0% found this document useful (0 votes)
135 views270 pages

Overview of the Internet's Evolution

Sdc ddcff fdcffrfccr dd

Uploaded by

tantt8infrad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views270 pages

Overview of the Internet's Evolution

Sdc ddcff fdcffrfccr dd

Uploaded by

tantt8infrad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Internet

The Internet (or internet)[a] is the global system of interconnected


computer networks that uses the Internet protocol suite (TCP/IP)[b] to
communicate between networks and devices. It is a network of networks
that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic,
wireless, and optical networking technologies. The Internet carries a vast
range of information resources and services, such as the interlinked
hypertext documents and applications of the World Wide Web (WWW),
electronic mail, internet telephony, and file sharing.

The origins of the Internet date back to research that enabled the time-
sharing of computer resources, the development of packet switching in
the 1960s and the design of computer networks for data communication.
[2][3]
The set of rules (communication protocols) to enable internetworking
on the Internet arose from research and development commissioned in the
1970s by the Defense Advanced Research Projects Agency (DARPA) of the
United States Department of Defense in collaboration with universities and
researchers across the United States and in the United Kingdom and
France.[4][5][6] The ARPANET initially served as a backbone for the

[Link] 8/1/25, 22 02
Page 1 of 270
:
interconnection of regional academic and military networks in the United
States to enable resource sharing. The funding of the National Science
Foundation Network as a new backbone in the 1980s, as well as private
funding for other commercial extensions, encouraged worldwide
participation in the development of new networking technologies and the
merger of many networks using DARPA's Internet protocol suite.[7] The
linking of commercial networks and enterprises by the early 1990s, as well
as the advent of the World Wide Web,[8] marked the beginning of the
transition to the modern Internet,[9] and generated sustained exponential
growth as generations of institutional, personal, and mobile computers
were connected to the internetwork. Although the Internet was widely
used by academia in the 1980s, the subsequent commercialization of the
Internet in the 1990s and beyond incorporated its services and
technologies into virtually every aspect of modern life.

Most traditional communication media, including telephone, radio,


television, paper mail, and newspapers, are reshaped, redefined, or even
bypassed by the Internet, giving birth to new services such as email,
Internet telephone, Internet television, online music, digital newspapers,
and video streaming websites. Newspapers, books, and other print
publishing have adapted to website technology or have been reshaped
into blogging, web feeds, and online news aggregators. The Internet has
enabled and accelerated new forms of personal interaction through instant
messaging, Internet forums, and social networking services. Online
shopping has grown exponentially for major retailers, small businesses,
and entrepreneurs, as it enables firms to extend their "brick and mortar"
presence to serve a larger market or even sell goods and services entirely
online. Business-to-business and financial services on the Internet affect
supply chains across entire industries.

The Internet has no single centralized governance in either technological


implementation or policies for access and usage; each constituent network
sets its own policies.[10] The overarching definitions of the two principal

[Link] 8/1/25, 22 02
Page 2 of 270
:
name spaces on the Internet, the Internet Protocol address (IP address)
space and the Domain Name System (DNS), are directed by a maintainer
organization, the Internet Corporation for Assigned Names and Numbers
(ICANN). The technical underpinning and standardization of the core
protocols is an activity of the Internet Engineering Task Force (IETF), a
non-profit organization of loosely affiliated international participants that
anyone may associate with by contributing technical expertise.[11] In
November 2006, the Internet was included on USA Today's list of the New
Seven Wonders.[12]

Terminology
The word internetted was used as early as 1849, meaning interconnected
or interwoven.[13] The word Internet was used in 1945 by the United States
War Department in a radio operator's manual,[14] and in 1974 as the
shorthand form of Internetwork.[15] Today, the term Internet most
commonly refers to the global system of interconnected computer
networks, though it may also refer to any group of smaller networks.[16]

When it came into common use, most publications treated the word
Internet as a capitalized proper noun; this has become less common.[16]
This reflects the tendency in English to capitalize new terms and move
them to lowercase as they become familiar.[16][17] The word is sometimes
still capitalized to distinguish the global internet from smaller networks,
though many publications, including the AP Stylebook since 2016,
recommend the lowercase form in every case.[16][17] In 2016, the Oxford
English Dictionary found that, based on a study of around 2.5 billion
printed and online sources, "Internet" was capitalized in 54% of cases.[18]

The terms Internet and World Wide Web are often used interchangeably; it

[Link] 8/1/25, 22 02
Page 3 of 270
:
is common to speak of "going on the Internet" when using a web browser
to view web pages. However, the World Wide Web, or the Web, is only one
of a large number of Internet services,[19] a collection of documents (web
pages) and other web resources linked by hyperlinks and URLs.[20]

History

A sketch of the ARPANET in


December 1969. The nodes at UCLA
and the Stanford Research Institute
(SRI) are among those depicted.[21]

In the 1960s, computer scientists began developing systems for time-


sharing of computer resources.[22][23] J. C. R. Licklider proposed the idea
of a universal network while working at Bolt Beranek & Newman and, later,
leading the Information Processing Techniques Office (IPTO) at the
Advanced Research Projects Agency (ARPA) of the United States

[Link] 8/1/25, 22 02
Page 4 of 270
:
Department of Defense (DoD). Research into packet switching, one of the
fundamental Internet technologies, started in the work of Paul Baran at
RAND in the early 1960s and, independently, Donald Davies at the United
Kingdom's National Physical Laboratory (NPL) in 1965.[2][24] After the
Symposium on Operating Systems Principles in 1967, packet switching
from the proposed NPL network and routing concepts proposed by Baran
were incorporated into the design of the ARPANET, an experimental
resource sharing network proposed by ARPA.[25][26][27]

ARPANET development began with two network nodes which were


interconnected between the University of California, Los Angeles (UCLA)
and the Stanford Research Institute (now SRI International) on 29 October
1969.[28] The third site was at the University of California, Santa Barbara,
followed by the University of Utah. In a sign of future growth, 15 sites were
connected to the young ARPANET by the end of 1971.[29][30] These early
years were documented in the 1972 film Computer Networks: The Heralds
of Resource Sharing.[31] Thereafter, the ARPANET gradually developed
into a decentralized communications network, connecting remote centers
and military bases in the United States.[32] Other user networks and
research networks, such as the Merit Network and CYCLADES, were
developed in the late 1960s and early 1970s.[33]

Early international collaborations for the ARPANET were rare. Connections


were made in 1973 to Norway (NORSAR and NDRE),[34] and to Peter
Kirstein's research group at University College London (UCL), which
provided a gateway to British academic networks, forming the first
internetwork for resource sharing.[35] ARPA projects, the International
Network Working Group and commercial initiatives led to the development
of various protocols and standards by which multiple separate networks
could become a single network or "a network of networks".[36] In 1974,
Vint Cerf at Stanford University and Bob Kahn at DARPA published a
proposal for "A Protocol for Packet Network Intercommunication".[37] They
used the term internet as a shorthand for internetwork in RFC 675 (https://

[Link] 8/1/25, 22 02
Page 5 of 270
:
[Link]/doc/html/rfc675) ,[15] and later RFCs repeated this
use. Cerf and Kahn credit Louis Pouzin and others with important
influences on the resulting TCP/IP design.[37][38] National PTTs and
commercial providers developed the X.25 standard and deployed it on
public data networks.[39]

Access to the ARPANET was expanded in 1981 when the National Science
Foundation (NSF) funded the Computer Science Network (CSNET). In
1982, the Internet Protocol Suite (TCP/IP) was standardized, which
facilitated worldwide proliferation of interconnected networks. TCP/IP
network access expanded again in 1986 when the National Science
Foundation Network (NSFNet) provided access to supercomputer sites in
the United States for researchers, first at speeds of 56 kbit/s and later at
1.5 Mbit/s and 45 Mbit/s.[40] The NSFNet expanded into academic and
research organizations in Europe, Australia, New Zealand and Japan in
1988–89.[41][42][43][44] Although other network protocols such as UUCP
and PTT public data networks had global reach well before this time, this
marked the beginning of the Internet as an intercontinental network.
Commercial Internet service providers (ISPs) emerged in 1989 in the
United States and Australia.[45] The ARPANET was decommissioned in
1990.[46]

T3 NSFNET Backbone, c. 1992

Steady advances in semiconductor technology and optical networking


created new economic opportunities for commercial involvement in the
expansion of the network in its core and for delivering services to the

[Link] 8/1/25, 22 02
Page 6 of 270
:
public. In mid-1989, MCI Mail and Compuserve established connections to
the Internet, delivering email and public access products to the half million
users of the Internet.[47] Just months later, on 1 January 1990, PSInet
launched an alternate Internet backbone for commercial use; one of the
networks that added to the core of the commercial Internet of later years.
In March 1990, the first high-speed T1 (1.5 Mbit/s) link between the
NSFNET and Europe was installed between Cornell University and CERN,
allowing much more robust communications than were capable with
satellites.[48]

Later in 1990, Tim Berners-Lee began writing WorldWideWeb, the first web
browser, after two years of lobbying CERN management. By Christmas
1990, Berners-Lee had built all the tools necessary for a working Web: the
HyperText Transfer Protocol (HTTP) 0.9,[49] the HyperText Markup
Language (HTML), the first Web browser (which was also an HTML editor
and could access Usenet newsgroups and FTP files), the first HTTP server
software (later known as CERN httpd), the first web server,[50] and the first
Web pages that described the project itself. In 1991 the Commercial
Internet eXchange was founded, allowing PSInet to communicate with the
other commercial networks CERFnet and Alternet. Stanford Federal Credit
Union was the first financial institution to offer online Internet banking
services to all of its members in October 1994.[51] In 1996, OP Financial
Group, also a cooperative bank, became the second online bank in the
world and the first in Europe.[52] By 1995, the Internet was fully
commercialized in the U.S. when the NSFNet was decommissioned,
removing the last restrictions on use of the Internet to carry commercial
traffic.[53]

[Link] 8/1/25, 22 02
Page 7 of 270
:
Worldwide Internet users[54]

2005 2010 2017 2023

World population (billions)[55] 6.5 6.9 7.4 8.0

Worldwide 16% 30% 48% 67%

In developing world 8% 21% 41.3% 60%

In developed world 51% 67% 81% 93%

As technology advanced and commercial opportunities fueled reciprocal


growth, the volume of Internet traffic started experiencing similar
characteristics as that of the scaling of MOS transistors, exemplified by
Moore's law, doubling every 18 months. This growth, formalized as
Edholm's law, was catalyzed by advances in MOS technology, laser light
wave systems, and noise performance.[56]

Since 1995, the Internet has tremendously impacted culture and


commerce, including the rise of near-instant communication by email,
instant messaging, telephony (Voice over Internet Protocol or VoIP), two-
way interactive video calls, and the World Wide Web[57] with its discussion
forums, blogs, social networking services, and online shopping sites.
Increasing amounts of data are transmitted at higher and higher speeds
over fiber optic networks operating at 1 Gbit/s, 10 Gbit/s, or more. The
Internet continues to grow, driven by ever-greater amounts of online
information and knowledge, commerce, entertainment and social
networking services.[58] During the late 1990s, it was estimated that traffic
on the public Internet grew by 100 percent per year, while the mean annual
growth in the number of Internet users was thought to be between 20%
and 50%.[59] This growth is often attributed to the lack of central
administration, which allows organic growth of the network, as well as the
non-proprietary nature of the Internet protocols, which encourages vendor
interoperability and prevents any one company from exerting too much
control over the network.[60] As of 31 March 2011, the estimated total

[Link] 8/1/25, 22 02
Page 8 of 270
:
number of Internet users was 2.095 billion (30% of world population).[61] It
is estimated that in 1993 the Internet carried only 1% of the information
flowing through two-way telecommunication. By 2000 this figure had
grown to 51%, and by 2007 more than 97% of all telecommunicated
information was carried over the Internet.[62]

Governance

ICANN headquarters in the Playa Vista


neighborhood of Los Angeles,
California, United States

The Internet is a global network that comprises many voluntarily


interconnected autonomous networks. It operates without a central
governing body. The technical underpinning and standardization of the
core protocols (IPv4 and IPv6) is an activity of the Internet Engineering
Task Force (IETF), a non-profit organization of loosely affiliated
international participants that anyone may associate with by contributing
technical expertise. To maintain interoperability, the principal name spaces
of the Internet are administered by the Internet Corporation for Assigned
Names and Numbers (ICANN). ICANN is governed by an international
board of directors drawn from across the Internet technical, business,

[Link] 8/1/25, 22 02
Page 9 of 270
:
academic, and other non-commercial communities. ICANN coordinates the
assignment of unique identifiers for use on the Internet, including domain
names, IP addresses, application port numbers in the transport protocols,
and many other parameters. Globally unified name spaces are essential for
maintaining the global reach of the Internet. This role of ICANN
distinguishes it as perhaps the only central coordinating body for the
global Internet.[63]

Regional Internet registries (RIRs) were established for five regions of the
world. The African Network Information Center (AfriNIC) for Africa, the
American Registry for Internet Numbers (ARIN) for North America, the
Asia–Pacific Network Information Centre (APNIC) for Asia and the Pacific
region, the Latin American and Caribbean Internet Addresses Registry
(LACNIC) for Latin America and the Caribbean region, and the Réseaux IP
Européens – Network Coordination Centre (RIPE NCC) for Europe, the
Middle East, and Central Asia were delegated to assign IP address blocks
and other Internet parameters to local registries, such as Internet service
providers, from a designated pool of addresses set aside for each region.

The National Telecommunications and Information Administration, an


agency of the United States Department of Commerce, had final approval
over changes to the DNS root zone until the IANA stewardship transition
on 1 October 2016.[64][65][66][67] The Internet Society (ISOC) was founded
in 1992 with a mission to "assure the open development, evolution and use
of the Internet for the benefit of all people throughout the world".[68] Its
members include individuals (anyone may join) as well as corporations,
organizations, governments, and universities. Among other activities ISOC
provides an administrative home for a number of less formally organized
groups that are involved in developing and managing the Internet,
including: the IETF, Internet Architecture Board (IAB), Internet Engineering
Steering Group (IESG), Internet Research Task Force (IRTF), and Internet
Research Steering Group (IRSG). On 16 November 2005, the United
Nations-sponsored World Summit on the Information Society in Tunis

[Link] 8/1/25, 22 02
Page 10 of 270
:
established the Internet Governance Forum (IGF) to discuss Internet-
related issues.

Infrastructure

2007 map showing submarine


fiberoptic telecommunication cables
around the world

The communications infrastructure of the Internet consists of its hardware


components and a system of software layers that control various aspects
of the architecture. As with any computer network, the Internet physically
consists of routers, media (such as cabling and radio links), repeaters,
modems etc. However, as an example of internetworking, many of the
network nodes are not necessarily Internet equipment per se. The internet
packets are carried by other full-fledged networking protocols with the
Internet acting as a homogeneous networking standard, running across
heterogeneous hardware, with the packets guided to their destinations by
IP routers.

[Link] 8/1/25, 22 02
Page 11 of 270
:
Service tiers

Packet routing across the Internet


involves several tiers of Internet
service providers.

