The paper contains 2723 words and is expected to last 5 minutes

The success and popularity of the Internet can be attributed to five important developments:

TCP/IP

Transmission Control Protocol (TRANSMISSION Control Protocol/Internet Protocol) refers to a set of standard data communication protocols used by the Internet. It was developed by the Defense Advanced Research Projects Agency (DARPA) and has become the de facto standard for the Internet. It is maintained by the Internet Engineering Task Force (IETF). These protocols make it possible to share E-mail, file transfers, newsgroups, web pages, and more. This behavior is like a common language that computers use to communicate with each other over the network.

The World Wide Web and Hypertext Markup Language

Created as a system that allowed documents to be linked to other nodes, it marked the beginning of hypertext. Hypertext refers to links stored on computers in a network. Users no longer need to know the exact location or system name of a resource accessed via a hypertext link. The World Wide Web (WWW) refers to a system of websites that provide these clickable links.

The browser

The original web browser, Mosaic, was invented in 1993. Before browsers, a software called Gopher provided access to web sites. But it’s boring and not at all convenient for users. As time went on, new generations of browsers like Mozilla and Netscape came along and developed even more powerful features.

Search engine

In the beginning, searching used Gopher. It became less popular with the growth of browser-based search engines and other web-based systems like Lycos, Yahoo, and web crawlers. Google entered search in the late 1990s and is now the most popular search engine on the Internet. It is simple and fast, providing users with the best way to get information on the Internet. Today, the word “Google” is almost synonymous with Internet search.

Internet Service provider

In the early days, users used dial-up modems to connect to the network over telephone lines. It offers data speeds of 14.4-28.8 KBPS, enough to meet the data needs of the late 1980s and early 1990s. During this period, the Internet was dominated by text. As the Internet becomes more popular, businesses start to adopt it and therefore need faster network speeds. This led Internet service providers to encourage users to sign up by mailing them a free cd-rom, which is where AOL’s bundle of services came from, as well as encouraging users to get E-mail addresses and free Internet time.

Internet service providers offer faster digital subscriber lines and automated subscriber line service instead of dial-up to improve service. DSL service offers speeds up to 128 KBPS. Cable companies use broadband service cable modems to provide faster Internet speeds. The infrastructure was built by telecom companies and cable giants to provide faster speeds, allowing users to stream video, chat, browse activity on the web and download it at faster speeds.



Centralized Internet

A centralized Internet network has a host (central access point), which can be a server through which all data in the network must be distributed to various computers or devices. In its early days, the Internet was a separate network, connecting different people and organizations. Previously, information was transmitted through a single host, such as a server, but now large networks can be scattered into smaller networks. These smaller networks can be people or companies dealing with unique data sets.

Therefore, no matter how many user groups there are, all data accessed worldwide is stored on the host.

Disadvantages of a centralized Internet

The centralized Internet faces security and privacy issues. Many Internet companies have data centers that store data and run applications accordingly. Such data centers are under constant threat from malicious attackers because they store all necessary information in one place. In data centers, attackers can easily access data that can be used to commit other types of cybercrime.

How does a centralized Internet pose a threat?

Centralized Internet services cannot be managed in the same way as public services. So for most companies, they have to define, interpret and enforce their rules through some government intervention. Moreover, a large number of users and customers of these services are outside their jurisdiction and subject to completely different rules.

What is different about distributed networks?

There are two main differences in the way distributed networks work from the World Wide Web. First, there are peer-to-peer connections in distributed networks where computers not only request services, but also provide them. The second difference is the way information is stored and retrieved. Today, HTTP and HTTPS links are used to identify information on the web, and these links point to content by their location. However, distributed network protocols use links to identify information by content, placing more emphasis on the content itself than the location of the content. This content-based approach allows websites and files to be stored and passed between computers in a variety of ways, without relying on a single server as a focal point for exchanging information.

Distributed Internet and hosting

Distributed networks or Network 3.0 refers to the trend of building hosted services that do not rely on a central organization that has a monopoly over other organizations, but on peer-to-peer networks built on top of a community of users. In this community, no entity can control. Here, a variety of Internet devices (rather than a set of servers) act as hosts for the Internet, and web sites are distributed over multiple nodes, ensuring that a single server cannot act as a single custodian for a particular subset of data.

The core concept of hosting service distribution is to prevent the operation of hosting related services from being controlled by large companies with monopoly position in the industry. In this case, the hosting responsibility will be shared among multiple servers, or by running the servers between client applications through a peer-to-peer distribution model.

A comparison of centralized and distributed networks

The difference between centralized and distributed Internet

The key differences between distributed and centralized Internet are as follows:

Data tracking

In a centralized Internet, it is easy to trace the flow of data as long as it passes through a single point (a server).

In contrast, it is impossible to track the flow of data in a distributed Internet because several devices act as nodes for the data store. In this case, users can access a given set of information from several locations, rather than from a centralized point.

Privacy protection

Unlike centralized networks, distributed networks can provide a level of privacy protection that people crave in today’s digital world. When information passes through multiple points, it becomes impossible for entities and governments to keep track of individuals’ online activities.

Distributed networks are best suited to those who wish to maintain privacy and protect identity, no matter what their online activities are.

A single point of failure

Centralized Internet connections run the risk of a single point of failure because data passes through a single point before being propagated. Because backup systems are working, server hosting failures can result in massive data loss, making it difficult to access data at any given time.

In contrast, in the case of distributed Internet connections, the failure of a single access point does not prevent people from accessing data that exists on the network. The existence of nodes enables people to access information and reduces the risk of losing access to data.

Limited scalability

Limited scalability is another disadvantage of a centralized network because all core applications are located on a single server. As the demand for Internet connectivity increases, so does the demand for storage and bandwidth, as well as processing power.

The architecture of distributed networks allows workloads to be distributed across multiple machines rather than confined to one place. In this way, adding more nodes to “scale” the system provides more computing power and fault tolerance.

Data censorship and net neutrality

Centralized Internet connectivity brings many disadvantages to end consumers. For example, Internet service providers (ISPs) can manage the kinds of data and the speed at which people can access information. Today’s Internet service providers have different attitudes to different types of data. People willing to pay more for services enjoy better Internet connections than those who pay less.



Leave a comment like follow

We share the dry goods of AI learning and development. Welcome to pay attention to the “core reading technology” of AI vertical we-media on the whole platform.



(Add wechat: DXSXBB, join readers’ circle and discuss the freshest artificial intelligence technology.)