richard and O'Brien, David (October 2007). "Infusing Multimodal Tools and Digital Literacies into an English Education Program". National Council of Teachers of English 40 (1): 4160. [45] Buzzetto-More, Nicole A. (2010). "Social Networking in Undergraduate Education". Interdisciplinary Journal of Information, Knowledge, and Management 7: 6390. [46] "2012 Learn English Comparisons" (http:/ / learn-english-review. toptenreviews. com/ ). Top Ten Reviews. . Retrieved 3 September 2012. [47] Mason, Robin, and Rennie, Frank (2008). E-Learning and Social Networking Handbook Resources for Higher Education. Hoboken: Rutledge. pp.124. ISBN9780203927762. [48] Livingstone, Sonia; Brake, David R. (2010). "On the Rapid Rise of Social Networking Sites: New Findings and Policy Implications" (http:/ / eprints. Ise. ac. uk/ 30124/ ). Children & Society 24 (1): 7583. doi:10.1111/j.1099-0860.2009.00243.x. . Retrieved July 16, 2012. [49] Luo, Tian; Gao, Fei (2012). "Enhancing Classroom Learning Experience by Providing Structures to Microblogging Based Activities". Journal of Information Technical Education 11. [50] Gardner, J. Clark. "Facebooks Potential in the Classroom" (http:/ / www. jclarkgardner. com/ uploads/ 5/ 4/ 1/ 4/ 5414483/ jclark_gardner_facebook_classroom. pdf). . [51] Graber, Dianna; mentored by Mendoza, Kelly (2012). "New Media Literacy Education (NMLE): A Developmental Approach" (http:/ / www. jmle. org). Journal of Media Literacy Education 4 (1): 8292. . Retrieved July 16, 2012. [52] Jenkins, Henry (2006). Confronting the challenges of participatory culture: Media education for the 21st century. Chicago: The John D. and Catherine T. MacArthur Foundation. ISBN9780262513623. [53] Taylor, Gina, Rozi, Kristina. "Current Issues and Trends: Social Networking" (http:/ / niu. edu/ ~lynch/ social_networking_510_su2010. pdf). Northern Illinois University. . [54] Gee, James Paul (2004). Situated Language and Learning: A Critique of Traditional Schooling. London: Routledge. [55] Livingstone, Sonia, and Bober, Magdalena. "UK Children Go Online: Surveying the Experiences of Young People and Their Parents" (http:/ / eprints. lse. ac. uk/ archive/ 00000395). . [56] Munoz, Caroline Lego; Towner, Terri (Dec 5, 2011). "Back to the "Wall": Facebook in the College Classroom". First Monday 16 (12). [57] Waddington, Jayme (May 2011). "Social Networking: The Unharnessed Educational Tool". Undergraduate Research Journal at UCCS 4.1: 1218. [58] Carlson, Ben (April 28, 2010). "March 2.0: Success of the National Equality March relied on social media tools" (http:/ / www. mediabullseye. com/ mb/ 2010/ 04/ march-2-0-success-of-the-national-equality-march-relied-on-social-media-tools. html#idc-container). Media Bullseye. . Retrieved 2010-04-29. [59] Arabie, Phipps, and Yoram Wind. "Marketing and Social Networks" (http:/ / books. google. com/ books?hl=en& lr=& id=C6juDKDmvCcC& oi=fnd& pg=PR9& dq=social+ networking& ots=Aw9oXw-AtG& sig=CPAZMmPPnAhSZzAu0lh-k4iUXt4#PRA1-PA254,M1). In Stanley Wasserman and Joseph Galaskiewicz, Advances in Social Network Analysis: Research in the Social and Behavioral Sciences. Thousand Oaks, Calif.: Sage Publications, 1994, pp. 254273. ISBN 0-8039-4302-4

269

Social networking
[60] Chambers, Clem. "Murdoch Will Earn a Payday from MySpace" (http:/ / www. forbes. com/ technology/ ebusiness/ 2006/ 03/ 29/ microsoft-myspace-newscorp-in_cc_0330soapbox_inl. html). Forbes, March 30, 2006. Accessed 26 October 2009. [61] Tynan, Dan. "As Applications Blossom, Facebook Is Open for Business" (http:/ / www. wired. com/ techbiz/ startups/ news/ 2007/ 07/ facebook_platform) Wired, July 30, 2007. Accessed 26 October 2009. [62] Flor, Nick V. (2000). Web Business Engineering: Using Offline Activities to Drive Internet Strategies. Reading, Mass.: Addison-Wesley. ISBN 0-201-60468-X; Flor, Nick V. "Week 1: The Business Model Approach to Web Site Design" (http:/ / www. informit. com/ articles/ article. aspx?p=20882). InformIT, March 2, 2001. Accessed 26 October 2009. Description of the autonomous business model used in social networking services. [63] "Online Dating: The Relationship Status Update" (http:/ / www. bitrebels. com/ social/ online-dating-the-relationship-status-update-infographic/ ). bitrebels.com. . [64] Locke, Laura. (http:/ / news. cnet. com/ 8301-1023_3-20125633-93/ nextdoor-first-private-social-network-for-neighborhoods/ )"ORB", October 26, 2011. Accessed 24 April 2012. [65] McMillan, Graeme. (http:/ / www. digitaltrends. com/ social-media/ more-americans-read-news-online-than-anywhere-else-new-survey-says/ )"Digital Trends", September 28, 2012. Accessed 29 September 2012. [66] Social network launches worldwide spam campaign (http:/ / www. e-consultancy. com/ news-blog/ 364182/ social-network-launches-worldwide-spam-campaign. html) E-consultancy.com, Accessed 10 September 2007 [67] Moreno MA, Fost NC, Christakis DA (2008). "Research ethics in the MySpace era". Pediatrics 121 (1): 15761. doi:10.1542/peds.2007-3015. PMID18166570. [68] David Rosenblum (2007). "What Anyone Can Know: The Privacy Risks of Social Networking Sites" (http:/ / www. computer. org/ portal/ web/ csdl/ doi/ 10. 1109/ MSP. 2007. 75). . [69] Henry Jenkins and Danah Boyd (2006-05-24). "Discussion: MySpace and Deleting Online Predators Act (DOPA)" (http:/ / www. danah. org/ papers/ MySpaceDOPA. html). . Retrieved 2006-05-26. [70] Susan B. Barnes (2006-09-04). "A privacy paradox: Social networking in the United States" (http:/ / firstmonday. org/ htbin/ cgiwrap/ bin/ ojs/ index. php/ fm/ article/ viewArticle/ 1394/ 1312). . [71] BBC (2009-03-25). "Social Network Sites 'Monitored'" (http:/ / news. bbc. co. uk/ 1/ hi/ uk_politics/ 7962631. stm). BBC News. . Retrieved 2009-03-25. [72] Miller, Andy (2010-09-02). "Mining Social Networks: Untangling the Social Web" (http:/ / www. economist. com/ node/ 16910031). The Economist. . [73] Elkins, Sarah. "A Social Network's Faux Pas?" (http:/ / www. newsweek. com/ 2007/ 11/ 08/ a-social-network-s-faux-pas. html). Newsweek. . [74] "Niet compatibele browser" (http:/ / www. facebook. com/ policy. php?ref=pf). Facebook. . Retrieved 2011-03-13. [75] boyd, danah. "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life" [76] May 22, 2007 12:00AM (2007-05-22). "Fatal MySpace internet hoax mother is charged, Herald Sun, 17 May 2008" (http:/ / www. news. com. au/ heraldsun/ story/ 0,21985,21775032-11869,00. html). News.com.au. . Retrieved 2011-03-13. [77] "Parents: Cyber Bullying Led to Teen's Suicide: Megan Meier's Parents Now Want Measures to Protect Children Online" (http:/ / abcnews. go. com/ GMA/ Story?id=3882520). ABC News. 29 November 2007. . [78] "Banned for keeps on Facebook for odd name, Sydney Morning Herald, 24 September 2008" (http:/ / www. smh. com. au/ news/ biztech/ banned-for-keeps-on-facebook-for-odd-name/ 2008/ 09/ 25/ 1222217399252. html). Smh.com.au. 2008-09-25. . Retrieved 2011-03-13. [79] "Social Networking's Good and Bad Impacts on Kids" (http:/ / www. apa. org/ news/ press/ releases/ 2011/ 08/ social-kids. aspx). American Psychological Association. August 6, 2011. . [80] Enhancing Child Safety and Online Technologies (http:/ / cyber. law. harvard. edu/ pubrelease/ isttf/ ). Internet Safety Technical Task Force, Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States. 2008 (published 31 December 2008). [81] Wilson, Charles (May 27, 2010). Child porn 'social networking site' busted by feds (http:/ / www. washingtonpost. com/ wp-dyn/ content/ article/ 2010/ 05/ 27/ AR2010052700559. html). Associated Press. [82] Mark Tran, (http:/ / www. guardian. co. uk/ world/ 2010/ mar/ 05/ korean-girl-starved-online-game), "The Guardian", March 5, 2010 [83] Computer Science Illuminated [84] Boyd, Danah. "Why Youth (Heart) Social Networking Sites: The Role of Networked Publics in Teenage Social Life" (http:/ / eres. ucsc. edu/ eres/ coursepage. aspx?cid=3840& page=docs#). eres.ucsc.edu. . [85] "A Privacy Paradox" (http:/ / firstmonday. org/ htbin/ cgiwrap/ bin/ ojs/ index. php/ fm/ article/ viewArticle/ 1394/ 1312#note4). . [86] Derbyshire, David (24 February 2009). "Social websites harm children's brains: Chilling warning to parents from top neuroscientist" (http:/ / www. dailymail. co. uk/ news/ article-1153583/ Social-websites-harm-childrens-brains-Chilling-warning-parents-neuroscientist. html). Daily Mail (London). . [87] Turkle, Sherry (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books. p.154. ISBN978-0-465-02234-2. [88] Turkle, Sherry (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books. p.17. ISBN978-0-465-02234-2.

270

Social networking
[89] "CBS "Social Networking: An Internet Addiction?", CBS News, June 24, 2008" (http:/ / www. cbsnews. com/ stories/ 2008/ 06/ 24/ earlyshow/ main4205009. shtml?tag=contentMain;contentBody). cbsnews.com. 2008-06-24. . Retrieved 2011-05-13. [90] "Cornblatt, Johannah, "Lonely Planet", Newsweek, August 21, 2009" (http:/ / www. newsweek. com/ 2009/ 08/ 20/ lonely-planet. html). newsweek.com. 2009-08-29. . Retrieved 2011-05-13. [91] "Magid, Larry, "Is there really 'Facebook depression?'"" (http:/ / news. cnet. com/ 8301-19518_3-20048148-238. html). CNET. 2011-03-29. . Retrieved 2011-10-18. [92] "Mark Nowotarski, "Don't Steal My Avatar! Challenges of Social Network Patents, IP Watchdog, January 23, 2011" (http:/ / ipwatchdog. com/ 2011/ 01/ 23/ dont-steal-my-avatar-challenges-of-social-networking-patents/ id=14531/ ). Ipwatchdog.com. . Retrieved 2011-03-13. [93] "USPTO search on issued patents mentioning "social network"" (http:/ / patft. uspto. gov/ netacgi/ nph-Parser?Sect1=PTO2& Sect2=HITOFF& u=/ netahtml/ PTO/ search-adv. htm& r=0& p=1& f=S& l=50& Query=spec/ "social+ network"& d=PTXT). Patft.uspto.gov. . Retrieved 2011-03-13. [94] "Nowotarski, Mark "Reducing Patent Backlog and Prosecution Costs Using PAIR data", IP Watchdog, August 16, 2010" (http:/ / ipwatchdog. com/ 2010/ 08/ 16/ reducing-patent-backlog-prosecution-costs-using-pair-data/ id=12108/ ). Ipwatchdog.com. . Retrieved 2011-03-13. [95] Added by Mikk Putk on July 30, 2009 at 6:48am View Videos (2009-07-30). "News 12 "On the Money" interview of Mark Nowotarski, July 30, 2009" (http:/ / ipestonia. ning. com/ video/ patents-on-social-media). Ipestonia.ning.com. . Retrieved 2011-03-13. [96] "USPTO Lets Amazon Patent the Social Networking System" (http:/ / yro. slashdot. org/ story/ 10/ 06/ 16/ 2233230/ USPTO-Lets-Amazon-Patent-the-Social-Networking-System?from=twitter). yro.slashdot.org. 2010-06-16. . Retrieved 2011-03-13. [97] Gold, Kimberly. "Amazon Secures Patent For Social Networking System" (http:/ / blogs. forbes. com/ docket/ 2010/ 06/ 17/ amazon-secures-patent-for-social-networking-system/ ). Forbes. . [98] US Patent and Trademark Office (http:/ / patft. uspto. gov/ netacgi/ nph-Parser?Sect1=PTO1& Sect2=HITOFF& d=PALL& p=1& u=/ netahtml/ PTO/ srchnum. htm& r=1& f=G& l=50& s1=7,739,139. PN. & OS=PN/ 7,739,139& RS=PN/ 7,739,139) Patent number 7,739,139 [99] "Network World" (http:/ / www. networkworld. com/ news/ 2010/ 061710-amazon-social-network-patent. html). Network World. . Retrieved 2011-03-13. [100] "Facebook policies tricky for employers, workers" (http:/ / www. japantoday. com/ category/ technology/ view/ facebook-policies-tricky-for-employers-workers). japantoday.com. Japan Today. . Retrieved 28 September 2011. [101] D. R. Sandler and D. S. Wallach (April 2009). "Birds of a FETHR: Open, decentralized micropublishing" (http:/ / www. iptps. org/ papers-2009/ sandler. pdf) (PDF). Proc. of the 8th International Workshop on Peer-to-Peer Systems (IPTPS09). . [102] Michal Kryczka, Ruben Cuevas, Carmen Guerrero, Eiko Yoneki, Arturo Azcorra (April 2010). "A first step towards user assisted online social networks". Proc. of the 3rd Workshop on Social Network Systems (SNS'10). [103] Tianyin Xu, Yang Chen, Lei Jiao, Ben Y. Zhao, Pan Hui, and Xiaoming Fu (December 2011). "Scaling Microblogging Services with Divergent Traffic Demands" (http:/ / cseweb. ucsd. edu/ ~tixu/ papers/ middleware11. pdf) (PDF). Proc. of the ACM/IFIP/USENIX 12th International Middleware Conference (Middleware'11). . [104] "MySpace exposes sex predators" (http:/ / www. news. com. au/ heraldsun/ story/ 0,21985,,00. html), use of its content in the courtroom: Herald and Weekly Times (Australia) website. Retrieved on January 19, 2008. [105] "Getting booked by Facebook" (http:/ / www. jsonline. com/ story/ index. aspx?id=670380), courtesy of campus police: Milwaukee Journal Sentinel website. Retrieved on January 19, 2008. [106] "Police use Facebook to identify weapon carriers" (http:/ / www. journal-online. co. uk/ article/ 5410-police-use-facebook-to-identify-weapon-carriers) The Journal (Edinburgh) website. Retrieved on May 11, 2009 [107] "Government Agencies Establishing Presence on Social-Networking Sites" (http:/ / www. itbusinessedge. com/ topics/ reader. aspx?oss=37848). Itbusinessedge.com. . Retrieved 2011-03-13. [108] "OSTP Press Release Announcing Review (pdf, 50k)" (http:/ / www. nasa. gov/ pdf/ 358006main_OSTP Press Release. pdf) (PDF). . Retrieved 2011-03-13. [109] http:/ / Youngblackprofessionals. org [110] "Latest LinkedIn Facts" (http:/ / press. linkedin. com/ about). Press.linkedin.com. . Retrieved 2011-03-13. [111] "Terms of Joining YoungBlackProfessionals.org" (http:/ / www. youngblackprofessionals. org/ index. php?page=terms). . Retrieved 2011-12-14. [112] MySpace, Facebook Add Opportunity for Love, Trouble to Online Dating (http:/ / www. foxnews. com/ story/ 0,2933,396461,00. html), FoxNews.com website. [113] MySpace Adds a Security Monitor (http:/ / www. npr. org/ templates/ story/ story. php?storyId=5336688), NPR.com website. [114] Online Dating: Can Social Networks Cut In? (http:/ / www. internetnews. com/ ec-news/ article. php/ 3659911), internetnews.com website. [115] "Online Dating vs. Social Networking Which Will Emerge as Premier Matchmaker?" (http:/ / localtechwire. com/ business/ local_tech_wire/ opinion/ story/ 2449164/ ). localtechwire.com. . [116] Social networks vs. dating sites Commentary: Fragmenting may save online dating sites (http:/ / www. marketwatch. com/ news/ story/ story. aspx?guid={4640E6FF-17B8-40D5-901C-098EE74B03DD}), marketwatch.com website. [117] Seeking Love Around The Web (http:/ / www. forbes. com/ 2007/ 12/ 20/ online-dating-love-tech-personal-cx_wt_1221dating. html), Forbes.com website. [118] learncentral.org [119] Wall street journal blog article about Ven (http:/ / blogs. wsj. com/ economics/ 2009/ 09/ 09/ the-currency-revolution/ )

271

Social networking
[120] finextra.com (http:/ / www. finextra. com/ news/ fullstory. aspx?newsitemid=22475) [121] blog.americancarbonregistry.org (http:/ / blog. americancarbonregistry. org/ redd/ american-carbon-registry-offsets-retired-ven-carbon-transaction/ ) [122] hubculture.com (http:/ / www. hubculture. com/ groups/ 237/ news/ 486/ ) [123] "Social Networking: Now Professionally Ready" (http:/ / www. primarypsychiatry. com/ aspx/ articledetail. aspx?articleid=975). primarypsychiatry.com. . [124] Comprehensive listing of medical applications using social networking (http:/ / www. doseofdigital. com/ healthcare-pharma-social-media-wiki/ ) via Dose of Digital [125] "Auer, Matthew R. "The Policy Sciences of Social Media". Policy Studies Journal '''39''' (4): 709736" (http:/ / papers. ssrn. com/ sol3/ papers. cfm?abstract_id=1974080). Papers.ssrn.com. . Retrieved 24 April 2012. [126] Sutter, John D. (21 Feb 2011). "The faces of Egypt's 'Revolution 2.0'" (http:/ / www. cnn. com/ 2011/ TECH/ innovation/ 02/ 21/ egypt. internet. revolution/ index. html). CNN.com. . Retrieved 13 May 2011. [127] Anahita Project. "The Anahita Social Networking Engine" (http:/ / www. anahitapolis. com). anahitapolis.com. . Retrieved 2011-01-18. [128] The Appleseed Project. "The Appleseed Project - Open Source Social Networking" (http:/ / opensource. appleseedproject. org). Opensource.appleseedproject.org. . Retrieved 2011-03-13. [129] "Creating a free, open, and decentralized social networking platform" (http:/ / onesocialweb. org/ ). OneSocialWeb. . Retrieved 2011-03-13. [130] "ComScore: Google+ Grows Worldwide Users From 65 Million In October To 67 Million In November" (http:/ / techcrunch. com/ 2011/ 12/ 22/ googlesplus/ ?utm_source=feedburner& utm_medium=feed& utm_campaign=Feed:+ Techcrunch+ (TechCrunch)). December 22, 2011. . [131] Its a Social World: Social Networking Leads as Top Online Activity Globally, Accounting for 1 in Every 5 Online Minutes (http:/ / www. comscore. com/ Press_Events/ Press_Releases/ 2011/ 12/ Social_Networking_Leads_as_Top_Online_Activity_Globally), ComScore [132] [133] [134] [135] [136] [137] [138] http:/ / jcmc. indiana. edu/ vol13/ issue1/ boyd. ellison. html http:/ / www. firstmonday. org/ issues/ issue11_12/ boyd/ index. html http:/ / jcmc. indiana. edu/ vol12/ issue4/ ellison. html http:/ / books. google. com/ ?id=SP92NwAACAAJ http:/ / www. informaworld. com/ smpp/ ftinterface~content=a769651179~fulltext=713240930 http:/ / www. marcprensky. com/ writing/ Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1. pdf http:/ / firstmonday. org/

272

Further reading
Alemn, Ana M. Martnez; Wartman, Katherine Lynk, "Online social networking on campus: understanding what matters in student culture" (http://books.google.com/books?id=GH4KOM3MS-sC&printsec=frontcover), New York and London : Routledge, 1st edition, 2009. ISBN 0-415-99019-X Barham, Nick, Disconnected: Why our kids are turning their backs on everything we thought we knew, 1st ed., Ebury Press, 2004. ISBN 0-09-189586-3 Baron, Naomi S., Always on : language in an online and mobile world (http://books.google.com/ books?id=X8-gaJM6NUIC&printsec=frontcover), Oxford ; New York : Oxford University Press, 2008. ISBN 978-0-19-531305-5 Cockrell, Cathy, "Plumbing the mysterious practices of 'digital youth': In first public report from a 'seminal' study, UC Berkeley scholars shed light on kids' use of Web 2.0 tools" (http://www.berkeley.edu/news/media/ releases/2008/04/28_digitalyouth.shtml), UC Berkeley News, University of California, Berkeley, NewsCenter, 28 April 2008 Kelsey, Todd (2010), Social Networking Spaces: From Facebook to Twitter and Everything In Between (http:// books.google.ca/books?id=1EgTu8fFMJgC&lpg=PP1&ots=HUuksBAE9m&dq=Social Networking Spaces: From Facebook to Twitter and Everything In Between&pg=PP1#v=onepage&q&f=true), Springer-Verlag, ISBN978-1-4302-2596-6 Davis, Donald Carrington, "MySpace Isn't Your Space: Expanding the Fair Credit Reporting Act to Ensure Accountability and Fairness in Employer Searches of Online Social Networking Services" (http://www.law.ku. edu/publications/journal/pdf/v16n2/davis.pdf), 16 Kan. J.L. & Pub. Pol'y 237 (2007). Else, Liz; Turkle, Sherry. "Living online: I'll have to ask my friends" (http://web.mit.edu/sturkle/www/ pdfsforstwebpage/ST_Living Online.pdf), New Scientist, issue 2569, 20 September 2006. (interview)

Social networking Glaser, Mark, Your Guide to Social Networking Online (http://www.pbs.org/mediashift/2007/08/ digging_deeperyour_guide_to_so_1.html)," PBS MediaShift, August 2007 Powers, William, Hamlets Blackberry : a practical philosophy for building a good life in the digital age, 1st ed., New York : Harper, 2010. ISBN 978-0-06-168716-7 Video on the History of social networks by WikiLecture (http://wikilecture.org/Social_network_service) C. Infant Louis Richards , "Advanced Techniques to overcome privacy issues and SNS threats" (http:// rspublication.com/ijam/oct 11pdf/1.pdf) October, 2011

273

Remote access
Remote access may refer to: Connection to a data-processing system from a remote location, for example through a virtual private network Remote desktop software, refers to a software or an OS feature allowing applications to be run remotely on a server while being graphically displayed locally Terminal emulation - when used to interface with a remote system. May use standard tools like: Telnet, software used to remotely control a computer system ssh, secure shell often used with remote applications Activation of features of a business telephone system from outside the business's premises RemoteAccess, a DOS-based bulletin board system Remote Database Access, a protocol standard for database access

Collaborative software
Collaborative software or groupware is computer software designed to help people involved in a common task achieve goals. One of the earliest definitions of collaborative software is 'intentional group processes plus software to support them.'[1] The design intent of collaborative software is to transform the way documents and rich media are shared to enable more effective team collaboration. Collaboration, with respect to information technology, seems to have several definitions. Some are defensible but others are so broad they lose meaningful application. Understanding the differences in human interactions is necessary to ensure that appropriate technologies are employed to meet interaction needs. Collaboration requires individuals working together in a coordinated fashion, towards a common goal. Accomplishing the goal is the primary purpose for bringing the team together. Collaborative software helps facilitate action-oriented teams working together over geographic distances by providing tools that aid communication, collaboration and the process of problem solving. Additionally, collaborative software may support project management functions, such as task assignments, time-managing deadlines, and shared calendars. The artefacts, the tangible evidence of the problem solving process, and the final outcome of the collaborative effort, require documentation and may involve archiving project plans, deadlines and deliverables.

Collaborative software

274

Overview
Collaborative software is a broad concept that greatly overlaps with Computer-supported cooperative work (CSCW). Some authors argue they are equivalent. According to Carstensen and Schmidt (1999)[2] groupware is part of CSCW. The authors claim that CSCW, and thereby groupware addresses "how collaborative activities and their coordination can be supported by means of computer systems". Software products such as email, calendaring, text chat, wiki, and bookmarking belong to this category, whenever used for group work, whereas the more general term social software applies to systems used outside the workplace, for example, online dating services and social networking sites like Friendster, Twitter and Facebook. It has been suggested that Metcalfe's law the more people who use something, the more valuable it becomes applies to these types of software. The use of collaborative software in the workspace creates a collaborative working environment (CWE). A collaborative working environment supports people in both their individual and cooperative work thus giving birth to a new class of professionals, e-professionals, who can work together irrespective of their geographical location. Finally collaborative software relates to the notion of collaborative work systems which are conceived as any form of human organization that emerges any time that collaboration takes place, whether it is formal or informal, intentional or unintentional.[3] Whereas the groupware or collaborative software pertains to the technological elements of computer supported cooperative work, collaborative work systems become a useful analytical tool to understand the behavioral and organizational variables that are associated to the broader concept of CSCW.[4]

Origins
Doug Engelbart first envisioned collaborative computing in 1951 Doug Engelbart - Father of Groupware [5], documented his vision in 1962,[6] with working prototypes in full operational use by his research team by the mid 1960s,[7] and held the first public demonstration of his work in 1968 in what is now referred to as "The Mother of All Demos."[8] The following year, Engelbart's lab was hooked into the ARPANET, the first computer network, enabling them to extend services to a broader userbase. See also Intelligence Amplification Section 4: Douglas Engelbart, ARPANET Section on ARPANET Deployed, and the Doug Engelbart Archive Collection [9]. Online collaborative gaming software began between early networked computer users. In 1975 by Will Crowther created Colossal Cave Adventure on a DEC PDP-10 computer. As internet connections grew, so did the numbers of users and multi-user games. In 1978 Roy Trubshaw, a student at Essex University in the UK, created the game MUD (Multi-User Dungeon). A number of other MUDs were created, but remained a computer science novelty until the late 1980s, when personal computers with dial-up modems began to be more common in homes, largely through the use of multi-line Bulletin Board Systems and online service providers. Parallel to development of MUDs were applications for online chat, video sharing and voice over IP. These would be essential for further development. Studies at MITRE showed the value of voice and text chat, and sharing pictures for shared understanding. The US Government began using truly collaborative applications in the early 1990s.[10] One of the first robust applications was the Navy's Common Operational Modeling, Planning and Simulation Strategy (COMPASS).[11] The COMPASS system allowed up to 6 users created point-to-point connections with one another; the collaborative session only remained while at least one user stayed active, and would have to be recreated if all six logged out. MITRE improved on that model by hosting the collaborative session on a server that each user logged into. Called the Collaborative Virtual Workstation (CVW), this allowed the session to be set up in a virtual file cabinet and virtual rooms, and left as a persistent session that could be joined later.[12] In 1996, Pavel Curtis, who had built MUDs at PARC, created PlaceWare, a server that simulated a one-to-many auditorium, with side chat between "seat-mates", and the ability to invite a limited number of audience members to speak. In 1997, engineers at GTE used the PlaceWare engine in a commercial version of MITRE's CVW, calling it InfoWorkSpace (IWS). In 1998, IWS was chosen as the military standard for the standardized Air Operations Center.[13] The IWS product was sold to General Dynamics and then later to Ezenia.[14]

Collaborative software

275

Philosophical underpinnings
Technology has long been used to bring people together. However, as distance increases, rules and protocols need to be implemented. One seminal book on the process of working together from a distance is Virtual Teams by Jessica Lipnack and Jeffrey Stamps.[15]

Groupware
Collaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987)[16] wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work." Even further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, intentional group processes plus software to support them. Later in their article they went on to explain groupware as computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.[1] In the early 1990s the first groupware commercial products began delivering up to their promises, and big companies such as Boeing and IBM started using electronic meeting systems to leverage key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the Internet was still in its infancy. Kirkpatrick and Losee (1992)[17] wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." As collaborative software evolves and migrates into the Internet itself, it contributes to the development of the so-called Web 2.0 bringing a host of collaborative features that were originally conceived for within the corporate network. These include functionalities such as document sharing (including group editing), group calendar and instant messaging, web conferencing, among others.

Groupware and organizations


The study of computer-supported collaboration includes the study of collaborative software and the social phenomena associated with it. There is a wealth of research produced about the impact of groupware in organizations and related social and psychological issues since the early eighties. Since 1984 the great majority of this work has been organized and communicated within the boundaries of a specialized scientific event - the Computer Supported Cooperative Work conferences - which are held by the Association for Computing Machinery Special Interest Group in Computer-Human Interaction biannually. The next CSCW conference would be held in Seattle, Washington in 2012 [18] and the program and the complete conference proceedings from the last conference in 2010 can be consulted here [19].

Collaborative software

276

Design and implementation issues


The complexity of groupware development is still an issue. One reason for this is the socio-technical dimension of groupware. Groupware designers do not only have to address technical issues (as in traditional software development) but also consider the social group processes that should be supported with the groupware application. Some examples for issues in groupware development are: Persistence is needed in some sessions. Chat and voice communications are routinely non-persistent and evaporate at the end of the session. Virtual room and online file cabinets can persist for years. The designer of the collaborative space needs to consider the information duration needs and implement accordingly. Authentication has always been a problem with groupware. When connections are made point-to-point, or when log-in registration is enforced, it's clear who is engaged in the session. However, audio and unmoderated sessions carry the risk of unannounced 'lurkers' who observe but do not announce themselves or contribute.[20][21] Until recently, bandwidth issues at fixed location limited full use of the tools. These are exacerbated with mobile devices. Multiple input and output streams bring concurrency issues into the groupware applications. Motivational issues are important, especially in settings where no pre-defined group process was in place. Closely related to the motivation aspect is the question of reciprocity. Ellis and others [22] have shown that the distribution of efforts and benefits has to be carefully balanced in order to ensure that all required group members really participate. One approach for addressing these issues is the use of design patterns for groupware design.[23] The patterns identify recurring groupware design issues and discuss design choices in a way that all stakeholders can participate in the groupware development process.

Groupware and levels of collaboration


Groupware can be divided into three categories depending on the level of collaboration:[24] 1. Communication can be thought of as unstructured interchange of information. A phone call or an IM Chat discussion are examples of this. 2. Conferencing (or collaboration level, as it is called in the academic papers that discuss these levels) refers to interactive work toward a shared goal. Brainstorming or voting are examples of this. 3. Co-ordination refers to complex interdependent work toward a shared goal. A good metaphor for understanding this is to think about a sports team; everyone has to contribute the right play at the right time as well as adjust their play to the unfolding situation - but everyone is doing something different - in order for the team to win. That is complex interdependent work toward a shared goal: collaborative management.

Electronic communication tools


Electronic communication tools send messages, files, data, or documents between people and hence facilitate the sharing of information. Examples include: synchronous conferencing asynchronous conferencing e-mail faxing voice mail Wikis Web publishing

revision control

Collaborative software

277

Electronic conferencing tools


Electronic conferencing tools facilitate the sharing of information, but in a more interactive way. Examples include: Internet forums (also known as message boards or discussion boards) a virtual discussion platform to facilitate and manage online text messages Online chat a virtual discussion platform to facilitate and manage real-time text messages Instant Messaging Telephony telephones allow users to interact Videoconferencing networked PCs share video and audio signals Data conferencing networked PCs share a common whiteboard that each user can modify Application sharing users can access a shared document or application from their respective computers simultaneously in real time Electronic meeting systems (EMS) originally these were described as "electronic meeting systems," and they were built into meeting rooms. These special purpose rooms usually contained video projectors interlinked with numerous PCs; however, electronic meeting systems have evolved into web-based, any time, any place systems that will accommodate "distributed" meeting participants who may be dispersed in several locations.

Collaborative management (coordination) tools


Collaborative management tools facilitate and manage group activities. Examples include: electronic calendars (also called time management software) schedule events and automatically notify and remind group members project management systems schedule, track, and chart the steps in a project as it is being completed online proofing share, review, approve, and reject web proofs, artwork, photos, or videos between designers, customers, and clients. workflow systems collaborative management of tasks and documents within a knowledge-based business process knowledge management systems collect, organize, manage, and share various forms of information enterprise bookmarking collaborative bookmarking engine to tag, organize, share, and search enterprise data prediction markets let a group of people predict together the outcome of future events extranet systems (sometimes also known as 'project extranets') collect, organize, manage and share information associated with the delivery of a project (e.g.: the construction of a building) social software systems organize social relations of groups online spreadsheets collaborate and share structured data and information Gathering applications This functionality may be included in some wikis and blogs, e.g. Wetpaint. Primarily includes: surveys project management feedback time tracking.

Wikis Either stand-alone (such as MediaWiki), part of a suite (such as TikiWiki) or web-based such as Wetpaint. A Wiki might include: workflow management blogs image and file galleries chat

Collaborative software calendaring surveys

278

Collaborative software and human interaction


The design intent of collaborative software (groupware) is to transform the way documents and rich media are shared in order to enable more effective team collaboration. Collaboration, with respect to information technology, seems to have several definitions. Some are defensible but others are so broad they lose any meaningful application. Understanding the differences in human interactions is necessary to ensure the appropriate technologies are employed to meet interaction needs. There are three primary ways in which humans interact: conversations, transactions, and collaborations.[25] Conversational interaction is an exchange of information between two or more participants where the primary purpose of the interaction is discovery or relationship building. There is no central entity around which the interaction revolves but is a free exchange of information with no defined constraints. Communication technology such as telephones, instant messaging, and e-mail are generally sufficient for conversational interactions. Transactional interaction involves the exchange of transaction entities where a major function of the transaction entity is to alter the relationship between participants. The transaction entity is in a relatively stable form and constrains or defines the new relationship. One participant exchanges money for goods and becomes a customer. Transactional interactions are most effectively handled by transactional systems that manage state and commit records for persistent storage. In collaborative interactions the main function of the participants' relationship is to alter a collaboration entity (i.e., the converse of transactional). The collaboration entity is in a relatively unstable form. Examples include the development of an idea, the creation of a design, the achievement of a shared goal. Therefore, real collaboration technologies deliver the functionality for many participants to augment a common deliverable. Record or document management, threaded discussions, audit history, and other mechanisms designed to capture the efforts of many into a managed content environment are typical of collaboration technologies. Collaboration in Education- two or more co-equal individuals voluntarily bring their knowledge and experiences together by interacting toward a common goal in the best interest of students' needs for the betterment of their educational success. Collaboration requires individuals working together in a coordinated fashion, towards a common goal. Accomplishing the goal is the primary purpose for bringing the team together. Collaborative software helps facilitate the action-oriented team working together over geographic distances by providing tools that help communication, collaboration and the process of problem solving by providing the team with a common means for communicating ideas and brainstorming. Additionally, collaborative software may support project management functions, such as task assignments, time-management with deadlines and shared calendars. The artifacts, the tangible evidence of the problem solving process, including the final outcome of the collaborative effort, typically require documentation and archiving of the process itself, and may involve archiving project plans, deadlines and deliverables. Collaborative software should support the individuals that make up the team and the interactions between them during the group decision making process. Many of today's teams are composed of members from around the globe, with some members using their second or third language in communicating with the group. This situation provides cultural as well as linguistic challenges for any software that supports the collaborative effort. The software may also support team membership, roles and responsibilities. Additionally, collaborative support systems may offer the ability to support ancillary systems, such as budgets and physical resources. Brainstorming is considered to be a tenet of collaboration, with the rapid exchange of ideas facilitating the group decision making process. Collaborative software provides areas that support multi-user editing, such as virtual whiteboards and chat or other forms of communication. Better solutions record the process and provide revision

Collaborative software history. An emerging category of computer software, a collaboration platform is a unified electronic platform that supports synchronous and asynchronous communication through a variety of devices and channels. An extension of groupware is collaborative media, software that allows several concurrent users to create and manage information in a website. Collaborative media models include wiki (Comparison of wiki software) and Slashdot models. Some sites with publicly accessible content based on collaborative software are: WikiWikiWeb, Wikipedia and Everything2. By method used we can divide them into: Web-based collaborative tools Software collaborative tools Along with these, already traditional, methods recent expansion of corporate use of Second Life and other virtual worlds led to development of a newer generation of software that takes advantage of a 3D data presentation. Some of this software (3D Topicscape) works independently from virtual worlds and simply uses 3D to support user "in concept creation, planning, organization, development and actualization". Other [26] designed specifically to assist in collaboration when using virtual worlds as a business platform, while yet another type of software, Collaborative Knowledge Management (cKM) [27], bridges the gap and can be used simultaneously in Second Life and on the web. By area served we can divide collaborative software into: Knowledge management tools Knowledge creation tools Information sharing tools Collaborative project management tools

279

Collaborative project management tools


Collaborative project management tools (CPMT) are very similar to collaborative management tools (CMT) except that CMT may only facilitate and manage a certain group activities for a part of a bigger project or task, while CPMT covers all detailed aspects of collaboration activities and management of the overall project and its related knowledge areas. Another major difference is that CMT may include social software, Document Management System (DMS) and Unified Communication (UC) while CPMT mostly considers business or corporate related goals with some kind of social boundaries most commonly used for project management.

Background
During the mid-1990s project management started to evolve into collaborative project management; this was when the process in which a project's inputs and outputs were carried out started to change with the evolution of the internet. Since the geographical boundaries broadened the development teams increasingly became more remote changing the dynamics of a project team thus changing the way a project was managed. Former chairman of General Electric, Jack Welch, believed that you could not be successful if you went it alone in a global economy. Therefore Welch became a driving force behind not only collaboration between organizations, but also collaborative project management.

Classification
Collaborative project management tools (CPMT) Collaborative management tools (CMT)

Collaborative software

280

CPMT facilitate and manage social or group project based activities. In addition to most CPMT examples, CMT also includes: Examples include: Electronic calendars Project management systems Resource Management Workflow systems Knowledge management Prediction markets Extranet systems Social software Online spreadsheets Online artwork proofing, feedback, review and approval tool HR and equipment management Time and cost management Online chat Instant messaging Telephony Videoconferencing Web conferencing Data conferencing Application sharing Electronic meeting systems (EMS) Synchronous conferencing E-mail Faxing voice mail Wikis Web publishing Revision control Charting Document versioning Document retention Document sharing Document repository Evaluation and survey

Dimensions
Different frameworks could be established based on a project needs and requirements in order to find the best software. But the best framework is the one in which the characteristics are so well defined that they cover all the aspects of collaboration activities and management of the overall project. The challenge in determining which CPM software to use is having a good understanding of the requirements and tools needed for project development. There are many dynamics that make project management challenging (coordination, collaboration, sharing of knowledge and effectiveness of pm's to facilitate the process). Choosing the right CPM software is essential to complementing these issues. According to a survey conducted in 2008 to find out what project managers' expectations and uses of project management software are, the features most important to project managers with project management software were:

Dimensions diagram

Ability to plan using and sequence activities using CPM/PDM/PERT or Gantt Chart method, Produce project master schedules based on project/task/work breakdown structures, with subordinate details, Critical path calculation.

Collaborative software

281

Dimensions Resources Requirements Support Requirements Human Equipment Time Cost

Descriptions / Examples

System Requirements

Platform: The operating system that the system can perform on (example Windows, Mac, Linux). Platform type single and multiple. Hardware: physical requirements such as hard drive space and amount of memory. Installation/access: How and where the software is installed. Types of installations stand alone, server based, web portal. Email 24/7 or restricted schedules Online or web help Built-in Help i.e. MS Office On location assistance Training on-site/off-site Group Size: The number of users that software supports Email list Revision Control Charting Document versioning Document retention Document sharing Document repository

Collaboration Requirements

Collaboration software and voting methods


Some collaboration software allows users to vote, rate, and rank choices, often for the purpose of extracting the collective intelligence of the participants. The votes, ratings, and rankings can be used in various ways such as: Producing an average rating, such as 4 out of 5 stars. Calculating a popularity ranking, such as a "top 10" list. Guiding the creation and organization of documents, such as in Wikipedia where voting helps to guide the creation of new pages. Making a recommendation that may assist in making a decision. In the case of decision making, Condorcet voting can combine multiple perspectives in a way that reduces intransitivity. Additional uses of collaborative voting, such as voting to determine the sequence of sections in a Wikipedia article, remain unexplored. It's worth noting that no matter what voting method is implemented, Arrow's Impossibility Theorem guarantees that an ideal voting system can never be attained if there are three or more alternatives that are voted upon. In addition to allowing participants to rank pre-existing choices, some collaboration software allows participants to add new choices to the list of choices being ranked.[28] Voting in collaboration software is related to recommendation systems that generate appreciated recommendations based on ratings or rankings collected from many people.

Collaborative software

282

References
[1] Johnson-Lenz, Peter. "Rhythms, Boundaries, and Containers:" (http:/ / nexus. awakentech. com:8080/ at/ awaken1. nsf/ UNIDs/ CFB70C1957A686E98825654000699E1B?OpenDocument). Awakening Technology. . Retrieved 30 April 1990. [2] Carstensen, P.H.; Schmidt, K. (1999). Computer supported cooperative work: new challenges to systems design. http:/ / citeseer. ist. psu. edu/ carstensen99computer. html. Retrieved 2007-08-03 [3] Beyerlein, M; Freedman, S.; McGee, G.; Moran, L. (2002). Beyond Teams: Building the Collaborative Organization. The Collaborative Work Systems series, Wiley. [4] Wilson, P. (1991). Computer Supported Cooperative Work: An Introduction. Kluwer Academic Pub. [5] http:/ / www. dougengelbart. org/ firsts/ groupware. html [6] Augmenting Human Intellect: A Conceptual Framework (http:/ / www. dougengelbart. org/ pubs/ augment-3906. html), Douglas C. Engelbart, 1962] [7] A Research Center for Augmenting Human Intellect (http:/ / www. dougengelbart. org/ pubs/ augment-3954. html), Douglas C. Engelbart and William K. English, 1968. [8] 1968 Demo Overview and Links to Video (http:/ / www. dougengelbart. org/ firsts/ dougs-1968-demo. html) [9] http:/ / dougengelbart. org [10] http:/ / portal. acm. org/ citation. cfm?id=99362& dl=GUIDE& coll=GUIDE& CFID=107391064& CFTOKEN=53017578 [11] https:/ / www. cwid. js. mil/ public/ CWIDFctShtSuccesses21Mar08. doc [12] http:/ / www. inf. unisinos. br/ ~cazella/ dss/ aula7/ p51-maybury. pdf [13] http:/ / www. ezenia. com/ news/ infoworkspace-saves-lives-in-iraq/ [14] http:/ / www. ezenia. com/ products/ products-infoworkspace/ [15] http:/ / www. netage. com/ virtualteams/ index. html [16] Richman, Louis, S; Slovak, Julianne; (1987, June 8) SOFTWARE CATCHES THE TEAM SPIRIT New computer programs may soon change the way groups of people work together -- and start delivering the long-awaited payoff from office automation.fouttounehttp://money.cnn.com/magazines/fortune/fortune_archive/1987/06/08/69109/index.htm [17] Kirkpatrick, D.; Losee, S. (1992, March 23) HERE COMES THE PAYOFF FROM PCs New network software lets brainstormers around a table all talk at once on their keyboards. The result: measurable productivity gains from desktop computing. http:/ / money. cnn. com/ magazines/ fortune/ fortune_archive/ 1992/ 03/ 23/ 76204/ index. htm [18] http:/ / www. cscw2012. org/ [19] http:/ / www. cscw2010. org/ [20] http:/ / www. mitre. org/ news/ the_edge/ june_98/ transfer. html [21] http:/ / www. mitre. org/ news/ the_edge/ june_98/ second. html [22] Clarence A. Ellis, Simon J. Gibbs, and Gail Rein. 1991. Groupware: some issues and experiences. Commun. ACM 34, 1 (January 1991), 39-58. DOI=10.1145/99977.99987 http:/ / doi. acm. org/ 10. 1145/ 99977. 99987 [23] Till Schmmer and Stephan Lukosch. 2007. Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series). John Wiley & Sons. [24] "Groupware - Communication, Collaboration and Coordination" (http:/ / www. intranetjournal. com/ faq/ lotusbible. html). Lotus Development Corporation. 1995. . [25] Collaboration Made Easy (http:/ / www. pinnadyne. com/ index. php?option=com_content& view=article& id=74& Itemid=80) [26] http:/ / www. theseventhsun. com/ 1107_mindMap. htm [27] http:/ / www. ahg. com/ Second_Life/ knowledge_management/ Enterprise_Knowledge_Management_and_Collaboration_Solution. htm [28] Software negotiation tool (http:/ / www. negotiationtool. com)

Lockwood, A. (2008). The Project Manager's Perspective on Project Management Software Packages. Avignon, France. (http://www.pmi.org/PDF/Lockwood - PMI Survey Report.pdf) Retrieved February 24, 2009. Pedersen, A.A. (2008). Collaborative Project Management. (http://www.databasedesign-resource.com/ collaborative-project-management.html) Retrieved February 25, 2009. Pinnadyne, Collaboration Made Easy. (http://www.pinnadyne.com/index.php?option=com_content& view=article&id=74&Itemid=80) Retrieved November 15, 2009. Romano, N.C., Jr., Nunamaker, J.F., Jr., Fang, C., & Briggs, R.O. (2003). A Collaborative Project Management Architecture.[abstract] Retrieved February 25, 2009. System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on Volume, Issue, 6-9 Jan. 2003 Page(s): 12 pp From http://ieeexplore.ieee. org/Xplore/defdeny.jsp?url=/stamp/stamp.jsp?tp=x&tp=x&arnumber=1173655&isnumber=26341& code=21&code=21# M.Katerine (kit) Brown, Brenda Huetture, and Char James-Tanny (2007), Managing Virtual Teams, Worldware Publishing, Plano.

Collaborative software

283

External links
Information and Collaboration Technologies (see Chapter 5): Managing Collective Intelligence, Toward a New Corporate Governance (http://www.axiopole.com/pdf/Managing_collective_intelligence.pdf) Electronic Information Exchange System (EIES) Legacy (http://eies.net/wiki/index.php/EIES Legacy)

Internet phone
Voice over IP (VoIP, or voice over Internet Protocol) commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone. Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the Internet, rather than the public switched telephone network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the original voice stream.[1] Even though IP telephony and VoIP are used interchangeably, IP telephony refers to all use of IP protocols for voice communication by digital telephony systems, while VoIP is one technology used by IP telephony to transport phone calls.[2] Early providers of voice over IP services offered business models (and technical solutions) that mirrored the architecture of the legacy telephone network. Second generation providers, such as Skype have built closed networks for private user bases, offering the benefit of free calls and convenience, while denying their users the ability to call out to other networks. This has severely limited the ability of users to mix-and-match third-party hardware and software. Third generation providers, such as Google Talk have adopted[3] the concept of Federated VoIP which is a complete departure from the architecture of the legacy networks. These solutions typically allow arbitrary and dynamic interconnection between any two domains on the Internet whenever a user wishes to place a call. VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The choice of codec varies between different implementations of VoIP depending on application requirements and network bandwidth; some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs. Some popular codecs include u-law and a-law versions of G.711, G.722 which is a high-fidelity codec marketed as HD Voice by Polycom, a popular open source voice codec known as iLBC, a codec that only uses 8kbit/s each way called G.729, and many others. VoIP is available on many smartphones and Internet devices so that users of portable devices that are not phones, may place calls or send SMS text messages over 3G or Wi-Fi.[4]

Internet phone

284

Protocols
Voice over IP has been implemented in various ways using both proprietary and open protocols and standards. Examples of the network protocols used to implement VoIP include: H.323 Media Gateway Control Protocol (MGCP) Session Initiation Protocol (SIP) Real-time Transport Protocol (RTP) Session Description Protocol (SDP) Inter-Asterisk eXchange (IAX) Jingle XMPP VoIP extensions

The H.323 protocol was one of the first VoIP protocols that found widespread implementation for long-distance traffic, as well as local area network services. However, since the development of newer, less complex protocols such as MGCP and SIP, H.323 deployments are increasingly limited to carrying existing long-haul network traffic. In particular, the Session Initiation Protocol (SIP) has gained widespread VoIP market penetration. A notable proprietary implementation is the Skype protocol, which is in part based on the principles of peer-to-peer (P2P) networking.

Adoption
Consumer market
A major development that started in 2004 was the introduction of mass-market VoIP services that utilize existing broadband Internet access, by which subscribers place and receive telephone calls in much the same manner as they would via the public switched telephone network (PSTN). Full-service VoIP phone companies provide inbound and outbound service with Direct Inbound Dialing. Many offer unlimited domestic calling for a flat monthly subscription fee. This sometimes includes international calls to certain countries. Phone calls between subscribers of the same provider are usually free when flat-fee service is not available A VoIP phone is necessary to connect to a VoIP service provider. This can be implemented in several ways: Dedicated VoIP phones connect directly to the IP network using technologies such as wired Ethernet or wireless Wi-Fi. They are typically designed in the style of traditional digital business telephones.
Example of residential network including VoIP

An analog telephone adapter is a device that connects to the network and implements the electronics and firmware to operate a conventional analog telephone attached through a modular phone jack. Some residential Internet gateways and cablemodems have this function built in. A softphone is application software installed on a networked computer that is equipped with a microphone and speaker, or headset. The application typically presents a dial pad and display field to the user to operate the application by mouse clicks or keyboard input.

Internet phone

285

PSTN and mobile network providers


It is becoming increasingly common for telecommunications providers to use VoIP telephony over dedicated and public IP networks to connect switching centres and to interconnect with other telephony network providers; this is often referred to as "IP backhaul".[5][6] Smartphones and Wi-Fi enabled mobile phones may have SIP clients built into the firmware or available as an application download.

Corporate use
Because of the bandwidth efficiency and low costs that VoIP technology can provide, businesses are migrating from traditional copper-wire telephone systems to VoIP systems to reduce their monthly phone costs. In 2008, 80% of all new PBX lines installed internationally were VoIP.[7] VoIP solutions aimed at businesses have evolved into unified communications services that treat all communicationsphone calls, faxes, voice mail, e-mail, Web conferences and moreas discrete units that can all be delivered via any means and to any handset, including cellphones. Two kinds of competitors are competing in this space: one set is focused on VoIP for medium to large enterprises, while another is targeting the small-to-medium business (SMB) market.[8] VoIP allows both voice and data communications to be run over a single network, which can significantly reduce infrastructure costs.[9] The prices of extensions on VoIP are lower than for PBX and key systems. VoIP switches may run on commodity hardware, such as PCs or Linux systems. Rather than closed architectures, these devices rely on standard interfaces.[9] VoIP devices have simple, intuitive user interfaces, so users can often make simple system configuration changes. Dual-mode phones enable users to continue their conversations as they move between an outside cellular service and an internal Wi-Fi network, so that it is no longer necessary to carry both a desktop phone and a cellphone. Maintenance becomes simpler as there are fewer devices to oversee.[9] Skype, which originally marketed itself as a service among friends, has begun to cater to businesses, providing free-of-charge connections between any users on the Skype network and connecting to and from ordinary PSTN telephones for a charge.[10] In the United States the Social Security Administration (SSA) is converting its field offices of 63,000 workers from traditional phone installations to a VoIP infrastructure carried over its existing data network.[11][12]

Advantages
There are several advantages to using voice over IP. The biggest single advantage VoIP has over standard telephone systems is cost. In addition, international calls using VoIP are usually very inexpensive. One other advantage, which will become much more pronounced as VoIP use climbs, is that calls between VoIP users are usually free. Using services such as TrueVoIP, subscribers can call one another at no cost to either party.[13]

Operational cost
VoIP can be a benefit for reducing communication and infrastructure costs. Examples include: Routing phone calls over existing data networks to avoid the need for separate voice and data networks.[14] The ability to transmit more than one telephone call over a single broadband connection. Secure calls using standardized protocols (such as Secure Real-time Transport Protocol). Most of the difficulties of creating a secure telephone connection over traditional phone lines, such as digitizing and digital transmission, are already in place with VoIP. It is only necessary to encrypt and authenticate the existing data stream.

Internet phone

286

Challenges
Quality of service
Communication on the IP network is inherently less reliable in contrast to the circuit-switched public telephone network, as it does not provide a network-based mechanism to ensure that data packets are not lost, and are delivered in sequential order. It is a best-effort network without fundamental Quality of Service (QoS) guarantees. Therefore, VoIP implementations may face problems mitigating latency and jitter.[15][16] By default, network routers handle traffic on a first-come, first-served basis. Network routers on high volume traffic links may introduce latency that exceeds permissible thresholds for VoIP. Fixed delays cannot be controlled, as they are caused by the physical distance the packets travel; however, latency can be minimized by marking voice packets as being delay-sensitive with methods such as DiffServ.[15] A VoIP packet usually has to wait for the current packet to finish transmission. Although it is possible to preempt (abort) a less important packet in mid-transmission, this is not commonly done, especially on high-speed links where transmission times are short even for maximum-sized packets.[17] An alternative to preemption on slower links, such as dialup and digital subscriber line (DSL), is to reduce the maximum transmission time by reducing the maximum transmission unit. But every packet must contain protocol headers, so this increases relative header overhead on every link traversed, not just the bottleneck (usually Internet access) link.[17] DSL modems provide Ethernet (or Ethernet over USB) connections to local equipment, but inside they are actually Asynchronous Transfer Mode (ATM) modems. They use ATM Adaptation Layer 5 (AAL5) to segment each Ethernet packet into a series of 53-byte ATM cells for transmission and reassemble them back into Ethernet packets at the receiver. A virtual circuit identifier (VCI) is part of the 5-byte header on every ATM cell, so the transmitter can multiplex the active virtual circuits (VCs) in any arbitrary order. Cells from the same VC are always sent sequentially. However, the great majority of DSL providers use only one VC for each customer, even those with bundled VoIP service. Every Ethernet packet must be completely transmitted before another can begin. If a second VC were established, given high priority and reserved for VoIP, then a low priority data packet could be suspended in mid-transmission and a VoIP packet sent right away on the high priority VC. Then the link would pick up the low priority VC where it left off. Because ATM links are multiplexed on a cell-by-cell basis, a high priority packet would have to wait at most 53 byte times to begin transmission. There would be no need to reduce the interface MTU and accept the resulting increase in higher layer protocol overhead, and no need to abort a low priority packet and resend it later. ATM has substantial header overhead: 5/53 = 9.4%, roughly twice the total header overhead of a 1500 byte Ethernet packet. This "ATM tax" is incurred by every DSL user whether or not he takes advantage of multiple virtual circuits-and few can.[15] ATM's potential for latency reduction is greatest on slow links, because worst-case latency decreases with increasing link speed. A full-size (1500 byte) Ethernet frame takes 94ms to transmit at 128kbit/s but only 8ms at 1.5Mbit/s. If this is the bottleneck link, this latency is probably small enough to ensure good VoIP performance without MTU reductions or multiple ATM VCs. The latest generations of DSL, VDSL and VDSL2, carry Ethernet without intermediate ATM/AAL5 layers, and they generally support IEEE 802.1p priority tagging so that VoIP can be queued ahead of less time-critical traffic.[15] Voice, and all other data, travels in packets over IP networks with fixed maximum capacity. This system may be more prone to congestion and DoS attacks[18] than traditional circuit switched systems; a circuit switched system of insufficient capacity will refuse new connections while carrying the remainder without impairment, while the quality of real-time data such as telephone conversations on packet-switched networks degrades dramatically.[15]

Internet phone Fixed delays cannot be controlled as they are caused by the physical distance the packets travel. They are especially problematic when satellite circuits are involved because of the long distance to a geostationary satellite and back; delays of 400600ms are typical. When the load on a link grows so quickly that its switches experience queue overflows, congestion results and data packets are lost. This signals a transport protocol like TCP to reduce its transmission rate to alleviate the congestion. But VoIP usually uses UDP not TCP because recovering from congestion through retransmission usually entails too much latency.[15] So QoS mechanisms can avoid the undesirable loss of VoIP packets by immediately transmitting them ahead of any queued bulk traffic on the same link, even when that bulk traffic queue is overflowing. The receiver must resequence IP packets that arrive out of order and recover gracefully when packets arrive too late or not at all. Jitter results from the rapid and random (i.e., unpredictable) changes in queue lengths along a given Internet path due to competition from other users for the same transmission links. VoIP receivers counter jitter by storing incoming packets briefly in a "de-jitter" or "playout" buffer, deliberately increasing latency to improve the chance that each packet will be on hand when it is time for the voice engine to play it. The added delay is thus a compromise between excessive latency and excessive dropout, i.e., momentary audio interruptions. Although jitter is a random variable, it is the sum of several other random variables that are at least somewhat independent: the individual queuing delays of the routers along the Internet path in question. Thus according to the central limit theorem, we can model jitter as a gaussian random variable. This suggests continually estimating the mean delay and its standard deviation and setting the playout delay so that only packets delayed more than several standard deviations above the mean will arrive too late to be useful. In practice, however, the variance in latency of many Internet paths is dominated by a small number (often one) of relatively slow and congested "bottleneck" links. Most Internet backbone links are now so fast (e.g. 10Gbit/s) that their delays are dominated by the transmission medium (e.g., optical fiber) and the routers driving them do not have enough buffering for queuing delays to be significant. It has been suggested to rely on the packetized nature of media in VoIP communications and transmit the stream of packets from the source phone to the destination phone simultaneously across different routes (multi-path routing).[19] In such a way, temporary failures have less impact on the communication quality. In capillary routing it has been suggested to use at the packet level Fountain codes or particularly raptor codes for transmitting extra redundant packets making the communication more reliable. A number of protocols have been defined to support the reporting of quality of service (QoS) and quality of experience (QoE) for VoIP calls. These include RTCP Extended Report (RFC 3611), SIP RTCP Summary Reports, H.460.9 Annex B (for H.323), H.248.30 and MGCP extensions. The RFC3611 VoIP Metrics block is generated by an IP phone or gateway during a live call and contains information on packet loss rate, packet discard rate (because of jitter), packet loss/discard burst metrics (burst length/density, gap length/density), network delay, end system delay, signal / noise / echo level, Mean Opinion Scores (MOS) and R factors and configuration information related to the jitter buffer. RFC3611 VoIP metrics reports are exchanged between IP endpoints on an occasional basis during a call, and an end of call message sent via SIP RTCP Summary Report or one of the other signaling protocol extensions. RFC3611 VoIP metrics reports are intended to support real time feedback related to QoS problems, the exchange of information between the endpoints for improved call quality calculation and a variety of other applications.

287

Internet phone Layer-2 quality of service A number of protocols that deal with the data link layer and physical layer include quality-of-service mechanisms that can be used to ensure that applications like VoIP work well even in congested scenarios. Some examples include: IEEE 802.11e is an approved amendment to the IEEE 802.11 standard that defines a set of quality-of-service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as voice over wireless IP. IEEE 802.1p defines 8 different classes of service (including one dedicated to voice) for traffic on layer-2 wired Ethernet. The ITU-T G.hn standard, which provides a way to create a high-speed (up to 1 gigabit per second) Local area network using existing home wiring (power lines, phone lines and coaxial cables). G.hn provides QoS by means of "Contention-Free Transmission Opportunities" (CFTXOPs) which are allocated to flows (such as a VoIP call) which require QoS and which have negotiated a "contract" with the network controllers.

288

Susceptibility to power failure


Telephones for traditional residential analog service are usually connected directly to telephone company phone lines which provide direct current to power most basic analog handsets independently of locally available power. IP Phones and VoIP telephone adapters connect to routers or cable modems which typically depend on the availability of mains electricity or locally generated power.[20] Some VoIP service providers use customer premises equipment (e.g., cablemodems) with battery-backed power supplies to assure uninterrupted service for up to several hours in case of local power failures. Such battery-backed devices typically are designed for use with analog handsets. Some VoIP service providers implement services to route calls to other telephone services of the subscriber, such a cellular phone, in the event that the customer's network device is inaccessible to terminate the call. The susceptibility of phone service to power failures is a common problem even with traditional analog service in areas where many customers purchase modern telephone units that operate with wireless handsets to a base station, or that have other modern phone features, such as built-in voicemail or phone book features.

Emergency calls
The nature of IP makes it difficult to locate network users geographically. Emergency calls, therefore, cannot easily be routed to a nearby call center. Sometimes, VoIP systems may route emergency calls to a non-emergency phone line at the intended department; in the United States, at least one major police department has strongly objected to this practice as potentially endangering the public.[21][22] A fixed line phone has a direct relationship between a telephone number and a physical location. If an emergency call comes from that number, then the physical location is known. In the IP world, it is not so simple. A broadband provider may know the location where the wires terminate, but this does not necessarily allow the mapping of an IP address to that location. IP addresses are often dynamically assigned, so the ISP may allocate an address for online access, or at the time a broadband router is engaged. The ISP recognizes individual IP addresses, but does not necessarily know to which physical location it corresponds. The broadband service provider knows the physical location, but is not necessarily tracking the IP addresses in use.[22] There are more complications since IP allows a great deal of mobility. For example, a broadband connection can be used to dial a virtual private network that is employer-owned. When this is done, the IP address being used will belong to the range of the employer, rather than the address of the ISP, so this could be many kilometres away or even in another country. To provide another example: if mobile data is used, e.g., a 3G mobile handset or USB wireless broadband adapter, then the IP address has no relationship with any physical location, since a mobile user

Internet phone could be anywhere that there is network coverage, even roaming via another cellular company. In short, there is no relationship between IP address and physical location, so the address itself reveals no useful information for the emergency services. At the VoIP level, a phone or gateway may identify itself with a SIP registrar by using a username and password. So in this case, the Internet Telephony Service Provider (ITSP) knows that a particular user is online, and can relate a specific telephone number to the user. However, it does not recognize how that IP traffic was engaged. Since the IP address itself does not necessarily provide location information presently, today a "best efforts" approach is to use an available database to find that user and the physical address the user chose to associate with that telephone numberclearly an imperfect solution.[22] VoIP Enhanced 911 (E911) is a method by which VoIP providers in the United States support emergency services. The VoIP E911 emergency-calling system associates a physical address with the calling party's telephone number as required by the Wireless Communications and Public Safety Act of 1999. All VoIP providers that provide access to the public switched telephone network are required to implement E911,[22] a service for which the subscriber may be charged. Participation in E911 is not required and customers may opt-out of E911 service.[22] One shortcoming of VoIP E911 is that the emergency system is based on a static table lookup. Unlike in cellular phones, where the location of an E911 call can be traced using Assisted GPS or other methods, the VoIP E911 information is only accurate so long as subscribers are diligent in keeping their emergency address information up-to-date. In the United States, the Wireless Communications and Public Safety Act of 1999 leaves the burden of responsibility upon the subscribers and not the service providers to keep their emergency information up to date.[22]

289

Lack of redundancy
The historical separation of IP networks and the PSTN provided redundancy when no portion of a call was routed over IP network. An IP network outage would not necessarily mean that a voice communication outage would occur simultaneously, allowing phone calls to be made during IP network outages. When telephone service relies on IP network infrastructure such as the Internet, a network failure can isolate users from all telephony communication, including Enhanced 911 and equivalent services in other locales. However, the network design envisioned by DARPA in the early 1980s included a fault tolerant architecture under adverse conditions.

Number portability
Local number portability (LNP) and Mobile number portability (MNP) also impact VoIP business. In November 2007, the Federal Communications Commission in the United States released an order extending number portability obligations to interconnected VoIP providers and carriers that support VoIP providers.[23] Number portability is a service that allows a subscriber to select a new telephone carrier without requiring a new number to be issued. Typically, it is the responsibility of the former carrier to "map" the old number to the undisclosed number assigned by the new carrier. This is achieved by maintaining a database of numbers. A dialed number is initially received by the original carrier and quickly rerouted to the new carrier. Multiple porting references must be maintained even if the subscriber returns to the original carrier. The FCC mandates carrier compliance with these consumer-protection stipulations. A voice call originating in the VoIP environment also faces challenges to reach its destination if the number is routed to a mobile phone number on a traditional mobile carrier. VoIP has been identified in the past as a Least Cost Routing (LCR) system, which is based on checking the destination of each telephone call as it is made, and then sending the call via the network that will cost the customer the least.[24] This rating is subject to some debate given the complexity of call routing created by number portability. With GSM number portability now in place, LCR providers can no longer rely on using the network root prefix to determine how to route a call. Instead, they must now determine the actual network of every number before routing the call.

Internet phone Therefore, VoIP solutions also need to handle MNP when routing a voice call. In countries without a central database, like the UK, it might be necessary to query the GSM network about which home network a mobile phone number belongs to. As the popularity of VoIP increases in the enterprise markets because of least cost routing options, it needs to provide a certain level of reliability when handling calls. MNP checks are important to assure that this quality of service is met. By handling MNP lookups before routing a call and by assuring that the voice call will actually work, VoIP service providers are able to offer business subscribers the level of reliability they require.

290

PSTN integration
The Media VoIP Gateway connects the digital media stream, so as to complete creating the path for voice as well as data media. It includes the interface for connecting the standard PSTN networks with the ATM and Inter Protocol networks. The Ethernet interfaces are also included in the modern systems, which are specially designed to link calls that are passed via the VoIP.[25] E.164 is a global FGFnumbering standard for both the PSTN and PLMN. Most VoIP implementations support E.164 to allow calls to be routed to and from VoIP subscribers and the PSTN/PLMN.[26] VoIP implementations can also allow other identification techniques to be used. For example, Skype allows subscribers to choose "Skype names"[27] (usernames) whereas SIP implementations can use URIs[28] similar to email addresses. Often VoIP implementations employ methods of translating non-E.164 identifiers to E.164 numbers and vice-versa, such as the Skype-In service provided by Skype[29] and the ENUM service in IMS and SIP.[30] Echo can also be an issue for PSTN integration.[31] Common causes of echo include impedance mismatches in analog circuitry and acoustic coupling of the transmit and receive signal at the receiving end.

Security
VoIP telephone systems are susceptible to attacks as are any Internet-connected devices. This means that hackers who know about these vulnerabilities (such as insecure passwords) can institute denial-of-service attacks, harvest customer data, record conversations and break into voice mailboxes.[32][33][34] Another challenge is routing VoIP traffic through firewalls and network address translators. Private Session Border Controllers are used along with firewalls to enable VoIP calls to and from protected networks. For example, Skype uses a proprietary protocol to route calls through other Skype peers on the network, allowing it to traverse symmetric NATs and firewalls. Other methods to traverse NATs involve using protocols such as STUN or Interactive Connectivity Establishment (ICE). Many consumer VoIP solutions do not support encryption, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content.[35] An attacker with a packet sniffer could intercept your VoIP calls if you are not on a secure VLAN. However, physical security of the switches within an enterprise and the facility security provided by ISPs make packet capture less of a problem than originally foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a voice packet is within the Internet backbone it is relatively safe from interception. There are open source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. Securing the content of conversations from malicious observers requires encryption and cryptographic authentication which is sometimes difficult to find at a consumer level. The existing security standard Secure Real-time Transport Protocol (SRTP) and the new ZRTP protocol are available on Analog Telephone Adapters (ATAs) as well as various softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. In 2005, Skype invited a researcher, Dr Tom Berson, to assess the security of the Skype software, and his conclusions are available in a published report.[36]

Internet phone

291

Securing VoIP
To prevent the above security concerns government and military organizations are using voice over secure IP (VoSIP), secure voice over IP (SVoIP), and secure voice over secure IP (SVoSIP) to protect confidential and classified VoIP communications.[37] Secure voice over secure IP is accomplished by encrypting VoIP with protocols such as SRTP or ZRTP. Secure voice over IP is accomplished by using Type 1 encryption on a classified network, like SIPRNet.[38][39][40][41][42] Public Secure VoIP is also available with free GNU programs and in many popular commercial VoIP programs via libraries such as ZRTP.[43]

Caller ID
Caller ID support among VoIP providers varies, but is provided by the majority of VoIP providers. Many VoIP carriers allow callers to configure arbitrary caller ID information, thus permitting spoofing attacks.[44] Business-grade VoIP equipment and software often makes it easy to modify caller ID information, providing many businesses great flexibility. The Truth in Caller ID Act became law in on December 22, 2010. This bill proposes to make it a crime in the United States to "knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value...".[45] Rules implementing the law were adopted by the Federal Communications Commission on June 20, 2011.[46]

Compatibility with traditional analog telephone sets


Some analog telephone adapters do not decode pulse dialing from older phones. They may only work with push-button telephones using the touch-tone system. The VoIP user may use a pulse-to-tone converter, if needed.[47]

Fax handling
Support for sending faxes over VoIP implementations is still limited. The existing voice codecs are not designed for fax transmission; they are designed to digitize an analog representation of a human voice efficiently. However, the inefficiency of digitizing an analog representation (modem signal) of a digital representation (a document image) of analog data (an original document) more than negates any bandwidth advantage of VoIP. In other words, the fax "sounds" simply do not fit in the VoIP channel. An alternative IP-based solution for delivering fax-over-IP called T.38 is available. Sending faxes using VoIP is sometimes referred to as FoIP, or Fax over IP.[48] The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet based transmissions which are the basis for IP communications. The fax machine could be a traditional fax machine connected to the PSTN, or an ATA box (or similar). It could be a fax machine with an RJ-45 connector plugged straight into an IP network, or it could be a computer pretending to be a fax machine.[49] Originally, T.38 was designed to use UDP and TCP transmission methods across an IP network. TCP is better suited for use between two IP devices. However, older fax machines, connected to an analog system, benefit from UDP near real-time characteristics due to the "no recovery rule" when a UDP packet is lost or an error occurs during transmission.[50] UDP transmissions are preferred as they do not require testing for dropped packets and as such since each T.38 packet transmission includes a majority of the data sent in the prior packet, a T.38 termination point has a higher degree of success in re-assembling the fax transmission back into its original form for interpretation by the end device. This in an attempt to overcome the obstacles of simulating real time transmissions using packet based protocol.[51] There have been updated versions of T.30 to resolve the fax over IP issues, which is the core fax protocol. Some newer high end fax machines have T.38 built-in capabilities which allow the user to plug right into the network and transmit/receive faxes in native T.38 like the Ricoh 4410NF Fax Machine.[52] A unique feature of T.38 is that each packet contains a portion of the main data sent in the previous packet. With T.38, two successive lost packets are

Internet phone needed to actually lose any data. The data you lose will only be a small piece, but with the right settings and error correction mode, there is an increased likelihood that you will receive enough of the transmission to satisfy the requirements of the fax machine for output of the sent document.

292

Support for other telephony devices


Another challenge for VoIP implementations is the proper handling of outgoing calls from other telephony devices such as digital video recorders, satellite television receivers, alarm systems, conventional modems and other similar devices that depend on access to a PSTN telephone line for some or all of their functionality. These types of calls sometimes complete without any problems, but in other cases they fail. If VoIP and cellular substitution becomes very popular, some ancillary equipment makers may be forced to redesign equipment, because it would no longer be possible to assume a conventional PSTN telephone line would be available in consumer's homes.

Legal issues
As the popularity of VoIP grows, governments are becoming more interested in regulating VoIP in a manner similar to PSTN services.[53] Throughout the developing world, countries where regulation is weak or captured by the dominant operator, restrictions on the use of VoIP are imposed, including in Panama where VoIP is taxed, Guyana where VoIP is prohibited and India where its retail commercial sales is allowed but only for long distance service.[54] In Ethiopia, where the government is monopolizing telecommunication service, it is a criminal offense to offer services using VoIP. The country has installed firewalls to prevent international calls being made using VoIP. These measures were taken after the popularity of VoIP reduced the income generated by the state owned telecommunication company.

European Union
In the European Union, the treatment of VoIP service providers is a decision for each Member State's national telecoms regulator, which must use competition law to define relevant national markets and then determine whether any service provider on those national markets has "significant market power" (and so should be subject to certain obligations). A general distinction is usually made between VoIP services that function over managed networks (via broadband connections) and VoIP services that function over unmanaged networks (essentially, the Internet). The relevant EU Directive is not clearly drafted concerning obligations which can exist independently of market power (e.g., the obligation to offer access to emergency calls), and it is impossible to say definitively whether VoIP service providers of either type are bound by them. A review of the EU Directive is under way and should be complete by 2007.

India
In India, it is legal to use VoIP, but it is illegal to have VoIP gateways inside India. This effectively means that people who have PCs can use them to make a VoIP call to any number, but if the remote side is a normal phone, the gateway that converts the VoIP call to a POTS call should not be inside India. In the interest of the Access Service Providers and International Long Distance Operators the Internet telephony was permitted to the ISP with restrictions. Internet Telephony is considered to be different service in its scope, nature and kind from real time voice as offered by other Access Service Providers and Long Distance Carriers. Hence the following type of Internet Telephony are permitted in India : (a) PC to PC; within or outside India (b) PC / a device / Adapter conforming to standard of any international agencies like- ITU or IETF etc. in India to PSTN/PLMN abroad. (c) Any device / Adapter conforming to standards of International agencies like ITU, IETF etc. connected to ISP node with static IP address to similar device / Adapter; within or outside India. (d) Except whatever is described

Internet phone in condition (ii) above, no other form of Internet Telephony is permitted. (e) In India no Separate Numbering Scheme is provided to the Internet Telephony. Presently the 10 digit Numbering allocation based on E.164 is permitted to the Fixed Telephony, GSM, CDMA wireless service. For Internet Telephony the numbering scheme shall only conform to IP addressing Scheme of Internet Assigned Numbers Authority (IANA). Translation of E.164 number / private number to IP address allotted to any device and vice versa, by ISP to show compliance with IANA numbering scheme is not permitted. (f) The Internet Service Licensee is not permitted to have PSTN/PLMN connectivity. Voice communication to and from a telephone connected to PSTN/PLMN and following E.164 numbering is prohibited in India. [55]

293

Middle East
In the UAE and Oman it is illegal to use any form of VoIP, to the extent that Web sites of Skype and Gizmo5 are blocked. Providing or using VoIP services is illegal in Oman. Those who violate the law stand to be fined 50,000 Omani Rial (about 130,317 US dollars) or spend two years in jail or both. In 2009, police in Oman have raided 121 Internet cafes throughout the country and arrested 212 people for using/providing VoIP services.

South Korea
In South Korea, only providers registered with the government are authorized to offer VoIP services. Unlike many VoIP providers, most of whom offer flat rates, Korean VoIP services are generally metered and charged at rates similar to terrestrial calling. Foreign VoIP providers encounter high barriers to government registration. This issue came to a head in 2006 when Internet service providers providing personal Internet services by contract to United States Forces Korea members residing on USFK bases threatened to block off access to VoIP services used by USFK members as an economical way to keep in contact with their families in the United States, on the grounds that the service members' VoIP providers were not registered. A compromise was reached between USFK and Korean telecommunications officials in January 2007, wherein USFK service members arriving in Korea before June 1, 2007, and subscribing to the ISP services provided on base may continue to use their US-based VoIP subscription, but later arrivals must use a Korean-based VoIP provider, which by contract will offer pricing similar to the flat rates offered by US VoIP providers.[56]

United States
In the United States, the Federal Communications Commission now requires all interconnected VoIP service providers to comply with requirements comparable to those for traditional telecommunications service providers. VoIP operators in the US are required to support local number portability; make service accessible to people with disabilities; pay regulatory fees, universal service contributions, and other mandated payments; and enable law enforcement authorities to conduct surveillance pursuant to the Communications Assistance for Law Enforcement Act (CALEA). "Interconnected" VoIP operators also must provide Enhanced 911 service, disclose any limitations on their E-911 functionality to their consumers, and obtain affirmative acknowledgements of these disclosures from all consumers.[57] VoIP operators also receive the benefit of certain US telecommunications regulations, including an entitlement to interconnection and exchange of traffic with incumbent local exchange carriers via wholesale carriers. Providers of "nomadic" VoIP servicethose who are unable to determine the location of their usersare exempt from state telecommunications regulation.[58] Another legal issue that the US Congress is debating concerns changes to the Foreign Intelligence Surveillance Act. The issue in question is calls between Americans and foreigners. The National Security Agency (NSA) is not authorized to tap Americans' conversations without a warrantbut the Internet, and specifically VoIP does not draw as clear a line to the location of a caller or a call's recipient as the traditional phone system does. As VoIP's low cost and flexibility convinces more and more organizations to adopt the technology, the surveillance for law enforcement agencies becomes more difficult. VoIP technology has also increased security concerns because VoIP and similar

Internet phone technologies have made it more difficult for the government to determine where a target is physically located when communications are being intercepted, and that creates a whole set of new legal challenges.[59]

294

Pronunciation
The acronym VoIP has been pronounced variably since the inception of the term. Apart from spelling out the acronym letter by letter, v'''p (vee-oh-eye-pee), there are three likely possible pronunciations: v''p[needs IPA] (vo-eye-pee) and v'ip[needs IPA] (vo-ipp), have been used, but generally, the single syllable vy'p[needs IPA] (voyp, as in voice) may be the most common within the industry.[60]

Historical milestones
1973: Network Voice Protocol (NVP) developed by Danny Cohen and others to carry real time voice over Arpanet 1974: The Institute of Electrical and Electronic Engineers (IEEE) published a paper titled "A Protocol for Packet Network Interconnection".[61] 1974: Network Voice Protocol (NVP) first tested over Arpanet in August 1974, carrying 16k CVSD encoded voice first implementation of Voice over IP 1977: Danny Cohen, Vint Cerf, Jon Postel agree to separate IP from TCP, and create UDP for carrying real time traffic 1981: IPv4 is described in RFC 791. 1985: The National Science Foundation commissions the creation of NSFNET.[62] 1986: Proposals from various standards organizations for Voice over ATM, in addition to commercial packet voice products from companies such as StrataCom 1992: Voice over Frame Relay standards development within Frame Relay Forum 1994: First Voice Over IP application (MTALK, a freeware application for Linux)[63] 1995: VocalTec releases the first commercial Internet phone software.[64][65] Beginning in 1995, Intel, Microsoft and Radvision initiated standardization activities for VoIP communications system.[66] 1996: ITU-T begins development of standards for the transmission and signaling of voice communications over Internet Protocol networks with the H.323 standard.[67] US telecommunication companies petition the US Congress to ban Internet phone technology.[68] 1997: Level 3 began development of its first softswitch, a term they coined in 1998.[69] 1999: The Session Initiation Protocol (SIP) specification RFC 2543 is released.[70] Mark Spencer of Digium develops the first open source private branch exchange (PBX) software (Asterisk).[71] 2004: Commercial VoIP service providers proliferate.

Internet phone

295

References
[1] "Voice over Internet Protocol. Definition and Overview" (http:/ / www. teliqo. com/ voip/ ). International Engineering Consortium. 2007. . Retrieved 2009-04-27. [2] "IP Telephony Vs VoIP" (http:/ / www. networkstraining. com/ ip-telephony-and-voip-tutorial-part-1/ ). . Retrieved April 27, 2011. [3] "XMPP Federation" (http:/ / googletalk. blogspot. com/ 2006/ 01/ xmpp-federation. html). Google Talkabout. 2006. . Retrieved 2012-05-11. [4] Booth, C (2010). "Chapter 2: IP Phones, Software VoIP, and Integrated and Mobile VoIP". Library Technology Reports 46 (5): 1119. [5] "Carriers look to IP for backhaul" (http:/ / www. commsdesign. com/ showArticle. jhtml;jsessionid=YBQXDJILLQX0IQSNDLPSKH0CJUNN2JVN?articleID=159907138). Telecommunications Online. January 21, 2009. . Retrieved 2009-01-21. [6] "Mobile's IP challenge" (http:/ / www. totaltele. com/ View. aspx?ID=77588& t=4). Total Telecom. December 8, 2005. . Retrieved 2009-01-21. [7] Michael Dosch and Steve Church. "VoIP in the Broadcast Studio" (http:/ / www. axiaaudio. com/ tech/ voip/ default. htm). Axia Audio. . Retrieved 2011-06-21. [8] Callahan, Renee (December 9, 2008). "Businesses Move To Voice-Over-IP" (http:/ / www. forbes. com/ 2008/ 12/ 09/ skype-vonage-ringcentral_leadership_clayton_in_rc_1209claytonchristensen_inl. html). Forbes. . Retrieved 2009-03-03. [9] Korzeniowski, Peter (January 8, 2009). "Three Technologies You Need In 2009" (http:/ / www. forbes. com/ 2009/ 01/ 08/ small-business-voip-ent-tech-cx_bm_0108bmightytech09. html/ ). Forbes. . Retrieved 2009-03-02. [10] "Skype For Business" (http:/ / www. skype. com/ business/ allfeatures/ 3skypephone/ ). skype.com. . Retrieved 2009-03-16. [11] William Jackson (May 27, 2009). "SSA goes big on VOIP" (http:/ / gcn. com/ Articles/ 2009/ 06/ 01/ SSA-VOIP-implementation. aspx?s=gcndaily_280509& Page=1). Government Computer News. . Retrieved 2009-05-28. [12] "Social Security to Build "World's Largest VOIP"" (http:/ / www. govtech. com/ gt/ 275677). Government Technology. . Retrieved 2009-05-29. [13] voip cute (http:/ / voipcute. blogspot. com/ 2012/ 01/ voice-over-ip-voip-services. html), VOIP Advantages [14] FCC.gov (http:/ / www. fcc. gov/ voip/ ), What are some advantages of VOIP? [15] "Quality of Service for Voice over IP" (http:/ / www. cisco. com/ en/ US/ docs/ ios/ solutions_docs/ qos_solutions/ QoSVoIP/ QoSVoIP. html). . Retrieved May 3, 2011. [16] Prabhakar, G.; Rastogi, R.,& Thotton, M (2005). "OSS Architecture & Requirements for VoIP Networks". Bell Labs Technical Journal 10 (1): 3145. [17] "Quality of Service for Voice over IP" (http:/ / www. cisco. com/ en/ US/ docs/ ios/ solutions_docs/ qos_solutions/ QoSVoIP/ QoSVoIP. html#wp1029054). . Retrieved May 3, 2011. [18] VOIP Vulnerability over Internet Protocol (http:/ / www. continuitycentral. com/ feature074. htm) [19] IEEE Multipath routing with adaptive playback scheduling for Voice over IP in Service Overlay Networks (Abstract) (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=4520089) [20] ICT Regulation Tool Kit 4.4 VOIP Regulatory Issues Universal Service (http:/ / www. ictregulationtoolkit. org/ en/ Section. 3083. html) [21] Letter from the City of New York to the Federal Communications Commission (http:/ / gullfoss2. fcc. gov/ prod/ ecfs/ retrieve. cgi?native_or_pdf=pdf& id_document=6517587651) [22] "FCC Consumer Advisory VoIP and 911 Service" (http:/ / www. fcc. gov/ cgb/ consumerfacts/ voip911. pdf). . Retrieved May 2, 2011. [23] Keeping your telephone number when you change your service provider FCC (http:/ / www. fcc. gov/ cgb/ consumerfacts/ numbport. html) [24] VoIpservice.com (http:/ / www. voipservice. com/ sip-trunking) [25] "Importance of Softswitch VoIP Technology" (http:/ / www. ixc. ua/ importance-of-softswitch-voip-technology-properly). ixc.ua. May 20, 2011. . Retrieved 2012-10-04. [26] "RFC 3824 Using E.164 numbers with the Session Initiation Protocol (SIP)" (http:/ / www. packetizer. com/ rfc/ rfc3824/ ). The Internet Society. June 1, 2004. . Retrieved 2009-01-21. [27] "Create a Skype Name" (http:/ / www. skype. com/ help/ guides/ createskypename_windows/ ). Skype. . Retrieved 2009-01-21. [28] "RFC 3969 The Internet Assigned Number Authority (IANA) Uniform Resource Identifier (URI) Parameter Registry for the Session Initiation Protocol (SIP)" (http:/ / www. packetizer. com/ rfc/ rfc3969/ ). The Internet Society. December 1, 2004. . Retrieved 2009-01-21. [29] "Your personal online number" (http:/ / www. skype. com/ allfeatures/ onlinenumber/ ). Skype. . Retrieved 2009-01-21. [30] "Application-level Network Interoperability and the Evolution of IMS" (http:/ / ipcommunications. tmcnet. com/ hot-topics/ MCP/ articles/ 1311-application-level-network-interoperability-the-evolution-ims. htm). TMCnet.com. May 24, 2006. . Retrieved 2009-01-21. [31] Packetcable Implementation P557 Jeff Riddel ISBN 1-58705-181-8 Google Books Preview (http:/ / books. google. com/ books?id=8CNBbrxytcAC& pg=PA557& lpg=PA557& dq=PSTN+ gateway+ VOIP+ impedance+ mismatch) [32] Taub, Eric (April 2, 2008). "VOIP System Security: Time to Worry, or Maybe Not" (http:/ / bits. blogs. nytimes. com/ 2008/ 04/ 02/ voip-system-security-time-to-worry-or-maybe-not/ ?scp=4& sq=voip& st=cse/ ). New York Times. . Retrieved 2009-03-02. [33] Stanton, Ray (Secure VoIP- An Achievable Goal). Computer Fraud & Security 4: 1114. doi:10.1016/S1361-3723(06)70333-5. [34] Stanton, R. (2006). "Secure VoIP- an achievable goal". Computer Fraud & Security 4: 1114. doi:10.1016/S1361-3723(06)70333-5.

Internet phone
[35] "Examining Two Well-Known Attacks on VOIP" (http:/ / www. circleid. com/ posts/ examining_two_well_known_attacks_on_voip1/ ). CircleID. . Retrieved 2006-04-05. [36] Skype.com (http:/ / download. skype. com/ share/ security/ 2005-031 security evaluation. pdf), "Skype Security Evaluation", Tom Berson/Anagram Laboratories [37] Disa.mil (http:/ / iase. disa. mil/ stigs/ stig/ VoIP-STIG-V2R2. pdf), Internet Protocol Telephony & Voice over Internet Protocol Security Technical Implementation Guide [38] IJCSNS.org (http:/ / paper. ijcsns. org/ 07_book/ 200706/ 20070610. pdf), Secure Voice-over-IP [39] Sans.org (http:/ / www. sans. org/ reading_room/ whitepapers/ voip/ secure_voice_over_ip_322), SANS Institute InfoSec Reading Room [40] JHU.edu (http:/ / www. clsp. jhu. edu/ ~cwhite/ papers/ asilo_04_LossConceal_final. pdf), Packet Loss Concealment in a Secure Voice over IP Environment [41] GDC4S.com (http:/ / www. gdc4s. com/ documents/ D-VIPER-14-1007_p11. pdf), State-of-the-art voice over IP encryptor [42] Networkworld.com (http:/ / www. networkworld. com/ news/ 2009/ 041609-cellcrypt-secure-voip-heading-to. html), Cellcrypt secure VOIP heading to BlackBerry. [43] Freesorftwaremagazine.com (http:/ / www. freesoftwaremagazine. com/ columns/ secure_voip_calling_free_software_right_to_privacy), Secure VOIP calling, free software, and the right to privacy [44] VOIPSA.org (http:/ / voipsa. org/ blog/ 2006/ 09/ 29/ hello-mom-im-a-fake/ ), Blog: "Hello Mom, I'm a Fake!" (Telespoof and Fakecaller). [45] 111th Congress (2009) (January 7, 2009). "S. 30 (111th)" (http:/ / www. govtrack. us/ congress/ bills/ 111/ s30). Legislation. GovTrack.us. . Retrieved June 25, 2012. "Truth in Caller ID Act of 2009" [46] Federal Communications Commission (June 22, 2011). "Rules and Regulation Implementing the Truth in Caller ID Act of 2009" (http:/ / www. fcc. gov/ document/ rules-and-regulation-implementing-truth-caller-id-act-2009). fcc.gov. . Retrieved June 25, 2012. [47] Oldphoneworks.com (http:/ / www. oldphoneworks. com/ antique-phone-parts/ parts-and-pieces/ pulse-to-tone-converters/ ) [48] Voip-Info.org (http:/ / www. voip-info. org/ wiki/ view/ FoIP), "FoIP". [49] Soft-Switch.org (http:/ / soft-switch. org/ foip. html), Faxing over IP networks [50] Umass.edu (http:/ / www-net. cs. umass. edu/ kurose/ transport/ UDP. html), UMass Discussion on UDP transmission Characteristics. [51] Faqs.org (http:/ / www. faqs. org/ rfcs/ rfc3362. html), RFC 3362-T.38 [52] FaxSuperstore.com (http:/ / www. faxsuperstore. com/ ricoh-4410nf. html), Ricoh 4410NF [53] "Global VOIP Policy Status Matrix" (http:/ / www. ipall. org/ matrix/ ). Global IP Alliance. . Retrieved 2006-11-23. [54] Proenza, Francisco J.. "The Road to Broadband Development in Developing Countries is through Competition Driven by Wireless and VOIP" (http:/ / www. e-forall. org/ pdf/ Wireless& VOIP_10July2006. pdf) (PDF). . Retrieved 2008-04-07. [55] (http:/ / www. scribd. com/ doc/ 101919043/ TECHNICAL-NOTE-ON-ILLEGAL-INTERNATIONAL-LONG-DISTANCE-TELEPHONE-EXCHANGE-IN-INDIA) by Harish Kumar Gangwar , Technical Note on illegal ILD telephone Exchange in India [56] Stripes.com (http:/ / www. stripes. com/ article. asp?section=104& article=41826& archive=true), Stars and Stripes: USFK deal keeps VoIP access for troops [57] GPO.gov (http:/ / www. access. gpo. gov/ nara/ cfr/ waisidx_07/ 47cfr9_07. html), 47 C.F.R. pt. 9 (2007) [58] FCC.gov (http:/ / www. fcc. gov/ voip/ ) [59] Greenberg, Andy (May 15, 2008). "The State Of Cybersecurity Wiretapping's Fuzzy Future" (http:/ / www. forbes. com/ 2008/ 05/ 15/ wiretapping-voip-lichtblau-tech-security08-cx_ag_0515wiretap. html/ ). Forbes. . Retrieved 2009-03-02. [60] Voip | Define Voip at Dictionary.com (http:/ / dictionary. reference. com/ browse/ voip). Dictionary.com. Retrieved 2011-07-15. [61] Vinton G. Cerf, Robert E. Kahn, "A Protocol for Packet Network Intercommunication", IEEE Transactions on Communications, Vol. 22, No. 5, May 1974, pp. 637648. [62] "The Launch of NSFNET" (http:/ / www. nsf. gov/ about/ history/ nsf0050/ internet/ launch. htm). The National Science Foundation. . Retrieved 2009-01-21. [63] "MTALK-Readme" (ftp:/ / sunsite. unc. edu/ pub/ Linux/ apps/ sound/ talk/ mtalk. README) (TXT). Sunsite.edu. . Retrieved 2012-04-29. [64] Keating, Tom. "Internet Phone Release 4" (http:/ / blog. tmcnet. com/ blog/ tom-keating/ docs/ cti-buyers-guide-1996. pdf) (PDF). Computer Telephony Interaction Magazine. . Retrieved 2007-11-07. [65] "The 10 that Established VOIP (Part 1: VocalTec)" (http:/ / www. ilocus. com/ 2007/ 07/ the_10_that_established_voip_p_2. html). iLocus. . Retrieved 2009-01-21. [66] The free Library RADVision and Intel Target Compatibility Between RADVision's H.323/320 Videoconferencing Gateway And Intel's Business Video Conferencing And TeamStation Products. (http:/ / www. thefreelibrary. com/ RADVision+ and+ Intel+ Target+ Compatibility+ Between+ RADVision's+ . . . -a019467970) June 2, 1997 VoiP Developer Solutions (http:/ / www. radvision. com/ Developer-Solutions/ ) [67] "H.323 Visual telephone systems and equipment for local area networks which provide a non-guaranteed quality of service" (http:/ / www. itu. int/ rec/ T-REC-H. 323-199611-S/ en). ITU-T. . Retrieved 2009-01-21. [68] "RFC 2235" (http:/ / www. faqs. org/ rfcs/ rfc2235. html). R. Zakon. . Retrieved 2009-01-21. [69] "The 10 that Established VOIP (Part 2: Level 3)" (http:/ / www. ilocus. com/ 2007/ 07/ the_10_that_established_voip_p_1. html). iLocus. July 13, 2007. . Retrieved 2007-11-07. [70] "RFC 2543, SIP: Session Initiation Protocol" (http:/ / www. ietf. org/ rfc/ rfc2543. txt). Handley,Schulzrinne,Schooler,Rosenberg. . Retrieved 2009-01-21.