Internet service providers (ISPs) establish the worldwide connectivity


between individual networks at various levels of scope. End-users who
only access the Internet when needed to perform a function or obtain
information, represent the bottom of the routing hierarchy. At the top of
the routing hierarchy are the tier 1 networks, large telecommunication
companies that exchange traffic directly with each other via very high
speed fiber-optic cables and governed by peering agreements. Tier 2 and
lower-level networks buy Internet transit from other providers to reach at
least some parties on the global Internet, though they may also engage in
peering. An ISP may use a single upstream provider for connectivity, or
implement multihoming to achieve redundancy and load balancing.
Internet exchange points are major traffic exchanges with physical
connections to multiple ISPs. Large organizations, such as academic
institutions, large enterprises, and governments, may perform the same
function as ISPs, engaging in peering and purchasing transit on behalf of
their internal networks. Research networks tend to interconnect with large
subnetworks such as GEANT, GLORIAD, Internet2, and the UK's national
research and education network, JANET.

[Link] 8/1/25, 22 02
Page 12 of 270
:
Access
Common methods of Internet access by users include dial-up with a
computer modem via telephone circuits, broadband over coaxial cable,
fiber optics or copper wires, Wi-Fi, satellite, and cellular telephone
technology (e.g. 3G, 4G). The Internet may often be accessed from
computers in libraries and Internet cafés. Internet access points exist in
many public places such as airport halls and coffee shops. Various terms
are used, such as public Internet kiosk, public access terminal, and Web
payphone. Many hotels also have public terminals that are usually fee-
based. These terminals are widely accessed for various usages, such as
ticket booking, bank deposit, or online payment. Wi-Fi provides wireless
access to the Internet via local computer networks. Hotspots providing
such access include Wi-Fi cafés, where users need to bring their own
wireless devices, such as a laptop or PDA. These services may be free to
all, free to customers only, or fee-based.

Grassroots efforts have led to wireless community networks. Commercial


Wi-Fi services that cover large areas are available in many cities, such as
New York, London, Vienna, Toronto, San Francisco, Philadelphia, Chicago
and Pittsburgh, where the Internet can then be accessed from places such
as a park bench.[69] Experiments have also been conducted with
proprietary mobile wireless networks like Ricochet, various high-speed
data services over cellular networks, and fixed wireless services. Modern
smartphones can also access the Internet through the cellular carrier
network. For Web browsing, these devices provide applications such as
Google Chrome, Safari, and Firefox and a wide variety of other Internet
software may be installed from app stores. Internet usage by mobile and
tablet devices exceeded desktop worldwide for the first time in October
2016.[70]

[Link] 8/1/25, 22 02
Page 13 of 270
:
Mobile communication

Number of mobile cellular


subscriptions 2012–2016

The International Telecommunication Union (ITU) estimated that, by the


end of 2017, 48% of individual users regularly connect to the Internet, up
from 34% in 2012.[71] Mobile Internet connectivity has played an important
role in expanding access in recent years, especially in Asia and the Pacific
and in Africa.[72] The number of unique mobile cellular subscriptions
increased from 3.9 billion in 2012 to 4.8 billion in 2016, two-thirds of the
world's population, with more than half of subscriptions located in Asia
and the Pacific. The number of subscriptions was predicted to rise to
5.7 billion users in 2020.[73] As of 2018, 80% of the world's population
were covered by a 4G network.[73] The limits that users face on accessing
information via mobile applications coincide with a broader process of
fragmentation of the Internet. Fragmentation restricts access to media
content and tends to affect the poorest users the most.[72]

[Link] 8/1/25, 22 02
Page 14 of 270
:
Zero-rating, the practice of Internet service providers allowing users free
connectivity to access specific content or applications without cost, has
offered opportunities to surmount economic hurdles but has also been
accused by its critics as creating a two-tiered Internet. To address the
issues with zero-rating, an alternative model has emerged in the concept
of 'equal rating' and is being tested in experiments by Mozilla and Orange
in Africa. Equal rating prevents prioritization of one type of content and
zero-rates all content up to a specified data cap. In a study published by
Chatham House, 15 out of 19 countries researched in Latin America had
some kind of hybrid or zero-rated product offered. Some countries in the
region had a handful of plans to choose from (across all mobile network
operators) while others, such as Colombia, offered as many as 30 pre-paid
and 34 post-paid plans.[74]

A study of eight countries in the Global South found that zero-rated data
plans exist in every country, although there is a great range in the
frequency with which they are offered and actually used in each.[75] The
study looked at the top three to five carriers by market share in
Bangladesh, Colombia, Ghana, India, Kenya, Nigeria, Peru and Philippines.
Across the 181 plans examined, 13 percent were offering zero-rated
services. Another study, covering Ghana, Kenya, Nigeria and South Africa,
found Facebook's Free Basics and Wikipedia Zero to be the most
commonly zero-rated content.[76]

Internet Protocol Suite


The Internet standards describe a framework known as the Internet
protocol suite (also called TCP/IP, based on the first two components.)
This is a suite of protocols that are ordered into a set of four conceptional

[Link] 8/1/25, 22 02
Page 15 of 270
:
layers by the scope of their operation, originally documented in RFC 1122 (
[Link] and RFC 1123 ([Link]
[Link]/doc/html/rfc1123) . At the top is the application layer,
where communication is described in terms of the objects or data
structures most appropriate for each application. For example, a web
browser operates in a client–server application model and exchanges
information with the HyperText Transfer Protocol (HTTP) and an
application-germane data structure, such as the HyperText Markup
Language (HTML).

Below this top layer, the transport layer connects applications on different
hosts with a logical channel through the network. It provides this service
with a variety of possible characteristics, such as ordered, reliable delivery
(TCP), and an unreliable datagram service (UDP).

Underlying these layers are the networking technologies that interconnect


networks at their borders and exchange traffic across them. The Internet
layer implements the Internet Protocol (IP) which enables computers to
identify and locate each other by IP address and route their traffic via
intermediate (transit) networks.[77] The Internet Protocol layer code is
independent of the type of network that it is physically running over.

At the bottom of the architecture is the link layer, which connects nodes
on the same physical link, and contains protocols that do not require
routers for traversal to other links. The protocol suite does not explicitly
specify hardware methods to transfer bits, or protocols to manage such
hardware, but assumes that appropriate technology is available. Examples
of that technology include Wi-Fi, Ethernet, and DSL.

[Link] 8/1/25, 22 02
Page 16 of 270
:
As user data is processed through the
protocol stack, each abstraction layer
adds encapsulation information at the
sending host. Data is transmitted over
the wire at the link level between
hosts and routers. Encapsulation is
removed by the receiving host.
Intermediate relays update link
encapsulation at each hop, and
inspect the IP layer for routing
purposes.

Internet protocol

[Link] 8/1/25, 22 02
Page 17 of 270
:
Conceptual data flow in a simple
network topology of two hosts (A and
B) connected by a link between their
respective routers. The application on
each host executes read and write
operations as if the processes were
directly connected to each other by
some kind of data pipe. After the
establishment of this pipe, most
details of the communication are
hidden from each process, as the
underlying principles of
communication are implemented in
the lower protocol layers. In analogy,
at the transport layer the
communication appears as host-to-
host, without knowledge of the
application data structures and the
connecting routers, while at the
internetworking layer, individual
network boundaries are traversed at
each router.

The most prominent component of the Internet model is the Internet


Protocol (IP). IP enables internetworking and, in essence, establishes the
Internet itself. Two versions of the Internet Protocol exist, IPv4 and IPv6.

[Link] 8/1/25, 22 02
Page 18 of 270
:
IP Addresses

A DNS resolver consults three name


servers to resolve the domain name
user-visible "[Link]" to
determine the IPv4 Address
[Link].

For locating individual computers on the network, the Internet provides IP


addresses. IP addresses are used by the Internet infrastructure to direct
internet packets to their destinations. They consist of fixed-length
numbers, which are found within the packet. IP addresses are generally
assigned to equipment either automatically via DHCP, or are configured.

However, the network also supports other addressing systems. Users


generally enter domain names (e.g. "[Link]") instead of IP
addresses because they are easier to remember; they are converted by
the Domain Name System (DNS) into IP addresses which are more
efficient for routing purposes.

IPv4
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit
number.[77] IPv4 is the initial version used on the first generation of the
Internet and is still in dominant use. It was designed in 1981 to address up
to ≈4.3 billion (109) hosts. However, the explosive growth of the Internet
has led to IPv4 address exhaustion, which entered its final stage in 2011,

[Link] 8/1/25, 22 02
Page 19 of 270
:
[78]
when the global IPv4 address allocation pool was exhausted.

IPv6
Because of the growth of the Internet and the depletion of available IPv4
addresses, a new version of IP IPv6, was developed in the mid-1990s,
which provides vastly larger addressing capabilities and more efficient
routing of Internet traffic. IPv6 uses 128 bits for the IP address and was
standardized in 1998.[79][80][81] IPv6 deployment has been ongoing since
the mid-2000s and is currently in growing deployment around the world,
since Internet address registries (RIRs) began to urge all resource
managers to plan rapid adoption and conversion.[82]

IPv6 is not directly interoperable by design with IPv4. In essence, it


establishes a parallel version of the Internet not directly accessible with
IPv4 software. Thus, translation facilities must exist for internetworking or
nodes must have duplicate networking software for both networks.
Essentially all modern computer operating systems support both versions
of the Internet Protocol. Network infrastructure, however, has been lagging
in this development. Aside from the complex array of physical connections
that make up its infrastructure, the Internet is facilitated by bi- or multi-
lateral commercial contracts, e.g., peering agreements, and by technical
specifications or protocols that describe the exchange of data over the
network. Indeed, the Internet is defined by its interconnections and routing
policies.

Subnetwork

[Link] 8/1/25, 22 02
Page 20 of 270
:
Creating a subnet by dividing the host identifier

A subnetwork or subnet is a logical subdivision of an IP network.[83]: 1, 16


The practice of dividing a network into two or more networks is called
subnetting. Computers that belong to a subnet are addressed with an
identical most-significant bit-group in their IP addresses. This results in
the logical division of an IP address into two fields, the network number or
routing prefix and the rest field or host identifier. The rest field is an
identifier for a specific host or network interface.

The routing prefix may be expressed in Classless Inter-Domain Routing


(CIDR) notation written as the first address of a network, followed by a
slash character (/), and ending with the bit-length of the prefix. For
example, [Link]/24 is the prefix of the Internet Protocol version 4
network starting at the given address, having 24 bits allocated for the
network prefix, and the remaining 8 bits reserved for host addressing.
Addresses in the range [Link] to [Link] belong to this
network. The IPv6 address specification [Link]/32 is a large address
block with 296 addresses, having a 32-bit routing prefix.

For IPv4, a network may also be characterized by its subnet mask or


netmask, which is the bitmask that when applied by a bitwise AND
operation to any IP address in the network, yields the routing prefix.
Subnet masks are also expressed in dot-decimal notation like an address.
For example, [Link] is the subnet mask for the prefix
[Link]/24.

Traffic is exchanged between subnetworks through routers when the


routing prefixes of the source address and the destination address differ. A

[Link] 8/1/25, 22 02
Page 21 of 270
:
router serves as a logical or physical boundary between the subnets.

The benefits of subnetting an existing network vary with each deployment


scenario. In the address allocation architecture of the Internet using CIDR
and in large organizations, it is necessary to allocate address space
efficiently. Subnetting may also enhance routing efficiency or have
advantages in network management when subnetworks are
administratively controlled by different entities in a larger organization.
Subnets may be arranged logically in a hierarchical architecture,
partitioning an organization's network address space into a tree-like
routing structure.

Routing
Computers and routers use routing tables in their operating system to
direct IP packets to reach a node on a different subnetwork. Routing tables
are maintained by manual configuration or automatically by routing
protocols. End-nodes typically use a default route that points toward an
ISP providing transit, while ISP routers use the Border Gateway Protocol to
establish the most efficient routing across the complex connections of the
global Internet. The default gateway is the node that serves as the
forwarding host (router) to other networks when no other route
specification matches the destination IP address of a packet.[84][85]

IETF
While the hardware components in the Internet infrastructure can often be

[Link] 8/1/25, 22 02
Page 22 of 270
:
used to support other software systems, it is the design and the
standardization process of the software that characterizes the Internet
and provides the foundation for its scalability and success. The
responsibility for the architectural design of the Internet software systems
has been assumed by the Internet Engineering Task Force (IETF).[86] The
IETF conducts standard-setting work groups, open to any individual, about
the various aspects of Internet architecture. The resulting contributions
and standards are published as Request for Comments (RFC) documents
on the IETF web site. The principal methods of networking that enable the
Internet are contained in specially designated RFCs that constitute the
Internet Standards. Other less rigorous documents are simply informative,
experimental, or historical, or document the best current practices (BCP)
when implementing Internet technologies.

Applications and
services
The Internet carries many applications and services, most prominently the
World Wide Web, including social media, electronic mail, mobile
applications, multiplayer online games, Internet telephony, file sharing, and
streaming media services. Most servers that provide these services are
today hosted in data centers, and content is often accessed through high-
performance content delivery networks.

[Link] 8/1/25, 22 02
Page 23 of 270
:
World Wide Web

This NeXT Computer was used by Tim


Berners-Lee at CERN and became the
world's first Web server.

The World Wide Web is a global collection of documents, images,


multimedia, applications, and other resources, logically interrelated by
hyperlinks and referenced with Uniform Resource Identifiers (URIs), which
provide a global system of named references. URIs symbolically identify
services, web servers, databases, and the documents and resources that
they can provide. HyperText Transfer Protocol (HTTP) is the main access
protocol of the World Wide Web. Web services also use HTTP for
communication between software systems for information transfer, sharing
and exchanging business data and logistics and is one of many languages
or protocols that can be used for communication on the Internet.[87]

World Wide Web browser software, such as Microsoft's Internet


Explorer/Edge, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome,
enable users to navigate from one web page to another via the hyperlinks
embedded in the documents. These documents may also contain any
combination of computer data, including graphics, sounds, text, video,
multimedia and interactive content that runs while the user is interacting
with the page. Client-side software can include animations, games, office

[Link] 8/1/25, 22 02
Page 24 of 270
:
applications and scientific demonstrations. Through keyword-driven
Internet research using search engines like Yahoo!, Bing and Google, users
worldwide have easy, instant access to a vast and diverse amount of online
information. Compared to printed media, books, encyclopedias and
traditional libraries, the World Wide Web has enabled the decentralization
of information on a large scale.

The Web has enabled individuals and organizations to publish ideas and
information to a potentially large audience online at greatly reduced
expense and time delay. Publishing a web page, a blog, or building a
website involves little initial cost and many cost-free services are available.
However, publishing and maintaining large, professional websites with
attractive, diverse and up-to-date information is still a difficult and
expensive proposition. Many individuals and some companies and groups
use web logs or blogs, which are largely used as easily being able to
update online diaries. Some commercial organizations encourage staff to
communicate advice in their areas of specialization in the hope that
visitors will be impressed by the expert knowledge and free information
and be attracted to the corporation as a result.

Advertising on popular web pages can be lucrative, and e-commerce,


which is the sale of products and services directly via the Web, continues
to grow. Online advertising is a form of marketing and advertising which
uses the Internet to deliver promotional marketing messages to
consumers. It includes email marketing, search engine marketing (SEM),
social media marketing, many types of display advertising (including web
banner advertising), and mobile advertising. In 2011, Internet advertising
revenues in the United States surpassed those of cable television and
nearly exceeded those of broadcast television.[88]: 19 Many common online
advertising practices are controversial and increasingly subject to
regulation.

