What do you think?
Rate this book
304 pages, Paperback
First published January 1, 1996
[Paul] Baran's second big idea was still more revolutionary: Fracture the messages too. By dividing each message into parts, you could flood the network with what he called "message blocks," all racing over different paths to their destination. Upon their arrival, a receiving computer would reassemble the message bits into readable form. (pp. 59-60)
The job of the lower layer was simply to move generic unidentified bits, regardless of what the bits might define: a file, an interactive session between people at two terminals, a graphical image, or any other conceivable form of digital data. Analogously, some water out of the tap is used for making coffee, some for washing dishes, [...] but the pipe and the faucet don't care; they convey the water regardless. The host-to-host protocol was to perform essentially the same function in the infrastructure of the network. (pp. 147-148)
There was disagreement over what should go on the left hand side of the [@] symbol [in an E-mail address] and what should go on the right. But before that, there was the debate over whether it should even be used as a delimiter... (p. 199)
RFC 680, [Jon Postel] said, was as standard as mail ever got. "It is nice that many mail-reading programs will accept mail that does not conform to the standard," he said, "but that does not justify mail-sending programs' violation of the standard." If the standard is inadequate, he added, any proposals to change it are welcome. (p. 200)
“As computer communication systems become more powerful, more humane, more forgiving and above all, cheaper, they will become ubiquitous.”—Paul Baran and Dave Farber
Rumors had persisted for years that the ARPANET had been built to protect national security in the face of a nuclear attack… Taylor knew the ARPANET and its progeny, the Internet, had nothing to do with supporting or surviving war—never did.
It might be possible to connect computers in a network redundantly, so that if one line went down, a message could take another path.
Proclamations of officialness didn’t further the Net nearly so much as throwing technology out onto the Net to see what worked. And when something worked, it was adopted.
“There was something amazingly enticing about programming,” he [Vint Cerf] said. “You created your own universe and you were the master of it. The computer would do anything you programmed it to do. It was this unbelievable sandbox in which every grain of sand was under your control.”