296

Internet phone
[71] "What is Asterisk" (http:/ / www. asterisk. org/ about). Asterisk.org. . Retrieved 2009-01-21.

297

External links
Internet phone (http://www.dmoz.org/Business/Telecommunications/Services/VoIP/) at the Open Directory Project

Internet radio
Internet radio (also web radio, net radio, streaming radio, e-radio webcasting) is an audio service transmitted via the Internet. Music streaming on the Internet is usually referred to as webcasting since it is not transmitted broadly through wireless means. Internet radio involves streaming media, presenting listeners with a continuous stream of audio that cannot be paused or replayed, much like traditional broadcast media; in this respect, it is distinct from on-demand file serving. Internet radio is also distinct from podcasting, which involves downloading rather than streaming. Many Internet radio services are associated with a corresponding traditional (terrestrial) radio station or radio network. Internet-only radio stations are independent of such associations. Internet radio services are usually accessible from anywhere in the worldfor example, one could listen to an Australian station from Europe or America. Some major networks like CBS Radio and Citadel Broadcasting (except for news/talk and sports stations) in the US, and Chrysalis in the UK restrict listening to in-country because of music licensing and advertising concerns. Internet radio remains popular among expatriates and listeners with interests that are often not adequately served by local radio stations (such as eurodance, progressive rock, ambient music, folk music, classical music, and stand-up comedy). Internet radio services offer news, sports, talk, and various genres of musicevery format that is available on traditional radio stations.

An Internet radio receiver in retro-style

An Internet radio studio

Internet radio technology


Streaming
Streaming technology is used to distribute Internet radio, typically Transmitter for internet radio using a lossy audio codec. Streaming audio formats include "MP3, Ogg Vorbis, Windows Media Audio, RealAudio, and HE-AAC (or aacPlus)".[1] Audio data is continuously transmitted serially ("streamed") over the local network or internet in TCP or UDP packets, then reassembled at the receiver and played a second or two later. The delay is called lag, and is introduced at several stages of digital audio broadcasting.[2]

Internet radio

298

Simulation
A local tuner simulation program includes all the online radios that can also be heard in the air in the city.

History
The first live internet only broadcast of a live band was Seattle based space rock group Sky Cries Mary on November 10th, 1994, by Paul Allen's digital media start-up Starwave, also based in Seattle.[3][4] A week later, during November 1994, Rolling Stones concert was the "first major cyberspace multicast concert." Mick Jagger opened the concert by saying, "I wanna say a special welcome to everyone that's, uh, climbed into the Internet tonight and, uh, has got into the M-bone. And I hope it doesn't all collapse."[5] On November 7, 1994, WXYC (89.3 FM Chapel Hill, NC USA) became the first traditional radio station to announce broadcasting on the Internet. WXYC used an FM radio connected to a system at SunSite, later known as Ibiblio, running Cornell's CU-SeeMe software. WXYC had begun test broadcasts and bandwidth testing as early as August 1994.[6] WREK (91.1 FM, Atlanta, GA USA) started streaming on the same day using their own custom software called CyberRadio1. However, unlike WXYC, this was WREK's beta launch and the stream was not advertised until a later date.[7]
The original cabin housing the (now defunct) Internet radio station Whole Wheat Radio in Talkeetna, Alaska

In 1995, Progressive Networks released RealAudio as a free download. Time magazine said that RealAudio took "advantage of the latest advances in digital compression" and delivered "AM radio-quality sound in so-called real time."[8] Eventually, companies such as Nullsoft and Microsoft released streaming audio players as free downloads.[9] As the software audio players became available, "many Web-based radio stations began springing up."[9] In 1996, Edward Lyman created Sonicwave.com, the first American internet radio station, legally licensed by both ASCAP and BMI, to broadcast live, 24 hours a day on the internet. In March 1996, Virgin Radio - London, became the first European radio station to broadcast its full program live on the internet.[10] It broadcast its FM signal, live from the source, simultaneously on the Internet 24 hours a day.[11] Internet radio attracted significant media and investor attention in the late 1990s. In 1998, the initial public stock offering for Broadcast.com set a record at the time for the largest jump in price in stock offerings in the United States. The offering price was US$18 and the company's shares opened at US$68 on the first day of trading.[12] The company was losing money at the time and indicated in a prospectus filed with the Securities Exchange Commission that they expected the losses to continue indefinitely.[12] Yahoo! purchased Broadcast.com on July 20, 1999[13] for US$5.7 billion.[14] With the advent of streaming RealAudio over HTTP, streaming became more accessible to a number of radio shows. One such show, TechEdge Radio in 1997 was broadcast in 3 formats - live on the radio, live from a RealAudio server and streamed from the web over HTTP. In 1998, the longest running internet radio show,[15] "The Vinyl Lounge", commenced netcasting from Sydney, Australia, from Australia's first Internet Radio Station, NetFM (www.netfm.net). In 1999, Australian Telco "Telstra" launched The Basement Internet Radio Station but it was later shut down in 2003 as it was not a viable business for the Telco. From 2000 onwards, most Internet Radio Stations increased their stream quality as bandwidth became more economical. Today, most stations stream between 64 kbit/s and 128 kbit/s providing near CD quality audio.

Internet radio

299

US royalty controversy
In October 1998, the US Congress passed the Digital Millennium Copyright Act (DMCA). One result of the DMCA is that performance royalties are to be paid for satellite radio and Internet radio broadcasts in addition to publishing royalties. In contrast, traditional radio broadcasters pay only publishing royalties and no performance royalties.[16] A rancorous dispute ensued over how performance royalties should be assessed for Internet broadcasters.[14][16][17][18][19][20][21] Some observers said that royalty rates that were being proposed were overly Internet radio configuration for Penistone FM burdensome and intended to disadvantage independent Internet-only studio stations[16]that "while Internet giants like AOL may be able to afford the new rates, many smaller Internet radio stations will have to shut down."[19] The Digital Media Association (DiMA) said that even large companies, like Yahoo! Music, might fail due to the proposed rates.[20] Some observers said that some U.S.-based Internet broadcasts might be moved to foreign jurisdictions where US royalties do not apply.[18] Many of these critics organized SaveNetRadio.org, "a coalition of listeners, artists, labels and webcasters"[17] that opposed the proposed royalty rates. To focus attention on the consequences of the impending rate hike, many US Internet broadcasters participated in a "Day of Silence" on June 26, 2007. On that day, they shut off their audio streams or streamed ambient sound, sometimes interspersed with brief public service announcements voiced, written and produced by popular voiceover artist Dave Solomon. [22] Notable participants included Rhapsody, Live365, MTV, Pandora, and SHOUTcast. Some broadcasters did not participate, such as Last.fm, that had just been purchased for US $280 million by CBS Music Group.[23] According to a Last.fm employee, they were unable to participate because participation "may compromise ongoing license negotiations."[24] SoundExchange, representing supporters of the increase in royalty rates, pointed out the fact that the rates were flat from 1998 through 2005 (see above), without even being increased to reflect cost-of-living increases. They also declared that if internet radio is to build businesses from the product of recordings, the performers and owners of those recordings should receive fair compensation. On May 1, 2007, SoundExchange came to an agreement with certain large webcasters regarding the minimum fees that were modified by the determination of the Copyright Royalty Board. While the CRB decision imposed a $500 per station or channel minimum fee for all webcasters, certain webcasters represented through DiMA negotiated a $50,000 "cap" on those fees with SoundExchange.[25] However, DiMA and SoundExchange continue to negotiate over the per song, per listener fees. SoundExchange has also offered alternative rates and terms to certain eligible small webcasters, that allows them to calculate their royalties as a percentage of their revenue or expenses, instead of at a per performance rate.[26] To be eligible, a webcaster had to have revenues of less than US $1.25 million a year and stream less than 5 million "listener hours" a month (or an average of 6830 concurrent listeners).[27] These restrictions would disqualify independent webcasters like AccuRadio, Digitally Imported, Club977 and others from participating in the offer, and therefore many small commercial webcasters continue to negotiate a settlement with SoundExchange.[28] An August 16, 2008 Washington Post article reported that although Pandora was "one of the nation's most popular Web radio services, with about 1 million listeners daily...the burgeoning company may be on the verge of collapse" due to the structuring of performance royalty payment for webcasters. "Traditional radio, by contrast, pays no such fee. Satellite radio pays a fee but at a less onerous rate, at least by some measures." The article indicated that "other Web radio outfits" may be "doom[ed]" for the same reasons.[29]

Internet radio On September 30, 2008, the United States Congress passed "a bill that would put into effect any changes to the royalty rate to which [record labels and web casters] agree while lawmakers are out of session."[30] Although royalty rates are expected to decrease, many webcasters nevertheless predict difficulties generating sufficient revenue to cover their royalty payments.[30] In January 2009, the US Copyright Royalty Board announced that "it will apply royalties to streaming net services based on revenue."[31] Since then, websites like Pandora Radio, Mog, 8tracks and even recently Google Music have changed the way people discover and listen to music.

300

Popularity
In 2003, revenue from online streaming music radio was US$49 million. By 2006, that figure rose to US$500 million.[20] A February 21, 2007 "survey of 3,000 Americans released by consultancy Bridge Ratings & Research" found that "[a]s much as 19% of U.S. consumers 12 and older listen to Web-based radio stations." In other words, there were "some 57 million weekly listeners of Internet radio programs. More people listen to online radio than to satellite radio, high-definition radio, podcasts, or cell-phone-based radio combined."[20][32] An April 2008 Arbitron survey[33] showed that, in the US, more than one in seven persons aged 2554 years old listen to online radio each week.[34] In 2008, 13 percent of the American population listened to the radio online, compared to 11 percent in 2007. Internet radio functionality is also built into many dedicated Internet radio devices, which give an FM like receiver user experience.

References
[1] Hoeg, Wolfgang; Lauterbach, Thomas (2009). Digital audio broadcasting: principles and applications of DAB, DAB+ and DMB (http:/ / books. google. com/ books?id=T0KSa6w3qH4C& pg=PA26). Wiley. p.26. ISBN978-0-470-51037-7. . [2] Hoeg, p 43. [3] Quinn, Michelle (October 29, 1995). "Prankster Takes on Microsoft" (http:/ / articles. sfgate. com/ 1995-10-29/ entertainment/ 17817541_1_sky-cries-mary-anisa-romero-roderick-band-members/ 2). The San Francisco Chronicle. . [4] "Company Info" (http:/ / www. mediacast. com/ Company/ ). MediaCast. . Retrieved 2011-09-19. [5] Peter H. Lewis (February 8, 1995). "Peering Out a 'Real Time' Window" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=990CE6DF123FF93BA35751C0A963958260). New York Times. . Retrieved 2009-02-09. [6] WXYC's groundbreaking internet simulcast is now 10 years old (http:/ / wxyc. org/ about/ first/ ) November 12, 2004. WXYC Chapel Hill, NC, 89.3 FM. [7] We got here first. Sort of. (http:/ / www. wrek. org/ ?q=wreknet-first) WREK Atlanta, 91.1 FM. [8] Josh Quittner (1995-05-01). "Radio Free Cyberspace" (http:/ / www. time. com/ time/ magazine/ article/ 0,9171,982874,00. html). Time. . Retrieved 2009-03-05. [9] Richard D. Rose (2002-05-08). "Connecting the Dots: Navigating the Laws and Licensing Requirements of the Internet Music Revolution" (http:/ / www. ipmall. org/ hosted_resources/ IDEA/ 42_IDEA/ 42-3_IDEA_313_Rose. pdf) (PDF). IDEA: The Intellectual Property Law Review. . Retrieved 2009-03-05. [10] Adam Bowie (September 26, 2008). "A brief history of Virgin Radio" (http:/ / onegoldensquare. com/ 2008/ 09/ a-brief-history-of-virgin-radio-by-adam-bowie/ ). One Golden Square. . Retrieved 2009-03-30. [11] "An Introduction to Internet Radio" (http:/ / www. ebu. ch/ fr/ technical/ trev/ trev_304-webcasting. pdf) (PDF). European Broadcasting Union (EBU). 26 October 2005. . Retrieved 2009-03-30. [12] Saul Hansell (July 20, 1998). "Broadcast.com Faces Risks After Strong Initial Offering" (http:/ / query. nytimes. com/ gst/ fullpage. html?res=9F07E6DB1030F933A15754C0A96E958260). New York Times. . Retrieved 2008-11-23. [13] "Yahoo! Completes Broadcast.com Acquisition" (http:/ / docs. yahoo. com/ docs/ pr/ release343. html). Yahoo! Media Relations. July 20, 1999. . Retrieved 2009-01-10. [14] Doc Searls, (July 17, 2002) "Why Are So Many Internet Radio Stations Still on the Air?" (http:/ / www. linuxjournal. com/ article/ 6218) Linux Journal. Retrieved 2010-03-14. [15] National Film & Sound Archive (September 20, 2010). "National Film & Sound Archive" (http:/ / www. screensound. gov. au). National Film & Sound Archive. . [16] Michael Roberts (May 2, 2002). "Digital Dilemma: Will new royalty fees kill Web radio?" (http:/ / www. westword. com/ 2002-05-02/ news/ digital-dilemma/ ). Westword. Retrieved 2010-03-14. [17] Carlos Militante (April 26, 2007). "Stagnant royalty rates may bring end to Internet radio" (http:/ / web. archive. org/ web/ 20080209025141/ http:/ / media. www. dailycollegian. com/ media/ storage/ paper874/ news/ 2007/ 04/ 26/ News/ Stagnant. Royalty. Rates. May. Bring. End. To. Internet. Radio-2881008. shtml). Spartan Daily (San Jose State U.). The Daily Collegian. Archived from the original

Internet radio
(http:/ / media. www. dailycollegian. com/ media/ storage/ paper874/ news/ 2007/ 04/ 26/ News/ Stagnant. Royalty. Rates. May. Bring. End. To. Internet. Radio-2881008. shtml) on February 9, 2008. . Retrieved 2010-03-14. [18] Michael Geist (April 9, 2007). Web radio may stream north to Canada (http:/ / www. thestar. com/ sciencetech/ article/ 200867). The Toronto Star. [19] Gray, Hiawatha (March 14, 2007). Royalty hike could mute Internet radio: Smaller stations say rise will be too much (http:/ / www. boston. com/ business/ technology/ articles/ 2007/ 03/ 14/ royalty_hike_could_mute_internet_radio/ ), The Boston Globe. [20] Olga Kharif, The Last Days of Internet Radio? (http:/ / www. businessweek. com/ technology/ content/ mar2007/ tc20070307_534338. htm), March 7, 2007. Retrieved on March 7, 2007. [21] Broache, Anne (2007-04-26). "Lawmakers propose reversal of Net radio fee increases" (http:/ / news. com. com/ Lawmakers+ + propose+ reversal+ of+ Net+ radio+ fee+ increases/ 2100-1028_3-6179627. html). CNet News. . Retrieved 2010-03-14. [22] Official SaveNetRadio PSAs & Day Of Silence Network Audio (http:/ / www. wzfb. com/ savenetradio/ ). The Toronto Star. [23] Duncan Riley (May 30, 2007). CBS Acquires Europes Last.FM for $280 million (http:/ / www. techcrunch. com/ 2007/ 05/ 30/ cbs-acquires-lastfm-for-280m/ ) Techcrunch. Retrieved 2010-03-14. [24] Russ Garrett (June 25, 2007). Post by Russ on Last.fm Forum - Day of Silence, June 25, 2007 (http:/ / www. last. fm/ forum/ 23/ _/ 296674/ 2#f4141933). Retrieved 2012-06-24. [25] Olga Kharif (2007-08-23). "Webcasters and SoundExchange Shake Hands" (http:/ / www. businessweek. com/ the_thread/ techbeat/ archives/ 2007/ 08/ web_radio_and_m. html). BusinessWeek.com. . Retrieved 2007-08-24. [26] Mark Hefflinger (2007-08-22). "SoundExchange Offers Discounted Music Rates To Small Webcasters" (http:/ / www. dmwmedia. com/ news/ 2007/ 08/ 22/ soundexchange-offers-discounted-music-royalties-to-small-webcasters). DigitalMediaWire.com. . Retrieved 2007-08-24. [27] Rusty Hodge, (August 1, 2007) SoundExchange extends (not very good) offer to small webcasters (http:/ / somafm. com/ blogs/ rusty/ 2007_08_01_archive. html). SomaFM. Retrieved 2010-03-14. [28] David Oxenford (September 19, 2007) SoundExchange Announces 24 Agreements - But Not One a Settlement With Small Webcasters (http:/ / www. broadcastlawblog. com/ archives/ internet-radio-soundexchange-announces-24-agreements-but-not-one-a-settlement-with-small-webcasters. html). Broadcast Law Blog. [29] Peter Whoriskey (August 16, 2008) Giant Of Internet Nears Its 'Last Stand' (http:/ / www. washingtonpost. com/ wp-dyn/ content/ article/ 2008/ 08/ 15/ AR2008081503367. html). The Washington Post. Retrieved 2010-03-14. [30] Miller, Cain Claire (Oct.27, 2008) Even If Royalties for Web Radio Fall, Revenue Remains Elusive (http:/ / www. nytimes. com/ 2008/ 10/ 27/ technology/ internet/ 27radio. html), The New York Times. [31] Scott M. Fulton, III (January 29, 2009) Copyright Board begrudgingly adopts revenue-based streaming royalties (http:/ / www. betanews. com/ article/ Copyright_Board_begrudgingly_adopts_revenuebased_streaming_royalties/ 1233268577). BetaNews.com. Retrieved 2010-03-14. [32] The "HD" in "HD radio" actually stands for hybrid digital, not high-definition. It's hybrid because analog and digital signals are broadcast together. [33] Joe Lensky; Bill Rose (2008-06-24). "The Infinite Dial 2008: Radios Digital Platforms" (http:/ / www. arbitron. com/ downloads/ digital_radio_study_2008. pdf) (PDF). Digital Radio Study 2008. Arbitron and Edison Research. . [34] "Weekly online radio audience increases from 11 percent to 13 percent of Americans in last year, according to the latest Arbitron/Edison media research study" (http:/ / www. redorbit. com/ news/ technology/ 1334023/ weekly_online_radio_audience_increases_from_11_percent_to_13/ index. html). Arbitron & Edison Research. Red Orbit. April 9, 2008. .

301

Further reading
"VOA: First on the Internet," by Chris Kern (http://www.chriskern.net/history/voaFirstOnTheInternet.html) (2006) Priestman, Chris (2001). Web Radio: Radio Production for Internet Streaming. Focal Press. ISBN978-0-240-51635-6.

Internet television

302

Internet television
"Net TV" redirects here. For other uses, see Net (disambiguation). Internet television (otherwise known as Internet TV, or Online TV) is the digital distribution of television content via the Internet. It should not be confused with Web television - short programs or videos created by a wide variety of companies and individuals, or Internet protocol television (IPTV) - an emerging internet technology standard for use by television broadcasters. Some Internet television is known as catch-up TV. Internet Television is a general term that covers the delivery of television shows and other video content over the internet by video streaming technology, typically by major traditional television broadcasters. It does not describe a technology used to deliver content (see Internet protocol television). Internet television has become very popular through services such as RT Player in Ireland; BBC iPlayer, 4oD, ITV Player (also STV Player and UTV Player) and Demand Five in the United Kingdom; Hulu in the United States; Nederland 24 in the Netherlands; ABC iview and Australia Live TV in Australia; Tivibu in Turkey. See List of Internet television providers.

Concept
Internet television allows the users to choose the content or the television show they want to watch from an archive of content or from a channel directory. The two forms of viewing Internet television are streaming the content directly to a media player or simply downloading the media to the user's computer. With the "TV on Demand" market growing, these on-demand websites or applications are essential for major television broadcasters. For example, the BBC iPlayer brings in users which stream more than one million videos per week, with one of the BBC's headline shows The Apprentice taking over three percent to five percent of the UK's internet traffic due to people watching the first episode on the BBC iPlayer. Availability of online TV content continues to grow. As an example, in Canada as of May 2011 there were more than 600 TV shows available for free streaming, including several major titles like Survivor and The Daily Show with Jon Stewart.[1] Every night the use of on-demand television peaks at around 10 pm.[2] Most providers of the service provide several different formats and quality controls so that the service can be viewed on many different devices. Some services now offer a HD service along side their SD, streaming is the same but offers the quality of HD to the device being used, as long as it is using a HD screen. During Peak times the BBC iPlayer transmits 12 GB (gigabytes) of information per second.[3] Over the course of a month the iPlayer sends 7 PB (petabytes) of information. Before 2006, most catch-up services used peer-to-peer (P2P) networking, in which users downloaded an application and data would be shared between the users rather than the service provider giving the now more commonly used streaming method. Now most service providers have moved away from the P2P systems and are now using the streaming media. The old P2P service was selected because the existing infrastructure could not handle the bandwidth necessary for centralized streaming distribution. Some consumers didn't like their upload bandwidth being consumed by their video player, which partially motivated the rollout of centralized streaming distribution.[4] Launching in March 2012 in New York City, Aereo streams network TV to customers over the internet. Broadcasters filed lawsuits against Aereo which Aereo captured broadcast signals and streaming the content to Aereo's costumers without paying broadcasters. In mid-July 2012, a federal judge sided with the Aereo start-up. Aereo planned to expand it to every major metropolitan area by the end of 2013.[5]

Internet television

303

Market competitors
Many providers of internet-television services exist including conventional television stations that have taken advantage of the internet as a way to continue showing television shows after they have been broadcast often advertised as "on-demand" and "catch-up" services. Today, almost every major broadcaster around the world is operating an internet-television platform.[6] Examples include the BBC, which introduced the BBC iPlayer on 25 June 2008 as an extension to its "RadioPlayer" and already existing streamed video-clip content, and Channel 4 that launched 4oD ("4 on Demand") in November 2006 allowing users to watch recently shown content. Most internet-television services allow users to view content free of charge; however, some content is for a fee.

Control
Controlling content on the Internet presents a challenge for most providers; to try to ensure that a user is allowed to view content such as content with age certificates, providers use methods such as parental controls that allows restrictions to be placed upon the use and access of certificated material. The BBC iPlayer makes use of a parental control system giving parents the option to "lock" content, meaning that a password would have to be used to access it. Flagging systems can be used to warn a user that content may be certified or that it is intended for viewing post-watershed. Honor systems are also used where users are asked for their dates of birth or age to verify if they are able to view certain content.

Archives
An archive is a collection of information and media much like a library or interactive-storage facility. It is a necessity for an on-demand media service to maintain archives so that users can watch content that has already been aired on standard-broadcast television. However, these archives can vary from a few weeks to months to years, depending on the curator and the type of content. For example, the BBC iPlayer's shows are in general available for up to seven days after their original broadcast.[7] This so-called "seven-day catch-up" model seems to become an industry standard for internet-television services in many countries around the world.[8] However, some shows may only be available for shorter periods. Others, such as the BBC's Panorama, may be available for an extended period because of the shows documentary nature or its popularity. In contrast, 4oD channel 4's on-demand service[9] offers many of its television shows that were originally aired years ago. An example of this is the comedy The IT Crowd where users can view the full series on the internet player. The same is true for other hit channel 4 comedies such as The Inbetweeners and Black Books. The benefit of lLarge archives, is that they bring in far more users who, in turn, watch more media, leading to a wider audience base and more advertising revenue. Large archives will also mean the user will spend more time on that website rather than a competitors, leading to starvation of demand for the competitors. Having an extensive archive, however, can bring problems along with benefits. Large archives are expensive to maintain, server farms and mass storage is needed along with ample bandwidth to transmit it all. Vast archives can be hard to catalogue and sort so that it is accessible to users.

Internet television

304

Broadcasting rights
Broadcasting rights vary from country to country and even within provinces of countries. These rights govern the distribution of copyrighted content and media and allow the sole distribution of that content at any one time. An example of content only being aired in certain countries is BBC iPlayer. The BBC checks a user's IP address to make sure that only users located in the UK can stream content from the BBC. The BBC only allows free use of their product for users within the UK as those users have paid for a television license that funds part of the BBC. This IP address check is not foolproof as the user may be accessing the BBC website through a VPN. Broadcasting rights can also be restricted to allowing a broadcaster rights to distribute that content for a limited time. Channel 4's online service 4oD can only stream shows created in the US by companies such as HBO for thirty days after they are aired on one of the Channel 4 group channels. This is to boost DVD sales for the companies who produce that media. Some companies pay very large amounts for broadcasting rights with sports and US sitcoms usually fetching the highest price from UK-based broadcasters.

Profits and costs


With the exception of Internet-connectivity costs many online-television channels or sites are free. These sites maintain this free-television policy through the use of video advertising, short commercials and banner advertisements may show up before a video is played. An example of this is on the abc.com catch-up website; in place of the advertisement breaks on normal television, a short thirty-second advertisement is played.

Technologies used for Internet television


The Hybrid Broadcast Broadband TV (HbbTV) consortium of industry companies (such as SES, Humax, Philips, and ANT Software) is currently promoting and establishing an open European standard (called HbbTV) for hybrid set-top boxes for the reception of broadcast and broadband digital television and multimedia applications with a single-user interface.[10] Current providers of internet television use various technologies to provide a service such as peer-to-peer (P2P) technologies, VoD systems, and live streaming. BBC iPlayer makes use of the Adobe Flash Player to provide streaming-video clips and other software provided by Adobe for its download service. CNBC, Bloomberg Television and Showtime use live-streaming services from BitGravity to stream live television to paid subscribers using a standard http protocol. DRM (digital rights management) software is also incorporated into many internet-television services. Sky Go has software that is provided by Microsoft to prevent content being copied. Internet television is also cross platform, the Sky Player service has been expanded to the Xbox 360 on October 27 and to Windows Media Center and then to Windows 7 PCs on November 19. The BBC iPlayer is also available through Virgin Media's on-demand service and other platforms such as FetchTV and games consoles including the Wii and the PlayStation 3. Other Internet-television platforms include mobile platforms such as the iPhone and iPod Touch, Nokia N96, Sony Ericsson C905 and many other mobile devices.[11] Samsung TV has also announced their plans to provide streaming options including 3D Video on Demand through their Explore 3D service.[12]

Internet television

305

Stream quality
Stream quality refers to the quality of the image and audio transferred from the servers of the distributor to the user's home screen. Higher-quality video such as video in high definition (720p+) requires higher bandwidth and faster connection speeds. The generally accepted kbit/s download rate needed to stream high-definition video that has been encoded with H.264 is 3500 kbit/s, whereas standard-definition television can range from 500 to 1500 kbit/s depending on the resolution on screen. In the UK, the BBC iPlayer deals with the largest amount of traffic yet it offers HD content along with SD content. As more people get broadband connections which can deal with streaming HD video over the internet, the BBC iPlayer has tried to keep up with demand and pace. However, as streaming HD video takes around 1.5 gb of data per hour of video the BBC has had to invest a lot of money collected from License Fee payers to implement this on such a large scale.[13] For users which do not have the bandwidth to stream HD video or even high-SD video which requires 1500 kbit/s, the BBC iPlayer offers lower bitrate streams which in turn lead to lower video quality. This makes use of an adaptive bitrate stream so that if the user's bandwidth suddenly drops, iPlayer will lower its streaming rate to compensate. This diagnostic tool offered on the BBC iPlayer site measures a user's streaming capabilities and bandwidth for free.[14] Although competitors in the UK such as 4oD, ITV Player and Demand Five have not yet offered HD streaming, the technology to support it is fairly new and widespread HD streaming is not an impossibility. The availability of Channel 4 and Five content on YouTube is predicted to prove incredibly popular as series such as Skins, Green Wing, The X Factor and others become available in a simple, straightforward format on a website which already attracts millions of people every day.

Overview of platforms and availability


Service Supporting company/companies Regional availability Website-based Windows Mac Linux iOS Android Console TV set Set Top Box application iTVmediaPlayer BitMar Networks BBC iPlayer BBC International UK Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Wii, PS3, Samsung, Sony, Philips Tivibu Argela TR Yes Yes Yes Yes Argela Android Player Sky Go ITV Player Sky ITV UK & Ireland UK Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Xbox 360 PS3 Virgin Media On Demand VuNow Verismo Networks World Yes iPad Yes PS3 Samsung, Sony Yes VuNow Service No Yes No Pending None Virgin Media On Freesat Ttnet on Demand No Yes No Free application application application application application application application

[15]

Xbox 360

Panasonic, Demand,

ABC iview

Australian Broadcasting Corporation

Australia

Internet television

306
UK & Ireland Yes Yes Yes Yes PS3, Xbox 360 Virgin Media On Demand Yes

4OD

Channel 4

SeeSaw Hulu

Arqiva FOX, NBC Universal, ABC,...

UK US

Yes Yes Yes Yes Yes Yes Yes

Yes Yes

Yes Yes Yes Yes Yes PS3, Samsung,

No Yes Yes Yes Yes Yes No Yes No

XBOX360 Vizio PS3

RT Player TG4 Beo

RT TG4

Ireland Ireland/Worldwide Ireland Scotland Canada

TV3 Catch Up TV3 STV Player Global Video Scottish Television Global

References
[1] 'Streaming Guide' List of Online TV Shows in Canada (http:/ / www. streaming-guide. com/ ), 05/16/2011 'Streaming Guide' List of Online TV Shows in Canada. [2] BBC iPlayer 'risks overloading the internet' (http:/ / technology. timesonline. co. uk/ tol/ news/ tech_and_web/ article3716781. ece), The Sunday Times, 04/10/2008 News article regarding BBC iPlayer internet traffic. [3] BBC iPlayer Stats and Facts (http:/ / www. bluestagstudio. co. uk/ blog-3-BBCiPlayer_StatsandFacts), 12/05/2009 Brief blog style entry on BBC iPlayer traffic per month. [4] iPlayer uncovered: What powers the BBC's epic creation? (http:/ / crave. cnet. co. uk/ software/ 0,39029471,49302215,00. htm), 08/05/2009 CNet interview with iPlayer boss Anthony Rose, mostly on iPlayer 3.0 [5] "Aereo Threatens Broadcasters By Streaming Network TV Online" (http:/ / www. huffingtonpost. com/ 2012/ 07/ 20/ aereo-broadcasters-streams-networks-tv_n_1690173. html). July 20, 2012. . [6] Internet television platforms around the world (http:/ / www. international-television. org/ itve/ ) International TV Explorer [7] BBC iPlayer Help (http:/ / iplayerhelp. external. bbc. co. uk/ help/ prog_availability/ how_long) BBC iPlayer [8] International TV Explorer (http:/ / www. international-television. org/ itve/ ) International Television Expert Group [9] "Channel 4's home page for channel 4 content on demand" (http:/ / www. channel4. com/ programmes/ 4od). Channel4.com. . Retrieved 2011-01-02. [10] "New European Initiative Merges Television with the Power of the Internet" (http:/ / www. hbbtv. org/ news/ HBBTV_PR_Final. pdf) (Press release). HbbTV Consortium. August 27, 2009. . [11] "Info page detailing all platforms iPlayer works with" (http:/ / www. bbc. co. uk/ iplayer/ where_to_get_iplayer). Bbc.co.uk. 2010-05-15. . Retrieved 2011-01-02. [12] ["http:/ / www. twice. com/ article/ 468711-Samsung_To_Do_3D_VOD_Streaming. php"Samsung To Do 3D VOD Streaming, May 24, 2011 [13] BBC iPlayer goes HD, adds higher quality streams, releases iPlayer Desktop out of Labs (http:/ / www. bbc. co. uk/ blogs/ bbcinternet/ 2009/ 04/ bbc_iplayer_goes_hd_adds_highe. html), BBC Internet Blog, 20/04/2009 [14] "BBC web page which runs a diagnostic of internet download speeds for streaming remotely" (http:/ / www. bbc. co. uk/ iplayer/ diagnostics). Bbc.co.uk. . Retrieved 2011-01-02. [15] "BBC iPlayer Apps op Android Market" (https:/ / market. android. com/ details?id=bbc. iplayer. android). Market.android.com. . Retrieved 2012-01-14.

Internet television

307

External links
IPTV future (http://www.theregister.co.uk/2006/05/05/iptv_future/) The Register 2006-05-05 As Internet TV Aims at Niche Audiences, the Slivercast Is Born (http://www.nytimes.com/2006/03/12/ business/yourmoney/12sliver.html?ex=1299819600en=b93a73a9426aeb16ei=5088partner=rssnytemc=rss& pagewanted=all) New York Times 2006-03-12 TV's future stars will come from the web (http://www.guardian.co.uk/technology/2008/sep/11/internet. socialnetworking)The Guardian 2008-09-11 Your top web TV (http://www.telegraph.co.uk/culture/tvandradio/3666961/Your-top-web-TV.html)The Telegraph 2007-08-03

308

Social impact
Sociology of the Internet
The sociology of the Internet involves the application of sociological theory and method to the Internet as a source of information and communication. Sociologists are concerned with the social implications of the technology; new social networks, virtual communities and ways of interaction that have arisen, as well as issues related to cyber crime, etc. The Internetthe newest in a series of major information breakthroughsis of interest for sociologists in various ways: as a tool for research, for example, in using online questionnaires instead of paper ones, as a discussion platform, and as a research topic. The sociology of the Internet in the stricter sense concerns the analysis of online communities (e.g. as found in newsgroups), virtual communities and virtual worlds, organizational change catalyzed through new media such as the Internet, and social change at-large in the transformation from industrial to informational society (or to information society). Online communities can be studied statistically through network analysis and at the same time interpreted qualitatively, such as through virtual ethnography. Social change can be studied through statistical demographics or through the interpretation of changing messages and symbols in online media studies.

Emergence of the discipline


The Internet is a relatively new phenomenon. As Robert Darnton wrote, it is a revolutionary change that "took place yesterday, or the day before, depending on how you measure it."[1] The Internet developed from the ARPANET, dating back to 1969; as a term it was coined in 1974. The World Wide Web as we know it was shaped in the mid 1990s, when graphical interface and services like email became popular and reached wider (non-scientific and non-military) audiences and commerce.[1][2] Internet Explorer was first released in 1995; Netscape a year earlier. Google was founded in 1998.[1][2] Wikipedia was founded in 2001. Facebook, MySpace, and YouTube in the mid-2000s. Web 2.0 is still emerging. Steadily, the amount of information available on the net and the number of Internet users worldwide has continued to grow rapidly.[2]

Research trends
According to DiMaggio et al. (2001),[2] research tends to focus on the Internet's implications in five domains: 1. 2. 3. 4. 5. inequality (the issues of digital divide) community and social capital (the issues of time displacement) political participation (the issues of public sphere, deliberative democracy and civil society) organizations and other economic institutions cultural participation and cultural diversity

Early on there were predictions that the Internet would change everything (or nothing); over time, however, a consensus emerged that the Internet, at least in the current phase of development, complements rather than displaces previously implemented media.[2] This has meant a rethinking of the 1990s ideas of "convergence of new and old media". Further, the Internet offers a rare opportunity to study changes caused by the newly emerged - and likely, still evolving - information and communication technology (ICT).[2]

Sociology of the Internet

309

Social impact
The Internet has created new forums of social interaction and social relations including social networking websites such as Facebook and MySpace and sites such as meetup.com and Couchsurfing which facilitate offline interaction. Though virtual communities were once thought to be composed of strictly virtual social ties, researchers often find that even those social ties formed in virtual spaces are often maintained both online and offline [3][4] There are ongoing debates about the impact of the Internet on strong and weak ties, whether the internet is creating more or less social capital,[5][6] the internet's role in trends towards social isolation,[7] and whether it creates a more or less diverse social environment.

Political organization and censorship


The Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States became famous for its ability to generate donations via the Internet, and the 2008 campaign of Barack Obama became even more so. Increasingly, social movements and other organizations use the Internet to carry out both traditional and the new Internet activism. Governments are also getting on-line. Some countries, such as those of Cuba, Iran, North Korea, Myanmar, the People's Republic of China, and Saudi Arabia, use filtering and censoring software to restrict what people in their countries can access on the Internet. With United Kingdom, they also use software to locate and arrest various individuals they perceive as a threat. Other countries, including the United States, have enacted laws making the possession or distribution of certain material, such as child pornography, illegal, but do not use filtering software. In some countries Internet service providers have agreed to restrict access to sites listed by police.

Philanthropy
The spread of low-cost internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites such as Donors Choose and Global Giving now allow small-scale donors to direct funds to individual projects of their choice. A popular twist on internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations which post stories and updates on behalf of the borrowers. Lenders can contribute as little as $25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves.[8][9] However, the recent spread of cheap internet access in developing countries has made genuine peer-to-peer connections increasingly feasible. In 2009 the US-based nonprofit Zidisha tapped into this trend to offer the first peer-to-peer microlending platform to link lenders and borrowers across international borders without local intermediaries. Inspired by interactive websites such as Facebook and eBay, Zidisha's microlending platform facilitates direct dialogue between lenders and borrowers and a performance rating system for borrowers. Web users worldwide can fund loans for as little as a dollar.[10]

Leisure
The Internet has been a major source of leisure since before the World Wide Web, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much of the main traffic. Today, many Internet forums have sections devoted to games and funny videos; short cartoons in the form of Flash movies are also popular. Over 6 million people use blogs or message boards as a means of communication and for the sharing of ideas.

Sociology of the Internet The pornography and gambling industries have both taken full advantage of the World Wide Web, and often provide a significant source of advertising revenue for other websites. Although governments have made attempts to censor internet porn, internet service providers have told governments that these plans are not feasible.[11] Also many governments have attempted to put restrictions on both industries' use of the Internet, this has generally failed to stop their widespread popularity. One area of leisure on the Internet is multiplayer gaming. This form of leisure creates communities, bringing people of all ages and origins to enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. This has revolutionized the way many people interact and spend their free time on the Internet. While online gaming has been around since the 1970s, modern modes of online gaming began with services such as GameSpy and MPlayer, to which players of games would typically subscribe. Non-subscribers were limited to certain types of gameplay or certain games. Many use the Internet to access and download music, movies and other works for their enjoyment and relaxation. As discussed above, there are paid and unpaid sources for all of these, using centralized servers and distributed peer-to-peer technologies. Discretion is needed as some of these sources take more care over the original artists' rights and over copyright laws than others. Many use the World Wide Web to access news, weather and sports reports, to plan and book holidays and to find out more about their random ideas and casual interests. People use chat, messaging and e-mail to make and stay in touch with friends worldwide, sometimes in the same way as some previously had pen pals. Social networking websites like MySpace, Facebook and many others like them also put and keep people in contact for their enjoyment. The Internet has seen a growing number of Web desktops, where users can access their files, folders, and settings via the Internet. Cyberslacking has become a serious drain on corporate resources; the average UK employee spends 57 minutes a day surfing the Web at work, according to a study by Peninsula Business Services.[12]

310

References
[1] Robert Darnton, The Library in the New Age (http:/ / www. nybooks. com/ articles/ 21514), The New York Review of Books, Volume 55, Number 10. June 12, 2008. Retrieved on 22 December 2009. [2] Paul DiMaggio, Eszter Hargittai, W. Russell Neuman, and John P. Robinson, Social Implications of the Internet, Annual Review of Sociology, Vol. 27: 307-336 (Volume publication date August 2001), doi:10.1146/annurev.soc.27.1.307 (http:/ / arjournals. annualreviews. org/ doi/ abs/ 10. 1146/ annurev. soc. 27. 1. 307) [3] Lauren F. Sessions, "How offline gatherings affect online community members: when virtual community members meetup.""Information, Communication, and Society"13,3(April, 2010):375-395 [4] Bo Xie, B. The mutual shaping of online and offline social relationships."Information Research, 1,3(2008):n.p. [5] Lee Rainie, John Horrigan, Barry Wellman, and Jeffrey Boase. (2006)"The Strength of Internet Ties" Pew Internet and American Life Project. Washington, D.C. [6] Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication, 12(4). [7] Social Isolation and New Technology Pew Internet and American Life Report (http:/ / www. pewinternet. org/ Reports/ 2009/ 18--Social-Isolation-and-New-Technology. aspx) [8] Kiva Is Not Quite What It Seems (http:/ / blogs. cgdev. org/ open_book/ 2009/ 10/ kiva-is-not-quite-what-it-seems. php), by David Roodman, Center for Global Development, Oct. 2, 2009, as accessed Jan. 2 & 16, 2010 [9] Confusion on Where Money Lent via Kiva Goes (http:/ / www. nytimes. com/ 2009/ 11/ 09/ business/ global/ 09kiva. html?_r=1& scp=1& sq=Kiva& st=cse), by Stephanie Strom, in The New York Times, Nov. 8, 2009, as accessed Jan. 2 & 16, 2010 [10] "Zidisha Set to "Expand" in Peer-to-Peer Microfinance", Microfinance Focus, Feb 2010 (http:/ / www. microfinancefocus. com/ news/ 2010/ 02/ 07/ zidisha-set-to-expand-in-peer-to-peer-microfinance-julia-kurnia/ ) [11] Chivers, Tom (Dec 21 2010). "Internet pornography block plans: other attempts to control the internet" (http:/ / www. telegraph. co. uk/ technology/ internet/ 8215030/ Internet-pornography-block-plans-other-attempts-to-control-the-internet. html). The Telegraph. . Retrieved 24 February 2012.

Sociology of the Internet


[12] Scotsman.com News - Net abuse hits small city firms (http:/ / news. scotsman. com/ topics. cfm?tid=914& id=1001802003)

311

Further reading
John A. Bargh and Katelyn Y. A. McKenna, The Internet and Social Life, Annual Review of Psychology, Vol. 55: 573-590 (Volume publication date February 2004), doi:10.1146/annurev.psych.55.090902.141922 (http:// arjournals.annualreviews.org/doi/abs/10.1146/annurev.psych.55.090902.141922?journalCode=psych) Allison Cavanagh, Sociology in the Age of the Internet, McGraw-Hill International, 2007, ISBN 0-335-21725-7 Christine Hine, Virtual Methods: Issues in Social Research on the Internet, Berg Publishers, 2005, ISBN 1-84520-085-3 Rob Kling, The Internet for Sociologists, Contemporary Sociology, Vol. 26, No. 4 (Jul., 1997), pp.434444 Joan Ferrante-Wallace, Joan Ferrante, Sociology.net: Sociology on the Internet, Thomson Wadsworth, 1996, ISBN 0-534-52756-6 Daniel A. Menchik and Xiaoli Tian. (2008) "Putting Social Context into Text: The Semiotics of Email Interaction." (http://menchik.com/Menchik_Tian_AJS.pdf) The American Journal of Sociology. 114:2 pp.33270. D. R. Wilson, Researching Sociology on the Internet, Thomson/Wadsworth, 2004, ISBN 0-534-62437-5

External links
Sociology and the Internet (http://www.sociology.org.uk/olinset.htm) (A short introduction, originally put-together for delegates to the ATSS 2000 Conference.) Peculiarities of Cyberspace - Building Blocks for an Internet Sociology (http://www.sociosite.org/index_en. php) (Articles the social structure and dynamic of internetcommunities. Presented by dr Albert Benschop, University of Amsterdam.) Communication and Information Technologies Section of the American Sociological Association (http://citasa. org/) The Impact of the Internet on Sociology: The Importance of the Communication and Information Technologies Section of the American Sociological Association (http://www.allacademic.com/meta/ p_mla_apa_research_citation/1/0/4/1/6/p104169_index.html) Sociology and the Internet (http://camden-www.rutgers.edu/~wood/445syl.html) (course) Sociology of the Internet (http://web.archive.org/web/20091026213335/http://geocities.com/ ResearchTriangle/1214/) (link collection) Internet sociologist (http://www.vts.intute.ac.uk/he/tutorial/sociologist) The Sociology of the Internet (http://www-frd.fsl.noaa.gov/~moninger/NOAATech2002/Relaxation.html)

Internet censorship

312

Internet censorship
Internet censorship is the control or suppression of the publishing of, or access to information on the Internet. It may be carried out by governments or by private organizations at the behest of government, regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences. Opinions on the topic of Internet censorship vary, with arguments being made both for and against censorship. Moreover, the extent of Internet censorship varies on a country-to-country basis. While some countries have little Internet censorship, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the Arab Spring. Other areas of censorship includes copyrights, defamation, harassment, and obscene material.

Overview
The events associated with Internet censorship are similar to those for online/offline censorship of traditional/modern media such as newspapers or internet. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.[1] Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies: A 1993 Time Magazine article quotes computer scientist John Gilmore, one of the founders of the Electronic Frontier Foundation, as saying "The Net interprets censorship as damage and routes around it."[2] In November 2007, "Father of the Internet" Vint Cerf stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.[3] A report of research conducted in 2007 and published in 2009 by the Berkman Center for Internet & Society at Harvard University stated that: "We are confident that the [ censorship circumvention ] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools".[4] In contrast, a 2011 report by researchers at the Oxford Internet Institute published by UNESCO concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."[1] Blocking and filtering can be based on relatively static blacklists or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, for example in libraries, universities or Internet cafes. Blocking and filtering may also vary within a country across different ISPs.[5] Countries may filter sensitive content on an on-going basis and/or introduce temporary filtering during key time periods such as elections. In some cases the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake "Not Found" error message when an attempt is made to access a blocked web.[6] Unless the censor has total control over all Internet-connected computers, such as in North Korea or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee

Internet censorship material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.[1] The term "splinternet" is sometimes used to describe the effects of national firewalls. The verb "rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.[7]

313

Around the world


As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using more sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the Middle Internet censorship by countryOpenNet Initiative "Summarized global Internet filtering East/North Africa. A few countries in data spreadsheet", 8 November 2011 and "Country Profiles", the OpenNet Initiative is a other regions also practice certain collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; forms of filtering. In the United States and the SecDev Group, OttawaDue to legal concerns the OpenNet Initiative does not state-mandated Internet filtering occurs check for filtering of child pornography and because their classifications focus on on some computers in libraries and technical filtering, they do not include other types of censorship. Internet Enemies, K-12 schools. Content related to Reporters Without Borders (Paris), 12March 2012 Nazism or Holocaust denial is blocked in France and Germany. Child pornography, hate speech, and sites that encourage the infringement of intellectual property rights are blocked in many countries throughout the world.[11] In fact, many countries throughout the world, including some democracies with long traditions of strong support for freedom of expression and freedom of the press, are engaged in some amount of online censorship, often with substantial public support.[12]

Reports, ratings, and trends


Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports.[13] The ratings produced by several of these organizations are summarized in the Internet censorship by country and the Censorship by country articles. OpenNet Initiative reports Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.[14] The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas (Egypt, France, Germany, India, Ukraine, United Kingdom, and United States), while one was found to engage in pervasive filtering in all three areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering

Internet censorship (China, Iran, Myanmar, and Tajikistan).[1][9] Freedom on the Net reports In the 2011 edition of Freedom House's report Freedom on the Net, of the 37 countries surveyed, 8 were rated as "free" (22%), 18 as "partly free" (49%), and 11 as "not free" (30%).[15] In their 2009 report, of the 15 countries surveyed, 4 were rated as "free" (27%), 7 as "partly free" (47%), and 4 as "not free" (27%).[16] And of the 15 countries surveyed in both 2009 and 2011, 5 were seen to be moving in the direction of more network freedom (33%), 9 moved toward less freedom (60%), and one was unchanged (7%). "Internet enemies" and "countries under surveillance" lists In 2006, Reporters Without Borders (Reporters sans frontires, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet".[17] The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users."[18] In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added. Both lists are updated annually.[19]
Enemies of the Internet: Armenia Bahrain Belarus Burma Mainland China Cuba [10] Iran North Korea Countries Under Surveillance: Australia Egypt Eritrea France India Kazakhstan Malaysia Russia [10] South Korea Sri Lanka Thailand Tunisia Turkey United Arab Emirates

314

Saudi Arabia Syria Turkmenistan Uzbekistan Vietnam

When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. Belarus, Egypt, and Tunisia moved to the "Countries under surveillance" list in 2009, 2011, and 2011 respectively. Belarus moved back and Bahrain was added to the list in 2012. When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 14. In addition to the moves to and from the "Enemies of the Internet" list noted earlier, Jordan in 2009, Tajikistan in 2009, and Yemen in 2010 were dropped from the list and Australia in 2009, France in 2011, Russia in 2010, South Korea in 2009, Turkey in 2010 were added. Bahrain, Eritrea, Malaysia, and Sri Lanka dropped from the list in 2010, but were added again in 2011. Libya dropped from the list in 2009, added again in 2011, and then dropped in 2012. Venezuela was added in 2011 and then dropped in 2012. BBC World Service global public opinion poll A poll of 27,973 adults in 26 countries, including 14,306 Internet users,[20] was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that: Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most dont want governments to regulate it.[21] Findings from the poll include:[21] Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom. Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".

Internet censorship Opinion was evenly split between Internet users who felt that the internet is a safe place to express my opinions (48%) and those who disagreed (49%). Somewhat surprisingly users in Germany and France agreed the least, followed by users in highly filtered countries such as the People's Republic of China and South Korea, while users in Egypt, India and Kenya agreed more strongly.[1] The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%). Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion).[22] And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Japan, 11% in the U.S., 11% in Kenya, 11% in Pakistan, and 10% in Canada strongly disagree).[1]

315

Transparency of filtering or blocking activities


Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information.[5] For example: Saudi Arabia and the United Arab Emirates (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. In contrast, countries such as China and Tunisia send users a false error indication. China blocks requests by users for a banned website at the router level and a connection error is returned, effectively preventing the user's IP address from making further HTTP requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of SmartFilter, the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page. In Uzbekistan users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.[23]

Arab Spring
See also: Internet Censorship in the Arab Spring, 2011 Egyptian Internet shutdown, and Free speech in the media during the 2011 Libyan civil war During the Arab Spring of 2011, media jihad (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.[24] This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt[25][26][27] and Libya in 2011.[28][29] In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian regime. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient TV, and Dubai-based al-Arabia TV.[30] In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved Tunisia and Egypt from its "Internet enemies" list to its list of countries "under surveillance"[31] and in 2012 dropped Libya from the list entirely.[10] At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring.[32][33]

Internet censorship

316

Common targets
There are several motives or rationales for Internet censorship: politics and power, social norms and morals, and security concerns. Protecting intellectual property rights and existing economic interests are two additional motives for Internet censorship. In addition, networking tools and applications that allow the sharing of information related to these motives are themselves subjected to filtering and blocking. And while there is considerable variation from country to country, the blocking of web sites in a local language is roughly twice that of web sites available only in English or other international languages.[6]

Politics and power


Censorship directed at political opposition to the ruling government is common in authoritarian and repressive regimes. Some countries block web sites related to religion and minority groups, often when these movements represent a threat to the ruling regimes.[6] Examples include: Political blogs and web sites[34] Lse majest sites, sites with content that offends the dignity of or challenges the authority of a reigning sovereign or of a state Falun Gong and Tibetan exile group sites in China or Buddist, Cao Dai faith, and indigenous hill tribes sites in Vietnam Sites aimed at religious conversion from Islam to Christianity[6]

Social norms and morals


Social filtering is censorship of topics that are held to be antithetical to accepted societal norms.[6] In particular censorship of child pornography and to protect children enjoys very widespread public support and such content is subject to censorship and other restrictions in most countries. Examples include: Sex and erotic, fetishism, prostitution, and pornographic sites Child pornography and pedophile related sites (see also CIRCAMP) Gay and Lesbian sites Sites seen as promoting illegal drug use (Erowid)[35] Gambling sites Sites encouraging or inciting violence Sites promoting criminal activity Sites that include hate speech

Nazi and similar websites particularly in France and Germany[36] Sites that contain blasphemous content, particularly when directed at a majority or state supported religion Sites that contain defamatory, slanderous, or libelous content Sites that include political satire

Internet censorship

317

Security concerns
Many organisations implement filtering as part of a defence in depth strategy to protect their environments from malware,[37] and to protect their reputations in the event of their networks being used, for example, to carry out sexual harassment. Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.[6] Examples include: Blocking of proNorth Korean sites by South Korea[38] Blocking sites of groups that foment domestic conflict in India Blocking of sites of the Muslim Brotherhood in some countries in the Middle East Blocking Wikileaks[39] Blocking sites such as 4chan thought to be related to the group Anonymous[40]

Protection of intellectual property and existing economic interests


Sites that share content that violates copyright or other intellectual property rights are often blocked, particularly in western Europe and North America. In addition the protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use Voice over Internet Protocol (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.[6] Christian Engstrm, Rick Falkvinge and Oscar Swartz reported on a copyright lobby organizations intent to use child pornography as a pretext to get politicians to implement site blocking, to later use it for copyright-related blocking.[41][42] Examples include: Filesharing and Peer-to-peer (P2P) related websites such as The Pirate Bay Skype Sites that sell or distribute music, but are not 'approved' by rights holders, such as allofmp3

Network tools
Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.[6] Examples include: Media sharing websites (e.g. Flickr and YouTube)[43] Social networks (e.g. Facebook and MySpace) Translation sites and tools E-mail providers Web hosting sites Blog hosting sites such as Blogspot Microblogging sites such as Twitter and Weibo[44] Wikipedia Censorship circumvention sites Anonymizers Proxy avoidance sites Search engines such as Bing[45] and Google[46][47] particularly in Mainland China and Cuba[48]

Internet censorship

318

Content suppression methods


Non-technical censorship
Internet content is subject to censorship methods similar to those used with more traditional media. For example:[1] Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests. Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content. Publishers and authors may accept bribes to include, withdraw, or slant the information they present. Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment. Publishers, authors, and ISPs may be subject to civil lawsuits. Equipment may be confiscated and/or destroyed. Publishers and ISPs may be closed or required licenses may be withheld or revoked. Publishers, authors, and ISPs may be subject to boycotts. Publishers, authors, and their families may be subject to threats, attacks, beatings, and even murder.[49] Publishers, authors, and their families may be threatened with or actually lose their jobs. Individuals may be paid to write articles and comments in support of particular positions or attacking opposition positions, usually without acknowledging the payments to readers and viewers.[50][51] Censors may create their own online publications and Web sites to guide online opinion.[50] Access to the Internet may be limited due to restrictive licensing policies or high costs. Access to the Internet may be limited due to a lack of the necessary infrastructure, deliberate or not.

Technical censorship
Approaches Internet content is also subject to technical censorship methods, including:[1][52] Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses. Domain name system (DNS) filtering and redirection: Blocked domain names are not resolved, or an incorrect IP address is returned via DNS hijacking or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find a Alternative DNS root that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser. Uniform Resource Locator filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.[53] Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored. Typical circumvention methods are to use encrypted connections such as VPN and TLS/SSL to escape the HTML content, or by reducing the TCP/IP stack's MTU/MSS to reduce the amount of text contained in a given packet.

Internet censorship Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.[54] Network disconnection: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). This appears to have been the case on 27/28 January 2011 during the 2011 Egyptian protests, in what has been widely described as an "unprecedented" internet block.[26][27] About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January.[26] This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now."[26] Full blocks also occurred in Myanmar/Burma in 2007[55], Libya in 2011[28], and Syria in 2012. Portal censorship and search result removal: Major portals, including search engines, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect as censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example Google.de [56] and Google.fr [57] remove Neo-Nazi and other listings in compliance with German and French law.[58] Computer network attacks: Denial-of-service attacks and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.[59] See also Internet forum#Word censor and Anti-spam techniques#Detecting spam. Over- and under-blocking Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired.[1] An example is that automatic censorship against sexual words in matter for children, set to block the word "cunt", has been known to block the Lincolnshire placename Scunthorpe.[60] Another example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.[61] According to a report produced in 1997 by the gay rights group GLAAD, many 90s-era Internet censorship software products prevent access to non-pornographic LGBT-related material. GLAAD argued that this is disempowering and dangerous for young LGBT people.[62] Use of commercial filtering software Writing in 2009 Ronald Deibert, professor of political science at the University of Toronto and co-founder and one of the principal investigators of the OpenNet Initiative, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University and an Op-Ed contributor to the New York Times, explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online Screenshot of Websense blocking Facebook in an content filtering worldwide. While the off-the-shelf filtering software organisation where it has been configured to block a category named "Personals and Dating" sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.[63][64]

319

Internet censorship Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee in 2008. SmartFilter has been used by Tunisia, Saudi Arabia, Sudan, the UAE, Kuwait, Bahrain, Iran, and Oman, as well as the United States and the UK.[65] Myanmar and Yemen have used filtering software from Websense. The Canadian-made commercial filter Netsweeper[66] is used in Qatar, the UAE, and Yemen.[14] In a U.S. lawsuit filed in May 2011, Cisco Systems is accused of helping the Chinese Government build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents. Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.[67] Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), ....[14] The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites.[63] The blocking of DailyMotion in early 2007 by Tunisian authorities was, according to the OpenNet Initiative, due to Secure Computing wrongly categorizing DailyMotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked DailyMotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to DailyMotion was gradually restored in Tunisia.[68] Organizations such as the Global Network Initiative, the Electronic Frontier Foundation, Amnesty International, and the American Civil Liberties Union have successfully lobbied some vendors such as Websense to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly.[69][70][71] Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.[14]

320

Circumvention
Internet censorship circumvention is the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet, because filtering and blocking do not remove content from the Internet but rather block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However circumvention may not be possible by non tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.[1] Different techniques and resources are used to bypass Internet censorship, including proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.[72] In June 2011 the New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by

Internet censorship censoring or shutting down telecommunications networks."[73]

321

Major web portal official statements on site and content removal


Most major web service operators reserve to themselves broad rights to remove or pre-screen content, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in Terms of Service agreements. Facebook: Among other things the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".[74] Google: Google's general Terms of Service were updated on 1 March 2012 and state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act".[75] Google Search: Google's Webmaster Tools help includes the following statement: "Google may temporarily or permanently remove sites from its index and search results if it believes it is obligated to do so by law, if the sites do not meet Google's quality guidelines, or for other reasons, such as if the sites detract from users' ability to locate relevant information."[76] Twitter: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be [copyright] infringing without prior notice and at our sole discretion".[77] YouTube: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".[78] Wikipedia: Content within a Wikipedia article may be modified or deleted by any editor as part of the normal process of editing and updating articles. All editing decisions are open to discussion and review. The Wikipedia Deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in an encyclopedia can propose its deletion. Such a page can be deleted by any administrator if, after seven days, no one objects to the proposed deletion. Speedy deletion allows for the deletion of articles without discussion and is used to remove pages that are so obviously inappropriate for Wikipedia that they have no chance of surviving a deletion discussion. All deletion decisions may be reviewed, either informally or formally.[79] Yahoo!: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."[80]

Internet censorship

322

References
This article incorporates licensed material [81] from the OpenNet Initiative web site.[82]
[1] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet (http:/ / www. unesco. org/ new/ en/ communication-and-information/ resources/ publications-and-communication-materials/ publications/ full-list/ freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4 [2] "First Nation in Cyberspace" (http:/ / www. chemie. fu-berlin. de/ outerspace/ internet-article. html), Philip Elmer-Dewitt, Time, 6 December 1993, No.49 [3] "Cerf sees government control of Internet failing" (http:/ / www. reuters. com/ article/ reutersEdge/ idUSN1420689320071114?sp=true), Pedro Fonseca, Reuters, 14 November 2007 [4] 2007 Circumvention Landscape Report: Methods, Uses, and Tools (http:/ / cyber. law. harvard. edu/ sites/ cyber. law. harvard. edu/ files/ 2007_Circumvention_Landscape. pdf), Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009 [5] ed. Chadwick, Andrew (2009). Routledge handbook of Internet politics (http:/ / books. google. com/ books/ about/ Routledge_handbook_of_Internet_politics. html?id=GJdfuGSa1xUC). Routledge international handbooks. Taylor and Francis. pp.332. ISBN978-0-415-42914-6. . [6] "Measuring Global Internet Filtering" (http:/ / opennet. net/ sites/ opennet. net/ files/ Deibert_02_Ch01_005-028. pdf), Robert Faris and Nart Villeneuve, in Access Denied: The Practice and Policy of Global Internet Filtering (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=11329), Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 [7] Lao Wai (21 October 2007). "I've Been Rivercrabbed!" (http:/ / americaninbeijing. blogspot. com/ 2007/ 10/ ive-been-rivercrabbed. html). An American In Beijing. . Retrieved 28 May 2011. [8] OpenNet Initiative "Summarized global Internet filtering data spreadsheet" (http:/ / opennet. net/ research/ data), 8 November 2011 and "Country Profiles" (http:/ / opennet. net/ research/ profiles), the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa [9] Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. [10] Internet Enemies (http:/ / march12. rsf. org/ i/ Report_EnemiesoftheInternet_2012. pdf), Reporters Without Borders (Paris), 12March 2012 [11] "Introduction" (http:/ / mitpress. mit. edu/ books/ chapters/ 0262541963intro1. pdf), Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=11329), Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 [12] "Internet Filtering: The Politics and Mechanisms of Control" (http:/ / opennet. net/ sites/ opennet. net/ files/ Deibert_03_Ch02_029-056. pdf), Jonathan Zittrain and John Palfrey, in Access Denied: The Practice and Policy of Global Internet Filtering (http:/ / mitpress. mit. edu/ catalog/ item/ default. asp?ttype=2& tid=11329), Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds., MIT Press (Cambridge), 2008 [13] "2010 Country Reports on Human Rights Practices" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ index. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [14] "West Censoring East: The Use of Western Technologies by Middle East Censors, 20102011" (http:/ / opennet. net/ west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011), Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011 [15] Freedom on the Net 2011 (http:/ / www. freedomhouse. org/ template. cfm?page=664), Freedom House. Retrieved 1 September 2011 [16] Freedom on the Net 2009 (http:/ / freedomhouse. org/ template. cfm?page=383& report=79), Freedom House. Retrieved 1 September 2011 [17] List of the 13 Internet enemies (http:/ / en. rsf. org/ list-of-the-13-internet-enemies-07-11-2006,19603) Reporters Without Borders (Paris), 11July 2006. [18] "Internet enemies" (http:/ / www. rsf. org/ IMG/ pdf/ Internet_enemies_2009_2_. pdf), Reporters Without Borders (Paris), 12March 2009. [19] Web 2.0 versus Control 2.0. (http:/ / www. rsf. org/ ennemis. html) Reporters Without Borders (Paris), 18March 2010. [20] For the BBC poll Internet users are those who used the Internet within the previous six months. [21] "BBC Internet Poll: Detailed Findings" (http:/ / news. bbc. co. uk/ 1/ shared/ bsp/ hi/ pdfs/ 08_03_10_BBC_internet_poll. pdf), BBC World Service, 8 March 2010 [22] "Internet access is 'a fundamental right'" (http:/ / news. bbc. co. uk/ 2/ hi/ 8548190. stm), BBC News, 8 March 2010 [23] ed. Chadwick (2009). pp.331. [24] "The Arab Springs Cascading Effects" (http:/ / www. miller-mccune. com/ politics/ the-cascading-effects-of-the-arab-spring-28575/ ), Philip N. Howard, Miller-McCune, 23 February 2011 [25] "Middle East Political Protest And Internet Traffic Report: February 1220, 2011" (http:/ / monkey. org/ ~labovit/ blog/ / viewpage. php?page=middle_east_scorecard_feb20), Craig Labovitz, Arbor Networks [26] Cowie, James. "Egypt Leaves the Internet" (http:/ / www. renesys. com/ blog/ 2011/ 01/ egypt-leaves-the-internet. shtml). Renesys. Archived (http:/ / www. webcitation. org/ 5w51j0pga) from the original on 28 January 2011. . Retrieved 28 January 2011.

Internet censorship
[27] Kirk, Jeremy (28 January 2011). "With Wired Internet Locked, Egypt Looks to the Sky" (http:/ / www. pcworld. com/ businesscenter/ article/ 218064/ with_wired_internet_locked_egypt_looks_to_the_sky. html). IDG News/PC World. Archived (http:/ / www. webcitation. org/ 5w518Yu9B) from the original on 28 January 2011. . Retrieved 28 January 2011. [28] "Journalists confined to their hotels, Internet disconnected" (http:/ / en. rsf. org/ journalists-confined-to-their-04-03-2011,39681. html). Journalists confined to their hotels, Internet disconnected. Reporters Without Borders. . Retrieved 21 March 2011. [29] Dainotti et al. (2011). "Analysis of Country-wide Internet Outages Caused by Censorship" (http:/ / www. caida. org/ publications/ papers/ 2011/ outages_censorship/ outages_censorship. pdf). ACM. . [30] "Syrian Electronic Army: Disruptive Attacks and Hyped Targets" (http:/ / opennet. net/ syrian-electronic-army-disruptive-attacks-and-hyped-targets), OpenNet Initiative, 25 June 2011 [31] "Countries under surveillance: Egypt" (http:/ / en. rsf. org/ surveillance-egypt,39740. html), Reporters Without Borders, March 2011 [32] "Censorship fallout from the Arab Spring?" (http:/ / www. future500. org/ blog/ censorship-fallout-from-the-arab-spring/ ), Juliette Terzieff, The Future 500, 29 June 2011 [33] "Insight: Social media a political tool for good or evil?" (http:/ / ca. reuters. com/ article/ technologyNews/ idCATRE78R3CM20110928?pageNumber=1& virtualBrandChannel=0), Peter Apps, Reuters Canada, 28 September 2011 [34] Blog censorship gains support | CNET News.com (http:/ / www. news. com/ Blog-censorship-gains-support/ 2100-1028_3-5670096. html) [35] "Erowid Interview" (http:/ / erowidethnography. files. wordpress. com/ 2011/ 05/ erowid-interview. pdf). . Retrieved 26 May 2011. [36] "Latest Stories From News.Com.Au" (http:/ / www. theaustralian. news. com. au/ story/ 0,25197,22885402-12335,00. html). . [37] "Why Malware Filtering Is Necessary in the Web Gateway" (http:/ / www. gartner. com/ id=747218). Gartner. 26 August 2008. . Retrieved 14 April 2012. [38] "Collateral Blocking: Filtering by South Korean Government of Pro-North Korean Websites" (http:/ / opennet. net/ bulletins/ 009/ ), OpenNet Initiative: Bulletin 009, 31 January 2005 [39] Press release from WIkileaks concerning Australian censorship (http:/ / wikileaks. org/ wiki/ Australia_secretly_censors_Wikileaks_press_release_and_Danish_Internet_censorship_list,_16_Mar_2009) [40] "Federal authorities take on Anonymous hackers" (http:/ / www. washingtonpost. com/ politics/ federal-authorities-take-on-anonymous-hackers/ 2011/ 09/ 11/ gIQAYrhgMK_story. html), Associated Press in the Washington Post, 12 September 2011 [41] Rick Falkvinge (9 July 2011). "The Copyright Lobby Absolutely Loves Child Pornography" (https:/ / torrentfreak. com/ the-copyright-lobby-absolutely-loves-child-pornography-110709/ ) (in en). TorrentFreak. . Retrieved 26 July 2012. [42] Christian Engstrm (27 April 2010). "IFPIs child porn strategy" (https:/ / christianengstrom. wordpress. com/ 2010/ 04/ 27/ ifpis-child-porn-strategy/ ) (in en). . Retrieved 26 July 2012. [43] YouTube Blocked inThailand (http:/ / mashable. com/ 2007/ 03/ 11/ youtube-blocked-inthailand/ ) [44] "China struggles to tame microblogging masses" (http:/ / www. independent. co. uk/ life-style/ gadgets-and-tech/ china-struggles-to-tame-microblogging-masses-2351509. html), Agence France-Presse (AFP) in The Independent, 8 September 2011 [45] "Sex, Social Mores, and Keyword Filtering: Microsoft Bing in the "Arabian Countries (http:/ / opennet. net/ sex-social-mores-and-keyword-filtering-microsoft-bing-arabian-countries)", Helmi Noman, OpenNet Initiative, March 2010 [46] "Google Search & Cache Filtering Behind China's Great Firewall" (http:/ / opennet. net/ bulletins/ 006/ ), OpenNet Initiative: Bulletin 006, 3 September 2004 [47] "Empirical Analysis of Google SafeSearch" (http:/ / cyber. law. harvard. edu/ archived_content/ people/ edelman/ google-safesearch/ ), Benjamin Edelman, Berkman Center for Internet & Society, Harvard Law School, 13 April 2003 [48] "China blocking Google" (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 2231101. stm). BBC News. 2 September 2002. . Retrieved 5 May 2010. [49] "In Mexico, Social Media Become a Battleground in the Drug War" (http:/ / thelede. blogs. nytimes. com/ 2011/ 09/ 15/ in-mexico-social-media-becomes-a-battleground-in-the-drug-war/ ), J. David Goodman, The Lede, New York Times, 15 September 2011 [50] Provision of information in this fashion is in keeping with principles of freedom of expression, as long as it is done transparently and does not overwhelm alternative sources of information. [51] "Chinas growing army of paid internet commentators" (http:/ / blog. freedomhouse. org/ weblog/ 2011/ 10/ chinas-growing-army-of-paid-internet-commentators. html), Sarah Cook and Maggie Shum, Freedom House, 11 October 2011 [52] "Empirical Analysis of Internet Filtering in China: Technical Appendix" (http:/ / cyber. law. harvard. edu/ filtering/ china/ appendix-tech. html), Jonathan Zittrain and Benjamin Edelman, Berkman Center for Internet & Society at Harvard Law School, 20 March 2003 [53] For an example, see Wikipedia:Advice to users using Tor to bypass the Great Firewall [54] Academics break the Great Firewall of China (http:/ / www. zdnetasia. com/ news/ security/ 0,39044215,39372326,00. htm) [55] "Pulling the Plug: A Technical Review of the Internet Shutdown in Burma", OpenNet Initiative, November 2007 (http:/ / opennet. net/ research/ bulletins/ 013) [56] http:/ / www. google. de/ [57] http:/ / www. google. fr/ [58] Google excluding controversial sites (http:/ / news. com. com/ 2100-1023-963132. html), Declan McCullagh, CNET News, 23 October 2002, 8:55pm PDT. Retrieved 22 April 2007 00:40 UTC [59] "The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army" (http:/ / opennet. net/ emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army), Helmi Noman,

323

Internet censorship
OpenNet Initative, May 2011 [60] Declan McCullagh (23 April 2004). "Google's chastity belt too tight" (http:/ / news. cnet. com/ 2100-1032_3-5198125. html). . [61] "India blocks Yahoo! Groups" (http:/ / www. theregister. co. uk/ 2003/ 09/ 24/ india_blocks_yahoo_groups/ ), Andrew Orlowski, The Register, 24 September 2003 [62] "Access Denied" (http:/ / web. archive. org/ web/ 19990117013223/ http:/ / www. glaad. org/ glaad/ access_denied/ index. html). GLAAD. Archived from the original (http:/ / www. glaad. org/ glaad/ access_denied/ index. html) on 17 January 1999. . Retrieved 5 May 2012. [63] ed. Chadwick (2009). pp.330331. [64] "Political Repression 2.0" (http:/ / www. nytimes. com/ 2011/ 09/ 02/ opinion/ political-repression-2-0. html), Evgeny Morzov, Op-Ed Contributor to the New York Times, 1 September 2011 [65] Glanville, Jo (17 November 2008). "The big business of net censorship" (http:/ / www. guardian. co. uk/ commentisfree/ 2008/ nov/ 17/ censorship-internet). The Guardian (London). . [66] "Internet content filtering" (http:/ / www. netsweeper. com/ index. php?page=netsw_prod_content_filtering), Netsweeper, Inc. web site. Retrieved 1 September 2011 [67] "Group Says It Has New Evidence of Ciscos Misdeeds in China" (http:/ / www. nytimes. com/ 2011/ 09/ 03/ technology/ group-says-it-has-new-evidence-of-ciscos-misdeeds-in-china. html), Somini Sengupta, New York Times, 2 September 2011 [68] ed. Chadwick (2009). pp.323324. [69] The Rhode Island affiliate, American Civil Liberties Union (April 2005). "R.I. ACLU releases report on "troubling" internet censorship in public libraries" (http:/ / web. archive. org/ web/ 20081205070114/ http:/ / www. riaclu. org/ 20050418. html). Archived from the original (http:/ / www. riaclu. org/ 20050418. html) on 8 December 2008. . full report (http:/ / www. riaclu. org/ friendly/ documents/ 2005libraryinternetreport. pdf) [70] Sutton, Maira; Timm, Trevor (7 November 2011). "This Week in Internet Censorship Egypt Imprisons Alaa, Other Pro-democracy Bloggers" (https:/ / www. eff. org/ deeplinks/ 2011/ 11/ week-internet-censorship ). Electronic Frontier Foundation. . Retrieved 27 March 2012. [71] China: Controls tighten as Internet activism grows (http:/ / www. amnesty. org/ en/ library/ asset/ ASA17/ 001/ 2004/ en/ 9dc9d9e2-d64d-11dd-ab95-a13b602c0642/ asa170012004en. pdf) "Cisco Systems, Microsoft, Nortel Networks, Websense and Sun Microsystems", citing Amnesty International: Peoples Republic of China: State Control of the Internet in China, ASA, 17/007/2002, November 2002. [72] "Risks" (http:/ / en. cship. org/ wiki/ Risks), Internet censorship wiki. Retrieved 2 September 2011 [73] "U.S. Underwrites Internet Detour Around Censors" (http:/ / www. nytimes. com/ 2011/ 06/ 12/ world/ 12internet. html?pagewanted=all), James Glanz and John Markoff, New York Times, 12 June 2011 [74] "Statement of Rights and Responsibilities" (http:/ / www. facebook. com/ terms. php), Facebook, 26 April 2011. Retrieved 18 August 2011 [75] "Google Terms of Service" (http:/ / www. google. com/ intl/ en/ policies/ terms/ ), Policies & Principles, Google, Inc.. Retrieved 1 April 2012 [76] "Why does Google remove sites from the Google index?" (http:/ / www. google. com/ support/ webmasters/ bin/ answer. py?answer=40052), Google Webmaster Tools Help. Retrieved 22 April 2007 00:43 UTC [77] "Terms of Service" (http:/ / twitter. com/ tos), Twitter, 1 June 2011. Retrieved 18 August 2011 [78] "Terms of Service" (http:/ / www. youtube. com/ static?gl=US& template=terms), YouTube, 9 June 2010. Retrieved 18 August 2011 [79] "Deletion policy", Wikipedia. Retrieved 18 August 2011 [80] "Yahoo! Terms of Service" (http:/ / info. yahoo. com/ legal/ us/ yahoo/ utos/ utos-173. html), Yahoo!, 24 November 2008. Retrieved 18 August 2011 [81] http:/ / creativecommons. org/ licenses/ by/ 3. 0/ us/ [82] Creative Commons Attribution 3.0 Unported license (http:/ / creativecommons. org/ licenses/ by/ 3. 0/ deed. en), see the lower right corner of pages at the OpenNet Initiative web site (http:/ / opennet. net/ )

324

External links
Censorship Wikia (http://censorship.wikia.com/), an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship. How to Bypass Internet Censorship (http://www.howtobypassinternetcensorship.org/), also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp. "Index on Censorship" (http://indexoncensorship.org), web site for the London based organization and magazine that promotes freedom of expression. Internet censorship wiki (http://en.cship.org/wiki/Main_Page), provides information about different methods of access filtering and ways to bypass them.

Internet censorship "Media Freedom Internet Cookbook" (http://www.osce.org/fom/13836) by the OSCE Representative on Freedom of the Media, Vienna, 2004. Discussion (http://cyber.law.harvard.edu/interactive/events/2008/03/access_denied) of global net filtering, Berkman Center for Internet & Society, Harvard, March 2008 Global survey (http://web20summit.blip.tv/file/1450774) of Web filtering & blocking: Rebecca MacKinnon at Web 2.0 Summit, November 2008 "Free Speech in the Age of YouTube" (http://www.nytimes.com/2012/09/23/sunday-review/ free-speech-in-the-age-of-youtube.html) in the New York Times, 22 September 2012

325

Internet censorship circumvention


Internet censorship circumvention is the process used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet, because filtering and blocking do not remove content from the Internet and as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However, circumvention may not be very useful to non tech-savvy users and so blocking and filtering remain effective means of censoring the Internet for many users.[1] Different techniques and resources are used to bypass Internet censorship, including cached web pages, mirror and archive sites, alternate DNS servers, proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws.[2] There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law, and if caught can be expelled from school, fired from jobs, jailed, or subject to other punishments and loss of access.[3]

Circumvention, anonymity, risks, and trust


Circumvention and anonymity are different. Circumvention systems are designed to bypass blocking, but they do not usually protect identities. Anonymous systems protect a user's identity. And while they can contribute to circumvention, that is not their primary function. It is important to understand that open public proxy sites do not provide anonymity and can view and record the location of computers making requests as well as the websites accessed.[4] In many jurisdictions accessing blocked content is a serious crime, particularly content that is considered child pornography, a threat to national security, or an incitement of violence. Thus it is important to understand the circumvention technologies and the protections they do or do not provide and to use only tools that are appropriate in a particular context. Great care must be taken to install, configure, and use circumvention tools properly. Individuals associated with high profile rights organizations, dissident, protest, or reform groups should take extra precautions to protect their online identities.[4] Circumvention sites and tools should be provided and operated by trusted third parties located outside the censoring jurisdiction that do not collect identities and other personal information. Best are trusted family and friends personally known to the circumventor, but when family and friends are not available, sites and tools provided by individuals or organizations that are only known by their reputations or through the recommendations and endorsement of others may need to be used. Commercial circumvention services may provide anonymity while surfing the Internet, but could be compelled by law to make their records and users' personal information available to

Internet censorship circumvention law enforcement.[4]

326

Methods
There are many methods available that may allow the circumvention of Internet filtering. They range from the simple to the complex and from the trivial to the difficult in terms of implementation. Of course, not all methods will work to bypass all filters. And censorship tools and sites are themselves subject to censorship and monitoring. Circumventing censorship using proxies gives access to international content, but doesnt address domestic censorship and access to more local content. Nor does it offer a defense against DDoS or other attacks that target a publisher.[4][5]

Cached Pages
Some search engines keep cached pages, copies of previously indexed Web pages, and these pages are not always blocked. Cached pages may be identified with a small link labeled "cached" in a list of search results. Google allows the retrieval of cached pages by entering "cache:some-blocked-url" as a search request.

Mirror and archive sites


Copies of web sites or pages may be available at mirror or archive sites such as www.archive.org [6] and the alternate sites may not be blocked.

Web to E-mail services


Web to e-mail services such as www.web2mail.com [7] will return the contents of web pages with or without images as an e-mail message and such access may not be blocked.

RSS aggregators
RSS aggregators such as Google Reader and Bloglines may be able to receive and pass on RSS feeds that are blocked when accessed directly.

IP addresses and domain names


Alternative domain names may not be blocked. For example the following domain names all refer to the same web site: http:/ / wikimedia. org, http:/ / www. wikimedia. org, http:/ / text. wikimedia. org, and http:/ / text. pmtpa. wikimedia.org. Or alternative URLs may not be blocked. For example: www.blocked.com vs. www.blocked.com/, blocked.com, blocked.com/, www.blocked.com/index.htm, and www.blocked.com/index.html. Entering an IP address rather than a domain name (http:/ / 208. 80. 152. 2) or a domain name rather than an IP address (http://wikimedia.org) will sometimes allow access to a blocked site. Specifying an IP address in a base other than 10 may bypass some filters. The following URLs all access the same site, although not all browsers will recognize all forms: http:/ / 208. 80. 152. 2 (dotted decimal), http:/ / 3494942722 (decimal), http:/ / 0320. 0120. 0230. 02 (dotted octal), http:/ / 0xd0509802 (hexadecimal), and http:/ / 0xd0. 0x50. 0x98.0x2 (dotted hexadecimal).

Internet censorship circumvention

327

Alternative DNS Servers


Using DNS servers other than those supplied by default by an ISP may bypass DNS based blocking. OpenDNS and Google [8] offer DNS services or see List of Publicly Available and Completely Free DNS Servers [9].

Proxy websites
Proxy websites are often the simplest and fastest way to access banned websites in censored nations. Such websites work by being themselves un-blocked, but capable of displaying the blocked material. This is usually accomplished by entering a URL which the proxy website will fetch and display. Using the https protocol is recommended since it is encrypted and harder to block. A list of web proxies is available from web sites such as http:/ / www. proxy. org/ or by searching for "free web proxy". Most modern web browsers have preferences or allow plug-ins to enable proxies. Translation services such as babelfish.yahoo.com [10] and translate.google.com [11] are a specific type of proxy website and can sometimes be used to display blocked pages even when no translation is needed by asking for a translation into the same language that is used on the original site or by asking for a translation from a language that does not appear on the original site.

Reverse Proxy
A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching. Websites could use reverse proxy to reroute traffic to avoid censorship.[12]

Virtual Private Networks (VPNs)


Using Virtual Private Networks, a user who experiences internet censorship can create a secure connection to a more permissive country, and browse the internet as if they were situated in that country. Some services are offered for a monthly fee, others are ad-supported.

Sneakernets
The Sneakernet is the transfer of electronic information, especially computer files, by physically carrying data on storage media from one place to another. A sneakernet can move data regardless of network restrictions simply by not using the network at all.[13]

Software
Types: CGI proxies use a script running on a web server to perform the proxying function. A CGI proxy client sends the requested url embedded within the data portion of an HTTP request to the CGI proxy server. The CGI proxy server pulls the ultimate destination information from the data embedded in the HTTP request, sends out its own HTTP request to the ultimate destination, and then returns the result to the proxy client. A CGI proxy tool's security can be trusted as far as the operator of the proxy server can be trusted. CGI proxy tools require no manual configuration of the browser or client software installation, but they do require that the user use an alternative, potentially confusing browser interface within the existing browser. HTTP proxies send HTTP requests through an intermediate proxying server. A client connecting through an HTTP proxy sends exactly the same HTTP request to the proxy as it would send to the destination server unproxied. The HTTP proxy parses the HTTP request; sends its own HTTP request to the ultimate destination server; and then returns the response back to the proxy client. An HTTP proxy tool's security can be trusted as far as the operator of the proxy server can be trusted. HTTP proxy tools require either manual configuration of the browser or client side

Internet censorship circumvention software that can configure the browser for the user. Once configured, an HTTP proxy tool allows the user transparently to use his normal browser interface. Application proxies are similar to HTTP proxies, but support a wider range of online applications. Peer-to-peer systems store content across a range of participating volunteer servers combined with technical techniques such as re-routing to reduce the amount of trust placed on volunteer servers or on social networks to establish trust relationships between server and client users. Peer-to-peer system can be trusted as far as the operators of the various servers can be trusted or to the extent that the architecture of the peer-to-peer system limits the amount of information available to any single server and the server operators can be trusted not to cooperate to combine the information they hold. Re-routing systems send requests and responses through a series of proxying servers, encrypting the data again at each proxy, so that a given proxy knows at most either where the data came from or is going to, but not both. This decreases the amount of trust required of the individual proxy hosts.
Name alkasir [14] Type HTTP proxy Developer Yemeni journalist Walid al-Saqaf Cost free Web site www.alkasir.com [15] Notes Uses 'split-tunneling' to only redirect to proxy servers when blocking is encountered. Is not a general circumvention solution and only allows access to certain blocked websites. In particular it does not allow access to blocked websites that contain pornography, nudity or similar adult content. [17] Transparently tunnels traffic through Anonymizer. Turn a computer into a personal, encrypted proxy server capable of retrieving and displaying web pages to users of the server. CGIProxy is the engine used by many other circumvention systems. Turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages for others. Uses a range of open proxies to access blocked web sites via DIT's DynaWeb anti-censorship network. A decentralized, distributed data store using contributed bandwidth and storage space of member computers to provide strong anonymity protection. Provides a secure and anonymous Internet connection. Supports multiple applications, including Web browsers, multimedia players, email, instant messengers, and download managers. [31] A SOCKS server, managing all data transmissions between the computer and the network. Supports multiple applications.

328

Anonymizer

[16]

HTTP proxy

Anonymizer, Inc.

fee

www.anonymizer.com/

CGIProxy

[18]

HTTP proxy

James Marshall

free

www.jmarshall.com/

[19]

Circumventor

[20]

CGI proxy

Peacefire

free

peacefire.org/

[21]

[22] Freegate

HTTP proxy

Dynamic Internet Technology, Inc.

free

www.dit-inc.us

[23]

Freenet

[24]

peer-to-peer

Ian Clarke

free

freenetproject.org

[25]

Ghost Surf [28]

[26]

HTTP proxy

Tenebril, Inc.

fee

www.tenebril.com [29]

[27]

GPass

Application proxy

World's Gate, Inc.

free

gpass1.com/

HTTP Tunnel

[30]

Application proxy

HTTP-Tunnel Corporation

free & fee

www.http-tunnel.com

Internet censorship circumvention


[32] I2P (originally Invisible Internet Project) [34] Java Anon Proxy (also known as JAP or JonDonym) [33]

329
I2P Project free Uses a pseudonymous overlay network to allow anonymous web browsing, chatting, file transfers, amongst other features. Uses the underlying anonymity service AN.ON to allow browsing with revocable pseudonymity. Originally developed as part of a project of the Technische Universitt Dresden, the Universitt Regensburg, and the Privacy Commissioner of Schleswig-Holstein. A simple-to-administer Internet censorship circumvention system that can be scaled for use by a home user serving a few friends to a cloud-based infrastructure serving thousands. An encrypted, public, web-based circumvention system. Because the site is public, it is blocked in many countries and by most filtering applications. Uses an encrypted VPN tunnel to access the Relakks servers in Sweden. [44] An encrypted, public, web-based circumvention system. Because the site is public, it is blocked in many countries and by most filtering applications. [45] mousematrix.com is a similar site based on the same software. Allows users to bypass Internet censorship while providing strong anonymity. Anti-censorship product that allows users in countries with heavy internet censorship to protect their internet privacy and security. Simple unobtrusive proxy. Uses RSA to encrypt the requests, transports via normal HTTP connections. For the gateway, a machine with uncensored internet access, is required.

re-routing

www.i2p2.de/

re-routing (fixed)

Jondos GmbH

free & fee

anonymous-proxy-servers.net [35]

Psiphon

[36][37]

CGI proxy

Psiphon, Inc.

free

psiphon.ca

[38]

Proxify

[39]

HTTP proxy

UpsideOut, Inc.

free & fee

proxify.com/

[40]

Relakks

[41]

Application proxy [43] HTTP proxy

Trygghetsbolaget i fee Lund AB Peacefire free

stupidcensorship.com/ [42] www.relakks.com stupidcensorship.com/

StupidCensorship

[46] Tor [48] Ultrasurf

re-routing (randomized) HTTP proxy

The Tor Project

free

www.torproject.org

[47]

Ultrareach Internet free Corporation

www.ultrasurf.us/

[49]

scotty

[50]

HTTP proxy

OpenSource

free

www.scotty-transporter.org/ [51]

Shadow Internet and cell phone networks


In June 2011 the New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."[52]

Summary
The Berkman Center for Internet & Society's 2007 Circumvention Landscape Report included the following observations:[53] We were reassured to discover that most [circumvention] tools function as intended. They allow users to circumvent Internet censorship, even in countries like China and Vietnam, which use sophisticated technology to filter. However, we discovered that all tools slow down access to the Internet, that most tools featured

Internet censorship circumvention serious security holes [some of which were patched during or shortly after the study], and that some tools were extremely difficult for a novice Internet user to use. ...we guess that the number of people using circumvention tools is around two to five million users worldwide. This number is quite high in absolute terms but quite low relative to the total number of filtered Internet users (China alone has over two hundred million Internet users). Even accepting likely high end estimates of the project developers, we believe that less than two percent of all filtered Internet users use circumvention tools. ... we now think it likely that simple web proxies represent at least as great if not greater proportion of circumvention tool usage as do the more sophisticated tools included in this report. An assumption of this report was that only users at the margins would rely on simple proxies because of the trouble of constantly finding new proxies as old ones were blocked by countries. We now have some evidence that that assumption is false (both that users are not using the simple proxies and that filtering countries are blocking simple proxies quickly). Its worth nothing that none of the developers we spoke to, individually and at our convening, foresaw a silver bullet that would solve the problem of filtering circumvention. All the tools rely, to a certain degree, on providing more proxies than the authorities can block and continuing to create new proxies as old ones are blocked. The preferred technical term for this strategy is Whack a Mole, a reference to an American fairground game, and while none of the developers are thrilled about an ongoing arms race with censors, some are taking complex steps to ensure theyll have many more proxies than the government can shut down. We are confident that the tool developers will for the most part keep ahead of the governments' blocking efforts.