When the Web developed in the 1990s, a typical web page was stored in

[Link] 8/1/25, 22 02
Page 25 of 270
:
completed form on a web server, formatted in HTML, ready for
transmission to a web browser in response to a request. Over time, the
process of creating and serving web pages has become dynamic, creating
a flexible design, layout, and content. Websites are often created using
content management software with, initially, very little content.
Contributors to these systems, who may be paid staff, members of an
organization or the public, fill underlying databases with content using
editing pages designed for that purpose while casual visitors view and
read this content in HTML form. There may or may not be editorial,
approval and security systems built into the process of taking newly
entered content and making it available to the target visitors.

Communication
Email is an important communications service available via the Internet.
The concept of sending electronic text messages between parties,
analogous to mailing letters or memos, predates the creation of the
Internet.[89][90] Pictures, documents, and other files are sent as email
attachments. Email messages can be cc-ed to multiple email addresses.

Internet telephony is a common communications service realized with the


Internet. The name of the principal internetworking protocol, the Internet
Protocol, lends its name to voice over Internet Protocol (VoIP). The idea
began in the early 1990s with walkie-talkie-like voice applications for
personal computers. VoIP systems now dominate many markets and are as
easy to use and as convenient as a traditional telephone. The benefit has
been substantial cost savings over traditional telephone calls, especially
over long distances. Cable, ADSL, and mobile data networks provide

[Link] 8/1/25, 22 02
Page 26 of 270
:
Internet access in customer premises[91] and inexpensive VoIP network
adapters provide the connection for traditional analog telephone sets. The
voice quality of VoIP often exceeds that of traditional calls. Remaining
problems for VoIP include the situation that emergency services may not
be universally available and that devices rely on a local power supply, while
older traditional phones are powered from the local loop, and typically
operate during a power failure.

Data transfer
File sharing is an example of transferring large amounts of data across the
Internet. A computer file can be emailed to customers, colleagues and
friends as an attachment. It can be uploaded to a website or File Transfer
Protocol (FTP) server for easy download by others. It can be put into a
"shared location" or onto a file server for instant use by colleagues. The
load of bulk downloads to many users can be eased by the use of "mirror"
servers or peer-to-peer networks. In any of these cases, access to the file
may be controlled by user authentication, the transit of the file over the
Internet may be obscured by encryption, and money may change hands
for access to the file. The price can be paid by the remote charging of
funds from, for example, a credit card whose details are also passed—
usually fully encrypted—across the Internet. The origin and authenticity of
the file received may be checked by digital signatures or by MD5 or other
message digests. These simple features of the Internet, over a worldwide
basis, are changing the production, sale, and distribution of anything that
can be reduced to a computer file for transmission. This includes all
manner of print publications, software products, news, music, film, video,
photography, graphics and the other arts. This in turn has caused seismic

[Link] 8/1/25, 22 02
Page 27 of 270
:
shifts in each of the existing industries that previously controlled the
production and distribution of these products.

Streaming media is the real-time delivery of digital media for immediate


consumption or enjoyment by end users. Many radio and television
broadcasters provide Internet feeds of their live audio and video
productions. They may also allow time-shift viewing or listening such as
Preview, Classic Clips and Listen Again features. These providers have
been joined by a range of pure Internet "broadcasters" who never had on-
air licenses. This means that an Internet-connected device, such as a
computer or something more specific, can be used to access online media
in much the same way as was previously possible only with a television or
radio receiver. The range of available types of content is much wider, from
specialized technical webcasts to on-demand popular multimedia
services. Podcasting is a variation on this theme, where—usually audio—
material is downloaded and played back on a computer or shifted to a
portable media player to be listened to on the move. These techniques
using simple equipment allow anybody, with little censorship or licensing
control, to broadcast audio-visual material worldwide. Digital media
streaming increases the demand for network bandwidth. For example,
standard image quality needs 1 Mbit/s link speed for SD 480p, HD 720p
quality requires 2.5 Mbit/s, and the top-of-the-line HDX quality needs
4.5 Mbit/s for 1080p.[92]

Webcams are a low-cost extension of this phenomenon. While some


webcams can give full-frame-rate video, the picture either is usually small
or updates slowly. Internet users can watch animals around an African
waterhole, ships in the Panama Canal, traffic at a local roundabout or
monitor their own premises, live and in real time. Video chat rooms and
video conferencing are also popular with many uses being found for
personal webcams, with and without two-way sound. YouTube was
founded on 15 February 2005 and is now the leading website for free
streaming video with more than two billion users.[93] It uses an HTML5

[Link] 8/1/25, 22 02
Page 28 of 270
:
based web player by default to stream and show video files.[94] Registered
users may upload an unlimited amount of video and build their own
personal profile. YouTube claims that its users watch hundreds of millions,
and upload hundreds of thousands of videos daily.

Social impact
The Internet has enabled new forms of social interaction, activities, and
social associations. This phenomenon has given rise to the scholarly study
of the sociology of the Internet. The early Internet left an impact on some
writers who used symbolism to write about it, such as describing the
Internet as a "means to connect individuals in a vast invisible net over all
the earth."[95]

Users

Share of population using the


Internet.[96] Source data.

[Link] 8/1/25, 22 02
Page 29 of 270
:
Internet users per 100 population
members and GDP per capita for
selected countries

Internet users per 100 inhabitants


[97][98]
Source: International Telecommunication Union.

Between 2000 and 2009, the number of Internet users globally rose from
390 million to 1.9 billion.[99] By 2010, 22% of the world's population had
access to computers with 1 billion Google searches every day, 300 million
Internet users reading blogs, and 2 billion videos viewed daily on YouTube.
[100]
In 2014 the world's Internet users surpassed 3 billion or 44 percent of
world population, but two-thirds came from the richest countries, with 78
percent of Europeans using the Internet, followed by 57 percent of the
Americas.[101] However, by 2018, Asia alone accounted for 51% of all
Internet users, with 2.2 billion out of the 4.3 billion Internet users in the
world. China's Internet users surpassed a major milestone in 2018, when

[Link] 8/1/25, 22 02
Page 30 of 270
:
the country's Internet regulatory authority, China Internet Network
Information Centre, announced that China had 802 million users.[102]
China was followed by India, with some 700 million users, with the United
States third with 275 million users. However, in terms of penetration, in
2022 China had a 70% penetration rate compared to India's 60% and the
United States's 90%.[103] In 2022, 54% of the world's Internet users were
based in Asia, 14% in Europe, 7% in North America, 10% in Latin America
and the Caribbean, 11% in Africa, 4% in the Middle East and 1% in
Oceania.[104] In 2019, Kuwait, Qatar, the Falkland Islands, Bermuda and
Iceland had the highest Internet penetration by the number of users, with
93% or more of the population with access.[105] As of 2022, it was
estimated that 5.4 billion people use the Internet, more than two-thirds of
the world's population.[106]

The prevalent language for communication via the Internet has always
been English. This may be a result of the origin of the Internet, as well as
the language's role as a lingua franca and as a world language. Early
computer systems were limited to the characters in the American Standard
Code for Information Interchange (ASCII), a subset of the Latin alphabet.
After English (27%), the most requested languages on the World Wide
Web are Chinese (25%), Spanish (8%), Japanese (5%), Portuguese and
German (4% each), Arabic, French and Russian (3% each), and Korean
(2%).[107] The Internet's technologies have developed enough in recent
years, especially in the use of Unicode, that good facilities are available for
development and communication in the world's widely used languages.
However, some glitches such as mojibake (incorrect display of some
languages' characters) still remain.

In a US study in 2005, the percentage of men using the Internet was very
slightly ahead of the percentage of women, although this difference
reversed in those under 30. Men logged on more often, spent more time
online, and were more likely to be broadband users, whereas women
tended to make more use of opportunities to communicate (such as

[Link] 8/1/25, 22 02
Page 31 of 270
:
email). Men were more likely to use the Internet to pay bills, participate in
auctions, and for recreation such as downloading music and videos. Men
and women were equally likely to use the Internet for shopping and
banking.[108] In 2008, women significantly outnumbered men on most
social networking services, such as Facebook and Myspace, although the
ratios varied with age.[109] Women watched more streaming content,
whereas men downloaded more.[110] Men were more likely to blog. Among
those who blog, men were more likely to have a professional blog, whereas
women were more likely to have a personal blog.[111]

Several neologisms exist that refer to Internet users: Netizen (as in "citizen
of the net")[112] refers to those actively involved in improving online
communities, the Internet in general or surrounding political affairs and
rights such as free speech,[113][114] Internaut refers to operators or
technically highly capable users of the Internet,[115][116] digital citizen
refers to a person using the Internet in order to engage in society, politics,
and government participation.[117]

[Link] 8/1/25, 22 02
Page 32 of 270
:
Internet users by language[107]

[Link] 8/1/25, 22 02
Page 33 of 270
:
Website content languages[118]

Usage

[Link] 8/1/25, 22 02
Page 34 of 270
:
Internet users in 2021 as a percentage of a country's
population
Source: Our World in Data.

Fixed broadband Internet subscriptions in 2012


as a percentage of a country's population
Source: International Telecommunication Union.[119]

[Link] 8/1/25, 22 02
Page 35 of 270
:
Mobile broadband Internet subscriptions in 2012
as a percentage of a country's population
Source: International Telecommunication Union.[120]

The Internet allows greater flexibility in working hours and location,


especially with the spread of unmetered high-speed connections. The
Internet can be accessed almost anywhere by numerous means, including
through mobile Internet devices. Mobile phones, datacards, handheld
game consoles and cellular routers allow users to connect to the Internet
wirelessly. Within the limitations imposed by small screens and other
limited facilities of such pocket-sized devices, the services of the Internet,
including email and the web, may be available. Service providers may
restrict the services offered and mobile data charges may be significantly
higher than other access methods.

Educational material at all levels from pre-school to post-doctoral is


available from websites. Examples range from CBeebies, through school
and high-school revision guides and virtual universities, to access to top-
end scholarly literature through the likes of Google Scholar. For distance
education, help with homework and other assignments, self-guided
learning, whiling away spare time or just looking up more detail on an
interesting fact, it has never been easier for people to access educational
information at any level from anywhere. The Internet in general and the
World Wide Web in particular are important enablers of both formal and
informal education. Further, the Internet allows researchers (especially
those from the social and behavioral sciences) to conduct research

[Link] 8/1/25, 22 02
Page 36 of 270
:
remotely via virtual laboratories, with profound changes in reach and
generalizability of findings as well as in communication between scientists
and in the publication of results.[121]

The low cost and nearly instantaneous sharing of ideas, knowledge, and
skills have made collaborative work dramatically easier, with the help of
collaborative software. Not only can a group cheaply communicate and
share ideas but the wide reach of the Internet allows such groups more
easily to form. An example of this is the free software movement, which
has produced, among other things, Linux, Mozilla Firefox, and
[Link] (later forked into LibreOffice). Internet chat, whether using
an IRC chat room, an instant messaging system, or a social networking
service, allows colleagues to stay in touch in a very convenient way while
working at their computers during the day. Messages can be exchanged
even more quickly and conveniently than via email. These systems may
allow files to be exchanged, drawings and images to be shared, or voice
and video contact between team members.

Content management systems allow collaborating teams to work on


shared sets of documents simultaneously without accidentally destroying
each other's work. Business and project teams can share calendars as well
as documents and other information. Such collaboration occurs in a wide
variety of areas including scientific research, software development,
conference planning, political activism and creative writing. Social and
political collaboration is also becoming more widespread as both Internet
access and computer literacy spread.

The Internet allows computer users to remotely access other computers


and information stores easily from any access point. Access may be with
computer security; i.e., authentication and encryption technologies,
depending on the requirements. This is encouraging new ways of remote
work, collaboration and information sharing in many industries. An
accountant sitting at home can audit the books of a company based in

[Link] 8/1/25, 22 02
Page 37 of 270
:
another country, on a server situated in a third country that is remotely
maintained by IT specialists in a fourth. These accounts could have been
created by home-working bookkeepers, in other remote locations, based
on information emailed to them from offices all over the world. Some of
these things were possible before the widespread use of the Internet, but
the cost of private leased lines would have made many of them infeasible
in practice. An office worker away from their desk, perhaps on the other
side of the world on a business trip or a holiday, can access their emails,
access their data using cloud computing, or open a remote desktop
session into their office PC using a secure virtual private network (VPN)
connection on the Internet. This can give the worker complete access to
all of their normal files and data, including email and other applications,
while away from the office. It has been referred to among system
administrators as the Virtual Private Nightmare,[122] because it extends the
secure perimeter of a corporate network into remote locations and its
employees' homes. By the late 2010s the Internet had been described as
"the main source of scientific information "for the majority of the global
North population".[123]: 111

Social networking and


entertainment
Many people use the World Wide Web to access news, weather and sports
reports, to plan and book vacations and to pursue their personal interests.
People use chat, messaging and email to make and stay in touch with
friends worldwide, sometimes in the same way as some previously had
pen pals. Social networking services such as Facebook have created new

[Link] 8/1/25, 22 02
Page 38 of 270
:
ways to socialize and interact. Users of these sites are able to add a wide
variety of information to pages, pursue common interests, and connect
with others. It is also possible to find existing acquaintances, to allow
communication among existing groups of people. Sites like LinkedIn foster
commercial and business connections. YouTube and Flickr specialize in
users' videos and photographs. Social networking services are also widely
used by businesses and other organizations to promote their brands, to
market to their customers and to encourage posts to "go viral". "Black hat"
social media techniques are also employed by some organizations, such as
spam accounts and astroturfing.

A risk for both individuals' and organizations' writing posts (especially


public posts) on social networking services is that especially foolish or
controversial posts occasionally lead to an unexpected and possibly large-
scale backlash on social media from other Internet users. This is also a risk
in relation to controversial offline behavior, if it is widely made known. The
nature of this backlash can range widely from counter-arguments and
public mockery, through insults and hate speech, to, in extreme cases,
rape and death threats. The online disinhibition effect describes the
tendency of many individuals to behave more stridently or offensively
online than they would in person. A significant number of feminist women
have been the target of various forms of harassment in response to posts
they have made on social media, and Twitter in particular has been
criticized in the past for not doing enough to aid victims of online abuse.
[124]

For organizations, such a backlash can cause overall brand damage,


especially if reported by the media. However, this is not always the case,
as any brand damage in the eyes of people with an opposing opinion to
that presented by the organization could sometimes be outweighed by
strengthening the brand in the eyes of others. Furthermore, if an
organization or individual gives in to demands that others perceive as
wrong-headed, that can then provoke a counter-backlash.

[Link] 8/1/25, 22 02
Page 39 of 270
:
Some websites, such as Reddit, have rules forbidding the posting of
personal information of individuals (also known as doxxing), due to
concerns about such postings leading to mobs of large numbers of
Internet users directing harassment at the specific individuals thereby
identified. In particular, the Reddit rule forbidding the posting of personal
information is widely understood to imply that all identifying photos and
names must be censored in Facebook screenshots posted to Reddit.
However, the interpretation of this rule in relation to public Twitter posts is
less clear, and in any case, like-minded people online have many other
ways they can use to direct each other's attention to public social media
posts they disagree with.