330

References
[1] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet (http:/ / www. unesco. org/ new/ en/ communication-and-information/ resources/ publications-and-communication-materials/ publications/ full-list/ freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4 [2] New Technologies Battle and Defeat Internet Censorship (http:/ / www. internetfreedom. org/ files/ WhitePaper/ TechnologiesBattleAndDefeatInternetCensorship70920. pdf), Global Internet Freedom Consortium, 20 September 2007 [3] "Risks" (http:/ / en. cship. org/ wiki/ Risks), Internet censorship wiki, accessed 2 September 2011 [4] Everyone's Guide to By-passing Internet Censorship (http:/ / www. nartv. org/ mirror/ circ_guide. pdf), The Citizen Lab, University of Toronto, September 2007 [5] "Circumventing Network Filters Or Internet Censorship Using Simple Methods, VPNs, And Proxies" (http:/ / www. notascoolasitseems. com/ review/ circumventing-network-filters-or-internet-censorship-using-simple-methods-vpns-and-proxies), Not As Cool As It Seems, 16 December 2009, accessed 16 September 2011 [6] http:/ / www. archive. org/ [7] http:/ / www. web2mail. com [8] http:/ / code. google. com/ speed/ public-dns/ [9] http:/ / pcsupport. about. com/ od/ tipstricks/ a/ free-public-dns-servers. htm [10] http:/ / babelfish. yahoo. com/ [11] http:/ / translate. google. com [12] "faq of unblock.cn.com" (https:/ / unblock. cn. com/ faq). unblock.cn.com. . [13] Sullivan, Bob (13 April 2006) Military Thumb Drives Expose Larger Problem (http:/ / redtape. msnbc. com/ 2006/ 04/ military_thumb_. html) MSNBC Retrieved on 25 January 2007. [14] "About alkasir" (https:/ / www. alkasir. com/ about), alkasir.com, accessed 16 September 2011 [15] https:/ / www. alkasir. com [16] www.anonymizer.com/ (http:/ / www. anonymizer. com/ ), Anonymizer, Inc., accessed 16 September 2011 [17] http:/ / www. anonymizer. com/ [18] CGIProxy" (http:/ / www. jmarshall. com/ tools/ cgiproxy/ ), James Marshall, accessed 17 September 2011 [19] http:/ / www. jmarshall. com/ [20] "How to install the Circumventor program, which gets around all Web-blocking software" (http:/ / www. peacefire. org/ circumventor/ simple-circumventor-instructions. html), Bennett Haselton, accessed 17 September 2011 [21] http:/ / peacefire. org/ [22] "About D.I.T." (http:/ / www. dit-inc. us/ about_us), Dynamic Internet Technology, accessed 16 September 2011

Internet censorship circumvention


[23] http:/ / www. dit-inc. us [24] "What is Freenet?" (https:/ / freenetproject. org/ whatis. html), The Freenet Project, accessed 16 September 2011 [25] https:/ / freenetproject. org [26] "Ghost Surf Overview" (http:/ / www. tenebril. com/ v2009/ consumer/ consumergs. php), Tenebril, Inc., accessed 16 September 2011 [27] http:/ / www. tenebril. com [28] "GPass Home" (http:/ / gpass1. com/ gpass/ ), World's Gate, Inc., accessed 22 September 2011 [29] http:/ / gpass1. com/ gpass/ [30] "HTTP Tunnel Client" (http:/ / www. http-tunnel. com/ html/ solutions/ http_tunnel/ client. asp), HTTP-Tunnel Corporation, accessed 22 September 2011 [31] http:/ / www. http-tunnel. com [32] "I2P Anonymous Network" (http:/ / www. i2p2. de/ ), I2P Project, accessed 16 September 2011 [33] http:/ / www. i2p2. de/ [34] "Revocable Anonymity" (http:/ / anon. inf. tu-dresden. de/ publications/ KWF2006ETRICSRevocableAnonymity. pdf), Stefan Kpsell, Rolf Wendolsky, Hannes Federrath, in Proc. Emerging Trends in Information and Communication Security: International Conference, Gnter Mller (Ed.), ETRICS 2006, Freiburg, Germany, June 69, 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, pp.206-220 [35] https:/ / anonymous-proxy-servers. net/ en/ [36] "About Psiphon" (http:/ / psiphon. ca/ ?page_id=94), Psiphon, Inc., 4 April 2011 [37] "Psiphon Content Delivery Software" (https:/ / launchpad. net/ psiphon), Launchpad, accessed 16 September 2011 [38] http:/ / psiphon. ca [39] "About Proxify" (https:/ / proxify. com/ about. shtml), UpsideOut, Inc., accessed 17 September 2011 [40] https:/ / proxify. com/ [41] Relakks: How it works (https:/ / www. relakks. com/ faq/ security/ ), Trygghetsbolaget i Lund AB, accessed 22 September 2011 [42] https:/ / www. relakks. com [43] About StupidCensorship.com (http:/ / www. aboutus. org/ StupidCensorship. com), Peacefire, accessed 17 September 2011 [44] https:/ / stupidcensorship. com/ [45] http:/ / www. mousematrix. com/ [46] "Tor: Overview" (https:/ / www. torproject. org/ about/ overview. html. en), The Tor Project, Inc., accessed 16 September 2011 [47] https:/ / www. torproject. org [48] "About UltraReach" (http:/ / www. ultrasurf. us/ about. html), Ultrareach Internet Corp., accessed 16 September 2011 [49] http:/ / www. ultrasurf. us/ [50] "About scotty" (http:/ / www. scotty-transporter. org) [51] http:/ / www. scotty-transporter. org/ [52] "U.S. Underwrites Internet Detour Around Censors" (http:/ / www. nytimes. com/ 2011/ 06/ 12/ world/ 12internet. html?pagewanted=all), James Glanz and John Markoff, New York Times, 12 June 2011 [53] 2007 Circumvention Landscape Report: Methods, Uses, and Tools (http:/ / cyber. law. harvard. edu/ sites/ cyber. law. harvard. edu/ files/ 2007_Circumvention_Landscape. pdf), Hal Roberts, Ethan Zuckerman, and John Palfrey, Beckman Center for Internet & Society at Harvard University, March 2009

331

External links
Casting A Wider Net: Lessons Learned in Delivering BBC Content on the Censored Internet (http://uoft.me/ casting), Ronald Deibert, Canada Centre for Global Security Studies and Citizen Lab, Munk School of Global Affairs, University of Toronto, 11 October 2011 Censorship Wikia (http://censorship.wikia.com/), an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship "Circumvention Tool Evaluation: 2011" (http://cyber.law.harvard.edu/publications/2011/ 2011_Circumvention_Tool_Evaluation), Hal Roberts, Ethan Zuckerman, and John Palfrey, Berkman Centre for Internet & Society, 18 August 2011 "Circumvention Tool Usage Report: 2010" (http://cyber.law.harvard.edu/publications/2010/ Circumvention_Tool_Usage), Hal Roberts, Ethan Zuckerman, Jillian York, Robert Faris, and John Palfrey, Berkman Centre for Internet & Society, 14 October 2010 Digital Security and Privacy for Human Rights Defenders (http://www.frontlinedefenders.org/manuals/en/ esecman/), by Dmitri Vitaliev, Published by Front Line - The International Foundation for the Protection of Human Rights Defenders

Internet censorship circumvention "DNS Nameserver Swapping" (http://www.ab9il.net/crypto/dns-swapping.html), Methods and Scripts useful for evading censorship through DNS filtering. How to Bypass Internet Censorship (http://www.howtobypassinternetcensorship.org/), also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp. Translations have been published in Arabic (http://en.flossmanuals.net/bypassing-ar), Burmese (http://en. flossmanuals.net/circumvention-tools-mn), Chinese (http://en.flossmanuals.net/circumvention-tools-zh), Farsi (http://en.flossmanuals.net/bypassing-fa), Russian (http://en.flossmanuals.net/bypassing-ru), Spanish (http:/ /en.flossmanuals.net/bypassing-es), and Vietnamese (http://en.flossmanuals.net/bypassing-vi). Internet censorship wiki (http://en.cship.org/wiki/Main_Page), provides information about different methods of access filtering and ways to bypass them. "Leaping over the Firewall: A Review of Censorship Circumvention Tools" (http://freedomhouse.org/uploads/ special_report/97.pdf), by Cormac Callanan (Ireland), Hein Dries-Ziekenheiner (Netherlands), Alberto Escudero-Pascual (Sweden), and Robert Guerra (Canada), Freedom House, April 2011 "Selected Papers in Anonymity" (http://freehaven.net/anonbib/topic.html), Free Haven Project, accessed 16 September 2011 "Ten Things to Look for in a Circumvention Tool" (https://www.torproject.org/press/presskit/ 2010-09-16-circumvention-features.pdf), Roger Dingledine, The Tor Project, September 2010

332

Internet censorship by country


Internet censorship by country provides information on the types and levels of Internet censorship or filtering that is occurring in countries around the world.

Classifications
Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports.[4] The ratings produced by several of these organizations are summarized below as well as in the Censorship by country article.

OpenNet Initiative
The OpenNet Initiative (ONI) classifies the magnitude of censorship or filtering occurring in a country in four areas of activity.[5]

Internet censorship by countryOpenNet Initiative "Summarized global Internet filtering data spreadsheet", 8 November 2011 and "Country Profiles", the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa Internet Enemies, Reporters Without Borders (Paris), 12March 2012Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship.

The magnitude or level of censorship is classified as follows: Pervasive: A large portion of content in several categories is blocked.

Internet censorship by country Substantial: A number of categories are subject to a medium level of filtering or many categories are subject to a low level of filtering. Selective: A small number of specific sites are blocked or filtering targets a small number of categories or issues. Suspected: It is suspected, but not confirmed, that Web sites are being blocked. No evidence: No evidence of blocked Web sites, although other forms of controls may exist. The classifications are done for the following areas of activity: Political: Views and information in opposition to those of the current government or related to human rights, freedom of expression, minority rights, and religious movements. Social: Views and information perceived as offensive or as socially sensitive, often related to sexuality, gambling, or illegal drugs and alcohol. Conflict/security: Views and information related to armed conflicts, border disputes, separatist movements, and militant groups. Internet tools: e-mail, Internet hosting, search, translation, and Voice-over Internet Protocol (VoIP) services, and censorship or filtering circumvention methods. Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide.[6] The level of filtering was classified in 26 countries in 2007 and in 25 countries in 2009. Of the 41 separate countries classified in these two years, seven were found to show no evidence of filtering (Egypt, France, Germany, India, the Ukraine, the United Kingdom, and the United States), while one was found to engage in pervasive filtering in all areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering (China, Iran, Myanmar, and Tajikistan).[7]

333

Reporters Without Borders


In 2006, Reporters without Borders (Reporters sans frontires, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet".[8] The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users."[9] In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added. Both lists are updated annually.[10]
Enemies of the Internet: Bahrain Belarus Burma China Cuba Iran [2] North Korea Countries Under Surveillance: Australia Egypt Eritrea France India Kazakhstan Malaysia [2] Russia South Korea Sri Lanka Thailand Tunisia Turkey United Arab Emirates

Saudi Arabia Syria Turkmenistan Uzbekistan Vietnam

When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. Belarus, Egypt, and Tunisia moved to the "Countries under surveillance" list in 2009, 2011, and 2011 respectively. Belarus moved back and Bahrain was added to the list in

Internet censorship by country 2012. When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 14. In addition to the moves to and from the "Enemies of the Internet" list noted earlier, Jordan in 2009, Tajikistan in 2009, and Yemen in 2010 were dropped from the list and Australia in 2009, France in 2011, Russia in 2010, South Korea in 2009, Turkey in 2010 were added. Bahrain, Eritrea, Malaysia, and Sri Lanka dropped from the list in 2010, but were added again in 2011. Libya dropped from the list in 2009, added again in 2011, and then dropped in 2012. Venezuela was added in 2011 and then dropped in 2012.

334

Freedom on the Net reports


Freedom House has produced three editions of its report Freedom on the Net, the first in 2009 surveyed 15 countries,[11] the second in 2011 surveyed 37 countries,[11] and the third in 2012 surveyed 47 countries.[11]

Freedom on the Net Survey Results


2009 Countries Free 15 4 (27%) [11] 2011 37 8 (22%) [11] 2012 47 14 (30%) [11]

Partly free 7 (47%) Not free Improved Declined 4 (27%) n/a n/a

18 (49%) 20 (43%) 11 (30%) 13 (28%) 5 (33%) 9 (60%) 1 (7%) 11 (31%) 17 (47%) 8 (22%)

No change n/a

In addition the 2012 report identified seven countries that were at particular risk of suffering setbacks related to Internet freedom in late 2012 and in 2013: Azerbaijan, Libya, Malaysia, Pakistan, Rwanda, Russia, and Sir Lanka. In most of these countries the Internet is currently a relatively open and unconstrained space for free expression, but the countries also typically feature a repressive environment for traditional media and have recently considered or introduced legislation that would negatively affect Internet freedom.[11]

Country classifications
The classifications that follow are based on the classifications and ratings from both the OpenNet Initiative (ONI) and the Reporters Without Boarders (RWB).

Pervasive censorship
While there is no universally agreed upon definition of what constitutes "pervasive censorship", a country is included in this classification when it is included on the "Internet enemies" list maintained by Reporters Without Borders,[8] or when the OpenNet Initiative categorizes the level of Internet filtering as pervasive in any of the four areas (political, social, conflict/security, and Internet tools) for which they test. Such nations often censor political, social, and other content and may retaliate against citizens who violate the censorship with imprisonment or other sanctions.

Internet censorship by country Bahrain Listed as pervasive in the political and social areas, as substantial in Internet tools, and as selective in conflict/security by ONI in August 2009.[5] Listed as an Internet enemy by RWB in 2012.[2] Bahrain enforces an effective news blackout using an array of repressive measures, including keeping the international media away, harassing human rights activists, arresting bloggers and other online activists (one of whom died in detention), prosecuting free speech activists, and disrupting communications, especially during major demonstrations.[2] On 5 January 2009 the Ministry of Culture and Information issued an order (Resolution No 1 of 2009)[12] pursuant to the Telecommunications Law and Press and Publications Law of Bahrain that regulates the blocking and unblocking of websites. This resolution requires all ISPs among other things to procure and install a website blocking software solution chosen by the Ministry. The Telecommunications Regulatory Authority ("TRA") assisted the Ministry of Culture and Information in the execution of the said Resolution by coordinating the procurement of the unified website blocking software solution. This software solution is operated solely by the Ministry of Information and Culture and neither the TRA nor ISPs have any control over sites that are blocked or unblocked. Belarus Listed as selective in the political, social, conflict/security and Internet tools areas by ONI in November 2010.[5] Listed as an Internet enemy by RWB in 2012.[2] The Internet in Belarus, as a space used for circulating information and mobilizing protests, has been hard hit as the authorities increased the list of blocked websites and partially blocked the Internet during protests. As a way to limit coverage of demonstrations some Internet users and bloggers have been arrested and others have been invited to preventive conversations with the police. Law No. 317-3, which took effect on 6 January 2012, reinforced Internet surveillance and control measures.[2] The Belarus government has moved to second- and third-generation controls to manage its national information space. Control over the Internet is centralized with the government-owned Beltelecom managing the countrys Internet gateway. Regulation is heavy with strong state involvement in the telecommunications and media market. Most users who post online media practice a degree of self-censorship prompted by fears of regulatory prosecution. The president has established a strong and elaborate information security policy and has declared his intention to exercise strict control over the Internet under the pretext of national security. The political climate is repressive and opposition leaders and independent journalists are frequently detained and prosecuted.[13] Burma Listed as pervasive in the political area and as substantial in social, conflict/security, and Internet tools by ONI in December 2010.[14] Listed as an Internet enemy by RWB in 2011.[2] Burma (also known as Myanmar) has a very low Internet penetration rate due to both government restrictions on pricing and deliberate lack of facilities and infrastructure.[15] The internet is regulated by the Electronic Act which bans the importing and use of a modem without official permission, and the penalty for violating this is a 15 year prison sentence, as it is considered "damaging state security, national unity, culture, the national economy and law and order."[9] However, internet usage is widely spread in the major cities and towns, with internet cafes and chat rooms. The internet speed is deliberately slowed and a range of websites, from politics to pornography are banned by the Ministry of Post and Telecommunications. Burma has banned the websites of political opposition groups, sites relating to human rights, and organizations promoting democracy in Burma.[16] During the 2007 anti-government protests, Burma completely shut down all internet links from its country.[17]

335

Internet censorship by country China Listed as pervasive in the political and conflict/security areas and as substantial in social and Internet tools by ONI in June 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] The People's Republic of China blocks or filters Internet content relating to Tibetan independence, Taiwan independence, police brutality, the Tiananmen Square protests of 1989, freedom of speech, pornography, some international news sources and propaganda outlets (such as the VOA), certain religious movements (such as Falun Gong), and many blogging websites. At the end of 2007 51 cyber dissidents were reportedly imprisoned in China for their online postings.[18] Cuba Listed as an Internet enemy by RWB in 2011.[2] Not categorized by ONI due to lack of data. Cuba has the lowest ratio of computers per inhabitant in Latin America, and the lowest internet access ratio of all the Western hemisphere.[19] Citizens have to use government controlled "access points", where their activity is monitored through IP blocking, keyword filtering and browsing history checking. The government cites its citizens' access to internet services are limited due to high costs and the American embargo, but there are reports concerning the will of the government to control access to uncensored information both from and to the outer world.[20] The Cuban government continues to imprison independent journalists for contributing reports through the Internet to web sites outside of Cuba.[21] Salim Lamrani, a professor at Paris Descartes University, has accused Reporters Without Borders with making unsupported and contradictory statements regarding Internet connectivity in Cuba.[22] However, even with the lack of precise figures due to the secretive nature of the regime, testimonials from independent bloggers, activists, and international watchers support the view that it is difficult for most people to access the web and that harsh punishments for individuals that do not follow government policies are the norm.[23][24] The Committee to Protect Journalists has pointed to Cuba as one of the ten most censored countries around the world.[25] Iran Listed as pervasive in the political, social, and Internet tools areas and as substantial in conflict/security by ONI in June 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] The Islamic Republic of Iran continues to expand and consolidate its technical filtering system, which is among the most extensive in the world. A centralized system for Internet filtering has been implemented that augments the filtering conducted at the Internet service provider (ISP) level.[26] Filtering targets content critical of the government, religion, pornographic websites, political blogs, and women's rights websites, weblogs, and online magazines.[16][27] Bloggers in Iran have been imprisoned for their Internet activities.[28] The Iranian government temporarily blocked access, between 12 May 2006 and January 2009, to video-upload sites such as YouTube.com.[29] Flickr, which was blocked for almost the same amount of time was opened in February 2009. But after 2009 election protests YouTube, Flickr, Twitter, Facebook and many more websites were blocked again.[30]

336

Internet censorship by country Kuwait Listed as pervasive in the social and Internet tools areas and as selective in political and conflict/security by ONI in June 2009.[5] The primary target of Internet filtering is pornography and, to a lesser extent, gay and lesbian content. Secular content and Web sites that are critical of Islam are also censored. Some Web sites that are related to religions other than Islam are blocked even though they are not necessarily critical of Islam.[31] The Kuwait Ministry of Communication regulates ISPs, forcing them to block pornography, anti-religion, anti-tradition, and anti-security websites to "protect the public by maintaining both public order and morality".[32] Both private ISPs and the government take actions to filter the Internet.[33][34] The Kuwait Institute for Scientific Research (KISR) operates the Domain Name System in Kuwait and does not register domain names which are "injurious to public order or to public sensibilities or otherwise do not comply with the laws of Kuwait".[35] Voice over Internet Protocol is illegal in Kuwait.[36] Not only have many VoIP Web sites been blocked by the MOC, but expatriates have been deported for using or running VOIP services.[37] In response to several videos declared "offensive to Muslims", Kuwaiti authorities called for the blocking of YouTube[38] and several Kuwaiti Members of Parliament called for stricter restrictions on online content.[39] Myanmar See Burma. North Korea Listed as an Internet enemy by RWB in 2011.[2] Not categorized by ONI due to lack of data.[40] North Korea is cut off from the internet, much as it is from other areas with respect to the world. Only a few hundred thousand citizens in North Korea, representing about 4% of the total population, have access to the Internet, which is heavily censored by the national government.[41] According to the RWB, North Korea is a prime example where all mediums of communication are controlled by the government. According to the RWB, the Internet is used by the North Korean government primarily to spread propaganda. The North Korean network is monitored heavily. All websites are under government control, as is all other media in North Korea.[42] Oman Listed as pervasive in the social area, as substantial in Internet tools, selective in political, and as no evidence in conflict/security by ONI in August 2009.[5] Oman engages in extensive filtering of pornographic Web sites, gay and lesbian content, content that is critical of Islam, content about illegal drugs, and anonymizer sites used to circumvent blocking. There is no evidence of technical filtering of political content, but laws and regulations restrict free expression online and encourage self-censorship.[43] Qatar Listed as pervasive in the social and Internet tools areas and selective in political and conflict/security by ONI in August 2009.[5] Qatar is the second most connected country in the Arab region, but Internet users have heavily censored access to the Internet. Qatar filters pornography, political criticism of Gulf countries, gay and lesbian content, sexual health resources, dating and escort services, and privacy and circumvention tools. Political filtering is highly selective, but journalists self-censor on sensitive issues such as government policies, Islam, and the ruling family.[44]

337

Internet censorship by country Saudi Arabia Listed as pervasive in the social and Internet tools areas, as substantial in political, and as selective in conflict/security by ONI in August 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] Saudi Arabia directs all international Internet traffic through a proxy run by the CITC. Content filtering is implemented there using software by Secure Computing.[45] Additionally, a number of sites are blocked according to two lists maintained by the Internet Services Unit (ISU):[46] one containing "immoral" (mostly pornographic) sites, the other based on directions from a security committee run by the Ministry of Interior (including sites critical of the Saudi government). Citizens are encouraged to actively report "immoral" sites for blocking, using a provided Web form. Many Wikipedia articles in different languages have been included in the censorship of "immoral" content in Saudi Arabia. The legal basis for content-filtering is the resolution by Council of Ministers dated 12 February 2001.[47] According to a study carried out in 2004 by the OpenNet Initiative: "The most aggressive censorship focused on pornography, drug use, gambling, religious conversion of Muslims, and filtering circumvention tools."[45] South Korea Listed as pervasive in the conflict/security area, as selective in social, and as no evidence in political and Internet tools by ONI in 2011.[1][5] Listed as Under Surveillance by RWB in 2011.[2] South Korea is a world leader in Internet and broadband penetration, but its citizens do not have access to a free and unfiltered Internet. South Koreas government maintains a wide-ranging approach toward the regulation of specific online content and imposes a substantial level of censorship on elections-related discourse and on a large number of Web sites that the government deems subversive or socially harmful.[48] The policies are particularly strong toward suppressing anonymity in the Korean internet. In 2007, numerous bloggers were censored and their posts deleted by police for expressing criticism of, or even support for, presidential candidates. This even lead to some bloggers being arrested by the police.[49] South Korea uses IP address blocking to ban web sites considered sympathetic to North Korea.[16][50] Illegal websites, such as those offering unrated games, pornography, and gambling, are also blocked. Syria Listed as pervasive in the political and Internet tools areas, and as selective in social and conflict/security by ONI in August 2009.[5] Listed as an Internet enemy by RWB in 2011.[2] Syria has banned websites for political reasons and arrested people accessing them. In addition to filtering a wide range of Web content, the Syrian government monitors Internet use very closely and has detained citizens "for expressing their opinions or reporting information online." Vague and broadly worded laws invite government abuse and have prompted Internet users to engage in self-censoring and self-monitoring to avoid the state's ambiguous grounds for arrest.[16][51]

338

Internet censorship by country Turkmenistan Listed as pervasive in the political area and as selective in social, conflict/security, and Internet tools by ONI in December 2010.[5] Listed as an Internet enemy by RWB in 2011.[2] Internet usage in Turkmenistan is under tight control of the government. Turkmen got their news through satellite television until 2008 when the government decided to get rid of satellites, leaving Internet as the only medium where information could be gathered. The Internet is monitored thoroughly by the government and websites run by human rights organizations and news agencies are blocked. Attempts to get around this censorship can lead to grave consequences.[52] United Arab Emirates Listed as pervasive in the social and Internet tools areas, as substantial in political, and as selective in conflict/security by ONI in August 2009.[5] Listed as Under Surveillance by RWB in 2011.[2] The United Arab Emirates forcibly censors the Internet using Secure Computing's solution. The nation's ISPs Etisalat and du (telco) ban pornography, politically sensitive material, all Israeli domains,[53] and anything against the perceived moral values of the UAE. All or most VoIP services are blocked. The Emirates Discussion Forum (Arabic: ,) or simply uaehewar.net, has been subjected to multiple censorship actions by UAE authorities.[54] Uzbekistan Classified by ONI as pervasive in the political and as selective in the social, conflict/security, and Internet tools areas in 2008.[1][5] Listed as an Internet enemy by RWB in 2011.[2] Uzbekistan prevents access to websites regarding banned Islamic movements, independent media, NGOs, and material critical of the government's human rights violations.[16] Some Internet cafes in the capital have posted warnings that users will be fined for viewing pornographic websites or website containing banned political material.[55] The main VoIP protocols SIP and IAX used to be blocked for individual users; however, as of July 2010, blocks were no longer in place. Facebook was blocked for few days in 2010.[56] Vietnam Classified by ONI as pervasive in the political, as substantial in the Internet tools, and as selective in the social and conflict/security areas in 2011.[1][5] Listed as an Internet enemy by RWB in 2011.[2] The main networks in Vietnam prevent access to websites critical of the Vietnamese government, expatriate political parties, and international human rights organizations, among others. Notably, websites with pornographic content. [16] Online police reportedly monitor Internet cafes and cyber dissidents have been imprisoned for advocating democracy.[57]

339

Internet censorship by country Yemen Listed as pervasive in the social and Internet tools areas, as substantial in the political, and as selective in the conflict/security areas by ONI in August 2009.[5] Listed as Under Surveillance by RWB in 2008 and 2009, but not in 2010 or 2011.[2] Yemen censors pornography, nudity, gay and lesbian content, escort and dating services, sites displaying provocative attire, Web sites which present critical reviews of Islam and/or attempt to convert Muslims to other religions, or content related to alcohol, gambling, and drugs.[58] Yemens Ministry of Information declared in April 2008 that the penal code will be used to prosecute writers who publish Internet content that "incites hatred" or "harms national interests".[59] Yemen's two ISPs, YemenNet and TeleYemen, block access to gambling, adult, sex education, and some religious content.[16] The ISP TeleYemen (aka Y.Net) prohibits "sending any message which is offensive on moral, religious, communal, or political grounds" and will report "any use or attempted use of the Y.Net service which contravenes any applicable Law of the Republic of Yemen". TeleYemen reserves the right to control access to data stored in its system in any manner deemed appropriate by TeleYemen.[60] In Yemen closed rooms or curtains that might obstruct views of the monitors are not allowed in Internet cafs, computer screens in Internet cafs must be visible to the floor supervisor, police have ordered some Internet cafs to close at midnight, and demanded that users show their identification cards to the caf operator.[61]

340

Substantial censorship
Countries included in this classification were found to practice substantial Internet filtering in at least one of the four areas (political, social, conflict/security, and Internet tools) for which ONI tests, but which were not already included in the pervasive censorship classification. This includes countries where a number of categories are subject to a medium level of filtering or many categories are subject to a low level of filtering. Armenia Listed as substantial in the political area and as selective in social, conflict/security, and Internet tools by ONI in November 2010.[5] Access to the Internet in Armenia is largely unfettered, although evidence of second- and third-generation filtering is mounting. Armenias political climate is volatile and largely unpredictable. In times of political unrest, the government has not hesitated to put in place restrictions on the Internet as a means to curtail public protest and discontent.[62] Ethiopia Listed as substantial in the political and as selective in social, conflict/security and Internet tools areas by ONI in September 2011.[5] Ethiopia has implemented a largely political filtering regime that blocks access to popular blogs and the Web sites of many news organizations, dissident political parties, and human rights groups. However, much of the media content that the government is attempting to censor can be found on sites that are not banned. The authors of the blocked blogs have in many cases continued to write for an international audience, apparently without sanction. However, Ethiopia is increasingly jailing journalists, and the government has shown a growing propensity toward repressive behavior both off- and online. Censorship is likely to become more extensive as Internet access expands across the country.[63]

Internet censorship by country Gaza and the West Bank Listed as substantial in the social area and as no evidence in political, conflict/security, and Internet tools by ONI in August 2009.[5] Access to Internet in the Palestinian territories remains relatively open, although social filtering of sexually explicit content has been implemented in Gaza. Internet in the West Bank remains almost entirely unfiltered, save for a single news Web site that was banned for roughly six months starting in late 2008. Media freedom is constrained in Gaza and the West Bank by the political upheaval and internal conflict as well as by the Israeli forces.[64] Indonesia Listed as substantial in the social area, as selective in the political and Internet tools areas, and as no evidence of filtering in the conflict/security area by ONI in 2011 based on testing done during 2009 and 2010. Testing also showed that Internet filtering in Indonesia is unsystematic and inconsistent, illustrated by the differences found in the level of filtering between ISPs.[65] Indonesia was rated "partly free" in Freedom on the Net 2011 with a score of 46, midway between the end of the "free" range at 30 and the start of the "not free" range at 60.[66] Although the government of Indonesia holds a positive view about the Internet as a means for economic development, it has become increasingly concerned over the impact of access to information and has demonstrated an interest in increasing its control over offensive online content, particularly pornographic and anti-Islamic online content. The government regulates such content through legal and regulatory frameworks and through partnerships with ISPs and Internet cafs.[65] Media reported that selective blocking of some web sites for brief periods began in 20072008. Indonesia ordered ISPs to block YouTube in April 2008 after Google reportedly did not respond to the governments request to remove the film Fitna by the Dutch parliamentarian Geert Wilders, which purportedly mocked the Prophet Muhammed.[67] In May 2010, when an account on Facebook promoted a competition to draw the Prophet Muhammad, government officials took a more focused approach and sent a letter to Facebook urging closure of the account, asked all ISPs to limit access to the accounts link, and invited the Indonesian Association of Internet Cafe Entrepreneurs to restrict access to the group. Due to opposition from bloggers and civil society, however, ISPs disregarded the governments requests, and the account remained accessible.[66] In March 2008, the government passed the Law on Information and Electronic Transactions (ITE Law), which broadened the authority of the Ministry of Communications and Information Technology (MCI) to include supervision of the flow of information and possible censorship of online content. In early 2010, the ministry published a draft Regulation on Multimedia Content that, if implemented, would require ISPs to filter or otherwise remove certain material. The types of content listed include vaguely worded categories such as pornography, gambling, hate incitement, threats of violence, exposure of private information, intellectual property, false information, and content that degrades a person or group on the basis of a physical or nonphysical attribute, such as a disability. Following a public outcry, the government announced that it would take time to process suggestions from the public before proceeding with the draft regulation.[66] Under the ITE Law anyone convicted of committing defamation online faces up to six years in prison, and a fine of up to 1 billion rupiah (US$111,000). As of June 2010, there were at least eight cases in which citizens had been indicted on defamation charges under the ITE Law for comments on e-mail lists, blogs, or Facebook. Prosecutions under the ITE Law have contributed to an increased atmosphere of fear, caution, and self-censorship among online writers and average users.[66]

341

Internet censorship by country Pakistan Listed as substantial in the conflict/security and as selective in the political, social, and Internet tools areas by ONI in 2011.[1][5] Pornography, Blasphemous Content on the internet is Blocked in Pakistan and is closed to access for general public. The access is managed by PTA (Pakistan Telecommunication Authority) Although the Pakistani government does not employ a sophisticated blocking system, a limitation which has led to collateral blocks on entire domains such as Blogspot.com and YouTube.com, it continues to block Web sites containing content it considers to be blasphemous, anti-Islamic, or threatening to internal security. Pakistan has blocked access to websites critical of the government.[68] Sudan Listed as substantial in the social and Internet tools areas and as selective in political, and as no evidence in conflict/security by ONI in August 2009.[5] Sudan openly acknowledges filtering content that transgresses public morality and ethics or threatens order. The state's regulatory authority has established a special unit to monitor and implement filtration; this primarily targets pornography and, to a lesser extent, gay and lesbian content, dating sites, provocative attire, and many anonymizer and proxy Web sites.[69]

342

Selective censorship
Countries included in this classification were found to practice selective Internet filtering in at least one of the four areas (political, social, conflict/security, and Internet tools) for which ONI tests, but which were not already included in the pervasive or substantial censorship classifications. This classification includes countries where a small number of specific sites are blocked or filtering targets a small number of categories or issues. Azerbaijan Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in November 2009.[5] The Internet in Azerbaijan remains largely free from direct censorship, although there is evidence of second- and third-generation controls.[70] Colombia Classified as selective in the social area and no evidence of filtering in the political, conflict, or tools areas by ONI in 2011.[1] There is no individual ONI country profile for Colombia, but it is included in the regional overview for Latin America.[67] Colombia blocks several websites as part of its Internet Sano program. In December 2009, an internaute was sent to prison for threatening president lvaro Uribe's sons.[71] Gambia Not individually classified by ONI,[5] but classified as selective based on the limited descriptions in the ONI profile for the sub-Saharan Africa region.[67] Gambia is a particularly egregious offender of the right to freedom of expression: in 2007 a Gambian journalist living in the US was convicted of sedition for an article published online; she was fined USD12,000;[72] in 2006 the Gambian police ordered all subscribers to an online independent newspaper to report to the police or face arrest.[73]

Internet censorship by country Georgia Listed as selective in the political and conflict/security areas and as no evidence in social and Internet tools by ONI in November 2010.[5] Access to Internet content in Georgia is largely unrestricted as the legal constitutional framework, developed after the 2003 Rose Revolution, established a series of provisions that should, in theory, curtail any attempts by the state to censor the Internet. At the same time, these legal instruments have not been sufficient to prevent limited filtering on corporate and educational networks. Georgias dependence on international connectivity makes it vulnerable to upstream filtering, evident in the March 2008 blocking of YouTube by Turk Telecom.[74] Georgia blocked all websites with addresses ending in .ru (top-level domain for Russian Federation) after South Ossetia War in 2008.[75] India Listed as "Partly Free" in Freedom on the Net 2011.[76] Listed as selective in all areas by ONI in 2011.[3][5] Listed as Under Surveillance by RWB in 2012.[2] Since the Mumbai bombings of 2008, the Indian authorities have stepped up Internet surveillance and pressure on technical service providers, while publicly rejecting accusations of censorship.[2] ONI describes India as:[5] A stable democracy with a strong tradition of press freedom, [that] nevertheless continues its regime of Internet filtering. However, Indias selective censorship of blogs and other content, often under the guise of security, has also been met with significant opposition. Indian ISPs continue to selectively filter Web sites identified by authorities. However, government attempts at filtering have not been entirely effective because blocked content has quickly migrated to other Web sites and users have found ways to circumvent filtering. The government has also been criticized for a poor understanding of the technical feasibility of censorship and for haphazardly choosing which Web sites to block. Italy Listed as selective in the social area and as no evidence in political, conflict/security, and Internet tools by ONI in December 2010.[5] Italy bans the use of foreign bookmakers over the Internet by mandating certain edits to DNS host files of Italian ISPs.[77][78] Italy is also blocking access to websites containing child pornography.[79] In 2008, Italy blocked also The Pirate Bay website[80][81] for some time, basing this censorship on a law on electronic commerce. As of 25 May 2010, access to The Pirate Bay is blocked again. Jordan Listed as selective in the political area and as no evidence in social, conflict/security, and Internet tools by ONI in August 2009.[5] Censorship in Jordan is relatively light, with filtering selectively applied to only a small number of sites. However, media laws and regulations encourage some measure of self-censorship in cyberspace, and citizens have reportedly been questioned and arrested for Web content they have authored. Censorship in Jordan is mainly focused on political issues that might be seen as a threat to national security due to the nation's close proximity to regional hotspots like Israel, Iraq, Lebanon, and the Palestinian territories.[82]

343

Internet censorship by country Kazakhstan Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in December 2010.[5] Listed as Under Surveillance by RWB in 2012.[2] In 2011 the government responded to an oil workers strike, a major riot, a wave of bombings, and the presidents ailing health by imposing new, repressive Internet regulations, greater control of information, especially online information, blocking of news websites, and cutting communications with the city of Zhanaozen during the riot.[2] Kazakhstan uses its significant regulatory authority to ensure that all Internet traffic passes through infrastructure controlled by the dominant telecommunications provider KazakhTelecom. Selective content filtering is widely used, and second- and third-generation control strategies are evident. Independent media and bloggers reportedly practice self-censorship for fear of government reprisal. The technical sophistication of the Kazakhstan Internet environment is evolving and the governments tendency toward stricter online controls warrant closer examination and monitoring.[83] Kyrgyzstan Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in December 2010.[5] Access to the Internet in Kyrgyzstan has deteriorated as heightened political tensions have led to more frequent instances of second- and third-generation controls. The government has become more sensitive to the Internets influence on domestic politics and enacted laws that increase its authority to regulate the sector.[83] Liberalization of the telecommunications market in Kyrgyzstan has made the Internet affordable for the majority of the population. However, Kyrgyzstan is an effectively cyberlocked country dependent on purchasing bandwidth from Kazakhstan and Russia. The increasingly authoritarian regime in Kazakhstan is shifting toward more restrictive Internet controls, which is leading to instances of upstream filtering affecting ISPs in Kyrgyzstan.[83] Libya Listed as selective in the political area and as no evidence in social, conflict/security, and Internet tools by ONI in August 2009.[5] The overthrow of the Gaddafi regime ended an era of censorship. Before his removal and death, Col. Gaddafi had tried to impose a news blackout by cutting access to the Internet.[2] Prior to this, Internet filtering under the Gaddafi regime had become more selective, focusing on a few political opposition Web sites. This relatively lenient filtering policy coincided with what was arguably a trend toward greater openness and increasing freedom of the press. However, the legal and political climate continued to encourage self-censorship in online media.[83] In 2006 Reporters Without Borders removed Libya from their list of Internet enemies after a fact-finding visit found no evidence of Internet censorship.[8] ONIs 20072008 technical test results contradicted that conclusion, however.[83] And in 2012 RWB removed Libya from its list of countries under surveillance.[2] Mauritania Classified by ONI as selective in the political and as no evidence in the social, security/conflict, and Internet tools areas in 2009.[1] There is no individual ONI country profile for Mauritania, but it is included in the ONI regional overview for the Middle East and North Africa.[67] There were no government restrictions on access to the Internet or reports that the government monitored email or Internet chat rooms in 2010. Individuals and groups could engage in the peaceful expression of views via the Internet, including by e-mail. There is a law prohibiting child pornography with penalties of two months to one year imprisonment and a 160,000 to 300,000 ouguiya ($550 to $1,034) fine.[84]

344

Internet censorship by country Internet access was available in urban areas throughout the country, with home access common among the affluent and internet cafs serving the remainder of the population. According to International Telecommunication Union statistics for 2009, approximately 2.28 percent of the country's inhabitants used the Internet.[84] Between 16 March and 19 March 2009 and again on 25 June 2009 the news Web site Taqadoumy was blocked.[67][84] On 26 February 2010, Hanevy Ould Dehah, director of Taqadoumy, received a presidential pardon after being detained since December 2009 despite having served his sentence for crimes against Islam and paying all imposed fines and legal fees. Dehah, who was originally arrested in June 2009 on charges of defamation of presidential candidate Ibrahima Sarr for publishing an article stating that Sarr bought a house with campaign money from General Aziz. Dehah, was sentenced in August 2009 to six months in prison and fined 30,000 ouguiya ($111) for committing acts contrary to Islam and decency. The sentencing judge accused Dehah of creating a space allowing individuals to express anti-Islamic and indecent views, based on a female reader's comments made on the Taqadoumy site calling for increased sexual freedom.[84] Moldova Listed as selective in the political area and as no evidence in social, conflict/security, and Internet tools by ONI in December 2010.[5] While State authorities have interfered with mobile and Internet connections in an attempt to silence protestors and influence the results of elections, Internet users in Moldova enjoy largely unfettered access despite the governments restrictive and increasingly authoritarian tendencies. Evidence of second- and third-generation controls is mounting. Although filtering does not occur at the backbone level, the majority of filtering and surveillance takes place at the sites where most Moldovans access the Internet: Internet cafe s and workplaces. Moldovan security forces have developed the capacity to monitor the Internet, and national legislation concerning illegal activities is strict.[85] Morocco Listed as selective in the social, conflict/security, and Internet tools areas and as no evidence in political by ONI in August 2009.[5] Internet access in Morocco is, for the most part, open and unrestricted. Moroccos Internet filtration regime is relatively light and focuses on a few blog sites, a few highly visible anonymizers, and for a brief period in May 2007, the video sharing Web site YouTube.[86] ONI testing revealed that Morocco no longer filters a majority of sites in favor of independence of the Western Sahara, which were previously blocked. The filtration regime is not comprehensive, that is to say, similar content can be found on other Web sites that are not blocked. On the other hand, Morocco has started to prosecute Internet users and bloggers for their online activities and writings.[87] Russia Listed as selective in the political and social areas and as no evidence in conflict/security and Internet tools by ONI in December 2010.[5] Listed as under surveillance by RWB in 2011.[2] The absence of overt state-mandated Internet filtering in Russia before November 2012 had led some observers to conclude that the Russian Internet represents an open and uncontested space. In fact, the Russian government actively competes in Russian cyberspace employing second- and third-generation strategies as a means to shape the national information space and promote pro-government political messages and strategies. This approach is consistent with the governments strategic view of cyberspace that is articulated in strategies such as the doctrine of information security. The DoS attacks against Estonia (May 2007) and Georgia (August 2008) may be an indication of the governments active interest in mobilizing and shaping activities in Russian cyberspace.[88] In 2004 Russia pressured Lithuania and in 2006 Sweden into shutting down the Kavkaz Center website, a site that supports creation of a Sharia state in North Caucasus and hosts videos on terrorist attacks on Russian forces in North

345

Internet censorship by country Caucasus.[89][90][91] In July 2012, the Russian State Duma passed the Bill 89417-6 which created a blacklist of Internet sites containing alleged child pornography, drug-related material, extremist material, and other content illegal in Russia.[92][93] The Russian Internet blacklist was officially launched in November 2012, despite criticism by major websites and NGOs.[94] Singapore Listed as selective in the social area and as no evidence in political, conflict/security, and Internet tools by ONI in May 2007.[5] The Republic of Singapore engages in minimal Internet filtering, blocking only a small set of pornographic Web sites. However, the state employs a combination of licensing controls and legal pressures to regulate Internet access and to limit the presence of objectionable content and conduct online.[95] In 2005 and 2006 three people were arrested and charged with sedition for posting racist comments on the Internet, of which two have been sentenced to imprisonment.[96] Some ISPs also block internet content related to recreational drug use. Singapore's government-run Media Development Authority maintains a confidential list of blocked websites that are inaccessible within the country. The Media Development Authority exerts control over Singapore's three ISPs to ensure that blocked content is entirely inaccessible. Tajikistan Listed as selective in the political area and as no evidence as in social, conflict/security, and Internet tools by ONI in December 2010.[5] Internet penetration remains low in Tajikistan because of widespread poverty and the relatively high cost of Internet access. Internet access remains largely unrestricted, but emerging second-generation controls have threatened to erode these freedoms just as Internet penetration is starting to have an impact on political life in the country. In the run-up to the 2006 presidential elections, ISPs were asked to voluntarily censor access to an opposition Web site, and other second-generation controls have begun to emerge.[97] Thailand Listed as selective in political, social, and Internet tools and as no evidence in conflict/security by ONI in 2011.[1][5] Listed as Under Surveillance by RWB in 2011.[2] Listed as "Not Free" in the Freedom on the Net 2011 report by Freedom House, which cites substantial political censorship and the arrest of bloggers and other online users.[98] Prior to the September 2006 military coup d'tat most Internet censorship in Thailand was focused on blocking pornographic websites. The following years have seen a constant stream of sometimes violent protests, regional unrest,[99] emergency decrees,[100] a new cybercrimes law,[101] and an updated Internal Security Act.[102] And year by year Internet censorship has grown, with its focus shifting to lse majest, national security, and political issues. Estimates put the number of websites blocked at over 110,000 and growing in 2010.[103] Reasons for blocking:

346

Internet censorship by country

347

Priorto [104] [105] 2006 2010 Reason 11% 77% lse majest content (content that defames, insults, threatens, or is unflattering to the King, includes national security and some political issues) pornographic content content related to gambling copyright infringement, illegal products and services, illegal drugs, sales of sex equipment, prostitution,

60% 2% 27%

22% <1% <1%

According to the Associated Press, the Computer Crime Act has contributed to a sharp increase in the number of lse majest cases tried each year in Thailand.[106] While between 1990 and 2005, roughly five cases were tried in Thai courts each year, since that time about 400 cases have come to triala 1,500 percent increase.[106] Tunisia Listed as selective in the social and Internet tools and as no evidence in the political and conflict/security areas by ONI in 2011.[1][5] Listed as Under Surveillance by RWB in 2011.[2] Tunisia has blocked thousands of websites (such as pornography, mail, search engine cached pages, online documents conversion and translation services) and peer-to-peer and FTP transfer using a transparent proxy and port blocking. Cyber dissidents including pro-democracy lawyer Mohammed Abbou have been jailed by the Tunisian government for their online activities.[107] Turkey Listed as selective in the political, social, and Internet tools areas and as no evidence as in conflict/security by ONI in December 2010.[5] Listed as under surveillance by RWB in 2011.[2] The Turkish government has implemented legal and institutional reforms driven by the countrys ambitions to become a European Union member state, while at the same time demonstrating its high sensitivity to defamation and other inappropriate online content, which has resulted in the closure of a number of local and international Web sites. All Internet traffic passes through Turk Telecoms infrastructure, allowing centralized control over online content and facilitating the implementation of shutdown decisions.[83] Many minor and major websites in Turkey have been subject to censorship. As of June 2010 more than 8000 major and minor websites were banned, most of them pornographic and mp3 sharing sites.[108] Other Among the web sites banned are the prominent sites Youporn, Megaupload, Deezer, Tagged, Slide, and ShoutCast. However, blocked sites are often available using proxies or by changing DNS servers. The Internet Movie Database escaped being blocked due to a misspelling of its domain name, resulting in a futile ban on www.imbd.com [109].[110] In October 2010, the ban of YouTube was lifted. But a range of IP addresses used by Google remained blocked, thus access to Google Apps hosted sites, including all Google App Engine powered sites and some of the Google services, remained blocked. Under new regulations announced on 22 February 2011 and scheduled to go into effect on 22 August 2011, the Information Technologies Board (BTK), an offshoot of the prime ministers office, will require that all computers select one of four levels of content filtering (family, children, domestic, or standard) in order to gain access to the Internet.[111]

Internet censorship by country Venezuela Classified as selective in the social and no evidence in the political, conflict/security, and Internet tools areas in 2011.[1][5] Access to the Internet in Venezuela continues to be unrestricted. The level of self-censorship is hard to evaluate, but the adoption of legislation that could potentially limit Internet freedom has yet to have any damaging effect in practice. As a result RWB removed Venezuela from its list of countries under surveillance.[2] In December 2010, the government of Venezuela approved a law named "Social Responsibility in Radio, Television and Electronic Media" (Ley de Responsabilidad Social en Radio, Televisin y Medios Electrnicos). The law is intended to exercise control over content that could "entice felonies", "create social distress", or "question the legitimate constituted authority". The law indicates that the website's owners will be responsible for any information and contents published, and that they will have to create mechanisms that could restrict without delay the distribution of content that could go against the aforementioned restrictions. The fines for individuals who break the law will be of the 10% of the person's last year's income. The law was received with criticism from the opposition on the grounds that it is a violation of freedom of speech protections stipulated in the Venezuelan constitution, and that it encourages censorship and self-censorship.[112]

348

Under surveillance
Countries in this category are on the RWB "Under Surveillance" list, but which were not already included in the pervasive, substantial, or selective censorship classifications. Countries "Under Surveillance" are ones in which changes are underway or are being considered that give cause for concern about the possibility of increased Internet censorship. Australia No evidence of filtering found by ONI in 2009.[1] There is no individual ONI country profile for Australia, but it is included in the regional overview for Australia and New Zealand.[67] Listed as Under Surveillance by RWB in 2011.[2] Australia does not allow content that would be classified "RC" (Refused Classification or banned) or "X18+" (hardcore non-violent pornography or very hardcore shock value) to be hosted within Australia and considers such content "prohibited"/"potentially prohibited" outside Australia; it also requires most other age-restricted content sites to verify a user's age before allowing access. Since January 2008 material that would be likely to be classified "R18+" or "MA15+" and which is not behind such an age verification service (and, for MA15+, which also meets other criteria such as provided for profit, or contains certain media types) also fits the category of "prohibited" or "potentially prohibited". The regulator ACMA can order local sites which do not comply taken down, and overseas sites added to a blacklist provided to makers of PC-based filtering software. Australia is classified as "under surveillance" by Reporters Without Borders due to the internet filtering legislation proposed by Minister Stephen Conroy. Regardless, as of August 2010 and the outcome of the 2010 election, it would be highly unlikely for the filter to pass the Senate if proposed due to the close numbers of seats held by Labor and the Coalition, who Joe Hockey says do not support it.[113] In June 2011 two Australian ISPs, Telstra and Optus, confirmed they would voluntary block access to a list of child abuse websites provided by the Australian Communications and Media Authority and more websites on a list compiled by unnamed international organizations from mid-year.[114]

Internet censorship by country Egypt In August 2009 ONI found no evidence of Internet filtering in any of the four areas (political, social, conflict/security, and Internet tools).[5] Listed as Under Surveillance by RWB in 2011 and 2012.[2] The Internet in Egypt was not directly censored under President Hosni Mubarak, but his regime kept watch on the most critical bloggers and regularly arrested them. At the height of the uprising against the dictatorship, in late January 2011, the authorities first filtered pictures of the repression and then cut off Internet access entirely in a bid to stop the revolt spreading. The success of the 2011 Egyptian revolution offers a chance to establish greater freedom of expression in Egypt, especially online. In response to these dramatic events and opportunities, in March 2011, Reporters Without Borders moved Egypt from its "Internet enemies" list to its list of countries "under surveillance".[115] In March 2012 Reporters Without Borders reported:[116] The first anniversary of Egypts revolution was celebrated in a climate of uncertainty and tension between a contested military power, a protest movement attempting to get its second wind, and triumphant Islamists. Bloggers and netizens critical of the army have been harassed, threatened, and sometimes arrested. The Supreme Council of the Armed Forces (SCAF), which has been leading the country since February 2011, has not only perpetuated Hosni Mubaraks ways of controlling information, but has strengthened them. Eritrea Listed as Under Surveillance by RWB in 2011.[2] Eritrea has not set up a widespread automatic Internet filtering system, but it does not hesitate to order blocking of several diaspora websites critical of the regime. Access to these sites is blocked by two of the Internet service providers, Erson and Ewan, as are pornographic websites and YouTube. Self-censorship is said to be widespread.[117] France Listed as no evidence in the political, social, conflict/security, and Internet tools areas by ONI in November 2010.[5] Listed as Under Surveillance by RWB in 2011.[2] France continues to promote freedom of the press and speech online by allowing unfiltered access to most content, apart from limited filtering of child pornography and web sites that promote terrorism, or racial violence and hatred. The French government has undertaken numerous measures to protect the rights of Internet users, including the passage of the Loi pour la Confiance dans lconomie Numrique (LCEN, Law for Trust in the Digital Economy) in 2004. However, the passage of a new copyright law threatening to ban users from the Internet upon their third violation has drawn much criticism from privacy advocates as well as the European Union (EU) parliament.[83] With the implementation of the "three-strikes" legislation and a law providing for the administrative filtering of the web and the defense of a "civilized" Internet, 2010 was a difficult year for Internet freedom in France. The offices of several online media firms and their journalists were targeted for break-ins and court summons and pressured to identify their sources. As a result, France has been added to Reports Without Borders list of "Countries Under Surveillance".[118] A June 2011 draft executive order implementing Article 18[119] of the Law for Trust in the Digital Economy (LCEN) would give several French government ministries[120] the power to restrict online content in case of violation, or where there is a serious risk of violation, of the maintenance of public order, the protection of minors, the protection of public health, the preservation of interests of the national defense, or the protection of physical persons.[65] According to Flix Trguer, a Policy and Legal Analyst for the digital rights advocacy group La Quadrature du Net,

349

Internet censorship by country this is "a censorship power over the Internet that is probably unrivaled in the democratic world."[121] In response to criticism, on 23 June 2011 the minister for the Industry and the Digital economy, ric Besson, announced that the Government would rewrite the order, possibly calling for a judge to review the legality of the content and the proportionality of the measures to be taken. Any executive order has to be approved by the French Council of State, which will have to decide whether Internet censorship authorization can be extended to such an extent by a mere executive order. It has also been suggested that, because e-commerce legislation is to be harmonized within the European Union, the draft should be reviewed by the European Commission. Malaysia Listed as no evidence in the political, social, conflict/security, and Internet tools areas by ONI in May 2007.[5] Listed as under surveillance by RWB in 2011.[2] There have been mixed messages and confusion regarding Internet censorship in Malaysia. Internet content is officially uncensored, and civil liberties assured, though on numerous occasions the government has been accused of filtering politically sensitive sites. Any act that curbs internet freedom is theoretically contrary to the Multimedia Act signed by the government of Malaysia in the 1990s. However, pervasive state controls on traditional media spill over to the Internet at times, leading to self-censorship and reports that the state investigates and harasses bloggers and cyber-dissidents.[65] In April 2011, prime minister Najib Razak repeated promises that Malaysia will never censor the Internet.[122] On June 11, however, the Malaysian Communications and Multimedia Commission (MCMC) ordered ISPs to block 10 websites for violating the Copyright Act.[123] This led to the creation of a new Facebook page, "1M Malaysians Don't Want SKMM Block File Sharing Website".[124] Sri Lanka Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for Sri Lanka, but it is included in the regional overview for Asia.[67] Listed as Under Surveillance by RWB in 2011.[2] Several political and news websites, including tamilnet.com and lankanewsweb.com have been blocked within the country.[125] The Sri Lanka courts have ordered hundreds of adult sites blocked to "protect women and children".[126][127] In October and November 2011 the Sri Lankan Telecommunication Regulatory Commission blocked the five websites, www.lankaenews.com, srilankamirror.com, srilankaguardian.com, paparacigossip9.com, and www.lankawaynews.com, for what the government alleges as publishing reports that amount to "character assassination and violating individual privacy" and damaging the character of President Mahinda Rajapaksa, ministers and senior government officials. The five sites have published material critical of the government and alleged corruption and malfeasance by politicians.[128]

350

Internet censorship by country

351

Little or no censorship
This classification includes countries that are not listed as an "Internet enemy" or as "Under survalance" by Reporters Without Borders and for which no evidence of Internet filtering was found by the OpenNet Initiative, although other controls such as voluntary filtering, self-censorship, and other types of public or private action to limit child pornography, hate speech, defamation, or theft of intellectual property often exist. Afghanistan Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in May 2007.[5] Only about 1/10 of 1 percent of Afghans are online, thus limiting the Internet as a means of expression. Freedom of expression is inviolable under the Afghanistan Constitution, and every Afghan has the right to print or publish topics without prior submission to state authorities. However, the limits of the law are clear: under the Constitution no law can be contrary to the beliefs and provisions of the sacred religion of Islam. The December 2005 Media Law includes bans on four broad content categories: the publication of news contrary to Islam and other religions; slanderous or insulting materials concerning individuals; matters contrary to the Afghan Constitution or criminal law; and the exposure of the identities of victims of violence. Proposed additions to the law would ban content jeopardizing stability, national security, and territorial integrity of Afghanistan; false information that might disrupt public opinion; promotion of any religion other than Islam; and "material which might damage physical well-being, psychological and moral security of people, especially children and the youth.[129] The Electronic Frontier Foundation reported that the Afghan Ministry of Communications mandated in June 2010 that all Internet Service Providers (ISPs) in Afghanistan filter Facebook, Gmail, Twitter, YouTube and websites related to alcohol, gambling and sex. They are also trying or blocking websites which are immoral and against the traditions of the Afghan people.[130] However, executives at Afghan ISPs said this was the result of a mistaken announcement by Ariana Network Service, one of the country's largest ISPs. An executive there said that while the government intends to censor pornographic content and gambling sites, social networking sites and email services are not slated for filtering. As of July 2010, enforcement of Afghanistan's restrictions on "immoral" content was limited, with internet executives saying the government didn't have the technical capacity to filter internet traffic.[131] Algeria Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] Internet access in Algeria is not restricted by technical filtering. However, the state controls the Internet infrastructure and regulates content by other means. Internet users and Internet service providers (ISPs) can face criminal penalties for posting or allowing the posting of material deemed contrary to public order or morality.[132] Argentina Not individually classified by ONI, but is included in the regional overview for Latin America.[67] Technical filtering of the Internet is uncommon in Argentina. The regulation of Internet content addresses largely the same concerns and strategies seen in North America and Europe, focusing on combating the spread of child pornography and restricting child access to age-inappropriate material. As Internet usage in Argentina increases, so do defamation, hate speech, copyright, and privacy issues.[67] Prosecutors and police pursue cases of Internet child pornography. In June 2008 the Congress passed a law criminalizing child pornography; however, the law does not penalize possession by individuals for personal use.[133] Since the 1997 presidential declaration regarding Free Speech on the Internet that guarantees Internet content the same constitutional protections for freedom of expression, Argentina has become a haven for neo-Nazi and race-hate groups around the region.[134] In 2000 an Argentine appellate court affirmed a lower courts dismissal of a claim that

Internet censorship by country a Yahoo! site selling Nazi memorabilia violated Argentinas anti-discrimination law (no. 23.592), holding that the equivalent restrictions of non-Internet speech would be unacceptable.[135] Under Argentinas anti-discrimination law a crime is aggravated if racism is involved.[67] The defendant in the case Jujuy.com v. Omar Lozano was found liable for publishing slanderous content on his Web site after imputing adulterous conduct to a couple and failing to remove the content promptly. An injunction was imposed and damages were set at $40,000 (USD).[67] Argentina has strengthened intellectual property rights protections by drafting and updating laws and ratifying international agreements such as the WIPO Copyright Treaty.[67] On 11 August 2011 a judge ordered all ISPs to block the site LeakyMails, a Web site that obtains and publishes documents exposing corruption in Argentina.[136][137] Some internet service providers blocked the website IP address 216.239.32.2 which is linked to more than one million blogs hosted on Google's Blogger service disrupting the access to all of them.[138] Bangladesh No evidence of filtering found by ONI in 2011.[1][5] During the 20082009 ONI testing period Bangladesh was not filtering the Internet, but media reported selective blocking for brief periods. The Bangla blogging platform Sachalayatan was reported to be inaccessible on 15 July 2008, and was forced to migrate to a new IP address. Although the blocking was not officially confirmed, Sachalayatan was likely Bangladeshs inaugural filtering event. YouTube was blocked for a few days in March 2009 in order to protect the national interest. The disputed video covered a partial audio recording of a meeting between the prime minister and military officials, who were angry at the governments handling of a mutiny by border guards in Dhaka that left more than seventy people dead.[67] Facebook was blocked by the Bangladesh Telecommunication Regulatory Commission (BTRC) for 7 days starting on 29 May 2010 because of "obnoxious images", including depictions of Mohammed and several of the country's political officials as well as links to pornographic sites.[139] The block was lifted after Facebook agreed to remove the offensive content.[140] During the same period a 30-year-old man was arrested in the Bangladeshi capital on charges of uploading satiric images of some political leaders on Facebook.[141] Belgium Not individually classified by ONI, but included in the regional overview for Europe.[67] Belgian internet providers Belgacom, Telenet, Base, Scarlet, EDPnet, Dommel, Proximus, Mobistar, Mobile Vikings, Tele2, and Versatel have started filtering several websites on DNS level since April 2009.[142] People who browse the internet using one of these providers and hit a blocked website are redirected to a page that claims that the content of the website is illegal under Belgian law and therefore blocked.[143] Brazil Not individually classified by ONI, but is included in the regional overview for Latin America.[67] Brazilian legislation restricts the freedom of expression (Paim Law), directed especially to publications considered racist (such as neo-nazi sites). The Brazilian Constitution also prohibits anonymity of journalists.[144] In March 2009, Chamber President Michel Temer ordered TV Cmara to remove a video of a debate from its website in which CartaCapital journalist Leandro Fortes criticized Gilmar Mendes' tenure as Court President.[145] Many viewed this as political censorship and the video was soon posted on YouTube.[146] After being denounced for censorship by the country's main bodies representing journalists, TV Cmara put the debate back on its website.[145] In September 2012 an elections court in Brazil ordered the arrest of Googles most senior executive in the country, after the company failed to take down YouTube videos attacking a local mayoral candidate. The stringent 1965

352

Internet censorship by country Electoral Code bans campaign ads that offend the dignity or decorum of a candidate. Google is appealing the order, which comes after a similar decision by another Brazilian elections judge. In that case, the judge found a different senior executive responsible for violating local election law after the company refused to take down a YouTube video mocking a mayoral candidate. That decision was overturned by another judge who wrote that Google is not the intellectual author of the video, it did not post the file, and for that reason it cannot be punished for its propagation. [147] Canada No evidence of filtering found by ONI in 2009.[1] There is no individual ONI country profile for Canada, but it is included in the regional overview for the United States and Canada.[67] Information, such as names of young offenders or information on criminal trials subject to publication bans, which the government is actively attempting to keep out of Canadian broadcast and print media is sometimes available to Canadian users via the Internet from sites hosted outside Canada. Project Cleanfeed Canada (cybertip.ca) decides what sites are child pornographic in nature and transmits those lists to the voluntarily participating ISPs who can then block the pages for their users. However, some authors, bloggers and digital rights lawyers argue that they are accountable to no one and could be adding non pornographic sites to their list without public knowledge.[148] Chile Not individually classified by ONI, but is included in the regional overview for Latin America.[67] Many educational institutions (universities and schools) block the access to websites like YouTube, Fotolog, Flickr, Blogger, Rapidshare, Twitter and Facebook, depending of the institution; in some cases also popular portals like Terra.cl, LUN.com, EMOL.com are also blocked; pornography, especially any kind of child pornographic website is blocked.[149] The Chilean Government also block the access in their computers to blogs or electronic versions of the local newspapers with opinions against the Government or the ruling coalition, for example, during the first days of Transantiago or the 2006 Student Protests. Croatia No ONI country profile, but shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[65] The constitution and law generally provide for freedom of speech and the press; however, growing economic pressures lead journalists to practice self-censorship. Hate speech committed over the Internet is punishable by six months' to three years' imprisonment and libel is a criminal offense. There are no government restrictions on access to the Internet or reports the government monitors e-mail or Internet chat rooms. In general individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail. Internet access is widely available and used by citizens throughout the country. An estimated 51 percent of the country's inhabitants used the Internet in 2010.[150]

353

Internet censorship by country Czech Republic Not individually classified by ONI. Since 2008, mobile operators T-Mobile[151] and Vodafone[152][153] pass mobile and fixed Internet traffic through Cleanfeed, which uses data provided by the Internet Watch Foundation to identify pages believed to contain indecent photographs of children, and racist materials. On 13 August 2009, Telefnica O2 Czech Republic, Czech DSL incumbent and mobile operator, started to block access to sites listed by Internet Watch Foundation. The company said it wanted to replace the list with data provided by Czech Police.[154] The rollout of the blocking system attracted public attention due to serious network service difficulties and many innocent sites mistakenly blocked. The concrete blocking implementation is unknown but it is believed that recursive DNS servers provided by the operator to its customers have been modified to return fake answers diverting consequent TCP connections to an HTTP firewall.[155] On 6 May 2010, T-Mobile Czech Republic officially announced[156] that it was starting to block web pages promoting child pornography, child prostitution, child trafficking, pedophilia and illegal sexual contact with children. T-Mobile claimed that its blocking was based on URLs from the Internet Watch Foundation list and on individual direct requests made by customers. Denmark No evidence of filtering found by ONI in 2009.[1] There is no individual ONI country profile for Denmark, but it is included in the regional overview for the Nordic Countries.[67] Denmark's biggest Internet service provider TDC A/S launched a DNS-based child pornography filter on 18 October 2005 in cooperation with the state police department and Save the Children, a charity organisation. Since then, all major providers have joined and as of May 2006, 98% of the Danish Internet users were restricted by the filter.[157] The filter caused some controversy in March 2006, when a legal sex site named Bizar.dk was caught in the filter, sparking discussion about the reliability, accuracy and credibility of the filter.[158] Also, as of 18 October 2005, TDC A/S had blocked access to AllOfMP3.com, a popular MP3 download site, through DNS filtering.[159] On 4 February 2008 a Danish court ordered the Danish ISP Tele2 to shutdown access to the file-sharing site thepiratebay.org for its Danish users.[160] On 23 December 2008, the list of 3,863 sites filtered in Denmark was released by Wikileaks.[161] In November 2011 a site selling diet pills, 24hdiet.com, was blocked by Danish ISPs, the first use of a new law on the blocking of foreign websites that sell drugs.[162] In August 2012 Google removed ads from ticket website Viagogo after an investigation found that the site was violating Danish law by overcharging and manipulating tickets before sending them to the buyer.[163] Estonia Not individually classified by ONI, but is included in the regional overview for the Commonwealth of Independent States.[164] Early 2010 Estonia started DNS filtering of "remote gambling sites" conflicting the renewed Gambling Act (2008). Estonia Implements Gambling Act [165]. So far (2010-03-01) only one casino [166] has obtained the proper license. The Gambling Act says servers for the "legal" remote gambling must be physically located in Estonia. The latest local news [167] is that Tax and Customs Board [168] has compiled a blocking list [169] containing 175 sites which ISPs are to enforce. Previously [170] Internet was completely free of censorship in Estonia.

354

Internet censorship by country Fiji Not individually classified by ONI. In May 2007 it was reported that the military in Fiji had blocked access to blogs critical of the regime.[171] Finland Classified as no evidence of filtering in all areas by ONI in 2009.[1] There is no individual ONI country profile for Finland, but it is included in the regional overview for the Nordic Countries.[67] In 2006, a new copyright law known as Lex Karpela set some restrictions on publishing information regarding copy protection schemes. Also in 2006 the government started Internet censorship by delivering Finnish ISPs a secret blocking list maintained by Finnish police.[172] Implementation of the block was voluntary, but some ISPs implemented it. The list was supposed to contain only sites with child pornography, but ended up also blocking, among others, the site lapsiporno.info that criticized the move towards censorship and listed sites that were noticed to have been blocked.[173]

355

Lapsiporno.info block announcement as seen from the network maintained by ISP Welho

In 2008 a government-sponsored report has considered establishing similar filtering in order to curb online gambling.[174] Germany Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in December 2010.[5] Occasional take down requests and access restrictions are imposed on German ISPs, usually to protect minors or to suppress hate speech and extremism. In April 2009, the German government signed a bill that would implement large-scale filtering of child pornography Web sites, with the possibility for later expansion.[175] However, that law was repelled in 2011 since internet service providers quickly take down child pornography after they receive knowledge about it, a fact that had already been pointed out by internet freedom organisations and political parties such as the Freie Demokratische Partei and the Piratenpartei before the law came into effect. Ghana Not individually classified by ONI, but is included in the regional overview for sub-Saharan Africa.[67] In 2002 the government of Ghana censored internet media coverage of tribal violence in Northern Ghana.[176] Guatemala Classified as no evidence of filtering by ONI in 2011.[1] There is no individual ONI country profile for Guatemala, but it is included in the regional overview for Latin America.[67] Hungary No ONI country profile, but shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[] The constitution and law provide for freedom of speech and of the press, and the government generally respects these rights in practice. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the peaceful expression of views via the

Internet censorship by country Internet, including by e-mail. According to the International Telecommunication Union, in 2009 approximately 63 percent of the country's inhabitants used the Internet.[177] European Commissioner Kroes, NGOs, and the foreign press raised concerns that provisions of the new media laws requiring balanced reporting and registration of media outlets lacked clear limits and could be interpreted to include blogs. The government and the NMHH argued that, in practice, blogs would be exempt from these requirements on the basis that they are not considered "business endeavors."[177] Iceland Not individually classified by ONI, but included in the regional overview for the Nordic Countries.[67] Censorship is prohibited by the Icelandic Constitution and there is a strong tradition of protecting freedom of expression that extends to the use of the Internet.[178] However, questions about how best to protect children, fight terrorism, prevent libel, and protect the rights of copyright holders are ongoing in Iceland as they are in much of the world. The five Nordic countriesDenmark, Finland, Norway, Sweden, and Icelandare central players in the European battle between file sharers, rights holders, and Internet service providers (ISPs). While each country determines its own destiny, the presence of the European Union (EU) is felt in all legal controversies and court cases. Iceland, while not a member of the EU, is part of the European Economic Area (EEA) and has agreed to enact legislation similar to that passed in the EU in areas such as consumer protection and business law.[67] Internet service providers in Iceland use filters to block Web sites distributing child pornography. Iceland's ISPs in cooperation with BarnaheillSave the Children Iceland participate in the International Association of Internet Hotlines (INHOPE) project. Suspicious links are reported by organizations and the general public and passed on to relevant authorities for verification.[67] Iraq Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] Internet access in Iraq remains largely unfettered, but this is likely to change, as the authorities have initiated measures to censor Internet content and monitor online activities. In addition, the government has launched legal offensives against independent news media and Web sites.[179] Ireland Not individually classified by ONI. Israel Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] The Orthodox Jewish parties in Israel proposed an internet censorship legislation would only allow access to pornographic Internet sites for users who identify themselves as adults and request not to be subject to filtering. In February 2008 the law passed in its first of three votes required,[180] however, it was rejected by the government's legislation committee on 12 July 2009.[181]

356

Internet censorship by country Japan Japanese law provides for freedom of speech and of the press, and the government respects these rights in practice. These freedoms extend to speech and expression on the Internet. An effective judiciary and a functioning democratic political system combine to ensure these rights. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet activities. Individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail.[182] Freedom House's Freedom in the World 2011 reports that "Internet access is not restricted" in Japan.[183] Legislation criminalizing the use of the Internet for child pornography and the solicitation of sex from minors was passed in 2003.[184] Kenya There is no ONI country profile for Kenya.[5] Kenya was rated as "partly free" in the 2009 and 2011 Freedom on the Net reports with scores of 34 and 32 which is much closer to the "free" rating that ends at 30 then it is to the "not free" rating that starts at 60.[185] The government does not employ technical filtering or any administrative censorship system to restrict access to political or other content. Citizens engage in the peaceful expression of views via the Internet, including by e-mail, and are able to access a wide range of viewpoints, with the websites of the British Broadcasting Corporation (BBC), the U.S.-based Cable News Network (CNN), and Kenyas Daily Nation newspaper the most commonly accessed.[185] There are no government restrictions on access to the Internet, but Internet services are limited in rural areas due to lack of infrastructure. In 2008, approximately 8.6 percent of Kenyans used the Internet.[177] The constitution protects freedom of expression and the freedom to communicate ideas and information. However, it also grants the government the authority to punish defamation, protect privileged information, and restrict state employees "freedom of expression in the interest of defense, public safety, public order, public morality or public health. In January 2009, the government passed a controversial Communications Amendment Act that established that any person who publishes, transmits, or causes to be published in electronic form obscene information commits an offense. The Act also outlines other forms of illegality associated with the use of information and communication technologies. At the end of 2010, the measure had not been used to prosecute anyone for online expression. Under the Act, the Communications Commission of Kenya (CCK), rather than the independent Media Council of Kenya, is responsible for regulating both traditional and online media. The CCK is also independent, but because the CCK has yet to make any decisions affecting the internet, its autonomy and professionalism in making determinations remain to be seen.[185] In July 2009 the government announced that all cell phone users had to provide the government with their name and identification number. This regulation applies to citizens who access the Internet through cell phone-based services as well.[177] Laos There is no ONI country profile for Laos,[5] but Laos is included in the ONI Regional Overview for Asia[67] and the ONI global Internet filtering maps show no evidence of filtering in Laos in the political, social, conflict/security, and Internet tools areas.[65] Very few homes have Internet access; most non-business users depend on Internet cafes located chiefly in the larger urban areas. The International Telecommunication Union reported that Internet users numbered approximately 5 percent of the country's inhabitants in 2009. The government does not block domestic web sites, major foreign news sources, or social networking sites. There are no reports of government prosecution of persons for the expression of political, religious, or dissenting views via the Internet. The Lao National Internet Committee under the Prime Minister's Office administers a system that controls all domestic Internet servers, sporadically monitors Internet usage, and has authority to block access to

357

Internet censorship by country Internet sites it deems pornographic or critical of government institutions and policies.[186] Latvia No ONI country profile, but shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[] The constitution and law provide for freedom of speech and of the press. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail. According to International Telecommunication Union statistics for 2009, approximately 67 percent of the country's inhabitants used the Internet.[177] In September 2010 the government's Corruption Prevention and Combating Bureau (KNAB), which enforces campaign laws, removed a satirical film, The Last Bear Slayer, from the on-demand playlist of the partially state-owned cable provider, Lattelecom. The KNAB stated that the film might have constituted election advertising. Reporters Without Borders charged that the prohibition constituted improper censorship, but noted it was ineffective because the film was widely available on the Internet.[177] Lebanon Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in August 2009.[5] Internet traffic in Lebanon is not subject to technical filtering, but poor infrastructure, few household computers, low Internet penetration rates, and the cost high of connectivity, remain serious challenges. Some Internet caf operators prevent their clients from accessing objectionable content such as pornography, however, there is no evidence that these practices are required or encouraged by the state. Lebanese law permits the censoring of pornography, political opinions, and religious materials when considered a threat to national security.[187] Malawi Not individually classified by ONI, but is included in the regional overview for sub-Saharan Africa.[67] Malawi prohibits the publication or transmission of anything that could be useful to the enemy, as well as religiously offensive and obscene material. Malawi participates in regional efforts to combat cybercrime: the East African Community (consisting of Kenya, Tanzania, and Uganda) and the South African Development Community (consisting of Malawi, Mozambique, South Africa, Zambia, and Zimbabwe) have both enacted plans to standardize cybercrime laws throughout their regions.[67] Mexico Classified by ONI as no evidence of filtering in 2011.[1] There is no individual ONI country profile for Mexico, but it is included in the regional overview for Latin America.[67] In May 2009, the Mexican Federal Electoral Institute (IFE), asked YouTube to remove a parody of Fidel Herrera, governor of the state of Veracruz. Negative advertising in political campaigns is prohibited by present law, although the video appears to be made by a regular citizen which would make it legal. It was the first time a Mexican institution intervened directly with the Internet.

358

Internet censorship by country Nepal Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in May 2007.[5] In 2007 Nepali journalists reported virtually unconditional freedom of the press, including the Internet, and ONIs testing revealed no evidence that Nepal imposes technological filters on the Internet.[188] Netherlands Not individually classified by ONI. Government-mandated Internet censorship is nonexistent due to the house of representatives speaking out against filtering on multiple occasions, although there have been proposals to filter child pornography and the Netherlands, like many countries, is grappling with how to prevent or control copyright infringement on the Internet. In 2008 the Minister of Justice proposed a plan to block websites known to contain child pornography. A blacklist created by the Meldpunt ter bestrijding van Kinderpornografie op Internet (Hotline combating Child Pornography on the Internet)[189] would have been used by Internet Service Providers to redirect the websites to a stop page. In 2011 the plan was withdrawn due to an "almost complete lack of websites to block" because the sharing of the material was no longer done by conventional websites, but by other services.[190] The House of Representatives reaffirmed this by voting against the filter later that year, effectively killing any plans for government censorship.[191] In January 2012, the internet providers Ziggo and XS4all were required by a court order in a case brought by the Bescherming Rechten Entertainment Industrie Nederland (BREIN) to block the website of The Pirate Bay due to copyright infringement.[192] This blocking raised questions within the government, customers, and the internet providers themselves, not only because of the blocking, but also about its randomness and the role of BREIN, an industry trade association that can change the blacklist.[193][194][195] New Zealand Not individually classified by ONI, but is included in the regional overview for Australia and New Zealand.[67] Since February 2010 Department of Internal Affairs offers to ISPs voluntary Internet filtering.[196] Participating providers routes suspect destination IP addresses to the Department that blocks desired HTTP requests. Other packets are routed back to correct networks. List of blocked addresses is secret, but it's believed that child pornography is subjected only. Nigeria Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in October 2009.[5] In 2008 two journalists were arrested for publishing online articles and photos critical of the government.[197] Norway Classified as no evidence of filtering by ONI in 2009.[1] There is no individual ONI country profile for Norway, but it is included in the regional overview for the Nordic Countries.[67] Norway's major Internet service providers have a DNS filter which blocks access to sites authorities claim are known to provide child pornography,[198] similar to Denmark's filter. A list claimed to be the Norwegian DNS blacklist was published at Wikileaks in March 2009.[199] The minister of justice, Knut Storberget, sent a letter threatening ISPs with a law compelling them to use the filter should they refuse to do so voluntarily (dated 29 August 2008).[200]

359

Internet censorship by country Paraguay The law in Paraguay provides for freedom of speech and press, and the government generally respects these rights in practice. Individuals criticize the government publicly and privately, generally without reprisal or impediment. There are no government restrictions on access to the Internet or credible reports that the government monitored e-mail or Internet chat rooms. Individuals and groups could engage in the expression of views via the Internet, including by e-mail.[201] Because of their reporting, journalists are on occasion subjected to harassment, intimidation, and violenceprimarily from drug trafficking gangs and criminal syndicates based in departments bordering Brazil but also from politicians. Political officials often retaliate against media criticism by invoking criminal libel laws and suing the media to intimidate journalists and suppress further investigations.[201] Following the 22 June 2012 parliamentary coup, the new government appears to be assuming complete control of the state-owned media and its hostility is affecting journalists with the privately-owned media as well.[202][203][204][205][206] Peru No ONI country profile, but included in the regional overview for Latin America,[67] and shown as no evidence in all areas (political, social, conflict/security, and Internet tools) on the ONI global Internet filtering maps.[] There are no government restrictions on access to the Internet and no reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in the free expression of views via the Internet, including by e-mail. The chief impediment to Internet access was a lack of infrastructure; the International Telecommunication Union reported that there were 31 Internet users per 100 inhabitants in 2009.[207] Philippines There is no ONI country profile for the Philippines,[5] but it is included in the ONI Regional Overview for Asia[67] and the ONI global Internet filtering maps show no evidence of filtering in the political, social, conflict/security, and Internet tools areas.[65] The constitution provides for freedom of speech and of the press, and the government generally respects these rights. There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms. Individuals and groups engage in peaceful expressions of views via the Internet, including by e-mail. Internet access is widely available. According to International Telecommunication Union statistics for 2009, approximately 6.5 percent of the country's inhabitants used the Internet.[208] In 2012 the Republic Act No. 10175 or Cybercrime Prevention Act of 2012 was signed by President Benigno Aquino, which criminalizes acts such as libel done online that are already punishable in other media such as radio, TV, and newspapers, with punishment one level higher than their non computer counterpart. The Act was greatly endorsed by Senator Tito Sotto, who was recently "cyberbullied" online for plagiarizing bloggers and Sen. Robert F. Kennedy. [209] After several petitions submitted to the Supreme Court questioned the constitutionality of the Act,[210] on October 9, 2012, the Supreme Court issued a temporary restraining order, stopping implementation of the Act for 120 days.[211]

360

Internet censorship by country Poland Not individually classified by ONI, but included in the regional overview for Europe.[67] Internet censorship legislation that included the creation of a register of blocked web sites was abandoned by the Polish Government in early 2011, following protests and petitions opposing the proposal.[212][213][214] Romania Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for Romania, but it is included in the regional overview for Europe.[67] Rwanda Not individually classified by ONI. Rated "partly free" in Freedom on the Net 2011 with a score of 50, somewhat past the midway point between the end of the range for "free" (30) and the start of the range for "not free" (60).[215] There are no government restrictions on access to the Internet. Individuals and groups engage in the peaceful expression of views via the Internet, including by e-mail. Internet cafes are common and used regularly in the largest towns, but the Internet is generally unavailable in rural areas, where the majority of the population lives. According to International Telecommunication Union statistics for 2008, approximately 3 percent of the country's inhabitants used the Internet. Laws prohibiting divisionism, genocide ideology, and genocide denial and forbidding "contempt for the Head of State of Rwanda" promote self-censorship. Expression of these viewpoints sometimes results in arrest, harassment, or intimidation.[216] Slovenia Not individually classified by ONI. On 28 January 2010 the Slovenian National Assembly adopted changes to the law governing gambling. Under the law Internet service providers are responsible for blocking access to Internet gambling web sites that are not licensed by the Slovenian government.[217] South Africa Not individually classified by ONI, but is included in the regional overview for sub-Saharan Africa.[67] In 2006, the government of South Africa began prohibiting sites hosted in the country from displaying X18 (explicitly sexual) and XXX content (including child pornography and depictions of violent sexual acts); site owners who refuse to comply are punishable under the Film and Publications Act 1996. In 2007 a South African "sex blogger" was arrested . In South Africa participates in regional efforts to combat cybercrime. The East African Community (consisting of Kenya, Tanzania, and Uganda) and the South African Development Community (consisting of Malawi, Mozambique, South Africa, Zambia, and Zimbabwe) have both enacted plans to standardize cybercrime laws throughout their regions.[67] Sweden Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for Sweden, but it is included in the regional overview for the Nordic Countries.[67] Sweden's major Internet service providers have a DNS filter which blocks access to sites authorities claim are known to provide child porn, similar to Denmark's filter. A partial sample of the Swedish internet censorship list can be seen at a Finnish site criticizing internet censorship [218]. The Swedish police are responsible for updating this list of forbidden Internet sites. On 6 July, Swedish police said that there is material with child pornography available on torrents linked to from the torrent tracker site Pirate Bay and said it would be included in the list of forbidden Internet sites. This, however, did not happen as the police claimed the illegal material had been removed from the

361

Internet censorship by country site. Police never specified what the illegal content was on TPB. This came with criticism and accusations that the intended The Pirate Bay's censorship was political in nature. Uganda Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in September 2009.[5] Though Uganda has made great technological strides in the past five years, the country still faces a number of challenges in obtaining affordable, reliable Internet bandwidth. This, rather than a formal government-sponsored filtering regime, is the major obstacle to Internet access. Just prior to the presidential elections in February 2006, the Uganda Communications Commission (UCC) blocked the anti-government Web site RadioKatwe in the only internationally reported case of Internet filtering in Uganda to date.[219] Ukraine Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in December 2010.[5] Access to Internet content in Ukraine remains largely unfettered. Ukraine possesses relatively liberal legislation governing the Internet and access to information. The Law on Protection of Public Morals of November 20, 2003 prohibits the production and circulation of pornography; dissemination of products that propagandize war or spread national and religious intolerance; humiliation or insult to an individual or nation on the grounds of nationality, religion, or ignorance; and the propagation of "drug addition, toxicology, alcoholism, smoking and other bad habits."[220] United Kingdom Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in December 2010.[5] The United Kingdom has a notable libertarian tradition, manifested by, among other things, solid guarantees of freedom of expression, freedom of information, and protection of privacy. Freedom of expression and protection of privacy over the Internet is guaranteed by law. Nonetheless, over the last few years there has been a shift toward increased surveillance and police measures. Combating terrorism and preventing child abuse have been widely used as a justification by state agencies and private commercial actors (e.g., Internet service providers) for the implementation of interception and direct filtering measures. Nevertheless in 2010 the OpenNet Initiative found no evidence of technical filtering in the political, social, conflict/security, or Internet tools areas. However, the U.K. openly blocks child pornography Web sites, for which ONI does not test.[221] British Telecommunications' ISP passes internet traffic through a service called Cleanfeed which uses data provided by the Internet Watch Foundation to identify pages believed to contain indecent photographs of children.[222][223] When such a page is found, the system creates a 'URL not found page' error rather than deliver the actual page or a warning page. Other ISPs use different systems such as WebMinder [224]. In July and again in October 2011, the UK High Court ruled that British Telecom must block access to a website (newzbin.com) which "provides links to pirated movies".[225][226] In September 2011, in response to the court ruling and with encouragement from government, leading UK ISPs are reported to have privately agreed in principle to quickly restrict access to websites when presented with court orders.[227] In May 2012 the High Court ordered UK ISPs to block The Pirate Bay to prevent further copyright infringing movie and music downloads from the website.[228][229]

362

Internet censorship by country United States Classified by ONI as no evidence of filtering in 2009.[1] There is no individual ONI country profile for the United States, but it is included in the regional overview for the United States and Canada.[67] Most online expression is protected by the First Amendment to the United States Constitution, but laws concerning libel, intellectual property, and child pornography still determine if certain content can be legally published online. Internet access by individuals in the US is not subject to technical censorship, but can be penalized by law for violating the rights of others. As in other countries, the potential for legal liability for civil violations, including defamation and copyright, constrains the publishers of Internet content in the United States. This can have a "chilling effect" and lead to self-censorship of lawful online content and conduct. Content-control software is sometimes used by businesses, libraries, schools, and government offices to limit access to specific types of content.[67] Zimbabwe Listed as no evidence in all four areas (political, social, conflict/security, and Internet tools) by ONI in September 2009.[5] Because Internet penetration in Zimbabwe is low, it is mainly used for e-mail and the government focuses its efforts to control the Internet to e-mail monitoring and censorship. Though its legal authority to pursue such measures is contested, the government appears to be following through on its wishes to crack down on dissent via e-mail.[230]

363

References
This article incorporatespublic domain material from the United States Department of State document "2010 Country Reports on Human Rights Practices" [231] by the Bureau of Democracy, Human Rights, and Labor. This article incorporates licensed material [81] from the Country Profiles, [232] Regional Overviews [233], and Filtering Maps [234] sections of the OpenNet Initiative web site.[235]
[1] OpenNet Initiative "Summarized global Internet filtering data spreadsheet" (http:/ / opennet. net/ research/ data), 8 November 2011 and "Country Profiles" (http:/ / opennet. net/ research/ profiles), the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa [2] Internet Enemies (http:/ / march12. rsf. org/ i/ Report_EnemiesoftheInternet_2012. pdf), Reporters Without Borders (Paris), 12March 2012 [3] Due to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. [4] "2010 Country Reports on Human Rights Practices" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ index. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [5] "ONI Country Profiles" (http:/ / opennet. net/ research/ profiles), Research section at the OpenNet Initiative web site, a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, Ottawa [6] "West Censoring East: The Use of Western Technologies by Middle East Censors, 20102011" (http:/ / opennet. net/ west-censoring-east-the-use-western-technologies-middle-east-censors-2010-2011), Helmi Noman and Jillian C. York, OpenNet Initiative, March 2011 [7] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet (http:/ / www. unesco. org/ new/ en/ communication-and-information/ resources/ publications-and-communication-materials/ publications/ full-list/ freedom-of-connection-freedom-of-expression-the-changing-legal-and-regulatory-ecology-shaping-the-internet/ ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4 [8] List of the 13 Internet enemies (http:/ / en. rsf. org/ list-of-the-13-internet-enemies-07-11-2006,19603) Reporters Without Borders (Paris), 11July 2006. [9] "Internet enemies" (http:/ / www. rsf. org/ IMG/ pdf/ Internet_enemies_2009_2_. pdf), Reporters Without Borders (Paris), 12March 2009. [10] Web 2.0 versus Control 2.0. (http:/ / www. rsf. org/ ennemis. html) Reporters Without Borders (Paris), 18March 2010. [11] Freedom on the Net 2009 (http:/ / www. state. gov/ documents/ organization/ 135959. pdf), Freedom House, accessed 16 April 2012 [12] Resolution No 1 of 2009, Ministry of Culture and Information, published in Official Gazette, Issue No.2877, dated 8 January 2009 [13] "ONI Country Profile: Belarus" (http:/ / opennet. net/ research/ profiles/ belarus), OpenNet Initiative, 18 November 2010 [14] "ONI Country Profile: Burma" (http:/ / opennet. net/ research/ profiles/ burma), OpenNet Initiative, 22 December 2010

Internet censorship by country


[15] Google Public Data: Burma Internet penetration (http:/ / www. google. com/ publicdata?ds=wb-wdi& met=it_net_user& idim=country:MMR& dl=en& hl=en& q=burma+ internet+ penetration) [16] "ONI: Internet Filtering Map" (http:/ / map. opennet. net/ ) (Flash). Open Net Initiative. . Retrieved 7 July 2010. [17] Burma "Junta tightens media screw" (http:/ / news. bbc. co. uk/ 2/ hi/ asia-pacific/ 7016238. stm), Michael Dobie, BBC News, 28 September 2007 [18] Thomas Lum and Hannah Fischer (25 January 2010). Human Rights in China: Trends and Policy Implications (http:/ / www. fas. org/ sgp/ crs/ row/ RL34729. pdf) (Report). Congressional Research Service, Library of Congress, USA. . [19] "Minister blames US embargo for low number of Cubans online" (http:/ / arabia. reporters-sans-frontieres. org/ article. php3?id_article=20999). Reporters Without Borders. 13 February 2007. . [20] Timothy Sprinkle (8 November 2006). "Press Freedom Group Tests Cuban Internet Surveillance" (http:/ / www. worldpoliticsreview. com/ articles/ 321/ press-freedom-group-tests-cuban-internet-surveillance). World Politics Review. .. [21] "Journalist sentenced to four years in prison as "pre-criminal social danger"" (http:/ / en. rsf. org/ cuba-journalist-sentenced-to-four-years-18-04-2007,21793. html). Reporters Without Borders. . Retrieved 18 April 2007. [22] Lamrani, Salim. Reporters Without Borders' Lies about Cuba (http:/ / www. globalresearch. ca/ PrintArticle. php?articleId=14202), Centre for Research on Globalization, 2 July 2009. [23] "Yoani Snchez: El aumento de la represin coincide con una mayor presencia de los blogueros en las calles (Yoani Sanchez: The increased repression coincides with a greater presence of bloggers on the streets)" (http:/ / cubadata. blogspot. com/ 2010/ 01/ yoani-sanchez-el-aumento-de-la. html). Cuba Verdad. 4 January 2010. . (Spanish) [24] "Los videos del mitin de repudio contra Reinaldo Escobar (Videos repudiation rally against Reinaldo Escobar)" (http:/ / www. penultimosdias. com/ 2009/ 11/ 21/ los-videos-del-mitin-de-repudio-contra-reinaldo-escobar/ ). Penltimos Das. 21 November 2009. .

364

(Spanish)
[25] "CPJ Special Report 2006" (http:/ / www. cpj. org/ censored/ censored_06. html). . [26] "ONI Country Profile: Iran" (http:/ / opennet. net/ research/ profiles/ iran), OpenNet Initiative, 16 June 2009 [27] "Authorities urged to halt threats to "cyber-feminists" Iran" (http:/ / www. rsf. org/ article. php3?id_article=26889). Reporters Without Borders. . Retrieved 18 May 2008. [28] "Internet "black holes" Iran" (http:/ / web. archive. org/ web/ 20070317080832/ http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=92& annee=2005). Reporters Without Borders. Archived from the original (http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=92& annee=2005) on 17 March 2007. . Retrieved 31 August 2006. [29] "Iran blocks access to video-sharing on YouTube" (http:/ / www. usatoday. com/ life/ television/ news/ 2006-12-05-youtube_x. htm). Tehran(AP): USA Today. 5 December 2006. . Retrieved 12 December 2006. [30] "Cracking Down on Digital Communication and Political Organizing in Iran" (http:/ / opennet. net/ blog/ 2009/ 06/ cracking-down-digital-communication-and-political-organizing-iran), Rebekah Heacock, OpenNet Initiative, 15 June 2009 [31] ONI Country Profile: Kuwait" (http:/ / opennet. net/ research/ profiles/ kuwait#footnote20_1w5khpn), OpenNet Initiative, 6 August 2009 [32] "Kuwait: State of the media" (http:/ / www. menassat. com/ ?q=en/ media-landscape/ state-media-5), Menassat [33] "Middle East and North Africa: Kuwait" (http:/ / www. irex. org/ programs/ msi_mena/ 2005/ MSI05_MENA_KW. pdf), Media Sustainability Index, 2006 [34] "Country Reports on Human Rights Practices: Kuwait 2007" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2007/ 100599. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 11 March 2008 [35] Kuwait Institute for Scientific Research (http:/ / www. kw/ ) web site [36] "VOIP Policy and Regulation: Regional perspective" (http:/ / www. ituarabic. org/ 2007/ IP-VOIP/ Docs/ Doc5-Saudi Arabia. pdf), Professor Ibrahim Kadi, Communications and Information Technology Commission, presented at the regional seminar on Internet Protocol: VOIP, Algiers, Algeria, 12 March 2007 [37] "Ministry blocks call sites on web" (http:/ / www. arabtimesonline. com/ arabtimes/ kuwait/ Viewdet. asp?ID=9870& cat=a), Kuwait Times Online, 13 May 2007 [38] "Kuwait blocks YouTube" (http:/ / www. kuwaittimes. net/ read_news. php?newsid=MTI1MjMyNzg4Mw==), Jamie Etheridge, Kuwait Times, 22 September 2008 [39] "Kuwaiti MPs call for stricter net censorship" (http:/ / www. arabianbusiness. com/ 532671-kuwaiti-mps-call-for-stricter-net-censorship), Dylan Bowman, Arabian Business, 29 September 2008 [40] "ONI Country Profile: North Korea" (http:/ / opennet. net/ research/ profiles/ north-korea), OpenNet Initiative, 10 May 2007 [41] "The Internet Black Hole That Is North Korea " (http:/ / www. nytimes. com/ 2006/ 10/ 23/ technology/ 23link. html), Tom Zeller Jr., New York Times, 23 October 2006 [42] "Internet Enemies: North Korea" (http:/ / en. rsf. org/ internet-enemie-north-korea,39755. html), Reporters Without Borders, March 2011 [43] "ONI Country Profile: Oman" (http:/ / opennet. net/ research/ profiles/ oman), OpenNet Initiative, August 2009 [44] "ONI Country Profile: Qatar" (http:/ / opennet. net/ research/ profiles/ qatar), OpenNet Initiative, 6 August 2009 [45] Internet Filtering in Saudi Arabia in 2004 (http:/ / www. opennetinitiative. net/ studies/ saudi/ ) An OpenNet Initiative study [46] Introduction to Content Filtering (http:/ / www. isu. net. sa/ saudi-internet/ contenet-filtring/ filtring. htm), Saudi Arabia Internet Services Unit, of King Abdulaziz City for Science & Technology (KACST), 2006 [47] Saudi Internet rules (2001) (http:/ / www. al-bab. com/ media/ docs/ saudi. htm), Council of Ministers Resolution, 12 February 2001, Al-Bab gateway: An open door to the Arab world

Internet censorship by country


[48] "ONI Country Profile: South Korea" (http:/ / opennet. net/ country/ south-korea), OpenNet Initiative, 26 December 2010 [49] "Tough content rules mute Internet election activity in current contest: Bloggers risk arrest for controversial comments" (http:/ / joongangdaily. joins. com/ article/ view. asp?aid=2883992). JoongAng Daily. 17 December 2007. . Retrieved 17 December 2007. [50] Christian Oliver (1 April 2010). "Sinking underlines South Korean view of state as monster" (http:/ / www. ft. com/ cms/ s/ 0/ d77d855e-3d26-11df-b81b-00144feabdc0. html). London: Financial Times. . Retrieved 2 April 2010. [51] "Syrian jailed for internet usage" (http:/ / news. bbc. co. uk/ 2/ hi/ middle_east/ 3824595. stm). BBC News. 21 June 2004. . [52] Internet Enemies: Turkmenistan" (http:/ / en. rsf. org/ internet-enemie-turkmenistan,39772. html), Reporters Without Borders, 12 March 2011 [53] "ONI Country Profile: United Arab Emirates" (http:/ / opennet. net/ research/ profiles/ uae), OpenNet Initiative, 7 August 2009 [54] "First Communiqu In UAE Against TRA For Forum Blocking. UAE Government Should Give Reasons and Lift Blocking" (http:/ / www. anhri. net/ en/ ?p=156), Cairo 16 March 2010, The Arabic Network for Human Rights Information [55] "The Internet "black holes" Uzbekistan" (http:/ / web. archive. org/ web/ 20070524002041/ http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=105& annee=2005). Reporters Without Borders. Archived from the original (http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=105& annee=2005) on 24 May 2007. . Retrieved 31 August 2006. [56] (Russian) "Uzbekistan: Facebook unblocked" (http:/ / www. ferghana. ru/ news. php?id=15797& mode=snews). . Retrieved 21 October 2010. [57] "The Internet "black holes" Vietnam" (http:/ / web. archive. org/ web/ 20070930230451/ http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=98& annee=2006& Valider=OK). Reporters Without Borders. Archived from the original (http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=98& annee=2006& Valider=OK) on 30 September 2007. . Retrieved 31 August 2006. [58] "ONI Country Profile: Yemen" (http:/ / opennet. net/ research/ profiles/ yemen), OpenNet Initiative, August 2009 [59] "Lawzi: Ma Yonshar fi Sahafat Al Internet Lan Yakon Ba'eedan A'n Al Mosa'ala bimojib Qanoon Al Oqobat" (Online journalism is subject to the penal code: Lawzi, Yemeni Minister of Information)" (http:/ / www. yemenna. com/ vb/ showthread. php?t=9502), Saba, 3 February 2008 [60] Terms and conditions for Y.Net Service (http:/ / www. y. net. ye/ support/ rules. htm), TeleYemen [61] "Search for Pornographic Material on Rise; Children are most Vulnerable" (http:/ / www. yemenpost. net/ 63/ Reports/ 20084. htm), Moneer Al-Omari, Yemen Post, 12 January 2009 [62] "ONI Country Profile: Armenia" (http:/ / opennet. net/ research/ profiles/ armenia), OpenNet Initiative, 17 November 2010 [63] "ONI Country Profile: Ethiopia" (http:/ / opennet. net/ research/ profiles/ ethiopia), OpenNet Initiative, September 2009 [64] "ONI Country Profile: Gaza and the West Bank" (http:/ / opennet. net/ research/ profiles/ gazawestbank), OpenNet Initiative, 10 August 2009 [65] "Indonesia country profile" (http:/ / access. opennet. net/ wp-content/ uploads/ 2011/ 12/ accesscontested-indonesia. pdf), Access Contested, Ronald Deibert, et al., MIT Press and OpenNet Initiative, November 2011 [66] "Country Report: Indonesia" (http:/ / www. freedomhouse. org/ images/ File/ FotN/ Indonesia2011. pdf), Freedom on the Net 2011, Freedom House, April 2011 [67] "ONI Regional Overview: Asia" (http:/ / opennet. net/ research/ regions/ asia), OpenNet Initiative, June 2009 [68] "ONI Country Profile: Pakistan" (http:/ / opennet. net/ research/ profiles/ pakistan), OpenNet Initiative, 26 December 2010 [69] "ONI Country Profile: Sudan" (http:/ / opennet. net/ research/ profiles/ sudan), OpenNet Initiative, 7 August 2009 [70] "ONI Country Profile: Azerbaijan" (http:/ / opennet. net/ research/ profiles/ azerbaijan), OpenNet Initiative, 17 November 2010 [71] "En la crcel La Picota ser recluido joven que presuntamente amenaz a hijo del presidente (Young man who allegedly threatened the President's son sent to prison)" (http:/ / www. eltiempo. com/ colombia/ justicia/ revelan-apartes-de-las-conversaciones-de-joven-que-presuntamente-amenazo-a-hijo-del-presidente_6721687-1) (in Spanish). El Tiempo (Colombia). 2 December 2009. . Retrieved 31 March 2010. [72] Africa Overview (http:/ / www. freemedia. at/ index. php?id=229& tx_ttnews& #91;tt_news& #93;=2750& tx_ttnews& #91;backPid& #93;=188& cHash=f6da271eff), International Press Institute [73] Online newspaper hacked, editor smeared and subscribers threatened (http:/ / www. rsf. org/ Online-newspaper-hacked-editor. html), Reporters Without Borders, 30 May 2006 [74] "ONI Country Profile: Georgia" (http:/ / opennet. net/ research/ profiles/ georgia), OpenNet Initiative, November 2010 [75] "War still having serious impact on freedom of expression" (http:/ / en. rsf. org/ belarus-war-still-having-serious-impact-on-10-09-2008,28489. html). Reporters Without Borders. . Retrieved 23 October 2010. [76] "India Country Report" (http:/ / www. freedomhouse. org/ images/ File/ FotN/ India2011. pdf), Freedom on the Net 2011, Freedom House [77] Italy's ban on foreign operators opens a new front in Europe's battle for a 'common market' for gambling (http:/ / web. archive. org/ web/ 20070409094225/ http:/ / www. ascendgaming. com/ IGWB/ magazine_current/ 0306IGWBCoverLead. htm) [78] "I Know This Is A Trite Title, But ... It's Not Just China", Threadwatch.org, 1 March 2006 (http:/ / www. threadwatch. org/ node/ 5767) (strong language) [79] "Sed Lex/Quando il Ministro viola la legge" (Sed Lex/When the minister violates the law) (http:/ / punto-informatico. it/ 2031873/ PI/ Commenti/ sed-lex-quando-ministro-viola-legge. aspx), TechNetwork, 4 July 2007 (Italian) [80] "Sequestro preventivo" del giudice: cos l'Italia oscura Pirate Bay (http:/ / www. repubblica. it/ 2007/ 09/ sezioni/ scienza_e_tecnologia/ musica-digitale/ pirate-bay/ pirate-bay. html) ("Seizure" of The Pirate Bay ordered by Italian courts), la Repubblica.it, 13 August 2008 (Italian)

365

Internet censorship by country


[81] "Fascist state censors Pirate Bay" (http:/ / thepiratebay. org/ blog/ 123), The Pirate Bay blog, 10 August 2008 (strong language) [82] "ONI Country Profile: Jordan" (http:/ / opennet. net/ research/ profiles/ jordan), OpenNet Initiative, 6 August 2009 [83] "ONI Country Profile: Kazakhstan" (http:/ / opennet. net/ research/ profiles/ kazakhstan), OpenNet Initiative, 9 December 2010 [84] Country Report on Human Rights Practices: Mauritania 2010 (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ af/ 154358. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [85] "ONI Country Profile: Moldova" (http:/ / opennet. net/ research/ profiles/ moldova), OpenNet Initiative, 19 December 2010 [86] "YouTube site 'blocked' in Morocco" (http:/ / news. bbc. co. uk/ 2/ hi/ africa/ 6702973. stm), BBC News, 29 May 2007 [87] "ONI Country Profile: Morocco" (http:/ / opennet. net/ research/ profiles/ morocco), OpenNet Initiative, 6 August 2009 [88] "ONI Country Profile: Russia" (http:/ / opennet. net/ research/ profiles/ russia), OpenNet Initiative, 19 December 2010 [89] "Lithuania shuts Chechen rebel site" (http:/ / news. bbc. co. uk/ 2/ hi/ europe/ 3669624. stm), BBC News, 18 September 2004 [90] "Chechen rebel website reopens" (http:/ / news. bbc. co. uk/ 2/ hi/ europe/ 3727266. stm), BBC News, 8 October 2004 [91] "Sweden Closed Kavkaz Center On Request From Russia" (http:/ / www. abovetopsecret. com/ forum/ thread206707/ pg), Education and Media section at Abovetopsecret.com, 6 May 2006 [92] Internet Restriction Bill Passes First Reading (http:/ / www. themoscowtimes. com/ business/ article/ internet-restriction-bill-passes-first-reading/ 461792. html), The Moscow Times, 8 July 2012, retrieved 9 July 2012 [93] "Law concerning the illegal websites register has come into force" (http:/ / kiziltan. ru/ en/ rubriks/ politics/ 12276. html), Lyudmila Ternovaya, , 30 July 2012, accessed 7 August 2012 [94] "Russia internet blacklist law takes effect" (http:/ / www. bbc. co. uk/ news/ technology-20096274). BBC. 31 October 2012. . Retrieved 3 November 2012. [95] "ONI Country Profile: Singapore" (http:/ / opennet. net/ research/ profiles/ singapore), OpenNet Initiative, 10 May 2007 [96] "Racist bloggers jailed" (http:/ / www. international. ucla. edu/ asia/ article. asp?parentid=31206), Chong Chee Kin, The Straits Times, 8 October 2005 [97] "ONI Country Profile: Tajikistan" (http:/ / opennet. net/ research/ profiles/ tajikistan), OpenNet Imitative, 1 December 2010 [98] "Country Report: Thailand" (http:/ / www. freedomhouse. org/ images/ File/ FotN/ Thailand2011. pdf), Freedom on the Net 2011, Freedom House, 18 April 2011 [99] AFP, Thailand says southern unrest worsening (http:/ / www. google. com/ hostednews/ afp/ article/ ALeqM5hQESp04-NFOG6zrOvhwREMuWJ-kQ?docId=CNG. 94f20013cdd393d22cb9d0a563a113f9. 581), 8 March 2011 [100] "Thai Cabinet agrees to lift emergency decree in Bangkok" (http:/ / articles. cnn. com/ 2010-12-21/ world/ thailand. emergency_1_emergency-decree-thai-cabinet-abhisit?_s=PM:WORLD), Kocha Olam, CNN World, 21 December 2010 [101] Act on Computer Crime B.E. 2550 (http:/ / advocacy. globalvoicesonline. org/ wp-content/ plugins/ download-monitor/ download. php?id=2), 10 June 2007, English translation [102] "Thailand lifts state of emergency, what now?" (http:/ / asiancorrespondent. com/ 44124/ thailand-lifts-state-of-emergency-what-now/ ), Asian Correspondent.com, Hybrid News Limited, 22 December 2010 [103] "Thailand's Massive Internet Censorship" (http:/ / www. asiasentinel. com/ index. php?option=com_content& task=view& id=2601& Itemid=185), Pavin Chachavalpongpun, Asia Sentinel, 22 July 2010 [104] "Illicit Website Reported Since April 2002" (http:/ / web. archive. org/ web/ 20060220123137/ http:/ / cyber. police. go. th/ reporting/ report/ sum. php). Royal Thai Police. Archived from the original (http:/ / cyber. police. go. th/ reporting/ report/ sum. php) on 20 February 2006. . [105] "Facts & Figures: Netizen Arrests & Internet Censorship" (http:/ / ilaw. or. th/ node/ 632), iLaw, December 2010 [106] Todd Pitman and Sinfah Tunsarawuth (27 March 2011). "Thailand arrests American for alleged king insult" (http:/ / news. yahoo. com/ s/ ap/ 20110527/ ap_on_re_as/ as_thailand_monarchy). Associated Press. . Retrieved 27 May 2011. [107] "The Internet "black holes" Tunisia" (http:/ / web. archive. org/ web/ 20070520015813/ http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=103& annee=2005). Reporters Without Borders. Archived from the original (http:/ / www. rsf. org/ int_blackholes_en. php3?id_mot=103& annee=2005) on 20 May 2007. . Retrieved 31 August 2006. [108] "Eriime Engellenen Siteler [Blocked Websites]" (http:/ / engelliweb. com/ ) (in Turkish). Engelli Web. . Retrieved 5 June 2010. [109] http:/ / www. imbd. com [110] Internet: Restricted Access: A Critical Assessment of Internet Content Regulation and Censorship in Turkey (http:/ / privacy. cyber-rights. org. tr/ ?page_id=256). 25 November 2008. pp.41. . [111] "Government agency wants to install filtering software on every computer" (http:/ / en. rsf. org/ turkey-government-agency-wants-to-install-06-05-2011,40238. html), Reporters Without Borders, 6 May 2011 [112] "Aprueban ley que regula contenidos de Internet y medios en Venezuela (new law regulates contents on the internet in Venezuela) (http:/ / www. eltiempo. com/ mundo/ latinoamerica/ aprueban-reforma-a-ley-que-regula-contenidos-de-internet-y-medios_8643260-4), El Tiempo.com, 20 December 2010 [113] "Countries under surveillance: Australia" (http:/ / en. rsf. org/ surveillance-australia,39749. html), Reporters Without Borders, March 2011 [114] "Telstra, Optus to start censoring the web next month" (http:/ / www. news. com. au/ technology/ internet-filter/ telstra-optus-to-begin-censoring-web-next-month/ story-fn5j66db-1226079954138#ixzz1Q1W8lmsl), Jennifer Dudley-Nicholson, News Limited newspapers, 22 June 2011 [115] "Countries under surveillance: Egypt" (http:/ / en. rsf. org/ surveillance-egypt,39740. html), Reporters Without Borders, March 2011 [116] "Egypt Profile" (http:/ / en. rsf. org/ egypt-egypt-12-03-2012,42049. html), Reporters Without Borders, March 2012

366

Internet censorship by country


[117] "Countries under surveillance: Eritrea" (http:/ / en. rsf. org/ surveillance-eritrea,39762. html), Reporters Without Borders, March 2011 [118] "Countries under surveillance: France" (http:/ / en. rsf. org/ surveillance-france,39715. html), Reporters Without Borders, March 2011 [119] "Article 18, Loi n2004-575 du 21 juin 2004 pour la confiance dans l'conomie numrique, modifi par Loi n2007-297 du 5 mars 2007", version consolide au 19 mai 2011 (http:/ / www. legifrance. gouv. fr/ affichTexte. do?cidTexte=JORFTEXT000000801164& dateTexte=#LEGIARTI000006421564) ("Act No. 2004-575 of 21 June 2004 on confidence in the digital economy, amended by Act No. 2007-297 of March 5, 2007", consolidated version 19 May 2011) ( English translation (http:/ / translate. googleusercontent. com/ translate_c?rurl=translate. google. com& twu=1& u=http:/ / www. legifrance. gouv. fr/ affichTexte. do?cidTexte=JORFTEXT000000801164& usg=ALkJrhj9qNLTP4tS27bbyaLn2F_hFwGcng#LEGIARTI000006421564)) [120] The Ministries of Defense, of Justice, of the Interior, of the Economy, of Communication, of Health, of the Digital Economy, and the National Authority for the Defense of Information Systems [121] "France on its way to total Internet censorship? (http:/ / www. indexoncensorship. org/ 2011/ 06/ france-on-its-way-to-total-internet-censorship/ )", Flix Trguer, Index on Censorship, 27 June 2011 [122] Chooi, Clara (2011-04-24). "Najib repeats promise of no Internet censorship" (http:/ / www. themalaysianinsider. com/ malaysia/ article/ najib-repeats-promise-of-no-internet-censorship/ ). The Malaysian Insider. . Retrieved 2011-05-27. [123] M. Kumar, Wong Pek Mei, and Jo Timbuong (11 June 2011). "No more free downloads as MCMC blocks 10 file sharing sites" (http:/ / thestar. com. my/ news/ story. asp?file=/ 2011/ 6/ 11/ nation/ 8879884& sec=nation). The Star (Malaysia). . Retrieved 15 June 2011. [124] "1M Malaysians Don't Want SKMM Block File Sharing Website" (http:/ / www. facebook. com/ DontBlockFS), Facebook, created 10 June 2011 [125] "Popular Tamil website 'blocked'" (http:/ / news. bbc. co. uk/ 2/ hi/ south_asia/ 6221844. stm), BBC News, 20 June 2007 [126] "Sri Lanka court blocks porn websites" (http:/ / www. thecolombotimes. com/ component/ content/ article/ 6625-sri-lanka-court-blocks-porn-websites), The Colombo Times, 25 July 2009 [127] "Sri Lanka bans over 100 porn websites featuring locals" (http:/ / www. colombopage. com/ archive_10B/ Aug26_1282830418CH. php), ColomboPage: Sri Lanka Internet Newspaper, 26 August 2010 [128] "Sri Lanka blocks 5 news websites over 'insults'" (http:/ / www. cbsnews. com/ 8301-501366_162-57319515/ sri-lanka-blocks-5-news-websites-over-insults/ ), CBS News via the Associated Press (Colombo, Sri Lanka), 7 November 2011 [129] "ONI Country Profile: Afghanistan" (http:/ / opennet. net/ research/ profiles/ afghanistan), OpenNet Initiative, May 2007 [130] "Another Bad Week for Free Expression on the Internet" (http:/ / www. eff. org/ deeplinks/ 2010/ 06/ another-bad-week-free-expression-internet). Electronic Frontier Foundation (EFF). 26 June 2010. . Retrieved 10 July 2010. [131] Afghanistan's threat to censor Facebook? Hasn't happened yet (http:/ / www. csmonitor. com/ World/ Global-News/ 2010/ 0713/ Afghanistan-s-threat-to-censor-Facebook-Hasn-t-happened-yet) The Christian Science Monitor, 13 July 2010 [132] "ONI Country Profile: Algeria" (http:/ / opennet. net/ research/ profiles/ algeria), OpenNet Initiative, 6 August 2009 [133] "Anteproyecto de ley de delitos informticos redactado por la Comision Interministerial Sobre Delitos Informaticos" (Spanish) (http:/ / www. asira. org. ar/ 07bas_del_proycomision. htm) ( English translation (http:/ / www. google. com/ translate_c?langpair=en& u=http:/ / www. asira. org. ar/ 07bas_del_proycomision. htm)), Information Security Association of the Argentine Republic (ASIRA) [134] "Race-hate groups find virtual haven in Argentina" (http:/ / www. csmonitor. com/ 2002/ 0823/ p07s02-woam. html), Colin Barraclough, The Christian Science Monitor, 23 August 2002 [135] "Silenced Argentina" (https:/ / www. privacyinternational. org/ article/ silenced-argentina), Privacy International, 21 January 2003 [136] "Comisin Nacional de Comunicaciones (CNC) communique to all telecommunications licensees that provide Internet Access Services" (Spanish) (http:/ / www. cnc. gov. ar/ noticia_detalle. asp?idnoticia=106) ( English translation (http:/ / www. google. com/ translate_c?langpair=en& u=http:/ / www. cnc. gov. ar/ noticia_detalle. asp?idnoticia=106)), CNC, 11 August 2011 [137] Argentina: Judge orders all ISPs to block the sites LeakyMails.com and Leakymails.blogspot.com (http:/ / opennet. net/ blog/ 2011/ 08/ argentina-judge-orders-all-isps-block-sites-leakymailscom-and-leakymailsblogspotcom) OpenNet Initiative, 11 August 2011 [138] "Argentine ISPs Use Bazooka to Kill Fly" (http:/ / www. eff. org/ deeplinks/ 2011/ 08/ argentina-isps-ip-overblocking). 19 August 2011. . Retrieved 19 August 2011. [139] "Pakistan Lifts Facebook Ban; Bangladesh Cracks Down" (http:/ / opennet. net/ blog/ 2010/ 06/ pakistan-lifts-facebook-ban-bangladesh-cracks-down), Rebekah Heacock, OpenNet Initiative, 1 June 2010 [140] "Bangladesh unblocks Facebook after Muhammad row" (http:/ / www. bbc. co. uk/ news/ 10247858), BBC News, 6 June 2010 [141] "Facebook blocked" (http:/ / www. thedailystar. net/ newDesign/ news-details. php?nid=140613), The Daily Star, 30 May 2010 [142] Grote Belgische firewall geactiveerd (Belgian Grand firewall activated) (http:/ / lvb. net/ item/ 7325), Luc Van Braekel, LVB.net, 21 April 2009 [143] StopPage (http:/ / 84. 199. 40. 99/ ) [144] "Title II, Chapter I, Article 5 of the Constitution of Brazil (http:/ / www. v-brazil. com/ government/ laws/ titleII. html) states in part that "IV - the expression of thought is free, anonymity being forbidden" and "XIV - access to information is ensured to everyone and the confidentiality of the source shall be safeguarded, whenever necessary to the professional activity". [145] Fortes, Leandro. "O fim da Idade Mendes" (http:/ / www. observatoriodaimprensa. com. br/ artigos. asp?cod=586JDB014). Observatrio da Imprensa. 23 April 2010. [146] "A Entrevista Censurada Pelo Ministro Gilmar Mendes - parte I" (Interview Censored by the Minister Gilmar Mendes - Part I) (http:/ / www. youtube. com/ watch?v=NuUIXaz1FpY& feature=related), video on YouTube (8:17), 19 March 2009. ( English translation of text (http:/ / www. google. com/ translate_c?langpair=en& u=))

367

Internet censorship by country


[147] "Top Google Executive in Brazil Faces Arrest Over Video" (http:/ / www. nytimes. com/ 2012/ 09/ 26/ business/ global/ top-google-executive-in-brazil-faces-arrest-over-video. html?emc=tnt& tntemail1=y), New York Times (Reuters), 25 September 2012 [148] "Digital Child Porn Watchdog: Too Big a Bite?" (http:/ / thetyee. ca/ Mediacheck/ 2007/ 03/ 07/ Watchdog/ ). The Tyee. 7 March 2007. . Retrieved 31 March 2010. [149] ""Internet chilena bloquea sitios de pornografa infantil" (Chilean Internet child pornography sites blocked)" (http:/ / www. laopinon. cl/ admin/ render/ noticia/ 17057) (in Spanish). La Opion. 6 October 2008. . Retrieved 21 October 2009. [150] "2010 Human rights Report: Croatia" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ eur/ 154418. htm), 2010 Human Rights Report: Croatia"], Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [151] "T-Mobile jde do UMTS FDD a do blokovn neleglnho obsahu" (T-Mobile goes into UMTS FDD and blocking of illegal content) (http:/ / www. lupa. cz/ clanky/ t-mobile-jde-do-umts-fdd/ ), Ji Peterka, Lupa.cz, 16 December 2008 [152] "Vodafone chrn nezletil ped nevhodnm obsahem na webu" (Vodafone protects minors from inappropriate web content) (http:/ / www. vodafone. cz/ o_vodafonu/ tiskove_centrum/ tiskove_zpravy/ tiskove_zpravy. htm?lang=cz& id=509& year=2008), press release, vodafone.cz, 26 June 2008 [153] "Stalo se: je cenzura Internetu u i v R?" (http:/ / www. lupa. cz/ clanky/ stalo-se-je-cenzura-internetu-uz-i-vnbspcr/ ), Ji Peterka, Lupa.cz, 30 June 2008 [154] "Klienti Telefniky O2 si stuj na blokovn web" (Telefonica O2 confirmed it plans to filter customers access to illegal Web sites) (http:/ / www. lupa. cz/ zpravicky/ telefonica-o2-potvrdila-filtrovani-stranek/ ), Ji Macich ml., Lupa.cz, 14 August 2009 [155] "Stalo se: U i Telefnica pistoupila k blokovn" (http:/ / www. lupa. cz/ clanky/ stalo-se-uz-i-telefonica-blokuje/ ), Ji Peterka, Lupa.cz, 17 August 2009 [156] "T-Mobile pomh v boji proti zneuvn dt blokovnm neleglnho obsahu" (T-Mobile helps in the fight against the abuse of children by blocking illegal content) (http:/ / t-press. cz/ tiskove_zpravy/ 2010/ 1081/ ), press release, T-Mobile.cz, 6 May 2010 [157] Krabbe, Klaus (18 October 2005). "TDC aktiverer filter mod brneporno (TDC enables filter against child pornography)" (http:/ / www. computerworld. dk/ art/ 30573) (in Danish). Computerworld. . Retrieved 19 July 2006. ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. computerworld. dk/ art/ 30573/ tdc-aktiverer-filter-mod-boerneporno)) [158] Madsen, Kristoffer (20 March 2006). "Politisk strid om politiets brneporno-filter (Political dispute over the police child porn filter)" (http:/ / www. computerworld. dk/ art/ 33209) (in Danish). Computerworld. . Retrieved 19 July 2006. ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. computerworld. dk/ art/ 33209/ politisk-strid-om-politiets-boerneporno-filter)) [159] Robert Vanglo (22 March 2006). ""TDC lukker for adgangen til Allofmp3.com" (TDC blocks access to Allofmp3.com)" (http:/ / www. computerworld. dk/ art/ 36701) (in Danish). ComputerWorld. . ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. computerworld. dk/ art/ 36701/ tdc-lukker-for-adgangen-til-allofmp3-com)) [160] "Danish ISP shuts access to file-sharing Pirate Bay" (http:/ / www. reuters. com/ article/ technologyNews/ idUSL0480268320080204). Reuters. 4 February 2008. . Retrieved 4 February 2008. [161] "Denmark: 3863 sites on censorship list, Feb 2008" (http:/ / mirror. wikileaks. info/ wiki/ Denmark__3863_sites_on_censorship_list,_Feb_2008/ ), Wikileaks, 23 December 2008 [162] Kildebogaard, Jesper (10 November 2011). "Staten har DNS-blokeret den frste udenlandske medicin-hjemmeside (The state DNS-blocks first foreign medicin website)" (http:/ / www. version2. dk/ artikel/ staten-har-dns-blokeret-den-foerste-udenlandske-medicin-hjemmeside-32553) (in Danish). Version2. . Retrieved 16 August 2012. ( English translation (http:/ / translate. google. com/ translate?u=www. version2. dk/ artikel/ staten-har-dns-blokeret-den-foerste-udenlandske-medicin-hjemmeside-32553)) [163] Vithner, Jens (16 August 2012). "Google sprrer for Viagogo (Google removes Viagogo from searches)" (http:/ / www. dr. dk/ DR1/ kontant/ 2012/ 08/ 16112455. htm) (in Danish). Cash (Dr.dk). . Retrieved 16 August 2012. ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. dr. dk/ DR1/ kontant/ 2012/ 08/ 16112455. htm)) [164] "ONI Regional Overview: Commonwealth of Independent States" (http:/ / opennet. net/ research/ regions/ cis), OpenNet Initiative, March 2010 [165] http:/ / www. casinopeople. com/ news/ estonia-implements-gambling-act. html [166] http:/ / www. baltictimes. com/ news/ articles/ 24397/ [167] http:/ / www. e24. ee/ ?id=231006 [168] http:/ / www. emta. ee/ ?lang=en [169] http:/ / www. emta. ee/ index. php?id=27399& tpl=1049 [170] http:/ / www. gimonca. com/ personal/ archive/ foreign. html [171] "Fiji muzzles critical blogs" (http:/ / www. smh. com. au/ news/ web/ fiji-silences-critical-blogs/ 2007/ 05/ 18/ 1178995370872. html). The Sydney Morning Herald. 18 May 2007. . Retrieved 18 May 2007. [172] "Laki lapsipornografian levittmisen estotoimista 1.12.2006/1068" (Measures to prevent the spread of child pornography 1.12.2006/1068) (http:/ / www. finlex. fi/ fi/ laki/ ajantasa/ 2006/ 20061068), FINLEX, 1 December 2006 [173] "The Finnish Internet Censorship List" (http:/ / www. lapsiporno. info/ suodatuslista/ ?lang=en), Matti Nikki, Lapsiporno.info [174] "Censorship is the answer" (http:/ / blog. anta. net/ 2008/ 01/ 18/ censorship-is-the-answer/ ). blog.anta.net. 18 January 2008. ISSN1797-1993. . Retrieved 18 January 2008. [175] "ONI Country Profile: Germany" (http:/ / opennet. net/ research/ profiles/ germany), OpenNet Initiative, 15 December 2010 [176] "Ghana Censorship 2008" (http:/ / www. nibii. com/ articlesghanacensorship). NIBII. 15 December 2008. .

368

Internet censorship by country


[177] 2010 Human Rights Report: Hungary" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ eur/ 154428. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [178] "New legislation to provide exemplary protection for freedom of information" (http:/ / en. rsf. org/ islande-nouvel-article-18-06-2010,37771. html), Reporters Without Borders, 21 June 2010 [179] "ONI Country Profile: Iraq" (http:/ / opennet. net/ research/ profiles/ iraq), OpenNet Initiative, 10 August 2009 [180] Zvi Zrahiya and Eran Gabay (7 September 2007). "Ministerial committee approves bill to censor adult websites" (http:/ / www. haaretz. com/ hasen/ spages/ 879614. html). Haaretz. . [181] Ehud Keinan and Aviad Glickman (12 July 2009). "( Ministers' committee said no to Internet censorship)" (http:/ / www. ynet. co. il/ articles/ 0,7340,L-3744789,00. html) (in Hebrew). ynet. . [182] "2010 Human Rights Report: Japan" (http:/ / www. state. gov/ j/ drl/ rls/ hrrpt/ 2010/ eap/ 154386. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [183] "Country report for Japan" (http:/ / www. freedomhouse. org/ report/ freedom-world/ 2011/ japan), Freedom in the World 2011, Freedom House, 2011 (covering events in 2010) [184] "Japan's Lolita merchants feel the heat" (http:/ / www. atimes. com/ atimes/ Front_Page/ JB23Aa02. html), William Sparrow, Asia Times Online, 23 February 2008 [185] "Country Report: Kenya" (http:/ / www. freedomhouse. org/ images/ File/ FotN/ Kenya2011. pdf), Freedom on the Net 2011, Freedom House, April 2011 [186] "2010 Human Rights Report: Laos" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ eap/ 154390. htm), Bureau of Democracy, Human Rights, and Labor<, U.S. Department of State, 8 April 2011 [187] "ONI Country Profile: Lebanon" (http:/ / opennet. net/ research/ profiles/ lebanon), OpenNet Initiative, August 6, 2009 [188] "ONI Country Profile: Nepal" (http:/ / opennet. net/ research/ profiles/ nepal), OpenNet Initiative, 10 May 2007 [189] "The Dutch Hotline" (http:/ / www. meldpunt-kinderporno. nl/ EN/ about_us. htm), Hotline combating Child Pornography on the Internet [190] (Dutch) "Dutch internet filtering off track" (http:/ / webwereld. nl/ nieuws/ 105947/ nederlands-internetfilter-van-de-baan. html) ( English translation) (http:/ / translate. google. com/ translate?u=http:/ / webwereld. nl/ nieuws/ 105947/ nederlands-internetfilter-van-de-baan. html), Rene Schoemaker, WebWereld (IDG Netherlands), 7 March 2011 [191] (Dutch) "Politiek zegt 'nee' tegen internetfilter" (http:/ / tweakers. net/ nieuws/ 74508/ politiek-zegt-nee-tegen-internetfilter. html) ("Politics says no to internet filter") ( English translation (http:/ / translate. google. com/ translate?u=http:/ / tweakers. net/ nieuws/ 74508/ politiek-zegt-nee-tegen-internetfilter. html)), Joost Schellevis, Tweakers.net, 18 May 2011 [192] (Dutch) Ziggo en XS4ALL moeten toegang The Pirate Bay blokkeren" (http:/ / www. nu. nl/ internet/ 2712455/ ziggo-en-xs4all-moeten-toegang-the-pirate-bay-blokkeren. html) (Ziggo and XS4all required to block The Pirate Bay) ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. nu. nl/ internet/ 2712455/ ziggo-en-xs4all-moeten-toegang-the-pirate-bay-blokkeren. html)), NU.nl, Netherlands Sanoma media group, 11 January 2012 [193] (Dutch) "Brein speelt voor eigen rechter" (http:/ / www. nu. nl/ internet/ 2722173/ brein-speelt-eigen-rechter. html) (BREIN plays for itself) ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. nu. nl/ internet/ 2722173/ brein-speelt-eigen-rechter. html)), NU.nl, Netherlands Sanoma media group, 24 January 2012 [194] (Dutch) "The Pirate Bay noemt Brein corrupte organisatie" (http:/ / www. nu. nl/ internet/ 2713599/ the-pirate-bay-noemt-brein-corrupte-organisatie. html) (Pirate Bay calls BREIN a corrupt organization) ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. nu. nl/ internet/ 2713599/ the-pirate-bay-noemt-brein-corrupte-organisatie. html)), NU.nl, Netherlands Sanoma media group, 12 January 2012 [195] (Dutch) "Kamer eist opheldering over Pirate Bay-blokkades" (http:/ / www. nu. nl/ internet/ 2717063/ kamer-eist-opheldering-pirate-bay-blokkades. html) (House requires explanation about Priate Bay blockades) ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. nu. nl/ internet/ 2717063/ kamer-eist-opheldering-pirate-bay-blokkades. html)), NU.nl, Netherlands Sanoma media group, 18 January 2012 [196] "New Zealand's government internet filter is already running" (http:/ / techliberty. org. nz/ nz-filter-now-operational/ ). Tech Liberty NZ. . Retrieved 24 March 2010. [197] "Second online journalist arrested in one week" (http:/ / en. rsf. org/ nigeria-second-online-journalist-arrested-04-11-2008,29185), Reporters Without Borders, 4 November 2008 [198] "Barnepornofilter (Child Porn Filter: Telenor has launched KRIPOS filter against child pornography on the Internet)(Norwegian)" (http:/ / web. archive. org/ web/ 20080115182456/ http:/ / www. online. no/ datasikkerhet/ barnepornofilter. html). Online.no. Archived from the original (http:/ / www. online. no/ datasikkerhet/ barnepornofilter. html) on 15 January 2008. . Retrieved 3 February 2008. [199] "Norwegian secret internet censorship blacklist, 3518 domains, 18 Mar 2009" (http:/ / www. wikileaks. ch/ wiki/ Norwegian_secret_internet_censorship_blacklist,_3518_domains,_18_Mar_2009). Wikileaks. 18 March 2009. . Retrieved 24 September 2009. [200] "Norway's Knut Storberget tells ISPs to deploy secret censorship lists" (http:/ / wikileaks. org/ wiki/ Norway's_Knut_Storberget_tells_ISPs_to_deploy_secret_censorship_lists,_29_Aug_2008), Wikileaks, 29 Aug 2008] [201] "Paraguay" (http:/ / www. state. gov/ j/ drl/ rls/ hrrpt/ humanrightsreport/ index. htm?dlid=186534), Country Reports on Human Rights Practices for 2011, Bureau of Democracy, Human Rights and Labor, U.S. Department of State, 25 May 2012. This article incorporates text from this source, which is in the public domain. [202] "Censorship at Radio Nacional, threats and violence from presidents inner circle" (http:/ / en. rsf. org/ paraguay-censorship-at-radio-nacional-19-09-2012,43409. html), Reporters Without Borders, 19 September 2011

369

Internet censorship by country


[203] "In continuing purge, 27 employees fired from state TV" (http:/ / en. rsf. org/ paraguay-in-continuing-purge-27-employees-05-09-2012,43332. html), Reporters Without Borders, 5 September 2012 [204] "Purges in state media, community radios on alert" (http:/ / en. rsf. org/ paraguay-threat-of-purges-hangs-over-state-12-07-2012,43014. html), Reporters Without Borders, 13 July 2012 [205] "Community radio stations face crackdown for 'inciting crime'" (http:/ / en. rsf. org/ paraguay-community-radio-stations-face-14-08-2012,43225. html), Reporters Without Borders, 14 August 2012 [206] "Purges in state media, community radios on alert" (http:/ / en. rsf. org/ paraguay-threat-of-purges-hangs-over-state-12-07-2012,43014. html), Reporters Without Borders, 12 July 2012 [207] "2010 Human Rights Report: Peru" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ wha/ 154516. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [208] "2010 Human rights Report: Philippines" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ eap/ 154399. htm), Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [209] http:/ / www. interaksyon. com/ infotech/ opinion-beware-the-cybercrime-laws-section-19-the-takedown-clause [210] Canlas, Jonas (27 September 2012). "Suits pile up assailing anti-cybercrime law" (http:/ / www. manilatimes. net/ index. php/ news/ nation/ 31925-suits-pile-up-assailing-anti-cybercrime-law). The Manila Times. . Retrieved 27 September 2012. [211] Torres, Tetch (9 October 2012). "SC issues TRO vs cyber law" (http:/ / newsinfo. inquirer. net/ 285848/ sc-stops-cyber-law). Philippine Daily Inquirer (Philippine Daily Inquirer, Inc.). . Retrieved 9 October 2012. [212] "Security Question 2 in Country Report: Poland" (http:/ / portal. bsa. org/ cloudscorecard2012/ assets/ pdfs/ country_reports/ Country_Report_Poland. pdf), BSA Global Cloud Computing Scorecard, Business Software Alliance, 22 February 2012 [213] "Government stopped from preparing illegal anti-internet piracy legislation" (http:/ / www. thenews. pl/ 1/ 12/ Artykul/ 91997,Government-stopped-from-preparing-illegal-antiinternet-piracy-legislation), Polskie Radio, 2 March 2012 [214] "Polish Government Feels Urge to Regulate Internet" (http:/ / blogs. wsj. com/ emergingeurope/ 2011/ 03/ 16/ polish-government-feels-urge-to-regulate-internet/ ), Marcin Sobczyk, Wall Street Journal, 16 March 2011 [215] "Country Report: Rwanda" (http:/ / www. freedomhouse. org/ images/ File/ FotN/ Rwanda2011. pdf), Freedom on the Net 2011, Freedom House, April 2011 [216] "2010 Human Rights Report: Rwanda" (http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ af/ 154364. htm), 2010 Human Rights Report: Rwanda Bureau of Democracy, Human Rights, and Labor, U.S. Department of State, 8 April 2011 [217] "Nesmiselna blokada spletnih stavnic" (Unreasonable seizure of betting) (http:/ / www. dnevnik. si/ novice/ slovenija/ 1042427509), Blaz Petkovic and Katja Svenek, Dnevnik.si, 1 March 2011 ( English translation (http:/ / translate. google. com/ translate?u=http:/ / www. dnevnik. si/ novice/ slovenija/ 1042427509)) [218] http:/ / www. lapsiporno. info/ blocked. glocalnet [219] "ONI Country Profile: Uganda" (http:/ / opennet. net/ research/ profiles/ uganda), OpenNet Initiative, September 30, 2009 [220] "ONI Country Profile: Ukraine" (http:/ / opennet. net/ research/ profiles/ ukraine), OpenNet Initiative, December 21, 2010 [221] "Country report: United Kingdom" (http:/ / opennet. net/ research/ profiles/ united-kingdom), OpenNet Initiative, 18 December 2010 [222] " IWF/BT Project Cleanfeed (http:/ / www. iwf. org. uk/ media/ news. archive-2004. 39. htm)", Internet Watch Foundation. Retrieved 29 May 2006. [223] " How net providers stop child porn (http:/ / news. bbc. co. uk/ 2/ hi/ technology/ 4689386. stm)", BBC News, 7 February 2006. Retrieved 29 May 2006. [224] http:/ / www. webminder. net/ [225] "BT ordered to block links to Newzbin 2 website" (http:/ / www. bbc. co. uk/ news/ technology-14322957). BBC News. 2011-07-27. . Retrieved 2011-07-27. [226] "BT ordered to block Newzbin2 filesharing site within 14 days" (http:/ / www. guardian. co. uk/ technology/ 2011/ oct/ 26/ bt-block-newzbin2-filesharing-site), Mark Sweney, The Guardian, 26 October 2011 [227] "Brit ISPs shift toward rapid pirate website blocking" (http:/ / www. theregister. co. uk/ 2011/ 09/ 22/ isp_web_blocking/ ), Andrew Orlowski, The Register, 22 September 2011 [228] "Pirate Bay must be blocked, High Court tells ISPs" (http:/ / www. telegraph. co. uk/ technology/ news/ 9236667/ Pirate-Bay-must-be-blocked-High-Court-tells-ISPs. html), Matt Warman, The Telegraph, 30 April 2012 [229] "The Pirate Bay cut off from millions of Virgin Media customers" (http:/ / www. telegraph. co. uk/ technology/ broadband/ 9242729/ The-Pirate-Bay-cut-off-from-millions-of-Virgin-Media-customers. html), Christopher Williams, The Telegraph, 3 May 2012 [230] "ONI Country Profile: Zimbabwe" (http:/ / opennet. net/ research/ profiles/ zimbabwe), OpenNet Initiative, September 30, 2009 [231] http:/ / www. state. gov/ g/ drl/ rls/ hrrpt/ 2010/ index. htm [232] http:/ / opennet. net/ research/ profiles [233] http:/ / opennet. net/ regional-overviews [234] http:/ / opennet. net/ research/ map [235] Creative Commons Attribution 3.0 Unported license (http:/ / creativecommons. org/ licenses/ by/ 3. 0/ deed. en), see the lower right corner of pages at the OpenNet Initiative web site (http:/ / opennet. net/ )

370

Internet censorship by country

371

External links
OpenNet Initiative web site (http://opennet.net/). Reporters Without Borders web site (http://en.rsf.org/). Global Integrity: Internet Censorship, A Comparative Study (http://www.globalintegrity.org/node/130), Jonathan Werve, Global Integrity Commons, 19 February 2008, puts online censorship in cross-country context.

372

Organizations
Internet Corporation for Assigned Names and Numbers
ICANN
Founded September 18, 1998

Headquarters Los Angeles, California, U.S. Key people Focus Website Fadi Chehad Manage Internet protocol numbers and Domain Name System root www.icann.org [1]

The Internet Corporation for Assigned Names and Numbers (ICANN, /akn/ EYE-kan) is a nonprofit private organization headquartered in Los Angeles, California, United States, that was created on September 18, 1998, and incorporated on September 30, 1998[2] to oversee a number of Internet-related tasks previously performed directly on behalf of the U.S. government by other organizations, notably the Internet Assigned Numbers Authority (IANA), which ICANN now operates. ICANN is responsible for the coordination of the global Internet's systems of unique identifiers and, in particular, ensuring its stable and secure operation.[3] This work includes coordination of the Internet Protocol address spaces (IPv4 and IPv6) and assignment of address blocks to regional Internet registries, for maintaining registries of Internet protocol identifiers, and for the management of the top-level domain name space (DNS root zone), which includes the operation of root name servers. Most visibly, much of its work has concerned the DNS policy development for internationalization of the DNS system and introduction of new generic top-level domains (TLDs). The actual technical maintenance work of maintenance of the central Internet address pools and DNS root registries ICANN performs pursuant to the "IANA function" contract. ICANN's primary principles of operation have been described as helping preserve the operational stability of the Internet; to promote competition; to achieve broad representation of the global Internet community; and to develop policies appropriate to its mission through bottom-up, consensus-based processes.[4] On September 29, 2006, ICANN signed a new agreement with the United States Department of Commerce (DOC) that moves the private organization towards full management of the Internet's system of centrally coordinated identifiers through the multi-stakeholder model of consultation that ICANN represents.[5]

Internet Corporation for Assigned Names and Numbers

373

History
Before the establishment of ICANN, the Government of the United States controlled the domain name system of the Internet.[6] The original mandate for ICANN came from the United States government, spanning the presidential administrations of both Bill Clinton and George W. Bush. On January 30, 1998, the National Telecommunications and Information Administration (NTIA), an agency of the U.S. Department of Commerce, issued for comment, "A Proposal to Improve the Technical Management of Internet Names and Addresses." The proposed rule making, or "Green Paper [7] ", was published in the Federal Register on February 20, 1998, providing opportunity for public comment. NTIA received more than 650 comments as of March 23, 1998, when the comment period closed. The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of robust competition and facilitates global participation in Internet management. The Green Paper proposed for discussion a variety of issues relating to DNS management including private sector creation of a new not-for-profit corporation (the "new corporation") managed by a globally and functionally representative Board of Directors. ICANN was formed in response to this policy. The IANA function currently exists under an agreement with the U.S. Department of Commerce. ICANN was incorporated in California on September 30, 1998, with leading entrepreneurs and philanthropist Esther Dyson as founding chairwoman.[2] It is qualified to do business in the District of Columbia.[8] ICANN was established in California due to the presence of Jon Postel, who was a founder of ICANN and was set to be its first CTO prior to his unexpected death. ICANN remains in the same building where he worked, which is home to an office of the Information Sciences Institute at the University of Southern California. Per its original Bylaws [9], primary responsibility for policy formation in ICANN was to be delegated to three supporting organizations (Address Supporting Organization, Domain Name Supporting Organization, and Protocol Supporting Organization), each of which was to develop and recommend substantive policies and procedures for the management of the identifiers within their respective scope. As expected, the Regional Internet Registries and the IETF agreed to serve as the Address Supporting Organization and Protocol Supporting Organization respectively,[10][11] and ICANN issued a call for interested parties to propose the structure and composition of the Domain Name Supporting Organization.[12] On 4 March 1999, the ICANN Board, based in part on the DNSO proposals received, decided instead on an alternate construction for DNSO which delineated specific constituencies.[13][14] On July 26, 2006, the United States government renewed the contract with ICANN for performance of the IANA function for an additional one to five years.[15] The context of ICANN's relationship with the U.S. government was clarified on September 29, 2006 when ICANN signed a new Memorandum of understanding with the United States Department of Commerce (DOC).[16] This document does give the DoC a final, unilateral oversight over some of the ICANN operations.[16][17] In July 2008, the U.S. Department of Commerce reiterated an earlier statement[18] that it has "no plans to transition management of the authoritative root zone file to ICANN". The letter also stresses the separate roles of the IANA and VeriSign.[19]

Structure
At present, ICANN is formally organized as a non-profit corporation "for charitable and public purposes" under the California Nonprofit Public Benefit Corporation Law. It is managed by a 16-member Board of Directors, which is composed of eight members selected by a Nominating Committee on which all the constituencies of ICANN are represented; six representatives of its Supporting Organizations, sub-groups that deal with specific sections of the policies under ICANN's purview; an At-Large seat filled by an At-Large Organization; and the President / CEO, appointed by the Board. [20]

Internet Corporation for Assigned Names and Numbers There are currently three Supporting Organizations. The Generic Names Supporting Organization (GNSO) deals with policy making on generic top-level domains (gTLDs). The Country Code Names Supporting Organization (ccNSO) deals with policy making on country-code top-level domains (ccTLDs). The Address Supporting Organization (ASO) deals with policy making on IP addresses. ICANN also relies on some advisory committees to receive advice on the interests and needs of stakeholders that do not directly participate in the Supporting Organizations. These include the Governmental Advisory Committee (GAC), which is composed of representatives of a large number of national governments from all over the world; the At-Large Advisory Committee (ALAC), which is composed of representatives of organizations of individual Internet users from around the world; the Root Server System Advisory Committee, which provides advice on the operation of the DNS root server system; the Security and Stability Advisory Committee (SSAC), which is composed of Internet experts who study security issues pertaining to ICANN's mandate; and the Technical Liaison Group (TLG), which is composed of representatives of other international technical organizations that focus, at least in part, on the Internet.

374

Governmental Advisory Committee


The Governmental Advisory Committee has representatives from 111 states (108 UN members, Cook Islands, Niue and Taiwan), the Holy See, Hong Kong, Bermuda, Montserrat, the European Commission and the African Union [21] Commission. In addition the following organizations are GAC Observers:[22]

Governmental Advisory Committee representatives

African Telecommunications Union Asia-Pacific Telecommunity Commonwealth Telecommunications Organisation (CTO) Council of Europe Economic Commission for Africa (ECA) European Broadcasting Union European Organization for Nuclear Research (CERN) European Space Agency International Labour Office International Telecommunication Union (ITU) International Criminal Police Organization (INTERPOL) League of Arab States New Partnership for Africa's Development (NEPAD) Organisation for Economic Cooperation and Development Organisation Internationale de la Francophonie (OIF) Pacific Islands Forum REGULATEL Secretariat of the Pacific Community (SPC)

Inter-American Telecommunication Commission (CITEL) International Criminal Court United Nations Educational Scientific and Cultural Organization (UNESCO)

Internet Corporation for Assigned Names and Numbers Universal Postal Union World Health Organization World Intellectual Property Organization (WIPO) World Bank World Trade Organization

375

Democratic input
In the Memorandum of Understanding that set up the relationship between ICANN and the U.S. government, ICANN was given a mandate requiring that it operate "in a bottom up, consensus driven, democratic manner." However, the attempts that ICANN have made to set up an organizational structure that would allow wide input from the global Internet community did not produce results amenable to the current Board. As a result, the At-Large constituency and direct election of board members by the global Internet community were soon abandoned.[23] ICANN holds periodic public meetings rotated between continents for the purpose of encouraging global participation in its processes. Resolutions of the ICANN Board, preliminary reports, and minutes of the meetings, are published on the ICANN website, sometimes in real time. However there are criticisms from ICANN constituencies including the Noncommercial Users Constituency (NCUC) and the At-Large Advisory Committee (ALAC) that there is not enough public disclosure and that too many discussions and decisions take place out of sight of the public. In the early 2000s, there had been speculation that the United Nations might signal a takeover of ICANN,[24] followed by a negative reaction from the US government[18] and worries about a division of the Internet[25] the World Summit on the Information Society in Tunisia in November 2005 agreed not to get involved in the day-to-day and technical operations of ICANN. However it also agreed to set up an international Internet Governance Forum, with a consultative role on the future governance of the Internet. ICANN's Government Advisory Committee is currently set up to provide advice to ICANN regarding public policy issues and has participation by many of the world's governments.[26] Some have attempted to argue that ICANN was never given the authority to decide policy, e.g., choose new TLDs or shut out other interested parties who refuse to pay ICANN's US$185,000 fee, but was to be a technical caretaker. Critics suggest that ICANN should not be allowed to impose business rules on market participants, and that all TLDs should be added on a first-come, first-served basis and the market should be the arbiter of who succeeds and who does not.

Activities
One task that ICANN was asked to do was to address the issue of domain name ownership resolution for generic top-level domains (gTLDs). ICANN's attempt at such a policy was drafted in close cooperation with the World Intellectual Property Organization (WIPO), and the result has now become known as the Uniform Dispute Resolution Policy (UDRP). This policy essentially attempts to provide a mechanism for rapid, cheap and reasonable resolution of domain name conflicts, avoiding the traditional court system for disputes by allowing cases to be brought to one of a set of bodies that arbitrate domain name disputes. According to ICANN policy, a domain registrant must agree to be bound by the UDRP they cannot get a domain name without agreeing to this. A look at the UDRP decision patterns has led some[27] to conclude that compulsory domain name arbitration is less likely to give a fair hearing to domain name owners asserting defenses under the First Amendment and other laws, compared to the federal courts of appeal in particular.

Internet Corporation for Assigned Names and Numbers

376

Notable events
On March 18, 2002, publicly elected At-Large Representative for North America board member Karl Auerbach sued ICANN in Superior Court in California to gain access to ICANN's accounting records without restriction. Auerbach won.[28] In September and October 2003, ICANN played a crucial role in the conflict over VeriSign's "wild card" DNS service Site Finder. After an open letter from ICANN issuing an ultimatum to VeriSign, later supported by the IAB,[29] the company voluntarily shut down the service on October 4, 2003. Following this action, VeriSign filed a lawsuit against ICANN on February 27, 2004, claiming that ICANN had overstepped its authority. In this lawsuit, VeriSign sought to reduce ambiguity about ICANN's authority. The antitrust component of VeriSign's claim was dismissed in August 2004. VeriSign's broader challenge that ICANN overstepped its contractual rights is currently outstanding. A proposed settlement already approved by ICANN's board would resolve VeriSign's challenge to ICANN in exchange for the right to increase pricing on .com domains. At the meeting of ICANN in Rome, which took place from March 2 to March 6, 2004, ICANN agreed to ask approval of the US Department of Commerce for the Waiting List Service of VeriSign. On May 17, 2004, ICANN published a proposed budget for the year 2004-05. It included proposals to increase the openness and professionalism of its operations, and greatly increased its proposed spending from US $8.27 million to $15.83 million. The increase was to be funded by the introduction of new top-level domains, charges to domain registries, and a fee for some domain name registrations, renewals and transfers (initially USD 0.20 for all domains within a country-code top-level domain, and USD 0.25 for all others). The Council of European National Top Level Domain Registries (CENTR), which represents the Internet registries of 39 countries, rejected the increase, accusing ICANN of a lack of financial prudence and criticizing what it describes as ICANN's "unrealistic political and operational targets". Despite the criticism, the registry agreement for the top-level domains jobs and travel includes a US $2 fee on every domain the licensed companies sell or renew.[30] After a second round of negotiations in 2004, the TLDs eu, asia, travel, jobs, mobi, and cat were introduced in 2005. On February 28, 2006, ICANN's board approved a settlement with VeriSign in the lawsuit resulting from SiteFinder that involved allowing VeriSign (the registry) to raise its registration fees by up to 7% a year.[31] This was criticised by some people in the US House of Representatives' Small Business committee.[32] In February 2007, ICANN began the steps to remove accreditation of one of their registrars, RegisterFly amid charges and lawsuits involving fraud, and criticism of ICANN's handling of the situation. ICANN has been the subject of criticism as a result of its handling of RegisterFly, and the harm caused to thousands of clients due to what has been called ICANN's "laissez faire attitude toward customer allegations of fraud".[33]

ICANN meeting, Los Angeles USA, 2007. The sign refers to Vint Cerf, then Chairman of the Board of Directors, who is working on the Interplanetary Internet.

On May 23, 2008, ICANN issued Enforcement Notices against 10 Accredited Registrars and announced this through a press release entitled: "Worst Spam Offenders" Notified by ICANN, Compliance system working to correct Whois and other issues.[34] This was largely in response to a report issued by KnujOn called The 10 Worst Registrars in terms of spam advertised junk product sites and compliance failure.[35] The mention of the word spam in the title of the ICANN memo is somewhat misleading since ICANN does not address issues of spam or email abuse. Website content and usage are not within ICANN's mandate. However the KnujOn Report details how various registrars have not complied with their contractual obligations under the Registrar Accreditation Agreement (RAA).[36] The main point of the KnujOn research was to demonstrate the relationships between compliance failure, illicit product traffic,

Internet Corporation for Assigned Names and Numbers and spam. The report demonstrated that out of 900 ICANN accredited Registrars fewer than 20 held 90% of the web domains advertised in spam. These same Registrars were also most frequently cited by KnujOn as failing to resolve complaints made through the Whois Data Problem Reporting System (WDPRS). On June 26, 2008, the ICANN Board started a new process of TLD naming policy to take a "significant step forward on the introduction of new generic top-level domains." This program envisions the availability of many new or already proposed domains, as well a new application and implementation process.[37] On October 1, 2008, ICANN issued Breach Notices against Joker and Beijing Innovative Linkage Technology Ltd.[38] after further researching reports and complaints issued by KnujOn. These notices gave the Registrars 15 days to fix their Whois investigation efforts. In 2010, ICANN approved a major review of its policies with respect to accountability, transparency, and public participation by the Berkman Center for Internet and Society at Harvard University.[39] This external review was in support of the work of ICANN's Accountability and Transparency Review team.[40] On February 3, 2011, ICANN announced that it had distributed the last batch of its remaining IPv4 addresses to the worlds five Regional Internet Registries, the organizations that manage IP addresses in different regions. These Registries will begin assigning the final IPv4 addresses within their regions until they run out completely, which could come as soon as early 2012.[41] On June 20, 2011 the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD).[42][43] Companies and organizations will be able to choose essentially arbitrary top level Internet domain names. The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) will also be allowed in gTLDs. ICANN will begin accepting applications for new gTLDS on January 12, 2012.[42] The initial price to apply for a new gTLD will be $185,000.[44] The renewal or the annual fee of the domain will further be $25,000.[45][46] It is anticipated that many corporations will apply for gTLDs based on their brands. ICANN expects that the first batch of new gTLDs will be operational by the end of 2012.[47] ICANN expects the new rules to significantly change the face of the Internet. Peter Thrush, chairman of ICANN's board of directors stated after the vote: "Today's decision will usher in a new Internet age. We have provided a platform for the next generation of creativity and inspiration. Unless there is a good reason to restrain it, innovation should be allowed to run free."[48] Some would argue that the innovative freedom Peter Thrush talks about starts at $185,000, and thus is not accessible to everyone.[49]

377

References
[1] http:/ / www. icann. org [2] California Secretary of State, Internet Corporation for Assigned Names and Numbers (http:/ / kepler. ss. ca. gov/ corpdata/ ShowAllList?QueryCorpNumber=C2121683). Accessed 2009.09.18. [3] "ICANN Bylaws" (http:/ / www. icann. org/ en/ general/ archive-bylaws/ bylaws-18mar11-en. htm). . Retrieved 30 November 2011. [4] "Memorandum of understanding between the U.S. Department of Commerce and Internet Corporation for assigned names and numbers" (http:/ / www. icann. org/ en/ general/ icann-mou-25nov98. htm). 25 November 98. . Retrieved 2009-09-30. [5] ICANN-DOC JPA 09-29-2006 (http:/ / www. ntia. doc. gov/ ntiahome/ domainname/ agreements/ jpa/ ICANNJPA_09292006. htm) [6] Brito, Jerry. " ICANN vs. the World (http:/ / techland. time. com/ 2011/ 03/ 05/ icann-vs-the-world/ )." TIME. March 5, 2011. Retrieved on March 6, 2011. [7] http:/ / www. ntia. doc. gov/ ntiahome/ domainname/ domainname130. htm [8] D.C. Department of Consumer and Regulatory Affairs, Internet Corporation for Assigned Names and Numbers (http:/ / mblr. dc. gov/ corp/ lookup/ status. asp?id=259200). Accessed 2009.09.18. [9] http:/ / www. icann. org/ en/ about/ governance/ bylaws/ bylaws-06nov98-en. htm#VI [10] "Santiago Resolutions" (http:/ / archive. icann. org/ en/ meetings/ santiago/ santiago-resolutions. htm). ICANN Board Resolutions. ICANN. . Retrieved 22 May 2012. [11] "Executive Summary of DNS/ICANN Issues" (http:/ / cyber. law. harvard. edu/ pressbriefings/ icann/ briefingbook/ executivesummaries. html). Harvard Cyberlaw Briefing Book. Berkman Center. . Retrieved 21 May 2012. [12] "DNSO Application Timetable" (http:/ / www. dnso. org/ history/ www. dnso. org/ docs/ dnso-app-timetable. htm). DNSO. . Retrieved 21 May 2012. [13] ICANN Board. "DNSO Singapore Statement" (http:/ / archive. icann. org/ en/ meetings/ singapore/ singapore-statement. htm). ICANN. . Retrieved 21 May 2012.

Internet Corporation for Assigned Names and Numbers


[14] "DNSO Formation Concepts" (http:/ / archive. icann. org/ en/ meetings/ singapore/ dnso-formation. htm). ICANN. . Retrieved 21 May 2012. [15] "United States cedes control of the Internet - but what now?" (http:/ / www. theregister. co. uk/ 2006/ 07/ 27/ ntia_icann_meeting/ ). The Register. July 27, 2006. . [16] Wolfgang Benedek; Veronika Bauer; Matthias C. Kettemann (2008). Internet Governance and the Information Society: Global Perspectives and European Dimensions (http:/ / books. google. com/ books?id=ie7Yqiw85TcC& pg=PA16). Eleven International Publishing. p.16. ISBN978-90-77596-56-2. . Retrieved 13 April 2012. [17] Rebecca MacKinnon (31 January 2012). Consent of the Networked: The Worldwide Struggle For Internet Freedom (http:/ / books. google. com/ books?id=A1Ll03dPL1cC& pg=PA207). Basic Books. p.207. ISBN978-0-465-02442-1. . Retrieved 13 April 2012. [18] "Bush administration annexes Internet" (http:/ / www. theregister. co. uk/ 2005/ 07/ 01/ bush_net_policy/ ). The Register. July 1, 2005. . [19] "U.S. DoC letter to ICANN's Chairman" (http:/ / www. ntia. doc. gov/ comments/ 2008/ ICANN_080730. html). 2008-07-30. . Retrieved 2008-08-03. [20] https:/ / www. icann. org/ en/ about/ governance/ bylaws#VI [21] GAC Representatives (https:/ / gacweb. icann. org/ display/ gacweb/ GAC+ Representatives) [22] GAC Observers (https:/ / gacweb. icann. org/ display/ gacweb/ GAC+ Observers) [23] ICANN decided to reduce direct public ("at large") participation on March 14, 2002, at a public meeting in Accra, Ghana. [24] "U.N. Summit to Focus on Internet" (http:/ / www. washingtonpost. com/ ac2/ wp-dyn/ A36852-2003Dec4?language=printer). Washington Post. December 5, 2003. . [25] "Power grab could split the net" (http:/ / news. com. com/ 2010-1071_3-5886556. html). CNET. October 3, 2005. . [26] ICANN Government Advisory Committee (http:/ / gac. icann. org/ about-gac/ ) [27] Hannibal Travis, The Battle for Mindshare: the Emerging Consensus that the First Amendment Protects Corporate Criticism and Parody on the Internet, 10 Virginia Journal of Law and Technology 3, 32-34 (2005), Vjolt.net (http:/ / www. vjolt. net/ vol10/ issue1/ v10i1_a3-Travis. pdf)

378

[28] "Court Grants Access to Net Regulatory Corp Records" (http:/ / w2. eff. org/ Infrastructure/ DNS_control/ ICANN_IANA_IAHC/ Auerbach_v_ICANN/ 20020729_eff_icann_pr. html), Media Release, Electronic Frontier Foundation (EEF), 29 July 2002 [29] Geoff Huston (2003-10-17). "Wildcard entries in DNS entries" (http:/ / www. iab. org/ documents/ correspondence/ 2003-10-17-crocker-wildcards. html). IAB. . Retrieved 2008-06-23. [30] "ICANN imposes $2 Internet tax" (http:/ / www. theregister. co. uk/ 2005/ 03/ 31/ icann_2buck_fee). The Register. March 31, 2005. . [31] "ICANN Board Approves VeriSign Settlement Agreements" (http:/ / www. icann. org/ announcements/ announcement-28feb06. htm), Internet Corporation for Assigned Names and Numbers (ICANN), 28 February 2006, retrieved November 1, 2006 [32] CNET: Domain name price hikes come under fire (http:/ / news. com. com/ Domain+ name+ price+ hikes+ come+ under+ fire/ 2100-1030_3-6081336. html?tag=nefd. top) [33] The Register, Burke Hansen Of ICANN and the Registerfly meltdown (http:/ / www. theregister. co. uk/ 2007/ 03/ 03/ icann_registerfly_domain/ ), March 3, 2007 [34] "'Worst Spam Offenders' Notified by ICANN (http:/ / www. icann. org/ en/ announcements/ announcement-23may08-en. htm), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 23 May 2008 [35] "2008 ICANN Registrar Report" (http:/ / www. knujon. com/ registrars/ #may08RegistrarReport), KnujOn.com [36] "Registrar Accreditation Agreement" (http:/ / www. icann. org/ en/ registrars/ ra-agreement-17may01. htm), Internet Corporation for Assigned Names and Numbers (ICANN), 17 May 2001 with updates 2002-2006 [37] "32nd International Public ICANN Meeting" (http:/ / par. icann. org/ ). ICANN. 2008-06-22. . [38] http:/ / www. icann. org/ en/ announcements/ announcement-01oct08-en. htm [39] "Accountability and Transparency Review Team Selection of Independent Expert and Update on ATRT Review" (http:/ / www. icann. org/ en/ announcements/ announcement-10aug10-en. htm), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 10 August 2010] [40] "The First AART (Accountability and Transparency Review Team) Review was Completed in December 2010" (https:/ / community. icann. org/ display/ atrt/ The+ Accountability+ and+ Transparency+ Review+ Team;jsessionid=20B32EA76A0A674F629A8D72132CBF19), Internet Corporation for Assigned Names and Numbers (ICANN), 17 January 2012 [41] "Available Pool of Unallocated IPv4 Internet Addresses Now Completely Emptied" (http:/ / www. icann. org/ en/ news/ releases/ release-03feb11-en. pdf), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 3 February 2011 [42] New Internet Name Rule Opens Door to Huge Changes. (http:/ / www. voanews. com/ english/ news/ science-technology/ New-Internet-Name-Rule-Opens-Door-to-Huge-Changes-124180874. html) Voice of America, June 20, 2011. Accessed June 20, 2011 [43] Internet minders OK vast expansion of domain names, (http:/ / news. yahoo. com/ s/ ap/ 20110620/ ap_on_hi_te/ as_internet_domain_names;_ylt=Arq2MV_LZjTuVPrs9JafjPJ34T0D;_ylu=X3oDMTJ0OGxxanN2BGFzc2V0A2FwLzIwMTEwNjIwL2FzX2ludGVybmV0X2Rv Associated Press, June 20, 2011. Accessed June 20, 2011 [44] ICANN increases web domain suffixes, (http:/ / www. bbc. co. uk/ news/ technology-13835997) BBC News, June 20, 2011. Accessed June 20, 2011 [45] "ICANN Approves Historic Change to Internet's Domain Name System Board Votes to Launch New Generic Top-Level Domains" (http:/ / www. icann. org/ en/ announcements/ announcement-20jun11-en. htm), News release, Internet Corporation for Assigned Names and Numbers (ICANN), 20 June 2001

Internet Corporation for Assigned Names and Numbers


[46] "ICANN Approves New Top-Level Domains, So Prepare For .Whatever" (http:/ / mashable. com/ 2011/ 06/ 20/ icann-top-level-domains/ ), Stan Schroeder, Mashable Tech, 20 June 2011] [47] Icann to allow any word as a domain, (http:/ / www. zdnet. co. uk/ news/ networking/ 2011/ 06/ 20/ icann-to-allow-any-word-as-a-domain-40093152/ ) ZDNet, June 20, 2011. Accessed June 20, 2011 [48] Icann announces huge expansion of web domain names from 2012 (http:/ / www. guardian. co. uk/ technology/ 2011/ jun/ 20/ icann-domains-expansion-annnounced), The Guardian, June 20, 2011. Accessed June 20, 2011 [49] When free markets make it worse: new TLDs (http:/ / blog. asmartbear. com/ free-markets-bad. html/ ), A smart bear, July 18, 2011. Accessed April 10, 2012

379

Further reading
Franda, Marcus, The Emergence of an International Regime, ISBN 1-55587-999-3 Wass, Erica, Addressing the World, ISBN 0-7425-2809-X Par, Daniel J. Internet Governance in Transition, ISBN 0-7425-1846-9 Mueller, Milton L. Ruling the Root, ISBN 0-262-13412-8 Froomkin, A. Michael Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution (http://personal.law.miami.edu/~froomkin/articles/icann.pdf), 50 Duke Law Journal17 (2000)

External links
ICANN website (http://www.icann.org/) ICANN DNS Operations website (http://dns.icann.org/) ICM Registry LLC v. ICANN Top Level Domain Declaration of 19 February 2010 (http://www.icann.org/en/ irp/icm-v-icann/irp-panel-declaration-19feb10-en.pdf) of the ICDR Judicial Review Panel, H.E. President Stephen M. Schwebel, Arbitrators Jan Paulsson (http://www.lcil.cam.ac.uk/people/mr_jan_paulsson.php) and Dickran Tevrizian (http://www.transnational-dispute-management.com/editors/welcome.html) and ICM v. ICANN Proceedings (http://www.icann.org/en/irp/icm-v-icann.htm) and ASIL/ILIB of 5 March 2010 (http://www.asil.org/ilib100305.cfm) and .xxx Internet Domain Plan Resurrected of 9 March 2010 (http:// news.bbc.co.uk/2/hi/technology/8556364.stm) and Panel Makes Internet History of 24 February 2010 (http:/ /www.globalarbitrationreview.com/news/article/27767/panel-makes-Internet-history/) and ICDR Panel Urges ICANN to Reconsider (http://www.mg.co.za/article/ 2010-02-24-plans-for-xxx-porn-net-domain-revived) and Channel 4 (http://www.channel4.com/news/articles/ science_technology/plan+for+xxx+sites+revived/3558357) and Arbitration Database (http://www. arbitration.fr/5.html) Memorandum of Understanding Between the Department of Commerce and the Internet Corporation for Assigned Names and Numbers (http://www.ntia.doc.gov/ntiahome/domainname/icann.htm) ICANNWatch (http://www.icannwatch.org) Site advocating the return of public representation in ICANN (http://www.icannatlarge.com/) VeriSign Domain Report (http://www.verisign.com/domainbrief) - Quarterly analysis of global domain name market DailyChanges.com (http://dailychanges.com/) a free ICANN Registrar Statistics website ICANNWiki.com (http://www.icannwiki.com) - Wiki with people and companies related to ICANN ICANN Annual Reports (http://www.icann.org/en/annualreport/) ICANN Financials (http://www.icann.org/en/about/financials) ICANN FY12 Board Member Report of Payments (http://www.icann.org/en/about/financials/ fy12-board-payments-27oct12-en.pdf)

Internet Society

380

Internet Society
Internet Society
Abbreviation Formation Legalstatus ISOC 1992 Non-profit

Purpose/focus Leadership Headquarters Reston, Virginia[1] Regionserved Worldwide Membership Affiliations Website 50,000 Public Interest Registry [2]

The Internet Society (ISOC) is an international, non-profit organization founded in 1992 to provide leadership in Internet related standards, education, and policy. It states that its mission is "to assure the open development, evolution and use of the Internet for the benefit of all people throughout the world".[3] The Internet Society has offices near Washington, DC, USA, and in Geneva, Switzerland. It has a membership base comprising more than 130 organizational and more than 55,000 individual members. Members also form "chapters" based on either common geographical location or special interests. There are currently more than 90 chapters around the world.[3]

History
The Internet Society was formed officially in 1992, with one of its purposes being to provide a corporate structure to support the Internet standards development process. Vint Cerf, Bob Kahn, Lyman Chapin released a document, Announcing ISOC, which explained the rationale for establishing the Internet Society. This document also defines the original charter of the organization as follows: The Society will be a non-profit organization and will be operated for international educational, charitable, and scientific purposes, among which are: To facilitate and support the technical evolution of the Internet as a research and education infrastructure and to stimulate involvement of the academic, scientific, and engineering communities (among others) in the evolution of the Internet. To educate the academic and scientific communities and the public concerning the technology, use, and application of the Internet. To promote scientific and educational applications of Internet technology for the benefit of educational institutions at all grade levels, industry, and the public at large. To provide a forum for exploration of new Internet applications and to foster collaboration among organizations in their operation and use of the Internet.[4] Many of the main forces of the Internet, such as the Internet Engineering Task Force (IETF), remain very informal organizations from a legal perspective. There was a growing need for financial support and organization structure. The Internet Society was incorporated as a non-profit educational organization which could provide that support structure, as well as promoting other activities that are important for the development of the Internet. The Internet Society is the parent corporation of the IETF; as such all

Internet Society IETF Request for Comments documents, including those RFCs which describe "Internet Standards", are copyrighted by the Internet Society (although freely available to anyone, including non-members, at no charge). However, the Internet Society itself grew out of the IETF, to support those functions that require a corporate form rather than simply the ad hoc approach of the IETF. In reality, the Internet Society was formed because the IETF Secretariat, which had been operated under NSF contract by staff at the Corporation for National Research Initiatives ( CNRI ) would not be supported beyond 1991 by NSF. The then Internet Activities Board sought to create a non-profit institution that could provide financial support for the IETF Secretariat among other things. CNRI served as the first host for the Internet Society's operation. In 2012, on ISOC's 20th anniversary, it established the Internet Hall of Fame , an annual award whose purpose is to "publicly recognize a distinguished and select group of visionaries, leaders and luminaries who have made significant contributions to the development and advancement of the global Internet".
[5] [6]

381

Internet Society today


The Internet Society conducts a great range of activities under three main categories, namely standards, public policy, and education. Under the standards category, the Internet Society supports and promotes the work of the standards settings bodies for which it is the organizational home: the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), the Internet Engineering Steering Group (IESG), and the Internet Research Task Force (IRTF). The Internet Society also seeks to promote understanding and appreciation of the Internet model of open, transparent processes and consensus-based decision making.[7] Under the public policy category, the Internet Society works with governments, national and international organizations, civil society, the private sector, and other parties to promote policies about the Internet that conform to its core values. The following statement illustrates the foundation for the Internet Society's policy positions: "We envision a future in which people in all parts of the world can use the Internet to improve their quality of life, because standards, technologies, business practices, and government policies sustain an open and universally accessible platform for innovation, creativity, and economic opportunity.[8] The Internet Society has a prominent function in Internet governance discussions, including significant involvement in the World Summit on the Information Society (WSIS) and Internet Governance Forum (IGF). Under the category of education, the Internet Society pursues its goals by coordinating and delivering hands-on technical training, seminars and conferences on topical Internet issues; supporting local and regional Internet organisations; issuing briefings and white papers on Internet technologies; and funding participation opportunities for Internet experts in developing countries.[9] The Internet Society also encourages innovation and fresh thinking by providing grants and rewards to relevant initiatives and outreach efforts that address the humanitarian, educational and societal contexts of online connectivity. The Internet Society is the parent company for the Public Interest Registry, which manages the .ORG top-level domain. ISOC has joint offices in Reston, Virginia, United States and Geneva, Switzerland. It has also established "Regional Bureaus" for Latin America and the Caribbean, Africa, Asia, North America and Europe.

Internet Society The Internet Society helped organize World IPv6 Day, which gathered companies such as Facebook, Google, Yahoo, Akamai Technologies and Limelight Networks as well as ISPs to raise awareness of IPv6 issues such as fragmentation.[10]

382

Board of trustees
The Board of Trustees of the Internet Society is its governing body. The current list of trustees and their committee memberships is found at the organization's board page. [11]

Chapters
In the following, local chapters are listed in alpha order by nation state. Non geographic chapters are listed within the alpha order. Capitulo Argentino de Internet Society [12] - Argentina ISOC-AM [13] - Armenia ISOC-AU [14] - Australia Bahrain Internet Society Chapter [15] - Bahrain ISOC BD - Bangladesh ISOC European Chapters Coordinating Council [16] - Barcelona - Europe ISOC Belgium vzw [17] - Belgium ISOC Wallonie [18] - Belgium - Wallonia ISOC BJ [19] - Benin ISOC BR [20] - Brazil Internet Society - Bulgaria ISOC BI [21] - Burundi ISOC Cambodia - Cambodia ISOC Cameroon - Cameroon ISOC Canada - Canada - National ISOC Quebec [22] - Canada - Qubec ISOC Toronto [23] - Canada - Toronto ISOC Colombia - Colombia ISOC CG - Congo ISOC DRC - Democratic Republic of the Congo ISOC DK [24] - Denmark ISOC EC [25] - Ecuador ISOC EG [26] - Egypt ISOC England [27] - ISOC UK - England ISOC Finland [28] - Finland ISOC FR [29] - France ISOC-GAL [30] - Galicia (Spain) ISOC GM - Gambia ISOC GE - Georgia ISOC DE [31] - Germany ISOC Ghana - Ghana ISOC GR [32] - Greece ISOC Hong Kong [33] - Hong Kong

Hungary Chapter of ISOC (MITE) [34] - Hungary Delhi Chapter of the Internet Society - India - Delhi

Internet Society India Chennai Chapter of the Internet Society [35] - India - Chennai India Kolkata Chapter of the Internet Society [36] - India - Kolkata India Bangalore Chapter of the Internet Society [37] - India - Bangalore Irish Chapter of ISOC [38] - Ireland Israel Internet Association (ISOC IL [39]) - Israel Societ Internet [40] - Italy ISOC JP [41] - Japan ISOC KR [42] - Korea (Republic of) ISOC Luxembourg - Luxembourg ISOC MY [43] - Malaysia ISOC Mali - Mali ISOC MU [44] - Mauritius Sociedad Internet de Mexico [45] - Mexico ISOC-MU [44] - Mauritius MISOC [46] - Morocco ISOC Nepal [47] - Nepal ISOC NL [48] the Netherlands ISOC NE - Niger ISOC NG [49] Nigeria Disability & Special Needs Chapter of ISOC [50] - Non Geographic - Disability & Special Needs ISOC NO - Norway PICISOC - Pacific Islands ISOC PK [51] - Pakistan ISOC PS - Palestine ISOC Peru [52] - Peru ISOCCP - Philippines ISOC PL [53] Poland ISOC PT [54] Portugal ISOC PR [55] - Puerto Rico ISOC Polska [53] - Poland ISOC RO [56] Romania Saudi Arabian Chapter of the Internet Society - Saudi Arabia Scottish Chapter of the Internet Society [57] - Scotland - UK ISOC SN - Senegal ISOC Serbia [58] - Serbia ISOC SL [59] - Sierra Leone ISOC SI [60] - Slovenia ISOC-ZA [61] - South Africa ISOC-ES [62] - Spain ISOC ANDA [63] - Spain - Andalucia AS ISOC - Spain - Asturia Aragonese Chapter of the Internet Society [64] - Spain - Aragon ISOC CAT [65] - Spain, Andorra and France - Catalan Chapter ISOC GAL [30] - Spain - Galicia Madrid Chapter of the Internet Society - Spain - Madrid

383

Sudan Chapter of the Internet Society (SIS) [66] - Sudan ISOC-SE [67] - Sweden

Internet Society ISOC CH [68] - Switzerland - Geneva ISOC TW [69] - Taiwan ISOC TH [70] - Thailand ISOC-TT [71] - TRINIDAD AND TOBAGO ISOC TN [72] - Tunisia Istanbul-Turkey chapter [73] - Turkey - Istanbul Ugandan Chapter of the Internet Society - Uganda ISOC UAE - United Arab Emirates Capitulo Uruguay de Internet Society [74] - Uruguay Chicago Chapter of the Internet Society [75] - USA - Chicago ISOC Hawaii - USA - Hawaii ISOC Los Angeles [76] - USA - Los Angeles ISOC NJ - USA - New Jersey ISOC NY [77] - USA - New York Metropolitan Area South Central Texas Chapter [78] - USA - Texas Washington DC Chapter of Internet Society [79] - USA - Washington ISOC VE - Venezuela

384

References
[1] [2] [3] [4] [5] [6] Contact (http:/ / www. isoc. org/ isoc/ contact. shtml) http:/ / www. internetsociety. org/ Internet Society (ISOC) - Introduction to ISOC (http:/ / www. isoc. org/ isoc/ ) Internet Society (ISOC) All About The Internet: History of the Internet (http:/ / www. isoc. org/ internet/ history/ isochistory. shtml) About page (http:/ / www. internethalloffame. org/ about), Internet Hall of Fame website. Last accessed April 24, 2012 "Internet gets Hall of Fame, Al Gore honored" (http:/ / www. cbsnews. com/ 8301-501465_162-57419234-501465/ internet-gets-hall-of-fame-al-gore-honored/ ). CBS News. April 24, 2012. . Retrieved April 24, 2012. [7] Internet Society (ISOC) - ISOC's Standards Activities (http:/ / www. isoc. org/ standards/ ) [8] Internet Society - Public Policy - ISOC's Public Policy Activities" (http:/ / www. isoc. org/ pubpolpillar/ ) [9] Internet Society (ISOC) - ISOC's Education Activities (http:/ / www. isoc. org/ educpillar/ ) [10] World Internet Society IPv6 Day (http:/ / www. worldipv6day. org/ ) [11] http:/ / www. internetsociety. org/ who-we-are/ board-trustees [12] http:/ / www. isoc. org. ar [13] http:/ / www. isoc. am [14] http:/ / www. isoc-au. org. au [15] http:/ / www. bis. org. bh [16] http:/ / www. isoc-ecc. org [17] http:/ / www. internetsociety. be [18] http:/ / www. wallonie-isoc. org [19] http:/ / www. isoc. bj [20] http:/ / www. isoc. org. br [21] http:/ / www. isoc. bi [22] http:/ / www. isocquebec. org [23] http:/ / www. isoctoronto. org [24] http:/ / www. isoc. dk [25] http:/ / www. isoc. org. ec [26] http:/ / www. ise. org. eg [27] http:/ / www. isoc-e. org [28] http:/ / www. isoc. fi [29] http:/ / www. isoc. fr [30] http:/ / www. isoc-gal. org [31] http:/ / www. isoc. de/ [32] http:/ / www. isoc. gr [33] http:/ / www. isoc. hk [34] http:/ / www. isoc-hu. hu/

Internet Society
[35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] [76] [77] [78] [79] http:/ / www. isocindiachennai. org http:/ / www. isocindiakolkata. in http:/ / www. isocbangalore. org http:/ / ireland. isoc. org http:/ / www. isoc. org. il/ index_eng. html http:/ / www. isoc. it http:/ / www. iajapan. org http:/ / kr. isoc. org http:/ / www. isoc. my http:/ / www. isoc-mu. org http:/ / www. isocmex. org. mx/ http:/ / www. misoc. ma/ http:/ / www. isoc. net. np http:/ / isoc. nl http:/ / www. isocnig. org. ng http:/ / www. isocdisab. org http:/ / www. isocpk. org http:/ / www. isoc. pe http:/ / www. isoc. org. pl http:/ / www. isoc. pt http:/ / www. isocpr. org http:/ / www. isoc. ro/ http:/ / scotland. isoc. org http:/ / www. isoc-srbija. org http:/ / www. sierravisions. org/ isocsl/ http:/ / www. isoc-drustvo. si http:/ / isoc. org. za http:/ / www. isoc-es. org http:/ / www. isocanda. org/ http:/ / www. unizar. es/ isocara/ http:/ / www. isoc. cat http:/ / www. isoc. sd http:/ / www. isoc. se http:/ / www. isoc. ch/ http:/ / www. isoc. org. tw/ http:/ / www. isoc-th. org http:/ / www. isoc. tt http:/ / www. isoc. org. tn http:/ / www. isoctr. org http:/ / www. isoc. org. uy http:/ / www. isoc-chicago. org http:/ / www. isoc-la. org http:/ / www. isoc-ny. org http:/ / www. salsa. net http:/ / www. dcisoc. org

385

External links
www.internetsociety.org (http://www.internetsociety.org) IETF and ISOC (http://www.isoc.org/internet/history/ietfhis.shtml) by Vint Cerf

Internet Architecture Board

386

Internet Architecture Board


The Internet Architecture Board (IAB) is the committee charged with oversight of the technical and engineering development of the Internet by the Internet Society (ISOC). It oversees a number of Task Forces, of which the most important are the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF). The body which eventually became the IAB was created originally by the United States Department of Defense's Defense Advanced Research Projects Agency with the name Internet Configuration Control Board during 1979; it eventually became the Internet Advisory Board during September, 1984, and then the Internet Activities Board during May, 1986 (the name was changed, while keeping the same acronym). It finally became the Internet Architecture Board, under ISOC, during January, 1992, as part of the Internet's transition from a U.S.-government entity to an international, public entity.

Activities
The IAB's current responsibilities include Architectural Oversight: The IAB provides oversight of, and occasional commentary on, aspects of the architecture for the network protocols and procedures used by the Internet. Standards Process Oversight and Appeal: The IAB provides oversight of the process used to create Internet Standards. The IAB serves as an appeal board for complaints of improper execution of the standards process, through acting as an appeal body in respect of an Internet Engineering Steering Group (IESG) standards decision. Request for Comments series: The IAB is responsible for editorial management and publication of the Request for Comments (RFC) document series. Internet Assigned Numbers Authority: In conjunction with the Internet Corporation for Assigned Names and Numbers (ICANN), the IAB is responsible for administration of the assignment of IETF protocol parameter values by the Internet Assigned Numbers Authority (IANA). External Liaison: The IAB acts as representative of the interests of the IETF in liaison relationships with other organizations concerned with standards and other technical and organizational issues relevant to the worldwide Internet. Advice to the Internet Society: The IAB acts as a source of advice and guidance to the Board of Trustees and Officers of ISOC concerning technical, architectural, procedural, and (where appropriate) policy matters pertaining to the Internet and its enabling technologies. Internet Engineering Steering Group Confirmation: The IAB confirms the IETF Chair and IESG Area Directors, from nominations provided by the IETF Nominating Committee. Internet Research Task Force Chair: The IAB selects a chair of the IRTF for a renewable two year term.

Internet Architecture Board

387

RFC1087 - Ethics and the Internet


The IAB's 1989 RFC "Ethics and the Internet" strongly endorses the view of the Division Advisory Panel of the National Science Foundation Division of Network, Communications, Research and Infrastructure which, in paraphrase, characterized as unethical and unacceptable any activity which purposely[1]: seeks to gain unauthorized access to the resources of the Internet, disrupts the intended use of the Internet, wastes resources (people, capacity, computer) through such actions, destroys the integrity of computer-based information compromises the privacy of users.

Chairs
The following people have served as chair of the IAB:[2] David D. Clark - 1981 to 7/1989 Vint Cerf - 7/1989 to 7/1991 Barack Hussein Obama - 7/1980 to 7/1998 Lyman Chapin - 7/1991 to 3/1993 Christian Huitema - 3/1993 to 7/1995 Brian Carpenter - 7/1995 to 3/2000 John Klensin - 3/2000 to 3/2002 Leslie Daigle - 3/2002 to 3/2007 Olaf Kolkman - 3/2007 to 3/2011 Bernard Aboba - 3/2011 to present

Footnotes
[1] "RFC1087 - Ethics and the Internet" (http:/ / www. faqs. org/ rfcs/ rfc1087. html). . Retrieved 2010-10-26. [2] "History page from the IAB website" (http:/ / www. iab. org/ about/ history. html). . Retrieved 2011-11-11.

Further reading
Carpenter, Brian (editor), Charter of the Internet Architecture Board (RFC 2850, May 2000)

External links
IAB website (http://www.iab.org/), List of IAB Members (http://www.iab.org/about/members.html)

Internet Engineering Task Force

388

Internet Engineering Task Force


Internet Engineering Task Force
Abbreviation Formation Type Purpose/focus Regionserved IETF Chair IETF January 16, 1986 Standards Organization Creating standards applying to the internet to improve internet usability. Worldwide Russ Housley

Parentorganization Internet Society Website ietf.org [1]

The Internet Engineering Task Force (IETF) develops and promotes Internet standards, cooperating closely with the W3C and ISO/IEC standards bodies and dealing in particular with standards of the Internet protocol suite (TCP/IP).[2][3] It is an open standards organization, with no formal membership or membership requirements. All participants and managers are volunteers, though their work is usually funded by their employers or sponsors; for instance, the current chairperson is funded by VeriSign and the U.S. government's National Security Agency.[4]

Organization
The IETF is organized into a large number of working groups and informal discussion groups (BoF)s, each dealing with a specific topic. Each group is intended to complete work on that topic and then disband. Each working group has an appointed chairperson (or sometimes several co-chairs), along with a charter that describes its focus, and what and when it is expected to produce. It is open to all who want to participate, and holds discussions on an open mailing list or at IETF meetings, where the entry fee is currently around USD $650 per person.[5] The mailing list consensus is the primary basis for decision of-making. There is no voting procedure, as it operates on rough consensus process. The working groups are organized into areas by subject matter. Current areas include: Applications, General, Internet, Operations and Management, Real-time Applications and Infrastructure, Routing, Security, and Transport.[6] Each area is overseen by an area director (AD), with most areas having two co-ADs. The ADs are responsible for appointing working group chairs. The area directors, together with the IETF Chair, form the Internet Engineering Steering Group (IESG), which is responsible for the overall operation of the IETF. The groups will normally be closed once the work described in its charter is finished. In some cases, the WG will instead have its charter updated to take on new tasks as appropriate. The IETF is formally a part of the Internet Society. The IETF is overseen by the Internet Architecture Board (IAB), which oversees its external relationships, and relations with the RFC Editor.[7] The IAB is also jointly responsible for the IETF Administrative Oversight Committee (IAOC), which oversees the IETF Administrative Support Activity (IASA), which provides logistical, etc. support for the IETF. The IAB also manages the Internet Research Task Force (IRTF), with which the IETF has a number of cross-group relations. A committee of ten randomly chosen volunteers who participate regularly at meetings is vested with the power to appoint, reappoint, and remove members of the IESG, IAB, IASA, and the IAOC.[8] To date, no one has been removed by a NOMCOM, although several people have resigned their positions, requiring replacements.

Internet Engineering Task Force

389

History
The first IETF meeting was on January 16, 1986, consisting of 21 U.S.-government-funded researchers. It was a continuation of the work of the earlier GADS Task Force. Initially, it met quarterly, but from 1991, it has been meeting 3 times a year. Representatives from non-governmental entities were invited starting with the fourth IETF meeting, during October of that year. Since that time all IETF meetings have been open to the public. The majority of the IETF's work is done on mailing lists, and meeting attendance is not required for contributors. The initial meetings were very small, with fewer than 35 people in attendance at each of the first five meetings. The maximum attendance during the first 13 meetings was only 120 attendees. This occurred at the 12th meeting held during January 1989. These meetings have grown in both participation and scope a great deal since the early 1990s; it had a maximum attendance of 2,810 at the December 2000 IETF held in San Diego, CA. Attendance declined with industry restructuring during the early 2000s, and is currently around 1,200.[9] During the early 1990s the IETF changed institutional form from an activity of the U.S. government to an independent, international activity associated with the Internet Society. There are statistics available that show who the top contributors have been, by RFC publication.[10] While the IETF only allows for participation by individuals, and not by corporations or governments, sponsorship information is available from those same statistics.

Operations
The details of its operations have changed considerably as it has grown, but the basic mechanism remains publication of draft specifications, review and independent testing by participants, and republication. Interoperability is the chief test for IETF specifications becoming standards. Most of its specifications are focused on single protocols rather than tightly interlocked systems. This has allowed its protocols to be used in many different systems, and its standards are routinely re-used by bodies which create full-fledged architectures (e.g. 3GPP IMS). Because it relies on volunteers and uses "rough consensus and running code" as its touchstone, results can be slow whenever the number of volunteers is either too small to make progress, or so large as to make consensus difficult, or when volunteers lack the necessary expertise. For protocols like SMTP, which is used to transport e-mail for a user community in the many hundreds of millions, there is also considerable resistance to any change that is not fully backwards compatible. Work within the IETF on ways to improve the speed of the standards-making process is ongoing but, because the number of volunteers with opinions on it is very great, consensus mechanisms on how to improve have been slow. Because the IETF does not have members (nor is it an organisation per se), the Internet Society provides the financial and legal framework for the activities of the IETF and its sister bodies (IAB, IRTF,...). Recently the IETF has set up an IETF Trust that manages the copyrighted materials produced by the IETF. IETF activities are funded by meeting fees, meeting sponsors and by the Internet Society via its organizational membership and the proceeds of the Public Interest Registry. IETF meetings vary greatly in where they are held. The list of past and future meeting locations can be found on the IETF meetings[11] page. The IETF has striven to hold the meetings near where most of the IETF volunteers are located. For a long time, the goal was 3 meetings a year, with 2 in North America and 1 in either Europe or Asia (alternating between them every other year). The goal ratio is currently, during a two-year period, to have 3 in North America, 2 in Europe and 1 in Asia. However, corporate sponsorship of the meetings is typically a more important factor and this schedule has not been kept strictly in order to decrease operational costs.