Children also face dangers online such as cyberbullying and approaches


by sexual predators, who sometimes pose as children themselves.
Children may also encounter material that they may find upsetting, or
material that their parents consider to be not age-appropriate. Due to
naivety, they may also post personal information about themselves online,
which could put them or their families at risk unless warned not to do so.
Many parents choose to enable Internet filtering or supervise their
children's online activities in an attempt to protect their children from
inappropriate material on the Internet. The most popular social networking
services, such as Facebook and Twitter, commonly forbid users under the
age of 13. However, these policies are typically trivial to circumvent by
registering an account with a false birth date, and a significant number of
children aged under 13 join such sites anyway. Social networking services
for younger children, which claim to provide better levels of protection for
children, also exist.[125]

The Internet has been a major outlet for leisure activity since its inception,
with entertaining social experiments such as MUDs and MOOs being
conducted on university servers, and humor-related Usenet groups
receiving much traffic.[126] Many Internet forums have sections devoted to
games and funny videos.[126] The Internet pornography and online

[Link] 8/1/25, 22 02
Page 40 of 270
:
gambling industries have taken advantage of the World Wide Web.
Although many governments have attempted to restrict both industries'
use of the Internet, in general, this has failed to stop their widespread
popularity.[127]

Another area of leisure activity on the Internet is multiplayer gaming.[128]


This form of recreation creates communities, where people of all ages and
origins enjoy the fast-paced world of multiplayer games. These range from
MMORPG to first-person shooters, from role-playing video games to
online gambling. While online gaming has been around since the 1970s,
modern modes of online gaming began with subscription services such as
GameSpy and MPlayer.[129] Non-subscribers were limited to certain types
of game play or certain games. Many people use the Internet to access
and download music, movies and other works for their enjoyment and
relaxation. Free and fee-based services exist for all of these activities,
using centralized servers and distributed peer-to-peer technologies. Some
of these sources exercise more care with respect to the original artists'
copyrights than others.

Internet usage has been correlated to users' loneliness.[130] Lonely people


tend to use the Internet as an outlet for their feelings and to share their
stories with others, such as in the "I am lonely will anyone speak to me"
thread. A 2017 book claimed that the Internet consolidates most aspects
of human endeavor into singular arenas of which all of humanity are
potential members and competitors, with fundamentally negative impacts
on mental health as a result. While successes in each field of activity are
pervasively visible and trumpeted, they are reserved for an extremely thin
sliver of the world's most exceptional, leaving everyone else behind.
Whereas, before the Internet, expectations of success in any field were
supported by reasonable probabilities of achievement at the village,
suburb, city or even state level, the same expectations in the Internet
world are virtually certain to bring disappointment today: there is always
someone else, somewhere on the planet, who can do better and take the

[Link] 8/1/25, 22 02
Page 41 of 270
:
now one-and-only top spot.[131]

Cybersectarianism is a new organizational form that involves, "highly


dispersed small groups of practitioners that may remain largely
anonymous within the larger social context and operate in relative secrecy,
while still linked remotely to a larger network of believers who share a set
of practices and texts, and often a common devotion to a particular leader.
Overseas supporters provide funding and support; domestic practitioners
distribute tracts, participate in acts of resistance, and share information on
the internal situation with outsiders. Collectively, members and
practitioners of such sects construct viable virtual communities of faith,
exchanging personal testimonies and engaging in the collective study via
email, online chat rooms, and web-based message boards."[132] In
particular, the British government has raised concerns about the prospect
of young British Muslims being indoctrinated into Islamic extremism by
material on the Internet, being persuaded to join terrorist groups such as
the so-called "Islamic State", and then potentially committing acts of
terrorism on returning to Britain after fighting in Syria or Iraq.

Cyberslacking can become a drain on corporate resources; the average


UK employee spent 57 minutes a day surfing the Web while at work,
according to a 2003 study by Peninsula Business Services.[133] Internet
addiction disorder is excessive computer use that interferes with daily life.
Nicholas G. Carr believes that Internet use has other effects on individuals,
for instance improving skills of scan-reading and interfering with the deep
thinking that leads to true creativity.[134]

Electronic business

[Link] 8/1/25, 22 02
Page 42 of 270
:
Electronic business (e-business) encompasses business processes
spanning the entire value chain: purchasing, supply chain management,
marketing, sales, customer service, and business relationship. E-
commerce seeks to add revenue streams using the Internet to build and
enhance relationships with clients and partners. According to International
Data Corporation, the size of worldwide e-commerce, when global
business-to-business and -consumer transactions are combined, equate
to $16 trillion for 2013. A report by Oxford Economics added those two
together to estimate the total size of the digital economy at $20.4 trillion,
equivalent to roughly 13.8% of global sales.[135]

While much has been written of the economic advantages of Internet-


enabled commerce, there is also evidence that some aspects of the
Internet such as maps and location-aware services may serve to reinforce
economic inequality and the digital divide.[136] Electronic commerce may
be responsible for consolidation and the decline of mom-and-pop, brick
and mortar businesses resulting in increases in income inequality.[137][138]
[139]

Author Andrew Keen, a long-time critic of the social transformations


caused by the Internet, has focused on the economic effects of
consolidation from Internet businesses. Keen cites a 2013 Institute for
Local Self-Reliance report saying brick-and-mortar retailers employ 47
people for every $10 million in sales while Amazon employs only 14.
Similarly, the 700-employee room rental start-up Airbnb was valued at
$10 billion in 2014, about half as much as Hilton Worldwide, which employs
152,000 people. At that time, Uber employed 1,000 full-time employees
and was valued at $18.2 billion, about the same valuation as Avis Rent a
Car and The Hertz Corporation combined, which together employed
almost 60,000 people.[140]

[Link] 8/1/25, 22 02
Page 43 of 270
:
Remote work
Remote work is facilitated by tools such as groupware, virtual private
networks, conference calling, videotelephony, and VoIP so that work may
be performed from any location, most conveniently the worker's home. It
can be efficient and useful for companies as it allows workers to
communicate over long distances, saving significant amounts of travel
time and cost. More workers have adequate bandwidth at home to use
these tools to link their home to their corporate intranet and internal
communication networks.

Collaborative publishing
Wikis have also been used in the academic community for sharing and
dissemination of information across institutional and international
boundaries.[141] In those settings, they have been found useful for
collaboration on grant writing, strategic planning, departmental
documentation, and committee work.[142] The United States Patent and
Trademark Office uses a wiki to allow the public to collaborate on finding
prior art relevant to examination of pending patent applications. Queens,
New York has used a wiki to allow citizens to collaborate on the design and
planning of a local park.[143] The English Wikipedia has the largest user
base among wikis on the World Wide Web[144] and ranks in the top 10
among all sites in terms of traffic.[145]

[Link] 8/1/25, 22 02
Page 44 of 270
:
Politics and political
revolutions

Banner in Bangkok during the 2014


Thai coup d'état, informing the Thai
public that 'like' or 'share' activities
on social media could result in
imprisonment (observed 30 June
2014)

The Internet has achieved new relevance as a political tool. The


presidential campaign of Howard Dean in 2004 in the United States was
notable for its success in soliciting donation via the Internet. Many political
groups use the Internet to achieve a new method of organizing for carrying
out their mission, having given rise to Internet activism.[146][147] The New
York Times suggested that social media websites, such as Facebook and
Twitter, helped people organize the political revolutions in Egypt, by
helping activists organize protests, communicate grievances, and
disseminate information.[148]

Many have understood the Internet as an extension of the Habermasian


notion of the public sphere, observing how network communication
technologies provide something like a global civic forum. However,

[Link] 8/1/25, 22 02
Page 45 of 270
:
incidents of politically motivated Internet censorship have now been
recorded in many countries, including western democracies.[149][150]

E-government is the use of technological communications devices, such


as the Internet, to provide public services to citizens and other persons in
a country or region. E-government offers opportunities for more direct and
convenient citizen access to government[151] and for government provision
of services directly to citizens.[152]

Philanthropy
The spread of low-cost Internet access in developing countries has
opened up new possibilities for peer-to-peer charities, which allow
individuals to contribute small amounts to charitable projects for other
individuals. Websites, such as DonorsChoose and GlobalGiving, allow
small-scale donors to direct funds to individual projects of their choice. A
popular twist on Internet-based philanthropy is the use of peer-to-peer
lending for charitable purposes. Kiva pioneered this concept in 2005,
offering the first web-based service to publish individual loan profiles for
funding. Kiva raises funds for local intermediary microfinance
organizations that post stories and updates on behalf of the borrowers.
Lenders can contribute as little as $25 to loans of their choice and receive
their money back as borrowers repay. Kiva falls short of being a pure peer-
to-peer charity, in that loans are disbursed before being funded by lenders
and borrowers do not communicate with lenders themselves.[153][154]

[Link] 8/1/25, 22 02
Page 46 of 270
:
Security
Internet resources, hardware, and software components are the target of
criminal or malicious attempts to gain unauthorized control to cause
interruptions, commit fraud, engage in blackmail or access private
information.[155]

Malware
Malware is malicious software used and distributed via the Internet. It
includes computer viruses which are copied with the help of humans,
computer worms which copy themselves automatically, software for denial
of service attacks, ransomware, botnets, and spyware that reports on the
activity and typing of users. Usually, these activities constitute cybercrime.
Defense theorists have also speculated about the possibilities of hackers
using cyber warfare using similar methods on a large scale.[156]

Malware poses serious problems to individuals and businesses on the


Internet.[157][158] According to Symantec's 2018 Internet Security Threat
Report (ISTR), malware variants number has increased to 669,947,865 in
2017, which is twice as many malware variants as in 2016.[159] Cybercrime,
which includes malware attacks as well as other crimes committed by
computer, was predicted to cost the world economy US$6 trillion in 2021,
and is increasing at a rate of 15% per year.[160] Since 2021, malware has
been designed to target computer systems that run critical infrastructure

[Link] 8/1/25, 22 02
Page 47 of 270
:
such as the electricity distribution network.[161][162] Malware can be
designed to evade antivirus software detection algorithms.[163][164][165]

Surveillance
The vast majority of computer surveillance involves the monitoring of data
and traffic on the Internet.[166] In the United States for example, under the
Communications Assistance For Law Enforcement Act, all phone calls and
broadband Internet traffic (emails, web traffic, instant messaging, etc.) are
required to be available for unimpeded real-time monitoring by Federal law
enforcement agencies.[167][168][169] Packet capture is the monitoring of
data traffic on a computer network. Computers communicate over the
Internet by breaking up messages (emails, images, videos, web pages,
files, etc.) into small chunks called "packets", which are routed through a
network of computers, until they reach their destination, where they are
assembled back into a complete "message" again. Packet Capture
Appliance intercepts these packets as they are traveling through the
network, in order to examine their contents using other programs. A
packet capture is an information gathering tool, but not an analysis tool.
That is it gathers "messages" but it does not analyze them and figure out
what they mean. Other programs are needed to perform traffic analysis
and sift through intercepted data looking for important/useful information.
Under the Communications Assistance For Law Enforcement Act all U.S.
telecommunications providers are required to install packet sniffing
technology to allow Federal law enforcement and intelligence agencies to
intercept all of their customers' broadband Internet and VoIP traffic.[170]

The large amount of data gathered from packet capture requires

[Link] 8/1/25, 22 02
Page 48 of 270
:
surveillance software that filters and reports relevant information, such as
the use of certain words or phrases, the access to certain types of web
sites, or communicating via email or chat with certain parties.[171]
Agencies, such as the Information Awareness Office, NSA, GCHQ and the
FBI, spend billions of dollars per year to develop, purchase, implement,
and operate systems for interception and analysis of data.[172] Similar
systems are operated by Iranian secret police to identify and suppress
dissidents. The required hardware and software were allegedly installed by
German Siemens AG and Finnish Nokia.[173]

Censorship

[Link] 8/1/25, 22 02
Page 49 of 270
:
Internet censorship and surveillance by country (2018)[174][175][c]
[176][177]

Pervasive
Substantial
Selective
Little or none
Unclassified / No data

Some governments, such as those of Burma, Iran, North Korea, Mainland


China, Saudi Arabia and the United Arab Emirates, restrict access to
content on the Internet within their territories, especially to political and
religious content, with domain name and keyword filters.[178]

In Norway, Denmark, Finland, and Sweden, major Internet service


providers have voluntarily agreed to restrict access to sites listed by
authorities. While this list of forbidden resources is supposed to contain
only known child pornography sites, the content of the list is secret.[179]
Many countries, including the United States, have enacted laws against
the possession or distribution of certain material, such as child
pornography, via the Internet but do not mandate filter software. Many
free or commercially available software programs, called content-control
software are available to users to block offensive websites on individual
computers or networks in order to limit access by children to pornographic

[Link] 8/1/25, 22 02
Page 50 of 270
:
material or depiction of violence.

Performance
As the Internet is a heterogeneous network, its physical characteristics,
including, for example the data transfer rates of connections, vary widely.
It exhibits emergent phenomena that depend on its large-scale
organization.[180]

Traffic volume

Global Internet Traffic as of 2018

The volume of Internet traffic is difficult to measure because no single


point of measurement exists in the multi-tiered, non-hierarchical topology.
Traffic data may be estimated from the aggregate volume through the
peering points of the Tier 1 network providers, but traffic that stays local in
large provider networks may not be accounted for.

[Link] 8/1/25, 22 02
Page 51 of 270
:
Outages
An Internet blackout or outage can be caused by local signaling
interruptions. Disruptions of submarine communications cables may cause
blackouts or slowdowns to large areas, such as in the 2008 submarine
cable disruption. Less-developed countries are more vulnerable due to the
small number of high-capacity links. Land cables are also vulnerable, as in
2011 when a woman digging for scrap metal severed most connectivity for
the nation of Armenia.[181] Internet blackouts affecting almost entire
countries can be achieved by governments as a form of Internet
censorship, as in the blockage of the Internet in Egypt, whereby
approximately 93%[182] of networks were without access in 2011 in an
attempt to stop mobilization for anti-government protests.[183]

Energy use
Estimates of the Internet's electricity usage have been the subject of
controversy, according to a 2014 peer-reviewed research paper that found
claims differing by a factor of 20,000 published in the literature during the
preceding decade, ranging from 0.0064 kilowatt hours per gigabyte
transferred (kWh/GB) to 136 kWh/GB.[184] The researchers attributed
these discrepancies mainly to the year of reference (i.e. whether efficiency
gains over time had been taken into account) and to whether "end devices
such as personal computers and servers are included" in the analysis.[184]

In 2011, academic researchers estimated the overall energy used by the

[Link] 8/1/25, 22 02
Page 52 of 270
:
Internet to be between 170 and 307 GW, less than two percent of the
energy used by humanity. This estimate included the energy needed to
build, operate, and periodically replace the estimated 750 million laptops,
a billion smart phones and 100 million servers worldwide as well as the
energy that routers, cell towers, optical switches, Wi-Fi transmitters and
cloud storage devices use when transmitting Internet traffic.[185][186]
According to a non-peer-reviewed study published in 2018 by The Shift
Project (a French think tank funded by corporate sponsors), nearly 4% of
global CO2 emissions could be attributed to global data transfer and the
necessary infrastructure.[187] The study also said that online video
streaming alone accounted for 60% of this data transfer and therefore
contributed to over 300 million tons of CO2 emission per year, and argued
for new "digital sobriety" regulations restricting the use and size of video
files.[188]

See also

Internet
portal
World
portal

Crowdfunding
Crowdsourcing

[Link] 8/1/25, 22 02
Page 53 of 270
:
Cyberspace
Darknet
Deep web
Hyphanet
Internet industry jargon
Index of Internet-related
articles
Internet metaphors
Internet video
"Internets"
Outline of the Internet

[Link] 8/1/25, 22 02
Page 54 of 270
:
Notes

a. See Capitalization of
Internet
b. Despite the name, TCP/IP
also includes UDP traffic,
which is significant.[1]
c. Due to legal concerns the
OpenNet Initiative does not
check for filtering of child
pornography and because
their classifications focus

[Link] 8/1/25, 22 02
Page 55 of 270
:
on technical filtering, they
do not include other types
of censorship.