Internet Engineering Task Force

390

Chairs
The IETF Chairperson is selected by the NOMCOM process specified in RFC 3777 for a 2-year term, renewable. Before 1993, the IETF Chair was selected by the IAB. Mike Corrigan (1986) Phill Gross (19861994) Paul Mockapetris (19941996) Fred Baker (19962001) Harald Tveit Alvestrand (20012005) Brian Carpenter (20052007) Russ Housley (2007)[12]

References
[1] http:/ / ietf. org [2] "Internet Engineering Task Force (IETF)" (http:/ / www. ripe. net/ internet-coordination/ internet-governance/ internet-technical-community/ ietf). RIPE NCC. 10 Aug 2012. . Retrieved October 13, 2012. [3] O. Jacobsen, D. Lynch, Interop, Inc. (March 1991). "A Glossary of Networking Terms" (http:/ / www. ietf. org/ rfc/ rfc1208. txt). IETF. . Retrieved October 13, 2012. [4] Duffy Marsan, Carolyn (July 26, 2007). "Q&A: Security top concern for new IETF chair" (http:/ / www. networkworld. com/ news/ 2007/ 073007-ietf-qa. html). Network World (IDG). . Retrieved 2008-04-20. [5] IETF Meeting Registration Page (http:/ / www. ietf. org/ meeting/ register. html) [6] List IETF of Areas and Working Group Charters (http:/ / datatracker. ietf. org/ wg/ ) [7] RFC 2850 (http:/ / tools. ietf. org/ html/ rfc2850) [8] The NOMCOM web page (https:/ / www. ietf. org/ nomcom/ ) [9] "Past Meetings of the IETF" (http:/ / www. ietf. org/ meetings/ past. meetings. html). . Retrieved 2008-08-05. [10] Jari Arkko's IETF Author Statistics Page (http:/ / www. arkko. com/ tools/ allstats/ ) [11] "IETF Meetings" (http:/ / www. ietf. org/ meeting/ ). Ietf.org. . Retrieved 2012-01-17. [12] "IETF Chairs by year" (http:/ / www. ietf. org/ ietf_chairs_year. html). . Retrieved 2007-03-23.

External links
Official website (http://ietf.org/) IETF Online Proceedings (http://www.ietf.org/old/2009/proceedings_directory.html) Early IETF Proceedings (http://www.ietf.org/old/2009/proceedings/directory2.html) (note: large pdf files, one for each volume) Past Meetings of the IETF (http://www.ietf.org/meeting/past.html) Past IESG Members and IETF Chairs (http://www.ietf.org/iesg/past-members.html) The Tao of the IETF (http://tools.ietf.org/rfcmarkup?doc=fyi17): details on how IETF is organized IAOC information (http://iaoc.ietf.org/) MyIETF (http://myietf.unfix.org) Personalized notification service on RFC's and drafts with full archive of old drafts etc.

Internet Governance Forum

391

Internet Governance Forum


The Internet Governance Forum (IGF) is a multi-stakeholder forum for policy dialogue on issues of Internet governance. It brings together all stakeholders in the Internet governance debate, whether they represent governments, the private sector or civil society, including the technical and academic community, on an equal basis and through an open and inclusive process.[1] The establishment of the IGF was formally announced by the United Nations Secretary-General in July 2006 and it was first convened in OctoberNovember 2006.

Internet Governance Forum, Rio de Janeiro 2007

Structure and function


The formation of the Internet Governance Forum was first recommended in the report of the Working Group on Internet Governance following a series of open consultations. This report was one of the inputs to the second phase of the World Summit on the Information Society in Tunis in 2005, which formally called for the creation of the IGF and set out its mandate.[2] Following an open consultation meeting called in February 2006, the UN Secretary-General established an Advisory Group (now known as the Multistakeholder Advisory Group, or MAG), and a Secretariat, as the main institutional bodies of the IGF. These organizational divisions should not be considered concrete since the organizational structures will continue to be adjusted and to be changed until they fit into the needs of the members.

Multistakeholder Advisory Group (MAG)


The Advisory Group, now known as the Multistakeholder Advisory Group (MAG), was set up by the former Secretary General of the United Nations, Mr Kofi Annan on May 17, 2006,[3] to assist the Secretary General in convening the first IGF, held in Athens, Greece. The MAG was originally made up of 46 members[4] from international governments, the commercial private sector and public civil society, including academic and technical communities, and was chaired by Nitin Desai, the Secretary-Generals Special Adviser for the World Summit on the Information Society, later Special Advisor for Internet Governance. On August 20, 2007, the mandate of the MAG was renewed to assist in the preparations for the Rio de Janeiro meeting of the IGF, with a new structure of 47 members, and a co-chairmanship position chaired by Nitin Desai and Brazilian diplomat Hadil da Rocha Vianna.[5] The mandate of the MAG was further extended on April 30, 2008,[6] with Nitin Desai[7] serving as the sole chairman. The group was to renew up to one third of its members within each stakeholder group. On August 22, 2008, the United Nations Office in Geneva renewed the membership of MAG to prepare for the 2008 IGF meeting in Hyderabad, India. There were a total of 50 members,[8] among them 17 new appointed members, which represents one third of its membership. Nitin Desai chaired the Advisory Group. The MAG was renewed again on May 5, 2009 [9] to help with preparations for the 2009 meeting of the IGF in Sharm El-Sheikh, Egypt. A total of 56 members, 18 among them new, were appointed. The MAG was renewed again on

Internet Governance Forum May 5, 2010 [10] to help with preparations for the 2010 meeting of the IGF in Vilnius, Lithuania; of the 56-member group, 3 were new. Nitin Desai remained the Advisory Group's chairman. In 2011, it was suggested that two thirds of each groups membership be renewed in 2012. A call for parties interested in MAG memberships was issued[11] late in the year. On April 25, 2012, the MAG was renewed [12] to help with preparations for the 2012 meeting of the IGF in Baku, Azerbaijan. A total of 56 members,[13] 33 among them new, were appointed. The MAG meets three times each year - in February, May and September. All three meetings take place in Geneva at the Palais des Nations, and are preceded by an Open Consultations meeting. The details on MAG's operating principles and selection criteria are contained in the summary reports of its meetings [14].

392

Secretariat
The Secretariat, based in the United Nations Office in Geneva, assists and coordinates the work of the Multistakeholder Advisory Group (MAG). The Secretariat has been headed until 31 Jan 2011 by Markus Kummer as Executive Coordinator. The Executive Coordinator position is currently vacant. Chengetai Masango is Programme and Technology Manager. The Secretariat also hosts fellowships.[15] Markus Kummer has also been involved with the WGIG as the Executive Coordinator of its secretariat.[16] He has joined the Intenet Society as of 01 Feb 2011 as its Vice President for Public Policy [17]

History and development of the Internet Governance Forum


WSIS follow ups
The IGF is considered an important development of the World Summit on the Information Society (WSIS). This important outcome was reaffirmed by paragraphs 37 and 38 of the Tunis 2005 Commitment. Paragraph 37 states that goals can be accomplished through the involvement, cooperation and partnership of governments and other stakeholders, i.e. the private sector, civil society and international organizations, and that international cooperation and solidarity at all levels are indispensable if the fruits of the Information Society are to benefit all.[18] Corollary to this commitment, paragraph 38 states, too, that all efforts from here on should not stop with the conclusion of the Summitemergence of the global Information Society to which we all contribute provides increasing opportunities for all our peoples and for an inclusive global communitywe must harness these opportunities today and support their further development and progress.[19] The Tunis Summit of 2005 made significant headway when the mandate of the IGF was formulated. In paragraph 72 of the Tunis Agenda, the UN Secretary-General was asked to convene a meeting with regards to the new multi-stakeholder forum, otherwise known as the IGF. In this mandate, different stakeholders are encouraged to strengthen engagement, particularly those from developing countries. In paragraph 72(h), the mandate focused on capacity-building for developing countries and the drawing out of local resources.[20] This particular effort, for instance, has been reinforced through Diplo Foundations Internet Governance Capacity Building Programme (IGCBP) that allowed participants from different regions to benefit from valuable resources with the help of regional experts in IG. The involvement of different stakeholders in the policy framework of the IGF is a re-affirmation of commitment as per paragraph 39 of the Tunis Commitment. In this particular context, there is a deep resolve to develop and implement an effective and sustainable response to the challenges and opportunities of building a truly global Information Society that benefits all our peoples. [18] During the OECD Civil Society-Organized Labour Forum held last June 16, 2008, in Seoul, Korea, Ambassador David A. Gross of the US Department of State talked about the transformation of the Internet in the social lives of people. He believed that this transformation made an impact in the free flow of information that politically drives challenges. Ambassador Gross commented on the 2005 WSIS because of the powerful language used on paragraph 4 of the Tunis agenda that reiterated on openness.

Internet Governance Forum

393

Formation of the IGF


A multi-stakeholder's approach was reiterated in the coordination of international activities for the IGF. This adaptation was set from paragraphs 29 to 35 of the Tunis agenda. These stakeholders were defined as coming from governments, the private technical and economic sector, civil society, intergovernmental organizations, and international organizations. In paragraph 32, the UN Secretary-General was commended for his efforts in establishing the Working Group on Internet Governance (WGIG). The suggested need of an organization like the IGF was first pointed out in the WGIG Report. After reaching a clear consensus among its members the WGIG proposed in paragraph 40 of the Report that : "(t)he WGIG identified a vacuum within the context of existing structures, since there is no global multi-stakeholder forum to address Internet-related public policy issues. It came to the conclusion that there would be merit in creating such a space for dialogue among all stakeholders. This space could address these issues, as well as emerging issues, that are cross-cutting and multidimensional and that either affect more than one institution, are not dealt with by any institution or are not addressed in a coordinated manner. The IGF was one of four proposals made in the report. The idea of the Forum was also proposed by Argentina, as stated in its proposal [21] made during the last Prepcom 3 in Tunis: "(t)In order to strengthen the global multistakeholder interaction and cooperation on public policy issues and developmental aspects relating to Internet governance we propose a forum. This forum should not replace existing mechanisms or institutions but should build on the existing structures on Internet governance, should contribute to the sustainability, stability and robustness of the Internet by addressing appropriately public policy issues that are not otherwise being adequately addressed excluding any involvement in the day to day operation of the Internet. It should be constituted as a neutral, non-duplicative and non-binding process to facilitate the exchange of information and best practices and to identify issues and make known its findings, to enhance awareness and build consensus and engagement. Recognizing the rapid development of technology and institutions, we propose that the forum mechanism periodically be reviewed to determine the need for its continuation. The convening of the IGF was announced on 18 July 2006, with the inaugural meeting of the Forum being held in Athens, Greece from 30 October to 2 November 2006.

IGF Consultations and Meetings


There were two rounds of consultations with regards to the convening of the first IGF: [1] 16 17 of February 2006 The first round of consultations was held in Geneva. The transcripts of the two-day consultations are available in the IGF site.[22][23] [2] 19 May 2006 The second round of consultations was open to all stakeholders and was coordinated for the preparations of the inaugural IGF meeting. The meeting chairman was Nitin Desai who is the United Nations Secretary-General's Special Adviser for Internet Governance.[24] The Second Meeting of the IGF Consultations held in Geneva last May 23, 2007 were open to all stakeholders. This consultation was part of a cluster of related events of the WSIS that took place last 15-25 of May 2007.[25] An advisory group was also facilitated for the IGF meeting in Rio de Janeiro, Brazil. The IGF open Consultations held last 3 September 2007 was held in Geneva.[26] For further information, a summary of the IGF consultations and meetings can be found below:

Internet Governance Forum

394

Date 1618 November 2005 16 17 February 2006 2 March 2006 19 May 2006 22 23 May 2006 18 July 2006 7 8 September 2006 Second Phase of the WSIS in Tunis First Round of Consultations Establishment of the IGF Secretariat Second Round of Consultations

Event

Establishment and First Meeting of the IGF Advisory Group Convening of the IGF Second Meeting of the IGF Advisory Group

30 October 2 November 2006 Inaugural Meeting of the IGF in Athens 1215 November 2007 13 May 2008 1415 May 2008 36 December 2008 1518 November 2009 1417 September 2010 2324 February 2011 Second Meeting of the IGF in Rio de Janeiro, Brazil Open Consultations Meeting of the IGF Multistakeholder Advisory Group(MAG) Third meeting of the IGF in Hyderabad, India Fourth Meeting of the IGF in Sharm El Sheikh, Egypt Fifth Meeting of the IGF in Vilnius, Lithuania Open Consultations and MAG Meeting at the United Nations in Geneva, Switzerland |+

2011 Open Consultations and MAG Meeting The next Open Consultations will be held on 23 February, to be followed by a MAG meeting on 24 February which will be open to observers. Both will be held at the Palais des Nations, Geneva, Switzerland. Online registration[27] for the meetings is now open and will close on 18 February 2011.[28]

Mandate and outcome


2005 mandate
The mandate for the IGF comes from the 2005 WSIS Tunis Agenda.[29] The IGF was mandated to be principally a discussion forum for facilitating dialogue between the Forum's participants. The IGF may "identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations," but does not have any direct decision-making authority.[30] The United Nations published its endorsement of a five-year mandate for the IGF in April 2006.[31]

Renewal of mandate in 2011 and improvements process


In the lead-up to the completion of the first five-year mandate of the IGF in 2010, the UN initiated a process of evaluating the continuation of the IGF, resulting in a United Nations General Assembly resolution to continue the IGF for a further five years (2011-2015).[32] In addition to the renewed mandate, another UN body, the CSTD, established a Working Group on Improvements to the IGF (CSTDWG), which first met in February 2011, and will complete its work in early 2012, and report back to the United Nations General Assembly.[33][34]

Internet Governance Forum

395

Activities at the IGF


The following are the activities that take place during the IGF: Workshops, Best Practice Forums, Open Forums and meetings of the Dynamic Coalitions. The main themes of IGF are: openness, security, diversity and access. A new theme was introduced in IGF Brazil: critical Internet resources being one of the most debatable topics in the IG field at the moment.

Dynamic coalitions
The most tangible result of the first IGF in Athens is the establishment of a number of so-called Dynamic Coalitions.[35] These coalitions are relatively informal, issue-specific groups consisting of stakeholders that are interested in the particular issue. Most coalitions allow participation of anyone interested in contributing. Thus, these groups gather not only academics and representatives of governments, but also members of the civil society interested in participating on the debates and engaged in the coalition's works. So far, the following Dynamic Coalitions were brought to the attention of the IGF Secretariat: The StopSpamAlliance [36] Dynamic Coalition on Privacy [37] The IGF Dynamic Coalition on Open Standards (IGF DCOS) [38] The Dynamic Coalition on Access and Connectivity for Remote, Rural and Dispersed Communities [39] Dynamic Coalition on the Internet Bill of Rights [40] Dynamic Coalition for Linguistic Diversity [41] A2K@IGF Dynamic Coalition [42] Freedom of Expression and Freedom of the Media on the Internet (FOEonline) [43] Online Collaboration Dynamic Coalition [44] Gender and Internet Governance (GIG) Framework of Principles for the Internet Dynamic Coalition on Child Online Safety Dynamic Coalition on "Accessibility and Disability" [45] Dynamic Coalition for Online Education

Active Dynamic Coalitions [46]

Workshops
In 2007, IGF hosted a number of workshops [47] which attracted great interest with the public. In particular, the theme of child protection was one of the topics that increased the engagement of the participants in the events. For 2008 the IGF page stipulates that workshops [48] can be proposed on the draft main session headings: Universalization of the Internet - How to reach the next billion (Expanding the Internet) Low cost sustainable access Multilingualization Implications for development policy Managing the Internet (Using the Internet) Critical Internet resources Arrangements for Internet governance Global cooperation for Internet security and stability

Taking stock and the way forward Emerging issues

Internet Governance Forum The following workshops have been proposed as of 15 May 2008, according to the Workshop page [49]. These proposals will be reviewed and an attempt will be made to merge propositions into a manageable number of workshops.
Number Proposed 15 9 15 21 13 9 6 17 Workshop Theme Access Diversity Openness Security Critical Internet Resources Development Capacity Building Other

396

A revision of the Process and Programme of the Hyderabad meeting is available at http://www.intgovforum.org.

I IGF Athens 2006


The host webpage brings interesting information about the evolution of the first IGF.[50]

II IGF Rio 2007


There were 84 events happening in parallel to the main sessions, organized under the 5 main themes: (i) critical Internet resources; (ii) access; (iii) diversity; (iv) openness and (v) security. There were 36 workshops, 23 best practices forums, 11 dynamic coalitions meetings, 8 open forums and 6 events covering other issues (like the Giganet Symposium[51]) [52] The host webpage keeps video and audio records from main sessions and some parallel events such as workshops, best practices and open forums, as well as the tool for translation into Arabic.[53] Regarding the participation by region, around 35% of the attendees came from the Latin America and Caribbean of which 29% were from the host country (Brazil). There are also some interesting statistics such as[54]:
Region Latin America and Caribbean Western Europe North America Asia Africa Eastern Europe Oceania Participation 35% 20% 13% 13% 10% 7% 2%

Internet Governance Forum

397

Main sessions
The main sessions were developed according to the five themes chosen for this year: Critical Internet Resources, Access, Diversity, Openness and Security. Please see below the summary of the main sessions: Opening ceremony/Opening session The multistakeholder approach was highlighted by many speakers and panelists during the Opening Session, including the message from the UN Secretary-General Ban Ki-Moon, which was read by the UN Under-Secretary-General for Economic and Social Affairs, M. Sha Zukang. M. Ban Ki-Moon assured that it is not a UN goal to take over Internet Governance but the UN will offer an opportunity to bring people together, with the same interest, in a global reach.[55] M. Sha Zukang concludes that the IGF was a unique experience because it brings together people who normally do not meet under the same roof. [56] "Development" was a key discussion during the IGF Rio Meeting. It will still be an important aspect for discussion, together with the issue of bridging the digital divide - a key element of discussion for the IGF Hyderabad and reflects the theme of the IGF Hyderabad which is "Internet for All." The nature and prospective of the IGF were also discussed, as the Chairman properly summarizes[52]: Several participants underlined that the IGF was not only a space for dialogue, but also a medium that should encourage fundamental change at the local level to empower communities, build capacity and skills enable the Internet's expansion, thereby contributing to economic and social development." Critical Internet resources This is a new session that was introduced during the IGF Rio Meeting. Basically, it covered some issues pertaining to the infrastructure of the Internet. ICANN discussions were not missed, as well as the role of governments in shaping policies. Access The issue of access is more on how to get the billion of users around the world to go online in the next years to come. Such initiatives to this cause are reminiscent of pilot projects in Africa wherein laptops were given to children under an open source software agreement. Diversity The issue of diversity calls for multilingualism in the Net. Such promotion on multilingualism would increase users whose main language is not English. In order to open the Net to a diverse population, international domain names (IDN) were added to facilitate the language needs of other users. Openness The strong support on closed software has not been favorable to some people. This is because there were long-lasting agreements between governments and large software companies. Such actions were considered critical, as it binds different entities to proprietary or closed source technologies. Many believed that the shift from closed to open software can only happen with the full-scale participation of both the private and public sectors. As such, many people fear the turning of the Internet into a private network if there is much insistence on the use of closed technologies. Talks on open standards, open architecture and open software are clear indicators of what the issue on openness is all about.

Internet Governance Forum Read this literature entitled "Free Culture" by Lawrence Lessig to know more on "Openness on the Internet." Security issues The question of Internet Security is one of the most important debate in the Information Society. Internet is becoming an important communication and business tool, as such, that the question of security comes as a cross-cutting issue to be addressed in all its dimension. As indicated by Michael Harrop, Rapporteur SG 17 Q4, Communications Security Project in 2006, "without effective security, all systems and processes that rely on electronic communications are at risk and, as a consequence, large numbers of resources are now devoted to countering threats, protecting systems and recovering from successful attacks." The Rio de Janeiro Meeting mentioned that "...achieving the Internets full potential to support commercial and social relationships required an environment that promoted and ensured users' trust and confidence and provided a stable and secure platform." Cyber-security, in this case, focused heavily on child protection, particularly on child pornography. Participants gathered were called to seek ways to harmonize legislative agendas to counter-act such crimes. This was a call of legislation between countries that can work together in order to enforce laws that would protect children. As such that some laws are not applicable online, this call also promoted formulation of legislation that would be applicable in the online or virtual world. Internet Security has been mentioned in the Substantive Agenda of the Rio de Janeiro Meeting. It was also present in the Agenda of the Athens Meeting. Even before the Athens Meeting, Internet Security was mentioned at the Tunis WSIS under "Building Confidence and Security in the Use of ICT's." At the coming Hyderabad Meeting in December 2008, two panels will again discuss questions related to Internet Security. This gives an idea on how important the question has been in each of the IGF meetings so far. Internet security issues can be folded under the following: secure telecommunication which deals most with the security of telecommunication infrastructure cyber-security as Internet users deal with it in their daily operations and use of the Internet identity theft children pornography hacking and other virus and cyber threats (scams, spams, etc.) cyber-terrorism

398

Internet Security on the Athens Agenda The International Telecommunication Union (ITU) is at the forefront of contributors to the field of Telecommunication Security. At the Athens meeting, ITU mentioned the major contributions made in this domain by International organizations. ITU took the necessary steps to set up a number of initiatives that were presented at the Athens meeting. It presented a telecommunication security guideline and set up the road map towards Internet Security. The question of security of telecommunication was somehow dominant at the Athens meeting. ITU mentioned the difficulty of experts in the field. One of the difficulties mentioned was related to the question of standardisation - as many international organizations were developing domain initiatives at the same time. As a follow-up activity of the WSIS Conference, a number of ITU study groups have been assigned tasks related to Internet Security. At the Athens Meeting, findings of these study groups were presented to address diverse Internet security questions such as: Telecommunication management Protection against electromagnetic environment effects Outside Plant and related indoor installations Security, languages and telecommunication software

Mobile Telecommunications Networks Internet Security on the Rio de Janeiro Agenda

Internet Governance Forum At the Rio de Janeiro meeting, a whole session was dedicated to the question of Internet security, emphasizing the importance of this question nowadays, as well as the threats, that users are facing more and more in their daily operations over the Internet. Internet Security questions put on the agenda at Rio were related to: cybercrime cyber-terrorism protection of individuals and automatic processing of personal data action against trafficking in human beings protection of children against sexual exploitation and sexual abuse

399

The Rio de Janeiro meeting called for international cooperation and coordinated action to counter cybercrime because of its trans-national dimension. Recommendations were forwarded towards the direction of responsibility of governments in order to raise awareness among Internet users and in the direction of ICANN because of the responsibility it has for the Domain Name System. It is required of ICANN since it accepts responsibility for controlling illegal online content for the protection of children from Internet pornography. Internet Security on the Hyderabad Agenda Emerging issues This session aims to identify key issues in Internet Governance that should be addressed in the Forum. The first obstacle was to filter some themes, as there is a variety of interests to be held in such a generic target. There were four themes proposed: (i) demand and supply side initiatives (by Robert Pepper). He brought into debate the economic concept of demand and supply applied to Internet Governance. On the demand side, there were interesting proposals, such as the need for educating through capacity-building Internet users, the ability of people controlling their web ID (part of educating the usage in Internet), local content in local languages (enforcing local community) and improving public policies (but not over regulating, such as prohibiting or limiting access to VoIP, which can suppress the demand). On the supply side, there were the common concern of extending Internet users/access, but also considering the opportunities created by the release of spectrum through the switch to digital broadcasting were highlighted. Some speakers suggested that such spectrum could be used to support new broadband networks and support new investment and innovative services, while others held the view that this would not be a sustainable solution. [52] (ii) social, cultural and political issues of Web 2.0 (by Andrew Keen); (iii) access (particularly in Africa, by Nii Quaynor) and (iv) innovation, research and development (by Robert Kahn). Another challenge was to discuss emerging issues in a global forum with different perspectives, for example, developed and developing countries realities; democratic and non-democratic political regimes; and etc.

III IGF Hyderabad 2008


The third meeting of the IGF was held in Hyderabad, India. The over-all theme for the meeting was "Internet for All." The chairman's summary can be accessed via the official IGF website.[57] In terms of attendance, there were 1280 participants from 94 countries. The actual breakdown of participants by region can be found here.[58]

Renewal of the Multistakeholder Advisory Group (MAG)


Stakeholders from different sectors - government, civil society, private, academe and technical communities - were invited to submit proposals/nominations for new MAG members. The mandate behind the rotation of its members are based on recommendations from different sectors.[59] The official IGF website carries the list of updated MAG members.[60]

Internet Governance Forum

400

Remote Participation in the IGF 2008


The Remote Participation Working Group (RPWG)[61] has been working closely with the IGF Secretariat for allowing remote participants across the globe to interact in the meeting. There were 522 remote participants from around the world who joined the main sessions and workshops. The entire meeting in Hyderabad was webcast in real-time using high quality video, audio streaming and live chat. Remote Hubs were also introduced with remote moderators leading the discussions in their region. Most of the hubs were able to discuss pertinent local and domestic Internet Governance issues. The Remote Hubs were found in Buenos Aires, Argentina, Belgrade, Serbia, So Paulo (Brazil), Pune (India), Lahore (Pakistan), Bogot (Colombia), Barcelona and Madrid (Spain). The platform used for remote participation in Hyderabad was DimDim.[62]

IV IGF Sharm El Sheikh 2009


Egypt hosted the fourth IGF meeting in Sharm el Sheikh from 1518 November 2009 in Sharm El Sheikh.[63] Internet Governance Creating Opportunities for all is the overall title of the meeting. It marks the beginning of a new multi-stakeholder process. The main sessions on the agenda points are Managing Critical Internet Resources; Security, Openness and Privacy; Access; Diversity; Internet governance in the Light of WSIS Principles; Taking Stock and the Way forward on the Desirability of the Continuation of the Forum; and Emerging Issues - Impact of Social Networks. One key focus of IGF 2009 is encouraging youth participation towards Internet Governance issues. Videos of the Forum are available at http://www.un.org/webcast/igf/ondemand.asp. Another video [64] from the event.

Remote participation in the IGF 2009


Following the success of remote participation in the IGF Hyderabad, the Remote Participation Working Group (RPWG) has come up with improved guidelines on intervention for the training of remote moderators. Webex [65] was also used as the platform for this year's remote participation. There are 11 registered remote hubs for this year's meeting and the complete list can be found in the official IGF website.[66] Information on Remote Participation during the IGF meetings are available at http://www.igfremote.info

V IGF Vilnius 2010


The fifth IGF meeting was held in Vilnius, Lithuania on 1417 September.

Future IGF Meetings


The Sixth Meeting of the IGF were held on 2730 September 2011 in Nairobi, Kenya, at the United Nations Office at Nairobi (UNON).[67] This follows the invitation by the Government of Kenya, conveyed by Philip Okundi at the Closing Ceremony of the 2010 IGF in Vilnius.[68] Philip Okundi is Chairman of the Board of Directors of the Communications Commission of Kenya (CCK).[69] The Seventh Annual IGF Meeting will be held in Baku, Azerbaijan from 69 November 2012. The proposed main theme for the meeting is: Internet Governance for Sustainable Human, Economic and Social Development.

Internet Governance Forum

401

References
Meetings IGF - Baku 2012 [70] IGF - Vilnius 2010 [71] IGF - Egypt 2009 [72] IGF - India 2008 [73] IGF - Brazil 2007 [74] IGF - Greece 2006 [75]

[1] The Internet Governance Forum (IGF) (http:/ / www. intgovforum. org/ ) [2] Tunis Agenda for the Information Society, para 72 (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. html) [3] Press Release by the UN; includes list of members (http:/ / www. un. org/ News/ Press/ docs/ / 2006/ sga1006. doc. htm) [4] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ / 2006/ sga1006. doc. htm) [5] Press Release by the UN; includes list of members (http:/ / www. un. org/ News/ Press/ docs/ / 2007/ pi1791. doc. htm) [6] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2008/ pi1829. doc. htm) [7] List of Advisory Group Members (http:/ / www. intgovforum. org/ ADG_members. htm) [8] List of members of the 2008 MAG (http:/ / www. intgovforum. org/ cms/ magabout/ 58-members) [9] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2009/ pi1880. doc. htm) [10] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2012/ pi2025. doc. htm) [11] Call for MAG nominations, issued in 2011 (http:/ / www. intgovforum. org/ cms/ component/ content/ article/ 926) [12] Press Release by the UN (http:/ / www. un. org/ News/ Press/ docs/ 2012/ pi2025. doc. htm) [13] List of members of the 2012 MAG (http:/ / www. intgovforum. org/ cms/ component/ content/ article/ 114-preparatory-process/ 941-mag-2012-) [14] http:/ / www. intgovforum. org/ cms/ magabout/ 67-mag-meetings [15] About (http:/ / www. intgovforum. org/ about. htm) [16] http:/ / www. wgig. org/ about. html [17] http:/ / isoc. org/ wp/ newsletter/ ?p=2947 [18] World Summit on the Information Society. [2005]. The Tunis Commitment [online]. Available from: (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 7. html) [19] Ibid. (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 7. html) [20] World Summit on the Information Society. [2005]. Tunis Agenda for the Information Society [online]. Available from: (http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. pdf) [21] Argentinas Forum Proposal in WSIS (http:/ / www. itu. int/ wsis/ docs2/ pc3/ working/ dt18. html) [22] 16 February 2006 transcripts are available from: http:/ / intgovforum. org/ contributions/ IGF-1-0216. txt and http:/ / intgovforum. org/ contributions/ IGF-1-021606pm. txt (http:/ / www. intgovforum. org) [23] 17 February 2006 transcripts are available from: http:/ / intgovforum. org/ contributions/ UN-IGF-AM-2-17-06. txt and http:/ / intgovforum. org/ contributions/ UN-IGF-PM-2-17-06. txt (http:/ / www. intgovforum. org) [24] A summary of contributions is available from http:/ / intgovforum. org/ Summary%20of%20discussions. htm (http:/ / www. intgovforum. org) [25] Read further on the WSIS related events available from: (http:/ / www. itu. int/ wsis/ follow-up/ index. html) [26] Transcript for 3 September 2007 open consultations is available from: (http:/ / www. intgovforum. org/ IGF-03Sept07Consultation. txt) [27] http:/ / info. intgovforum. org/ regfeb2011. php [28] http:/ / www. intgovforum. org/ cms/ [29] Available from http:/ / www. itu. int/ wsis/ docs2/ tunis/ off/ 6rev1. html [30] Mandate (http:/ / www. intgovforum. org/ mandate. htm) [31] UN General Assembly Resolution 60/252, World Summit on the Information Society http:/ / www. un. org/ ga/ search/ view_doc. asp?symbol=A/ RES/ 60/ 252 [32] UN General Assembly Resolution 65/141, Information and communications technologies for development http:/ / www. un. org/ ga/ search/ view_doc. asp?symbol=A/ RES/ 65/ 141 [33] http:/ / www. unctad. info/ en/ CstdWG [34] Draft resolution on "Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society" http:/ / www. unctad. org/ en/ docs/ ecn162011_draftresolutionwsisfollowup. pdf [35] Dynamic Coalitions (http:/ / www. intgovforum. org/ Dynamic Coalitions. php) [36] [37] [38] [39] http:/ / stopspamalliance. org/ http:/ / wiki. igf-online. net/ wiki/ Privacy http:/ / igf-dcos. org/ http:/ / www. pacificit. org/ dc

Internet Governance Forum


[40] http:/ / www. internet-bill-of-rights. org/ en/ [41] http:/ / maayajo. org/ spip. php?article27 [42] http:/ / www. a2k-igf. org/ [43] http:/ / foeonline. wordpress. com/ [44] http:/ / wiki. igf-online. net/ wiki/ IGF-OCDC [45] http:/ / www. itu. int/ accessibility/ DC [46] http:/ / www. intgovforum. org/ cms/ dynamiccoalitions [47] http:/ / www. intgovforum. org/ Rio_Schedule_final. html [48] http:/ / www. intgovforum. org/ workshop_info. htm [49] http:/ / www. intgovforum. org/ workshops_08/ wrkshplist. php [50] Please see http:/ / www. igfgreece2006. gr/ [51] GigaNet - Global Internet Governance Academic Network - IGLOO (http:/ / www. igloo. org/ giganet) [52] http:/ / www. intgovforum. org/ Rio_Meeting/ Chairman%20Summary. FINAL. 16. 11. 2007. pdf [53] Please see http:/ / www. igfbrazil2007. br/ [54] Full information available at http:/ / www. intgovforum. org/ rio_stats. htm [55] Available at: http:/ / www. intgovforum. org/ Rio_Meeting/ IGF2-opening-12NOV07. txt (page 1) [56] Available at: http:/ / www. intgovforum. org/ Rio_Meeting/ IGF2-opening-12NOV07. txt (page 2) [57] Available at: http:/ / www. intgovforum. org/ cms/ hydera/ Chairman%27s%20Summary. 10. 12. 2. pdf [58] Available at: http:/ / igf. wgig. org/ cms/ index. php/ component/ content/ article/ 42-igf-meetings/ 414-attendance-breakdown-of-the-hyderabad-meeting [59] Available at: http:/ / www. intgovforum. org/ cms/ AGD/ MAG. Summary. 28. 02. 2008. v3. pdf [60] Available at: http:/ / www. intgovforum. org/ cms/ magabout/ 406-mag-2010 [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] Available at: http:/ / www. igfremote. info More Information: http:/ / www. dimdim. com http:/ / igf09. eg http:/ / www. youtube. com/ watch?v=d-kxYt2LwKc More info at: http:/ / www. webex. com List available at http:/ / www. intgovforum. org/ cms/ 2009-igf-sharm-el-sheikh/ remote-participation http:/ / www. intgovforum. org/ cms/ component/ content/ article/ 42-igf-meetings/ 761-2011-igf-meeting http:/ / www. intgovforum. org/ cms/ component/ content/ article/ 102-transcripts2010/ 688-closing-ceremony http:/ / www. cck. go. ke/ about/ board/ okundi. html http:/ / www. igf2012. com/ http:/ / www. igf2010. lt/ http:/ / igf09. eg http:/ / igf2008. in/ http:/ / www. igfbrazil2007. br http:/ / www. igfgreece2006. gr

402

External links
Internet Governance Forum (http://www.intgovforum.org/) IGF Community Site (http://www.igf-online.net/) IGF - Internet SOCiety Public Policy Activities (http://www.isoc.org/isoc/conferences/wsis/IGF.shtml) IP Justice IGF webpage (http://ipjustice.org/wp/campaigns/igf/) Diplo Internet Governance Community (http://www.diplointernetgovernance.org) Internet Governance Project (IGP) (http://internetgovernance.org/) Association for Progressive Communications (APC) on the IGF (http://www.apc.org/en/node/6924/) Recommendations and publications from the civil society network for social justice and sustainable development. 80% of APC's member organisations are from developing countries.

403

People
Internet pioneers
Instead of a single "inventor", the Internet was developed by many people over many years. The following are some Internet pioneers who contributed to its early development. These include early theoretical foundations, specifying original protocols, and expansion beyond a research tool to wide deployment.

The pioneers
Claude Shannon
Claude Shannon (19162001) called the "father of modern information theory", published a "A Mathematical Theory of Communication" in 1948. His paper gave a formal way of studying communication channels. It established fundamental limits on the efficiency of communication over noisy channels, and presented the challenge of finding families of codes to achieve capacity.[1]

Vannevar Bush
Vannevar Bush (18901974) helped to establish a partnership between U.S. military, university research, and independent think tanks. He was appointed Chairman of the National Defense Research Committee in 1940 by President Franklin D. Roosevelt, appointed Director of the Office of Scientific Research and Development in 1941, and from 1946 to 1947, he served as chairman of the Joint Research and Development Board. Out of this would come DARPA, which in turn would lead to the ARPANET Project.[2] His July 1945 Atlantic Monthly article "As We May Think" proposed Memex, a theoretical proto-hypertext computer system in which an individual compresses and stores all of their books, records, and communications, which is then mechanized so that it may be consulted with exceeding speed and flexibility.[3]

Paul Baran
Paul Baran (19262011) developed the field of redundant distributed networks while conducting research at RAND Corporation starting in 1959 when Baran began investigating the development of survivable communication networks. This led to a series of papers titled "On Distributed communications"[4] that in 1964 described a detailed architecture for a distributed survivable packet switched communications network.[2]

Donald Davies
Donald Davies (19242000) coined the term "packet switching" at the National Physical Laboratory in the United Kingdom. Previously working independently, the "packet" terminology was adopted when the ARPANET was designed in 1967, and became the key concept of the Internet Protocol.[5]

Internet pioneers

404

J. C. R. Licklider
Joseph Carl Robnett Licklider (19151990) was a faculty member of Massachusetts Institute of Technology, and researcher at Bolt, Beranek and Newman. He developed the idea of a universal network at the Information Processing Techniques Office (IPTO) of the United States Department of Defense Advanced Research Projects Agency (ARPA).[2][6] He headed IPTO from 1962 to 1963, and again from 1974 to 1975. His 1960 paper "Man-Computer Symbiosis" envisions that mutually-interdependent, "living together", tightly-coupled human brains and computing machines would prove to complement each other's strengths.[7]

Charles M. Herzfeld
Charles M. Herzfeld is an American scientist and scientific manager, best known for his time as Director of DARPA, during which, among other things, he personally took the decision to authorize the creation of the ARPANET, the predecessor of the Internet. In 2012, Herzfeld was inducted into the Internet Hall of Fame by the Internet Society.[8]

Bob Taylor
Robert W. Taylor (born 1932) was director of ARPA's Information Processing Techniques Office from 1965 through 1969, where he convinced ARPA to fund a computer network. From 1970 to 1983, he managed the Computer Science Laboratory of the Xerox Palo Alto Research Center (PARC), where technologies such as Ethernet and the Xerox Alto were developed.[9] He was the founder and manager of Digital Equipment Corporation's Systems Research Center until 1996.[10] The 1968 paper, "The Computer as a Communication Device", that he wrote together with J.C.R. Licklider starts out: "In a few years, men will be able to communicate more effectively through a machine than face to face."[11] And while their vision would take more than "a few years", the paper lays out the future of what the Internet would eventually become.

Douglas Engelbart
Douglas Engelbart (born 1925) was an early researcher at the Stanford Research Institute. His Augmentation Research Center laboratory became the second node on the ARPANET in October 1969, and SRI became the early Network Information Center, which evolved into the domain name registry.[5]

Larry Roberts
Lawrence G. "Larry" Roberts (born 1937) is an American computer scientist.[12] After earning his PhD in electrical engineering from MIT in 1963, Roberts continued to work at MIT's Lincoln Laboratory where in 1965 he connected Lincoln Lab's TX-2 computer to the SDC Q-32 computer in Santa Monica using packet-switching.[13] In 1966, he became the chief scientist in the ARPA Information Processing Techniques Office (IPTO), where he led the development of the ARPANET. In 1973, he left ARPA to commercialize the nascent technology in the form of Telenet, the first data network utility, and served as its CEO from 1973 to 1980.[14]

Internet pioneers

405

Leonard Kleinrock
Leonard Kleinrock (born 1934) published his first paper on digital network communications, "Information Flow in Large Communication Nets", in 1961. After completing his Ph.D. thesis in 1962 which provided a fundamental theory of packet switching, he moved to UCLA. In 1969, a team at UCLA connected a computer to an Interface Message Processor, becoming the first node on ARPANET.[15] Bernard Luskin,a doctoral student at UCLA bridged much of the work into education through is dissertation working between UCLA and the Rand Corporation in articulating the theory of innformation flow in large communication nets pioneered by Leonard Kleinrock into education.

Louis Pouzin
Leonard Kleinrock and the first Interface

Louis Pouzin (born 1931) is a French computer scientist. He invented the Message Processor datagram and designed an early packet communications network, CYCLADES.[16] His work was broadly used by Robert Kahn, Vinton Cerf, and others in the development of TCP/IP.

John Klensin
John Klensin's involvement with Internet began in 1969, when he worked on the File Transfer Protocol.[17] Klensin was involved in the early procedural and definitional work for DNS administration and top-level domain definitions and was part of the committee that worked out the transition of DNS-related responsibilities between USC-ISI and what became ICANN.[18] His career includes 30 years as a Principal Research Scientist at MIT, a stint as INFOODS Project Coordinator for the United Nations University, Distinguished Engineering Fellow at MCI WorldCom, and Internet Architecture Vice President at AT&T; he is now an independent consultant.[19] In 1992 Randy Bush and John Klensin created the Network Startup Resource Center,[20] helping dozens of countries to establish connections with FidoNet, UseNet, and when possible the Internet. In 2003 he received an International Committee for Information Technology Standards Merit Award.[21] In 2007, he was inducted as a Fellow of the Association for Computing Machinery for contributions to networking standards and Internet applications.[22] In 2012, Klensin was inducted into the Internet Hall of Fame by the Internet Society.[8]

Bob Kahn
Robert E. "Bob" Kahn (born 1938) is an American engineer and computer scientist, who in 1974, along with Vint Cerf, invented the TCP/IP protocols.[23][24] After earning a Ph.D. degree from Princeton University in 1964, he worked for AT&T Bell Laboratories, as an assistant professor at MIT, and at Bolt, Beranek and Newman (BBN), where he helped develop the ARPANET IMP. In 1972, he began work at the Information Processing Techniques Office (IPTO) within ARPA. In 1986 he left ARPA to found the Corporation for National Research Initiatives (CNRI), a nonprofit organization providing leadership and funding for research and development of the National Information Infrastructure[25]

Internet pioneers

406

Vint Cerf
Vinton G. "Vint" Cerf (born 1943) is an American computer scientist.[26] He earned his Ph.D. from UCLA in 1972. At UCLA he worked in Professor Leonard Kleinrock's networking group that connected the first two nodes of the ARPANET and contributed to the ARPANET host-to-host protocol. Cerf was an assistant professor at Stanford University from 19721976, where he conducted research on packet network interconnection protocols and co-designed the DoD TCP/IP protocol suite with Bob Kahn. He was a program manager for the Advanced Research Projects Agency (ARPA) from 1976 to 1982. Cerf was instrumental in the formation of both the Internet Society and Internet Corporation for Assigned Names and Numbers (ICANN), serving as founding president of the Internet Society from 19921995 and in 1999 as Chairman of the Board and as ICANN Chairman from 2000 to 2007.[27]

Steve Crocker
Steve Crocker (born 1944 in Pasadena, California) has worked in the ARPANET and Internet communities since their inception. As a UCLA graduate student in the 1960s, he helped create the ARPANET protocols which were the foundation for today's Internet.[28] He created the Request for Comments series,[29] authoring the very first RFC and many more.[30] He was instrumental in creating the ARPA "Network Working Group", the forerunner of the modern Internet Engineering Task Force.

Steve Crocker

Crocker has been a program manager at the Advanced Research Projects Agency (ARPA), a senior researcher at USC's Information Sciences Institute, founder and director of the Computer Science Laboratory at The Aerospace Corporation and a vice president at Trusted Information Systems. In 1994, Crocker was one of the founders and chief technology officer of CyberCash, Inc. He has also been an IETF security area director, a member of the Internet Architecture Board, chair of the Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee, a board member of the Internet Society and numerous other Internet-related volunteer positions. Crocker is chair of the board of ICANN.[31] For this work, Crocker was awarded the 2002 IEEE Internet Award for "for leadership in creation of key elements in open evolution of Internet protocols". In 2012, Crocker was inducted into the Internet Hall of Fame by the Internet Society.[8]

Jon Postel
Jon Postel (19431998) was a researcher at the Information Sciences Institute. He was editor of all early Internet standards specifications, such as the Request for Comments (RFC) series. His beard and sandals made him "the most recognizable archetype of an Internet pioneer".[32] The Internet Society's Postel Award is named in his honor, as is the Postel Center at Information Sciences Institute. His obituary was written by Vint Cerf and published as RFC 2468 in remembrance of Postel and his work. In 2012, Postel was inducted into the Internet Hall of Fame by the Internet Society.[8]

Jon Postel, c. 1994

Internet pioneers

407

Jake Feinler
Elizabeth J. "Jake" Feinler was a staff member of Doug Engelbart's Augmentation Research Center at SRI and PI for the Network Information Center (NIC) for the ARPANET and the Defense Data Network (DDN) from 1972 until 1989.[33][34] In 2012, Feinler was inducted into the Internet Hall of Fame by the Internet Society.[]

Peter Kirstein
Peter T. Kirstein (born 1933) is a British computer scientist and a leader in the international development of the Internet.[35] In 1973, he established one of the first two international nodes of the ARPANET.[36] In 1978 he co-authored "Issues in packet-network interconnection" with Vint Cerf, one of the early technical papers on the internet concept.[37] Starting in 1983 he chaired the International Collaboration Board, which involved six NATO countries, served on the Networking Panel of the NATO Science Committee (serving as chair in 2001), and on Advisory Committees for the Australian Research Council, the Canadian Department of Communications, the German GMD, and the Indian Education and Research Network (ERNET) Project. He leads the Silk Project, which provides satellite-based Internet access to the Newly Independent States in the Southern Caucasus and Central Asia. In 2012, Kirstein was inducted into the Internet Hall of Fame by the Internet Society.[]

Danny Cohen
Danny Cohen led several projects on real-time interactive applications over the ARPANet and the Internet starting in 1973.[38] After serving on the computer science faculty at Harvard University (19691973) and Caltech (1976), he joined the Information Sciences Institute (ISI) at University of Southern California (USC). At ISI (19731993) he started many network related projects including, one to allow interactive, real-time speech over the ARPANet, packet-voice, packet-video, and Internet Concepts.[39] In 1981 he adapted his visual flight simulator to run over the ARPANet, the first application of packet switching networks to real-time applications. In 1993, he worked on Distributed Interactive Simulation through several projects funded by United States Department of Defense. He is probably best known for his 1980 paper "On Holy Wars and a Plea for Peace"[40] which adopted the terminology of endianness for computing. Cohen was elected to the National Academy of Engineering in 2006 for contributions to the advanced design, graphics, and real-time network protocols of computer systems[41] and as an IEEE Fellow in 2010 for contributions to protocols for packet switching in real-time applications.[42] In 1993 he received a United States Air Force Meritorious Civilian Service Award. And in 2012, Cohen was inducted into the Internet Hall of Fame by the Internet Society.[]

Paul Mockapetris
Paul V. Mockapetris, while working with Jon Postel at the Information Sciences Institute (ISI) in 1983, proposed the Domain Name System (DNS) architecture.[43][44] He was IETF chair from 1994 to 1996.[45] Mockapetris received the 1997 John C. Dvorak Telecommunications Excellence Award "Personal Achievement Network Engineering" for DNS design and implementation, the 2003 IEEE Internet Award for his contributions to DNS, and the Distinguished Alumnus award from the University of California, Irvine. In May 2005, he received the ACM Sigcomm lifetime award. In 2012, Mockapetris was inducted into the Internet Hall of Fame by the Internet Society.[]

Internet pioneers

408

Joyce Reynolds
Joyce K. Reynolds of USC's Information Sciences Institute (ISI) served as RFC Editor, together with Bob Barden, from 1987 to 2006,[46] and also performed the IANA function with Jon Postel until this was transferred to ICANN, and worked with ICANN in this role until 2001.[47] She was IETF User Services Area Director and a member of the Internet Engineering Steering Group (IESG) from 1990 to 1998.[48] She has authored or co-authored many RFCs.

David Clark
We reject: kings, presidents and voting. We believe in: rough consensus and running code. [49] -Dave Clark at IETF 24

David D. Clark (born 1944) is an American computer scientist.[50] During the period of tremendous grown and expansion of the Internet from 1981 to 1989, he acted as chief protocol architect in the development of the Internet, and chaired the Internet Activities Board, which later became the Internet Architecture Board. He is currently a Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory.

Dave Mills
David L. Mills (born 1938) is an American computer engineer.[51] Mills earned his PhD in Computer and Communication Sciences from the University of Michigan in 1971. While at Michigan he worked on the ARPA sponsored Conversational Use of Computers (CONCOMP) project and developed DEC PDP-8 based hardware and software to allow terminals to be connected over phone lines to an IBM System/360 mainframe computer.[52][53] Mills was the chairman of the Gateway Algorithms and Data Structures Task Force (GADS) and the first chairman of the Internet Architecture Task Force.[54] He invented the Network Time Protocol (1981),[55][56] the DEC LSI-11 based fuzzball router that was used for the 56 kbit/s NSFNET (1985),[57] the Exterior Gateway Protocol (1984),[58] and inspired the author of ping (1983).[59] He is an emeritus professor at the University of Delaware.

Radia Perlman
Radia Joy Perlman (born 1951) is the software designer and network engineer who developed the spanning-tree protocol which is fundamental to the operation of network bridges.[60] She also played an important role in the development of link-state routing protocols such as IS-IS (which had a significant influence on OSPF).[61][62]

Dennis M. Jennings
Dennis M. Jennings is an Irish physicist, academic, Internet pioneer, and venture capitalist. In 1984, the National Science Foundation (NSF) began construction of several regional supercomputing centers to provide very high-speed computing resources for the US research community. In 1985 NSF hired Jennings as Director of CSNET and to lead the establishment of the National Science Foundation Network (NSFNET) to link five of the super-computing centers to enable sharing of resources and information. Jennings made three critical decisions that shaped the subsequent development of NSFNET:[63] that it would be a general-purpose research network, not limited to connection of the supercomputers; it would act as the backbone for connection of regional networks at each supercomputing site; and it would use the ARPANET's TCP/IP protocols. Jennings was also actively involved in the start-up of research networks in Europe (European Academic Research Network, EARN - President; EBONE - Board member) and Ireland (HEAnet - initial proposal and later Board member). He chaired the Board and General Assembly of the Council of European National Top Level Domain

Internet pioneers Registries (CENTR) from 1999 to early 2001 and was actively involved in the start-up of the Internet Corporation for Assigned Names and Numbers (ICANN). He was a member of the ICANN Board from 2007 to 2010, serving as Vice-Chair in 2009-2010.[64]

409

Steve Wolff
Stephen "Steve" Wolff participated in the development of ARPANET while working for the U.S. Army.[65] In 1986 he became Division Director for Networking and Communications Research and Infrastructure at the National Science Foundation (NSF) where he managed the development of NSFNET.[66] He also conceived the Gigabit Testbed, a joint NSF-DARPA project to prove the feasibility of IP networking at gigabit speeds.[67] His work at NSF transformed the fledgling internet from a narrowly focused U.S. government project into the modern Internet with scholarly and commercial interest for the entire world.[68] In 1994 he left NSF to join Cisco as a technical manager in Corporate Consulting Engineering.[65] In 2011 he became the CTO at Internet2.[69]

Van Jacobson
Van Jacobson is an American computer scientist, best known for his work on TCP/IP network performance and scaling.[] His work redesigning TCP/IP's flow control algorithms (Jacobson's algorithm)[70][71] to better handle congestion is said to have saved the Internet from collapsing in the late 1980s and early 1990s.[] He is also known for the TCP/IP Header Compression protocol described in RFC 1144: Compressing TCP/IP Headers for Low-Speed Serial Links, popularly known as Van Jacobson TCP/IP Header Compression. He is co-author of several widely used network diagnostic tools, including traceroute, tcpdump, and pathchar. He was a leader in the development of the multicast backbone (MBone) and the multimedia tools vic,[72] vat,[73] and wb.[74] For his work, Jacobson received the 2001 ACM SIGCOMM Award for Lifetime Achievement,[75] the 2003 IEEE Koji Kobayashi Computers and Communications Award,[42] and was elected to the National Academy of Engineering in 2006.[76] In 2012, Jacobson was inducted into the Internet Hall of Fame by the Internet Society.[]

Ted Nelson
Theodor Holm "Ted" Nelson (born 1937) is an American sociologist and philosopher. In 1960 he founded Project Xanadu with the goal of creating a computer network with a simple user interface. Project Xanadu was to be a worldwide electronic publishing system using hypertext linking that would have created a universal library.[77] In 1963 he coined the terms "hypertext" and "hypermedia". In 1974 he wrote and published two books in one, Computer Lib/Dream Machines,[78] that has been hailed as "the most important book in the history of new media."[79] Sadly, his grand ideas from the 1960s and 1970s never became completed projects.

Tim Berners-Lee
Timothy John "Tim" Berners-Lee (born 1955) is a British physicist and computer scientist.[80] In 1980, while working at CERN, he proposed a project using hypertext to facilitate sharing and updating information among researchers.[81] While there, he built a prototype system named ENQUIRE.[82] Back at CERN in 1989 he conceived of and, in 1990, together with Robert Cailliau, created the first client and server implementations for what became the World Wide Web. Berners-Lee is the director of the World Wide Web Consortium (W3C), a standards organization which oversees and encourages the Web's continued development, co-Director of the Web Science Trust, and founder of the World Wide Web Foundation.[83]

The Web's historic logo designed by Robert Cailliau.

Internet pioneers In 1994 Berners-Lee became one of only six members of the World Wide Web Hall of Fame.[84] In 2004, Berners-Lee was knighted by Queen Elizabeth II for his pioneering work.[85] In April 2009, he was elected a foreign associate of the United States National Academy of Sciences, based in Washington, D.C.[86][87] In 2012, Berners-Lee was inducted into the Internet Hall of Fame by the Internet Society.[]

410

Mark P. McCahill
Mark P. McCahill (born 1956) is an American programmer and systems architect. While working at the University of Minnesota he led the development of the Gopher protocol, the effective predecessor of the World Wide Web, and contributed to the development and popularization of a number of other Internet technologies from the 1980s.

Robert Cailliau
Robert Cailliau (French:[kajo], born 1947), is a Belgian informatics engineer and computer scientist who, working with Tim Berners-Lee and Nicola Pellow at CERN, developed the World Wide Web.[88] In 2012 he was inducted into the Internet Hall of Fame by the Internet Society.[]

Marc Andreessen
Marc L. Andreessen (born 1971) is an American software engineer, entrepreneur, and investor. Working with Eric Bina while at NCSA, he co-authored Mosaic, the first widely-used web browser. He is also co-founder of Netscape Communications Corporation.[89]

Eric Bina
Eric J. Bina (born 1964) is an American computer programmer. In 1993, together with Marc Andreessen, he authored the first version of Mosaic while working at NCSA at the University of Illinois at Urbana-Champaign.[84] Mosaic is famed as the first killer application that popularized the Internet. He is also a co-founder of Netscape Communications Corporation.[90]

Plaque commemorating the creation of Mosaic web browser at NCSA.

Birth of the Internet plaque at Stanford


A plaque commemorating the "Birth of the Internet" was dedicated at a conference on the history and future of the internet on July 28, 2005 and is displayed at the Gates Computer Science Building, Stanford University.[91] The text printed and embossed in black into the brushed bronze surface of the plaque reads:[92] BIRTH OF THE INTERNET
THE ARCHITECTURE OF THE INTERNET AND THE DESIGN OF THE CORE NETWORKING PROTOCOL TCP (WHICH LATER BECAME TCP/IP) WERE CONCEIVED BY VINTON G. CERF AND ROBERT E. KAHN DURING 1973 WHILE CERF WAS AT STANFORD'S DIGITAL SYSTEMS LABORATORY AND KAHN WAS AT ARPA (LATER DARPA). IN THE SUMMER OF 1976, CERF LEFT STANFORD TO MANAGE THE PROGRAM WITH KAHN AT ARPA.

THEIR WORK BECAME KNOWN IN SEPTEMBER 1973 AT A NETWORKING CONFERENCE IN ENGLAND. CERF AND KAHN'S SEMINAL PAPER WAS PUBLISHED IN MAY 1974.

Internet pioneers
CERF, YOGEN K. DALAL, AND CARL SUNSHINE WROTE THE FIRST FULL TCP SPECIFICATION IN DECEMBER 1974. WITH THE SUPPORT OF DARPA, EARLY IMPLEMENTATIONS OF TCP (AND IP LATER) WERE TESTED BY BOLT BERANEK AND NEWMAN (BBN), STANFORD, AND UNIVERSITY COLLEGE LONDON DURING 1975.

411

BBN BUILT THE FIRST INTERNET GATEWAY, NOW KNOWN AS A ROUTER, TO LINK NETWORKS TOGETHER. IN SUBSEQUENT YEARS, RESEARCHERS AT MIT AND USC-ISI, AMONG MANY OTHERS, PLAYED KEY ROLES IN THE DEVELOPMENT OF THE SET OF INTERNET PROTOCOLS.

KEY STANFORD RESEARCH ASSOCIATES AND FOREIGN VISITORS

VINTON CERF DAG BELSNES RONALD CRANE YOGEN DALAL JUDITH ESTRIN RICHARD KARP GERALD LE LANN (Seal of LELAND STANFORD JUNIOR UNIVERSITY 1891 motto in German: DIE LUFT DER FREIHEIT WEHT) JAMES MATHIS BOB METCALFE DARRYL RUBIN JOHN SHOCH CARL SUNSHINE KUNINOBU TANNO

DARPA ROBERT KAHN

COLLABORATING GROUPS

BOLT BERANEK AND NEWMAN WILLIAM PLUMMER GINNY STRAZISAR RAY TOMLINSON

MIT NOEL CHIAPPA DAVID CLARK STEPHEN KENT DAVID P. REED

NDRE YNGVAR LUNDH PAAL SPILLING

UNIVERSITY COLLEGE LONDON FRANK DEIGNAN MARTINE GALLAND PETER HIGGINSON ANDREW HINCHLEY PETER KIRSTEIN ADRIAN STOKES

USC-ISI ROBERT BRADEN DANNY COHEN DANIEL LYNCH JON POSTEL

ULTIMATELY, THOUSANDS IF NOT TENS TO HUNDREDS OF THOUSANDS HAVE CONTRIBUTED THEIR EXPERTISE TO THE EVOLUTION OF THE INTERNET.

DEDICATED JULY 28, 2005

Internet pioneers

412

References
[1] MIT "Professor Claude Shannon dies; was founder of digital communications" (http:/ / web. mit. edu/ newsoffice/ 2001/ shannon. html), MIT - News office, Cambridge, Massachusetts, February 27, 2001 [2] Bill Stewart. "Internet History" (http:/ / www. livinginternet. com/ i/ ii. htm). Living Internet web book. . Retrieved March 30, 2011. [3] Bush, Vannevar (July 1945). "[[As We May Think (http:/ / www. theatlantic. com/ doc/ 194507/ bush)]"]. The Atlantic Monthly. . [4] About RAND | History and Mission | Paul Baran: Publications on Distributed Communications (http:/ / www. rand. org/ about/ history/ baran. list. html) [5] Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff. "A Brief History of the Internet" (http:/ / www. isoc. org/ internet/ history/ brief. shtml). Internet Society. . Retrieved March 30, 2011. [6] Jay R. Hauben. "JCR Licklider (1915-1990)" (http:/ / www. columbia. edu/ ~jrh29/ years. html). Columbia University. . Retrieved March 30, 2011. [7] "Man-Computer Symbiosis" (http:/ / medg. lcs. mit. edu/ people/ psz/ Licklider. html), J.C.R. Licklider, IRE Transactions on Human Factors in Electronics, vol. HFE-1, pp.4-11, Mar 1960 [8] 2012 Inductees (http:/ / www. internethalloffame. org/ inductees/ year/ 2012), Internet Hall of Fame website. Last accessed April 24, 2012 [9] Marion Softky (October 11, 2000). "Building the Internet: Bob Taylor won the National Medal of Technology "For visionary leadership in the development of modern computing technology"" (http:/ / www. almanacnews. com/ morgue/ 2000/ 2000_10_11. taylor. html). The California Almanac. . Retrieved March 30, 2011. [10] John Naughton (October 5, 200). A Brief History of the Future: Origins of the Internet. Phoenix. ISBN978-0-7538-1093-4. [11] J.C.R. Licklider; Robert Taylor (April 1968). "The Computer as a Communication Device" (http:/ / www. kurzweilai. net/ the-computer-as-a-communication-device). Science and Technology. . [12] "2001 Draper Prize Recipients' Bios" (http:/ / www. nae. edu/ Activities/ Projects20676/ Awards/ 20681/ PastWinners/ page2001. aspx). National Academy of Engineering. 2001. . [13] Josh McHugh (2001-05). "The n -Dimensional Superswitch" (http:/ / www. wired. com/ wired/ archive/ 9. 05/ caspian. html?pg=3& topic=& topic_set=). Wired Magazine. . [14] Otis Port (2004-09-27). "Larry Roberts:He made the Net Work" (http:/ / www. businessweek. com/ magazine/ content/ 04_39/ b3901030_mz072. htm). Business Week. . [15] Leonard Kleinrock (August 27, 1996). "Leonard Kleinrock's Personal History/Biography: The Birth of the Internet" (http:/ / www. isoc. org/ awards/ postel/ memory. shtml). . Retrieved March 30, 2011. [16] "Biography of Louis Pouzin, 1999 SIGCOMM Award Winner" (http:/ / www. acm. org/ sigs/ sigcomm/ sigcomm99/ pouzin. html), ACM SIGCOMM web site [17] "Internet Experts selected to fill top organizational posts" (http:/ / www. isoc. org/ isoc/ media/ releases/ 980403pr. shtml). ISOC. 1998-04-03. . Retrieved 2011-07-23. [18] "John Klensin biographical sketch" (http:/ / www. internethalloffame. org/ inductees/ john-klensin), Internet Hall of Fame, Internet Society, 2012 [19] "Biography of John Klensin at the ICANN web site" (http:/ / www. icann. org/ biog/ klensin. htm). . Retrieved 2008-06-17. [20] "About the Network Startup Resource Center" (http:/ / www. nsrc. org/ about. html#support). NSRC (http:/ / www. nsrc. org/ ). 1992. . Retrieved 2011-07-25. [21] "INCITS Awards Honor Roll" (http:/ / www. incits. org/ Awards/ honor. htm). INCITS. . Retrieved 2011-07-25. [22] "List of 2007 ACM Fellows inductees" (http:/ / fellows. acm. org/ fellow_citation. cfm?id=1101344& srt=alpha& alpha=K). . Retrieved 2008-06-17. [23] "Robert E Kahn" (http:/ / awards. acm. org/ citation. cfm?id=4598637& srt=all& aw=140& ao=AMTURING& yr=2004). A. M. Turing Award. ACM. 2004. . Retrieved 2010-01-23. "For pioneering work on internetworking, including the design and implementation of the Internet's basic communications protocols, TCP/IP, and for inspired leadership in networking." [24] IEEE Alexander Graham Bell Medal (http:/ / www. ieee. org/ about/ awards/ medals/ bell. html#sect3) [25] "CNRI Officers and Directors" (http:/ / www. cnri. reston. va. us/ directors_2. html). CNRI. . Retrieved 2009-02-25. [26] Cerf's curriculum vitae (http:/ / www. icann. org/ correspondence/ cerf-testimony-08feb01. htm#Vita), attached to a transcript of his February 2001 testimony before the United States House Energy Subcommittee on Telecommunications and the Internet [27] Vinton G. Cerf's biography at the Internet Society (http:/ / www. icann. org/ en/ biog/ cerf. htm) [28] Matthew Lyon (Fall 1997). "Wired!" (http:/ / www. magazine. ucla. edu/ year1997/ fall97_03. html). UCLA Magazine. . [29] RFC 2468 [30] RFC 1 [31] "ICANN news release" (http:/ / www. icann. org/ en/ announcements/ announcement-1-24jun11-en. htm). June 2011. . [32] "A ten year tribute to Jon Postel: An Internet visionary, 1943-1998" (http:/ / www. isoc. org/ awards/ postel/ memory. shtml). Internet Society. October 16, 2008. . Retrieved March 30, 2011. [33] Oral History of Elizabeth (Jake) Feinler (http:/ / archive. computerhistory. org/ resources/ access/ text/ Oral_History/ 102702199. 05. 01. acc. pdf), Interviewed by Marc Weber, September 10, 2009, Reference no: X5378.2009, Computer History Museum, 49 pp. [34] "Elizabeth J. Feinler Biography" (http:/ / alumni. sri. com/ hofbios/ Elizabeth J. Feinler 2000. htm), SRI Alumni Hall of Fame, 2000

Internet pioneers
[35] "Peter T. Kirsten recognized with the Internet Society's Postel Award" (http:/ / www. isoc. org/ isoc/ media/ releases/ 030716pr. shtml), July 16, 2003, Press Release, Internet Society [36] "Peter Kirstein's International Activities" (http:/ / www. cs. ucl. ac. uk/ staff/ P. Kirstein/ internationalactivity. html), University College London web page [37] "Issues in packet-network interconnection" (http:/ / dx. doi. org/ 10. 1109/ PROC. 1978. 11147), V.G. Cerf and P.T. Kirstein, in Proceedings of the IEEE, Volume 66 Issue 11 (November 1978), pp. 13861408 [38] "Danny Cohen biography" (http:/ / www. internethalloffame. org/ inductees/ danny-cohen), Internet Hall of Fame, Internet Society, accessed 14 July 2012 [39] "RFC 0741: Specifications for the Network Voice Protocol (NVP)", Nov-22-1977. [40] Cohen, Danny (1 April 1980). On Holy Wars and a Plea for Peace (https:/ / tools. ietf. org/ rfcmarkup?url=ftp:/ / ftp. rfc-editor. org/ in-notes/ ien/ ien137. txt). IEN 137. . "...which bit should travel first, the bit from the little end of the word, or the bit from the big end of the word? The followers of the former approach are called the Little-Endians, and the followers of the latter are called the Big-Endians." Also published at IEEE Computer, October 1981 issue (http:/ / ieeexplore. ieee. org/ xpl/ freeabs_all. jsp?arnumber=1667115). [41] National Academy of Engineering member (http:/ / www. nae. edu/ nae/ naepub. nsf/ Members+ By+ UNID/ 4424CB034570705786257552006B36FC?opendocument), 2006 [42] IEEE Fellow (http:/ / www. ieee. org/ membership_services/ membership/ fellows/ chronology/ fellows_2010. html), 2010 [43] RFC 882 - Domain Names - Concepts and Facilities, November 1983 [44] RFC 883 - Domain Names - Implementation and Specification, November 1983 [45] Biography of Paul Mockapetris (http:/ / www. nominum. com/ who-we-are/ board-of-directors/ paul-mockapetris), Nominum web site [46] "Bob Braden and Joyce K. Reynolds recognized with the Internet Society's Postel Award" (http:/ / www. isoc. org/ isoc/ media/ releases/ 061110pr. shtml). 10 November 2006. . Retrieved 2008-07-30. [47] "Internet History Project biography, 2003" (http:/ / www. postel. org/ pipermail/ internet-history/ 2003-October/ 000343. html). . Retrieved 2009-07-26. [48] IETF List of IESG members (http:/ / www. ietf. org/ iesg/ past-members. html), IETF web page [49] "A Cloudy Crystal Ball -- Visions of the Future" (http:/ / ietf. org/ proceedings/ prior29/ IETF24. pdf) (PDF). 1992-07-16. p.551. . Retrieved 2011-03-05. (Presentation given at the 24th Internet Engineering Task Force.) [50] David Clark's Biography (http:/ / www. csail. mit. edu/ user/ 1526), MIT Computer Science and Artificial Intelligence Laboratory [51] "David L. Mills Biography and Credentials" (http:/ / www. eecis. udel. edu/ ~mills/ bio. html), University of Delaware [52] The Data Concentrator (http:/ / deepblue. lib. umich. edu/ handle/ 2027. 42/ 6635), David Mills, May 1968, CONCOMP Project, University of Michigan, Ann Arbor [53] System/360 interface engineering report (http:/ / deepblue. lib. umich. edu/ handle/ 2027. 42/ 6642), D. L. Mills, November 1967, CONCOMP Project, University of Michigan, Ann Arbor [54] John S. Quarterman (1990). Matrix: Computer Networks and Conferencing Systems Worldwide (http:/ / portal. acm. org/ citation. cfm?id=77526) (2 ed.). Digital Press. pp.185186. ISBN1-55558-033-5. . [55] RFC 778: DCNET Internet Clock Service (http:/ / tools. ietf. org/ pdf/ rfc778), D.L. Mills, COMSAT Laboratories, April 18, 1981 [56] RFC 958: Network Time Protocol (NTP) (http:/ / tools. ietf. org/ pdf/ rfc958), D.L. Mills, M/A-COM Linkabit, September 1985 [57] "Fuzzball: The Innovative Router" (http:/ / nsf. gov/ about/ history/ nsf0050/ internet/ fuzzball. htm), web page on NSF's "The Internet: Changing the Way We Communicate" (http:/ / nsf. gov/ about/ history/ nsf0050/ internet/ internet. htm) [58] RFC 904: Exterior Gateway Protocol Formal Specification (http:/ / tools. ietf. org/ pdf/ rfc904), D.L. Mills, April 1984 [59] "The Story of the PING Program" (http:/ / ftp. arl. army. mil/ ~mike/ ping. html), Mike Muuss [60] Bob Brown (May 5, 2006). "Mother of the Internet Radia Perlman speaks out" (http:/ / www. networkworld. com/ community/ node/ 5738). Network World. . Retrieved 22 January 2010. [61] "Inventor of the Week: Radia Perlman" (http:/ / web. mit. edu/ invent/ iow/ perlman. html), August 2007, Inventor Archive, Lemelson-MIT Program [62] 2010 SIGCOM Lifetime Achievement Award given to Radia Perlman (http:/ / www. sigcomm. org/ awards/ sigcomm-awards), "for her fundamental contributions to the Internet routing and bridging protocols that we all use and take for granted every day", ACM SIGCOMM award recipents web page [63] "Internet > History > NSFNET -- National Science Foundation Network" (http:/ / www. livinginternet. com/ i/ ii_nsfnet. htm), livinginternet.com: The World's First Web Published Book, 2000, accessed 16 July 2012 [64] "Ireland's real net pioneer" (http:/ / www. independent. ie/ business/ technology/ irelandrsquos-real-net-pioneer-1115628. html), Independent.ie, 4 October 2007 [65] "Stephen WolffHustling for Innovation" (http:/ / newsroom. cisco. com/ dlls/ ts_073002. html), Charles Waltner, News@Cisco, July 30, 2002 [66] On the Way to the Web: The Secret History of the Internet and Its Founders (http:/ / www. apress. com/ book/ view/ 9781430208693), Michael A. Banks, Apress, New York, 2008, ISBN 978-1-4302-0869-3 [67] "The Gigabit Testbed InitiativeFinal Report" (http:/ / www. cnri. reston. va. us/ gigafr/ ), Corporation for National Research Initiatives (CNRI), December 1996 [68] "A Brief History of the Internet" (http:/ / www. isoc. org/ internet/ history/ brief. shtml), Barry M. Leiner, et al., Internet Society, December 2003

413

Internet pioneers
[69] "Internet2s new chief technology officer helped create Internet No. 1" (http:/ / www. crainsdetroit. com/ article/ 20110401/ FREE/ 110409996#), Tom Henderson, Crain's Detroit Business, April 1, 2011 [70] "Congestion avoidance and control" (http:/ / ee. lbl. gov/ papers/ congavoid. pdf), Van Jacobson, Proceedings of SIGCOMM 88, Stanford, CA, Aug. 1988, ACM [71] "Congestion avoidance and control" (http:/ / portal. acm. org/ citation. cfm?doid=205447. 205462), Van Jacobson, ACM SIGCOMM Computer Communication Review - Special twenty-fifth anniversary issue, Highlights from 25 years of the Computer Communication Review, Volume 25 Issue 1, Jan. 1995, pp.157-187 [72] "vic - Video Conferencing Tool" (http:/ / ee. lbl. gov/ vic/ ), web page at Lawrence Berkeley National Laboratory [73] "vat - LBL Audio Conferencing Tool" (http:/ / ee. lbl. gov/ vat/ ), web page at Lawrence Berkeley National Laboratory [74] "wb - LBNL Whiteboard Tool" (http:/ / ee. lbl. gov/ wb/ ), web page at Lawrence Berkeley National Laboratory [75] 2001 SIGCOMM Award for Lifetime Achievement (http:/ / www. sigcomm. org/ awards/ sigcomm-awards) to Van Jacobson "for contributions to protocol architecture and congestion control." [76] "Mr. Van Jacobson" (http:/ / www. nae. edu/ MembersSection/ Directory20412/ 30818. aspx), Members Directory, National Academy of Engineering [77] "Internet Pioneers: Ted Nelson" (http:/ / www. ibiblio. org/ pioneers/ nelson. html), web page at ibiblio.org (http:/ / ibiblio. org), a collaboration of the School of Information and Library Science and the School of Journalism and Mass Communication at the University of North Carolina at Chapel Hill. [78] Computer Lib (You can and must understand computers NOW) / Dream Machines (Come Dream along with me: The Best Is Yet To Be) (http:/ / www. arch. kth. se/ unrealstockholm/ unreal_web/ seminar03_2006/ computerlib. pdf), Theodor H. Nelson, self-published, 1974, ISBN 978-0-89347-002-9 [79] "Chapter 21: From Computer Lib / Dream Machines, Theodor H. Nelson, 1970-1974" (http:/ / www. newmediareader. com/ book_samples/ nmr-21-nelson. pdf), The New Media Reader, Noah Wardrip-Fruin and Nick Montfort (Eds), MIT Press, February 2003, 837 pp., ISBN 978-0-262-23227-2 [80] "Berners-Lee Longer Biography" (http:/ / www. w3. org/ People/ Berners-Lee/ Longer. html). World Wide Web Consortium. . Retrieved 18 January 2011. [81] "Berners-Lee's original proposal to CERN" (http:/ / www. w3. org/ History/ 1989/ proposal. html). World Wide Web Consortium. March 1989. . Retrieved 25 May 2008. [82] Stewart, Bill. "Tim Berners-Lee, Robert Cailliau, and the World Wide Web" (http:/ / www. livinginternet. com/ w/ wi_lee. htm). . Retrieved 22 July 2010. [83] "Tim Berners-Lee receives Draper Prize" (http:/ / web. mit. edu/ newsoffice/ 2007/ draper-prize. html). MIT News, Massachusetts Institute of Technology. . Retrieved May 25, 2008. [84] "The World-Wide Web Hall of Fame" (http:/ / botw. org/ 1994/ awards/ fame. html). Best of the Web Directory. . [85] "Web's inventor gets a knighthood" (http:/ / news. bbc. co. uk/ 1/ hi/ technology/ 3357073. stm). BBC. 31 December 2003. . Retrieved 25 May 2008. [86] "Timothy Berners-Lee Elected to National Academy of Sciences" (http:/ / www. ddj. com/ 217200450). Dr. Dobb's Journal. . Retrieved 9 June 2009. [87] "72 New Members Chosen By Academy" (http:/ / www8. nationalacademies. org/ onpinews/ newsitem. aspx?RecordID=04282009) (Press release). United States National Academy of Sciences. 28 April 2009. . Retrieved 17 January 2011. [88] Berners-Lee, Tim (3 November 1992). "Macintosh Browser" (http:/ / www. w3. org/ History/ 19921103-hypertext/ hypertext/ WWW/ Macintosh/ Status. html). World Wide Web Consortium. . Retrieved 2 June 2010. [89] Dan Frommer. "Marc Andreessen Joins Facebook Board" (http:/ / www. alleyinsider. com/ 2008/ 6/ marc-andreessen-joins-facebook-board). Alleyinsider.com. . Retrieved 2008-10-05. [90] "About NCSA Mosaic" (http:/ / www. ncsa. illinois. edu/ Projects/ mosaic. html), NCSA web site, University of Illinois [91] David Orenstein (July 13, 2005). "Cyber-pioneer Vint Cerf to headline July 28 forum on the future of Internet" (http:/ / news. stanford. edu/ news/ 2005/ july13/ forum-071305. html). Press release (Stanford Report). . Retrieved April 7, 2011. [92] "Stanford University 'Birth of the Internet' Plaque" (http:/ / mercury. lcs. mit. edu/ ~jnc/ plaque. html), web page, J. Noel Chiappa, Laboratory for Computer Science, MIT

414

Internet pioneers

415

External links
Internet Hall of Fame (http://www.internethalloffame.org/), established by the Internet Society in April 2012. RFC 1336 (http://www.rfc-editor.org/rfc/pdfrfc/rfc1336.txt.pdf): Who's Who in the Internet: Biographies of Internet Activities Board (IAB), Internet Engineering Steering Group (IESG), and the Internet Research Steering Group (IRSG) of the Internet Research Task Force (IRTF) Members, G. Malkin, IETF, May 1992. "Past IESG Members and IETF Chairs" (http://www.ietf.org/iesg/past-members.html), IETF web site "A Brief History of the Internet Advisory / Activities / Architecture Board" (http://www.iab.org/about/history. html) from the IAB web site includes historical lists of IAB Members, IAB Chairs, IAB Ex-Officio and Liaison Members (IETF Chairs), IRTF Chairs, RFC Editors, and much more historical information. "Internet Pioneers" (http://www.ibiblio.org/pioneers/), web pages at ibiblio.org (http://ibiblio.org), a collaboration of the School of Information and Library Science and the School of Journalism and Mass Communication at the University of North Carolina at Chapel Hill. "Pioneers Gallery" (http://www.wiwiw.org/pioneers/), from the Who Is Who in the Internet World (WiWiW) web site. "Internet Milestones: Timeline of Notable Internet Pioneers and Contributions" (http://www.juliantrubin.com/ schooldirectory/internet_milestones_pioneers.html). Retrieved 6 January 2012. "The Greatest Internet Pioneers You Never Heard Of: The Story of Erwise and Four Finns Who Showed the Way to the Web Browser" (http://www.xconomy.com/national/2009/03/03/ the-greatest-internet-pioneers-you-never-heard-of-the-story-of-erwise-and-four-finns-who-showed-the-way-to-the-web-browser/ ), Juha-Pekka Tikka, March 3, 2009, Xconomy web page.

Oral histories
"Oral history interview with Robert E. Kahn" (http://purl.umn.edu/107387). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 15 May 2008. Focuses on Kahn's role in the development of computer networking from 1967 through the early 1980s. Beginning with his work at Bolt Beranek and Newman (BBN), Kahn discusses his involvement as the ARPANET proposal was being written and then implemented, and his role in the public demonstration of the ARPANET. The interview continues into Kahn's involvement with networking when he moves to IPTO in 1972, where he was responsible for the administrative and technical evolution of the ARPANET, including programs in packet radio, the development of a new network protocol (TCP/IP), and the switch to TCP/IP to connect multiple networks. "Oral history interview with Vinton Cerf" (http://purl.umn.edu/107214). University of Minnesota, Minneapolis: Charles Babbage Institute. 24 April 1990. Retrieved 1 July 2008. Cerf describes his involvement with the ARPA network, and his relationships with Bolt Beranek and Newman, Robert Kahn, Lawrence Roberts, and the Network Working Group. "Oral history interview with Paul Baran" (http://purl.umn.edu/107101). University of Minnesota, Minneapolis: Charles Babbage Institute. 5 March 1990. Retrieved 1 July 2008. Baran describes his work at RAND, and discusses his interaction with the group at ARPA who were responsible for the later development of the ARPANET. "Oral history interview with Leonard Kleinrock" (http://purl.umn.edu/107411). University of Minnesota, Minneapolis: Charles Babbage Institute. 3 April 1990. Retrieved 1 July 2008. Kleinrock discusses his work on the ARPANET. "Oral history interview with Larry Roberts" (http://purl.umn.edu/107608). University of Minnesota, Minneapolis: Charles Babbage Institute. 4 April 1989. Retrieved 1 July 2008.