References

1. Amogh Dhamdhere.
"Internet Traffic
Characterization" ([Link]
[Link]/~dovroli
s/Courses/8803_F03/amo
[Link]) . Retrieved 6 May
2022.
2. "A Flaw in the Design" (http

[Link] 8/1/25, 22 02
Page 56 of 270
:
2. "A Flaw in the Design" (http
s://[Link]
m/sf/business/2015/05/3
0/net-of-insecurity-part-
1/) . The Washington Post.
30 May 2015. Archived (htt
ps://[Link]/web/2
0201108111512/[Link]
[Link]/sf/b
usiness/2015/05/30/net-of
-insecurity-part-1/) from
the original on 8 November
2020. Retrieved
20 February 2020. "The

[Link] 8/1/25, 22 02
Page 57 of 270
:
20 February 2020. "The
Internet was born of a big
idea: Messages could be
chopped into chunks, sent
through a network in a
series of transmissions,
then reassembled by
destination computers
quickly and efficiently.
Historians credit seminal
insights to Welsh scientist
Donald W. Davies and
American engineer Paul
Baran. ... The most
important institutional force

[Link] 8/1/25, 22 02
Page 58 of 270
:
important institutional force
... was the Pentagon's
Advanced Research
Projects Agency (ARPA) ...
as ARPA began work on a
groundbreaking computer
network, the agency
recruited scientists
affiliated with the nation's
top universities."
3. Yates, David M. (1997).
Turing's Legacy: A History
of Computing at the
National Physical

[Link] 8/1/25, 22 02
Page 59 of 270
:
National Physical
Laboratory 1945-1995 (htt
ps://[Link]/boo
ks?id=ToMfAQAAIAAJ&q=
packet+switch) . National
Museum of Science and
Industry. pp. 132–4.
ISBN 978-0-901805-94-
2. "Davies's invention of
packet switching and
design of computer
communication networks ...
were a cornerstone of the
development which led to

[Link] 8/1/25, 22 02
Page 60 of 270
:
development which led to
the Internet"
4. Abbate 1999, p. 3 (https://
[Link]/books?i
d=9BfZxFZpElwC&pg=PA
3) "The manager of the
ARPANET project,
Lawrence Roberts,
assembled a large team of
computer scientists ... and
he drew on the ideas of
network experimenters in
the United States and the
United Kingdom. Cerf and

[Link] 8/1/25, 22 02
Page 61 of 270
:
United Kingdom. Cerf and
Kahn also enlisted the help
of computer scientists from
England, France and the
United States"
5. "The Computer History
Museum, SRI International,
and BBN Celebrate the
40th Anniversary of First
ARPANET Transmission,
Precursor to Today's
Internet" ([Link]
[Link]/web/20190329134
941/[Link]

[Link] 8/1/25, 22 02
Page 62 of 270
:
ewsroom/press-releases/c
omputer-history-museum-
sri-international-and-bbn-c
elebrate-40th-anniversar
y) . SRI International. 27
October 2009. Archived
from the original ([Link]
[Link]/newsroom/pres
s-releases/computer-histor
y-museum-sri-international
-and-bbn-celebrate-40th-
anniversary) on 29 March
2019. Retrieved
25 September 2017. "But

[Link] 8/1/25, 22 02
Page 63 of 270
:
25 September 2017. "But
the ARPANET itself had
now become an island, with
no links to the other
networks that had sprung
up. By the early 1970s,
researchers in France, the
UK, and the U.S. began
developing ways of
connecting networks to
each other, a process
known as internetworking."
6. by Vinton Cerf, as told to
Bernard Aboba (1993).

[Link] 8/1/25, 22 02
Page 64 of 270
:
Bernard Aboba (1993).
"How the Internet Came to
Be" ([Link]
g/web/20170926042220/
[Link]
[Link]/tmp/cdrom-oss/C
[Link]
ml) . Archived from the
original ([Link]
[Link]/tmp/cdr
om-oss/CerfHowInternetC
[Link]) on 26
September 2017. Retrieved
25 September 2017. "We

[Link] 8/1/25, 22 02
Page 65 of 270
:
25 September 2017. "We
began doing concurrent
implementations at
Stanford, BBN, and
University College London.
So effort at developing the
Internet protocols was
international from the
beginning."
7. Stewart, Bill (January
2000). "Internet History –
One Page Summary" (http
s://[Link]/web/2
0140702210150/[Link]

[Link] 8/1/25, 22 02
Page 66 of 270
:
[Link]/i/ii_su
[Link]) . The Living
Internet. Archived from the
original ([Link]
[Link]/i/ii_summary.ht
m) on 2 July 2014.
8. Wright, Edmund, ed.
(2006). The Desk
Encyclopedia of World
History. New York: Oxford
University Press. p. 312.
ISBN 978-0-7394-7809-
7.

[Link] 8/1/25, 22 02
Page 67 of 270
:
9. "#3 1982: the ARPANET
community grows" in 40
maps that explain the
internet ([Link]
om/a/internet-maps)
Archived ([Link]
[Link]/web/20170306161
657/[Link]
internet-maps) 6 March
2017 at the Wayback
Machine, Timothy B. Lee,
Vox Conversations, 2 June
2014. Retrieved 27 June
2014.

[Link] 8/1/25, 22 02
Page 68 of 270
:
2014.
10. Strickland, Jonathan (3
March 2008). "How Stuff
Works: Who owns the
Internet?" ([Link]
[Link]/web/20140619070
159/[Link]
[Link]/internet/basi
cs/[Link]
m) . Archived from the
original ([Link]
[Link]/internet/b
asics/[Link]
m) on 19 June 2014.

[Link] 8/1/25, 22 02
Page 69 of 270
:
m) on 19 June 2014.
Retrieved 27 June 2014.
11. Hoffman, P.; Harris, S.
(September 2006). The
Tao of IETF: A Novice's
Guide to Internet
Engineering Task Force (htt
ps://[Link]/do
c/html/rfc4677) . IETF.
doi:10.17487/RFC4677 (htt
ps://[Link]/10.17487%2FR
FC4677) . RFC 4677 (http
s://[Link]/doc/
html/rfc4677) .

[Link] 8/1/25, 22 02
Page 70 of 270
:
html/rfc4677) .
12. "New Seven Wonders
panel" ([Link]
org/web/2010071503211
4/[Link]
m/travel/news/2006-10-2
6-seven-wonders-experts_
[Link]) . USA Today. 27
October 2006. Archived
from the original ([Link]
[Link]/travel/ne
ws/2006-10-26-seven-wo
nders-experts_x.htm) on
15 July 2010. Retrieved

[Link] 8/1/25, 22 02
Page 71 of 270
:
15 July 2010. Retrieved
31 July 2010.
13. "Internetted" ([Link]
[Link]/search/dictionar
y/?q=Internetted) . Oxford
English Dictionary
(Online ed.). Oxford
University Press.
(Subscription or
participating institution
membership ([Link]
[Link]/public/login/loggingi
n#withyourlibrary)
required.) nineteenth-

[Link] 8/1/25, 22 02
Page 72 of 270
:
century use as an
adjective.
14. "United States Army Field
Manual FM 24-6 Radio
Operator's Manual Army
Ground Forces June 1945"
([Link]
Fm24-6/mode/2up) .
United States War
Department. 18 September
2023.
15. Cerf, Vint; Dalal, Yogen;
Sunshine, Carl (December

[Link] 8/1/25, 22 02
Page 73 of 270
:
1974). Specification of
Internet Transmission
Control Protocol ([Link]
[Link]/doc/html/r
fc675) . IETF.
doi:10.17487/RFC0675 (htt
ps://[Link]/10.17487%2FR
FC0675) . RFC 675 (http
s://[Link]/doc/
html/rfc675) .
16. Corbett, Philip B. (1 June
2016). "It's Official: The
'Internet' Is Over" (https://
[Link]/2016/0
[Link] 8/1/25, 22 02
Page 74 of 270
:
[Link]/2016/0
6/02/insider/now-it-is-offic
[Link]
l) . The New York Times.
ISSN 0362-4331 ([Link]
[Link]/issn/03
62-4331) . Archived (http
s://[Link]/web/2
0201014142148/[Link]
[Link]/2016/06/
02/insider/now-it-is-official
-[Link])
from the original on 14
October 2020. Retrieved

[Link] 8/1/25, 22 02
Page 75 of 270
:
October 2020. Retrieved
29 August 2020.
17. Herring, Susan C. (19
October 2015). "Should
You Be Capitalizing the
Word 'Internet'?" ([Link]
[Link]/2015/10/sh
ould-you-be-capitalizing-th
e-word-internet/) . Wired.
ISSN 1059-1028 ([Link]
[Link]/issn/10
59-1028) . Archived (http
s://[Link]/web/2
0201031024342/[Link]

[Link] 8/1/25, 22 02
Page 76 of 270
:
0201031024342/[Link]
[Link]/2015/10/sh
ould-you-be-capitalizing-th
e-word-internet/) from the
original on 31 October
2020. Retrieved 29 August
2020.
18. Coren, Michael J. (2 June
2016). "One of the
internet's inventors thinks it
should still be capitalized" (
[Link]
e-of-the-internets-inventor
s-thinks-it-should-still-be-

[Link] 8/1/25, 22 02
Page 77 of 270
:
s-thinks-it-should-still-be-
capitalized/) . Quartz.
Archived ([Link]
[Link]/web/20200927102
759/[Link]
5/one-of-the-internets-inv
entors-thinks-it-should-still
-be-capitalized/) from the
original on 27 September
2020. Retrieved
8 September 2020.
19. "World Wide Web
Timeline" ([Link]
[Link]/2014/03/11/wo

[Link] 8/1/25, 22 02
Page 78 of 270
:
rld-wide-web-timeline/) .
Pews Research Center. 11
March 2014. Archived (htt
ps://[Link]/web/2
0150729162322/[Link]
[Link]/2014/0
3/11/world-wide-web-timel
ine/) from the original on
29 July 2015. Retrieved
1 August 2015.
20. "HTML 4.01 Specification"
([Link]
l401/struct/[Link]#h-1
2.1) . World Wide Web
[Link] 8/1/25, 22 02
Page 79 of 270
:
2.1) . World Wide Web
Consortium. Archived (http
s://[Link]/web/2
0081006131915/[Link]
[Link]/TR/html401/struc
t/[Link]) from the
original on 6 October
2008. Retrieved 13 August
2008. "[T]he link (or
hyperlink, or Web link) [is]
the basic hypertext
construct. A link is a
connection from one Web
resource to another.

[Link] 8/1/25, 22 02
Page 80 of 270
:
resource to another.
Although a simple concept,
the link has been one of the
primary forces driving the
success of the Web."
21. Waldrop, Mitch (2015).
"DARPA and the Internet
Revolution" ([Link]
[Link]/attachments/(2O1
5)%20Global%20Nav%20
-%20About%20Us%20-%
20History%20-%20Resour
ces%20-%2050th%20-%
20Internet%20(Approved).

[Link] 8/1/25, 22 02
Page 81 of 270
:
20Internet%20(Approved).
pdf) (PDF). [Link].
Retrieved 16 May 2024.
22. Lee, J.A.N.; Rosin, Robert F
(1992). "Time-Sharing at
MIT" ([Link]
etails/time-sharing-at-mi
t) . IEEE Annals of the
History of Computing. 14
(1): 16.
doi:10.1109/85.145316 (htt
ps://[Link]/10.1109%2F8
5.145316) . ISSN 1058-
6180 ([Link]

[Link] 8/1/25, 22 02
Page 82 of 270
:
6180 ([Link]
[Link]/issn/1058-6180) .
S2CID 30976386 (https://
[Link]/Co
rpusID:30976386) .
Retrieved 3 October 2022.
23. F. J. Corbató, et al., The
Compatible Time-Sharing
System A Programmer's
Guide ([Link]
[Link]/pdf/mit/ctss/CTSS_P
[Link])
(MIT Press, 1963)
ISBN 978-0-262-03008-

[Link] 8/1/25, 22 02
Page 83 of 270
:
3. "To establish the context
of the present work, it is
informative to trace the
development of time-
sharing at MIT. Shortly
after the first paper on
time-shared computers by
C. Strachey at the June
1959 UNESCO Information
Processing conference,
H.M. Teager and J.
McCarthy delivered an
unpublished paper "Time-
Shared Program Testing" at

[Link] 8/1/25, 22 02
Page 84 of 270
:
Shared Program Testing" at
the August 1959 ACM
Meeting."
24. "Inductee Details – Paul
Baran" ([Link]
[Link]/web/201709060912
31/[Link]
onor/inductees/inductee-d
etail/?IID=316) . National
Inventors Hall of Fame.
Archived from the original (
[Link]
r/inductees/inductee-detai
l/?IID=316) on 6

[Link] 8/1/25, 22 02
Page 85 of 270
:
l/?IID=316) on 6
September 2017. Retrieved
6 September 2017;
"Inductee Details – Donald
Watts Davies" ([Link]
[Link]/web/2017090
6091936/[Link]
[Link]/honor/inductees/indu
ctee-detail/?IID=328) .
National Inventors Hall of
Fame. Archived from the
original ([Link]
org/honor/inductees/induct
ee-detail/?IID=328) on 6

[Link] 8/1/25, 22 02
Page 86 of 270
:
ee-detail/?IID=328) on 6
September 2017. Retrieved
6 September 2017.
25. Hauben, Michael; Hauben,
Ronda (1997). "5 The
Vision of Interactive
Computing And the
Future". Netizens: On the
History and Impact of
Usenet and the Internet (htt
p://[Link]/~ha
uben/book-pdf/CHAPTE
R%[Link]) (PDF). Wiley.
ISBN 978-0-8186-7706-

[Link] 8/1/25, 22 02
Page 87 of 270
:
9. Archived ([Link]
[Link]/web/202101031
84558/[Link]
[Link]/~hauben/book-pdf/C
HAPTER%[Link]) (PDF)
from the original on 3
January 2021. Retrieved
2 March 2020.
26. Zelnick, Bob; Zelnick, Eva
(2013). The Illusion of Net
Neutrality: Political
Alarmism, Regulatory
Creep and the Real Threat

[Link] 8/1/25, 22 02
Page 88 of 270
:
to Internet Freedom (http
s://[Link]/book
s?id=Q10phY811tUC&pg=
PA66) . Hoover Press.
ISBN 978-0-8179-1596-4.
Archived ([Link]
[Link]/web/202101101334
35/[Link]
m/books?id=Q10phY811tU
C&pg=PA66) from the
original on 10 January
2021. Retrieved 7 May
2020.
27. Peter, Ian (2004). "So, who

[Link] 8/1/25, 22 02
Page 89 of 270
:
27. Peter, Ian (2004). "So, who
really did invent the
Internet?" ([Link]
[Link]/web/20110903001
108/[Link]
nfo/History%20of%20th
e%20Internet/[Link]
l) . The Internet History
Project. Archived from the
original ([Link]
[Link]/History%20of%20t
he%20Internet/[Link]
l) on 3 September 2011.
Retrieved 27 June 2014.