Article Sources and Contributors

416

Article Sources and Contributors


Internet Source: http://en.wikipedia.org/w/index.php?oldid=527663975 Contributors: -Majestic-, 000o, 0waldo, 12.235.7.xxx, 16@r, 199.196.144.xxx, 1exec1, 2dogs, 3idiot, 424242, 75th Trombone, 802geek, 90, A. B., ABCD, AJR, Aaron Schulz, AaronKaplan, Abbos, Abrooke, AbstractClass, Accurizer, Acdx, Acprisip, Acroterion, Adashiel, Adavidb, Administration, Adw2000, Aervanath, Agather, Agathoclea, Ageekgal, Ageing Geek, AgentPeppermint, Ahmad halawani, Ahoerstemeier, Ahruman, Aitias, Akamad, AlMac, Aladdin Sane, Alan Liefting, AlanBarrett, Alansohn, Aldie, AlefZet, Alem800, AlexPlante, Alexf, AlexiusHoratius, Alexwcovington, Alias Flood, AlistairMcMillan, All Is One, Allr0und, Allyoursanity, Alphachimp, Altzinn, Alvestrand, Alyeska, Am088, Ambrose Brightside, AmiDaniel, Amillar, Amire80, Amitesh3011, Anagramology, Andonic, Andre Engels, Andre3k1, Andres, Andrevan, Andrew Gray, AndrewHowse, Andreworkney, Andrewpmk, Andris, AndyBQ, Andyiou52345, Andypandy.UK, Anetode, AngelOfSadness, Angela, Angr, Animum, Ankiththegreat, Ann Stouter, Anna Lincoln, Annexia, Anonymasity, Anonymous Dissident, Anonymous anonymous, Anonymous editor, AnotherDeadPerson, Antandrus, Anthony, Anthony Appleyard, Antimatter15, Antonrojo, Antony, joseph, Aphilo, Aranel, ArdClose, Arda Xi, Areeb cool, Arekku`xx, Arfan, ArielGold, Aronoel, Arsenal0328, Art LaPella, Aruton, Arx Fortis, Asdfghty, Ashenai, Asmo86, AstroHurricane001, Astroview120mm, Atgthatsme, Atomic23112, Atropos, Aujlakam, Aurelie Branchereau-Giles, Aurora Glory Paradise, Auroranorth, Autocracy, Avalean, Aviaris, Avochelm, Avraham, Avuton, Awolf002, AxelBoldt, Az1568, Azkar, AznShortBoi8021, B9 hummingbird hovering, BK08, BWD, BWP1234, Babyface123, Bad Bud, Bambuway, Bandan, Bandj, Barberio, Barefootguru, Barneca, Bart133, Bayerischermann, Baylink, Bband11th, Bbao, Bbatsell, Bcanoerrecart, Beao, Beland, Ben D., Bender235, Benesch, Bennettchipper, Bentonmas214, Bereziny, Berk, Berro9, Bethenco, Bevo, Bfax, Bhuvanneshsat, Biederman, Big Brother 1984, Bigbrotha3, Bigtimepeace, Bigwig77, Billlion, Bimach, Biruitorul, Bisqwit, Bitbit, Bjb, Blahma, Blake-, Blcarson, Blethering Scot, Blightsoot, Bloodshedder, Blossom the Awesome, Blowdart, BlueAg09, Bluejm2, Bluemask, Bluemoose, Bob A, Bob f it, Bobblewik, Bobet, Bobo192, Bodnotbod, Bogdangiusca, Bomazi, Bonadea, Bongwarrior, Bookh, Bookuser, Bordello, Borislav, BossOfTheGame, Brandmeister (old), Brandon5485, Brandork, Bratsche, Breakmoved, Brendan Moody, Breno, Brezzo, Briaboru, Brian0918, BrianRecchia, Brianga, BrokenSegue, Bry9000, Bryan Derksen, Burner0718, Bushytails, Bwaav, C'est moi, CF90, CIreland, CJLL Wright, CLW, CMW275, CWY2190, Cahk, Calliopejen1, Callipides, Caltas, Cam809, CambridgeBayWeather, CameronHarris, Cameronmas214, Camw, Can't sleep, clown will eat me, Canadian-Bacon, Canaima, Capouch, Captain Disdain, Captainpancreas, Carbonite, CaribDigita, Carlsotr, Carmen.banea, Casper2k3, Cbaxter1, Cdc, Cdxnolan, Ceas webmaster, Cenarium, Centered1, Central2, Centrx, CesarB, Ceyockey, Cferrero, Cgeorge316, Chabby, Chalybs, Chanting Fox, Charles7, Charlesblack, Charlesincharge, Chcknwnm, Chensiyuan, Cherkash, Cheung1303, ChewT, Chime Shinsen, Chmod007, Choalbaton, Chocolateboy, Chodorkovskiy, Chotisornmas214, Chris 73, Chris the speller, Chris21192, ChrisGualtieri, Christian List, Christopherlin, Chroniclev, Chun-hian, Chunky Rice, Cimon Avaro, Cirt, Citicat, Classicfilms, ClockworkSoul, Clothed so hardsm, CloudNine, Clpo13, CobraWiki, Cocklip, Codemastercode, Codus, Coelacan, Collin, CommodoreAngryy, CommonsDelinker, Complex, Computageek95, Computerjoe, Computerquip, Conversion script, Coolcaesar, Coolhawks88, Coolness107, CopperMurdoch, Corrupt one, Cortalux, Cotoco, Couchpotato99, Cpom, Crazycomputers, Cremepuff222, Curps, Cyan, Cybaxter, Cybercobra, Cyberevil, Cyberitis, Cyclopia, Cynical, Cyp01, D. Recorder, DJ Clayworth, DVD R W, DaManWitDaPlan, Daemon8666, Dagvadorj, Damian Yerrick, Damiens.rf, Dan larsen, Dana60Cummins, Daniel, Daniel5127, Danny, Danscool, Danski14, Darius Bacon, Darrendeng, DarthVader, Daveb, Daveg, David.Monniaux, DavidJGW, Davidiad, Davodd, Dbeilhartz, Dchall1, DeadEyeArrow, Deedub1983, Deflagro, Dekisugi, Delirium, Delldot, Den fjttrade ankan, DerHexer, Derekbd, Dess, Dethme0w, Devonreilly, Dforest, Dgw, Dickguertin, Dicklyon, Diderot, Didimos, DigitalSorcerer, Digresser, Dijxtra, Diletante, Dillard421, Dinardi, Dinestysfaith, Dinosaur puppy, DirkvdM, Discharger12, Discospinster, Diverock, Djegan, Djjkxbox, Djr xi, Dlohcierekim, Dnas, Doc glasgow, Dodecki, Domstabsdogs, Dooky, Dorftrottel, Dorgan65, Dotancohen, DoubleBlue, Dpiccuirro, Dr Debug, Dr Zen, Dr. Blofeld, Dr.K., Drangob123, Drappel, Drat, Dreadstar, Dream Focus, DreamGuy, Drew thomas amirault, Drew46, Driftwoodzebulin, DriveMySol, Drivera90, Drn8, DropDeadGorgias, Drosera, Drphilharmonic, Drunkenmonkey, Dryice2ooo, Drzoidberg, Dtcdthingy, Dubious Irony, Duoduoduo, Dusso Janladde, Dust Filter, Dvc214, Dwheeler, Dylan Lake, DylanW, E. Sn0 =31337=, EKN, ESkog, EVula, Eaaiscool, Eagardea, EagleOne, EamonnPKeane, Ebaur5, Echuck215, Ederjar, Edgar181, Editmachine, Edonovan, Edwina Storie, Edwy, Eirik (usurped), Ekjon Lok, ElBenevolente, Elcobbola, Eleassar777, Elmidmibbs, Elonka, Eloquence, Eltonhoyantam, Emijrp, Enchantian, Enerccio, Entirety, Entrpy, EoGuy, Epa101, Epidown, Eran of Arcadia, Eric outdoors, Erik9, Erikringmar, Eriktoto, EronMain, EryZ, Erzengel, EthanNeuen, Eu.stefan, Eurosong, Euryalus, EventHorizon, Evercat, Everyking, Evil Monkey, Evil saltine, EvilZak, Evilphoenix, Excelsior f, Excirial, Exeunt, Expert at this, Expertu, Eybaybay, Eyu100, FF2010, Fab, Fabricationary, Fadookie, FaerieInGrey, Fan-1967, FancyPants, Fantasy, Faseidman, Favonian, FelixtheMagnificent, Fennec, Filelakeshoe, Firetrap9254, Fishal, Flash man999, Flowerpotman, Flubberdubbe, Fluppy, FlushinQwnzNyc, Flyingember, Foboy, Folajimi, Foodmarket, Fortethefourthversion, Fottry55i6, Fountain09, FrancoGG, Frank G Anderson, Frap, Frappyjohn, Frazzydee, Freakofnurture, Fredbauder, Fredrik, Freewayeric, FreplySpang, Freshacconci, Freshbakedpie, Freyr, Frietjes, Frigglinn, Fujifisher, Fulldecent, FundieBuster, Funky Monkey, Fuzheado, Fvw, G0dsweed, GDonato, GHe, GMR5, GUllman, Gadfium, Gahuntly, Galwhaa, Gamahucheur, Gamefreek76, Gamer007, Gannzor, Gantster, Gardar Rurak, Garfield 80, Garfield226, Gary King, Gblxyz, Geape, Geekmax, GeorgeTheCar, Gianfranco, Giftlite, Gimmeurm0ney, Gingaspice, Gioto, Glenn, Gluttenus, Gnoluyr, Gobonobo, Goeagles4321, Goel madhur, Gogo Dodo, Golbez, Golfballock, Goobergunch, Good Olfactory, GoodStuff, Goodnewsfortheinsane, Goodnightmush, Goplat, Gppande, Gracenotes, GraemeL, Grafen, Graham87, Grandpafootsoldier, Grassmaker, Graue, GreatLiver, Greatflyingsock, Green caterpillar, GregAsche, GregNorc, Grenavitar, Grey666, Grich, Grison, Gronky, Grunt, Gsarwa, Gscshoyru, Gsklee, Gsociology, Gtrmp, Guade00, Guaka, Guanaco, Guffydrawers, Gurch, Gurchzilla, Guthrie, Guy M, Guy Peters, Gwernol, Gwylim a, H3llbringer, HJV, HackerOnSteroids69, Hadal, Hadrians, Haemo, Haham hanuka, Hairy Dude, Hallenrm, Handface, Hans Dunkelberg, HappyCamper, HappyInGeneral, Hardcoregayslaveman, HardwareBob, HarryMcDeath, Harrystown, Harryzilber, Haukurth, Hawaiian717, Hazhk, Hazr0x, Hdt83, Headbomb, Hegiiman, Heimstern, HeinzzzderMannn, Hekxcieksdl, Helios Entity 2, Helix84, Henry Flower, Hephaestos, Herdrick, Heron, Hetar, Hhhhgoteam, Hhhhhh, HiB2Bornot2B, Hiddenfromview, Hiii98, Hirschtick3, HisSpaceResearch, Hm2k, Hobbit fingers, Hrvatska, HulleGranz, Hunter-Ing, Hydrajr, Hydrox, Hyperthermia, I Am Not Willy On Wheels, I amm Beowulf!, ICTlogist, INVERTED, INaNimAtE, IRelayer, IamYossarian, Iceflamephoenix, Icewindfiresnow, Iconoclast, Igoldste, Ihope127, Ilmari Karonen, Imacg3, Imthesmartdude, In4matt, InMooseWeTrust, InShaneee, Incnis Mrsi, Incompetence, Indon, Inkypaws, Insiriusdenial, Interflop, Intgr, Intiendes, Into The Fray, InverseHypercube, Invincible Ninja, Iridescent, Irish Souffle, Irrelivant, Irtrav, Irvingbird, Isomega, Isotope23, Istiamar, Italianboy931, Ixfd64, Izwalito, J.delanoy, J.puckett, JEN9841, JHunterJ, JIMBO WALES, JLaTondre, JMD, JMJimmy, JRod451, Jacek Kendysz, Jack slack, Jacobko, Jacoplane, Jacotto, Jade wezel, Jaffo Gonzales, Jag123, Jahiegel, Jake Nelson, Jamesontai, Jamott, Jangirke, Jaqen, Jaranda, Jarble, JaredInsanity, Jasn, Jaxl, Jay-d123, JayEsJay, Jayan13, Jazzilla, Jdforrester, Jebethe, Jecowa, Jeffthejiff, Jeltz, Jemappelleungarcon, Jeph paul, JeremyMcCracken, Jersey Devil, Jerzy, Jesant13, JesseGarrett, JesseW, Jevansen, Jfire, Jflash, Jgeer, Jigesh, Jim1138, Jimbo D. Wales, Jivadent, Jiy, Jj137, Jkasd, Jkh.gr, Jklin, Jleedev, Jmchuff, Jmundo, Jnavas, Jnc, Jo-Jo Eumerus, JoanneB, JodyB, Joeblakesley, Joeikin, Joel delahunty, Joelscorp, John, John Fader, John0101ddd, Johnleemk, Johnny-5, JohnnyMrNinja, Johnnysfish, Jojit fb, Joke321, Jolt76, JonHarder, Jonathan P. Chen, Jonathunder, Jonhope123, Jonnabuz, Jonnny, Jons63, Jooler, Jops, Jorvik, Jose77, Joseph Solis in Australia, JoshG, Joshua Gyamfi, JoshuaZ, Jossi, Joy, Joycloete, Joyous!, Jp5508, Jpbowen, Jpgordon, Jreferee, Jschwa1, Jsheehy, Jskleckner, Jsnruf, Jsoffer, Jtkiefer, JuJube, Juansidious, Julie Deanna, Jumborulz, Junie dilitori, Junipercwc, Juro, Jusjih, JustJoe, JustPhil, Justin Eiler, Justin.purvis, Justin050190, Justin5117, Justinwiki324, Jwhimmelspach, Jwinius, Jworld2, Jwrosenzweig, K00LKid, KMcD, KYPark, Kabads, Kablammo, Kaihsu, Kaobear, Karen Johnson, Karimarie, Kariteh, Karl Meier, Karstimmer, Katalaveno, KatherineTurnbull, KathrynLybarger, Kbdank71, Kbh3rd, Kbrose, Keilana, KeithTyler, Kelly Martin, Kemkem, KenFehling, Kencf0618, Kenmcfa, Kenny sh, Kenyon, Kernow, Keryst, Kesaloma, Kevin B12, Kevin66, Kevkoch5, Khajidha, Khanlarian, Khefri, Kiba, KidAirbag, Kidutsu, Kieff, KieranL, KillaDilla, KillerCRS, Kilo-Lima, Kim Bruning, Kinema, King Lopez, King of Hearts, Kingbob2, Kinghy, Kinneyboy90, Kirils, Kitfoxxe, Klemen Kocjancic, Klenje, Klingoncowboy4, Kmg90, KnightLago, KnowBuddy, Knowledge Seeker, KnowledgeOfSelf, Knows lots, Knutux, Koavf, Kostas.karachalios, Koyaanis Qatsi, Kozuch, KrakatoaKatie, Kramden4700, Krapface, Krawi, Krich, KrisW6, Kubigula, Kuka369, Kukini, Kungfuadam, Kupojsin, Kuru, Kvn8907, Kvng, Kwamikagami, Kwekubo, Kwirky88, Kznf, LOL, LOLPEAR, LPedroMachado, Laboobala, Lahiru k, Lakefall, Larryisgood, Larrymcp, Layzner, Lcarscad, Lee Daniel Crocker, Lee J Haywood, LeilaniLad, Leithp, Lemmio, Lemonflash, Lennartgoosens, Lenoxus, Leonidasthespartan, Levineps, Liddlerebel, Lightdarkness, Lightmouse, Lights, Ligulem, Lilac Soul, LindsayH, Link 991, Linkspamremover, Linnell, Linux Rocks, Little Mountain 5, Little guru, LittleWink, Littleduty2, Livajo, Locatelli, Logan.aggregate, Logan590, Lol at Lilo, Lolnob, Longcatislooooooooooooong, Loodog, Loonymonkey, Lord Aro, Lorenzocantoni, Lotje, Lousyd, Lowellian, Lradrama, LuK3, Luckycatfu, Luis Dantas, Lumaga, Luna Santin, Lupo, Luxurius, M.nelson, M8al, MCBastos, MER-C, MIT Trekkie, MKoltnow, MMuzammils, MODS=FAIL, MONGO, Mabdul, MacMed, Macs, Maddenplayer, Madmax vii, Mafioosnik, Magister Mathematicae, Mahmudmasri, Majorly, Makemebad, Makemi, Maksdo, Maksim L., Malcolm, Mallocks, Malnourish, Malo, Malunis T, Man vyi, Manchurian candidate, MangaFreak0, Mangy Cheshire Cat, Manop, MansonP, Manywindows, Mapper76, Marc Mongenet, MarcRS, Marcin Suwalczan, Marcschulz, Marcus Qwertyus, Marcusvtos, Marianocecowski, Mark Elliott, Marklar689, Marnanel, Marshallharsh, Marskell, Martinkunev, Martysanders, Marxercise, Marymary, Matt Britt, Matteh, Matthewccna, Mattworld, Maurice Carbonaro, Maurreen, Mav, Max Naylor, Max Schwarz, MaxD, Maxamegalon2000, Maxim, Maximillion Pegasus, Maximus Rex, Maxtremus, Mcmillin24, Mdd, Mditto, MeBee, MechaWave, Meclee, Meekywiki, Meelar, Meneth, Mentifisto, Merbabu, Mercurywoodrose, Merope, Merritttttt, Mgoerner, Michael Hardy, Michael Podgorski, MichaelBillington, Michaelhaslip, Michaelmas1957, Midway, Miffy900, Mikael Hggstrm, Mikaida, Mike Cherim, Mike Christie, Mike Rosoft, Mike hayes, Mike.lifeguard, MikeWren, Mikeblas, Mikefzhu, Mikker, Mileshalverson, Millifoo, Millisits, MindlessXD, Mindmatrix, Minesweeper, Minghong, Mini-Geek, Mintguy, Miranda, Mirror Vax, MisfitToys, Missionary, Missy Prissy, Misza13, Mitchumch, Mithent, Mjb, Mlewis000, Mmeri, Mmx1, Moarmudkipzlulz, Modelun88, Modster, Modulatum, Moe Epsilon, Moe kuwait, Mogism, Moink, Monkeyman, Monkeyman393, Monsier Pie, Montrealais, MoogleEXE, Moonriddengirl, Moreschi, Morganp7, Morphh, Mr Adequate, Mr pand, Mr. Billion, Mr. Lefty, Mr.Z-man, Mr.happy, MrSnow, Mrcharliexcore, Mrguythefourth, Mristroph, Mschel, Muad, Muchness, Mulad, Mulder416, Muraad kahn, Murali nmv, Mushroom, Musicmaniac15, Mvelicko, Mwilso24, Mxn, MysteryDog, N-true, NCDS, NHRHS2010, NPhoenix, Nakon, Nanshu, Natalie Erin, Natalina smpf, Nathan nfm, Nathan8225, Nathanrdotcom, Navigatr85, NawlinWiki, NeilN, Neilc, Neonstarlight, Nessdude14, Netizen, Network master, Neutrality, NewEnglandYankee, Newmanbe, NexCarnifex, Nick125, NickD310, NigelR, Nigelj, Nikk32, Nikkimaria, Nintendude, Nitishg, NitroOx, Niubrad, Nivix, Nixeagle, Nohat, Noisy, Noorkhanuk85, NorCal764, NorthernThunder, Northgrove, Not Zilla3, NrDg, Numbo3, Nurg, Nuttycoconut, Nuutti, Nycceo, OFX, Obarskyr, Obradovic Goran, Octopus-Hands, Oda Mari, Oden, Odisha1, Ohconfucius, Ohnoitsjamie, Olavandreas, Old Guard, Oldrockx666, Olgerd, Oli Filth, Oliver Lineham, Oliverdl, Oliverisyourdaddy, Omghgomg, Omicronpersei8, Ominousguardian, Omniplex, Oni Ookami Alfador, Oogadabaga, Opelio, Operator tore, Ora Stendar, OracleGD, Orangemike, Orangutan, Orbitalwow, Orbst, OregonD00d, Oreo Priest, Orphic, Ostaph7, OwenX, Oxymoron83, P. S. F. Freitas, P0lyglut, PARA19, PCHS-NJROTC, Pagw, Pakaran, Paladin656, Paladinwannabe2, Palica, Pamela Gardiner, Pappy333, Paranoid, Parhamr, Parkinn, Paspie, Patrick, Patrick-br, PatrickFisher, Pchov, Pearle, Pedro, Pegasus1138, Percy Snoodle, PerpetualSX, Persian Poet Gal, Perspectoff, Peruvianllama, Petchboo, Peteark, Peter, Peter Campbell, Peter S., PeterSymonds, Pgk, Pguerra, Ph.D.Nikki, Ph1r35p4wn, PhJ, Phaedriel, Phatom87, PhilHibbs, Philip Trueman, PhilipO, Phillejay, Phydend, Pianokid54, Picaroon, Piercetheorganist, Pigsonthewing, Pile0nades, Pilotguy, Pinaki ghosh, Pineapple fez, Piotrus, Piuneer, PizzaMan (usurped), Pjvpjv, Pkoppenb, Plek, Plrk, Plumbago, Pmsyyz, Poeloq, Pointer1, Pol098, Politik426, Pomte, Poor Yorick, PopeMas214, Popedawg, Populus, Porqin, Poser-xox, Poweroid, Ppk01, Pratyeka, President Rhapsody, PrestonH, Prestonmcconkie, PrimroseGuy, Prodego, Promodulus, Proofreader, Pskelkar74, Psy guy, Psychcf, Public Menace, Publicly Visible, Puchiko, PureLogic, Puremind, Purgatory Fubar, Pxma, Quadell, Quendus, Quintessent, Quintote, Qworty, Qxz, R Pollack, RJII, RWolf, RadiantRay, RadiantSeabass, RadicalBender, Rafaelluik, Ragib, Rajah, RajeshPandey, Rajrajmarley, Ral315, RanchoRosco, RandomAct, Rapidosity, Rasmasyean, Rasmus Faber, Ratiocinate, RattleMan, Rattlesnake, Raudys, Raul654, Ravensfan5252, Rawrnessalphy, Raydomingo, Raza514, Raznice, Rbarreira, Rcannon100, Rchandra, Rdmoore6, Rdsmith4, Readro,

Article Sources and Contributors


Reaper X, Reaverdrop, Rebent, Rebroad, RedWolf, Redvers, Redwolf24, Reedy, Regibox, Reisio, Reliablesources, Relly Komaruzaman, Remember the dot, Renaissance Man, Resslerdylan, Rettetast, RexNL, ReyBrujo, Reymysterio01, Rfl, Rflorenc, Rhobite, Riana, Rich Farmbrough, Richard Weil, Richard Ye, RichardF, Richemond, Rick Block, RickK, Rinothan2, RjCan, Rjwilmsi, Rklawton, Robchurch, Robomaeyhem, RockMFR, Rockhall, Rockinduck, Ronz, Ronz91, Roozbeh, Rory096, Roscheray, RossPatterson, Roy Brumback, RoyBoy, Roybadami, Rp, Rpgprog, Rrburke, Rreagan007, Rsabbatini, Rscash22, RucasHost, Rud Hud Hudibras, Rumping, RunOrDie, RunningBon, Rursus, Ruud Koot, RxS, Ryan, Ryan Postlethwaite, Ryt, Ryulong, S M Woodall, SEOXpert, SJP, SNIyer12, SSZ, ST47, STA654, Saga City, Saghar2, Sam Li, Samir, Samj72, Samsara, Samuel Curtis, Samurai107, Saposcat, Sarenne, SasiSasi, Satori Son, Savantpol, Savidan, Sawdon2, Saxmaniac777, Scepia, Sceptre, Schneelocke, Schoolproject2, SchulteMAS214, Schzmo, Sciurin, Scott981992, Scottbell, Scrolls, Scurra, Sdornan, Seav, Sega381, Seinfreak37, Senator2029, Septuaginta, Serpent-A, Seth Ilys, Seth662, Severa, Sfmammamia, Shadanan, Shade11sayshello, Shadowlynk, Shady Hippo, Shane3x, ShaneCavanaugh, Shanes, Shangrilaista, Shantavira, Shantu123, Sharkticon Guy, Sharprs, ShaunES, Shawry 00, Shebaboy102, Shengii, Shenme, Shervink, Shii, Shoeofdeath, Shreyash02, Sibbic, Sidepocket, SignorSimon, Siliconov, Simetrical, SimonP, SimonShlosberg, Sinn, Sinnerwiki, Sir Nicholas de Mimsy-Porpington, Sirkh1, Siroxo, Sjakkalle, Sjjupadhyay, Skb8721, SkyWalker, Skyhuperut, Sl, Sl021, Slakr, Slark, Slayerteez, Sleepyasthesouth, Sloud74, Slowking Man, Sm8900, Smalljim, Sman24, Smartse, Smeira, Smilesfozwood, Smokizzy, Smoothy, Snoom haplub, SnowFire, Snoyes, Softlavender, Solipsist, Solitude, Solphusion, SomeStranger, Someguy1221, Someone35, Sonicsuns, Sonjaaa, Soph, Soptep, Soumyasch, Sparky the Seventh Chaos, Sparsh717, SparsityProblem, Spartan-James, Spazm, Spearhead, Speculatrix, Spedwehavedisabilaty, Speedysam, Spellcast, Spellmaster, Spencer, Spick And Span, SpigotMap, Splarka, Spliffy, SpookyMulder, SpuriousQ, SpyMagician, Spyke411, SqueakBox, Squiquifox, Sri555666, Srice13, Srnelson, Sstrader, St ttb, Stagefrog2, Staile, Stardust8212, Starnestommy, Stateguy, Steel, Steinberger, Stephan Leeds, Stephen, Stephen B Streater, Stephen Shaw, Stephenb, Stephenchou0722, Stereotek, Steverapaport, Stevey7788, Stevietheman, Sthow, Stickguy, Stirling Newberry, Stormy Waters, Stratocracy, Striver, Strongriley, Stuartyeates, Student17, Stwalkerster, Subatomicguy, Suicidalhamster, Sukmas214, SummerPhD, SummerWithMorons, Sundar, Sunshine22 858, Sup chily monster, SuperJake, Supertouch, Supten, SusanBrackman, Susurrus, Suttipongkanasaimas214, Swollib, Sycthos, SymlynX, Syvanen, T.J.V., THEODORMAS214, THEemu, TI85, Taimaster, TakuyaMurata, Tale, Tallungs, TangoFett, Tangotango, Tannin, Tapir Terrific, Tarret, Taskmaster99, Tbhotch, Teamcoltra, Tech2blog, Technician2, Technobadger, Tedickey, Tehmechapope, Tehori, TekeeTakShak, Tenpin477, Terence, Terrx, Texture, Tfcollective, Thatdog, The Anome, The Flying Purple Hippo, The JPS, The Thing That Should Not Be, The Transhumanist, The Transhumanist (AWB), The teller of all 666, The undertow, The-secret-asian-man, The1pato, TheDoctor10, TheFloppyOne, TheJosh, TheKMan, TheLeopard, TheObtuseAngleOfDoom, TheRhani, TheStick, Theda, Thedjatclubrock, Theguns, Thehelpfulone, Themightyone, Thewallowmaker, Thingg, Thinker jones, Thiseye, Thparkth, Thryduulf, Thue, Tiddly Tom, Tiggerjay, Tim Chambers, TimMartin, Timir Saxa, Timknell, Tiptoety, Tiramisoo, Titoxd, Tkeller, Tktktk, Tkynerd, Tmh, Tobias Bergemann, Tobias Wolter, Tocino, Tokyogirl119, Tomatoe, Tommstein, Tomsega, Tony1, TonyClarke, TonySt, TonyTheTiger, Toolingu, Tothwolf, Tovias, Tpbradbury, Traroth, Trashday03, TreasuryTag, Tregoweth, Trekkie711, Trevor MacInnis, Trollminator, Tronno, Trusilver, Tsavage, Tuuuuuuuubes, Tverbeek, Twilsonb, Twinsday, Twobells, Tylermillersucks, Tzhourdeka, Tznkai, UBeR, URBOSAUR, Uberdude85, UncleBubba, UniQue tree, United88, Untame Zerg, Unyoyega, UpTheBracket, Urhixidur, UrsaLinguaBWD, Urzadek, Use the force, Usergreatpower, Utcursch, VRoscioli, Vald, Valermos, Valkyryn, Vanished user 39948282, Vary, Vegaswikian, Velvetron, Verdlanco, Versageek, Vespristiano, Vgy7ujm, Viajero, Vidgmchtr, VigilancePrime, Vignaux, Vilerage, Villafanuk, Vinnie, Violetriga, Viriditas, Vjlenin, Vocation44, Voyajer, Vulcanstar6, Vybr8, Vzbs34, W Nowicki, W163, W1k13rh3nry, WIkiHorseMan, WJBscribe, WJetChao, WQDW412, Wafulz, Waggers, Waldir, Wangi, Wardron, Warhol13, Wavelength, Wawplok, Waxigloo, Wayne Hardman, WayneRay, Wayward, Wbm1058, We4reLegion, Wenli, Weregerbil, West Brom 4ever, West wikipedia, Weyes, Whale plane, Where, Whiney, WhisperToMe, Whitehorse1413, Whkoh, Wiggleintatter, Wiki Edit 12, Wiki alf, WikiWikiMan, Wikibob, Wikidemon, Wikidogia, Wikifun95, Wikigreatest, WikipedianMarlith, Wikipediaphile, Wikisanchez, Wikiwiki, Wiknerd, Wile E. Heresiarch, Will Beback Auto, WillMak050389, Willemdd, Willtron, Wimt, Wisejoker, Wisq, Wjfox2005, Wmahan, WojPob, Wolfkeeper, Wompa99, Wonderstruck, Woodshed, Wordsmith, Wossi, Wri0013, Wrs1864, Wutasumi, Www06, X!, XJamRastafire, Xagent86, Xaosflux, Xavier86, Xaxafrad, Xeddy, Xeo-Wizzard, Xeysz, Xezbeth, Xkeeper, Xklsv, Xyzzyplugh, YTMND64, YUL89YYZ, Yahel Guhan, Yamaka122, Yamamoto Ichiro, Yansa, Yashgaroth, Yatesie, Yath, Yelgrun, YellowMonkey, Yelyos, Yet-another-user, YixilTesiphon, Yoganate79, Yonatan, Yosri, You must have cookies enabled to log in to Wikipedia., YourEyesOnly, Ytmnd6, Zachary, ZakTek, Zavon25, Zellfaze, Zeno McDohl, ZerD, Zerak-Tul, Zerbu, Zeroinbarnotation, Zhente, Zhonghuo, Zib redlektab, Zidane tribal, ZimZalaBim, Zizzybaluba, Zmasterodinternetz, Zombi333, Zondor, Zsinj, Zundark, Zungaphile, Zzuuzz, Zzyzx11, ^demon, , 0303 , anonymous edits History of the Internet Source: http://en.wikipedia.org/w/index.php?oldid=527683656 Contributors: 4twenty42o, A Softer Answer, A little insignificant, A.K.Karthikeyan, A2-computist, A3RO, ARUNKUMAR P.R, ATerezi, AThing, Aaa3-other, AbbaIkea2010, Acroterion, Addihockey10, AdjustShift, Afireinside013, Afterthought67, AgentPeppermint, Agentareas, Ageton, Agil, Ahunt, Aitias, Alan Liefting, Alaney2k, Alansohn, Albeiror24, Ale jrb, Alex LaPointe, AlexWaelde, Alexf, Alexy527, Algotr, AlistairMcMillan, Allynnc, Alphamyon, Alvestrand, Amillar, Ancheta Wis, Andmunko, Andonic, Andrew Gray, Andrew Levine, Andries, Andsam, Andy M. Wang, Andyluciano, AngelOfSadness, Anonymous Dissident, Antandrus, Anthony1091, Anturiaethwr, Apoc2400, Appraiser, Arabani, Arjun01, ArnoldReinhold, Art LaPella, Artypants, Arx Fortis, Asbestos, AshLin, AtheWeatherman, Avsa, AxelBoldt, B123456789, Badgernet, Bambuway, Barberio, BarretB, Bbb2007, Bburton, Bdell555, Beachsidepress, Beefman, Beland, Bender235, BhaiSaab, Big Bird, Billlion, Bkell, Blrfl, Bluemoose, Bobblewik, Bobo192, Bobwrits, Bongwarrior, BoogieRock, Bookofjude, Brad101, Brainstew34, Brave fool, Brianreading, Brokendata, Brossow, Brunton, Bsegal, Buster2058, C'est moi, CGMullin, CIreland, Caknuck, Calabe1992, Callidior, Calmer Waters, Caltas, Camw, Can't sleep, clown will eat me, CanadianLinuxUser, CapitalQ, Capricorn42, Captain scarlet, Carabinieri, CardinalDan, CarlHewitt, Carribeiro, Cbh, Cbrown1023, Centrx, CesarFelipe, Cfsenel, Cg-realms, Chasingsol, Cheeesemonger, Cheeetar, Chewie, Chip1990, Chris the speller, Chris-marsh-usa, Chris55, Chrislk02, Chriswalker7, Chunkerkid25, Chzz, Ciphergoth, Cishaurim, Clappingsimon, Classicalecon, Classicfilms, Closedmouth, Cmdrjameson, Colonies Chris, Cometstyles, Comicist, CommonsDelinker, Compuserf, Computerhistory, Conversion script, Coolcaesar, Corporate Minion, CountingPine, Courcelles, Crakkpot, Crspyjohn, Ctbolt, Cwolfsheep, Cyan, Cybercobra, Cyclonius, DARTH SIDIOUS 2, DMacks, DVD R W, DabMachine, Daimore, Damuna, Dani1994, Daniel, DanielCD, DanielSiva, Darkchain, Daveliney, Daveswagon, Davewild, David Gale, David Jay Walker, David-Sarah Hopwood, DavidWBrooks, Dcoetzee, DeanBonnett, Deathfire1992, Debresser, Decltype, Deli nk, Deor, DerHexer, Derek.cashman, DesertDave, Dgw, Diannaa, Diderot, Diffensetti, Dijxtra, Disavian, Discospinster, Disneyfreak96, Dmirkin, DocWatson42, Docboat, Dogposter, Dom Kaos, Dorgan65, Download, Dragon2041, Drappel, DreamGuy, Drpickem, Drwarpmind, Dtcdthingy, Durin, Dylan Lake, Dylan620, Dylantv, DyloniusFunk, EJF, ESkog, EWikist, EagleOne, Eamost, EdJohnston, Edcolins, Edgar181, Edward, Efitu, Eflags, Egmontaz, Eilthireach, Eixo, Electron9, Eliyahu S, Eliz81, Ellywa, Elving, Emijrp, Enchanter, Enochlau, Enviroboy, Epbr123, Equendil, Erachima, Erencexor, ErkinBatu, Espen, Esurnir, Ethereal, Ethics2med, Everyking, EvocativeIntrigue, Excelsior f, Excirial, Expertu, FFMG, FHSerkland, FJPB, Face-2-face, Falcon8765, Fastfission, Favonian, Fishal, Fitzwilliam, FlippyFlink, Fluffernutter, Flyguy649, FlyingPenguins, Flyingember, Fouine99, Foxandpotatoes, Fredrik, FreplySpang, Fubar Obfusco, Furrykef, Fvasconcellos, Fvw, Fyrael, F, GEBStgo, GLaDOS, GSSAGE7, GTBacchus, GVIKIJVJ, Gaius Cornelius, Gamahucheur, Gary King, Gecko, Gensanders, Gfoley4, Giftlite, Gilliam, GirasoleDE, Gl1d3r, Glen, Glenn, Glst2, Gmaxwell, Gnfnrf, Gobonobo, GoingBatty, Goltz20707, Googleaseerch, Gordonrox24, Gorkelobb, Grafen, Greenrd, Gritironskillet, Gsmgm, Gurch, Gustavb, Guy Harris, Gwernol, Hadal, Harryboyles, Harryp123123, Harryzilber, Haseo9999, Hatch68, Hcberkowitz, Hdt83, Headbomb, Helixblue, Helmsb, Hemanshu, Hemlock Martinis, Hertzsprung, HexaChord, Hi878, Higginson, Highwind, Himatsu Bushi, Hlh, Hmrox, Hornetscp3, Hotlorp, Hotmushu4u, Hunter-Ing, Hydrogen Iodide, ILdarKOrotkov, IRP, Iaen, Ianneub, Ianpeter, Ihcoyc, Immunize, Impaciente, Insanity Incarnate, Int21h, Intoronto1125, Iriseyes, It's-is-not-a-genitive, Itschris, Ixfd64, J.delanoy, JD554, JForget, JLaTondre, JSpung, JTN, Jack Phoenix, Jack Upland, Jackol, Jamelan, JamesBWatson, Janadore, Jaredbelch, Jay, Jennica, JeremyA, JimmyBlackwing, Jj137, Jmundo, Jnc, Joanjoc, JoeSmack, Joel7687, John A. (Scotland), John K, John Nevard, John Quiggin, John Quincy Adding Machine, John of Reading, John254, Johnuniq, Jojhutton, Jollyjoel, Joseph Solis in Australia, Josephf, Jpbowen, Jrtayloriv, Judicatus, Julesd, Juppiter, Jusdafax, Just Another Dan, JustAGal, Justdancejordan, Jvstein, Jwissick, Jwoodger, KGasso, KJS77, KNHaw, KPalicz, Kabdcn, Kablammo, Kafuffle, Kane5187, KaranGoel, Karl-Henner, Kartano, Katerg, Katiewiltshire, Katydidit, Kaypoh, Kb, Kbh3rd, Kbrose, Ke4roh, Keael, Keegscee, Kerotan, Kharker, Kim Meyrick, Kingpin13, Kingredz, Kitkatcrazy, Kizor, Kmanning2008, Kmasters0, Knavinusa, Koavf, Kongr43gpen, Koolkid0000, KoshVorlon, Kozuch, Kratoz78, Krazysam 2k4, Kukini, Kungfuadam, Kushboy, Kusunose, Kvdveer, Kvng, Kwh, Kyle Barbour, Kylecbenton, KyraVixen, Kyuleness, LDR, Lach Graham, Lacrimosus, Lagelspeil, Lambiam, Leafyplant, LeeG, LeilaniLad, Leuko, Lgeorgel, Lifefeed, LightAnkh, Lightdarkness, Lightmouse, LilHelpa, LinDrug, LittleWalrus, LizardJr8, Logie26, Lord Pistachio, Loren.wilton, Lotje, Lowellian, Lquilter, LtDonny, Luk, Luna Santin, M0rphzone, M1ss1ontomars2k4, MDfoo, MER-C, MMS2013, MTHarden, Mabdul, MacRusgail, Mackensen, Mad Hatter, Makwy2, Malcolmxl5, Marc Mongenet, Marcus Qwertyus, Mark Musante, Markb, MarsRover, Martarius, Martian.knight, Martijn faassen, Martin451, MassimoAr, Massysett, Master Sturm, Materialscientist, Math Champion, Matt Britt, Matthew Fennell, Mav, Max rspct, McSly, Mchavez, Mcr616, Mechanical digger, Meekywiki, Meeples, Mentifisto, Mephistophelian, Message From Xenu, Metaeducation, Metropolitan90, Mgiganteus1, Michael Hardy, MightyWarrior, Mike Cherim, Mike Christie, Mike Dillon, Mike Peel, MikeWren, Miken32, Mindmatrix, Minghong, Mkdw, Mmernex, Mrbencooper, Msnicki, Mulad, Mchtegern, NJA, NapoliRoma, Natalie Erin, Nathan19595, NatusRoma, Ndkl, Neckro, Neelix, NeilN, Nemesis of Reason, Netalarm, Nethac DIU, Netoholic, Neutrality, NewEnglandYankee, Newmanbe, Nexus501, Nezzadar, Nicko.dvz, Nicolae Coman, Nightscream, Nigkilla, Nihiltres, Nikkimaria, Nixdorf, Nneonneo, No Guru, Nori ice, Norm, NotMuchToSay, Nsaa, Nubiatech, NuclearWarfare, Nufy8, Nurg, Nuttycoconut, Nuujinn, Ny156uk, Nyp, Nyttend, Ocaasi, Ohnoitsjamie, Ol' Sturmo, Omicronpersei8, Ottawahitech, Outit, Over9000Edits, OverlordQ, OwenX, Oxymoron83, PL290, PSPone, Pagingmrherman, Paliku, PancakeBuddy77, Pathoschild, Patrick, Patstuart, Paul August, Paul Stansifer, Paul268, Pedro, Persian Poet Gal, Personalcomputer, Peteriscoo, Phabian69, Phil Boswell, Philip Trueman, Philthecow, Philwiki, Piano non troppo, Pikeman327, Pinethicket, Piotrus, PizzaMan (usurped), PizzaMargherita, PleaseStand, Plp, Polluxian, Poor Yorick, Ppsk12nhs, Preslethe, Pride the Arrogant, Proberts2003, Proofreader77, Public Menace, Purgatory Fubar, Putamadre1234, Qero, Quiname, Qxz, R'n'B, R2cyberpunk, RFerreira, RG2, RJBurkhart, RUL3R, Radon210, Raggmopp614, Rahidz2003, RainbowOfLight, Ramsay.rainbow, Ransu, Rapidosity, Rasd, RattleMan, RattusMaximus, Raven4x4x, Rbarreira, Rcannon100, Rchandra, Rdancer, Rdsmith4, Rea0008, Reach Out to the Truth, Reconsider the static, Recurring dreams, RedWolf, RedtheRad, Reliablesources, Renano7, Retiono Virginian, Retired username, Rettetast, RexNL, Rho, Rhobite, Rich Farmbrough, Richfife, Rickdl, Riotrocket8676, Rjwilmsi, Rmantech, Rmosler2100, Robdurbar, Robiecraig, Roboshed, RockOfVictory, Rodii, Ronark, RoyBoy, Rp, Rrburke, Rsrikanth05, Rwwww, Ryan032, Ryan3000, S h i v a (Visnu), SFK2, SJP, SMC, Saebjorn, Saga City, Sam Korn, Sameereemas, Samsara, Sanchom, Sanfranman59, SasiSasi, SchreyP, Schweiwikist, Scientizzle, Sciurin, Scohoust, Scorpion451, Scottfisher, Scoutersig, Sct72, Searchmaven, Sfstack7500, Shadowjams, Shadowmark22, Shenme, Shirik, Shmilyshy, Shoeofdeath, Shoessss, SilkTork, SimonP, Sir Vicious, Sith Lord 13, Sj, Skamecrazy123, Skizzik, Sky Attacker, SkyWalker, Skybunny, Slark, Smallman12q, Smartse, Smitz, Snareshane, Sohmc, Solphusion, Some jerk on the Internet, South Bay, SparrowsWing, SparsityProblem, SqueakBox, Sriharsh1234, Srpnor, Starbucks246, Steamrunner, Steel, Stephan Leeds, Stephenb, Stifle, Stirling Newberry, Stombs, Sturm55, Sturmster, SudoGhost, Suffusion of Yellow, SuperDaveMusic, Supersquid, Supten, Surfingslovak, Svick, Swaq, SymlynX, Szfski, THEN WHO WAS PHONE?, Tabletop, Taka, Tannerhelland, Tariqabjotu, Tassedethe, Tazzy33182, Tbarrie, TcomptonMA, Tedernst, Teh Josh.sbb, Terraflorin, Terrx, Tgeairn, Thatguyflint, The Anome, The Sturmster, The Thing That Should Not Be, The sunder king, TheCatalyst31, TheJJJunk, Thecheesykid, Thelittlegreyman, Theresa knott, Thewtfchronicles, Thibbs, Thiseye, Thunder8, Thunderboltz, Tide rolls, Timmykillsbogan, Tjkiesel, Tom Morris, Tom-, Tombomp, Tomi T Ahonen, Tommy2010, Tony Sidaway, Tony1, Torgo, Triwbe, Tstormcandy, Twas Now, TwigsterX, Twohlrab3, TypoDotOrg, Ubergeekguy, Ucla90024, Ulflarsen, Uncle Dick, UncleDouggie, Urban turban, Uruiamme, VMS Mosaic, Vaganyik, Vanished user 39948282, Vary, Vcerf, Versus22, Vespristiano, Violetriga, Vipinhari, Vishnava, Vonfraginoff, Vrenator, Vsmith, VzjrZ, W163, WOSlinker, Wackymacs, Walton One, Washburnmav, Wavelength, Wayne Slam, Wayward, Wcreator, Webyoda, West wikipedia, West.andrew.g, Wgungfu, Whir, WhiteDragon, WikHead, Wiki alf, Wikifun95, Wikiklrsc, Wikipelli, William Avery, Willking1979, Willsmith, Wittylama, Wjanio, Wjejskenewr, Wlgrin, Wmjames,

417

Article Sources and Contributors


Woohookitty, WordsExpert, Workbrick, Wrs1864, Wywin, Xv8M4g3r, Yarnalgo, Yeltensic42, Yintan, Zaphod Beeblebrox, Zhenqinli, Zidonuke, Zighweng, ZimZalaBim, Zoicon5, Zollerriia, Zondor, Zone46, Zoz, Zundark, Zvn, Zzuuzz, , 2201 anonymous edits World Wide Web Source: http://en.wikipedia.org/w/index.php?oldid=527719146 Contributors: *feridik, -Kerplunk-, 0wner170, 10metreh, 11rcombs, 16@r, 194.109.232.xxx, 203.109.250.xxx, 20coconuts, 2206, 3rdTriangle, 5theye, 75th Trombone, 8ung3st, A Stop at Willoughby, ABF, AJR, AL3X TH3 GR8, AMHR285, AVand, Aamirbk1, AaronLLF, AaronTownsend, Abarry, Abatres, Abce2, Abd, Abdel.a.saleh, Abovemost, Abrech, Acather96, Accurizer, Acuppert, AdamXgamer, Adashiel, Adnanmuhammad95, Adrian.benko, Aeolien, Aesopos, Af648, AgadaUrbanit, Ageekgal, Agendum, Agent Smith (The Matrix), Ahoerstemeier, Akendall, Al guy, Alan Liefting, Alansohn, AlefZet, Alerante, AlexWangombe, Alexf, Alexius08, Alexjohnc3, AlistairMcMillan, Alokchakrabarti, Alpha Quadrant (alt), Alphachimp, Alvestrand, Amillar, Amplitude101, AmyzzXX, Andre Engels, Andrea Parri, Andrew D. Jones, AndrewWTaylor, Android Mouse, Andromeda321, Andy Dingley, Andyjsmith, Angela, Anomalocaris, Anonymous Dissident, Anonymous101, Anoobmca, Antandrus, Anthony, AntiVan, Aodonnel, Applechair, ArchonMagnus, Arensa, Argonistic professor, Arkiedragon, ArnoldReinhold, Arnon Chaffin, Art LaPella, Arthena, Artw, Aselfcallednowhere, Ash, Asteffey, Astrobloby, Atomice, Autopilots, Avono, Avram, Avriette, Awanta, Azotochtli, B, Balloomc, Bambuway, Bananaclaw, Barek, Barras, Barthandelus, Bbatsell, Bcorr, Bdesham, Beavis6325, Beddingplane, Beetstra, Beland, Bender235, Bendy1, Benqish, Bevo, Bgs264, Bibi Saint-Pol, Big Bird, BigHaz, BilCat, BillFlis, Billoraani123, Binksternet, Birds are weird, Bk0, Blacabyss, BlackAndy, Blahcake666, Bloodshedder, Bluffmaster541, Bo, Bo Lindbergh, Bobblewik, Bobet, Bobo192, Boccobrock, Boerman, Bongwarrior, Bookandcoffee, Bookofjude, Boomshadow, Boraxx, Boris Allen, Borislav, Boriszex, Bornhj, Bossk-Office, Bostonian Mike, Bounce1337, Branddobbe, Brian0918, Brianga, Brion VIBBER, Bronger, Brougham96, Bryan Derksen, Buchanan-Hermit, BudSipkiss, Buddyscruggs, BuffStuffer, Bumm13, Burto88, Butters77777, BziB, CSEditor, CUTKD, Cabbatime, Cadiomals, Cailliau, Calvin 1998, Camster342, Can't sleep, clown will eat me, Canadian-Bacon, CanadianLinuxUser, Capricorn42, CaptainVindaloo, CardinalDan, Carlsotr, Carta00, Cenarium, Centrx, Charraksus, Chbarts, Chininazu12, Chip1990, Chris 73, Chris G, ChrisLoosley, ChrisO, Christian List, Christopher Parham, Chuckiesdad, CiaPan, Cielomobile, Cirrus Editor, Claidheamohmor, Classicfilms, Claud1996, CliffC, Clirmion, Closedmouth, Clpo13, Cntras, Coflo1994, Coldfire82, Colijunior, CommonsDelinker, Computerjoe, ComradeSlice, Connelly90, Conversion script, Coolcaesar, Cooldemilou, Coolninja98, Coplston, CoramN, Corpx, Correctingothers, Corvus cornix, Cotinthecity, Courcelles, Cov87, Cpbaseball5, Craig Pemberton, CrazyChemGuy, Crazycomputers, Credema, Crisco 1492, Cst17, Cuahl, Cwolfsheep, Cybercobra, Cyclopia, Cyde, D, D6, DARTH SIDIOUS 2, DBigXray, DD2K, DJ Clayworth, DMacks, DRBar, DVdm, Daaah5, Daedelus, Damian Yerrick, Dan100, Dancter, Danny5000, DarkFalls, Darkenn, Darkwind, Darkx1337, Darth Panda, Dave6, Daveblack, Daverocks, Daverose 33, Daveydweeb, David Gerard, David Latapie, David Starkey, David.Mestel, DavidLevinson, Davnor, Davodd, Dawnseeker2000, Dbsanfte, DeadEyeArrow, DearPrudence, Deathtopudding, Decltype, Deepugn, Den fjttrade ankan, Denis C., Denisarona, DennyColt, DerHexer, DestroyerBDT, Diamond2, Diberri, Dickguertin, DigbyDalton, Dina, DirkvdM, Discospinster, Dispenser, Djavidan, Djg2006, Dlrohrer2003, DocWatson42, Docbug, Doggieman159, Dogmavskarma, Dominic, Donfbreed, Doradus, DoubleBlue, Doug A. Hole, Download, Dputig07, DragonHawk, Drbb01, Drcarver, DreamGuy, Drift chambers, DriveMySol, Drmies, Drphilharmonic, Drunken Pirate, Dry., Dube-k Nkiribari, DugDownDeep, Dustinasby, Dwilz, Dylan Damien, Dynaflow, Dzhatse, E Wing, EagleFan, Eagleamn, Eamonn sullivan, Earlebird, EarthPerson, Editmaniac, Edward Zimmermann, EdwinHJ, Efitu, Egmontaz, Ehsan, Ekren, El C, El0i, ElfQrin, Elmoro, Eloquence, Eluchil404, EmeryD, Emperorbma, Eneville, Enil, Epbr123, EpicBit, Erick.Antezana, Ericoides, Esanchez7587, Escalader, Everyking, Excirial, Exert, Eyu100, Ezeu, Falexi, FatalError, FeldBum, Fenrisulfr, Fireice, Flewis, Florentino floro, Flowerparty, Flowerpotman, Flyer 13, Fmccown, Foxwolfblood, Fratrep, Freakingme, Freakofnurture, Frederik S, Ftu78, Fumitol, Func, Furrykef, G2g2day, GB fan, GDonato, Gail, Gaius Cornelius, Gareth Griffith-Jones, Garion96, Gary King, Gary the gnome, Gary13579, Gdo01, Geniac, Genixp, Gholson, Giftlite, Giggy, Gilliam, GlassCobra, Glenn, Gman124, GoShow, Gobonobo, Gogo Dodo, GoingBatty, Gooday.1, Goplat, GorgeCustersSabre, Gott wisst, Gracenotes, GraemeL, Graham87, Grantglendinning, Grawity, Graylorde, Greatbigtwit, Grison, Gsandi, Gscshoyru, Gsklee, Gun Powder Ma, Guoguo12, Gurch, Gustav von Humpelschmumpel, Gwernol, H2g2bob, Hadal, Hailey C. Shannon, Hairy Dude, Ham123de, HamburgerRadio, Happy darrenchong, Hardyplants, Harfi66, Harmil, Harryboyles, Harryzilber, Haseo9999, Hashar, Hassim1983, Headbomb, Hellisp, Hendry, Henry Flower, Herehere, HexaChord, HiJohnSpencer, Highonhendrix, Hillgentleman, Hon-3s-T, Hoof Hearted, Hotcrocodile, Howdoesthiswo, Hrvoje Simic, Hugovanmeijeren, Hung3rd, Husond, Huw Powell, Hydrargyrum, Hydrogen Iodide, I amm Beowulf!, I dream of horses, IByte, II MusLiM HyBRiD II, IMSoP, IRP, IShadowed, IW.HG, Icairns, Icrutt, Ignatzmice, Imgaril, Imnotminkus, Informatic17, Inoen, Inter, Invistec, Ipso2, Iridescent, Ironrd, Irrbloss, Isam, Isilanes, Ixfd64, J.delanoy, JFG, JForget, JHMM13, JNW, JOSHUAH HEBY, Ja2k8el, Jab52359, Jackol, JacobCurtis, Jacobolus, Jake Wartenberg, Jake-515-, JamesBWatson, Jamie89104, Jasper Deng, Jatkins, Javidan, Jayhawk of Justice, Jblatt, Jedsayaman, Jeff G., Jeffq, Jeffreylkk, Jehfes, Jeltz, Jemappelleungarcon, Jengod, JeremyA, Jesant13, Jeveteca, Jfdwolff, Jhessela, JialiangGao, Jim1138, Jimmi Hugh, Jj137, Jjshapiro, Jleedev, Jmfriesen, Jnc, Jncraton, Jneal55, Joanjoc, Joe11miles, JoeOnSunset, Joeblakesley, JohanL, John, John Broughton, John Carter, John Fader, JohnI, JohnOwens, JohnPritchard, JohnTechnologist, Johnwrw, JokelineUK, JonHarder, Jonathan Drain, Jonvvv2, JordeeBec, Jorel314, Jorunn, Joseph Solis in Australia, Josephf, Joshthegreat, Joshua, Joshua Issac, Josquius, Jovianeye, Joy, Jpbowen, Jpo, Jrockley, Jschnur, Jsmestad, Jtiza, Jufert, Jugander, Juliancolton, Junnel, Junon, Jusdafax, Justinfr, JzG, Jzylstra, KYPark, Kaiyir Minoia, Karen Johnson, Karl Stas, Karlson2k, Karmona, Kate, Katieh5584, Kbolino, Kbrose, Keilana, Kenny sh, Kezze, Khalid, Kim Bruning, Kingsaini, Kirbytime, Kiwi128, KiwiRyan, Kkram, Knff, Knutux, Koavf, Korath, Korg, Kornfan71, Kpwa gok, KrakatoaKatie, Kri, Krishvanth, Krothor, Kubigula, KuroiShiroi, Kvasilev, Kvng, Kwamikagami, Kwiki, Kwlothrop, Kyle1278, L Kensington, LUUSAP, Lachatdelarue, Lakefall, Lars Trebing, Lars Washington, Ldg2135a-14, Leafyplant, Leandrod, Learnaffilate, Lee Carre, Lee Daniel Crocker, Lee S. Svoboda, Legedevin, Leonig Mig, Leszek Jaczuk, Letdorf, Levineps, Lifefeed, Lightmouse, Ligulem, Little Mountain 5, LittleOldMe, LizardJr8, Loalhe, Logan, Loki500, Longhair, LorenzoB, Lotje, Lovetinkle, Lowellian, Luk, Luna Santin, Lwoodyiii, Lykoyrgos, Lynchyboi, MBisanz, MC10, MER-C, MITBeaverRocks, MONGO, Mabdul, Mac, Macy, Maestrosync, Magicxcian, Magioladitis, Mail4james, Mailer diablo, Malatesta, Malcolm Farmer, Malleus Fatuorum, Manbilong, Manop, Manway, Marek69, Mark Arsten, Mark Foskey, Mark91, Markaci, Mars fenix, Martinp, Master Jay, Master of Puppets, Masterhomer, Materialscientist, Matt Gies, Matt McIrvin, MattGiuca, Matteh, Matthieupinard, Mattisse, Matusz, Maurreen, Mav, Maxamegalon2000, Maxis ftw, Maxschmelling, Mayooranathan, Mayor Westfall, Mbell, McSly, Mcalliph, Mcm, Mdbest, Mditto, Meigwil, Mentifisto, Meowkittymeow, Mervyn, Meshach, Metao, Mets501, Mgiganteus1, Michael Hardy, MichaelJanich, Michaeljr97, Michaeloqu, MikeWren, Mindmatrix, Minghong, Mini-Geek, Minimac, Mirt Tenk, MisterCharlie, Mjb, Mjgw, Mlouns, Mm32pc, Modemac, Mohitngm, Monty845, Moogwrench, Mooquackwooftweetmeow, Moriori, Mort432, Mr random, Mr. Lefty, Mrqueen, Mrzaius, Mschel, Msikma, Mttcmbs, Mumia-w-18, Musicandnintendo, Muso799, Mvuijlst, Mxn, My favourite teddy bear, Mywyb2, NCurse, NEO369, NHRHS2010, Naerii, Nageh, Nagy, Nakon, Nanshu, NantonosAedui, Nantoseiken, Nathanlandis, NawlinWiki, Nbarth, NeilN, Nepenthes, Nertzy, Netoholic, Netvor, Neutral current, Neutrino007, NewEnglandYankee, Newmac, Newmanbe, Nicholasstorriearce, Nick C, NickBush24, Nigelj, Nihiltres, Niickibarra20, Nikai, Nikkimaria, Nishkid64, Nivix, Nixeagle, Nkeel34, Nlu, Noah Salzman, Noformation, Noisy, Noldoaran, NorthernThunder, Not home, NotinREALITY, Nubiatech, Nurg, Oberst, Oblivious, Of, Ohconfucius, Ohnoitsjamie, Ohsayanything, Okiefromokla, Olgerd, Oli Filth, Oliver Pereira, Olivier Debre, OnePt618, Oniscoid, Onorem, Open4D, Opendna, Orange Suede Sofa, Orderinchaos, OregonD00d, Oroso, Ost316, Ours, Outriggr, OverlordQ, Oxymoron83, Paliku, Pastore Italy, Patelmihirb, Patrick, Paul Ebermann, PaulGarner, Pedxing585, Pemboid, Persian Poet Gal, Peter Campbell, Peter Karlsen, Petrb, Petskratt, Pgan002, Phact, PhantomS, Pharaoh of the Wizards, Phil Boswell, PhilKnight, Philip Trueman, Phoenix Hacker, Piano non troppo, Picturesofmia, Pigsonthewing, Pinethicket, Pinkadelica, Pintopc, Piotrus, Pnm, Porqin, Possum, Postlewaight, Poulpy, Poweroid, Ppk01, Ppp, Prender101, Prenn, PrestonH, Prestonmcconkie, Pretty Green, Prezbo, Proofreader, PseudoSudo, Psy guy, Publicly Visible, Putanginanyo, Pyrolord747, Pdraic MacUidhir, Qmt, Quebec99, QuiteUnusual, Qwanqwa, Qwerty0, Qwyrxian, Qxz, RJaguar3, RUL3R, Radar scanner, RadioActive, Radu Gherasim, Raeky, Ragesoss, Rainbow sprinkle, RainbowOfLight, Raining girl, Rama, RandomP, Randomreturn, Rannphirt anaithnid, Rasmus Faber, Rathfalguni, Raul654, Rav77, Raven in Orbit, Rawr, Razor 69, Razorflame, Rbellin, Rbrwr, Reaper Eternal, Recognizance, Red Slash, Red1 D Oon, RedWolf, Redtroll, ReeceSpielman, Remember the dot, RememberSammyJankis, Reneeholle, Res2216firestar, Rettetast, Rex1637, RexNL, Rhondalorraine, Rhopkins8, Rich Farmbrough, RichardF, RickK, Rjensen, Rjwilmsi, Rmccue, Roadrunner, Robert4668, RobertG, Robertvan1, Robomanx, RockMFR, Rompe, Ronhjones, Ronkronk, Ronny8, Ronz, RossPatterson, Rrburke, Rrfayette, Ruch37, Rws591, Ryan Postlethwaite, Ryan Roos, RyanGerbil10, Ryguillian, Ryulong, S.K., S8333631, SDC, SGBailey, SNIyer12, SQL, ST47, Sabariganesh, Saebjorn, Sam Korn, Samwb123, Sander Sde, Sango123, SasiSasi, Satori Son, Savidan, Sbrentegani, Scalkin, Scandum, Scartboy, SchuminWeb, Schweiwikist, Scohoust, Scottyhoohow, Sean William, Seaphoto, Securityadvisor, Seedat, Septagram, Seraphim, Sesshomaru, Seth Ilys, Sh4rk4tt4ck, Shanimoshe, Shantavira, Sharon08tam, Shii, Shirik, Shot, Shotwell, Siebrand, Simetrical, SimonD, Sionus, Siteshwar, Sjh, Sjjupadhyay, Sjmtlewy, Skeejay, Skierpage, Skizzik, Sky Attacker, SkyMachine, Sligocki, Sliker Hawk, Slovakia, SlowPhoton, Smalljim, Snakekiller1x95, Snarl, Solidsandie, Someguy1221, Someone else, Sonjaaa, Sophus Bie, SpNeo, Spam kj, Sparky99456, Specs112, Speer320, Spitfire19, Splarka, SpuriousQ, Ssolbergj, Staeiou, Staticfree, Stbalbach, Stephan Leeds, Stephenb, Steven Walling, Steven Weston, Steven Zhang, Stirling Newberry, Strait, Sue Anne, Suffusion of Yellow, Sugarbeartrio, SummerWithMorons, Sun Creator, Sundar, Sunkorg, Sunray, Superm401, Supten, Surfingslovak, SusanLesch, Susokukan47, Susurrus, Swatje, SweetNeo85, Symane, Synthe, Syrthiss, T3chl0v3r, TMC, Ta bu shi da yu, Tangotango, Targaryen, TarkanAttila, TarmoK, Tarquin, Tbhotch, Tbutzon, Tcncv, Technopat, Teles, Tellyaddict, Tempshill, TenOfAllTrades, Teravolt, Tfmb, Tgeairn, That Guy, From That Show!, ThatWikiGuy, The Anome, The Evil IP address, The Illusive Man, The JPS, The Man in Question, The Rambling Man, The Random Editor, The Thing That Should Not Be, The Utahraptor, The monkeyhate, The sock that should not be, The sunder king, The wub, TheDevilOnLine, TheNoise, TheRhani, Theblackplague, Theraven, Theskitone, Thespian, Thingg, Thinktdub, Thomas For., Thrustinj, Thue, Thundercross16, Tide rolls, TimTomTom, Timbl, Timlane, Timmywimmy, Timrollpickering, Timwi, Tiptoety, Tiramisoo, Tobby72, Tobias Bergemann, Tobypctechie, Tommarsh99, Tomos, Tony Sidaway, Tony1, Torgo, Tothwolf, Towel401, Tpbradbury, Trakesht, Travis99, Tregoweth, Trenchcoatjedi, Trialsanderrors, Troy 07, True Scaffold, Trusilver, Tsmith189, Ttwol101, TuukkaH, Twang, Twinsday, TwoTwoHello, Twobells, Tyciol, Tyw7, UA1high, UBeR, UU, UberScienceNerd, Ukulele, Ulmanor, Ultimus, Uman, Uncle Dick, Uncle Milty, Unreal7, Unyoyega, UpstateNYer, Uriah923, Useight, Usergreatpower, Utcursch, Uzma Gamal, VMS Mosaic, VanBurenen, Venera Seyranyan, Verne Equinox, Versageek, Viajero, Vicoar, Villafanuk, Virii, Vishnava, Vladkornea, VolatileChemical, Vrenator, Vycanis, W3forum, WDGraham, Wacco, Waggers, Wakebrdkid, Wanderingstan, Wang ty87916, Wangi, Wasssupman2000, Wavelength, Wayne Slam, Webmaven, Weevil, Wertydm, Weyes, Whazzit, Wikibofh, Wikid77, Wikidudeman, Wikieditor06, Wikifun95, Wikimalta, Wikimancer, Wikipelli, Wildman7856, William Avery, Willking1979, Willsey1997, Wimt, Windharp, Wireless Keyboard, Wizofaus, Wknight94, Woody, Woohookitty, Wrinehart, Wsxx, Wtmitchell, Wwwwolf, XXBassmanXx, Xdenizen, Xezbeth, Xithen, Yacht, Yama, Yamla, YellowMonkey, Yemal, Yizhenwilliam, Yoelper, Yori, Ytrehgfd, Yvesnimmo, Z3ugmatic, Zacman2000, Zaf, Zaq12wsx, Zealotgi, Zenohockey, Zhente, ZimZalaBim, Zondor, Zoney, Zundark, Zzuuzz, , 2558 anonymous edits History of the World Wide Web Source: http://en.wikipedia.org/w/index.php?oldid=526897742 Contributors: 1.618033989, A. Parrot, A0602336, A1asdair, Adam850, Akadruid, Aldaron, Artw, BBCWatcher, Badlands17, Behun, Beland, Bkonrad, Bongwarrior, Brisvegas, Bubba73, CGMullin, Candorwien, Capricorn42, Chairsenses, Ciphers, Classicfilms, CodeCaster, Cokeabout, CommonsDelinker, Coolcaesar, Daaah5, Darklilac, Darth Panda, DavidRF, Davodd, Dorgan65, Drinkdrinker, Dysepsion, Edward, Ekren, ElCharismo, Eleassar, Enumer8tor, Epbr123, Epugachev, Eu.stefan, EurekaLott, Ewlyahoocom, Exir Kamalabadi, Fanf, Fieldday-sunday, FoeNyx, Frodet, F, GOnly, Glacialfox, GoingBatty, Green Giant, Groogle, Guoguo12, Hagoleshet, HamatoKameko, Hildanknight, J.delanoy, Janus Shadowsong, Jbro0428, Jiminycrock, Johnanth, Juliancolton, Kencf0618, King of Hearts, KingsleyIdehen, Konstable, Kwh, Lenoxus, Letdorf, Levineps, Longhair, Luckas Blade, MITBeaverRocks, MONGO, Mabdul, Malcolmxl5, Markenrode, Materialscientist, Mavhc, Mchavez, Mets501, Michael Bednarek, Michael Hardy, Michael Zimmermann, MihalOrel, Ms2ger, Muro de Aguas, Mwtoews, Naru12333, Nchaimov, Nealmcb, Neo139, Netoholic, Newmanbe, Nick1234554321, Nicolae Coman, Nitya Dharma, Nurg, Ocaasi, Onodera, Ottre, Oxymoron83, PDXblazers, Paliku, Phantom784, Philip Trueman, PiMaster3, Pianoplonkers, Plau, Radagast, RadioFan, Renesis, Rjwilmsi, Robert Pollard, Rodeojava, Roke, RolandR, Ronz, Rursus, Rwwww, SJP, Safvan007017, Samboy, Samsara, Satori Son, Scientus, Scopefx13, Shadowjams, ShaunL, Shirt58, Sidious1701, SilkTork, Snigbrook, Sql qassem,

418

Article Sources and Contributors


Ssolbergj, Stephan Leeds, Stevenfruitsmaak, Tainter, Taliswolf, Terryn3, Tgeairn, The Negotiator, Thryduulf, Tothwolf, Vega Nexos, Velella, Versus22, Vipinhari, Vlad, Vrenator, Vycanis, Wackymacs, Wassailant, Wesmatson, Whiteandnerdy52, Wikid77, Wikiew, Wikifun95, William Avery, Womzilla, Xmoogle, Ysw1987, Ytrrr, Zompist, 239 anonymous edits Intergalactic Computer Network Source: http://en.wikipedia.org/w/index.php?oldid=508498668 Contributors: Bryan Derksen, Cybercobra, El C, Frap, Gadget850, Ganymead, JonHarder, Liftarn, MrFizyx, Plasticup, RossPatterson, SusanLesch, W Nowicki, W163, 11 anonymous edits ARPANET Source: http://en.wikipedia.org/w/index.php?oldid=527750851 Contributors: (jarbarf), 12george1, 4wajzkd02, AThing, Aadh, Abdull, Abeair, Acather96, Adam850, Adashiel, Adouglass, Aduro.sudonim, Ahoerstemeier, Alansohn, Albino Fox, Ali K, Allynnc, Anderssl, Andrew Gray, Andy M. Wang, Angela, AnnDuvall, Anupam, Arabani, Arbustoo, Ashmoo, Avicennasis, Az1568, Balph Eubank, Barberio, Beerquest, Beland, Bevo, Bill.martin, Blethering Scot, Bobak, Bobblewik, Boffy b, Bogey97, Bonadea, Bongwarrior, Bookofjude, BornonJune8, BostonMA, Bramlet Abercrombie, Brisvegas, Btm, Byrial, CBM, Capt Jim, CarlHewitt, Carps, Cburnett, Cengelbart, Ceyockey, Chris Q, Chris-marsh-usa, Classicfilms, Cmdrjameson, Coasterlover1994, CodeCaster, Collard, Color probe, CommonsDelinker, Coolcaesar, Courcelles, CryptoDerk, Cryptosmith, Cycletime, Cyranomn, CzarB, DARTH SIDIOUS 2, DD2K, DJ Clayworth, DMacks, Daderot, Daibhid C, Dave Cohoe, David Gale, Dawnseeker2000, Dgtsyb, Disavian, Dmf360, Docboat, DoctorWho42, Donfbreed, Dratman, Dreamyshade, Dysprosia, ESkog, Eastlaw, Edgar181, Edward, Edward Vielmetti, Eggman183, Egmontaz, Elainecs, Epbr123, Erdal Ronahi, Ericl234, Esrever, Everyking, EvilCouch, Face, Favonian, Flockmeal, Flowerpotman, Fmlyguy08, Folajimi, Franois, Frazzydee, Fred Bradstadt, Furrykef, G Prime, Gail, Gavin77, Geniac, Ghettoblaster, Giftlite, GilCahana, Gilliam, Gimboid13, Glane23, Gnuish, Grafen, Grunt, Gtg204y, Guardianangelz, Gully 33, Guy Harris, Gwernol, Harryzilber, Harvsterjake, Headbomb, Hephaestos, Huebi, Hut 8.5, Hydrargyrum, Ian Moody, Ichthyos, Igoldste, Ike, Immunize, Ino5hiro, Inter, Itai, J.delanoy, JForget, JTN, Jake Wartenberg, JamesBWatson, Jamesontai, Jeffmcneill, Jim1138, Jimfbleak, Jnc, JoaoRicardo, Johna, Jojhutton, JonHarder, Jonkerz, Joseph Solis in Australia, Jossi, Jrtayloriv, Jurcking, Jwise77, KBi, KNHaw, Kalicaloo1212, Kate, Kaylanimis, Kbrose, KenBailey, Kilrothi, Kim Meyrick, Kimyu12, Kintetsubuffalo, Kmaster, Koalabearyz, Kvng, L Kensington, La goutte de pluie, LawrenceGRoberts, Legallydolls, Leuqarte, Lightmouse, LinaMishima, Logan, Longhair, Looxix, Lord Chamberlain, the Renowned, Lord Pistachio, Lotje, MFago, Maijohn, Matt Crypto, Mavericks12, Maximaximax, Maxzig, Mbiesz, Mhazard9, Michaelbusch, Michaelwilson, Mightybozo, Miha Ulanov, Mikebar, Milo03, Mmernex, Mr.98, Mschlindwein, Mu301, Mufka, Multixfer, N419BH, Nbarth, Neelix, NellieBly, Nethac DIU, Netkinetic, Nezzadar, Ngch89, Night Gyr, Nightscream, Nv8200p, Nyttend, Objective3000, Ohconfucius, Ohka-, Oldthumper, Omaunder, Ottawa4ever, Oxymoron83, Palladmial, Pascal72, PearlSt82, Petrus, Phil Boswell, PhilKnight, Philip Trueman, Phirazo, PiccoloNamek, Pichpich, Piledhigheranddeeper, Plastikspork, Pointer1, Postdlf, Preslethe, Prestonmcconkie, Public Menace, Quebec99, Quiddity, Qwertyus, Ransu, Rapidosity, Red dwarf, RedWolf, Reddog81, Redrose64, Reginhild, Renegade Lisp, Rich Farmbrough, Rjwilmsi, Rl, Rob Hooft, Robin S, Rocastelo, Ronhjones, Rsrikanth05, RyanCross, Saltysailor, Samuel Blanning, Sdedeo, Shadowjams, Shanes, Shell Kinney, SiliconWolf, Siroxo, Smiteri, Smoth 007, Some jerk on the Internet, Squideshi, Sriharsh1234, StanislavJ, SusanLesch, Sushil20051982, Sverdrup, Szajd, TJ Spyke, TMC1982, Tabletop, Tbhotch, TcomptonMA, Techman224, TedPostol, Tellyaddict, Thanmark, The Anome, The Cunctator, TheCoffee, Thingg, Thom2729, Throwaway85, Thue, Thunderbird2, Tim Starling, Timrollpickering, Toreau, Torla42, TravisAF, Trevor.harris1, Twice25, TwistedText, Twobells, Uli, UnicornTapestry, Untruth, Uogl, Uttaddmb, VAcharon, Vary, Vegetator, Veinor, Velvetsmog, Vikramanb17, ViperSnake151, Vishahu, VonFassen, W Nowicki, W163, WODUP, Waynemcdougall, Wensong, WhisperToMe, Will Beback, Wmjames, Woohookitty, Wwwwolf, Xavier86, Ylee, Yudiweb, ZedGreen, Zippanova, Zundark, Zvika, Zvn, Zzuuzz, , 676 , anonymous edits CSNET Source: http://en.wikipedia.org/w/index.php?oldid=526545141 Contributors: Alan Liefting, Alvestrand, Beland, Blaxthos, Btm, Charlie fong, DGG, Davecrocker, Disavian, Drpickem, Itai, Jamelan, Jhf, John of Reading, Kate, Kbrose, Luckas Blade, NilSineMagnoLabore, Noneemac, Qu3a, Sgt Pinback, TcomptonMA, Texture, Tow, Trevor MacInnis, W Nowicki, W163, Wikied, 32 anonymous edits ENQUIRE Source: http://en.wikipedia.org/w/index.php?oldid=509619063 Contributors: 5 albert square, Anthony Appleyard, Bogdangiusca, Cbl62, Coolcaesar, Cwolfsheep, Cyhawk, David Latapie, DespereauxQ, Docu, Dzeller79, Ericamick, Frodet, Gadfium, Geary, GoingBatty, Hux, KYPark, Kyleca, Lainestl, Mabdul, Messy Thinking, Mild Bill Hiccup, Nabla, Nchaimov, Neutrality, Nigelj, Nihiltres, OlEnglish, Ora, ProhibitOnions, Rannphirt anaithnid, Rich Farmbrough, SCZenz, Secretlondon, Tabletop, The Thing That Should Not Be, The Wild Falcon, Toresbe, Two hundred percent, Uzma Gamal, Zanimum, Zeiden, Zigger, Zoeb, 38 anonymous edits IPPS Source: http://en.wikipedia.org/w/index.php?oldid=511298239 Contributors: Bennelliott, Dara Koper, Emeraude, Fences and windows, F, Gareth Griffith-Jones, Headbomb, Kappa, LorenzoB, Paul, Pyrotec, Sigvit, Welsh, 12 anonymous edits MILNET Source: http://en.wikipedia.org/w/index.php?oldid=518506977 Contributors: Alan Liefting, Avb, Bobo192, Brownsteve, Catamorphism, CesarB, DXBari, Daderot, DavidWBrooks, Harryzilber, Hyju, Jake Nelson, JonHarder, Kurzhaar, Kyng, Marblespire, Paul, PaulHanson, Pearle, Rettetast, Twofreshfish, Wikpeded, YUL89YYZ, 10 anonymous edits NFSNET Source: http://en.wikipedia.org/w/index.php?oldid=526315428 Contributors: Alan Liefting, Aldie, Arbustoo, Beland, Bobblewik, Bruce1ee, Btm, Cec, Chmod007, Cybercobra, Daniel Bonniot de Ruisselet, DavidWBrooks, Dfred, Discospinster, ESkog, Gricart, Hairy Dude, Headbomb, John of Reading, JonHarder, Kbrose, KenBailey, KnightRider, Lightmouse, Mav, Misternuvistor, Modster, Nixdorf, Oystein, Powerlord, Public Menace, Rich Farmbrough, Scientes.bonum.et.malum, SnowFire, Sun Creator, Tas50, TcomptonMA, Terryn3, Vary, W163, Zoniedude, 70 anonymous edits TELENET Source: http://en.wikipedia.org/w/index.php?oldid=526006745 Contributors: Anticipation of a New Lover's Arrival, The, AugustinMa, Cliffb, Crazynas, Ewlyahoocom, Ferret, Gwern, Harryzilber, Hcberkowitz, Headbomb, Irb, Josephf, Jprg1966, LawrenceGRoberts, Lewisoaten, Lightmouse, Lotje, Maande10, Maury Markowitz, Metageek, Nageh, O keyes, Peter Flass, Peyre, RJII, Rapidosity, Rcannon100, Rdmoore6, Rebroad, Rick7425, Rjyanco, Tardis, The Nut, Tuvic, WikiEXBOB, Woohookitty, Yaris678, 19 anonymous edits UUCP Source: http://en.wikipedia.org/w/index.php?oldid=517261563 Contributors: 168pin, Akadruid, Aldie, AlexandreDulaunoy, Anfi, Art LaPella, Arvindn, Barberio, Benwing, Boing! said Zebedee, Buster2058, CesarB, Chase me ladies, I'm the Cavalry, Chbarts, Chris the speller, Ciotog, Cmdrjameson, Crusadeonilliteracy, Cwolfsheep, Danrikofer, David Edgar, DavidDouthitt, Deepmath, Depakote, DerHexer, Digita, Dtobias, Editor2020, Egil, ElBenevolente, Electron9, Epiphanius, GermanX, Glenn, Gnuish, Gpvos, Gurch, Guy Harris, Harmil, Headbomb, IMSoP, Ian Lance Taylor, Ian Pitchford, Isto Ylisirkka, Jaan513, Jamesofur, Jeh, Jhd, Johnny 0, Joy, JustAGal, Katams, Kate, Kinema, Leandrod, Martijn Hoekstra, Meaning of Fife, Mjpieters, NatusRoma, No1lakersfan, NorthernThunder, Pm215, Probell, Psychonaut, RedWolf, Sam Korn, Scotharkins, Sietse Snel, Smiteri, Ssd, SymlynX, Tannin, Thorwald, Tim Pritlove, Trey314159, Twas Now, Unfree, Uucp, Veratien, Wdflake, Webwarrior, Wizzy, Wrs1864, Wtshymanski, Yilloslime, Yonkeltron, Yurik, Zz9pzza, 77 anonymous edits USENET Source: http://en.wikipedia.org/w/index.php?oldid=525956356 Contributors: (jarbarf), .:Ajvol:., 1wheel, 203.109.252.xxx, 213.253.40.xxx, 3rdTriangle, 7265, A Geek Tragedy, ALargeElk, AS, Aaron Brenneman, Acatyes, Acebrock, Aeons, Ahoerstemeier, Akb4, Aladdin Sane, Aldie, AlexanderTsamutali, Ali@gwc.org.uk, Alpha Quadrant, Amber388, Ameltzer, Andre Engels, AndreaPersephone, Andrew Gray, Andrzej P. Wozniak, Andy Dingley, Angela, Anonywiki, Apokrif, Apyule, Archivist, Aschmidt, Ashley Pomeroy, Atstarr, Ausir, Avicennasis, AxelBoldt, Azrael Nightwalker, BMartin101, Babajobu, Bairam, Balph Eubank, Banjokangaroo, Barberio, Bbb23, Bdesham, BeckiGreen, Beetstra, BenRG, Beno1000, Betterworld, Bevo, Big gun, Bjelli, Blair P. Houghton, Blenda Lovelace, Bloodshedder, Boardworks, Bob Re-born, Branko, Breawycker, Bur, C. A. Russell, CSTAR, CXI, Camw, Can't sleep, clown will eat me, Carl Caputo, Chadloder, Chameleon, Chaos0104, Cholten99, Chowbok, Chris the speller, Chuq, Cimon Avaro, Classicrockfan42, Claudomiro Jr, Closedmouth, Coccyx Bloccyx, Coemgenus5833, Colin Marquardt, Colin Watson, ComCat, Commander, Computerjoe, Conversion script, CoyneT, Crculver, Credema, Crusadeonilliteracy, Crystallina, Cshirky, Cyde, Cymru.lass, CyrilB, D-Rock, DMacks, DMahalko, DXBari, Daran, Darrell Greenwood, David Biddulph, Dawnseeker2000, Dcljr, Delirium, Denimadept, Denisarona, Derex, Devovo, Digiskunk, Dijxtra, Discordance, Disdero, Djm101, DocWatson42, DragonflySixtyseven, Dreamdrink1, DrewT2, Drinkybird, Ds77, Dysprosia, EagleOne, Eardrum, Ed Poor, Edward Vielmetti, Eequor, Egil, Egriffin, Electron9, Eli the Bearded, EncMstr, Eponymous Coward, Eqdoktor, EqualRights, Ericward, ErkinBatu, EronMain, Essjay, EurekaLott, Ewx, F, Fatal, Favonian, Fbriere, Feedmecereal, Felixcatuk, Feureau, Fish and karate, FlippyFlink, Fnoel777, Formeruser-82, Fresheneesz, Fubar Obfusco, Funandtrvl, Fys, GHe, Gal Buki, Galoubet, GavinFavin, Giannioneill, Gigs, Gioto, Goplat, Gord1234, Graham87, Grawity, Green Giant, Greglocock, Grue, Grunt, Guy Harris, HPSCHD, Haakon, Hairy Dude, Hamsterlopithecus, Hans Carlos Hofmann, Hanteng, HappyDog, Harryzilber, Hawk777, Headbomb, Heerat, Hhielscher, HiEv, Hiii98, Hillman, Hipocrite, Huangdi, IanManka, Ianmacm, Icairns, Ichudov, Infrogmation, Insomniac By Choice, Inverterus, Invisifan, IraChesterfield, Itai, J'onn J'onzz, JJL, JLaTondre, JSeeds, JVinocur, Jabowery, Jalwikip, James Kemp, JamesMLane, Jandalhandler, Jason Potter, Jaxl, Jb1126, Jeffrey O. Gustafson, Jeh, Jgrahn, Jibjibjib, Jjk, Jmozena, Jnavas2, Jodi.a.schneider, John, John Vandenberg, JonHarder, Josephf, Joyous!, JuJube, JulesH, Junon, Just zis Guy, you know?, Justice12, Karada, Karen Johnson, Karmafist, Karn, KathrynLybarger, Kbrose, Kintetsubuffalo, Klemen Kocjancic, Koolabsol, Korossyl, Krishandutt, Krupo, Ksnyder1955, Kwright06, LFaraone, Laney, Larvatus, Lbs6380, Ldhotsoup, LedgendGamer, Lee.Sailer, Legalize, Leonard^Bloom, Ligulem, LiquidHAL, Loadmaster, Lotje, Lowellian, Lucky 6.9, LukeSurl, M1ss1ontomars2k4, M7, MSTCrow, Maabof, Mabdul, Mac, MadnessRules, Magister Mathematicae, Majilis, Malthus321, Mamling, Mandarax, Marcika, Mardeg, Marj Tiefert, Mark Richards, MartinHarper, Marudubshinki, Masharabinovich, Matthuxtable, Mattmcc, Mboverload, Mccready, Mdebets, Melsaran, Michael B. Trausch, Michael Hardy, Midway, Migukin, MinorContributor, Mirror Vax, Modemac, Momposi, Moose Mike, MoraSique, Mortense, Moxfyre, MrOllie, Msh210, Msikma, Mskg2, Mumble45, Myasuda, NawlinWiki, Nburden, Nealmcb, Nertzy, Nick Number, NickCatal, Nil Einne, Nollij, Nonky, NorwegianMarcus, Not a dog, Nydas, Omniplex, Ost316, Paine Ellsworth, Paris1745, Patrick, Paul Benjamin Austin, PcGnome, Perfecto, Petchboo, Pete142, PeterSymonds, Peterdjones, Petri Krohn, Pgan002, Phil Boswell, PhilHibbs, Picaroon, Pigsonthewing, Pilotguy, Piotrus, Pipatron, Pmsyyz, Ponder, Poseidon^3, Preost, Projanen, Publicly Visible, Pyrospirit, Q9a, RK, Radagast, Radivx, RandalSchwartz, Randybias, Rapido, Rasmus Faber, Rcgldr, Rchamberlain, Redddogg, Redlentil, Renkor88, Reportersteven, Retired username, Revolus, RexNL, Riadlem, Richard Catto, RipWikipedia, Rjordan1628, Rjwilmsi, Rlandmann, RoshanKochar123, Rossumcapek, RoyBoy, Rp, Ryan032, Rydel7, SHCarter, SMcCandlish, Saaws, SaltyBoatr, Sam Hughes, Sam jervis, Sango123, SarekOfVulcan, Saros136, SaveThePoint, Scandum, Scorpiona, Search4Lancer, Sega381, Seitz, Sesshy, Sfan00 IMG, SgtCheeseNOLS, Shii, Shoeofdeath, Shpxurnq, Sidasta, SilkTork, Slashme, SmitherIsGod, Solidsandie, Solitarius, Sounddoctorin, Sp3000, SpeedyGonsales, Srlbraintree, St cuthbert, Stan Shebs, Starblind, Stedder, Stephen, Steve Crook, Stevenj, Stevenrasnick, Strait, SubSeven, SuperDuperMan, SymlynX, THEMlCK, TJRC, TNLNYC, TakuyaMurata, Tamfang, Tarquin, Tawker, Tbarrie, Tedernst, Tedickey, TharsHammar, That Guy, From That Show!, The Cunctator, TheAnarcat, TheRaven7, TheSun, Theone256, Thibbs, Thynks, Tim Starling, Tinlash, Tlesher, Tlhjw3, Tobias Bergemann, Toby Douglass, Tomos, Tompagenet, Tpbradbury, Trashcanjunkmeel, Triceron, Triedandtested, Tuspm, Tuxisuau, Twp, UVnet, Udcright, UfoFreak, Ulchm, Uncle Dick, Uncle G, UnitedStatesian, Usenet0428, Usenetfriend, Versageek, Vicki Rosenzweig, Vina, Voidxor, Vttale, W163, Wavelength, Wayfarer, Weedly, Weregerbil, West.andrew.g, WhisperToMe, White 720, WillC, William Ortiz, Williamsonom, Wmahan, WojPob, Woohookitty, Writtenonsand, Wsuo, Xeno, Xhantar, Xichael, Xizer, Xlation, Xtifr, Zachera, Zen Clark, Zickzack, Zigger, , 2, 671 anonymous edits

419

Article Sources and Contributors


X.25 Source: http://en.wikipedia.org/w/index.php?oldid=526321826 Contributors: Abdull, Adamantios, Ahoerstemeier, Aldie, Barberio, Bernard Franois, Birczanin, Caomhin, Charivari, CharlesGillingham, Cocjh1, Commking, CommonsDelinker, Cpiral, Crissov, Daenney, Dave314159, Dawnseeker2000, Deceglie, Dermots, Dgtsyb, Dialate, Doodlebug777, Dougher, EoGuy, Eric Shalov, Ermishin, Ewlyahoocom, Eyreland, Finlay McWalter, FromOrleans, GK tramrunner, GL, Gaius Cornelius, Gary Brown, Gbuchana, Gidonb, Gogo Dodo, Guy Harris, Gzornenplatz, Hadal, Haikupoet, HarisM, Hcberkowitz, Headbomb, Helix84, Hella, Huntscorpio, ISC PB, Ilario, IlliniFlag, IrishFlukey, Itai, Itpastorn, Ivansanchez, Jgoodchild, John of Reading, JonHarder, KMeyer, Kanchanghavle, Karl Dickman, Karlward, Kbrose, Kizor, Kotul, Kurgus, Kvng, LeadSongDog, Leikai Meetei, Lightmouse, Lumos3, Mange01, MarkWahl, Maury Markowitz, Mblumber, MementoVivere, Merlion444, Mikeroetto, Mortein, Nwsmith, Overand, Pieman196, PrimroseGuy, Prof 7, Quibik, RFClover, RJII, Ray Dassen, Reedy, Rich Farmbrough, Rjwilmsi, Ronz, RoySmith, SAK, Smack, Sparky-sama, Stewartadcock, Tagishsimon, Tonkie67, Vacuum, VampWillow, Vaughan, Villarinho, Wdchk, Wk muriithi, YUL89YYZ, Yaronf, 158 anonymous edits "Internet" or "internet"? Source: http://en.wikipedia.org/w/index.php?oldid=527396129 Contributors: Afiler, Afterwriting, Alvestrand, AndrewHowse, Benwing, BirgitteSB, Chridd, Coolcaesar, Dgaul12, DreamGuy, Editfromwithout, Elmer Clark, Fittold27, Funnyhat, GreatWhiteNortherner, GregorB, Hooverbag, Jer16, JonHarder, Joseph Solis in Australia, Kbrose, Keith111, Kitsunegami, Kjoonlee, LilHelpa, M.nelson, MikeDCE, Nigelj, Nohat, NorwegianBlue, Nurg, Oren0, Phoenixrod, Piperh, Postdlf, Psiphiorg, RaseaC, RastaKins, Reaper Eternal, Reywas92, Riggr Mortis, Rp, Scientus, Skew-t, Supertouch, TDWolsey, Tapatap123, Timocrates, Wrs1864, Wschclc, Zimbabweed, 41 anonymous edits Internet Protocol Suite Source: http://en.wikipedia.org/w/index.php?oldid=469772795 Contributors: 130.243.79.xxx, 203.109.250.xxx, 213.253.39.xxx, 66.169.238.xxx, A8UDI, Aapo Laitinen, Abdull, Abdullais4u, Acceptus, Acroterion, Aeonx, Ahoerstemeier, Alansohn, Albanaco, Aldie, Ale2006, Alek Baka, AliMaghrebi, Aliasptr, Alireza.usa, AlistairMcMillan, Amungale, Ana Couto, Aneah, Anna Lincoln, Anon lynx, Anororn, Arcenciel, ArchonMagnus, Arteitle, ArticCynda, Avant Guard, Avicennasis, Axcess, AxelBoldt, B4hand, Barberio, Barnacle157, Beland, Bender235, Bentogoa, Bernard Franois, Betterworld, Bezenek, Bhavin, Biot, Bloodshedder, Bmicomp, Branko, Breno, Brian.fsm, Brion VIBBER, Camw, Canthusus, CaptainVindaloo, Carnildo, Casey Abell, Cate, Cburnett, Cf. Hay, Chadernook, Cheesycow5, Ckatz, Clark42, Coasting, Conversion script, Coolcaesar, CrinklyCrunk, Ctm314, Cybercobra, Cynthia Rhoads, DARTH SIDIOUS 2, Damian Yerrick, Daniel Staal, DanielCD, Darkhalfactf, DavidDW, DavidDouthitt, Denisarona, DerekLaw, Dgtsyb, Dicklyon, Disavian, Dmeranda, Dnas, Dogcow, Donjrude, Doradus, Dorgan65, Doug Bell, Drphilharmonic, Duffman, EagleOne, Ed g2s, Edmilne, Edward, Edwardando, Eeekster, Ekashp, Electron9, Ellywa, Elwood j blues, EnOreg, EncMstr, Enjoi4586, Epbr123, Eptin, Equendil, Ericl234, Erik Sandberg, Ethanthej, Etu, Evil Monkey, Evil saltine, Expensivehat, Falcon9x5, Falcor84, Ferkelparade, Fixman88, Fr34k, Freyr, GaelicWizard, Geneb1955, Gilliam, Glane23, Glenn, GlobalEdge 2010, Globemasterthree, Golbez, GordonMcKinney, Graham87, Gringo.ch, Gsl, Guy Harris, Haakon, Hadal, Hairy Dude, HarisM, Harryzilber, Hasty001, Hcberkowitz, Headbomb, Helix84, Here, Hoary, Holylampposts, Hpnguyen83, Hyad, IMSoP, Ilario, Imcdnzl, Imran, Indeterminate, Indinkgo, Inhumandecency, Inomyabcs, Intgr, Itai, J.delanoy, JTN, Jackqu7, James Mohr, JamesBWatson, Jantangring, Jatkins, JediMaster362, JesterXXV, Jimp, Jmdavid1789, Jnc, Joanjoc, John Vandenberg, Johnblade, Johnuniq, JonHarder, Jorunn, Jrogern, Jsoon eu, Jusdafax, JustAGal, KYPark, Kaare, Kasperd, Katieh5584, Kbrose, Kim Bruning, Kim Rubin, KnowledgeOfSelf, Kocio, Konman72, Koyaanis Qatsi, Krauss, Krellis, Kungming2, Kusma, Kvng, Kyng, Labongo, Larree, Law, Layer, Leapfrog314, Lee Carre, Locketine, Logictheo, Lova Falk, Luna Santin, Magioladitis, Magister Mathematicae, Maltest, Mandarax, Mange01, Manop, Marcika, Martyman, Martyvis, Master Conjurer, Matt Dunn, Mattbrundage, Matthew Woodcraft, Matusz, Mav, Mckoss, Mechanical digger, Meiskam, Mendel, Merlissimo, Metaclassing, Michael Hardy, Miles, MilesMi, Mintguy, Mothmolevna, Mrzaius, Mukkakukaku, Mwarren us, Mzje, NE Ent, NMChico24, Nasz, Navedahmed123, NawlinWiki, Nealcardwell, Nealmcb, NewEnglandYankee, Ngriffeth, Nhorton, Nick C, Niteowlneils, Nivix, Nixdorf, Nknight, Nmacu, Northamerica1000, Nubiatech, Nv8200p, Obradovic Goran, Oheckmann, Olathe, Otets, OttoTheFish, Oxwil, Oxymoron83, P. S. F. Freitas, Palfrey, Papadopa, Patilravi1985, Paul, Paul Koning, Paulkramer, Perfectpasta, Peripitus, Pfalstad, Pharaoh of the Wizards, Phgao, Piano non troppo, PioM, Plugwash, Pokeywiz, Poslfit, Pps, Public Menace, Punjabi101, Putdust, Quinxorin, R'n'B, RaNo, Radagast83, Ramnath R Iyer, Rayward, Rbhagat0, Reaper Eternal, RedWolf, Reliablesources, RevRagnarok, Rich Farmbrough, Rich257, Richardwhiuk, Rick Block, Rick Sidwell, Rjd0060, Rjwilmsi, RobEby, RobertG, RobertL30, Roberta F., Robost, Rodeosmurf, Ross Fraser, Rrelf, Rserpool, Runis57, Ruthherrin, SJP, STHayden, SWAdair, Samjoopin, SasiSasi, Seaphoto, Sheldrake, Shii, Shiraun, Shiro jdn, Shizhao, Sietse Snel, Sitush, Sjakkalle, Skullketon, Smartse, Smjg, Snaxe920, SnoFox, Spmion, Stahla92, StanQuayle, Staszek Lem, Stefan Milosevski, Stephan Leeds, Stephenb, Suffusion of Yellow, Sully, Sunray, SuperWiki, Suruena, Svick, Swhitehead, Swpb, Ta bu shi da yu, Tagishsimon, Tarquin, Tassedethe, Techmonk, Techpro30, Template namespace initialisation script, Tfl, That Guy, From That Show!, Thatguyflint, The Anome, The Nut, TheOtherJesse, Theresa knott, Thingg, Thumperward, Thunderboltz, Thw1309, Tide rolls, Tim Watson, Timwi, TinaSDCE, Tmaufer, Tmchk, Tobias Hoevekamp, TomPhil, Topbanana, Tr606, Tyler, Typhoon, Ukexpat, Unyoyega, Vanis314, Vegaswikian, Victor Liu, Violetriga, W163, Wadamja, Waggers, Wavelength, Weregeek, West.andrew.g, Weylinp, Whereizben, Widr, Wiki104, Wikid77, Wikiklrsc, William Avery, Wimt, Winston Chuen-Shih Yang, Wolfkeeper, Wonderstruck, Woohookitty, Wrs1864, XJamRastafire, Xeesh, Xojo, Xos, Yakudza, Yas, Ydalal, Yudiweb, Yunshui, ZNott, Zac439, Zeerak88, Zfr, Zigger, Zoicon5, Zondor, Zundark, Zvezda1111, ^demon, 448 , anonymous edits Internet access Source: http://en.wikipedia.org/w/index.php?oldid=527342057 Contributors: 16@r, A p3rson, A. B., A. Parrot, A11ectis, ABehrens, Aaaarg, Abeg92, Ahuskay, Alan Liefting, Allens, Andycjp, Anniex10, Atreys, Beland, Bkil, Bkimmitt, Bluebank83, Bogdan, Booyabazooka, Carmitsp, Ccacsmss, Chase me ladies, I'm the Cavalry, CieloEstrellado, Cmoosbrugger, Commaygr, CommonsDelinker, Cricketgirl, Crohnie, Dave1185, DeadlyAssassin, DirkvdM, Discospinster, Djmckee1, Download, Drmies, Edward321, Eptin, Ewc21, Fakir005, Fluffernutter, Fraggle81, FringeOkapi, Ge4ce, Glenn, GojiraIsNotTechDeath, Gracefool, Haseo9999, Headbomb, Hu Gadarn, Itake, JMcNamara229, Jarms31, Jeff Silvers, Jemappelleungarcon, Jim.henderson, JivaGroup, Jmccormac, Jnavas, Joseph Solis in Australia, Joy, Justonemoreday, Karl Meier, Katpatuka, Kgfleischmann, KillaKilla, Kjoonlee, Kmccoy, Kris klif, Lgfcd, Lightmouse, Lights, Lisae, Lmatt, Logan, Lquilter, Maine12329, Martyleehi, Mattozanne, MelbourneStar, Mirror Vax, Mkm519, Mogism, Mortense, MrOllie, Muhandes, Nerd 101, NerdyNSK, Nrautava, Nurg, Obelix83, Opticalgirl, PCock, PigFlu Oink, Ratemonth, Rick Block, Rkononenko, Robertsteadman, Robertvan1, SBaker43, SHCarter, SangeYasha, Sebastian Goll, ShakingSpirit, Snori, Souravmohanty2005, Th1rt3en, Theisplisting, Tide rolls, TotalFailure, Twburger, Undress 006, Vreemdst, W Nowicki, W163, Waldir, Warfreak, Wavelength, Whpq, Widr, Wikignome0530, Wjfox2005, Xaxafrad, Zachlipton, 204 anonymous edits Broadband Internet access Source: http://en.wikipedia.org/w/index.php?oldid=468726353 Contributors: 16@r, A p3rson, A. B., A. Parrot, A11ectis, ABehrens, Aaaarg, Abeg92, Ahuskay, Alan Liefting, Allens, Andycjp, Anniex10, Atreys, Beland, Bkil, Bkimmitt, Bluebank83, Bogdan, Booyabazooka, Carmitsp, Ccacsmss, Chase me ladies, I'm the Cavalry, CieloEstrellado, Cmoosbrugger, Commaygr, CommonsDelinker, Cricketgirl, Crohnie, Dave1185, DeadlyAssassin, DirkvdM, Discospinster, Djmckee1, Download, Drmies, Edward321, Eptin, Ewc21, Fakir005, Fluffernutter, Fraggle81, FringeOkapi, Ge4ce, Glenn, GojiraIsNotTechDeath, Gracefool, Haseo9999, Headbomb, Hu Gadarn, Itake, JMcNamara229, Jarms31, Jeff Silvers, Jemappelleungarcon, Jim.henderson, JivaGroup, Jmccormac, Jnavas, Joseph Solis in Australia, Joy, Justonemoreday, Karl Meier, Katpatuka, Kgfleischmann, KillaKilla, Kjoonlee, Kmccoy, Kris klif, Lgfcd, Lightmouse, Lights, Lisae, Lmatt, Logan, Lquilter, Maine12329, Martyleehi, Mattozanne, MelbourneStar, Mirror Vax, Mkm519, Mogism, Mortense, MrOllie, Muhandes, Nerd 101, NerdyNSK, Nrautava, Nurg, Obelix83, Opticalgirl, PCock, PigFlu Oink, Ratemonth, Rick Block, Rkononenko, Robertsteadman, Robertvan1, SBaker43, SHCarter, SangeYasha, Sebastian Goll, ShakingSpirit, Snori, Souravmohanty2005, Th1rt3en, Theisplisting, Tide rolls, TotalFailure, Twburger, Undress 006, Vreemdst, W Nowicki, W163, Waldir, Warfreak, Wavelength, Whpq, Widr, Wikignome0530, Wjfox2005, Xaxafrad, Zachlipton, 204 anonymous edits Languages used on the Internet Source: http://en.wikipedia.org/w/index.php?oldid=521269832 Contributors: 16@r, Aaker, AbsoluteWikis, Actarux, Alan Liefting, AlexLibman, Alt-sysrq, Amberrock, Benlisquare, Benne, Bluedenim, Bobbymaestro, Bushhopper, Carradee, Cowmadness, Danielpimienta, Danutz, Darkanius, Djbaniel, Eleassar, Excirial, Eyesighter, FreplySpang, Galoubet, GamerSam, Garzo, Gdupont, Gilliam, Haddiscoe, Headbomb, Hu12, Hyacinth, Insanity Incarnate, J.puckett, JamieA, Jayetheartist, John, JonHarder, Joowwww, Joseph Solis in Australia, Juan M. Gonzalez, Kbrose, Kewi1231, Kozuch, Le Anh-Huy, Lele giannoni, Libraryg, Lobizn, LogicDictates, Loginer, Lu Wunsch-Rolshoven, Luna Santin, Madden, MaxvJ, Meno25, Mieciu K, Mike hayes, Mikeo, Nautilator, Nigelj, Node ue, OlEnglish, Oscarch, P30Carl, Pnm, Quest for Truth, Reality006, Rich Farmbrough, Robin611, Roke, Rudykog, SasiSasi, Scott.mclay, Shawnc, Shoeofdeath, Shriram, Simesa, Stanqo, Stephen G. Brown, Sticksnstones, Sunquanliangxiuhao, Tallungs, ThaddeusB, Third, Tim!, Veni Markovski, W163, Wavelength, Werldwayd, Wiikipedian, Wikipedico wikipedico, Wrs1864, , 106 anonymous edits List of countries by number of Internet subscriptions Source: http://en.wikipedia.org/w/index.php?oldid=472005390 Contributors: 16@r, Abrahamian, Abtinb, Agila81, Alensha, AlexCovarrubias, Alexlex, Anir1uph, Applepie, Arab Hafez, Arain321, Arjun024, Atrix20, Avidius, Bart133, Bcs09, Beefy586, Bine Mai, Bitbit, BubbleDude22, By78, ByaAkai, Chipmunkdavis, CieloEstrellado, Ckatz, Colonies Chris, Cybercobra, DVoit, Dany Hilmi Amrullah, DedMed, Deusdies, Dian Maulana Zhokabo, Dstlascaux, Dwrcan, Eastlaw, Eiad77, Elockid, Emijrp, Emilfarb, Emirati Icon, Erik Zachte, Falsegeek, Filippusson, Frichmon, Fundamental metric tensor, Future Perfect at Sunrise, Gabrielsouza15, GangadharD, Geistcj, Giftlite, Greyhood, Harryzilber, Harsha850, Harshvardhansonkar, Headbomb, Heimstern, Hkb16, Hmains, Hsarlak1, Hu12, Icairns, Inx272, Ireneswu, Jayhamel, Jim.henderson, Jklamo, JodiKingzet, Joerow, Johann Wolfgang, John, Johnny Au, Johnny0234, JorgeRodriguez, Justastupidman, Kasaalan, Kawaputra, Khalidshou, KirrVlad, Kkm010, Klykken, Kozuch, Kulasman, LittleBenW, MAXXX-309, Mabdul, MacedonianBoy, Mangy Cheshire Cat, Maqayum, Mariusmiti, Minesweeper8383, Missionary, Mittal.fdk, Mkdw, Moshirah, Mothybrown, Mr. Wikipediania, MuffledThud, Murano333, Mysdaao, NickPenguin, Ojcon, P30Carl, PBP, PYX-340, Perverse incentive, Plankeper, Potito m. petrone, Pristino, Propars55, Rahlgd, Redking7, Retro00064, RobertHuaXia, S.rvarr.S, Sarabandt, Satyanandapatel, Selecciones de la Vida, Sertion, Sharkkiller2050, Siavash Ad, Singh2312, Slashsharma, Sonny00, StalwartUK, StasMalyga, Surfbear335, Tallungs, Tavrian, Tequendamia, The idiot, Themeparkgc, Timeshifter, Topher won, Tungka, Utero-1993, VFHenriques, Venajaguardian, Vlad, Vtstarin, W163, Wicojrpr, Yiezia, Zhenqinli, Zhonghuo, Zollerriia, 622 ,42..anonymous edits List of countries by number of broadband Internet subscriptions Source: http://en.wikipedia.org/w/index.php?oldid=526465727 Contributors: Andrwsc, Applemad, Arjun024, Arms8586, Atgnclk, Avionics1980, Berk, By78, CieloEstrellado, Colonies Chris, Cybercobra, Dany Hilmi Amrullah, Eastlaw, Edson Rosa, Electriccatfish2, Elockid, Estoy Aqu, Fa2f, Fookjian95, Gabrielsouza15, Gary King, Hankwang, HasperHunter, Hmains, Ireneswu, Jacklee, Jim.henderson, John, John of Reading, Kingroyos, Kittoo, Kkm010, Langus-TxT, Lmaotheone, Manchurian candidate, MarcosPassos, Matt.T, Nathalie ITU, Naveenpf, Nightkey, Pardn, Perverse incentive, Poliphile, Pristino, Quest for Truth, Rahlgd, Rahulk.cmc, Rich Farmbrough, Sonny00, Soulflytribe, StasMalyga, Usergreatpower, W163, Wrikipedia, Zhonghuo, , 103 anonymous edits Internet governance Source: http://en.wikipedia.org/w/index.php?oldid=518923879 Contributors: Aesopos, Alanlevin, Beland, BioTube, Bkuerbis, Boujemi, Btyner, Calvin 1998, Carioca-2008, Chris the speller, Coelacan, Commonbrick, CorbinSimpson, Dasha.g, Donama, Eken7, Eumolpo, FabioMr, Flywheel, Froomkin, Gaius Cornelius, George Kaplan 103, Hqb, Hu12, Iwaszkiewicz, Japanese Searobin, Jarble, Jennavecia, Joffeloff, Kattmamma, Kernel.package, LilHelpa, Maelorin, Malhi gurdial, Marie61, MrOllie, Mvihuri, Nealmcb, Nibbleszorz, NickelShoe,

420

Article Sources and Contributors


Pandion auk, Paul, Phellmon, Piotrus, Ronz, Ruud Koot, Sjjupadhyay, StephanieBP, Syrthiss, TW 75, Theymos, UkPaolo, Valentino k, Vivon1, W163, Woohookitty, ZeWrestler, Zsaulkalns, 56 anonymous edits Timeline of popular Internet services Source: http://en.wikipedia.org/w/index.php?oldid=527037919 Contributors: 1ForTheMoney, Abdouss Wafi, Bjung, Catgut, Filceolaire, Hallows AG, Johnuniq, Kbrose, Kyle1278, Micru, Mild Bill Hiccup, Mogism, NexCarnifex, Ottawahitech, Quiname, W163, WikiTome, Woohookitty, Ylem, Zighweng, 45 anonymous edits Email Source: http://en.wikipedia.org/w/index.php?oldid=527356968 Contributors: 100110100, 16@r, 194.236.5.xxx, 228086, 247email, 28421u2232nfenfcenc, 2D, 7, 90, A More Perfect Onion, A purple wikiuser, A. B., A53collins, Abkovalenko, Achowat, AdSR, Adamcox82, Adw2000, Aesopos, Aff123a, Agather, Agent2693, Agheefner, Ahmahran, Ahoerstemeier, Akell567, Aktrelly, AlainV, Alan Liefting, Alanpratt05, Alansohn, Ale2006, AlexWaelde, Alexius08, AlexiusHoratius, Alexjohnc3, Alitlebitsexy, Aliza250, Allynnc, Alphathon, Amire80, Amniarix, Anastrophe, Anaxial, Andareed, Andrejj, Andrew Eugene, Andrzej P. Wozniak, Andy Dingley, Andyiou52, Andylkl, Angela, Ann Stouter, Anna Lincoln, Anomalocaris, Another n00b, Antoine854, AntonioMartin, Anwar saadat, Arakunem, Arcandam, ArchonMagnus, Arjuno3, Armando49, Art LaPella, Arthur Holland, Asdasd12324, Aspandphp, Augurar, Avicennasis, Avoided, Aztrelly, Bachrach44, Bad edits r dumb, Badcop666, Baiji, Bald Zebra, Barefootguru, Barry26, Basawala, Battoe19, Bayle Shanks, Beao, Bearly541, Beesman, Beland, Belugaperson, Benq2010, Benwildeboer, Better email better life, Bhadani, Bhobbit, Big Bird, Bigbluefish, Bigderom, Biggity, Birdman1, Bkil, Blitzinteractive, Blue520, Bluemask, Bnorrie, Bob98133, Bobrayner, Bobzayton489, Bomac, Bomazi, Bonadea, Bongwarrior, Boothy443, Boyhampus, Bshurtz, Bubba hotep, Buckinghampalace101, Bulldog73, Butros, C'est moi, C+C, C777, CIS, CTF83!, Caesura, Cafeduke, Calabe1992, Calliopejen1, Callmejosh, Caltas, Calvin 1998, Camarac, CambridgeBayWeather, Cameforu, Can't sleep, clown will eat me, Canaima, Canihaveacookie, Canterbury Tail, CapitalR, CapitalSasha, Capricorn42, CaptainCat, CardinalDan, CattleGirl, Causa sui, Cboy676, Ccacsmss, CellMan0677, CesarB, Cfp, Cglenn3932, Chadude, Charles Gaudette, Chato, Chatul, Chester Markel, Chisophugis, Chithrapriya, Chivasboi345, Chmod007, Chowbok, Chris G, Chrislk02, Chrismaster1, Christopher Parham, Chuq, Ckatz, Classfun, Classicfilms, ClaudineChionh, Closedmouth, Cmartell, Cometstyles, Comm 212 8, Comm151student, Comm212gr5, Commander, Comodo, Compo, Computerjoe, Conan, Conversion script, CoolChris99, Corti, Courcelles, Cpl Syx, Crackerwashere, Crazyparty16, Crazyperson324, Credema, Cresix, Crismas, Cutechar, Cyanoa Crylate, Cybercobra, D. Recorder, DGRichard, DRosenbach, DVdm, DXRAW, Da.skitz, Dalesgay, Dan D. Ric, Dandv, Dangerousdanman, Daniel C. Boyer, Daniel Quinlan, Daniel.Cardenas, Danorton, Darac, Darkride, Darth Panda, Dave souza, Davecrocker, David Rolek, David in DC, DavidCary, DavidWBrooks, Davidcannon, Davidx2, Dawn Bard, Dawnseeker2000, Dean, Dede2008, Demitsu, Demiurge1000, Denisarona, DerHexer, Derek Ross, Derekmciver, Derekvicente, Dhaun, Dhoom4, Digitalme, Discospinster, Dlong48, Dmccreary, Doc marseille, Doctorrace, Domitori, Douglas W. Jones, Dr Pukhtunyar Afghan, Dr.s.t.ruggling, DragonHawk, Dragory, Dreadstar, Dreammixtr, Drilnoth, Drj, DropDeadGorgias, Drumsac, Duncan Keith, Durcar86, Dwo, DylanW, Dysprosia, Dzordzm, Dugosz, EJavanainen, ESkog, Eaefremov, EagleEye96, Earendil56, Eastmain, Eclecticology, Ed Poor, Edgerck, EdwardZhao, El pobre Pedro, ElKevbo, Eliezer Aharon, Ellywa, Emailexperiencecouncil, Emailxpert, Emily GABLE, Emmy.rose, Emperorbma, EncMstr, Encyeditor, Enric Naval, Enviroboy, Epbr123, Erdal Ronahi, Erianna, Eric-Wester, Erik Lnnrot, ErikWarmelink, EscapingLife, Etacar11, Etz Haim, Evaders99, Everyking, Ewlyahoocom, Extransit, FFM784, FMasic, Faisal.akeel, Falcon8765, Farawayfrom, FastLizard4, Fatbroker, FayssalF, Fcp, Fearless Son, Feedmecereal, Fieldday-sunday, Fisc, Fl, Fleminra, Flockmeal, Florian Blaschke, Fnlayson, Foodlol123, Forage, Fourthords, FrancoGG, Frecklefoot, Fredrik, Freeaqingme, Frehley, FreplySpang, Frodet, Fubar Obfusco, Funnyfarmofdoom, Furrykef, Fuzzie, Gabeharvell123, Galaxy250, Galoubet, Gareth Griffith-Jones, Garkbit, Gary King, Gdr, Gejigeji, George2001hi, Ghemachandar, Gianfranco, Giftlite, Gilliam, Giseburt, GliderMaven, Gnome de plume, Gnuish, Gogo Dodo, Golgofrinchian, Gollobt, Graham87, Granichk, Green caterpillar, Gribeco, Grosscha, Grumpyyoungman01, Gsklee, Guppy, Gurch, Guy Harris, Guybrush, Gzkn, Hadal, Hairhorn, Hairy Dude, Hallows AG, Hanoman, Hans Carlos Hofmann, Happysailor, Hardyplants, Harej, Harris7, Harry, Harryboyles, Harryzilber, Headbomb, HeikoEvermann, Heinzi.at, Hello32020, Heron, Hew, HexaChord, Hilgers08, Hm2k, Hobomason, HolyStranger, Hoplon, Hovn, Hu12, Hullbr3ach, Hvn0413, Hymek, IRP, Iainh, Ibizr, Icairns, Ida Shaw, Iflynet, Ignacioerrico, Illegitimate Barrister, Ilmari Karonen, Ilya-108, Imran, Inkington, Insanephantom, Inspector 34, Intgr, Ioapetraka, Ionidasz, Iridescent, Irishguy, Itai, Ivan Pozdeev, J-Star, J.delanoy, JForget, JLaTondre, JRM, JTN, Jackzhp, Jafeluv, Jaizanuar, Jallar, JamesBWatson, Jan eissfeldt, Jasper Deng, JayJasper, Jddphd, Jdforrester, Jebba, Jeff G., Jeffm2011, Jer10 95, JeremyA, Jesse Viviano, Jfdwolff, Jfire, Jiddisch, Jimthing, Jinxynix, Jj137, Jjl33, Jlandis, Jmundo, Jnc, Jnk, Jnothman, Jodi.a.schneider, JodyB, Joel Rennie, Joemcboi, John Covert, John a s, JohnOwens, Johnny Bin, Jomunro, Jon Harald Sby, JonHarder, Jonik, Joseph Solis in Australia, Josh the Nerd, Joshhirstwood, Joy, Jprg1966, Jredmond, Ju66l3r, JuJube, Juliancolton, Jumbuck, Jusdafax, Jusjih, Jwoodger, KC., KF, KPH2293, KPWM Spotter, Ka-Ping Yee, Kafuffle, Kaliumfredrik, Karcamp, Kaszeta, Katalaveno, Kazikameuk, Kbrose, Kdammers, Keilana, Kiamde, Kingpin13, Kingturtle, Kjkolb, Klykken, KnowledgeBased, KnowledgeOfSelf, Koavf, Koenige, Kooljay253, Kowey, Krushdiva, Kuru, Kvng, Kwamikagami, Kwshaw1, L Kensington, LBM2388, LC, LX, La Parka Your Car, LaFoiblesse, Lacrimosus, LarryQ, Last Avenue, Lathama, Leandrod, Lee Daniel Crocker, LeighvsOptimvsMaximvs, Lerdsuwa, Levineps, Liamob1993, Liftarn, Lightdarkness, LilHelpa, Lilac Soul, Lineface, Lisabelleg, LittleBenW, Llykstw, Llywrch, Logan, Lomonline, Lonestarcowboy, Longhair, Lordmac, Lotje, Louie Franco, Lucasik, Lucky 6.9, Luckylive, Lunboks, Lupo, MER-C, MFH, MIT Trekkie, MWelchUK, Mabdul, Mac, MadGuy7023, Magioladitis, Magister Mathematicae, Magnus Manske, Maheshkale, Majorly, Makro, Mani1, Manticore, Maralia, Marcus Brute, Marcus Qwertyus, Mark, MarkGallagher, MarkSweep, Martaw22, Masaruemoto, MattGiuca, Mattbr, Matteh, Maxis ftw, Mbekula, Mboverload, MccowattMAS229, Mcr314, Mdwyer, Meand, Meekywiki, Meelar, MelcomRSA, Melizg, Melmann, Mendors, Mentifisto, Mephistophelian, Merciadriluca, Merry Devil, Mets501, Mhackmer, Michaelbusch, Michiyoo, Midnightcomm, Mifter, Mike Payne, Mike Rosoft, Mikker, Mild Bill Hiccup, MindlessXD, Minghong, Minimac, Minitrue, Mm40, Mmwaseermohamed, Mogglewump, Monkey Bounce, Monty845, Moondyne, Motor, Mozillar, Mqduck, Mr. Prez, MrPrada, Mrlee321, Mschel, Msikma, Mtlk, Mu, Muhandes, Mursyids, Mutchy126, Mwalimu59, Mxn, Mystical504, NHRHS2010, Nabeth, Nageh, Nanshu, Naohiro19, NatusRoma, NawlinWiki, Nbarth, Nealmcb, Nebula17, Nehtefa, NeilN, Nelson50, Nemo, Neon white, Neurolysis, Neustradamus, NewEnglandYankee, Newportm, Nick, Nick C, NickGarvey, NickdelaG, Nickhonner, Nickptar, NigelR, Nightscream, Nikai, Nikola Smolenski, Nilfanion, Niqueco, Nivix, Njl, Nol888, NormDor, Not telling, Notsocoolkid, Novasource, Nsaum75, Nubiatech, Numbo3, Nurg, Nuttycoconut, Nxu009, Nzseries1, Ohadgliksman, Ohnoitsjamie, Ojw, OlEnglish, Olgerd, Oliphaunt, Oliver Pereira, Oliver202, Olivier, Olivier Bommel, OlivierM, Ombudsman, Omegatron, Omegium, Omicronpersei8, Omniplex, OneWeirdDude, Openhost101, Orayzio, Oxymoron83, P.L.A.R., PCHS-NJROTC, PM800, Param0r33, Parmesan, Pat80, Patrick, PatrickFlaherty, Paul August, Paul Stansifer, Paul-L, Pax85, PengiFergie, Pernoctus, Peschomd, Pfahlstrom, PhJ, Phantomsteve, Pharaoh of the Wizards, Phatom87, Phgao, Philhower, PiMaster3, Piano non troppo, Pichpich, PierreAbbat, PinchasC, Pinethicket, Pinotgris, Pipedreamergrey, Plasticup, Plugwash, Pomte, Poor Yorick, Porkchop28, Prof Wrong, Programarium, Prowikipedians, Prozac1980, Pseudomonas, Qaqaq, Qwertyus, Qwyrxian, Qxz, RCVenkat, RJaguar3, RadioFan, Rajeevtco, Ramrod 63, RandalSchwartz, Randallrobinstine, Raphel M. Markez, Raryel, Rasmus Faber, Raztus, Rbpickup, Rcannon100, Rdowne52, Rdsmith4, Red Sunset, Refsworldlee, Regancy42, Reliablesources, Retodon8, Rettetast, RexNL, Reyk, Rhaegor, Rhsatrhs, Rich Farmbrough, Richard Arthur Norton (1958- ), Richi, Rick Block, Rillian, Rjwilmsi, Robin klein, Roedelius, Rohasnagpal, Roland45, Rom1sub, Ronz, Rory096, RoyBoy, Rrburke, Rubicon, Rulesdoc, Runningeek, Ryan Roos, Ryoung122, Ryulong, SCGC, SMC89, SPAMSLAVE, Safedoctor, Sam Blacketer, Sam Hocevar, Sam Staton, Samtheboy, Sander Sde, Sander123, Sandstein, Sarasvathi, SasiSasi, Satori Son, Sbluen, Schnoatbrax, ScottyWZ, Scuzzawuzza123, Sd324, Sean 1996, Sentausa, Serpent-A, Sexdemon89, Sfung256, Shadow1, Shadowjams, Shady529, Shaior, Shanes, Shantavira, Shaxelen, Sheehan, Sheliak, Shepazu, Shirik, Shotwell, Sidhekin, Sietse Snel, Silas S. Brown, Silvery, SimonD, Sina, Sionus, Sir Nicholas de Mimsy-Porpington, Sirping, Skarebo, SkerHawx, Skomorokh, Skpatel20, SkyWalker, Skyezx, Skylerfatfacewrwe, Skyscrap27, Slady, Slakr, Sleske, Slowking Man, Smalljim, Smit, Smokyjohnpipe, Smpwiki, Smtc123, Snehakmurthy, Snori, Snowflake7, Snowmanradio, Snoyes, Sogle, Solipsist, Some jerk on the Internet, Someoneinmyheadbutit'snotme, Sorsoup, Spaceman85, Spoirier, Spookfish, Spork the Great, Spurple, Sroeben, Srpnor, Startvtk, SteinbDJ, Stephan Leeds, Stephen Gilbert, Stephenb, Steve2011, SteveSims, Steven Zhang, Stevietheman, Stirling Newberry, Stolen Account 1, Strait, Stratocracy, Stwalkerster, Styrofoam1994, Sun Creator, Superm401, Supermennn, Suri252001, SusanLesch, Symane, SystemBuilder, Syvanen, TGNobby, THEN WHO WAS PHONE?, TNLNYC, Taargus taargus 1, Tabletop, Tad Lincoln, Tailchopper99, TakuyaMurata, Talha hasan1992, Tasc, Taw, Tbhotch, TeaDrinker, Tedickey, Tenebrae, Terence, TerriersFan, Test1324, The Anome, The Epopt, The Thing That Should Not Be, The Wild Falcon, The wub, TheAMmollusc, TheOldJacobite, TheRealFennShysa, Thebigmc2, Thehornet, Theresa knott, Thingg, This lousy T-shirt, Thomas Larsen, Thue, Thuja, Thumperward, Thunderboltz, Thunderwing, Tide rolls, TigerShark, Tikiwont, Tim Ivorson, TimBentley, Timir Saxa, Todd Gallagher, Tomattheworthington, Tommy2010, Tonyhansen, Trevor mendham, Trnj2000, Trovatore, UkPaolo, Ukexpat, Ukrstar, Uncle G, UncleBubba, Unforgettableid, Unfree, UnicornTapestry, Unschool, Uogl, Uriah923, Useight, VQuakr, Vaikulepak, Vashiva, VasilievVV, Veinor, Velella, Versageek, Vince001001, Vinnivince, Viskonsas, Vlhsrp, Vranak, Vrenator, W163, WJake2009, WadeSimMiser, Wafulz, Waldir, Warren, Wasell, Wavelength, Wayne Slam, Weedwhacker128, Weregerbil, Wes!, Wfeidt, Who, Who R you?, WikHead, Wiki alf, Wiki13, Wikid77, Wikieditor1988, Wikilibrarian, WikipedianMarlith, Wikipelli, Wikiwiki3010, Will-B, WillV, WilliamRoper, Wimt, Wine Guy, Wizardist, Wj32, Wmahan, Wolfkeeper, Wolfmankurd, Woods229, Wrs1864, Xdenizen, Xp54321, Xpclient, Xsava, Xwildfire316x, Yahel Guhan, Yama, Yekrats, Yonatan, YoterMimeni, Ysangkok, Yuva raju raj, Yzmo, Z22, Zanimum, Zer0faults, Zip123, Zivha, Zoe, Zointer, Zondor, Zouavman Le Zouave, Zundark, Zzuuzz, , , ,---- , , , 1820 anonymous edits Web content Source: http://en.wikipedia.org/w/index.php?oldid=524339491 Contributors: Alexpashanov, Andrewspencer, Andyjsmith, Arthur Rubin, Bmdmedia, Bonadea, BorgQueen, BullRangifer, Cairo123, Cent-Hero, Chzz, Cirrus Editor, CliffC, Closedmouth, Compellingtext, CraigBailey, Cubs197, Dancter, DerHexer, DoriSmith, Drewhamilton, EAderhold, Euchiasmus, Evenmadderjon, Favonian, FisherQueen, H.alysha, Interiot, James Foster, JamesMonroeHaynes, Jeff3000, KD5TVI, Kalathilgeorge, Karada, Karthicktc, Kathleen.wright5, Keilana, Kku, Krawi, MansonP, Mikeheadroom, Mion, Moldova1979, Munazanjum, N5iln, NaBUru38, NeilN, Northamerica1000, Nurg, Ohnoitsjamie, Oicumayberight, Peachey88, Per Hedetun, R'n'B, Ringbang, Ronz, Royboycrashfan, Saintswithin, SchfiftyThree, Senator2029, Snowolf, Spiel, SteveChervitzTrutane, TheAMmollusc, Tide rolls, Tweegirl, Veinor, Venache, Versageek, Wavelength, Woohookitty, 71 anonymous edits File sharing Source: http://en.wikipedia.org/w/index.php?oldid=526943524 Contributors: *drew, .:Ajvol:., 122589423KM, 209.75.42.xxx, 21655, 217.98.151.xxx, A333, ACNS, AVRS, Aackert, Abitcrispy, AdamWill, Aftertheend, Ahtih, Aitias, Alansohn, Aldie, Ale jrb, Alex Stacey, Algae, Altzinn, An97an, Analoguedragon, Andorin Kato, Andromeda, Andycjp, Angela, Anish7, Antandrus, Anthon.Eff, AntiVan, Antoniad, Aowens1993, Ap, Aquaman321, Arda Xi, Arnowaschk, ArtemisChook, As286, Atatton3, Atbk, AussieBoy, BGOATDoughnut, Bailey2007player, Barek, Bass fishing physicist, Bax2x, Belgarat, Belgarath TS, Belorn, Belugaperson, Bestbrain007, Biasoli, Bigtimepeace, Bigzteve, Blanchardb, Bloodshedder, Blue eyes gold dragon, Bluescrubbie, Bobba addict39, Boblankin, Bobo192, Bogsat, Bonadea, Bootleg42, Bpringlemeir, Bradman3001, Brandon, Breno, Brianga, Brtkrbzhnv, Btrest, Buster2058, Ca michelbach, Caggegi229, Calabe1992, Callanecc, Calton, Cambrasa, CapitalR, Carothuf, CatherineMunro, CesarB, Cflm001, CharlesGillingham, Charlesjustice, Cheeser1, Chininazu12, Cholmes75, Chriscm, Chuunen Baka, CieloEstrellado, Cleverbeans, Coastermech, Coloradorocket, Comm12peers, Compclass2009, Confuciou, Conversion script, Cowpriest2, Cpiral, Crash Underride, Cst17, Cunard, DJPhazer, DMG413, DMacks, DVdm, Dadu, Damian Yerrick, Dan Stelian, DanielCD, Darwin's Bulldog, David Levy, Davidingram, Dawynn, Dayewalker, Deathmolor, DecadeMan, Delirium, Den fjttrade ankan, Descent, Dg1nsw, Diomidis Spinellis, Discospinster, Divagirl459, Dmitris-bat-girl, Don Black, Dotmusik, Doulos Christos, Dragonmaster88, Dreamwinder, Drlnpstr, DropDeadGorgias, Dynablaster, Dysfunktion, Dysprosia, Easyas12c, Eenu, El C, ElationAviation, Elmagnon, Elsendero, Emerybob, Emufarmers, Endlessnameless, Epbr123, Epimorph, Eric-Wester, Erikhansson1, Eternal-Entropy, EurekaLott, Eurobas, Eurotrance03, Everyking, Evil Monkey, Excirial, Eyreland, FT2, FadedRed, Faithlessthewonderboy, Fennec, FenristheWolf, FisherQueen, Flummoxdesignsdotinfo, Frap, Freakofnurture, Fredrik, Fremte, GHIUA, Gabbe, Gaius Cornelius, Gardar Rurak, Gatekreeper,

421

Article Sources and Contributors


Gemini777, Generic69, Ghenadie, Gib2504, Gigajohn, GilesMT, Glebber, Glenn, Gmaxwell, Gobonobo, Gogo Dodo, Gracefool, Graciella, GraemeL, Grafen, Graham87, Ground, Guppie, Gurch, Guyjohnston, Haakon, Hadal, Hartboy, Headbomb, HelloAnnyong, Hiphats, Holme053, Hracjk, Hu12, Humblefool, HupHollandHup, Hyacinth, I dream of horses, ISOS V, Iainelder, Ianblair23, Ianwarren, Icedog, Icefresh, Ikescs, Ikip, Immunize, Imz, Inter, Intgr, Ipsign, Iridescent, Irishguy, Isaac Dupree, Isnow, J.delanoy, JJLeahy, JLaTondre, JYolkowski, Jake Wasdin, James P Twomey, Jamesday, Jarred521, Jeff3000, Jennavecia, Jnc, John of Reading, JonHarder, Jossi, Joy, Jujutacular, Jusdafax, Jwrivers, Jzcool, KLLvr283, Kanedogg, Karol Langner, KayTee.BayBeeh.Xx, Kbrose, Keegscee, Keith Edkins, Kelly Martin, Kermit2, Kerrchdavis, Kerrytanner35, Kim Bruning, Kimero, Kingturtle, Kittycatkeith, Kjl, Kl4m, Kmasters0, Knucmo2, Kokoito, Kuru, Kzm, LCamara, Lairdp, Larry laptop, Laschatzer, Laurusnobilis, Law, Leaderofearth, Lenoxus, Lensi, Leuk he, Lexi Marie, Linuxbeak, LiquidHAL, Llykstw, Lotje, Luk, Luna Santin, Lysdexia, M, Magical Duel Guy, Mahanga, Maktoom, Male1979, Mange01, Marek69, Mark Richards, Maroux, Martinlc, Massysett, Master Bob, Matthew Stannard, Matthewedwards, Mattisse, Matturn, Mavol, Mbh, Mboverload, McDutchie, McSly, Meembo, Meneth, Michael Hardy, MiguelTremblay, MikeADorfman21, Mikeblas, Mikenolte, Mikker, Mindmatrix, Minesweeper, Minna Sora no Shita, Miremare, Mirgolth, Misza13, Miym, Mjb, Modster, Moe Epsilon, Moehre, Monsterseas, MorgothX, Mosswoodmedia, Mp3hist, MrOllie, MsCardsEtiquette, Mtwini09, Myanw, Mytempdir, Mywymedia, NPswimdude500, NSeth10, Nakon, Ncusa367, Ne0Freedom, NeaNita, Neilc, Nethgirb, NewEnglandYankee, Newbie82, Newouch, Nickptar, Nicodh, Nihiltres, Nixdorf, Nk, Noian, Non-dropframe, Notinasnaid, Nowhither, Nsaa, NuMetal99, NuclearWarfare, Objective3000, Odoketa, Ohnoitsjamie, Old Death, Olegwiki, Omarmalali, Omniplex, Ondertitel, Oren0, OwenX, P3net, PabloCastellano, Pahari Sahib, Pakaran, Paranoid, Parsiferon, PatrickFisher, Paul Ruch, Paveen, Pavel Vozenilek, Pdiazm, Peyre, Philharmoni, Philip Trueman, Pierregigatribe, PinchasC, Pnm, Pol098, PopUpPirate, Portia327, Postdlf, PowerKong, Pparazorback, Psy guy, Pteren, Pterknight1975, Quadell, Quarl, RACHCIS2011, Ran4, Random2001, Raraoul, RayBeckerman, Razeen2008, Rbrwr, RedWolf, Reedkickball, Remrem13, Requestion, Rettetast, Rfvsydysb, Rich Farmbrough, Richard001, Rick 50000, Rjaf29, Rjw62, Rjwilmsi, RobertBorgersen, Rockclimbingnut, Rodrigogomespaixao, RoninRVP, Rory096, RoyBoy, Rubberducky93, Rurik, Rvalles, Ryulong, Sabranan, Sagargp, Saimhe, Salix alba, Sam Hocevar, SamiKaero, Samuelsen, Sarrem4, SasiSasi, Sastep3, Satori Son, Savidan, Sayatv, Scepia, SchmuckyTheCat, Schneelocke, Scientus, Scott0xa28, SeanMooney, Seaphoto, Sedulus, SexyBern, Shareonthenet, Sharpdust, ShaunMacPherson, ShelfSkewed, Shii, Shoefly, ShredFred, Shreevatsa, Sietse Snel, Sir Nicholas de Mimsy-Porpington, Sjakkalle, Sj, Slantboy, Slash, Smyth, SoWhy, Soleildevie, Soliloquial, Solitude, SorenWiki, Sorezki, Sourcejedi, Speedoflight, SqueakBox, StanJRules, Stanjl50, Starylon, Stephenchou0722, Stereotek, Stevertigo, Stw, SuperMarius, Supergeo, Sv1xv, Synchrite, TJD2, TJRC, Tabletop, Taboo Tongue, TakuyaMurata, Talrias, Tannkremen, Technocomm, Terrifictriffid, ThaddeusB, Thanos777, The Realms of Gold, The Thing That Should Not Be, The very model of a minor general, ThePowerofX, Theplanetsaturn, Theshibboleth, Thingg, Thommi, Thumperward, Tide rolls, Timwi, Tjoneslo, Tmrwolf, Tobias Hoevekamp, Todd Vierling, Tommy2010, TouristPhilosopher, Toussaint, Tregoweth, Tresiden, Tristanb, True Vox, Trusilver, Tschild, Tstrobaugh, Ttlr113, Twsx, Ubuntu Dude, Ultra-Loser, Un4v41l48l3, Uriyan, Utcursch, VBGFscJUn3, Vadmium, Varnav, Versageek, Versus22, Veyklevar, Viande hache, Vilerage, Violetriga, Visor, Vorash, Wavelength, Wayfarer, Wayward, Wbm1058, Wellreadone, Werdna, WereSpielChequers, Wernher, Wezzo, Wiesel 99, Wikispan, Williamlee948, Wimt, WinContro, Wolfkeeper, Xliner78, Xp54321, YUL89YYZ, Yamamoto Ichiro, Yonatan, Ypacara, ZimZalaBim, Zoicon5, Zollerriia, Zondi, ZooFari, Ztobor, Zzuuzz, ppelmos, , 1221 anonymous edits Search Source: http://en.wikipedia.org/w/index.php?oldid=224402496 Contributors: 123b, 123c, 123f, 16@r, 2001:67C:300:1000:0:0:0:241, 321ylzzirg, 7, 84user, A. B., A0tv23, Accl.news, Accounting4Taste, Accurizer, Achugg, Aep itah, Afnecors, Ajit garga, Ajkovacs, Ajmint, Akjar13, Alan Liefting, AlanS1951, Alansohn, Alemafut, Alfons berg, Aliweb, Ambassador29, Andreas Kaufmann, Andrew Duffell, Andropod, Aneesprince, Angeld89, Another-sailor, Anspar, Anvilmedia, Apparition11, Appledandy, Aragor, Arctic Fox, Arichnad, Arthena, Aseld, Athaenara, BIGGOOGIES, Backtous2012, Badgernet, Banaticus, Barnabas321, Beao, Bebo77, Beland, Ben Ben, Benaya, Bender235, Benhall2121, Bigbluebeaver, Biker Biker, Biscuittin, Bjankuloski06en, Bjelli, Blakkandekka, Blehfu, Blogger11, Bloxxy, Bobo192, Bonadea, Boyd Reimer, Brat22, Bruce1ee, Bsadowski1, Buettcher, Bugnot, Cac united, Caffeinejolt, Caiaffa, Calvinklein911, CambridgeBayWeather, Capone7722, Capricorn42, Captain-tucker, Carlosguitar, Carlwev, Cartel7, CaseyPenk, Ceramic catfish, Chamal N, Chansonh, Chanuka25, Chris Wood, ChrisGualtieri, ChrisfromHouston, ChristopheS, Cirsam, Ckatz, Cklein1209, ClashTheBunny, Classicrockfan42, Cmcardle720, Cmglee, Cnilep, CoJaBo, Codename.venice, Coldmachine, ConcernedVancouverite, Connorthecat, CoolKid1993, Coolaij, Coolblue75759, Cpiral, Crazy Boris with a red beard, Credibly Witless, CristianoMacaluso, Crows1985, Cst17, Cut Bravo, DGG, DRogers, DSRH, DVdm, Dan6hell66, DancingPhilosopher, Danieltabak, Davidbengtenglund, Dawn Bard, Ddloe, Dem1995, Demarie, Dephnit45, Dgiul, Dgw, Dia^, Dillonpg1, Discospinster, DisillusionedBitterAndKnackered, Doxin45, Drmadskills, Drmies, Dubleeble, Dwayne, ES IRM, ESkog, EdJohnston, Edward Elric 1308, Elandy2009, Elipongo, Elkman, Enigmaman, Epipkin, Erianna, Espoo, Esv123, EurekaLott, Favonian, Fences and windows, Fmccown, Foogus, Foreigner82, Francis Irving, Francvs, FrankyFrank101, Frap, Friendocity, Fronier, Fzamith, G-Yenn123, Gaganmasoun, Gail, Gaming&Computing, Gary King, Gemirates, Gepcsirke, Ggallucci, Ggrefen, Giftlite, Gihangamos, Ginadavis, GoHuskies990411, Gogo Dodo, GoingBatty, GrantGD, Gregman2, Griffbo, Gsarwa, Gurch, Gustavo Destro, HFadeel, HPJoker, Haakon, Hagreyman, Halmstad, Harizotoh9, HarleyULTRArider, Hashim2010, Headbomb, Heavyweight Gamer, Hi878, Hillwilliam6, Hkreiger, Hoverfish, Hu12, Hvn0413, Hydrogen Iodide, INkubusse, Inas, Indian2493, Inetmonster, InfoSources, Insanity Incarnate, J.delanoy, JForget, JNW, Jackr1909, James A. Donald, Jamesontai, JanDeFietser, Janderie, Janhoy, Jatkins, JavierMC, Jdfoote, JeanCaffou, Jeff G., Jfroelich, Jiddisch, Jim the Techie, Jim1138, Jimbo16454, Jingle bigballs, John Vandenberg, Johnuniq, Josconklin, Jose Gervasio, Jozef.kutej, Jreconomy, K-ray913, K4m1y4, Kanggotan, Kazastankas, Kc03, Kendalfong, Ketsuekigata, Kiranoush, Kiransarv99, Kjpoconnor, Klilidiplomus, Klutzy, Kmmhasan, Koavf, Krushialk, Kuru, Kvasilev, L;kasd;fweiotr4, LScriv, Leevanjackson, Legaleagle86, Lesley.latham, Leuko, Levineps, Likmo123, LittleBenW, Llamafirst, LodeRunner, Loderuner, Logan, Loginnigol, Lokpest, Lostzenfound, Lotje, Lsolan, Ltcoconut88, Ltkmerlini, Luv len, MBisanz, MJ94, Ma8thew, Mac, Macrakis, Maghnus, Makemi, Mandarax, Mangaman27, Manwichosu, Mapelpark, Marcus Qwertyus, Martin451, Mathiaslylo, Mattgirling, Mattmnelson, Maximus2000, Mbelaunde, McSly, Meemore, MercZ, Mhha, Midgrid, MiguelAraujoS, Miladz7560, Misty fungus, Mitul0520, Mjs1991, Mlo0352, MoeenKhurshid, Moeenkhurshids, Mogism, Mooglesearch, Moswento, MrOllie, Mstrehlke, Mulva111, NOnash61, Nadeem12345, Nainawalli, Nasnema, NawlinWiki, Ndenison, Nenya17, Newtown11, Nexus501, Nick Number, Nick2253, Nimoegra, Nlyte.Software, Nono-1966, Northamerica1000, Nowo11, Nubicsearch, NuclearWarfare, Nurasko, Nurg, Ohnoitsjamie, Ooyyo, Orange Suede Sofa, Oscar.nierstrasz, Outlinekiller, PLA y Grande Covin, PakRise, Patience2, Pepdeal, Pgallert, Phantomsteve, Philip Trueman, PhoenixLightInc, Piano non troppo, Pickuptha'Musket, Pinethicket, Plenderj, Pnm123, Poeloq, Popsup, Porthugh, Possum, Prari, PseudoOne, Puchiko, Purbitaditecha, Qnxkuba, RA0808, RW Marloe, Rachell36, Rajesh.patchala, Rakeitin, Rathee, Ray3055, RazorXX8, Reaper Eternal, Regisbates, Res2216firestar, Richard31415, Riveravaldez, Rlendog, Robertnettleton, Roggerladislau, Rollins83, Ronhjones, Ronz, Rosariomorgan, Rozbif, Runefurb, Rz1115, S2009qw, SDSandecki, SF007, Saddhiyama, Saha zapaat, Samdutton, Sampi, Sceptre, Schnoatbrax, Schwarzenneger, Scofield190, Scurless, Seaphoto, Searchman2, Searchmaven, Searchprochina, Seeleschneider, Semio7, Shantu123, Sharon08tam, Shuipzv3, SiegeLord, SilkTork, Simulacrum01, Skapoor 92, Skapoor007, Sllim jon, Smalljim, Sman24, Smarteralec, SnowFire, Spotworks, Srinivas, Srushe, Steele, Stephenb, Steve.bassey, Strait, StuffOfInterest, StuffyProf, SudoGhost, SuperHamster, Suzukiboy04, TarzanASG, TastyPoutine, Tch5416339, Tcncv, Tedickey, Teles, The Thing That Should Not Be, Thecheesykid, Think outside the box, Thinktdub, Thomas humphrey12, Thunderbird2, Tommy2010, Toussaint, Trivialist, Ty27rv, Uniltranyu, Valfontis, Vchimpanzee, Versageek, Vicenarian, Vuongvina, W163, Waldir, Wavelength, West.andrew.g, Wikiolap, Wikipedian314, Williamjhonson45, Willonthemove, Wizardist, Wmartin08, Woohookitty, Wotnow, X7q, XDaniX, Xcohen, Xiaoshuang, Xin0427, Xlxfjh, Xmarkmanx, Yamaha07, Yegg13, Yerpo, Yoursvivek, ZeeknayTzfat, Zidonuke, ZimZalaBim, Zzuuzz, , , 889 anonymous edits Blogging Source: http://en.wikipedia.org/w/index.php?oldid=359830460 Contributors: (, 05thomasr, 0x, 12angie13, 16x9, 7265, 8bitJake, 97198, A-giau, A. B., A.R., ALargeElk, AMuseo, ASeainMe, Aancsiid, Aarkangel, Aaron Brenneman, Aaron Schulz, Ab9, Abdullais4u, Aberon Jones, Abhinav paulite, Acalamari, Acarvin, Acohen843, Actionhamster, Adam Conover, AdamAtlas, AdamC387, Adashiel, Addshore, AdelaMae, Adityam, Adrie7, Aerostrato, Aervanath, Aesopos, AgarwalSumeet, Agutie, Ahoerstemeier, Al E., Alan Liefting, Alappuzhakaran, Albeiror24, Alcately, Aleahey, Aledevries, AlefZet, Alexf, Alexisanidem, Alexmorter, Alexrosenewb, Alfpooh, Alifbaa, AlistairMcMillan, Alphatrunks, Altenmann, Amazins490, AmericanCentury21, AmiDaniel, Amy.C, Andres, AndrewBellis, Andy Eng, Andycjp, Andylkl, Angela, Angry candy, Anildash, Animesh.1988, AnmaFinotera, Annette Humphries, Anonymous Dissident, Antandrus, Anthony Appleyard, Anthony717, Antimatt, Appleboy, Arcann, Archer7, Arcturus, Ardonik, Areebmajeed, Armandeh, Armn3armn3, Art LaPella, Artblogs, Arthena, Arthur Ellis, Artimis Cat, Arved, Arvindbhagwath, Asamudra, Ash211, Aslgroupbd, Astanhope, Astronautics, Athaenara, Atreyu42, Aude, Aurelien Fache, Autumnnn, Auzajun, Axeman89, Axlq, Ayager, Az1568, AzaToth, Azgs, Azlan91, B0Rn2bL8, BF, BPinard, BWH76, Babbage, Bacrito, Bact, Bakanov, Balzin, Banes, BanyanTree, Barista, Barrel Roll, Barry Pearson, Barryap, Bayerotik, Baylink, Bbtommy, Bcorr, Bdegfcunbbfv, Bdesham, Bdude, Bdushaw, Bedir26, Beeezy, Begin2blog, Beijing-message, BenForta, BenFrantzDale, Benhoyt, Benpage26, BerLon, Berg1115, Bethelhope, Bevo, Bgold, Bhearsum, Bhupen maurya, Bhuston, Biggpimping, Bigwyrm, Billinghurst, Birdfluboy, Birdmessenger, Bjarki S, Blackcarr, Blethering Scot, Blewtooth, Blm0303, Blogem, Blogg1, Blogshopwin, Bloodshedder, Blork-mtl, Blue Tie, Blue520, Bluefusionx, Bmdavll, Bmicomp, Bmr128, Bnkailash, Bob Wyman, Bobblewik, Bobbyelliott, Bodhi dharma, Bomac, Bondegezou, Bonniegrrl, Booyabazooka, Bornofdust, Bowei Huang 2, BradLehrbass, Bradtem, Brainhell, Breno, Briaboru, Brianallen, Briansince1988, Brianskinner51, BrokenSegue, Brouzdej, Brownsteve, Bryan Derksen, Bryan20, Bsawhill, Bstepno, Bstrawse, Btipling, Btyner, Bubba73, Buchanan-Hermit, Budtheteacher, Bullemhead, Buotte, Buridan, Butros, Butterboy, Bwabes, Bwelford, By97aa, C, CNicol, CSTAR, CTF83!, Cacophony, Caesura, Cafzal, CambridgeBayWeather, Camillaherrmann, Can't sleep, clown will eat me, Canihaveacookie, Cantaloupe2, Cantara, Canthusus, Cantus, Cardsplayer4life, Carmen Smith Jones, Carre, Carrie S., Casey Abell, Caspiax, Ccacsmss, Cdhondt, Celtkin, Centrx, Ceyockey, ChaTo, Chairboy, Chakira, Chamli Tennakoon, Chardish, Charles Gaudette, Chatfecter, Cheejyg, Chefsuffolk, ChemGardener, Chemanel, Chenming, Chetan, Chic happens, Chino301996, Chitown2pa, Chivista, Chokhani, Chowdrew, Chris 42, Chris Chittleborough, Chris Roy, Chrischris349, Chrisinajar, Chrisjchurch, Chrislk02, Chrisranders, Christopherlin, Christophore, Christoswinter, Chulcoop, Chuq, Chwats, Ciaranholahan, Cleon169, Clinical Cases, Clipdude, Cncxbox, Cnilep, Cobra libre, Codeczero, Cogburnd02, Comatose51, Cometstyles, CommonsDelinker, Computerjoe, Conant1022, Condem, Conti, Conversion script, Coolcaesar, Copperchair, Corn cheese, Cornbrea4, Cralar, Crazeman, Crazie 88, Crazycomputers, Crkian, Crust, CryptoDerk, Curious1i, Curps, Cyanide-Assasin, CyberSkull, Cybercobra, CycloCide, Cymru.lass, Cypherpunk, Czalex, D Monack, DCHypeWriter, DHN, DJ Clayworth, DO'Neil, DVdm, Dabyo, Dakuhippo, Dakutaa, Damien, Dan Atkinson, Dancter, Daniel Klein, Daniel Quinlan, Daniel.Cardenas, Danlev, Darklight, Dave1g, Davemcarlson, Daverose31, David Biddulph, David Gerard, David Jay Walker, David Martland, David Shankbone, David Weisman, DavidCary, Davidbrake, Davidculp, Dbabbitt, Dbc100, Dcljr, Dcv08, DeadlyAssassin, Deadman0603, Dean, Dearmky, Debeshlohani, Deenoe, Deltabeignet, Den fjttrade ankan, Denelson83, Denisarona, Deon Steyn, Deramisan, Derek.cashman, Desmay, Desodyl, Dfrankow, Dgonzal4, Dgsinclair, Dhammapal, Dharanpdeepak, Dhartung, Dhollings, Dhoomk2, Dianelos, Diberri, DidgeGuy, DigitalMedievalist, Disavian, Discospinster, Dispenser, DivineDeeds, Djanem, Djlanger, Djphoton, Dlewis3, Dmyersturnbull, Doc glasgow, DocWatson42, Doctorbruno, Dodo bird, Dolphin674, Dori, Doug, Dpnelson, Dr dex, Dr.enh, DragonHawk, Drdrew, Dreag21, Drewby9000, Drknexus, Droob, DropDeadGorgias, Drunkasian, Dstanfor, Dtcdthingy, Duke12345, Durova, Dwlegg, Dybryd, ESkog, EamonnPKeane, Eclecticology, EdGl, EdX20, Edassery, Edcolins, Edgard Berendsen, Edonovan, Edward, Eh Nonymous, Eiler7, Ejstarchuk, Ekren, Elagatis, Elembis, EllenFoster, Ellsworth, Ellyrobi, Eloquence, Elwikipedista, Emanspeaks, Emperorbma, Enigmaman, Eno1, Ephra8, Epson291, Eranb, Ericos, Ericstoller, Erikringmar, Erpert, Esprit15d, EstebanF, Estrazy, Estudiarme, Etz Haim, EurekaLott, Evercat, Everdred, Everyking, EvilCouch, Ewlyahoocom, Eyu100, Ezeu, FT2, Faizan.hp, Faizanalivarya, Fakeisthenewreal, Falconator, Fanofranz, Farah dabbas311, Farside, Fatzdaddy, Favorite003, Fayenatic london, Fdi quye, Feb30th1712, Feedelix, FellowWikipedian, Felvalen, Ferkelparade, Fetchcomms, Ffangs, Fhy007, Find100, Finlay McWalter, Firepyro, FirstAuthor, FitzColinGerald, Flagboy, Flangazor, Flaphead, Flewis, Flockmeal, Florentino floro, Florian Sening, Flowanda, Flower Priest, Fram, Frappyjohn, Frecklefoot, Fredrik, Freedom of Espresso, Freeheeling, Freestylefrappe, FreplySpang, Friday, Frisco3, Frith, From-cary, Frostzone, Fullstop, Funnybunny, FvdP, Fvw, Gabefung, Gadfium, Gaius Cornelius, Gakmo, Galloisian, Gamingexpert, Gandalf1491, Gardar Rurak, Gareth McCaughan, Gareth Wyn, Garzo, Gasull, Gdavidrameshkumar, Genesiskw, Genglo, Gennaro Prota, Geraki, Geschichte, GetItRight, Gfoley4, Ghosts&empties, Gigantus, Gilliam, Giraffedata, Gleezus, Glenn, Glogger, Goel madhur,

422

Article Sources and Contributors


Gogo Dodo, Gohst, Goldom, Goodnightmush, Gouthamlal, GraemeL, Graham87, Gravychalupa, Greatgavini, Green knight, GregoryEtc, Grenavitar, Greudin, Grid, Grimace01, Grm wnr, Grstain, Grunt, Grymwulf, Gsiskind, Gtahq, Gtbrown, Gtog, Guaka, Guerby, Guinanie, Gurch, Gurubrahma, Guy Peters, Gwernol, Gyco, H Bruthzoo, H.sanat, H2g2bob, H311jump3r, H755bpx, Hackaback, Hadal, Haf369, Hairymon, Hamidtesta, Hamiltro, Happylobster, Haukurth, Haunti, Hawaiian717, Hayabusa future, Hayama, Hendrixski, Henrygb, Herzen, Hetar, Higley777, Hindleyite, Hintha, Hitherto, Hmallett, Hmg2002, Hoder, Honeytech, Hope(N Forever), Horkana, HornyDesertLizard, Hourick, Hu12, Hufis NYC, Ian Pitchford, Ianmacm, Idontshower2006, Iempleh, Igoldste, Ikip, Image uploader, ImperfectlyInformed, Improv, Imshashank, Indon, Infrogmation, Intropr12, InvisibleK, Ioscius, Iridescent, Irishguy, Isibingo, Issa, Iwebstudio, Ixfd64, J. 'mach' wust, JDP90, JDoorjam, JEJoyce, JHP, JJJJust, JLaTondre, JYolkowski, Jacj, Jackola, Jacky78, Jacobolus, Jag416, Jainsarthak, Jake Nelson, Jakejpachomski, Jakerome, Jaksmith, James086, JamesR, Jameswebuk, Janejellyroll, Jannetta, Jansegers, Jaqen, Jarrahbear, Jarry1250, Jas891, Jason Cherniak, Jasper Deng, Jayjovial, Jburgman, Jcorso, Jcraford, Jebylicious, Jectasibro, JeffJonez, Jeffq, Jehochman, Jeltz, Jengod, Jenicasz, Jeremy Visser, Jessecooper, Jez, Jezmck, Jfdwolff, Jfgadgetboy, Jh51681, JiFish, Jiang, Jim Douglas, Jim1138, Jitendar2003, Jivecat, Jleybov, JoanneB, Joao.caprivi, Joeblakesley, John, John J. Bulten, John M Baker, John Quincy Adding Machine, John wesley, JohnClarknew, JohnRussell, Johnadonovan, Johnleemk, Johnnyturk888, Johntex, JohnyDog, Joi, Jonasaznut, Jonty303, Jordanhurley, Jose77, Josh386, Joshua.akira, Joshuagross, Jossi, Joyous!, Jpgordon, Jrdioko, Jredmond, Jsl83, Jsnrchr, Jtkiefer, Jtowler, JuJube, Jukcoder, Jules Siegel, Julesd, Julien Foster, Jumbuck, Jusjih, Justmeherenow, JzG, K69, K7aay, KConWiki, Kadambarid, Kamai40, Karebear 1022, Karl-Henner, Karmona, Kashum, Katefan0, Kbk, Kbriney, Keilana, KeithD, KeithTyler, Keithlard, Kelly Martin, Kelsey Francis, Kensplace, Kent28, Kenwah, Kenyon, Kesac, Kessler, Kevinharder, Kevyn, Khalide91, Kiiimiko, Kindzmarauli, King of Hearts, Kingoftherodeo, Kinneyboy90, Kiwi128, Kjoonlee, Klacquement, Koibeatu, Konrad Foerstner, Konstable, Korath, Korny O'Near, Kotjze, Kovieb, Koyaanis Qatsi, Kozuch, Krakatoa, Krellis, Kristjan Wager, Kross, Krymson, Ksyrie, Kuecklich, Kukkurovaca, Kumioko (renamed), Kungfuadam, Kuru, Kushalbiswas777, Kx1186, Kyle Barbour, L33tminion, LFaraone, LOL, La goutte de pluie, LadyLucky, Ladybirdintheuk, Lagunamm, Lancet75, Langec, Lanma726, Laura, Laurens-af, Leandrod, Legendary11, LegendaryMonkey, Leithp, Lemcoe9, LeoDV, Leoj83, Leonstar, Leova, Leroyinc, Levineps, Lexor, Licon, Lightdarkness, Lijil, Lineslarge, Linkspamremover, Lisanola, Lithorien, Liuhaixiang, Livajo, Llamasharmafarmerdrama, Logan, Longhair, Lopa panda, Lord Matt, Lotje, Lquilter, Lucanos, LucyTag, Lucyin, Luisdelafuente, Luminita, Lunas11, Lupinoid, M0ment0m, M2545, MC MasterChef, MDH326, MER-C, MMBKG, MONGO, MPerel, MZMcBride, MacGyver1618, MacRusgail, Mack2, Magicpop, Magioladitis, Magister Mathematicae, Mahanga, Mahmudmasri, Mailer diablo, Mairi, Majorly, Malick78, Malo, Mandysfriend, Mani1, Manip, Manop, Maragtas, Marco.org, Marcschulz, Mariushendrik, Mark Brown, Mark W Beech, Mark.brady, Markmearin, Martin Hcker, MartinRobinson, Martinman11, Mashby, Mateo Elgato, Materialscientist, Matt Gies, Matt.Hoy, MattKeegan, Mattbr, Mattbrundage, Mattmnelson, Mauzj, Mav, Max Schwarz, MaxD, Maximus Rex, MaximvsDecimvs, Maxlange, McGeddon, Mcarling, Mdd, Mdog, Mdwh, MediaGraduate, Meelar, Meetrahulsingh, Melaen, Melbourne Uni Curries, Melissaguorun, Menchi, Mentatjack, Mercurius, Merzion, Metarob, Metju, Meursault2004, Mfagan, Michael Hardy, Michael2, Michaeladenner, Michealg123, MidhunSuresh, MikeCapone, MikeGruz, Miked918, Mikesmith911, Mikespedia, Mimzy1990, Mindspillage, Minesweeper, Minghong, Minimac, Mintchocicecream, MirenBerasategi, Miskatonic, Missvalentine, Mithrandirthewise, MizuAmina, Mjas, Mjefm, Mjgw, Mjparry716, Mkativerata, Mkdw, Mkpowers, Mmmovie, Moa3333, Mogism, Mohamed Magdy, Mollten, Moncrief, Monkeyman, Monotonehell, Moocat, Morven, Mozzerati, Mr Adequate, MrFish, MrSnow, Mrdelayer~, Mrdude, Mskadu, Mskogly, Msnicki, Mtgig, Mtnerd, Mu5ti, Muchness, Murdocke, Mutum, Mwanner, Mxn, My Blogger, Mytildebang, NICENICE, NMChico24, Nakon, Nandesuka, NawlinWiki, Nczempin, Nealmcb, Nearfar, NeilTarrant, Neilf4321, Nemanjakron, Nep, Netpowersoft1, Netsnipe, Newsjunkie, Nfwu, NickL1185, Nicolasconnault, Nigelj, Nightstogether, Nikkimaria, Ninjutsu, Ninthgirl, Nishalegend, Nitefood, Niteowlneils, Nlu, Nnp, No Guru, Nonprofittech, NormDor, NormanEinstein, Notheruser, Novasource, Novum, Nufy8, Nunh-huh, Nurg, Nv8200p, O.Koslowski, Oaklybuns, ObjectivityAlways, Occipital, Ocee, Ohnoitsjamie, Olaan, Old Right, OldakQuill, Olorin28, Omicronpersei8, Omnicapital, Onco p53, Onebyone, Onethumb, Onlyfactsbball21, Ontopic, Oo64eva, Orangemike, Orbst, Osswid, OtisTDog, Ottava Rima, Ottre, OwenX, Oxymoron83, P.T. Aufrette, P0lyglut, PDH, PSYCH, Paalin, Palmiped, Panem, Paranoid, Parthasarathy.kr, Parulshirazi, Passigagan, PatCheng, Pathoschild, Patrick, Pchaney, Peas and corn, Peggerz, PenguinTutor, Personman, Petardugz, Peter Campbell, Peter McGinley, Pgk, PhantomS, Phidjit, Philwiki, Phlebas, Phoebe, Phoenix2, Phoenix2275, Phrosztbyte, Pinhanez, Pink!Teen, Pinmyboard, Piotrus, Plange, Pne, PochWiki, Politics1, Pomte, Poncirus, Pookleblinky, PoorYorick, Porges, Prapsnot, Pree-teen catastrophe, Premeditated Chaos, Preschooler.at.heart, Prodego, Prokopenya Viktor, Purplefeltangel, Pyrox02, Qtoktok, Quarl, Quaxanta, Quiname, Quinsareth, QuiteUnusual, Qwerts, Qwyrxian, R6MaY89, RFerreira, RJHall, Racep, Rachack, RadicalBender, Radman, Rador, Radoslav, Ral315, Ramandeep000, Ramitmahajan, Ramore, Randomusername331, Randwicked, Raul654, Ravik, Ray Radlein, RayneVanDunem, Razzie, Ral Azcar, Rdavout, Rdsmith4, Reader34, Reaverdrop, Red Darwin, Red Winged Duck, Redvers, Reedmaniac, Reginmund, Reid.sorenson, Reinyday, Relaxtoday, Renesis, Reonwaterman, Rerere12, Revolucin, RexNL, Reza1615, Rhobite, Rholton, Riadlem, Rich Farmbrough, Richman0829, RickK, Rivard, Ry, Riwo, Rizzolot, Rjakew, Rjwilmsi, Rklawton, Rl, Robchurch, Robertvan1, Robust Physique, Rodgerhoffman, Rodii, Roger14rnd, Roke, Romanticlock, Rony888, Ropers, Rossami, Rowan Moore, Royalguard11, Roychai, Rray, Ruddyflipper, Ruud Koot, Rwwww, RyanHoliday, Ryanch06, Ryulong, SDSandecki, SMC, SMadhab, SNIyer12, ST47, SWAdair, Sacho, Sade, Sailnexplorer, Sajagrules, Sakura, Sam Francis, Sam Korn, Sameershaban20, Sammetsfan, Samwilson, SanjayTilaiyan, Sara.g.goldstein, SarahStierch, Sarkarabhishek, Saturnight, Savagemic, Saxifrage, Sceptre, Schissel, Schmancy47, Schnoatbrax, SchuminWeb, Schzmo, Sdecker81, Seb26, Secretlondon, Seedsandshovels, Sega31098, Sehugg, Sekicho, Senda, SeoMac, Seogeek, Serpent's Choice, Serviceatclick, Seth Ilys, Sgtlion, Shalom Yechiel, Shamblesguru, Shamrox, Shane Kenyon, ShaneKing, Shanes, Shaojie^ ^1420605, ShawnVW, Shenme, Shii, Shipnopanda, Shovel, Shrikrishnabhardwaj, Shushruth, Siliconwafer, Simetrical, Simon123321, SimonP, Simple as 123, Sippan, Siqbal, Siroxo, Sj, Skintreatment, Skizzik, Skrewler, Skyfire, Slady, Slightsmile, Slinga, Slipgrid, Sm8900, Smapty, Smdali, Smsarmad, Snakehunter, Snoutholder, Snowolf, Sobaka, Sobreira, Solitude, Soman, Somearabian, Someones life, Somerut, Somnium, Sonia, Sortap, Soulhuntre, Soupnyc807, Sourcecode, Sparktography, Spartaz, Speedcheese, SpencerTC, Spinningobo, Sreifa, Sri, SriMesh, Srose, StarDrifter, Starczamora, Starpeak, Startstop123, Staxringold, Steeracie, Stephen B Streater, Stephen e nelson, Stephenb, SteveSims, Stevegarfield, Steveguy, Steven Walling, Stevertigo, Stevex, Stevieboy008, Stevietheman, Stinkypie, Stirling Newberry, StoneyBurke, Stormie, Strait, Stuart.burrell, Studerby, Styles, Suhalbansal, SujinYH, SummerWithMorons, Sunjuan2201, Surly Bob, Suruena, Suvhero, Switpi84, SxyLaraJoli, Sympleko, Szarka, T-Boy, TJ Spyke, TNLNYC, TakuyaMurata, Tapir Terrific, Tarunpahwa, Tarview, TastyPoutine, Tawker, Taxman, Tbc, Teamjenn, Techn0 freaks, Tedd, Tedickey, Tenfourzero, Tengai, TerriersFan, Tessehamid, TexansFan, Texture, Tghe-retford, The Cute Philosopher, The dark lord trombonator, The lorax, The very model of a minor general, TheBilly, Thebearclub, Thecollegekid, Thedoorhinge, Thegn, Thegrue, Thegunnybag, Thejerm, Thelife, Theopapada, Thepcnerd, Theqbe, Therainsmail, Thesquire, Thljcl, Thomas1111, Thumperward, Tikiwont, Tillman, TimBentley, Timbob4m, Timecop, Timrem, Titansolaris, Titodutta, Tlpetler, Tmacentee, Tmh, Tmollerup, Tmopkisn, Tobogganoggin, Toby Bartels, Toddfugere, Tofubar, Tokigun, Tom Morris, Tom X. Tobin, Tom harrison, Tomhanna, Tommstein, Tomsommer, Tony1, Toussaint, Towel401, Toyotaboy95, Tpbradbury, Trampton, TreasuryTag, Treelovinhippie, Tregoweth, Trident13, Trivialist, Trobbs, Tsunaminoai, Tumblingsky, Tushartrends, Tverbeek, Twelvethirteen, Twexus, Twinsday, Tyrenius, Tyrsdomain, Tzartzam, Ulric1313, Unisoftdatatech, Unixer, Unixman83, Unmitigated Success, Unotwotiga, Uogl, User2004, Usukass, Uttams, Uzume, Vandal B, VanillaX, Vanished user svinet8j3ogifm98wjfgoi3tjosfg, Vartan84, Vegardw, Vegthura, Veinor, Vernorv, Versageek, Vespristiano, Vikreykja, Vilerage, VincentCzar, Viveka, Voceditenore, VoodooKobra, Vranfran, Vsaezh, WRJ, Wackymacs, Wadsworth, Wafulz, Wakeling, Waldir, Wangi, Warpplasma, Wassermann, Waterguy, Wavelength, Wc1, Wdez, Web499, Weberavin, Webzero, Weinberg81, Weyes, WhisperToMe, White Mage Cid, Whiterox, Whomp, Whyang, Wickedthought, Wiki alf, WikiAficionado12, WikiLeon, Wikievil666, Wikiklrsc, Wikilibrarian, WikipedianMarlith, Wikipediarules2221, Wikipedical, Wild girl, Wildpixs, Will Beback, Willhsmit, WilliamPharaoh, Wintran, Wipsenade, Wiretse, Witchinghour, Wm, Wmseo, Wnt, WojPob, Wonglkd, Woodroar, Woohookitty, Woqiao, Workman161, WorldWide Update, WorldlyWebster, Wozzaofrare, Wtmitchell, Wwwwhite, Wwwwolf, Wykis, Xaosflux, Xcali, Xinpoint1, Xinyu, YS Wong, YUL89YYZ, Yamamoto Ichiro, Yanksox, Yath, Yeanold Viskersenn, Yidisheryid, Yonatan, Yooden, Youandme, Yueni, Yunshui, Yutsi, Zandperl, Zanimum, Zantolak, Zapadlo, Zealotgi, Zedomax, Zephyr2k, Zeroasterisk, Zerofunk, Zeuner, Zhen Lin, Zigger, ZimZalaBim, Zodon, Zoe, Zoicon5, Zootm, Zundark, Zzuuzz, , 2402 anonymous edits Microblogging Source: http://en.wikipedia.org/w/index.php?oldid=527586220 Contributors: 123123ok, 25Beach, Accurimbono, Ade oshineye, Aff123a, Ageekgal, Alex.muller, Alskdjfhg20102010, Alusayman, And3k, Andy mortimer, Andyjsmith, Antonalexsv, Armbrust, Arthur Rubin, Asb.labs, Ask123, B0sh, B7T, Benjaminvermersch, Bergie, Betelhem3000, Biker Biker, Bjankuloski06en, Bluerasberry, Bmike8, Bobby122, Boehr, Bonadea, Bongomatic, Brianski, Bubba73, CambridgeBayWeather, CanadianLinuxUser, Canterbury Tail, Capricorn42, Carmichael, Ccacsmss, Chase me ladies, I'm the Cavalry, Cheong Kok Chun, Chetawat, Chuckraverthy, Ckinniburgh, Clandestine1991, Clovis Sangrail, CommonsDelinker, Computerjoe, Corn cheese, Crazy Ivan, DAG JM, Dandv, Dank, Danlev, Danrha, David Holmes, Davidnaoki, Dekisugi, Disavian, Dmbanes, Duagloth, Eastlaw, Ecemaml, Edward, Eeekster, Eiland, Eisige Flamme, Emily Jensen, Eric.k.herberholz, Erkan Yilmaz, Evosoho, Fadesga, Fjurden, Flynndaniel, Freddiekele, F, Gaonkar, Gauravwasan, Geekrecon, Gordi555, Grafen, Greg Tyler, Hans Dunkelberg, Hathornt, Headlessness, Heliogabulus, Hex, Hpurohit, Husky, IAlex, ISBN, IamNotU, Iamgq, Ibloggr, Imadia, Internetinsider, Intgr, Ipatrol, Isaac Dupree, IvanLanin, J04n, Jab843, Jackfranconi, Jaimin24, Jansegers, Jaredmadden, JavaWoman, Jbender2, Jebberwocky, Jfloray, Jonesemily, Jonny2210, Jorgenhus, Josephgrossberg, Jsaiya, Kelapstick, Kenythzeng, Kevinpurcell, Khfan93, Kisher07, Kktor, Kku, Kraisch, Kymacpherson, Lalit m12, LilHelpa, Lisakpadilla, Lordknox, Loreleil, Mattlhanson, Meisele, Metrofeed, Mgc0wiki, MickMacNee, Microblog, Microbopper, Mjacton, Momillard, Monty845, Mortonsh, MrOllie, Murrquan, Nabeth, Nagy, Nbarth, Nelsojona, Nghtwlkr, Nich148 9, Nightscream, Nikkalopes, Nn123645, O.Koslowski, Ohiklan, Pakalika, Peterreiser, Pettar, PhilMacGlass, Pigsonthewing, PiotrKapretski, Piotrus, Qiaohua, Rafelio, Razorflame, Rbucky, Recognizance, Redmond Barry, Rehevkor, RekishiEJ, Resurgent insurgent, Rich Farmbrough, Rjwilmsi, Robert P. O'Shea, RockMFR, Romasha, RoodyAlien, Rubendavidgomez, Rusaka, Rusl, Saintamh, Saminshams, Saqib, Sean.hoyland, ShakataGaNai, Shii, Shrigley, Silenceandnoise-, Silvonen, Sin-man, SiobhanHansa, SkyeWaye, Socialwokwiki, Soenke2008, Spike the Dingo, Sscheper, Stephanejolicoeur, Stezton, SummerWithMorons, Sykes83, TalSh, TastyPoutine, Textcreek, TheGiftedOne, Theoptare, Thevampireashlee, ThreeOneFive, Titus44, Tnxman307, Tobias Bergemann, Tomchen1989, Tomdobb, Toncek, Toniher, Tonygilloz, Tonygillsydney, Toussaint, Tradingcalc, Trident13, Ttam, Ttonyb1, Unitymix, Uusijani, Vegaswikian, Velociped, Verticalanswer, Verticalsoftwares, Vixmontana, WWGB, Wangx, WillOakland, Yahya Abdal-Aziz, Yaotang, Yerpo, ZeroOne, ZimZalaBim, Zollerriia, Zyrax, , , 334 anonymous edits Social networking Source: http://en.wikipedia.org/w/index.php?oldid=419781286 Contributors: 17Drew, 21655, 2D, 2close, 7, A.Ward, ADDISON396, AKeen, Aanievas, Aaronsharman, Abeg92, Abhishek191288, AbhisheksinghWIKI, AbsolutDan, Accents, Access Denied, Acm1989, Adambro, AdelaMae, Adrianpena, AerobicFox, Africanatuben, Afromayun, Agentcmk, Agentmori, Ahpook, Ajb225, Ajraddatz, Ak8866, Akakkar, Aladdin8444, Alan Au, Alansohn, Alex Kosorukoff, Alexa45, Algomaster, Alishehzad, AlisonLeCornu, Allstarecho, Allywiki, Aly89, Amijami3, Amirahcici, Ana89carina, Anbu121, Andonic, AndrePitie, Andrei S, Andrew.baggott, Andy Dingley, Andyjsmith, Andywhite111, Anecelis89, Angrysusan, Anna Frodesiak, Anna Lincoln, Ans-mo, Anthere, AntonieGeerts, Aphilo, Apoapoapo, Apple4430, Aremith, Arthur Holland, Arthur Rubin, ArthurBorges, Artimis Cat, Aruton, Asakzlyan0, Asesposito, Assaqqaf, Avoided, Awfadmin, Azumanga1, Baggio1089, Barefootmeg, Barek, Bblfish, Bdonaghy, Bellagio94, Bellagio99, Benbest, Benccc, Benechanuk, Benkill, Bhawtik, BigDunc, Biker Biker, Billinghurst, Bioscibrarian, Bjankuloski06en, Blake-, Blanchardb, Blissfind2, Bloggermaster1, BlueSAM, Boblafoudre, Bobo192, Bobzchemist, Bonadea, Booker uk, BoomKing1989, Borja Moll XAL 2010, BrambleDragon, Briaboru, Brian Kendig, Brillob, Brkress, Bruce.guthrie, Bruce404, Bsinha123, Bteed, Bucs, Bulldog73, Buridan, Buybooks Marius, CWii, Caffrey, Neil, Calenet, Calimo, Callidior, Can't sleep, clown will eat me, CanDMan001, CanadianLinuxUser, Canis Lupus, Capricorn42, Caseya96, Cbmilne33, Ccacsmss, Ccasey9, Cdabroski, Cdasilva20, CecilWard, Cgmusselman, Ch0ben, Chainsawriot, Charlie.rentz, Chaser, Chelcielewis, Chip McShoulder, Chowbok, Chris the speller, Chrisamw, Chrisemmins, ChristianD35, Chriswaterguy, Chronosel, Chubbyllss, Chuck SMITH, Chuckraverthy, CinchBug, Ckatz, Clare.s.hudson, Clareeh, Clarkcj12, Cleantech, Coldacid, Comm12group4, ConcernedVancouverite, Connor.jackson, Copyeditor42, Copyspills, Corvus cornix, Cosmopolita, Cosmopolitan, Courcelles, CrazyChemGuy, Cretog8, Crossmr, Cryptic C62, Ctffmike, Cuzyournasty, Cybergen, D.M. from Ukraine, DARTH SIDIOUS

423

Article Sources and Contributors


2, DBigXray, DDmylesy, DMacks, Dahamu, Dahole, Daivhp, Dancter, Danielsc2, Danstefan24, Darth Panda, DarwinPeacock, Dasani, Dateleaf, Dave6, Daveschappell, David Latapie, Dbreid, Dbrett480, Dchase5464, Ddoza, DeadlyAssassin, Deanh, Deathlasersonline, Debresser, DecadeMan, Deep1256, Dekisugi, Denise141922, DerHexer, Diannaa, Dieterh, DigitalHoodoo, Dimz793, Dinkytown, Dirkx, Discospinster, Djona, DocWatson42, DoubleBlue, Doulos Christos, Drbreznjev, Drctmcc, Dreadstar, DrewP, Drewscool112, Drharshitjain, Drmies, Drphilharmonic, Dunamis, Duncan, DuncanCragg, Dwyermas214, E.S. Blofeld, EagerToddler39, Ebbe544, Edcolins, Edgeearth, Edmundwoods, Edouard.darchimbaud, Edrprff, Edward, Edward321, Eewalsh, Egoober, Ehilton, ElGreco123, ElKevbo, Element002, Elisor, Emily Jensen, Emt6131, Emulsionla, Enchanter, Endicium, Engineman, EricLexie, ErroneousFunk, Eubulides, EwokiWiki, Excirial, Expo1998, FT2, Fallow85, Familianica, Faryd, FayssalF, Fergdoug, FlavrSavr, Fleabitten, Flickknife, Flink the blind hemophiliac, Flomsk, Flovellmsvu, Flowanda, Fluffernutter, Fmccown, Forestgarden, FrantisekZachoval, Freakmighty, FreplySpang, Friendocity, Frood, Frozenstars, FrummerThanThou, Fstutzman, Ft93110, Fuhghettaboutit, Funandtrvl, Fyyer, G6ecx, G7yunghi, Gabi S., Gary King, Genelson, Generation21, Gfp1968, Gharibpoor, Ghettodude, Ghmyrtle, Giri.utsav, GlamorousLove, Glane23, Glenstrae, Gnowor, Goalloverhere, Gobonobo, Godwilldie, Gogo Dodo, Golbez, Goldplace, Gopetion, GraemeL, Graham87, Grantcharlesadams, Gregm26, Gregorymurp, Ground Zero, Gruznov, Gsarwa, Gurch, Gurchzilla, Gushman68, Guyzero, Haakon, Haleron, Half price, HamburgerRadio, Hamidtesta, Hathornt, Hdt83, Headlikeawhole, Hippielife, Hisham Sadik, Honzazi, Howcoolasn, Howdy2, Hu12, Hummer89, Hydrogen Iodide, I dream of horses, I is ori, IProduction, Ianmw, Ibbn, Icomment, Ignoranteconomist, Igorberger, Ijon-Tichy, Imaginationac, Infinityisthelimit, Inflation killer, Inkington, Invertzoo, Ioeth, Iridescent, Isaac, Isocialnet, Ixfd64, J.delanoy, J13b08, J36miles, JCam, JWikiHacker, Jabberwot, Jaclyn Ferman, Jake Wartenberg, Jallen10, James086, JamesBWatson, Jameshutchinsonmas214, Jamess98, Jamie2999, Jammer007, JamminBen, Jarble, JaredInsanity, Jasontocute, Javert, Jay Litman, Jaymaxx2989, JazMc, Jazzee8845, Jb11247, Jbtrout, Jebba, Jedcore, Jeff G., Jengelh, JensonTC, Jfaulkes, Jim1138, Jimernst, Jknepfle, Jlee1973, Jmencisom, Joe280, John Riemann Soong, John of Reading, John259, JohnInDC, JohnUpp, Jonathan de Boyne Pollard, Jonathanbishop, Jonheidar, Jonmrich, Jonobennett, Jonstowe, Jonverve, JordoCo, JorgeGG, Joseph Solis in Australia, Josephgrossberg, Jprg1966, Jredmond, Jsperber, Julie W. Johnson, Jungle Girl, Jusdafax, Jw2034, Jwmsfobcn, K12u, KKoolstra, KSharma402, Kai-Hendrik, Karada, KaragouniS, Kaskaad, Katemartin, Kattmamma, Keithwalsh88, Kerfuffler, Kesharajcox, Khalfani khaldun, Kingpinkpanther, Kinkykisses, Kinu, Kirdes, Kkm010, Kleidimico, Klostermankl, Knight of Truth, KnowledgeOfSelf, Knowledgeofitall, Kollision, Korynd, Kozuch, Kraftlos, Krishnaprasaths, Ksmithone, Kukini, Kushalbiswas777, Kvasilev, Kwiki, Kyle.Lindsay, LOL unusual, Labongo, Lanabrennan, Larry laptop, Latka, Laurathered, Ldackerman, Lectonar, Lee.Sailer, LeftWikipedian99999, Leftgut, LeilaniSchweitzer, Leki, LemonPuddingPop, Leo R, Leobold1, LeslieJD, Lesly.bauer, Leuko, Levineps, LifeConnect, Linkspamremover, Liotier, Lithistman, LittleOldMe, LiveChris, Llywelyn2000, Logan, Lotje, Lrgates83, Luckycharm 54, Lucyin, Luizdl, Lumos3, Lwayler, LyricaUpload, Lzyabc597, MBisanz, MCB, MER-C, MHamlet, Madhero88, Magioladitis, Malachi Raymon Richardson, Mamawrites, Manop, Manuelhp42, MarQ, MarcButterly, Mark Arsten, Mark Renier, Mark in wiki, Mark.Crosby, Marqueed, Mattbr, Maurice Carbonaro, Maxelrod, Mbiama Assogo Roger, McSly, Mebutnoone, Mediran, MelbourneStar, Melquinones, MeoFillo, Mforme1, Mhealy13, Michael Hardy, Michael Shields, Michael Thomsson, MichaelEjr., Michaeljj45, Michigan411, Micromagnate, Mifter, MikeBourne, Mimihama, Mimihitam, Minardi, Mindmatrix, Miranche, Mitch Ames, Mmfc11, Modelships22, Mohitsg, Montgomery '39, Monty845, Morning277, Mortenoesterlundjoergensen, Mortense, Moxy, Mpw5013, Mr. Stradivarius, Mr.Z-man, MrMetropolitan, MrOllie, Mrbellek, Mrjackrichardson, Mscalculus, Msjvd, Mtownsel, Mufka, MultimediaGuru, Munibert, Mxn, Myfacezone, Myhouseof, Mywymedia, N okla, NCSS, Nabeth, Nalita2010, Natandoron9, Nathan Johnson, NawlinWiki, Neerajkgupta888, Neogura, Nero8858, Netalarm, Netgrrrl, Newspaperman, NiceNews, Nickanderson1998, Nonexistant User, Nowa, Nshawty13, Nucumnon, Nullzero, Nuttycoconut, Nymf, Ogdens, Ohnoitsjamie, Oknazevad, Okolnost, Olapeter007, Oli Filth, Onefineham, Orange Suede Sofa, OregonD00d, OrsanS, Ottawahitech, Ottre, Ozhu, P2pdonkey, PachoJavier, Paganinip, Palastine.girl, Palltrast, PamukSoundystem, PantherNC, Parker229, Partha53323, Pascal.kotte, Patriarch, Pavel Vozenilek, Paxsimius, Pboodark, Perebourne, Perfecto, Perique des Palottes, Peteyboy0192, Ph8l, Phalacee, Philip5341, Pichu0102, Pieisgood999, Pigironjoe, Pigsonthewing, Pindaregirl, Pinkballer, Piotrus, Pjoef, Pnm, Polmorry, Poohnet, Ppntori, Pr0fess0r, Pradbit, Prithviamin, Progdev, PunkyMcPunkersen, Qbas81, Quarl, Quiname, Qwyrxian, RJaguar3, Raaah, Raidenx18, Rajaasad, Rajgadwicki, Ramanbasu, Rambalagopal, Ramyalakshmanan, Rancalred, Ravenvow, Rawling, Rbirla0, Rbk34, Rcajht, RedHillian, RedLeaf81, Redskinsfan1, Refsworldlee, Regea, Richard0612, RichardRosse, Richie.watson, Rinconsoleao, Rjwilmsi, Rlendog, Robc133, Roberta F., Robofish, RockMFR, Rocketrobbie, Roivo, RomeW, Romeo971987, RonCoyoteLee, Ronhjones, Ronz, RossPatterson, Rossami, Rrdieci, Rrmsjp, Ruptan, Ruudbwai, SPolgar, Sabisu, Sae sae, Sahil.gurjar, Saifur rahman saif, Saivilo, Sam'sTheJazzMan, Sameerdhamani, Samer.hc, Samihah125, Sammyho, Sandflea, Sandrafromgermany, Sango123, Sarahragsdale, Sascha Noak, Savism, Sayyid Muhammad Emadi, Sborau, Scarian, Scepia, SchfiftyThree, Schnoatbrax, SchreiberBike, Scopecreep, Scott McCombe, Strathcyde, Sdavis0830, Seaphoto, Seb az86556, Seckelberry, SeriouslyIcy, Shadowjams, ShahChirag, Shaikhshoaib, Share4life, Shareknowcrop, Sharon08tam, Shashi nsp, Shawisland, Sheelynnn, Shepard, Shiznit1618, Shortney, Showard-akoster, Shravanmishravonkerz, SigmaX54, Signalhead, Signed24, Signo, SimonP, SiobhanHansa, Sitethief, Skunkboy74, Sky Harbor, Slakr, SleepingInClass, Sluzzelin, Smalljim, Smcmanus, Sngouri, Snigbrook, SoWhy, Soap, SocialNetworking, Socialnerd, Solphusion, Somertime, Somno, SpaceFlight89, Spacebungle, Spanchangam, Sparior, Spikeysparrow, Spinner, Spongefrog, SquidSK, Sscsasrs, Starczamora, Starizing, Stassats, Staszek Lem, Steffriot, Stephanejolicoeur, SteveD503, Stevepoppe43, Stickee, Strathallan Helper, Strecken, Sunflower fan, Sunray, Superheat, Superm401, Susri20, SwiitApps, Syzgyz, Szoluska, T, Talkin bout chicken, Tamsin250, TanishaElleBrown, Tauriel-1, Tcooling, Teles, Terryoleary1981, Tezpur4u, The Chaos Corporation, The Giant Puffin, The Magnificent Clean-keeper, The Thing That Should Not Be, The-verver, Thebearclub, Thegn, Thehelpfulone, Theinstantclassic07, Theremvie, Therexbanner, Theskibum, Thinkingpark, This Is MySpace, Thomas.verhoog, Tide rolls, TimVickers, Tiptoety, Tisane, Tizzey, Toddst1, Tom4007, Tomlzz1, Torchwoodtwo, Tornak47, Toussaint, Towel401, TreasuryTag, TrebleSeven, Treekids, Trekden, Trevj, Tri400, Trivelt, USchick, Ubaidrehman, Ujwaltickoo, UkPaolo, Uma.kane, Umdterp1, Uncle Dick, Uniposter, User1er, User1er1er, Utcursch, VCHunter, Vadmium, Valador, Valenciano, Valleyofdawn, Vatsan34, Velella, Versageek, VictorAnyakin, Videomodelpics, Vikash812, Vishvax, Visualdeveloper, VladGenie, Voxii, Vrenator, Vstariq, WOW, WaelSalloum, Wakeyjamie, Walton One, Wavelength, Waycool27, Wayne Slam, WebWonderGal, Webconomist, Weedonsgrandson, Wefqawrgrefwea, Welsh, WhatamIdoing, WhisperToMe, Whoisjohngalt, WikHead, Wiki1010101, Wiki13, WikiWilliamP, Wikidemon, Wikiklrsc, Wikipelli, Wj32, Wnjr, Woohookitty, WookieInHeat, WordyGirl90, Wrjames7, Xjengvyen, Yankeedoodled, Yash.kankal, Yayrey, Yerpo, Yuwiepal, Zaphriielle, ZimZalaBim, Zodon, Zollerriia, Zondor, Zvonicek, Zvrkast, Zzuuzz, Zzyzx11, , 1263 anonymous edits Remote access Source: http://en.wikipedia.org/w/index.php?oldid=523218928 Contributors: AlistairMcMillan, Allanp73, ArmacBV, Beetstra, Big Bob the Finder, Chesnochek, Cotoco, Cybelmar, DabMachine, Diamondland, Eastlaw, EncMstr, Englab, FairyMary, Gadfium, Gor1420, Haakon, Headbomb, Hetar, Jacob52283, Jadore126, Jim.henderson, Jmao1, MER-C, Materialscientist, Mean as custard, Mercury543210, Minshum, Mmmmmpop, Morganl777, OlEnglish, Oli Filth, Ost316, Philip Trueman, RJFJR, RedWolf, Samsoncity, Sarregouset, Shriram, Spartners, Srleffler, TheProject, Theo10011, Thompson.matthew, Titanic5000, Valepert, Wikieditor06, Winterst, Xanderpaz, 35 anonymous edits Collaborative software Source: http://en.wikipedia.org/w/index.php?oldid=527210620 Contributors: .:Ajvol:., 16@r, 21hattongardens, A8UDI, ARK, Abdull, Aenar, Ahmed Fouad(the lord of programming), Ajinkyatara23, AlainV, Alex Kosorukoff, Alex heiphetz, Alexkon, Andris, Andyjsmith, Angela, Ap, Art Cancro, Artimis Cat, Autiger, BD2412, Babajobu, Bjankuloski06en, Blue.eyed.girly, CanadianLinuxUser, Capricorn42, Catalyst27, Catfoo, Celine beck, Cengelbart, Ceyockey, Cganskewiki, Chiswick Chap, Chrisjj, Cityrocks, Codename Lisa, Compo, Conan, Connard54, Coolcaesar, Copyeditor42, Craigb81, DARTH SIDIOUS 2, DJKay, DOHill, DXBari, Daf, DavidBiesack, Dawamdjs, DeknMike, Delta 51, Denny, Discospinster, Dlazerka, Dnourie, Download, Dragonflare82, Drummondjacob, Dyl, EdHubertson, Edivorce, Eglim, Einar75, ElTyrant, Erin0616, EryZ, Esanchez7587, Ettrig, Everyking, FF2010, FashionNugget, Fkgaza, Fredrik, Fvw, F, Gachet, Gbog, Geni, Gioto, Glenn, Goodmansasha, Guitardemon666, Haakon, Headbomb, Herbert1000, Hhielscher, Holizz, Hu12, ISTB351, Inixia, Inthecloud, J.delanoy, JForget, JHunterJ, Jamie Fox, Jcholewa, Jgrahn, JoanneB, Johnpeters11, Jojit fb, Joris Gillis, Joshua Issac, Jpbowen, KD5TVI, KGV, Kaysov, Kff, Kgfleischmann, Khalid hassani, Kledsky, Klim3k, Komap, Konra, Kpjas, Kubigula, Kuru, Leejasonc, Lexor, LiDaobing, Logixoul, Longlyf, MCG, MER-C, MKar, MLWilson, Macrakis, Magioladitis, Magister Mathematicae, Magnus.de, Marclaporte, Mark Elliott, Maurreen, Maximus Rex, Mbacher-asimon, Meclee, Mereda, MichaelMcGuffin, Miranche, Mjbinfo, Mmalbayrakoglu, Mmckibben, Mogism, Mr. Vernon, MrOllie, Mtjabbar, Mtlk, Mwfnwa, Mydogategodshat, Nasa-verve, Nehurd, Neilm, Ngosuna, Nixdorf, Nunesde, Nunesdea, Nurg, Nww mag, OlEnglish, Oscarguindzberg, Ott, Palecitrus, Pascal666, Pattonre, Paul August, Paul W, Perfecto, Persian Poet Gal, Petr Kopa, Pgillman, Pgk, PierreAbbat, Pixelsonscreen, Pkchan, Pnm, Polymerbringer, Prolog, Punja2002, Quarl, Quickwik, R.123, R4kk00n, Radagast83, RadioActive, Ramrah01, Rbstimers, Rdsmith4, RedWolf, Redeyed Treefrog, Reedy, Rickbphila, Ripalda, Rob cowie, Rodii, Ronz, Rursus, Rvsce.2008, Rwalker, Rwwww, SLiberman, SMasters, Sakkemy, Samw, SansSanity, Scirocco6, Silvonen, SimonP, Snowbrdfox, Solipsist, Spiderthumb, Stephenb, StevenFilipiak, Stevertigo, Stevietheman, Sultanzahir, SymlynX, T4Truth, THEN WHO WAS PHONE?, Tadpole9, Tec5nical, The Cunctator, ThurnerRupert, Trbdavies, Troels Arvin, Truthbro, Tummysak, Urzadek, VSeymen, Veinor, Versageek, Versus22, Viajero, Vibhijain, VoteFair, Vrenator, Wai Wai, Wavehunter, Weregerbil, Winchelsea, WintersChild, Wissenslogistiker, Wmahan, Woohookitty, Xelgen, Yaron K., Ysivaram, ZeroA4, Zondor, 664 , anonymous edits Internet phone Source: http://en.wikipedia.org/w/index.php?oldid=465910597 Contributors: .::Arbitrary::., 123microsoft123, 159753, 16@r, 23skidoo, 28421u2232nfenfcenc, 6birc, A. B., A.Ward, A13ean, A876, AJR, AVMsoftware, Abesford, Academic Challenger, Acalamari, Acce245, Accountwiki2, Acidburn24m, Adam78, Adclark88, Addihockey10, Adjektiv, Adoresoftphone, Aelman, Agnvoip, Ahmadalweshah, Ahoerstemeier, Ajrichens, Akram1997, Al E., Alan Liefting, Alansohn, Ale jrb, Alecv, Alejo2083, Alex de carvalho, Alexander Straub, AlistairMcMillan, Alokagga, Alphachimp, Altesys, Alw75, Alxeedo, Amalia07, Amandavpi, Amescreative, Ananth t, Andre nsi, AndrewKay, Andromeda451, Andy Dingley, Andypandy.UK, Angr, Anir1uph, Anon2, Antonio Lopez, Apapadop, Apyule, Archelon, Aresnika, Argon233, ArkansasHistory, Artvister company, Ashton1983, Ashumit02, Asimzaidi123, Atlant, Atlasvoice, Ausinha, Avi.dorfman, Av, Azazello, BRUTE, Babajobu, Banej, Banes, Bansaribarot, Beboy10, Beetstra, Beland, Ben.c.roberts, BenFrantzDale, Bender235, Beno1000, Bevo, Bfax, Bfurst, Biggkid5, Bigtex 1, Biker Biker, Billhunt, Billkor, Binksternet, Biot, Bluerasberry, Bluezy, Bobblewik, Bobo192, Boffin, Bogdanwiki, Bonius, Boogachamp, Bowensrun, Bowmanjj, Box News, Bozsingdani, Bphenix, Bprincipi, Bradleyyard, Braeside, Brandon, Brest, Brickbeard, Brocha, BrokenSegue, Brycen, By97aa, C172rg, CTZMSC3, Cabiria, CalamityGNDM, Caliqt84, Calltech, Caltas, CambridgeBayWeather, Camie333, Camptown, Can't sleep, clown will eat me, CanisRufus, Canthusus, CapitalR, Capricorn42, CardinalDan, CaribDigita, Cbarbry, Ccowling, CesarB, Chaldor, Charles Matthews, Chealer, ChrisJMoor, Chrislk02, Christopher Mahan, Churb75, Cielomobile, Cindyt27, Civil Engineer III, Ckatz, Clairecare, Cliconnect, Clq, Cluth, Coffee, Colin Keigher, Colonies Chris, Combes, CommEvo, Computerjoe, Connelly, Coolmac860, Coreyxbs, Cre8d, Crosbiesmith, Crutter, CsamFord, Cst17, Cweath7, Cyberdyme, Cyrilfr, Cyrius, D.c.camero, DDeckert, DaMenace123, Daev, Daikiri, Dan100, DanielCD, DanielVonEhren, Danr2k6, Dapps007, Daquell, Dask137, DataHead2112, DaveSymonds, Daven200520, Daveslomo, Davfox, David Johnson, David Sorf, David.a.gelman, DavidStainberg, Dawnseeker2000, Db11710, Dbollard99, DeadEyeArrow, Deeahbz, Deeprig9, Deineka, Dennis70, DennisDaniels, Depill.is, DerHexer, Desecrator, Deserthawks, Dgtsyb, Diberri, Dicklyon, Diego.viola, Diverman, Dlsieradzki, Dlyons493, Dmar198, Dobregon, Dobrien, DocWatson42, Docboat, Donama, Doretel, DoretelCom, Double DKool, Dpocock, DrDorkus, Dreadstar, Dreamafter, Drinking.coffee, Dspanalyst, Duckdad, Ed Poor, Edgeley, Edtealdi, Efrondozo, Egstcm, Ejwma, ElBenevolente, Elbperle, Electriccatfish2, EncMstr, Enochlau, Enric Naval, Eorlov, Epastore, Epbr123, Epl18, Erianna, Ethan01, Europrobe, Evanwolf, Everyking, Evice, Expertu, F, F Notebook, FT2, Falcorian, Faradayplank, Fastfission, Fayedizard, FayssalF, Fennelcm, Firetrap9254, Flambib, Flod logic, Fluffernutter, Foodeei, Foofy, Forkqueue, Fraggle81, Fram, Francis Good, Francs2000, Fred Bradstadt, Fred Gandt, Free Bear, Freeness, Fresheneesz, Freshtel, Freyr, Frizzle, Funkyguy, Fvp, Fyrael, GRD, GULFSIP.Engineer, GULFSIP.voip.engineer, Gabrielyan, Gadfium, Gail, Galoubet, Garvanet, Gbleem, Ged Davies, Ged UK, Geekking, Geep23, Gfoley4, Ghadsall, Giftlite, Gilliam, Gimpmask, Glendonflowers, Glenitec610, GlobalEdge 2010, Globaltransmitter, Gobbagoo, Goblin, Gogo Dodo, GoingBatty, Gopalkrishnan83, Goplett, GraemeL, Graham87, GregA, GrooveDog, Guaka, Gubbay, Gurchzilla, Gutnick, Gusegn,