[Link] 8/1/25, 22 02
Page 90 of 270
:
Retrieved 27 June 2014.
28. Gromov, Gregory (1995).
"Roads and Crossroads of
Internet History" ([Link]
[Link]/web/20160
127082435/[Link]
[Link]/[Link]) .
Archived from the original (
[Link]
[Link]) on 27 January
2016.
29. Hafner, Katie (1998).
Where Wizards Stay Up
Late: The Origins of the

[Link] 8/1/25, 22 02
Page 91 of 270
:
Late: The Origins of the
Internet. Simon & Schuster.
ISBN 978-0-684-83267-
8.
30. Hauben, Ronda (2001).
"From the ARPANET to the
Internet" ([Link]
[Link]/~rh120/other/tcp
digest_paper.txt) .
Archived ([Link]
[Link]/web/20090721093
920/[Link]
du/~rh120/other/tcpdigest
_paper.txt) from the

[Link] 8/1/25, 22 02
Page 92 of 270
:
_paper.txt) from the
original on 21 July 2009.
Retrieved 28 May 2009.
31. "Internet Pioneers Discuss
the Future of Money,
Books, and Paper in 1972"
([Link]
[Link]/internet-pioneers-di
scuss-the-future-of-money
-books-a-880551175) .
Paleofuture. 23 July 2013.
Archived ([Link]
[Link]/web/202010171413
23/[Link]

[Link] 8/1/25, 22 02
Page 93 of 270
:
[Link]/internet-pioneers
-discuss-the-future-of-mo
ney-books-a-880551175)
from the original on 17
October 2020. Retrieved
31 August 2020.
32. Townsend, Anthony
(2001). "The Internet and
the Rise of the New
Network Cities, 1969–
1999" ([Link]
[Link]/doi/10.1068/b26
88) . Environment and

[Link] 8/1/25, 22 02
Page 94 of 270
:
Planning B: Planning and
Design. 28 (1): 39–58.
Bibcode:2001EnPlB..28...3
9T ([Link]
[Link]/abs/2001EnPlB..2
8...39T) .
doi:10.1068/b2688 (http
s://[Link]/10.1068%2Fb2
688) . ISSN 0265-8135 (h
ttps://[Link]/i
ssn/0265-8135) .
S2CID 11574572 ([Link]
[Link]/Cor
pusID:11574572) .

[Link] 8/1/25, 22 02
Page 95 of 270
:
pusID:11574572) .
33. Kim, Byung-Keun (2005).
Internationalising the
Internet the Co-evolution of
Influence and Technology (
[Link]
books?id=lESrw3neDok
C) . Edward Elgar. pp. 51–
55. ISBN 978-1-84542-
675-0.
34. "NORSAR and the Internet"
([Link]
b/20130121220318/http://
[Link]/norsar/abo

[Link] 8/1/25, 22 02
Page 96 of 270
:
[Link]/norsar/abo
ut-us/History/Internet/) .
NORSAR. Archived from
the original ([Link]
[Link]/norsar/about-us/His
tory/Internet/) on 21
January 2013.
35. Kirstein, P.T. (1999). "Early
experiences with the
Arpanet and Internet in the
United Kingdom" ([Link]
[Link]/web/20200
207092443/[Link]
[Link]/4773/f

[Link] 8/1/25, 22 02
Page 97 of 270
:
[Link]/4773/f
19792f9fce8eacba72e5f8
[Link])
(PDF). IEEE Annals of the
History of Computing. 21
(1): 38–44.
doi:10.1109/85.759368 (ht
tps://[Link]/10.1109%2F8
5.759368) . ISSN 1934-
1547 ([Link]
[Link]/issn/1934-1547) .
S2CID 1558618 ([Link]
[Link]/Corp
usID:1558618) . Archived

[Link] 8/1/25, 22 02
Page 98 of 270
:
from the original ([Link]
[Link]/477
3/f19792f9fce8eacba72e5
[Link])
(PDF) on 7 February 2020.
36. Leiner, Barry M. "Brief
History of the Internet: The
Initial Internetting
Concepts" ([Link]
[Link]/web/2016040910
5511/[Link]
[Link]/internet/what-inte
rnet/history-internet/brief-

[Link] 8/1/25, 22 02
Page 99 of 270
:
history-internet) . Internet
Society. Archived from the
original ([Link]
[Link]/internet/what
-internet/history-internet/br
ief-history-internet#concep
ts) on 9 April 2016.
Retrieved 27 June 2014.
37. Cerf, V.; Kahn, R. (1974). "A
Protocol for Packet
Network
Intercommunication" (http
s://[Link]/c
ourses/archive/fall06/cos5

[Link] 8/1/25, 22 02
Page 100 of 270
:
ourses/archive/fall06/cos5
61/papers/[Link])
(PDF). IEEE Transactions
on Communications. 22
(5): 637–648.
doi:10.1109/TCOM.1974.10
92259 ([Link]
109%2FTCOM.1974.10922
59) . ISSN 1558-0857 (htt
ps://[Link]/is
sn/1558-0857) . Archived
([Link]
b/20060913213037/http
s://[Link]/c

[Link] 8/1/25, 22 02
Page 101 of 270
:
s://[Link]/c
ourses/archive/fall06/cos5
61/papers/[Link])
(PDF) from the original on
13 September 2006. "The
authors wish to thank a
number of colleagues for
helpful comments during
early discussions of
international network
protocols, especially R.
Metcalfe, R. Scantlebury, D.
Walden, and H.
Zimmerman; D. Davies and

[Link] 8/1/25, 22 02
Page 102 of 270
:
L. Pouzin who
constructively commented
on the fragmentation and
accounting issues; and S.
Crocker who commented
on the creation and
destruction of
associations."
38. "The internet's fifth man" (h
ttps://[Link]/
news/technology-quarterl
y/21590765-louis-pouzin-
helped-create-internet-no

[Link] 8/1/25, 22 02
Page 103 of 270
:
w-he-campaigning-ensure-
its) . The Economist. 30
November 2013.
ISSN 0013-0613 ([Link]
[Link]/issn/00
13-0613) . Archived (http
s://[Link]/web/2
0200419230318/[Link]
[Link]/news/te
chnology-quarterly/21590
765-louis-pouzin-helped-c
reate-internet-now-he-cam
paigning-ensure-its) from
the original on 19 April

[Link] 8/1/25, 22 02
Page 104 of 270
:
the original on 19 April
2020. Retrieved 22 April
2020. "In the early 1970s
Mr Pouzin created an
innovative data network
that linked locations in
France, Italy and Britain. Its
simplicity and efficiency
pointed the way to a
network that could connect
not just dozens of
machines, but millions of
them. It captured the
imagination of Dr Cerf and

[Link] 8/1/25, 22 02
Page 105 of 270
:
imagination of Dr Cerf and
Dr Kahn, who included
aspects of its design in the
protocols that now power
the internet."
39. Schatt, Stan (1991). Linking
LANs: A Micro Manager's
Guide. McGraw-Hill.
p. 200. ISBN 0-8306-
3755-9.
40. Frazer, Karen D. (1995).
"NSFNET: A Partnership
for High-Speed
Networking, Final Report

[Link] 8/1/25, 22 02
Page 106 of 270
:
Networking, Final Report
1987–1995" ([Link]
[Link]/web/201502101
81738/[Link]
u/about/history/pdf/NSFNE
T_final.pdf) (PDF). Merit
Network, Inc. Archived
from the original ([Link]
[Link]/about/history/
pdf/NSFNET_final.pdf)
(PDF) on 10 February
2015.
41. Ben Segal (1995). "A Short
History of Internet

[Link] 8/1/25, 22 02
Page 107 of 270
:
Protocols at CERN" (http
s://[Link]/web/2
0230608153730/[Link]
[Link]/ben/TCPHIS
[Link]) . Archived from the
original ([Link]
h/ben/[Link]) on 8
June 2023. Retrieved
14 October 2011.
42. Réseaux IP Européens
(RIPE)
43. "Internet History in Asia" (h
ttp://[Link]/meetin

[Link] 8/1/25, 22 02
Page 108 of 270
:
gs/busan03/[Link]
m) . 16th APAN
Meetings/Advanced
Network Conference in
Busan. Archived ([Link]
[Link]/web/20060
201035514/[Link]
t/meetings/busan03/cs-his
[Link]) from the original
on 1 February 2006.
Retrieved 25 December
2005.
44. "The History of

[Link] 8/1/25, 22 02
Page 109 of 270
:
NORDUnet" ([Link]
[Link]/web/201603040
31416/[Link]
et/history/TheHistoryOfNor
dunet_simple.pdf) (PDF).
Archived from the original (
[Link]
ry/TheHistoryOfNordunet_
[Link]) (PDF) on 4
March 2016.
45. Clarke, Roger. "Origins and
Nature of the Internet in
Australia" ([Link]
[Link]/II/[Link]#

[Link] 8/1/25, 22 02
Page 110 of 270
:
[Link]/II/[Link]#
CIAP) . Archived ([Link]
[Link]/web/20210
209201253/[Link]
[Link]/II/[Link]
l#CIAP) from the original
on 9 February 2021.
Retrieved 21 January 2014.
46. Zakon, Robert (November
1997). RFC 2235 ([Link]
[Link]/doc/htm
l/rfc2235#page-8) . IETF.
p. 8.
doi:10.17487/RFC2235 (htt

[Link] 8/1/25, 22 02
Page 111 of 270
:
doi:10.17487/RFC2235 (htt
ps://[Link]/10.17487%2FR
FC2235) . Retrieved
2 December 2020.
47. "InfoWorld" ([Link]
[Link]/books?id=wDA
EAAAAMBAJ&q=compuser
ve%20to%20mci%20mai
l%20internet&pg=PT31) .
25 September 1989.
Archived ([Link]
[Link]/web/20170129225
422/[Link]
om/books?id=wDAEAAAA

[Link] 8/1/25, 22 02
Page 112 of 270
:
om/books?id=wDAEAAAA
MBAJ&pg=PT31&lpg=PT3
1&dq=compuserve%20t
o%20mci%20mail%20inte
rnet) from the original on
29 January 2017 – via
Google Books.
48. "INTERNET MONTHLY
REPORTS" ([Link]
[Link]/all/201705
25080041/[Link]
[Link]/pub/doc/internet/Int
[Link]/imr9
[Link]) . February 1990.

[Link] 8/1/25, 22 02
Page 113 of 270
:
[Link]) . February 1990.
Archived from the original (
[Link]
doc/internet/[Link]
[Link]/[Link])
on 25 May 2017. Retrieved
28 November 2020.
49. Berners-Lee, Tim. "The
Original HTTP as defined in
1991" ([Link]
org/web/1997060507115
5/[Link]
cols/HTTP/AsImplemented.
html) . [Link]. Archived

[Link] 8/1/25, 22 02
Page 114 of 270
:
from the original ([Link]
[Link]/Protocols/HTTP/
[Link]) on 5
June 1997.
50. "The website of the world's
first-ever web server" (http
s://[Link]/web/2
0100105103513/[Link]
[Link]/) . [Link].
Archived from the original (
[Link] on 5
January 2010.
51. "Stanford Federal Credit

[Link] 8/1/25, 22 02
Page 115 of 270
:
Union Pioneers Online
Financial Services" (http://
[Link]/Sta
nford+Federal+Credit+Uni
on+Pioneers+Online+Finan
cial+Services.-a01710485
0) (Press release). 21
June 1995. Archived (http
s://[Link]/web/2
0181221041632/[Link]
[Link]/Stan
ford+Federal+Credit+Unio
n+Pioneers+Online+Financ
ial+Services.-a01710485

[Link] 8/1/25, 22 02
Page 116 of 270
:
ial+Services.-a01710485
0) from the original on 21
December 2018. Retrieved
21 December 2018.
52. "History – About us – OP
Group" ([Link]
p-financial-group/about-u
s/op-financial-group-in-bri
ef/history) . Archived (http
s://[Link]/web/2
0181221041413/[Link]
[Link]/op-financial-grou
p/about-us/op-financial-gr
oup-in-brief/history) from

[Link] 8/1/25, 22 02
Page 117 of 270
:
oup-in-brief/history) from
the original on 21
December 2018. Retrieved
21 December 2018.
53. Harris, Susan R.; Gerich,
Elise (April 1996). "Retiring
the NSFNET Backbone
Service: Chronicling the
End of an Era" ([Link]
[Link]/web/20130817
124939/[Link]
search/nsfnet_article.php)
. ConneXions. 10 (4).
Archived from the original (

[Link] 8/1/25, 22 02
Page 118 of 270
:
Archived from the original (
[Link]
rch/nsfnet_article.php) on
17 August 2013.
54. "Measuring digital
development: Facts and
figures 2023" ([Link]
[Link]/en/ITU-D/Statistic
s/Pages/facts/[Link]
x) . Telecommunication
Development Bureau,
International
Telecommunication Union
(ITU). Retrieved 14 June

[Link] 8/1/25, 22 02
Page 119 of 270
:
(ITU). Retrieved 14 June
2024.
55. "Total Midyear Population
for the World: 1950-
2050" " ([Link]
[Link]/web/2017041713474
4/[Link]
population/international/dat
a/idb/[Link]) .
International Programs
Center for Demographic
and Economic Studies,
U.S. Census Bureau.
Archived from the original (

[Link] 8/1/25, 22 02
Page 120 of 270
:
Archived from the original (
[Link]
pulation/international/data/i
db/[Link]) on
17 April 2017. Retrieved
28 February 2020.
56. Jindal, R. P. (2009). "From
millibits to terabits per
second and beyond - over
60 years of innovation" (htt
ps://[Link]/web/2
0190823230141/[Link]
[Link]/m/195
547) . 2009 2nd

[Link] 8/1/25, 22 02
Page 121 of 270
:
International Workshop on
Electron Devices and
Semiconductor
Technology. Vol. 49. pp. 1–
6.
doi:10.1109/EDST.2009.51
66093 ([Link]
109%2FEDST.2009.51660
93) . ISBN 978-1-4244-
3831-0. S2CID 25112828
([Link]
[Link]/CorpusID:25112828)
. Archived from the original
([Link]

[Link] 8/1/25, 22 02
Page 122 of 270
:
([Link]
rg/m/195547) on 23
August 2019. Retrieved
24 August 2019.
57. Ward, Mark (3 August
2006). "How the web went
world wide" ([Link]
[Link]/web/2011112109
2636/[Link]
k/2/hi/science/nature/5242
[Link]) . Technology
Correspondent. BBC News.
Archived from the original (
[Link]

[Link] 8/1/25, 22 02
Page 123 of 270
:
[Link]
science/nature/[Link]
m) on 21 November 2011.
Retrieved 24 January 2011.
58. "Brazil, Russia, India and
China to Lead Internet
Growth Through 2011" (htt
ps://[Link]/web/2
0081004000237/[Link]
[Link]/showPage.h
tml?page=3626274) .
[Link]. Archived from
the original ([Link]
m/[Link]?page=3

[Link] 8/1/25, 22 02
Page 124 of 270
:
m/[Link]?page=3
626274) on 4 October
2008. Retrieved 28 May
2009.
59. Coffman, K.G; Odlyzko,
A.M. (2 October 1998).
"The size and growth rate
of the Internet" ([Link]
[Link]/web/200706
14012344/[Link]
[Link]/~odlyzko/doc/inte
[Link]) (PDF). AT&T
Labs. Archived from the
original ([Link]

[Link] 8/1/25, 22 02
Page 125 of 270
:
original ([Link]
[Link]/~odlyzko/doc/intern
[Link]) (PDF) on 14
June 2007. Retrieved
21 May 2007.
60. Comer, Douglas (2006).
The Internet book ([Link]
[Link]/details/internetb
ookever00come_0/page/6
4) . Prentice Hall. p. 64 (htt
ps://[Link]/details/inte
rnetbookever00come_0/pa
ge/64) . ISBN 978-0-13-
233553-9.