424

Article Sources and Contributors


Gwernol, Gwicke, HUnger, HWSager, Haakon, Hack-Man, Hadal, Hairy Dude, HappyInGeneral, Harryzilber, Hawlkeye1997, Headbomb, Henrygb, Hetar, Hgarciagg, Hipvoice, Hnram96, HockeyInJune, Holme053, Hooiemajoris, Hooman.marandi, Hooperbloob, Hope work, Hopper96, Hrbrendan, Hu12, Hugh168, Hughzhu, Husond, Hydrargyrum, IMac4ME, Ibanix, Ignorance is strength, Ikanreed, Imcdnzl, InShaneee, Incnis Mrsi, Indangermouse, Infrogmation, Inotbf, Insanephantom, Intelafone, Interchangegroup, Intercompages, Interiot, Ipatrol, IronGargoyle, IronHelix, Iskitoofast4u, It Is Me Here, Itsme, Itusg15q4user, Ixfd64, J Milburn, J Santoso, J.delanoy, JHunterJ, JSsoftware, Jadams76, Jafeluv, Jahoe, Jalal0, James086, JanCeuleers, Jana Grare, Janahan, Jasenlee, Jasonon, Jasper Deng, Javacava, Javamen, Jbrock11, Jcline0, Jcyrus80, Jebba, Jeffholton, Jeffman78, Jeffq, Jehochman, JeremyR, Jerome Charles Potts, JetLover, Jezaraknid, Jhessela, Jhknight, Jidanni, Jignesh.4soni, Jim.henderson, Jim1138, Jimp, Jimthing, Jjspirko, Jmabel, Jmediate88, Jnavas, Joe1945-01, JoeSmack, John Doe or Jane Doe, John Vandenberg, Johnflan, Johnleemk, Johnnie ong, JohnnyB, JonHarder, JonTeh, Jone5050, Jongrant, Jonolumb, Jonuday, Joseph Solis in Australia, Joy, Jptdrake, Jreconomy, Jroddi, Jrtayloriv, KF, KVDP, Kaare, Kamaniskeg, Karada, Karl-Henner, Karl2620, Karn, Katalaveno, Katiker, Kazvorpal, Kbrose, KelleyCook, Ken Olsen, Kevincw01, Kevinmon, Key134, Kgfleischmann, Kglavin, Kgrr, Kikos, King adan, King of Hearts, Kingkobus, Kingpin13, Kiscica, Kku, Klapouchy, Koavf, Kozuch, KrakatoaKatie, Krallja, Kristof vt, Kryn1030, Kushal one, Kusma, Kvng, Kw27, Kylu, Kyng, LOL, LP-mn, Landroni, Lankiveil, Lansal, Larry2342, Lazydaisy, LeaveSleaves, Leeyc0, Lerdsuwa, Lethe, Leuk he, Lexx123, Linkspamremover, Linuxerist, Liquid Chrome1, LittleOldMe, Lolwarrior, Lootzy, LorenzoB, Lotje, Louietyj, Lozza, Lrlfrance, LtNOWIS, Luke Bales, Luna Santin, Lupo, MAlvis, MBK004, MER-C, MLD7865 Auto, Mac100, MacGyver07, Macdmq, Mad Carew, Maggu, Magioladitis, Makefreecalls, MamboJambo, Manickaselvam, MansonP, Manticore, Manuel Anastcio, Manuelamsp, Marc Lacoste, Marco79, MarcoAurelio, Maris Jansons, Mark v1.0, MartinHarper, MartrtinS, MartynDavies, MasterfulTroll, Matanya (renamed), Matthew Yeager, Matthewbulat, MattieTK, MattisManzel, Mattsday, Mauls, MaxDowney, Mcfutech, Mclowes, Mcsboulder, Meaghan, Mediran, Mehrdadd, Mendel, Merkel, Michael Hardy, Miguelaustro, Mike Gale, Mikeblas, Miken2005, Mikez711, Miladchik, Miltiades490bc, Mindmatrix, Mingthemad, Misterbigbrain, Mkzz, Mmccalpin, Mobidick0, Mobutu LM2006, Mohammed 77b, MonoAV, Monsieur champs, Mormegil, Morruga, Morte, Mote, Motoroflife, Mr.chetanladdha, Muhandes, Mukat, Mulligatawny, Murdamw, Muru, MusicTree3, Mws1979, Mxn, Myleslong, Mylivetech, Mysdaao, Mysekurity, Mysidia, N Yo FACE, NTK, Nageh, Nandini, Natl1, Naudefj, Navstar, NawlinWiki, Neilc, NerdyNSK, Nethgirb, Neustradamus, New2way, Newton2, Niazza, NickW557, Nikzbitz, Nishkid64, Nitinkrgupta, Nloth, Nneonneo, Noel Streatfield, Nono64, Nonodename, Notwist, Novum, Nubiatech, Nww mag, Oblivious, Ochib, Ohconfucius, Ohnoitsjamie, Oli Filth, Oliver.Shepherd, Oliver202, Olivier, Omegatron, Orphan Wiki, OverlordQ, Ozeki, Paidup, ParticleMan, Paul August, Pchov, PdDemeter, Peruvianllama, Pessi, Peter Hitchmough, Petrb, Pfwebadmin, Pgilman, Phatom87, Philip Trueman, Phoenix-forgotten, Phyzome, Piano non troppo, Picaroon, Pinnocchio, Pjbrockmann, Pjrich, Pnm, Poeloq, Pogostokje, Pol098, Polscifreak, Ponyo, Poorleno, Postdlf, Poweroid, Pparazorback, ProblemAssassin, Prunk, Pseudomonas, Pshibles, Pugglewuggle, Pugliavi, Quiensabe, Quintin3265, Qwyrxian, R'n'B, R3m0t, RadioKirk, Radioraiders, Rafehh, Rainman74, Rajarshic02, Ramshi1, Randy Johnston, Rapido, Rasmus Faber, RasputinAXP, Rchamberlain, Rearden9, Reedy, Reffidini, Remember the dot, Remobasith, Renffeh, Respawn2003, RexNL, Rhobite, Rich Farmbrough, Richardjohnstone, Rick7425, Rillian, Ringbang, Rishishringan, Ritterrat, Rjwilmsi, Robertbricker, Robertvan1, RoboAction, RoccoKIT, RockMFR, Ronz, Rose Booth, Rrburke, Rreagan007, Rrw, Rubgwobouhgrwoosf, Rudykog, Ruhrfisch, Rupertb, S.K., S3000, SJP, SMC, SUparJErk, Saaga, Sadads, Samw, Sandeep kumar pal, Sangyup81, SasiSasi, Savetheozone, Schmidtja, SchuminWeb, Scott0485, Scottperry, Seajay1979, Seajay19791, Sean Whitton, Secretflower, Seisatsu, Senator2029, Shadowjams, Shandris, Shara77, Sharonpfingo, Sharonxiv, Shebazahmed, Shii, Shinjodenn, Shizane, Signalhead, Silverfox196, Simeondahl, SimonInns, SimonP, Simsim4, Skarmachild, Skinkie, Slakr, Slon02, Smalljim, Smasafy, Smitty, Smostowfi, Smyth, Soptep, Sosodank, Spacestationshuttle, Sparklyfeet, Spearhawk, Spencer.fry@yale.edu, Spiko-carpediem, Splatg, Splendour, SqueakBox, Squideshi, Squids and Chips, Squiquifox, Squire of the Infernal Knight-Lord of Penguins, Srleffler, StaticGull, Stefano85, Stepa, Stephan Leeds, Stephen Lange Ranzini, Steven312, Stevertigo, Stevevogelnu, Stilldavid, Strait, Strib, Stuart Ward UK, Stupid2, Stwalkerster, Sudharana, Sumantu.mittal, Sun Creator, Superm401, Surge79uwf, Susyr, Sweetpoet, Sylverboss, Symbianguru, Synchrite, Sywyk, T2X, TJJFV, Tabletop, Tarquin, Tarret, Tassedethe, TastyPoutine, Tchin-NJITWILL, Tckma, Tcncv, Techman224, Tecpc2001, Teemuk, Telecom.portal, Tenbaset, Terinavy, Tgeairn, Tglovoip, Thakkar v, Thane Eichenauer, The Anome, The Belgain, The Rambling Man, The Storm Surfer, The Thin Man Who Never Leaves, The bellman, TheKMan, Thedp, Theh1982, Therebelcountry, Thingg, Thinkingphones, Thiseye, Thomas Blomberg, Thompsontough, Tide rolls, Tim Ivorson, Timrem, Tizio, Tkoeppe, Tliberty10, Tmaufer, Tmnmt, ToP Racer, Tobias Bergemann, Tom Jenkins, Tom k&e, Tombomp, Tomwalden, Toniher, Tony1, Towel401, Toytoy, Tran Quoc123, Trevor MacInnis, Tslocum, Twizler3, TwoTwoHello, Tylko, Ulf Abrahamsson, Ulric1313, UltraMagnus, Unixer, Unused0030, Utcursch, VCA, VSteiger, Val42, Vanished user 39948282, Vaquerito, VegaDark, Vegaswikian, Veinor, Veledan, Veromark, Versageek, Vespristiano, Vickygarg, Villarinho, Vina, Vinnythejinny, Vinogradovisoleksii, ViperSnake151, Vipinhari, Vmart, VoIPExpert, Voice99, VoiceNet, Voicepulse, Voidvector, Voip-solution, Voip.world, Voipfone, Voipphoneservice, Voiptopia, Voixium, Volker, Voskypro, Votingontheinternet, Voxbone, Vrenator, Vy0123, W Nowicki, WR:ichibantel, Wafulz, Waggers, Wannabav8r, Wavelength, Welsh, Weregerbil, Werelnon, West.andrew.g, WhaleyTim, Whicky1978, Whiskers9, WhiteBoy, Who, Who123, Wholived, WibblyLeMoende, Widr, WikHead, Wiki alf, WikiBlogger61, Wikidmoz, Wikieditor06, Wikivoip, Wile E. Heresiarch, WilliamKF, Wimt, Windharp, Wlpekar, Wmahan, Wongm, Woohookitty, Wtmitchell, Wtshymanski, Wwwqq, Xdenizen, Yahoolian, Yamamoto Ichiro, Yaronf, Yfrwlf, YongKim, Yoshboy, Yueni, Yurik, Zachripples, Zervaman, ZimZalaBim, Zimbabweed, Zondor, Zwz8406, Zzuuzz, Zzyzx11, ZzzBrett, , , 2255 anonymous edits Internet radio Source: http://en.wikipedia.org/w/index.php?oldid=524683903 Contributors: 100DashSix, 159753, 205.240.82.xxx, 420themax, 7&6=thirteen, ALargeElk, AbsolutDan, Acdx, Acracia, Adashiel, Adriaan, Afiler, AfroBilly, Alexjamesmedia, AlistairMcMillan, Allens, Alvis, Anonim.one, Asmreaz, Auric, Austin512, Avsa, B06dqn, Badgernet, Barek, BarretB, BayRadioDJ, Bearcat, Bellitza, Belvdme, Ben Ben, Benstown, Bento00, Bevo, Bfrasure, Bigstuh2, Bill Hood, Bkce23, Black Falcon, Blast Radio, Bloodshedder, Bobblewik, BobbyPeru, Boffob, Boontok, Borgx, Bovineone, Bpeps, Brandon in ca, Breno, Briaboru, Brian Kendig, Brianchamberlain, Bryan H Bell, BuffStuffer, Bumm13, C.Crane, CQJ, CWii, Cacuija, Caim, CambridgeBayWeather, Can't sleep, clown will eat me, Candywithawhy, CanisRufus, Carol wg, Cckkab, Cgingold, Chairman S., Chaitanya.lala, CharacterZero, Chpmnkkate, Chris9086, ChrisHamburg, Chuckeh, Chuckvms, Chuq, Closedmouth, Cnetbuild, Conversion script, Cool Dude101, Crossfireradio, CryptoDerk, D6, DCMara, DJProFusion, DVdm, Damian Yerrick, DanKassem, Danny, Dantadd, Dara12, DavidGGG, Davidgauntlett, Davidwaterman, Dayewalker, Dcljr, DennyColt, Deville, Diannaa, Dictionarium, DjEdii, Djtrix, Doc Tropics, Dogga, DopefishJustin, Dtaw2001, Duckdad, Dudesleeper, E Wing, E. abu Filumena, Economyms, EdwardFrank, El C, Eliyak, Enviroboy, Equinoxe, Esteffect, Evice, FFdot, Falcon8765, Farcical, Firsfron, Flewis, Flowanda, Flymeoutofhere, Foobaz, Frankjohnson999, Frankoleguer, Frap, Funandtrvl, Gad133, Gaius Cornelius, Gardar Rurak, Giacomo.vigorelli, Giudecca, Glenn, GraemeL, Graham87, Grauwald, Guyzero, Gveret Tered, H2g2bob, Haakon, Hadrian89, HaeB, Harryzilber, Hbackman, Henage, Henry Flower, Hephaestos, Heron, Hezery99, Hu, Hu12, Idont Havaname, Iksnatp, Immoralsins, InTeGeR13, Iridescent, Itai, Iwebradio, Izwalito, J. M., J.delanoy, JLCA, JLaTondre, JMyrleFuller, JWMcCalvin, Jackobyte, Jakes18, Jaromil, Jclemens, Jdclevenger, Jengod, Jerryobject, Jfarber, Jgritz, Jhazon, Jimkloss, Jmlk17, JoanneB, Josephnl, JussD, Jvdstoel, Jvhertum, Jwgreen65, Jxn, Karen Johnson, Katecummings, Kathleen.wright5, Kbrose, KelleyCook, Keraunos, Kiilerich, Kilopi, Kitty katt woman, Kloy1334, Kmanzi08, Kowloonese, Kristaga, Kristof vt, Kuru, Kxra, LMB, La Parka Your Car, La Pianista, LeeHunter, Levineps, Lexein, Lexor, Lightmouse, Lights, LimoWreck, Linkspamremover, Listen2myradio, Little Professor, Lordmac, Lostart, Lucidwave, Luna Santin, Lunarbunny, MDFawcett, MER-C, Mac, Mange01, MarcRS, Marek69, Mark Arsten, Mattdajuggalo, Matthew Yeager, Matthewedwards, Mayawi, McSly, Mdchachi, Medianet, Megarock, Melodyzzzz, MiNombreDeGuerra, Michael Devore, Michaelmcandrew, Mike8mike, Minesweeper, Moogoat, Mosquitopsu, MrJones, Musicfreeek, Muskiediver, Muthu 0101, Mxn, MyWhitehaven, Mydotnet, N2271, Nalos6, Narcotickid, Naturalorganic65, Nazrulbdjessore, Nealmcb, Neko-chan, Netito777, Newsjessore, Niceguyedc, Nightscream, Nk, Noahjohn, Nopetro, Northamerica1000, Norz, Nubiatech, Number13001, Nuttycoconut, Odradek23, Olisssr, Ouro, Oxymoron83, Padillah, Paul-L, Pepso2, Perfecto, PeteBatin, Pgk2, PhantomS, Phil-hong, Pixieinpurple, Poingweb, Promooex, Psi, Qazjaz, QuickFix, Quinobi, Radio Dan, Radiobill, Radioist, Radiorjbd, Raezander, Randomgenius, Reg porter, Reisio, Remember the dot, Requestion, ResearchGuru2009, RicReis, Rich Farmbrough, RichTrott, Richardc020, Rjwilmsi, Robfwb, Royalguard11, Rudymentaire, Rud Almeida, Ryan Roos, Ryz, S.kessling, SDalley, SWCastNetwork, Sam Francis, SamanthaPr, Samrolken, SatCam, Scm, Seaphoto, Seguru, Shadow1, Shoeofdeath, Shotwell, Sigma 7, SlubGlub, Smimrans, Smokizzy, Snmraj, Some jerk on the Internet, Sorryaboutleroy, Spotworks, SqueakBox, Stan Shebs, Stefanomione, Stereotek, Stevenrasnick, Stewartadcock, Stu Pid 12, Suffusion of Yellow, Swaq, Swinging60szone, THEN WHO WAS PHONE?, TMC1221, Tanje, TastyPoutine, Tavich, Tbone, TeamZissou, The stuart, Thejpmshow, Theonedangerous, Thumperward, Tom Morris, Toussaint, TravelingCat, Trefalcon, Trovatore, Ttenator, Twang, Twitherspoon, Ugen64, UniversalMigrator, User6985, Utexas313, Vary, Veinor, Vonfraginoff, Vox Humana 8', Wayland, Webpower, Weregerbil, WesleyDodds, Westmar, Whammy, Wik, Wikiklrsc, Williamborg, Wmahan, Woohookitty, Yandman, Yellowdesk, Zergkiller2255, Zpb52, Zundark, Zzuuzz, 848 anonymous edits Internet television Source: http://en.wikipedia.org/w/index.php?oldid=527611151 Contributors: .:Ajvol:., 16@r, 1ForTheMoney, 20chances, 8ty3hree, A. B., A.k.a., AGiorgio08, Abhilashswe, AbsolutDan, AdamBMorgan, Adaobi, AdjustShift, Admina2btveu, Adriansimo, Agou, Agupte, Ahoerstemeier, Alex.muller, Alexf, Alf Boggis, Alpha Quadrant, Alpha Quadrant (alt), Alphathon, Altenmann, Aluminator, Amager, Amandayz, Andfinally, Andresgu, Andrewpmk, Andypandy.UK, Ankegill, Ardalan1813, AriArk, Armando, Artaxiad, AshiqurIndustries, AxG, Axxess1, Babadjedi, Babalooey, Bachrach44, Barek, Bdeshtv, Bearcat, Bebossonline, Beetstra, BioTube, Bismar007, Bitbit, BlackTerror, Bobblewik, Boffob, Borgx, BradSchultz, Bradybd, Brakadabra, Brandon, Bryaneaton, BuffStuffer, Cableguytk, CambridgeBayWeather, Camilo Sanchez, CanadianLinuxUser, Canterbury Tail, Capricorn42, Captainrag, Carpetmedia, Chaos5023, Charles Iliya Krempeaux, CharlotteWebb, Chessphoon, Cheztir, Choang22, Christina268, Cirrus147, Cjsquires, Ckatz, Cometstyles, CommonsDelinker, Corti, Courcelles, Cqliujunhao, Cuaxdon, CurranH, CzarB, DGG, DISH, Dancter, Danderson65, DarkFalls, Darren227, Dasbert, Dbiel, DeaconJohnFairfax, Deadlyicon, Dedalus, Derekbd, Design, Desktiger, DianaSousa, Digitalant, Dilibero1, Dkkicks, Dmmmmm, DoirB, Dooniver, Drama123, Drguven, Dublinbach, Dumitrud, EVula, EarlCarlson, Edit khi, Edward, EfsunAskeri, Ekneifel, Eleventv, Emma23 K, EvilCouch, Expertjohn, FFMG, Faradayplank, Fcohernandez, Feedmecereal, Foerdi, Foremylife, Formative, Franchesca11, Frank810z, Frap, Freebasehacker, Funandtrvl, FunkyCanute, GMc, Gail, Gaius Cornelius, Geraki, Gergtreble, Gersun, Gfox730, Girardmediagroup, GoingBatty, Golf Bravo, GraemeL, GregA, Gregorof, Groucho, Gsarwa, H2005uk, H2g2bob, H4LSHH, Haakon, Hanni000, Harish madhyastha, Harryboyles, Hectorthebat, Hu12, Iamsoclever, Icedog, Indon, Infogenreviews, Infophile, Infrogmation, Internettv, IrishTV, Jackwan123, Jakeb33, Jamal256, Jamesxbrennan, Jamroc16, Jasmeet 181, JasonJack, JayAlto, Jel, Jenaatlynn, Jeraphine Gryphon, Jerome Charles Potts, Jesant13, Jevansen, Jim.henderson, Jkulovsek, Jlpinar83, JodieDavis, John254, Johntucker2, Jonathanfu, JordoCo, Jrleighton, Justme89, Jwalte04, Karnatisuman, Katecummings, Katesixdegs, Kbrose, KenFehling, Kermit2, Kindian, Kindmartin, KitchM, Kitty Davis, Klemen Kocjancic, Knuckles, Korfx04, Kuru, Kvng, Kwangjoo, L Kensington, Laca127, Latka, Leedsunited92, Leroyinc, Levineps, LewisDG, Light current, Loonymonkey, Lstreak1, Lulu-in-la, Luna Santin, MIgartua, Mac Davis, Malcolmxl5, Malerooster, Mandarax, Markjeff, Materialscientist, Mattbr, Matter, Mattib10, Mattnad, Mediabroadkast, Megan911, Megster85, Mentalmoses, Mhking, Michaeljbeauchamp, Michi.bo, Mild Bill Hiccup, Mindmatrix, Miran 12, Mkill, Mogism, Morapasten, MrOllie, Mrand, Mrsolutions, Mushroom, Myjosetv, Myscrnnm, N07, Nageh, Nationalblack2003, NawlinWiki, NeilN, Neilc, NickWNick, Nipel, Nish81, Nitishg, Noahon, NoblFreedom, Noformation, Nviusguy, Obilink, Ohnoitsjamie, Openeyesight, Ophie2020, Orangemike, Ordew, Oregoniansteve, Oscarthecat, Oxymoron83, Ozjames, Paulson74, Peaceworld111, Peleg72, Pevarnj, Pgr94, Ph.eyes, Phil Bridger, Phuzion, Piano non troppo, Pit-yacker, Pjhirst, Pkrulzzz, Pshen, Pwjb, Pwoodford, Pwt898, Quicksilvre, Quiddity, Radagast83, Ravensburg13, Ravnatelj, Redrocket, Redvers, Rex the first, Robbytein, Robmen3, Robth, Ronz, RuledBySecrecy, SHARD, Saffronbroadcasting, Sahrakorpi, Sarina132, Sarituk, Satbuff, Sbluen, Scarian, Schaury, Scorpion de soleil, Seerinteractive, Shanel, Shanelyle, Shawn in Montreal, ShelfSkewed, Shimeru, Sjr430, SkywireTV, Slatedorg, Smimrans, Socrates2008, Solivore, SqueakBox, Sriharsh1234, Ssharoni, Starbois, Stepa, Stephenchou0722, Steve03Mills, Stickguy, Stottula, Stypex, Suffusion of Yellow, Sun Creator, TBrandley, TeaDrinker, Tehytjd, Terryshin, Thingg, Thrill59, Tinkywinky 777, Tmh, Tokek, Tonkaloo1, Tonyalc2001, Tonyscha, Topher67, Torqueing, Toussaint, Traveler1888, Tre9234, Trickyager, Trotcopp, Trusilver, Tsb13, Turkey bananas, Twaz, Twxos, Ubignut, UncleDunkel, V111P, VEO15, Vacant72, Vdegroot, Veritycowper, Versageek, Viscas, Vox Pluvia, Vsk, WarthogDemon, Web62, Webconquest, Wik313, WikHead, Wikianon, Wikipediancag, Winnick, Wonghong, Woohookitty, Yoshimii,

425

Article Sources and Contributors


ZimZalaBim, , , 897 anonymous edits Sociology of the Internet Source: http://en.wikipedia.org/w/index.php?oldid=518209946 Contributors: ABVM, Alarob, Andycjp, Banana29336, Black Falcon, Bluejm2, Cirt, Cosmic Latte, DVdm, Daniel Case, DarwinPeacock, Farras Octara, Fiiiisch!, Gary King, Geschichte, Graham87, Hallows AG, HasSidd, Headbomb, Jatkins, JohnnyMrNinja, Jtneill, JustAGal, Kotorian1, Kyng, LamMAS229, LilHelpa, MaxVeers, Mbiama Assogo Roger, Mdd, Meclee, Mgiganteus1, Mmdye, MrOllie, Nabeth, NawlinWiki, Nigelj, Pasquale, Peelpel, Piotrus, R'n'B, Rjwilmsi, Rrburke, Sessi10, ShelfSkewed, Somebuster, Stapleymas229, The land question, Tomsega, Vassyana, W163, Wincrest, Woohookitty, Zainyx, 44 anonymous edits Internet censorship Source: http://en.wikipedia.org/w/index.php?oldid=527333132 Contributors: (, 0imagination, 12345kk, 1Veertje, 1exec1, 23prootie, 5 albert square, ARKdeEREH, AVRS, Abrech, Acidburn24m, Aeminorhan, Agent 78787, Aid85, Aladdin Sane, Alaning, Aleksander.adamowski, Alidha125, Alifbaa, Amaury, Ams80, Anbu121, Andjam, Andreas Toth, Andrewaskew, Angela, Angela26, Anonamaus, AnonymousOrc, AnonymousSyria, Antandrus, Anthony Appleyard, Apokrif, Apollosfire, Aqwis, Arashb31, Arexcairo, Arjun024, Arthena, Aseer22, Atakdoug, AtticusX, AuburnPilot, Auntof6, Ave Caesar, AxelBoldt, BKoteska, Bali ultimate, Bbbryce77, BeaverOtter28, Beefball, Ben Ben, Bencherlite, Bendelay, Bender235, Benlisquare, Benstew, Big Bird, Bikeable, Billinghurst, Bjamri, Black-Velvet, BlueShizzTwo, Bobokala, Bogdangiusca, Books96, Booyabazooka, Boud, Brightgalrs, BubbleDude22, Bunnyhop11, Burzmali, C.Fred, CMBJ, Cahk, Calliopejen1, Caltas, Camilo Sanchez, Canis Lupus, CapitalR, CardinalDan, Carewser, Carnildo, CastAStone, Catgut, Catxk, ChaTo, Cheekeong123, Cheong Kok Chun, Chessphoon, ChewyCows, Chowbok, Chrblum, Chris the speller, ChrisCork, Christopher Connor, Chugun, Chulki Lee, CieloEstrellado, Cirt, Ckatz, Clngre, Cobi, Coffee, Cojoco, Colonies Chris, CommonsDelinker, ConrholioXXX, Courcelles, CrazyChinaGal, Crecy99, Crossmr, Custardninja, CyberSkull, Cybercobra, Cyzor, DHN, DVoit, Dajanes, Damian Yerrick, DanielAgorander, Danieljackson, Darth Panda, Daveswagon, David.Monniaux, Davidwr, Dbachmann, Dcoetzee, DeadEyeArrow, Debresser, Definite, Deleet, Deus Ex, Deztroyer, Dfpc, DidierS, Dinosaur puppy, Djsean911, Dmkrantz, Dodehoekspiegel, Dojarca, Dom Padden, Don Cuan, Doron, Dougmcdonell, Download, Dreemteem, Drw25, Dynablaster, Edaderkas, Edgar181, Edgarharwood, EdgeNavidad, EditorsChoice, Eduardo Sellan III, Edward, Ekw1123, Elynt, Ender214, Enderminh, Enric Naval, Enviroboy, Epbr123, Equendil, Erikringmar, Esn, Evil saltine, Exadrid, Fabienkhan, Falcon Kirtaran, Faustus, FeelSunny, Finite, Fireasametaphor24, FleetingJoy, Flowerparty, Fluttershy, Frankanthonysanello, Freerk, FriedrickMILBarbarossa, Funky Monkey, Furrykef, Fushigi-kun, Fuzheado, G Clark, Gabi S., Gaius Cornelius, GenOrl, Gettingtoit, Givenarmy, Gogo Dodo, Goon Noot, Graciella, Gravitywheel, Grawity, Graymornings, Greyhood, Grm wnr, Guaka, Gurch, Haakon, Hadal, Hai gaiz, howyadoin?, Halaqah, Hallidaa, Hans Zarkov, Hassira, Headbomb, Heamsi, Hinrik, Hintha, Hodja Nasreddin, Holbeist, Hr2600hz, Huaxia, I Feel Tired, Ianchov, Icedog, Ipatrol, Iridescent, Iwazaki, Jacarv, Jarble, Jastify, JavierMC, JayJasper, Jeltz, Jemappelleungarcon, Jfialkoff, Jim1138, Jimprofit1, Jnavas, Joeblakesley, John Nevard, John of Reading, John254, JohnOwens, Johncapistrano, JonHarder, Jones,Justice, Joseph Solis in Australia, Josh Parris, Joshuabgood, Jovanyjuarez1234, Joy, Joyous!, Jyotirmoyb, JzG, K-UNIT, KAMiKAZOW, Kai-Hendrik, Kanatonian, Kanzler31, Karlissajade, Kashmiri, Kencf0618, Kennedypie, Kenyon, KevinAllen, Khalid hassani, Khazar2, KillerChihuahua, Kizor, Kkm010, Klemen Kocjancic, Klilidiplomus, Kompere, Kozuch, Kremmen, Kusma, Kyng, Kut, LPfi, Lahiru k, Lambiam, Lcarsdata, Lee Carre, LeedsKing, LegitimateAndEvenCompelling, Leon..., LiDaobing, Liftarn, LilHelpa, LittleDan, Loonymonkey, Lowzeewee, Luis Napoles, Luna Santin, Lynden Price, MBisanz, MK8, Mabahj, MadiZone, Maheshkumaryadav, Mailer diablo, Mandarax, Mani1, MarkPDF, MarkSweep, Mashford, MatRockswell, Matt Fitzpatrick, Mattbuck, Mattypaus, MaxPont, MaximDolgikh, Mdwh, Mechamind90, Meegs, Melchoir, Mentifisto, Mgiganteus1, Midway, Mike Rosoft, Miken2005, Mild Bill Hiccup, Mindmatrix, Mindravel, Mion, Missionary, Mitar, Mlouns, Mmxx, Modemac, Mr.Z-man, Mubor, Muchness, Mushroom, Nahrihra, Namithaluver, Nanoranger, NawlinWiki, Netizen, Neurolysis, NickW557, Nihiltres, Ninestories, NoGringo, Noiratsi, Nomadcowboy, Northamerica1000, NorthernThunder, Northerncedar, Novum, Nrabinowitz, NuclearVacuum, OCR40, Octopus-Hands, OhSqueezy, Ohconfucius, Oncewasnow, Outback the koala, Oxana879, Paananen, Pakistanfanforeva, Pankkake, Pass a Method, Patrick, Patrickdavidson, Pavel Vozenilek, Perfect416, Peter S., Phantom784, Phatom87, Phil Boswell, Philip Trueman, Piano non troppo, Poccil, Pquita, Prolog, ProveIt, PseudoOne, Quintucket, R'n'B, R.christie, RAMChYLD, RYNORT, RandomMonitor, Redcrown01, Redguy15, RekishiEJ, Rescbr, Rgoodermote, Rich Farmbrough, Risingthunder, Rjwilmsi, Robbiemuffin, Rodrigogomesonetwo, Ronhjones, Rostz, Rrronny, Rrrqr, Ruinia, Rustyfence, Rwendland, RyanCross, Ryuch, S710, Saeed.Veradi, SamJohnston, Samuelhardy, Sandbreak, SasiSasi, Saudijp, SchmuckyTheCat, Sebastienen, Secretlondon, Sesel, Shaddack, Shanes, Shangrilaista, Shengwei95, Shii, ShipSinker, Shrichriswiki, Siliconov, Sintaku, SiobhanHansa, Sitethief, Skinnyweed, Skizzik, Skyfiler, Smee, Snowolfd4, Sobesurfski, Socrates2008, Some jerk on the Internet, Sonicsuns, Soundoftoday, Sparkygravity, SpeedyGonsales, Springlake04, SqueakBox, Squiddy, Squiquifox, Sross (Public Policy), Sshelato, Stephen Gilbert, Stephen Shaw, Stevey7788, Stewacide, Stifle, Stwalkerster, Suriel1981, Svm1 63, Tanner Swett, Tanthanyes, Tassedethe, Tazmaniacs, Tccd, Tckrtckr, Tejas81, Telefooncentrale, Teohhanhui, The Anome, The LMOE, The Rambling Man, The Thing That Should Not Be, Thepulse2007, Theraring, ThesaurusRex, Thingg, Thomas Larsen, Thomas mann redux, Tim Capps, Titodutta, Tkandell, Tobz1000, Tom Morris, Tomdo08, TonySt, Toughjamy, Trachys, Trananh1980, TransUtopian, Trashday03, Traxs7, Tree Biting Conspiracy, Triwbe, Tunguuz, Unforgettableid, Utcursch, Varlaam, Velichk, VernoWhitney, Vicki Rosenzweig, Victorgrigas, Vmulligan, Vrenator, W.D., W163, WODUP, WPSamson, Watchdogb, Wereon, Whiskey Pete, WhisperToMe, Whiteboi69, Wiikipedian, Wiki1010101, WikiSlasher, Wikianon, WikipedianMarlith, Wikiwatcher1, Wingless, Wizardman, Wmahan, Wtmitchell, Wuffyz, XLittleP, Xasf, Xerves, Xperior, Yasirmemon, YellowMonkey, Zache, Zarcadia, Zealotgi, Zereshk, ZimZalaBim, Zollerriia, Zorry, Zuanzuanfuwa, Zwilson14, var Arnfjr Bjarmason, 879 anonymous edits Internet censorship circumvention Source: http://en.wikipedia.org/w/index.php?oldid=525246863 Contributors: Aeusoes1, Cherlin, Jfmantis, Kafziel, M2545, Magioladitis, Narubby, Rjwilmsi, US.ProxyServer, W163, Wikfr, 11 anonymous edits Internet censorship by country Source: http://en.wikipedia.org/w/index.php?oldid=524477515 Contributors: Atlasowa, Biker Biker, Bobrayner, Conspiration, Cperciva, Craitman17, Davemck, Dodehoekspiegel, Drpickem, Eduardo Sellan III, Eleassar, Eyalcohen13, Ghmyrtle, Happysailor, Hydrox, Jhertel, Jim1138, John of Reading, Karma842w, Keplik, Kiddie Techie, Kubieziel, Kwamikagami, Lightlowemon, MAXXX-309, Magog the Ogre, Martarius, Melchoir, Miguetlastra, Mogism, My very best wishes, Niall1798, Northamerica1000, OPolkruikenz, Omdo, OpenInfoForAll, RJFF, RichardMills65, Rjwilmsi, SaudiPseudonym, Sfan00 IMG, Sheilajt10, Shrigley, Srich32977, Suriel1981, Tetromino, ThePowerofX, Timothyhouse1, Toddles9, Tremaster, W163, WPSamson, WayKurat, Wikingtubby, Write English in Cyrillic, Yk Yk Yk, 42 anonymous edits Internet Corporation for Assigned Names and Numbers Source: http://en.wikipedia.org/w/index.php?oldid=526670070 Contributors: 16@r, 478jjjz, 5 albert square, Abdullais4u, Adotrde, Aenesidemos, Ahoerstemeier, Ajabbiz, Al Silonov, Alansohn, Alsandro, Alvestrand, Amcl, Andattaca2010, Aquarius Rising, Arancaytar, Ardenn, Avicennasis, Bdelisle, Beefyt, Behnam, BenjaminZClifford, Bevo, Binksternet, Bobandersen, Bovineone, Brianjd, Bunnyhop11, Cabazap, Calliopejen1, Cdc, CesarB, Cherlin, Cjkporter, Ckatz, Coemgenus, Colonies Chris, Conversion script, Coolcaesar, Costaroussos, Counsell, Cybercobra, Dancroak, Dandv, Daniel, Danlev, Deflective, DennyColt, Detailtiger, Dethme0w, Dfarrell07, Diberri, Dmendell, Don4of4, DreamGuy, Drmagic, Drphilharmonic, Dthomsen8, DuncanBCS, EagerToddler39, El C, Elkman, Elomis, Eperotao, Erebus555, Erianna, Euloiix, Fanatix, Flowerparty, Funnyhat, Furrykef, Futhark, Gbruen, GerardM, Gettingtoit, Glenn, Graham87, Greebowarrior, GreenJoe, Greenshed, Greg, Hairy Dude, Headbomb, Hm2k, Hux, Hydrox, Hyjwei, Intgr, IvanLanin, Iwaszkiewicz, Ixfd64, J.delanoy, JVz, Jak123, Japinderum, Jawed, Jesant13, Jiang, Jmiah, Jog1973, Joseph Solis in Australia, Josephf, JoshHendo, Joy, Jpbowen, Jrlevine, JusticeForICANNsVictims, Kaaa, Kbrose, Kgfleischmann, Kjd, Kkm010, KnowledgeOfSelf, Kurt Jansson, Kwamikagami, LawEditor2010, Lawtechgeek, Lekrecteurmasque, Ligulem, Lmq2401, Lotje, Louise666, Lqferreira, M7, Macduff, MacedonianBoy, MantisEars, MarkPDF, Master of Puppets, MattieTK, Melab-1, Metalaw, Mguidetti, Mifter, Mindeye, Mindmatrix, Moshe Constantine Hassan Al-Silverburg, Mschweigert, Mushroom, N419BH, Nakon, Namecritic, Nealmcb, Nextafrican, Nitika.t, Nsk92, Numbo3, Ohnoitsjamie, Omegatron, Orayzio, Particle, Paul, Pb30, Philip Trueman, Philippe Batreau, Piano non troppo, Piledhigheranddeeper, Pinkadelica, Piotrus, Pogoman, Polimerek, Preisler, Purefusion, Qxz, Raymond King, Reconfirmer, RedSoxFan274, RegistrarHistorian, Rex the first, Rich Farmbrough, Rjwilmsi, Rkrater, RobertG, RockOfVictory, Ronz, SF007, SHCarter, SamH, Santacruzette, SasiSasi, Scheinwerfermann, Schneelocke, Securawiki, Serenewaffles, Serte, Shaunak.s, ShelfSkewed, Shii, Shrips, SiobhanHansa, Sir Vicious, SmartyBoots, Smithbrenon, Snori, StephenWeber, Stepshep, Stevietheman, Stryik, Sun Creator, SusanLesch, TakuyaMurata, Thatbox, TheNewPhobia, Tim Starling, Tim!, Tobias, Toby Bartels, Tomlzz1, Tregoweth, TruthPraiser, Ulf Hermjakob, Unyoyega, Vbertola, Versageek, Violetriga, W163, Wavelength, WebHamster, Weltall, Wempain, WhisperToMe, Wickethewok, Wikiwikiwho, Wimpole, Wine Guy, Witan, Wolface, Woohookitty, Wrs1864, Wwallacee, Wwwhatsup, YUL89YYZ, YellowMonkey, Yonghokim, Zarcadia, Ziggyseventh, Zundark, , 255 anonymous edits Internet Society Source: http://en.wikipedia.org/w/index.php?oldid=523990859 Contributors: A12n, Adzinok, Agathe Atesh, Alanlevin, Alvestrand, Billslater, BorgQueen, Brenont, Butwhatdoiknow, Ciphers, Coolcaesar, Cybercobra, Emily Clea, FayssalF, Franckhlmartin, Frap, Gedigedi, Green Cardamom, Grouproject, Hairy Dude, Hayabusa future, Isoc-mu, Isocindiachennai, Ja2k8el, Jnc, Kazkaskazkasako, Kyng, Liftarn, LouI, Magioladitis, Marc Mongenet, Marclaporte, Maxugaz, Mikehelms, Mo ainm, Mxn, Newone, Nixdorf, ORBIT, Old Guard, Palfrey, Patrick Vande Walle, Paul, Pedro35, Phe, Philippe Batreau, Pingwong1009, Pwilson@apnic.net, Rashack, RicardoLloyd, Rjwilmsi, Robofish, Sathya yadhav, SchreyP, Shreedeepr, SivasubramanianM, Smoothhenry, Stoecker, Tarunno, Tokartta, Tomlzz1, Txuspe, Veni Markovski, Widr, Wwwhatsup, Ynhockey, 93 anonymous edits Internet Architecture Board Source: http://en.wikipedia.org/w/index.php?oldid=527400587 Contributors: Alleborgo, Alvestrand, Andrewaskew, Arcandam, Arthena, Carleas, Cbl62, Cybercobra, EwokiWiki, Jnc, JonHarder, MER-C, Mac, Malepheasant, Mathonius, Nk, OverlordQ, Paul, Poobarb, RA0808, Socrates2008, Sosei, SunSw0rd, The Anome, The Thing That Should Not Be, Yakovsh, 28 anonymous edits Internet Engineering Task Force Source: http://en.wikipedia.org/w/index.php?oldid=524450514 Contributors: Abhayakara, Adzinok, Akradecki, Aldnonymous, Alvestrand, Am088, Andrewpayneaqa, AnnaFrance, Aperson1234567, Athletic ro, Bazza 7, Behind The Wall Of Sleep, Behnam, Bender235, Bkkbrad, Blobglob, Borgx, BuffStuffer, Cbl62, Charlierichmond, Chester Markel, Cjkporter, CodeCaster, Conversion script, Coolcaesar, Coopkev2, Css, Cybercobra, Darguz Parsilvan, E Wing, FrenchIsAwesome, Ghettoblaster, Glenn, Graham87, Gregbard, Guanxi, HJ Mitchell, Hardaker, Hatster301, Howcheng, Icairns, Jarble, Jeffreyschiller, Jlenthe, Jnc, JonHarder, Joseph Solis in Australia, Jovianeye, Jrp, Jules.lt, Khazar2, Knuckles, Koavf, Krauss, LA2, Lentower, Liftarn, Livingthingdan, Looxix, Lotje, Luksuh, Magioladitis, Magnus.de, Matthewdingley, Mindmatrix, Miracleworker5263, Ninly, Noldoaran, Now3d, Olrick, P199, Paolopal, Paul, Paul Foxworthy, Paulehoffman, Philosopher, Pigdog234, Polimerek, Reallycoolguy, Rich Farmbrough, Rjwilmsi, Rob evans, RobLa, Spearhead, Stephen Gilbert, Sunray, Suruena, SusanLesch, The Anome, Tonyhansen, Tothwolf, TruthPraiser, Ummit, Uncle G, Vrenator, W163, Wavelength, Wayne Slam, Wikiborg, Y(J)S, Yakovsh, Zearin, Zigger, 90 anonymous edits Internet Governance Forum Source: http://en.wikipedia.org/w/index.php?oldid=527496044 Contributors: Aeons, Aitias, AnakngAraw, Anthony Broumas, Arcaist, AutomaticStrikeout, Avicky, Bobet, BradBeattie, Carioca-2008, Cattus, Cekli829, Chmyr, Corpx, Creationist Phil, Dave6, Dravecky, Edmanix, Epbr123, Everton1984, FrancoGG, Frap, Fredericknoronha, Globaljuggler, Guroadrunner, H, Highlander-Caucasus, Hu12, IG 0100, Igwiki, Ilikechocolatechips, Intershark, Iwaszkiewicz, JHunterJ, John of Reading, Jojovi, Kai-Hendrik, Kbrose, Korg, Lisatwo, Luna Santin, MER-C, Mlaffs, Nealmcb, NickelShoe, Olgacavalli, Phellmon, Politeguy, Pwilson@apnic.net, Qirtaiba, R'n'B, Rafikd, Raquel Gatto, Rballeste, Rettetast, Royalguard11,

426

Article Sources and Contributors


Rustan108, Samanthagd, Seraphimblade, Skanking, Skapur, SlviaSS, The Anome, TheGerm, Tomlzz1, Valentino k, WelshWitch66, WereSpielChequers, Woohookitty, Yeleyo, Yonatan, Yosemitebear, 58 ,anonymous edits Internet pioneers Source: http://en.wikipedia.org/w/index.php?oldid=458880207 Contributors: 8271 Error, Aeonx, Auntof6, Benzband, Chris the speller, Coffee, CommonsDelinker, Cybercobra, Dalahst, Dayyanb, Favonian, GoingBatty, Goustien, Hunting dog, Icairns, Jnc, Kazaplam, Khazar, Stefanomione, Teh.cursed.one, Thumperward, W Nowicki, W163, Welsh, Wikipelli, 16 anonymous edits

427

Image Sources, Licenses and Contributors

428

Image Sources, Licenses and Contributors


File:Leonard-Kleinrock-and-IMP1.png Source: http://en.wikipedia.org/w/index.php?title=File:Leonard-Kleinrock-and-IMP1.png License: Public Domain Contributors: Leonard Kleinrock Image:NSFNET-backbone-T3.png Source: http://en.wikipedia.org/w/index.php?title=File:NSFNET-backbone-T3.png License: Creative Commons Attribution-Sharealike 3.0 Contributors: Denniss, JuTa File:First Web Server.jpg Source: http://en.wikipedia.org/w/index.php?title=File:First_Web_Server.jpg License: GNU Free Documentation License Contributors: User:Coolcaesar at en.wikipedia Image:UDP encapsulation.svg Source: http://en.wikipedia.org/w/index.php?title=File:UDP_encapsulation.svg License: GNU Free Documentation License Contributors: en:User:Cburnett original work, colorization by en:User:Kbrose File:Internet Connectivity Distribution & Core.svg Source: http://en.wikipedia.org/w/index.php?title=File:Internet_Connectivity_Distribution_&_Core.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:Ludovic.ferre File:Icannheadquarters.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Icannheadquarters.jpg License: GNU Free Documentation License Contributors: Original uploader was Coolcaesar at en.wikipedia File:Internet users per 100 inhabitants ITU.svg Source: http://en.wikipedia.org/w/index.php?title=File:Internet_users_per_100_inhabitants_ITU.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 File:InternetUsersByLanguagePieChart.svg Source: http://en.wikipedia.org/w/index.php?title=File:InternetUsersByLanguagePieChart.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 Image:WebsitesByLanguagePieChart.svg Source: http://en.wikipedia.org/w/index.php?title=File:WebsitesByLanguagePieChart.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 File:ABC Clarke predicts internet and PC.ogv Source: http://en.wikipedia.org/w/index.php?title=File:ABC_Clarke_predicts_internet_and_PC.ogv License: unknown Contributors: Coyau, Morn, Wittylama, Zolo Image:Leonard-Kleinrock-and-IMP1.png Source: http://en.wikipedia.org/w/index.php?title=File:Leonard-Kleinrock-and-IMP1.png License: Public Domain Contributors: Leonard Kleinrock Image:Internet map in February 82.jpg144kB.png Source: http://en.wikipedia.org/w/index.php?title=File:Internet_map_in_February_82.jpg144kB.png License: Public Domain Contributors: Jon Postel File:SRI Packet Radio Van.jpg Source: http://en.wikipedia.org/w/index.php?title=File:SRI_Packet_Radio_Van.jpg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:Russavia Image:InetCirca85.jpg Source: http://en.wikipedia.org/w/index.php?title=File:InetCirca85.jpg License: Public Domain Contributors: Gmaxwell, Jnc Image:InternetPenetrationWorldMap.svg Source: http://en.wikipedia.org/w/index.php?title=File:InternetPenetrationWorldMap.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 File:Internet host count 1988-2012 log scale.png Source: http://en.wikipedia.org/w/index.php?title=File:Internet_host_count_1988-2012_log_scale.png License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:Ke4roh Image:First Web Server.jpg Source: http://en.wikipedia.org/w/index.php?title=File:First_Web_Server.jpg License: GNU Free Documentation License Contributors: User:Coolcaesar at en.wikipedia Image:Internet users per 100 inhabitants ITU.svg Source: http://en.wikipedia.org/w/index.php?title=File:Internet_users_per_100_inhabitants_ITU.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 File:WWW logo by Robert Cailliau.svg Source: http://en.wikipedia.org/w/index.php?title=File:WWW_logo_by_Robert_Cailliau.svg License: Public Domain Contributors: Hell P (PNG version); Bibi Saint-Pol (SVG version) File:Cern datacenter.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Cern_datacenter.jpg License: Creative Commons Attribution-Sharealike 3.0,2.5,2.0,1.0 Contributors: Hugovanmeijeren File:Cailliau Abramatic Berners-Lee 10 years WWW consortium.png Source: http://en.wikipedia.org/w/index.php?title=File:Cailliau_Abramatic_Berners-Lee_10_years_WWW_consortium.png License: Creative Commons Attribution-Sharealike 2.5 Contributors: Robert Cailliau File:WorldWideWebAroundWikipedia.png Source: http://en.wikipedia.org/w/index.php?title=File:WorldWideWebAroundWikipedia.png License: GNU Free Documentation License Contributors: User:Chris 73 File:NOAA Internet example.png Source: http://en.wikipedia.org/w/index.php?title=File:NOAA_Internet_example.png License: Public Domain Contributors: Original uploader was PNG crusade bot at en.wikipedia Image:Arpanet logical map, march 1977.png Source: http://en.wikipedia.org/w/index.php?title=File:Arpanet_logical_map,_march_1977.png License: Public Domain Contributors: ARPAckvjkvbkb gngjtu NET Image:First-arpanet-imp-log.jpg Source: http://en.wikipedia.org/w/index.php?title=File:First-arpanet-imp-log.jpg License: Public Domain Contributors: Bobak, Disavian, Kevs, Multixfer, Ohka-, Quadell, Rickington, RockMFR, Sfan00 IMG, Smallberg, ViperSnake151, 7 anonymous edits Image:NSFNETThreeTieredArchitecture.jpg Source: http://en.wikipedia.org/w/index.php?title=File:NSFNETThreeTieredArchitecture.jpg License: Public Domain Contributors: Denniss Image:NSFNET-backbone-56K.png Source: http://en.wikipedia.org/w/index.php?title=File:NSFNET-backbone-56K.png License: Creative Commons Attribution-Sharealike 3.0 Contributors: Denniss, JuTa Image:NSFNET-backbone-T1.png Source: http://en.wikipedia.org/w/index.php?title=File:NSFNET-backbone-T1.png License: Creative Commons Attribution-Sharealike 3.0 Contributors: Denniss, JuTa Image:NSFNET-traffic-visualization-1991.jpg Source: http://en.wikipedia.org/w/index.php?title=File:NSFNET-traffic-visualization-1991.jpg License: Creative Commons Attribution-Sharealike 3.0 Contributors: JuTa Image:NSFNETTrafficGraph-June1994.jpg Source: http://en.wikipedia.org/w/index.php?title=File:NSFNETTrafficGraph-June1994.jpg License: Public Domain Contributors: Denniss Image:NewNSFNETArchitecture.jpg Source: http://en.wikipedia.org/w/index.php?title=File:NewNSFNETArchitecture.jpg License: Public Domain Contributors: W163 Image:VBNS.jpg Source: http://en.wikipedia.org/w/index.php?title=File:VBNS.jpg License: Public Domain Contributors: Monkeybait, W163 File:Usenet servers and clients.svg Source: http://en.wikipedia.org/w/index.php?title=File:Usenet_servers_and_clients.svg License: unknown Contributors: User:Bdesham File:Usenet Big Nine.svg Source: http://en.wikipedia.org/w/index.php?title=File:Usenet_Big_Nine.svg License: unknown Contributors: User:Bdesham, User:Bobarino File:Usenet Binaries Upload process.PNG Source: http://en.wikipedia.org/w/index.php?title=File:Usenet_Binaries_Upload_process.PNG License: GNU Free Documentation License Contributors: DMahalko, Dale Mahalko, Gilman, WI, USA -- Email: dmahalko@gmail.com File:Usenet-total-storage.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Usenet-total-storage.jpg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:FlippyFlink Image:Usenet traffic per day (en).svg Source: http://en.wikipedia.org/w/index.php?title=File:Usenet_traffic_per_day_(en).svg License: unknown Contributors: User:Bdesham Image:X25-network-diagram-0a.svg Source: http://en.wikipedia.org/w/index.php?title=File:X25-network-diagram-0a.svg License: Public Domain Contributors: Adamantios Image:Televideo925Terminal.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Televideo925Terminal.jpg License: Public Domain Contributors: Bin im Garten, GeorgHH, Glenn, Hydrargyrum, Thuresson, Wing, 3 anonymous edits Image:Siemens-DAG-64 front.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Siemens-DAG-64_front.jpg License: Copyrighted free use Contributors: Casandro, GreyCat, Mardus File:SRI First Internetworked Connection diagram.jpg Source: http://en.wikipedia.org/w/index.php?title=File:SRI_First_Internetworked_Connection_diagram.jpg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:Russavia Image:IP stack connections.svg Source: http://en.wikipedia.org/w/index.php?title=File:IP_stack_connections.svg License: GNU Free Documentation License Contributors: en:User:Kbrose File:Wi-Fi Logo.svg Source: http://en.wikipedia.org/w/index.php?title=File:Wi-Fi_Logo.svg License: Public Domain Contributors: Wi-Fi Alliance File:Ghana satellite.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Ghana_satellite.jpg License: Creative Commons Attribution 2.0 Contributors: IICD www.iicd.org/photos

Image Sources, Licenses and Contributors


File:InternetPenetrationWorldMap.svg Source: http://en.wikipedia.org/w/index.php?title=File:InternetPenetrationWorldMap.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 Image:InternetUsersByLanguagePieChart.svg Source: http://en.wikipedia.org/w/index.php?title=File:InternetUsersByLanguagePieChart.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 File:Flag of the People's Republic of China.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_People's_Republic_of_China.svg License: Public Domain Contributors: Drawn by User:SKopp, redrawn by User:Denelson83 and User:Zscout370 Recode by cs:User:-xfi- (code), User:Shizhao (colors) File:Flag of the United States.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_United_States.svg License: Public Domain Contributors: Anomie File:Flag of India.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_India.svg License: Public Domain Contributors: Anomie, Mifter File:Flag of Japan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Japan.svg License: Public Domain Contributors: Anomie File:Flag of Brazil.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Brazil.svg License: Public Domain Contributors: Anomie File:Flag of Germany.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Germany.svg License: Public Domain Contributors: Anomie File:Flag of Russia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Russia.svg License: Public Domain Contributors: Anomie, Zscout370 File:Flag of Indonesia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Indonesia.svg License: Public Domain Contributors: Drawn by User:SKopp, rewritten by User:Gabbe File:Flag of the United Kingdom.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_United_Kingdom.svg License: Public Domain Contributors: Anomie, Good Olfactory, Mifter File:Flag of France.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_France.svg License: Public Domain Contributors: Anomie File:Flag of Nigeria.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Nigeria.svg License: Public Domain Contributors: User:Jhs File:Flag of Mexico.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Mexico.svg License: Public Domain Contributors: Alex Covarrubias, 9 April 2006 Based on the arms by Juan Gabino. File:Flag of South Korea.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_South_Korea.svg License: Public Domain Contributors: Various File:Flag of Iran.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Iran.svg License: Public Domain Contributors: Various File:Flag of Italy.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Italy.svg License: Public Domain Contributors: Anomie File:Flag of Turkey.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Turkey.svg License: Public Domain Contributors: David Benbennick (original author) File:Flag of Vietnam.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Vietnam.svg License: Public Domain Contributors: Lu Ly v li theo ngun trn File:Flag of Spain.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Spain.svg License: Public Domain Contributors: Anomie File:Flag of Pakistan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Pakistan.svg License: Public Domain Contributors: User:Zscout370 File:Flag of Argentina.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Argentina.svg License: Public Domain Contributors: Government of Argentina (vector graphics by Dbenbenn) File:Flag of Canada.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Canada.svg License: Public Domain Contributors: Anomie File:Flag of Colombia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Colombia.svg License: Public Domain Contributors: SKopp File:Flag of Poland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Poland.svg License: Public Domain Contributors: Anomie, Mifter File:Flag of Egypt.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Egypt.svg License: Public Domain Contributors: Open Clip Art File:Flag of Australia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Australia.svg License: Public Domain Contributors: Anomie, Mifter File:Flag of Malaysia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Malaysia.svg License: Public Domain Contributors: Achim1999, Ah Cong Strike, AnonMoos, Arteyu, Avala, Cycn, DarknessVisitor, Duduziq, Er Komandante, Fibonacci, Fred J, Fry1989, Herbythyme, Homo lupus, Juiced lemon, Klemen Kocjancic, Ludger1961, Morio, Nick, Reisio, Rocket000, SKopp, Sarang, Tryphon, VAIO HK, Zscout370, , 20 anonymous edits File:Flag of the Republic of China.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Republic_of_China.svg License: Public Domain Contributors: 555, Abner1069, Bestalex, Bigmorr, Denelson83, Ed veg, Gzdavidwong, Herbythyme, Isletakee, Kakoui, Kallerna, Kibinsky, Mattes, Mizunoryu, Neq00, Nickpo, Nightstallion, Odder, Pymouss, R.O.C, Reisio, Reuvenk, Rkt2312, Rocket000, Runningfridgesrule, Samwingkit, Sasha Krotov, Shizhao, Tabasco, Vzb83, Wrightbus, ZooFari, Zscout370, 75 anonymous edits File:Flag of the Philippines.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Philippines.svg License: Public Domain Contributors: User:Achim1999 File:Flag of Morocco.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Morocco.svg License: Public Domain Contributors: Denelson83, Zscout370 File:Flag of Thailand.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Thailand.svg License: Public Domain Contributors: Zscout370 File:Flag of the Netherlands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Netherlands.svg License: Public Domain Contributors: Zscout370 File:Flag of Ukraine.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Ukraine.svg License: Public Domain Contributors: Created by: Jon Harald Sby, colors by Zscout370 File:Flag of Saudi Arabia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Saudi_Arabia.svg License: Public Domain Contributors: Unknown File:Flag of Kenya.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Kenya.svg License: Public Domain Contributors: User:Pumbaa80 File:Flag of Venezuela.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Venezuela.svg License: Public Domain Contributors: Alkari, Bastique, Cycn, Denelson83, DerFussi, Fry1989, George McFinnigan, Herbythyme, Homo lupus, Huhsunqu, Infrogmation, K21edgo, Klemen Kocjancic, Ludger1961, Neq00, Nightstallion, Reisio, Rupert Pupkin, Sarang, Sparkve, ThomasPusch, Vzb83, Wikisole, Zscout370, 12 anonymous edits File:Flag of Peru.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Peru.svg License: Public Domain Contributors: User:Dbenbenn File:Flag of South Africa.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_South_Africa.svg License: unknown Contributors: Adriaan, Anime Addict AA, AnonMoos, BRUTE, Daemonic Kangaroo, Dnik, Duduziq, Dzordzm, Fry1989, Homo lupus, Jappalang, Juliancolton, Kam Solusar, Klemen Kocjancic, Klymene, Lexxyy, Mahahahaneapneap, Manuelt15, Moviedefender, NeverDoING, Ninane, Poznaniak, Przemub, SKopp, Sarang, ThePCKid, ThomasPusch, Tvdm, Ultratomio, Vzb83, Zscout370, 35 anonymous edits File:Flag of Romania.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Romania.svg License: Public Domain Contributors: AdiJapan File:Flag of Chile.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Chile.svg License: Public Domain Contributors: Alkari, B1mbo, David Newton, Dbenbenn, Denelson83, ElmA, Er Komandante, Fibonacci, Fry1989, Fsopolonezcaro, Herbythyme, Huhsunqu, Kallerna, Kanonkas, Klemen Kocjancic, Kyro, Mattes, McZusatz, Mozzan, Nagy, Nightstallion, Piastu, Pixeltoo, Pumbaa80, SKopp, Sarang, Srtxg, Sterling.M.Archer, Str4nd, Ultratomio, Vzb83, Xarucoponce, Yakoo, Yonatanh, Zscout370, 49 anonymous edits File:Flag of Uzbekistan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Uzbekistan.svg License: Public Domain Contributors: User:Zscout370 File:Flag of Sweden.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Sweden.svg License: Public Domain Contributors: Anomie File:Flag of Belgium (civil).svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Belgium_(civil).svg License: Public Domain Contributors: Bean49, David Descamps, Dbenbenn, Denelson83, Evanc0912, Fry1989, Gabriel trzy, Howcome, IvanOS, Ms2ger, Nightstallion, Oreo Priest, Rocket000, Rodejong, Sir Iain, ThomasPusch, Warddr, Zscout370, 4 anonymous edits File:Flag of Bangladesh.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bangladesh.svg License: Public Domain Contributors: User:SKopp File:Flag of Kazakhstan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Kazakhstan.svg License: unknown Contributors: -xfiFile:Flag of the Czech Republic.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Czech_Republic.svg License: Public Domain Contributors: special commission (of code): SVG version by cs:-xfi-. Colors according to Appendix No. 3 of czech legal Act 3/1993. cs:Zirland. File:Flag of Switzerland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Switzerland.svg License: Public Domain Contributors: User:Marc Mongenet Credits: User:-xfiUser:Zscout370 File:Flag of Austria.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Austria.svg License: Public Domain Contributors: User:SKopp File:Flag of Sudan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Sudan.svg License: Public Domain Contributors: Vzb83 File:Flag of Portugal.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Portugal.svg License: Public Domain Contributors: Columbano Bordalo Pinheiro (1910; generic design); Vtor Lus Rodrigues; Antnio Martins-Tuvlkin (2004; this specific vector set: see sources) File:Flag of Hungary.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Hungary.svg License: Public Domain Contributors: User:SKopp File:Flag of Greece.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Greece.svg License: Public Domain Contributors: (of code) cs:User:-xfi- (talk) File:Flag of Tanzania.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Tanzania.svg License: Public Domain Contributors: User:Alkari, User:Madden, User:SKopp

429

Image Sources, Licenses and Contributors


File:Flag of Nepal.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Nepal.svg License: Public Domain Contributors: Drawn by User:Pumbaa80, User:Achim1999 File:Flag of Hong Kong.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Hong_Kong.svg License: Public Domain Contributors: Designed by File:Flag of Israel.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Israel.svg License: Public Domain Contributors: The Provisional Council of State Proclamation of the Flag of the State of Israel of 25 Tishrei 5709 (28 October 1948) provides the official specification for the design of the Israeli flag. The color of the Magen David and the stripes of the Israeli flag is not precisely specified by the above legislation. The color depicted in the current version of the image is typical of flags used in Israel today, although individual flags can and do vary. The flag legislation officially specifies dimensions of 220 cm 160 cm. However, the sizes of actual flags vary (although the aspect ratio is usually retained). File:Flag of Algeria.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Algeria.svg License: Public Domain Contributors: This graphic was originaly drawn by User:SKopp. File:Flag of Syria.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Syria.svg License: Public Domain Contributors: see below File:Flag of Denmark.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Denmark.svg License: Public Domain Contributors: User:Madden File:Flag of Ecuador.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Ecuador.svg License: Public Domain Contributors: President of the Republic of Ecuador, Zscout370 File:Flag of Finland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Finland.svg License: Public Domain Contributors: Drawn by User:SKopp File:Flag of Azerbaijan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Azerbaijan.svg License: Public Domain Contributors: SKopp and others File:Flag of Norway.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Norway.svg License: Public Domain Contributors: Dbenbenn File:Flag of Uganda.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Uganda.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Tunisia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Tunisia.svg License: Public Domain Contributors: entraneur: BEN KHALIFA WISSAM File:Flag of Slovakia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Slovakia.svg License: Public Domain Contributors: SKopp File:Flag of Singapore.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Singapore.svg License: Public Domain Contributors: Various File:Flag of Belarus.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Belarus.svg License: Public Domain Contributors: Zscout370 File:Flag of New Zealand.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_New_Zealand.svg License: Public Domain Contributors: Achim1999, Adabow, Adambro, Arria Belli, Avenue, Bawolff, Bjankuloski06en, ButterStick, Cycn, Denelson83, Donk, Duduziq, EugeneZelenko, Fred J, Fry1989, Hugh Jass, Ibagli, Jusjih, Klemen Kocjancic, Mamndassan, Mattes, Nightstallion, O, Peeperman, Poromiami, Reisio, Rfc1394, Sarang, Shizhao, Tabasco, Transparent Blue, Vsk, Xufanc, Zscout370, 37 anonymous edits File:Flag of Bulgaria.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bulgaria.svg License: Public Domain Contributors: SKopp File:Flag of the United Arab Emirates.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_United_Arab_Emirates.svg License: Public Domain Contributors: Anime Addict AA, Avala, Dbenbenn, Duduziq, F l a n k e r, Fry1989, Fukaumi, Gryffindor, Guanaco, Homo lupus, Kacir, Klemen Kocjancic, Krun, Madden, Neq00, Nightstallion, Piccadilly Circus, Pmsyyz, RamzyAbueita, Zscout370, 4 anonymous edits File:Flag of Yemen.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Yemen.svg License: Public Domain Contributors: File:Flag of Ireland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Ireland.svg License: Public Domain Contributors: User:SKopp File:Flag of the Dominican Republic.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Dominican_Republic.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Ghana.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Ghana.svg License: Public Domain Contributors: Benchill, Cycn, Fry1989, Henswick, Homo lupus, Indolences, Jarekt, Klemen Kocjancic, Magasjukur2, Neq00, OAlexander, SKopp, ThomasPusch, Threecharlie, Torstein, Zscout370, 5 anonymous edits File:Flag of Sri Lanka.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Sri_Lanka.svg License: Public Domain Contributors: Zscout370 File:Flag of Croatia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Croatia.svg License: Public Domain Contributors: Nightstallion, Elephantus, Neoneo13, Denelson83, Rainman, R-41, Minestrone, Lupo, Zscout370, MaGa (based on Decision of the Parliament) File:Flag of Serbia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Serbia.svg License: Public Domain Contributors: sodipodi.com File:Flag of Bolivia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bolivia.svg License: Public Domain Contributors: User:SKopp File:Flag of Angola.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Angola.svg License: Public Domain Contributors: User:SKopp File:Flag of Cuba.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Cuba.svg License: Public Domain Contributors: see below File:Flag of Bosnia and Herzegovina.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bosnia_and_Herzegovina.svg License: Public Domain Contributors: Kseferovic File:Flag of Palestine.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Palestine.svg License: Public Domain Contributors: Orionist, previous versions by Makaristos, Mysid, etc. File:Flag of Lithuania.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Lithuania.svg License: Public Domain Contributors: User:SKopp File:Flag of Jordan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Jordan.svg License: Public Domain Contributors: User:SKopp File:Flag of Senegal.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Senegal.svg License: Public Domain Contributors: Original upload by Nightstallion File:Flag of Lebanon.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Lebanon.svg License: Public Domain Contributors: Traced based on the CIA World Factbook with some modification done to the colours based on information at Vexilla mundi. File:Flag of Oman.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Oman.svg License: Public Domain Contributors: *drew, Alkari, Cycn, Duduziq, Fry1989, Happenstance, Homo lupus, Ittihadawi, Jetijones, Klemen Kocjancic, Liftarn, Mattes, Neq00, Nightstallion, NikNaks, OAlexander, Orange Tuesday, Pumbaa80, Rfc1394, ThomasPusch, Zscout370 File:Flag of Costa Rica.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Costa_Rica.svg License: Public Domain Contributors: Drawn by User:SKopp, rewritten by User:Gabbe File:Flag of Kuwait.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Kuwait.svg License: Public Domain Contributors: User:SKopp File:Flag of Zimbabwe.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Zimbabwe.svg License: Public Domain Contributors: User:Madden File:Flag of Puerto Rico.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Puerto_Rico.svg License: Public Domain Contributors: User:Madden File:Flag of Uruguay.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Uruguay.svg License: Public Domain Contributors: User:Reisio (original author) File:Flag of Georgia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Georgia.svg License: Public Domain Contributors: User:SKopp File:Flag of Guatemala.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Guatemala.svg License: Public Domain Contributors: User:K21edgo File:Flag of Qatar.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Qatar.svg License: Public Domain Contributors: (of code) cs:User:-xfiFile:Flag of Latvia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Latvia.svg License: Public Domain Contributors: User:SKopp File:Flag of Zambia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Zambia.svg License: Public Domain Contributors: Author: Tobias Jakobs (in the public domain) and User:Zscout370 (Return fire) File:Flag of Paraguay.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Paraguay.svg License: Public Domain Contributors: Republica del Paraguay File:Flag of Iraq.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Iraq.svg License: Public Domain Contributors: Unknown, published by Iraqi governemt, vectorized by User:Militaryace based on the work of User:Hoshie File:Flag of Afghanistan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Afghanistan.svg License: Public Domain Contributors: User:Zscout370 File:Flag of Panama.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Panama.svg License: Public Domain Contributors: -xfi-, Addicted04, Alkari, Cycn, Duduziq, Fadi the philologer, Fry1989, Huhsunqu, Hystrix, Klemen Kocjancic, Liftarn, Mattes, Nightstallion, Ninane, Pumbaa80, Reisio, Rfc1394, TFCforever, Thomas81, ThomasPusch, Zscout370, , , 19 anonymous edits File:Flag of Albania.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Albania.svg License: Public Domain Contributors: User:Dbenbenn File:Flag of Slovenia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Slovenia.svg License: Public Domain Contributors: User:Achim1999 File:Flag of Moldova.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Moldova.svg License: Public Domain Contributors: User:Nameneko File:Flag of Honduras.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Honduras.svg License: Public Domain Contributors: D1990, Denelson83, ECanalla, Feydey, Fred J, Homo lupus, Klemen Kocjancic, Mattes, Matthew hk, Neq00, Oak27, Pumbaa80, Rocket000, RubiksMaster110, SKopp, ThomasPusch, Tocino, Vzb83, Yuval Madar, ZooFari, Zscout370, 10 anonymous edits File:Flag of Macedonia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Macedonia.svg License: Public Domain Contributors: User:SKopp, rewritten by User:Gabbe

430

Image Sources, Licenses and Contributors


File:Flag of Kyrgyzstan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Kyrgyzstan.svg License: Public Domain Contributors: Made by Andrew Duhan for the Sodipodi SVG flag collection, and is public domain. File:Flag of El Salvador.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_El_Salvador.svg License: Public Domain Contributors: user:Nightstallion File:Flag of Tajikistan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Tajikistan.svg License: Public Domain Contributors: Achim1999, Alex Spade, Anime Addict AA, Antonsusi, Apatomerus, Bjankuloski06en, Cycn, Ecad93, Erlenmeyer, EugeneZelenko, Fred the Oyster, Fry1989, Homo lupus, Johnny Rotten, Klemen Kocjancic, Leonid 2, Mattes, Nameneko, Neq00, Nightstallion, OAlexander, Rinkio, Sarang, SouthSudan, Zscout370, , 3 anonymous edits File:Flag of Mozambique.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Mozambique.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Cameroon.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Cameroon.svg License: Public Domain Contributors: (of code) cs:User:-xfiFile:Flag of Estonia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Estonia.svg License: Public Domain Contributors: Originally drawn by User:SKopp. Blue colour changed by User:PeepP to match the image at . File:Flag of Libya.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Libya.svg License: Public Domain Contributors: Various File:Flag of Ethiopia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Ethiopia.svg License: unknown Contributors: Aaker, Anime Addict AA, Antemister, Cycn, F l a n k e r, Fry1989, GoodMorningEthiopia, Happenstance, Homo lupus, Huhsunqu, Ixfd64, Klemen Kocjancic, MartinThoma, Mattes, Mozzan, Neq00, OAlexander, Pumbaa80, Rainforest tropicana, Reisio, SKopp, Smooth O, Spiritia, ThomasPusch, Torstein, Wsiegmund, Zscout370, 16 anonymous edits File:Flag of Bahrain.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bahrain.svg License: Public Domain Contributors: Source: Drawn by User:SKopp, rewritten by User:Zscout370 File:Flag of Jamaica.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Jamaica.svg License: Public Domain Contributors: Anime Addict AA, Boricuaeddie, Bruce1ee, Davepape, Duduziq, Fred J, Fry1989, Herbythyme, KBarnett, Kilom691, Klemen Kocjancic, Kounoupidi, Krnerbrtchen, Ludger1961, Mattes, Nishkid64, Odder, Reisio, SKopp, Sarang, The Evil IP address, Wknight94, 29 anonymous edits File:Flag of the Democratic Republic of the Congo.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Democratic_Republic_of_the_Congo.svg License: unknown Contributors: User:Nightstallion File:Flag of Haiti.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Haiti.svg License: Public Domain Contributors: (colours and size changes of the now deletied versions) Madden, Vzb83, Denelson83, Chanheigeorge, Zscout370 and Nightstallion Coat of arms :Lokal_Profil and Myriam Thyes File:Flag of Rwanda.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Rwanda.svg License: Public Domain Contributors: . File:Flag of Trinidad and Tobago.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Trinidad_and_Tobago.svg License: Public Domain Contributors: AnonMoos, Boricuaeddie, Duduziq, Enbk, Erlenmeyer, Fry1989, Homo lupus, Illegitimate Barrister, Klemen Kocjancic, Madden, Mattes, Nagy, Neq00, Nightstallion, Pumbaa80, S KTT, SKopp, Tomia, 10 anonymous edits File:Flag of Cyprus.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Cyprus.svg License: Public Domain Contributors: User:Vzb83 File:Flag of Mongolia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Mongolia.svg License: Public Domain Contributors: User:Zscout370 File:Flag of Nicaragua.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Nicaragua.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Laos.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Laos.svg License: Public Domain Contributors: User:SKopp File:Flag of Myanmar.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Myanmar.svg License: Public Domain Contributors: *drew, AnonMoos, CommonsDelinker, Duduziq, Fry1989, Gunkarta, Homo lupus, Idh0854, Josegeographic, Klemen Kocjancic, Legnaw, Mason Decker, Mattes, Neq00, Nightstallion, Pixeltoo, Rfc1394, Rodejong, SeNeKa, Stevanb, ThomasPusch, UnreifeKirsche, Vividuppers, WikipediaMaster, Winzipas, Xiengyod, Zscout370, , 10 anonymous edits File:Flag of Malawi.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Malawi.svg License: Public Domain Contributors: Achim1999, AnonMoos, Antonsusi, Awadewit, Erlenmeyer, Fred J, Fry1989, Gddea, Homo lupus, IvanLanin, Klemen Kocjancic, Mattes, Phlegmatic, Rodejong, SKopp, Sarang, Sebjarod, Sweeper tamonten, ThomasPusch, Zscout370, 4 anonymous edits File:Flag of Burkina Faso.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Burkina_Faso.svg License: Public Domain Contributors: User:Gabbe, User:SKopp File:Flag of Cote d'Ivoire.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Cote_d'Ivoire.svg License: Public Domain Contributors: User:Jon Harald Sby File:Flag of Luxembourg.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Luxembourg.svg License: Public Domain Contributors: User:SKopp File:Flag of Cambodia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Cambodia.svg License: Public Domain Contributors: Open Clip Art Library, first uploaded by Nightstallion; redraw the towers of Angkor Wat by User:Xiengyod. File:Flag of Mauritius.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Mauritius.svg License: Public Domain Contributors: User:Zscout370 File:Flag of Armenia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Armenia.svg License: Public Domain Contributors: User:SKopp File:Flag of Madagascar.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Madagascar.svg License: Public Domain Contributors: User:SKopp File:Flag of Eritrea.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Eritrea.svg License: Public Domain Contributors: Alkari, Bukk, Counny, Fry1989, Homo lupus, Klemen Kocjancic, Mattes, Moipaulochon, Neq00, Nightstallion, Ninane, Persiana, Ratatosk, Rodejong, ThomasPusch, Vzb83, WikipediaMaster, Zscout370, 2 anonymous edits File:Flag of Macau.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Macau.svg License: Public Domain Contributors: PhiLiP File:Flag of Benin.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Benin.svg License: Public Domain Contributors: Drawn by User:SKopp, rewritten by User:Gabbe File:Flag of Mali.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Mali.svg License: Public Domain Contributors: User:SKopp File:Flag of Iceland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Iceland.svg License: Public Domain Contributors: User:Zscout370, User:var Arnfjr Bjarmason File:Flag of Malta.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Malta.svg License: Public Domain Contributors: Alkari, Cycn, Fry1989, Gabbe, Homo lupus, Klemen Kocjancic, Liftarn, Mattes, Meno25, Nightstallion, Peeperman, Pumbaa80, Ratatosk, Rodejong, Zscout370, 5 anonymous edits File:Flag of Montenegro.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Montenegro.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: B1mbo, Froztbyte File:Flag of Namibia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Namibia.svg License: Public Domain Contributors: User:Vzb83 File:Flag of Turkmenistan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Turkmenistan.svg License: Public Domain Contributors: User:Vzb83 File:Flag of Swaziland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Swaziland.svg License: Public Domain Contributors: EugeneZelenko, Fry1989, Homo lupus, Klemen Kocjancic, Mogelzahn, Nightstallion, OAlexander, Ratatosk, ThomasPusch, 1 anonymous edits File:Flag of Fiji.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Fiji.svg License: Public Domain Contributors: Anime Addict AA, Avala, ButterStick, Denelson83, Fred the Oyster, Fry1989, Greentubing, Herbythyme, Homo lupus, Klemen Kocjancic, Krun, Lokal Profil, Mattes, Multichill, Neq00, Nightstallion, Sam916, Urhixidur, Vzb83, 8 anonymous edits File:Flag of Guyana.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Guyana.svg License: Public Domain Contributors: User:SKopp File:Flag of the Republic of the Congo.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Republic_of_the_Congo.svg License: Public Domain Contributors: Anime Addict AA, Antemister, Courcelles, Denelson83, Erlenmeyer, Estrilda, FischersFritz, Fry1989, Homo lupus, Klemen Kocjancic, LA2, Madden, Mattes, Moyogo, Neq00, Nightstallion, Persiana, Ratatosk, Romaine, ThomasPusch, Thuresson, 3 anonymous edits File:Flag of Togo.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Togo.svg License: Public Domain Contributors: Aaker, Ahsoous, Alkari, Cycn, EugeneZelenko, Fry1989, Homo lupus, Klemen Kocjancic, Mattes, Mxn, Neq00, Nightstallion, Reisio, ThomasPusch, Vzb83 File:Flag of Brunei.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Brunei.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Barbados.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Barbados.svg License: Public Domain Contributors: User:Denelson83 File:Flag of Niger.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Niger.svg License: Public Domain Contributors: Made by: Philippe Verdy User:verdy_p, see also fr:Utilisateur:verdy_p. File:Flag of Chad.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Chad.svg License: Public Domain Contributors: SKopp & others (see upload log) File:Flag of the Bahamas.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Bahamas.svg License: Public Domain Contributors: Bahamas government File:Flag of The Gambia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_The_Gambia.svg License: Public Domain Contributors: Atamari, Avala, Courcelles, Denniss, Erlenmeyer, FischersFritz, Fry1989, INeverCry, Klemen Kocjancic, Mattes, Neq00, Nightstallion, OAlexander, Porao, Rkt2312, Rodejong, ThomasPusch, Vzb83, WikipediaMaster, Zscout370, 3 anonymous edits

431

Image Sources, Licenses and Contributors


File:Flag of Suriname.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Suriname.svg License: Public Domain Contributors: ALE!, Alkari, Anime Addict AA, Antemister, Bouwe Brouwer, Fry1989, Homo lupus, Iketsi, Klemen Kocjancic, Kookaburra, Krun, Mattes, Mikewazhere, Mmxx, Nightstallion, Pfctdayelise, Reisio, ThomasPusch, Vzb83, Zscout370, 17 anonymous edits File:Flag of Cape Verde.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Cape_Verde.svg License: Public Domain Contributors: Drawn by User:SKopp File:Flag of Bhutan.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bhutan.svg License: Public Domain Contributors: (original uploader), the author of xrmap (improved version) File:Flag of Mauritania.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Mauritania.svg License: Public Domain Contributors: Alkari, Anime Addict AA, AnonMoos, Cactus26, Docu, Flad, Fred J, Fry1989, Gabbe, Herbythyme, Homo lupus, Juiced lemon, Klemen Kocjancic, Mattes, SKopp, TFCforever, ThomasPusch, 8 anonymous edits File:Flag of Botswana.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Botswana.svg License: Public Domain Contributors: User:SKopp, User:Gabbe, User:Madden File:Flag of Guinea.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Guinea.svg License: Public Domain Contributors: User:SKopp File:Flag of Maldives.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Maldives.svg License: Public Domain Contributors: user:Nightstallion File:Flag of French Polynesia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_French_Polynesia.svg License: Public Domain Contributors: User:Nightstallion File:Flag of New Caledonia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_New_Caledonia.svg License: Public Domain Contributors: User:WarX File:Flag of Gabon.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Gabon.svg License: Public Domain Contributors: User:Gabbe, User:SKopp File:Flag of Somalia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Somalia.svg License: Public Domain Contributors: see upload history File:Flag of Papua New Guinea.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Papua_New_Guinea.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Liberia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Liberia.svg License: Public Domain Contributors: Government of Liberia File:Flag of Burundi.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Burundi.svg License: Public Domain Contributors: User:Pumbaa80 File:Flag of the Central African Republic.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Central_African_Republic.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Lesotho.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Lesotho.svg License: Creative Commons Attribution-Sharealike 2.5 Contributors: Zscout370 File:Flag of Guam.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Guam.svg License: Public Domain Contributors: User:Denelson83 File:Flag of Antigua and Barbuda.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Antigua_and_Barbuda.svg License: Public Domain Contributors: User:Dbenbenn File:Flag of Andorra.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Andorra.svg License: Public Domain Contributors: HansenBCN File:Flag of Saint Lucia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Saint_Lucia.svg License: Public Domain Contributors: SKopp File:Flag of Bermuda.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Bermuda.svg License: Public Domain Contributors: Version 1: Made by Caleb Moore from the Open Clip Art website and uploaded by Nightstallion Version 2: Made by Nameneko from version 1 of Image:Flag of Bermuda.svg and version 2 of Image:Coa Bermuda.svg by Cronholm144. File:Flag of Aruba.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Aruba.svg License: Public Domain Contributors: Anime Addict AA, ChongDae, Cycn, Dinsdagskind, Duduziq, Enbk, Foroa, Fry1989, Giro720, Homo lupus, Mattes, Moipaulochon, Neq00, TFCforever, Vzb83, Wester, Zscout370 File:Flag of Guernsey.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Guernsey.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Djibouti.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Djibouti.svg License: Public Domain Contributors: ElmA, EugeneZelenko, Fry1989, Homo lupus, Klemen Kocjancic, Martin H., Mattes, Neq00, Nightstallion, Nishkid64, Pymouss, Ratatosk, Str4nd, TFCforever, ThomasPusch, Thyes, Tomasdd, Zscout370, , , 8 anonymous edits File:Flag of Saint Vincent and the Grenadines.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Saint_Vincent_and_the_Grenadines.svg License: Public Domain Contributors: User:SKopp File:Flag of Belize.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Belize.svg License: Public Domain Contributors: Caleb Moore File:Flag of Guinea-Bissau.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Guinea-Bissau.svg License: Public Domain Contributors: User:SKopp File:Flag of the Faroe Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Faroe_Islands.svg License: Public Domain Contributors: User:IceKarma File:Flag of the Comoros.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Comoros.svg License: Public Domain Contributors: User:SKopp File:Flag of Equatorial Guinea.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Equatorial_Guinea.svg License: Public Domain Contributors: Anime Addict AA, Antonsusi, Cycn, Duschgeldrache2, Emc2, Fastily, Fred the Oyster, Fry1989, Homo lupus, Klemen Kocjancic, Maks Stirlitz, Mattes, Neq00, NeverDoING, Nightstallion, OAlexander, Permjak, SouthSudan, ThomasPusch, 2 anonymous edits File:Flag of the Seychelles.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Seychelles.svg License: unknown Contributors: File:Flag of Saint Kitts and Nevis.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Saint_Kitts_and_Nevis.svg License: Public Domain Contributors: User:Pumbaa80 File:Flag of Dominica.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Dominica.svg License: Public Domain Contributors: User:Nightstallion File:Flag of Greenland.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Greenland.svg License: Public Domain Contributors: Jeffrey Connell (IceKarma) File:Flag of Sao Tome and Principe.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Sao_Tome_and_Principe.svg License: Public Domain Contributors: User:Gabbe File:Flag of Grenada.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Grenada.svg License: Public Domain Contributors: User:SKopp File:Flag of the Cayman Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Cayman_Islands.svg License: Public Domain Contributors: Collard, Denelson83, Duduziq, Finavon, Fry1989, Guy0307, Krun, Lokal Profil, Mattes, Neq00, Nightstallion, Spesh531, Theda, Zscout370, 7 anonymous edits File:Flag of the Solomon Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Solomon_Islands.svg License: Public Domain Contributors: User:SKopp File:Flag of Jersey.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Jersey.svg License: Public domain Contributors: Alkari, Asclepias, Avala, Danrok, Dbenbenn, Fry1989, Homo lupus, Liftarn, Man vyi, Nightstallion, Pumbaa80, Svgalbertian File:Flag of Liechtenstein.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Liechtenstein.svg License: Public Domain Contributors: User:Mnmazur File:Flag of the United States Virgin Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_United_States_Virgin_Islands.svg License: Public Domain Contributors: User:Dbenbenn File:Flag of Tonga.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Tonga.svg License: Public Domain Contributors: AnonMoos, Badseed, Fry1989, Herbythyme, Homo lupus, Klemen Kocjancic, Krun, Liftarn, Mattes, Neq00, Nightstallion, Pumbaa80, Trockennasenaffe, Wrightbus, 5 anonymous edits File:Flag of Monaco.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Monaco.svg License: Public Domain Contributors: User:SKopp File:Flag of Federated States of Micronesia.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Federated_States_of_Micronesia.svg License: unknown Contributors: File:Flag of Vanuatu.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Vanuatu.svg License: Public Domain Contributors: Alkari, EugeneZelenko, Fry1989, Homo lupus, Klemen Kocjancic, Mattes, Mikiofpersia, Neq00, Nightstallion, OAlexander, PeterSymonds, Vzb83 File:Flag of Gibraltar.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Gibraltar.svg License: Public Domain Contributors: Alkari, Cycn, Dbenbenn, Denelson83, Fry1989, Mattes, Nightstallion, Pumbaa80, 3 anonymous edits File:Flag of San Marino.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_San_Marino.svg License: unknown Contributors: Zscout370 File:Flag of Samoa.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Samoa.svg License: unknown Contributors: Alkari, Anime Addict AA, Avala, Cycn, Emijrp, Fry1989, Homo lupus, Klemen Kocjancic, Kookaburra, Kronocide, Mattes, Nightstallion, TFCforever, Telim tor, Vzb83, Xufanc, Zscout370, 2 anonymous edits File:Flag of Sierra Leone.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Sierra_Leone.svg License: Public Domain Contributors: Zscout370 File:Flag of the British Virgin Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_British_Virgin_Islands.svg License: Public Domain Contributors: CeleritasSoni, Csium137, Dbenbenn, Denelson83, DenghiComm, Denniss, Duduziq, Eugenio Hansen, OFS, Fry1989, Homo lupus, Ludger1961, Mattes, Neq00, Nightstallion, Spesh531, Xenophon, 2 anonymous edits File:Flag of Kiribati.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Kiribati.svg License: Public Domain Contributors: User:SKopp File:Flag of East Timor.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_East_Timor.svg License: Public Domain Contributors: User:SKopp File:Flag of Anguilla.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Anguilla.svg License: Public Domain Contributors: Dbenbenn; Vectorized by Froztbyte File:Flag of Palau.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Palau.svg License: Public Domain Contributors: User:Gabbe File:Flag of Tuvalu.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Tuvalu.svg License: Public Domain Contributors: User:Zscout370

432

Image Sources, Licenses and Contributors


File:Flag of the Falkland Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Falkland_Islands.svg License: Public Domain Contributors: CommonsDelinker, Davepape, DavidArthur, Denelson83, Dexxter, Duduziq, Fry1989, Homo lupus, Juanchopirulo, Krun, Mattes, Maxime laterreur, Neq00, Nightstallion, Red devil 666, Techman224, 8 anonymous edits File:Flag of Saint Helena.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Saint_Helena.svg License: Public Domain Contributors: Patricia Fidi File:Flag of the Marshall Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Marshall_Islands.svg License: unknown Contributors: User:Unknown File:Flag of Montserrat.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Montserrat.svg License: Public Domain Contributors: Denelson83, Duduziq, Fry1989, Homo lupus, Klemen Kocjancic, Mattes, Nightstallion, Porao, 3 anonymous edits File:Flag of Niue.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Niue.svg License: Public Domain Contributors: Achim1999, Avala, Bukk, Cycn, Fry1989, Greentubing, Homo lupus, Jacklee, Mattes, Neq00, Nightstallion, SKopp, Sarang, TFCforever File:Flag of North Korea.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_North_Korea.svg License: Public Domain Contributors: Zscout370 File:Flag of Nauru.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Nauru.svg License: Public Domain Contributors: Source: Drawn by User:SKopp File:Flag of Tokelau.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_Tokelau.svg License: Public Domain Contributors: SVG image created by User:Andrwsc Image:InternetUsersWorldMap.svg Source: http://en.wikipedia.org/w/index.php?title=File:InternetUsersWorldMap.svg License: Creative Commons Attribution-Sharealike 3.0 Contributors: User:W163 File:DSL countries.png Source: http://en.wikipedia.org/w/index.php?title=File:DSL_countries.png License: GNU Free Documentation License Contributors: Original uploader was Marc Lacoste at en.wikipedia File:ADSL operators.png Source: http://en.wikipedia.org/w/index.php?title=File:ADSL_operators.png License: Creative Commons Attribution-Sharealike 2.0 Contributors: Marc Lacoste File:Flag of the Cook Islands.svg Source: http://en.wikipedia.org/w/index.php?title=File:Flag_of_the_Cook_Islands.svg License: Public Domain Contributors: User:Denelson83, User:DiamondVertex File:(at).svg Source: http://en.wikipedia.org/w/index.php?title=File:(at).svg License: Public Domain Contributors: Editor at Large File:email.svg Source: http://en.wikipedia.org/w/index.php?title=File:Email.svg License: GNU Free Documentation License Contributors: Original uploader was Yzmo at en.wikipedia File:Mozilla Thunderbird 3.1.png Source: http://en.wikipedia.org/w/index.php?title=File:Mozilla_Thunderbird_3.1.png License: unknown Contributors: Mozilla Foundation File:Pro piracy demonstration.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Pro_piracy_demonstration.jpg License: Creative Commons Attribution 2.5 Contributors: Jon slund File:WebCrawlerArchitecture.svg Source: http://en.wikipedia.org/w/index.php?title=File:WebCrawlerArchitecture.svg License: GNU Free Documentation License Contributors: dnet File:Eastcampusfire glog crop.png Source: http://en.wikipedia.org/w/index.php?title=File:Eastcampusfire_glog_crop.png License: Creative Commons Attribution 3.0 Contributors: User:SreeBot File:Two competitions for ESO's 50th anniversary.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Two_competitions_for_ESO's_50th_anniversary.jpg License: Creative Commons Attribution 3.0 Contributors: Jmencisom File:Soc-net-paten-growth-chart.png Source: http://en.wikipedia.org/w/index.php?title=File:Soc-net-paten-growth-chart.png License: Creative Commons Attribution-Sharealike 3.0 Contributors: Mark Nowotarski File:CMT_Dimensions1234.jpg Source: http://en.wikipedia.org/w/index.php?title=File:CMT_Dimensions1234.jpg License: Creative Commons Attribution-Share Alike Contributors: Tariq Jabbar File:Voip-typical.gif Source: http://en.wikipedia.org/w/index.php?title=File:Voip-typical.gif License: Creative Commons Attribution Contributors: FSII, JMPerez, - File:A Kerbango.jpg Source: http://en.wikipedia.org/w/index.php?title=File:A_Kerbango.jpg License: Creative Commons Attribution 2.0 Contributors: James Cridland from UK File:Selbstfahrerstudio-modern.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Selbstfahrerstudio-modern.jpg License: GNU Free Documentation License Contributors: ich File:Radioconecta.JPG Source: http://en.wikipedia.org/w/index.php?title=File:Radioconecta.JPG License: Creative Commons Attribution-Sharealike 3.0,2.5,2.0,1.0 Contributors: Josep Maria Castells File:Cabin.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Cabin.jpg License: Creative Commons Attribution Contributors: Aconcagua, FSII, Ranveig, Robert Bruce Livingston, Tatoute, WikipediaMaster, 1 anonymous edits File:Penistone FM Studio.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Penistone_FM_Studio.jpg License: Public Domain Contributors: Darren Holmes File:Internet Censorship World Map.svg Source: http://en.wikipedia.org/w/index.php?title=File:Internet_Censorship_World_Map.svg License: Creative Commons Zero Contributors: User:W163 File:Websense blocking Facebook.png Source: http://en.wikipedia.org/w/index.php?title=File:Websense_blocking_Facebook.png License: Creative Commons Attribution-Sharealike 2.0 Contributors: {{{1}}} File:Cc.logo.circle.svg Source: http://en.wikipedia.org/w/index.php?title=File:Cc.logo.circle.svg License: Public Domain Contributors: Creative Commons File:Lapsiporno.info small.png Source: http://en.wikipedia.org/w/index.php?title=File:Lapsiporno.info_small.png License: Public Domain Contributors: Petri Krohn Image:PD-icon.svg Source: http://en.wikipedia.org/w/index.php?title=File:PD-icon.svg License: Public Domain Contributors: Alex.muller, Anomie, Anonymous Dissident, CBM, MBisanz, PBS, Quadell, Rocket000, Strangerer, Timotheus Canens, 1 anonymous edits File:ICANN Government Advisory Committee.png Source: http://en.wikipedia.org/w/index.php?title=File:ICANN_Government_Advisory_Committee.png License: GNU Free Documentation License Contributors: Japinderum Image:Cerf's Up-marquee-20071031.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Cerf's_Up-marquee-20071031.jpg License: Creative Commons Attribution 2.0 Contributors: Joi Ito from Inbamura, Japan File:IGF Rio 2007.png Source: http://en.wikipedia.org/w/index.php?title=File:IGF_Rio_2007.png License: Creative Commons Attribution-Sharealike 3.0 Contributors: SlviaSS Image:SteveCrockerJI1.jpg Source: http://en.wikipedia.org/w/index.php?title=File:SteveCrockerJI1.jpg License: Creative Commons Attribution 2.0 Contributors: Image:Jon Postel.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Jon_Postel.jpg License: Attribution Contributors: Ejdzej, Frank C. Mller, Infrogmation, 1 anonymous edits Image:Mosaic browser plaque ncsa.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Mosaic_browser_plaque_ncsa.jpg License: Creative Commons Attribution-Sharealike 2.5 Contributors: Ragib Hasan

433

License

434

License
Creative Commons Attribution-Share Alike 3.0 Unported //creativecommons.org/licenses/by-sa/3.0/

Das könnte Ihnen auch gefallen