[Link] 8/1/25, 22 02
Page 126 of 270
:
61. "World Internet Users and
Population Stats" ([Link]
[Link]/web/20110
623200007/[Link]
[Link]/stats.
htm) . Internet World Stats.
Miniwatts Marketing Group.
22 June 2011. Archived
from the original ([Link]
[Link]/st
[Link]) on 23 June 2011.
Retrieved 23 June 2011.
62. Hilbert, Martin; López,

[Link] 8/1/25, 22 02
Page 127 of 270
:
Priscila (April 2011). "The
World's Technological
Capacity to Store,
Communicate, and
Compute Information" (http
s://[Link]/10.1126%2Fscie
nce.1200970) . Science.
332 (6025): 60–65.
Bibcode:2011Sci...332...60
H ([Link]
[Link]/abs/2011Sci...332...
60H) .
doi:10.1126/science.12009
70 ([Link]

[Link] 8/1/25, 22 02
Page 128 of 270
:
70 ([Link]
6%2Fscience.1200970) .
PMID 21310967 ([Link]
[Link]/21
310967) .
S2CID 206531385 (http
s://[Link]
g/CorpusID:206531385) .
63. Klein, Hans (2004).
"ICANN and Non-Territorial
Sovereignty: Government
Without the Nation State" (
[Link]
b/20130524035251/htt

[Link] 8/1/25, 22 02
Page 129 of 270
:
b/20130524035251/htt
p://[Link]/re
search/KLEIN_ICANN%2B
[Link]) . Internet
and Public Policy Project.
Georgia Institute of
Technology. Archived from
the original ([Link]
[Link]/research/KLE
IN_ICANN%2BSovereignty.
doc) on 24 May 2013.
64. Packard, Ashley (2010).
Digital Media Law. Wiley-
Blackwell. p. 65. ISBN 978-

[Link] 8/1/25, 22 02
Page 130 of 270
:
Blackwell. p. 65. ISBN 978-
1-4051-8169-3.
65. McCarthy, Kieren (1 July
2005). "Bush
administration annexes
internet" ([Link]
[Link]/web/201109191305
39/[Link]
[Link]/2005/07/01/bush_n
et_policy/) . The Register.
Archived from the original (
[Link]
uk/2005/07/01/bush_net_
policy/) on 19 September

[Link] 8/1/25, 22 02
Page 131 of 270
:
policy/) on 19 September
2011.
66. Mueller, Milton L. (2010).
Networks and States: The
Global Politics of Internet
Governance. MIT Press.
p. 61. ISBN 978-0-262-
01459-5.
67. "ICG Applauds Transfer of
IANA Stewardship" (https://
[Link]/icg-applau
ds-transfer-of-iana-stewar
dship/) . IANA Stewardship
Transition Coordination

[Link] 8/1/25, 22 02
Page 132 of 270
:
Transition Coordination
Group (ICG). Archived (http
s://[Link]/web/2
0170712190131/[Link]
[Link]/icg-applaud
s-transfer-of-iana-steward
ship/) from the original on
12 July 2017. Retrieved
8 June 2017.
68. "Internet Society (ISOC) All
About The Internet: History
of the Internet" ([Link]
[Link]/web/2011112
7114016/[Link]

[Link] 8/1/25, 22 02
Page 133 of 270
:
rg/internet/history/isochist
[Link]) . ISOC. Archived
from the original ([Link]
[Link]/internet/history/i
[Link]) on 27
November 2011. Retrieved
19 December 2013.
69. Pasternak, Sean B. (7
March 2006). "Toronto
Hydro to Install Wireless
Network in Downtown
Toronto" ([Link]
[Link]/apps/news?pid
=10000082&sid=aQ0Zfh
[Link] 8/1/25, 22 02
Page 134 of 270
:
=10000082&sid=aQ0Zfh
Ma4XGQ) . Bloomberg.
Archived ([Link]
[Link]/web/20060410104
717/[Link]
com/apps/news?pid=1000
0082&sid=aQ0ZfhMa4XG
Q) from the original on 10
April 2006. Retrieved
8 August 2011.
70. "Mobile and Tablet Internet
Usage Exceeds Desktop for
First Time Worldwide" (http
s://[Link]/web/2

[Link] 8/1/25, 22 02
Page 135 of 270
:
s://[Link]/web/2
0161101170640/[Link]
[Link]/press/mob
ile-and-tablet-internet-usa
ge-exceeds-desktop-for-fir
st-time-worldwide) .
StatCounter: Global Stats,
Press Release. 1 November
2016. Archived from the
original ([Link]
[Link]/press/mobile-and-t
ablet-internet-usage-excee
ds-desktop-for-first-time-
worldwide) on 1 November

[Link] 8/1/25, 22 02
Page 136 of 270
:
worldwide) on 1 November
2016. "StatCounter Global
Stats finds that mobile and
tablet devices accounted
for 51.3% of Internet usage
worldwide in October
compared to 48.7% by
desktop."
71. "World
Telecommunication/ICT
Indicators Database 2020
(24th Edition/July 2020)" (
[Link]
b/20190421072228/http

[Link] 8/1/25, 22 02
Page 137 of 270
:
b/20190421072228/http
s://[Link]/en/ITU-D/St
atistics/Pages/publications/
[Link]) . International
Telecommunication Union
(ITU). 2017a. Archived
from the original ([Link]
[Link]/en/ITU-D/Statisti
cs/Pages/publications/wtid.
aspx) on 21 April 2019.
"Key ICT indicators for
developed and developing
countries and the world
(totals and penetration
rates). World
[Link] 8/1/25, 22 02
Page 138 of 270
:
rates). World
Telecommunication/ICT
Indicators database"
72. World Trends in Freedom
of Expression and Media
Development Global Report
2017/2018 ([Link]
[Link]/images/002
6/002610/[Link])
(PDF). UNESCO. 2018.
Archived ([Link]
[Link]/web/20180920181
419/[Link]
[Link]/images/0026/00261

[Link] 8/1/25, 22 02
Page 139 of 270
:
[Link]/images/0026/00261
0/[Link]) (PDF)
from the original on 20
September 2018. Retrieved
29 May 2018.
73. "GSMA The Mobile
Economy 2019" ([Link]
[Link]/web/201903
11062226/[Link]
[Link]/r/mobileeconom
y/) . 11 March 2019.
Archived from the original (
[Link]
obileeconomy/) on 11

[Link] 8/1/25, 22 02
Page 140 of 270
:
obileeconomy/) on 11
March 2019. Retrieved
28 November 2020.
74. Galpaya, Helani (12 April
2019). "Zero-rating in
Emerging Economies" (http
s://[Link]/site
s/default/files/documents/
GCIG%20no.47_1.pdf)
(PDF). Global Commission
on Internet Governance.
Archived ([Link]
[Link]/web/20190412062
932/[Link]

[Link] 8/1/25, 22 02
Page 141 of 270
:
932/[Link]
[Link]/sites/default/files/doc
uments/GCIG%20no.47_1.p
df) (PDF) from the original
on 12 April 2019. Retrieved
28 November 2020.
75. "Alliance for Affordable
Internet (A4AI). 2015.
Models of Mobile Data
Services in Developing
Countries. Research brief.
The Impacts of Emerging
Mobile Data Services in
Developing Countries" (htt

[Link] 8/1/25, 22 02
Page 142 of 270
:
Developing Countries" (htt
p://[Link]/the-impacts-of
-emerging-mobiledata-ser
vices-in-developing-countr
ies/) .
76. Gillwald, Alison; Chair,
Chenai; Futter, Ariel;
Koranteng, Kweku;
Odufuwa, Fola; Walubengo,
John (12 September 2016).
"Much Ado About Nothing?
Zero Rating in the African
Context" ([Link]
[Link]/publications/Ot

[Link] 8/1/25, 22 02
Page 143 of 270
:
her_publications/2016_RIA
_Zero-Rating_Policy_Paper
_-_Much_ado_about_nothi
[Link]) (PDF).
Researchictafrica. Archived
([Link]
b/20201216150858/http
s://[Link]/pu
blications/Other_publicatio
ns/2016_RIA_Zero-Rating_
Policy_Paper_-_Much_ado
_about_nothing.pdf) (PDF)
from the original on 16
December 2020. Retrieved

[Link] 8/1/25, 22 02
Page 144 of 270
:
December 2020. Retrieved
28 November 2020.
77. J. Postel, ed. (September
1981). Internet Protocol,
DARPA Internet Program
Protocol Specification (http
s://[Link]/doc/
html/rfc791) . IETF.
doi:10.17487/RFC0791 (htt
ps://[Link]/10.17487%2FR
FC0791) . RFC 791 (http
s://[Link]/doc/
html/rfc791) . Updated by
RFC 1349 ([Link]

[Link] 8/1/25, 22 02
Page 145 of 270
:
RFC 1349 ([Link]
[Link]/doc/html/rfc13
49) , 2474 ([Link]
[Link]/doc/html/rfc2
474) , 6864 ([Link]
[Link]/doc/html/rfc6
864)
78. Huston, Geoff. "IPv4
Address Report, daily
generated" ([Link]
[Link]/tools/ipv4/[Link]
ml) . Archived ([Link]
[Link]/web/2009040
1001902/[Link]

[Link] 8/1/25, 22 02
Page 146 of 270
:
1001902/[Link]
[Link]/tools/ipv4/[Link]
l) from the original on 1
April 2009. Retrieved
20 May 2009.
79. S. Deering; R. Hinden
(December 1995). Internet
Protocol, Version 6 (IPv6)
Specification ([Link]
[Link]/doc/html/rfc1
883) . Network Working
Group.
doi:10.17487/RFC1883 (htt
ps://[Link]/10.17487%2FR

[Link] 8/1/25, 22 02
Page 147 of 270
:
ps://[Link]/10.17487%2FR
FC1883) . RFC 1883 (http
s://[Link]/doc/
html/rfc1883) .
80. S. Deering; R. Hinden
(December 1998). Internet
Protocol, Version 6 (IPv6)
Specification ([Link]
[Link]/doc/html/rfc2
460) . Network Working
Group.
doi:10.17487/RFC2460 (htt
ps://[Link]/10.17487%2FR
FC2460) . RFC 2460 (http

[Link] 8/1/25, 22 02
Page 148 of 270
:
s://[Link]/doc/
html/rfc2460) .
81. S. Deering; R. Hinden (July
2017). Internet Protocol,
Version 6 (IPv6)
Specification ([Link]
[Link]/doc/html/rfc8
200) . IETF.
doi:10.17487/RFC8200 (htt
ps://[Link]/10.17487%2FR
FC8200) . RFC 8200 (http
s://[Link]/doc/
html/rfc8200) .

[Link] 8/1/25, 22 02
Page 149 of 270
:
82. "Notice of Internet Protocol
version 4 (IPv4) Address
Depletion" ([Link]
[Link]/web/2010010709
5025/[Link]
knowledge/about_resource
s/ceo_letter.pdf) (PDF).
Archived from the original (
[Link]
edge/about_resources/ceo
_letter.pdf) (PDF) on 7
January 2010. Retrieved
7 August 2009.

[Link] 8/1/25, 22 02
Page 150 of 270
:
83. Jeffrey Mogul; Jon Postel
(August 1985). Internet
Standard Subnetting
Procedure ([Link]
[Link]/doc/html/rfc95
0) . IETF.
doi:10.17487/RFC0950 (htt
ps://[Link]/10.17487%2FR
FC0950) . RFC 950 (http
s://[Link]/doc/
html/rfc950) . Updated by
RFC 6918.
84. Fisher, Tim. "How to Find
Your Default Gateway IP

[Link] 8/1/25, 22 02
Page 151 of 270
:
Your Default Gateway IP
Address" ([Link]
[Link]/how-to-find-your
-default-gateway-ip-addres
s-2626072) . Lifewire.
Archived ([Link]
[Link]/web/20190225162
425/[Link]
om/how-to-find-your-defa
ult-gateway-ip-address-26
26072) from the original
on 25 February 2019.
Retrieved 25 February
2019.

[Link] 8/1/25, 22 02
Page 152 of 270
:
2019.
85. "Default Gateway" (https://
[Link]/web/2020
1026160616/[Link]
[Link]/definition/2
184/default-gateway) .
[Link]. 30 June
2020. Archived from the
original ([Link]
[Link]/definition/2184/
default-gateway) on 26
October 2020.
86. "IETF Home Page" (http://
[Link]/) . [Link].

[Link] 8/1/25, 22 02
Page 153 of 270
:
[Link]/) . [Link].
Archived ([Link]
[Link]/web/20090618032
558/[Link]
from the original on 18
June 2009. Retrieved
20 June 2009.
87. "The Difference Between
the Internet and the World
Wide Web" ([Link]
[Link]/DidYouKnow/
Internet/Web_vs_Internet.a
sp) . Webopedia.
QuinStreet Inc. 24 June

[Link] 8/1/25, 22 02
Page 154 of 270
:
QuinStreet Inc. 24 June
2010. Archived ([Link]
[Link]/web/201405
02001005/[Link]
[Link]/DidYouKnow/I
nternet/Web_vs_Internet.a
sp) from the original on 2
May 2014. Retrieved 1 May
2014.
88. "IAB Internet advertising
revenue report: 2012 full
year results" ([Link]
[Link]/web/20141004
001439/[Link]

[Link] 8/1/25, 22 02
Page 155 of 270
:
t/media/file/IAB_Internet_A
dvertising_Revenue_Repor
t_FY_2012_rev.pdf) (PDF).
PricewaterhouseCoopers,
Internet Advertising
Bureau. April 2013.
Archived from the original (
[Link]
le/IAB_Internet_Advertising
_Revenue_Report_FY_201
2_rev.pdf) (PDF) on 4
October 2014. Retrieved
12 June 2013.

[Link] 8/1/25, 22 02
Page 156 of 270
:
89. Brown, Ron (26 October
1972). "Fax invades the
mail market" ([Link]
[Link]/books?id=Ry6
4sjvOmLkC&pg=PA218) .
New Scientist. 56 (817):
218–221.
90. Luckett, Herbert P. (March
1973). "What's News:
Electronic-mail delivery
gets started" ([Link]
[Link]/books?id=cK
Sqa8u3EIoC&pg=PA85) .
Popular Science. 202 (3):

[Link] 8/1/25, 22 02
Page 157 of 270
:
Popular Science. 202 (3):
85.
91. Booth, C (2010). "Chapter
2: IP Phones, Software
VoIP, and Integrated and
Mobile VoIP". Library
Technology Reports. 46
(5): 11–19.
92. Morrison, Geoff (18
November 2010). "What to
know before buying a
'connected' TV –
Technology & science –
Tech and gadgets – Tech

[Link] 8/1/25, 22 02
Page 158 of 270
:
Tech and gadgets – Tech
Holiday Guide" ([Link]
[Link]/web/202002
12091603/[Link]
[Link]/id/40241749) .
NBC News. Archived from
the original ([Link]
[Link]/id/40241749)
on 12 February 2020.
Retrieved 8 August 2011.
93. "Press" ([Link]
[Link]/about/press/) .
YouTube. Archived (https://
[Link]/web/2017

[Link] 8/1/25, 22 02
Page 159 of 270
:
[Link]/web/2017
1111094352/[Link]
[Link]/yt/about/pres
s/) from the original on 11
November 2017. Retrieved
19 August 2020.
94. "YouTube now defaults to
HTML5" ([Link]
[Link]/2015/0
1/youtube-now-defaults-to
-html5_27.html) . YouTube
Engineering and
Developers Blog. Archived
([Link]

[Link] 8/1/25, 22 02
Page 160 of 270
:
([Link]
b/20180910204225/http
s://[Link]
[Link]/2015/01/youtube-n
ow-defaults-to-html5_27.ht
ml) from the original on 10
September 2018. Retrieved
10 September 2018.
95. Carlson, Kathie; Flanagin,
Michael N.; Martin,
Kathleen; Martin, Mary E.;
Mendelsohn, John;
Rodgers, Priscilla Young;
Ronnberg, Ami; Salman,

[Link] 8/1/25, 22 02
Page 161 of 270
:
Ronnberg, Ami; Salman,
Sherry; Wesley, Deborah A.
(2010). Arm, Karen; Ueda,
Kako; Thulin, Anne;
Langerak, Allison; Kiley,
Timothy Gus; Wolff, Mary
(eds.). The Book of
Symbols: Reflections on
Archetypal Images. Köln:
Taschen. p. 518.
ISBN 978-3-8365-1448-
4.
96. Ritchie, Hannah; Roser,
Max (2 October 2017).

[Link] 8/1/25, 22 02
Page 162 of 270
:
"Technology Adoption" (htt
ps://[Link]/tec
hnology-adoption) . Our
World in Data. Archived (ht
tps://[Link]/web/
20191012121855/[Link]
[Link]/technolo
gy-adoption) from the
original on 12 October
2019. Retrieved 12 October
2019.
97. "Individuals using the
Internet 2005 to 2014" (htt

[Link] 8/1/25, 22 02
Page 163 of 270
:
p://[Link]/en/ITU-D/St
atistics/Documents/statistic
s/2014/ITU_Key_2005-20
14_ICT_data.xls) Archived
([Link]
b/20150528031339/htt
p://[Link]/en/ITU-D/St
atistics/Documents/statistic
s/2014/ITU_Key_2005-20
14_ICT_data.xls) 28 May
2015 at the Wayback
Machine, Key ICT
indicators for developed
and developing countries

[Link] 8/1/25, 22 02
Page 164 of 270
:
and developing countries
and the world (totals and
penetration rates),
International
Telecommunication Union
(ITU). Retrieved 25 May
2015.
98. "Internet users per 100
inhabitants 1997 to 2007" (
[Link]
t/statistics/ict/) Archived (
[Link]
b/20150517033104/http://
[Link]/ITU-D/ict/statis

[Link] 8/1/25, 22 02
Page 165 of 270
:
[Link]/ITU-D/ict/statis
tics/ict/) 17 May 2015 at
the Wayback Machine, ICT
Data and Statistics (IDS),
International
Telecommunication Union
(ITU). Retrieved 25 May
2015.
99. Internet users graphs (http
s://[Link]/en/ITU-D/St
atistics/Pages/stat/)
Archived ([Link]
[Link]/web/20200509175
322/[Link]

[Link] 8/1/25, 22 02
Page 166 of 270
:
322/[Link]
ITU-D/Statistics/Pages/sta
t/[Link]) 9 May
2020 at the Wayback
Machine, Market
Information and Statistics,
International
Telecommunication Union
100. "Google Earth
demonstrates how
technology benefits RI's
civil society, govt" ([Link]
[Link]/en/ne
ws/71940/google-earth-de

[Link] 8/1/25, 22 02
Page 167 of 270
:
ws/71940/google-earth-de
monstrates-how-technolog
y-benefits-ris-civil-society-
govt) . Antara News. 26
May 2011. Archived (http
s://[Link]/web/2
0121029074528/[Link]
[Link]/en/new
s/71940/google-earth-de
monstrates-how-technolog
y-benefits-ris-civil-society-
govt) from the original on
29 October 2012.
Retrieved 19 November
2012.

[Link] 8/1/25, 22 02
Page 168 of 270
:
2012.
101. Steve Dent (25 November
2014). "There are now 3
billion Internet users,
mostly in rich countries" (ht
tps://[Link]/2
014/11/25/3-billion-interne
t-users/) . Archived (http
s://[Link]/web/2
0141128020032/[Link]
[Link]/2014/11/2
5/3-billion-internet-users/)
from the original on 28
November 2014. Retrieved

[Link] 8/1/25, 22 02
Page 169 of 270
:
November 2014. Retrieved
25 November 2014.
102. "Statistical Report on
Internet Development in
China" ([Link]
n/IDR/ReportDownloads/2
01807/P02018071139106
[Link]) (PDF).
[Link]. January 2018.
Archived ([Link]
[Link]/web/20190412062
935/[Link]
DR/ReportDownloads/201
807/P0201807113910691

[Link] 8/1/25, 22 02
Page 170 of 270
:
807/P0201807113910691
[Link]) (PDF) from
the original on 12 April
2019.
103. "World Internet Users
Statistics and 2019 World
Population Stats" ([Link]
[Link]/
[Link]) .
[Link].
Archived ([Link]
[Link]/web/201711241928
36/[Link]
[Link]/[Link])

[Link] 8/1/25, 22 02
Page 171 of 270
:
[Link]/[Link])
from the original on 24
November 2017. Retrieved
17 March 2019.
104. "World Internet Usage
Statistics News and
Population Stats" ([Link]
[Link]/web/20170
319013935/[Link]
[Link]/stats.
htm) . 30 June 2023.
Archived from the original (
[Link]
[Link]/[Link]) on 19

[Link] 8/1/25, 22 02
Page 172 of 270
:
[Link]/[Link]) on 19
March 2017. Retrieved
14 December 2023.
105. "Percentage of Individuals
using the Internet 2000–
2012" ([Link]
n/ITU-D/Statistics/Docume
nts/statistics/2013/Individu
als_Internet_2000-[Link]
s) Archived ([Link]
[Link]/web/201402091
41641/[Link]
n/ITU-D/Statistics/Docume
nts/statistics/2013/Individu

[Link] 8/1/25, 22 02
Page 173 of 270
:
als_Internet_2000-[Link]
s) 9 February 2014 at the
Wayback Machine,
International
Telecommunication Union
(Geneva), June 2013.
Retrieved 22 June 2013.
106. "World Internet Users
Statistics and 2023 World
Population Stats" ([Link]
[Link]/
[Link]) . Internet World
Stats. Archived ([Link]
[Link]/web/202403

[Link] 8/1/25, 22 02
Page 174 of 270
:
[Link]/web/202403
19110853/[Link]
[Link]/[Link]
m) from the original on 19
March 2024.
107. "Top Ten Internet
Languages" ([Link]
[Link]/web/201204261
22721/[Link]
[Link]/[Link]
m) . Internet World Stats,
Miniwatts Marketing Group.
18 March 2012. Archived
from the original ([Link]

[Link] 8/1/25, 22 02
Page 175 of 270
:
from the original ([Link]
[Link]/st
[Link]) on 26 April
2012. Retrieved 22 April
2012.
108. Fallows, Deborah (28
December 2005). "How
Women and Men Use the
Internet" ([Link]
[Link]/internet/200
5/12/28/how-women-and-
men-use-the-internet/) .
Pew Research Center.
Archived ([Link]

[Link] 8/1/25, 22 02
Page 176 of 270
:
Archived ([Link]
[Link]/web/20230608191
432/[Link]
[Link]/internet/2005/12/2
8/how-women-and-men-u
se-the-internet/) from the
original on 8 June 2023.
109. "Rapleaf Study Reveals
Gender and Age Data of
Social Network Users" (htt
ps://[Link]/web/2
0090320211742/[Link]
[Link]/compan
y_press_2008_07_29.htm

[Link] 8/1/25, 22 02
Page 177 of 270
:
y_press_2008_07_29.htm
l) . Rapleaf. 29 July 2008.
Archived from the original (
[Link]
m/company_press_2008_
07_29.html) on 20 March
2009.
110. "Women Ahead of Men in
Online Tv, Dvr, Games, And
Social Media" ([Link]
[Link]/web/2008091
6094836/[Link]
[Link]/tradejournals/
article/[Link]) .

[Link] 8/1/25, 22 02
Page 178 of 270
:
article/[Link]) .
Entrepreneur. 1 May 2008.
Archived from the original (
[Link]
m/tradejournals/article/178
[Link]) on 16
September 2008.
Retrieved 8 August 2011.
111. "State of the Blogosphere"
([Link]
b/20091002101707/http://
[Link]/blogging/st
ate-of-the-blogosphere/) .
Technorati. Archived from

[Link] 8/1/25, 22 02
Page 179 of 270
:
the original ([Link]
[Link]/blogging/state-of-th
e-blogosphere/) on 2
October 2009. Retrieved
8 August 2011.
112. Seese, Michael (2009).
Scrappy Information
Security ([Link]
[Link]/books?id=3noNR3
IfSpgC&q=citizen+of+the+
net&pg=PA130) . Happy
About. p. 130. ISBN 978-1-
60005-132-6. Archived (h
ttps://[Link]/web/

[Link] 8/1/25, 22 02
Page 180 of 270
:
ttps://[Link]/web/
20170905151414/[Link]
[Link]/books?id
=3noNR3IfSpgC&pg=PA13
0&lpg=PA130&dq=citizen
+of+the+net) from the
original on 5 September
2017. Retrieved 5 June
2015.
113. "netizen ([Link]
[Link]/browse/netiz
en) ", [Link].
Archived ([Link]
[Link]/web/20120421223

[Link] 8/1/25, 22 02
Page 181 of 270
:
[Link]/web/20120421223
939/[Link]
[Link]/browse/netizen)
21 April 2012 at the
Wayback Machine.
114. Hauben, Michael (5 June
1996). "The Net and
Netizens" ([Link]
[Link]/web/20110604214
312/[Link]
du/~rh120/ch106.x01) .
Columbia University.
Archived from the original (
[Link]

[Link] 8/1/25, 22 02
Page 182 of 270
:
[Link]
rh120/ch106.x01) on 4
June 2011.
115. Leiner, B M.; Cerf, V G.;
Clark, D D.; Kahn, R E.;
Kleinrock, L; Lynch, D C.;
Postel, J; Roberts, L G.;
Wolff, S (10 December
2003). "A Brief History of
the Internet" ([Link]
[Link]/web/20070604
153304/[Link]
g/internet/history/[Link]
ml) . the Internet Society.

[Link] 8/1/25, 22 02
Page 183 of 270
:
ml) . the Internet Society.
Archived from the original (
[Link]
t/history/[Link]) on 4
June 2007.
116. "internaut" ([Link]
[Link]/web/2015061300
2443/[Link]
[Link]/definition/e
nglish/internaut) . Oxford
Dictionaries. Archived from
the original ([Link]
[Link]/definit
ion/english/internaut) on

[Link] 8/1/25, 22 02
Page 184 of 270
:
ion/english/internaut) on
13 June 2015. Retrieved
6 June 2015.
117. Mossberger, Karen;
Tolbert, Caroline J.;
McNeal, Ramona S. (2011).
Digital Citizenship – The
Internet, Society and
Participation. SPIE Press.
ISBN 978-0-8194-5606-
9.
118. "Usage of content
languages for websites" (ht
tp://[Link]/technolo

[Link] 8/1/25, 22 02
Page 185 of 270
:
tp://[Link]/technolo
gies/overview/content_lang
uage/all) . W3Techs.
Archived ([Link]
day/20120717235405/htt
p://[Link]/technolog
ies/overview/content_langu
age/all) from the original
on 17 July 2012. Retrieved
26 April 2013.
119. "Fixed (wired)-broadband
subscriptions per 100
inhabitants 2012" ([Link]
[Link]/ITU-D/ICTEYE/R

[Link] 8/1/25, 22 02
Page 186 of 270
:
eporting/DynamicReportWi
[Link]) Archived (http
s://[Link]/web/2
0190726064920/[Link]
[Link]/ITU-D/ICTEYE/R
eporting/DynamicReportWi
[Link]) 26 July 2019 at
the Wayback Machine,
Dynamic Report, ITU ITC
EYE, International
Telecommunication Union.
Retrieved 29 June 2013.
120. "Active mobile-broadband
subscriptions per 100
[Link] 8/1/25, 22 02
Page 187 of 270
:
subscriptions per 100
inhabitants 2012" ([Link]
[Link]/ITU-D/ICTEYE/R
eporting/DynamicReportWi
[Link]) Archived (http
s://[Link]/web/2
0190726064920/[Link]
[Link]/ITU-D/ICTEYE/R
eporting/DynamicReportWi
[Link]) 26 July 2019 at
the Wayback Machine,
Dynamic Report, ITU ITC
EYE, International
Telecommunication Union.

[Link] 8/1/25, 22 02
Page 188 of 270
:
Telecommunication Union.
Retrieved 29 June 2013.
121. Reips, U.-D. (2008). "How
Internet-mediated research
changes science".
Psychological aspects of
cyberspace: Theory,
research, applications (http
s://[Link]/web/2
0140809235408/[Link]
[Link]/us/acad
emic/subjects/psychology/
social-psychology/psychol
ogical-aspects-cyberspace

[Link] 8/1/25, 22 02
Page 189 of 270
:
ogical-aspects-cyberspace
-theory-research-applicatio
ns) . Cambridge:
Cambridge University
Press. pp. 268–294.
ISBN 978-0-521-69464-
3. Archived from the
original ([Link]
[Link]/us/academic/subje
cts/psychology/social-psyc
hology/psychological-aspe
cts-cyberspace-theory-res
earch-applications) on 9
August 2014.

[Link] 8/1/25, 22 02
Page 190 of 270
:
122. "The Virtual Private
Nightmare: VPN" ([Link]
[Link]/?inode=5013) .
Librenix. 4 August 2004.
Archived ([Link]
[Link]/web/201105151526
37/[Link]
de=5013) from the
original on 15 May 2011.
Retrieved 21 July 2010.
123. Dariusz Jemielniak;
Aleksandra Przegalinska
(2020). Collaborative

[Link] 8/1/25, 22 02
Page 191 of 270
:
Society ([Link]
[Link]/books?id=yLDMD
wAAQBAJ) . MIT Press.
ISBN 978-0-262-35645-
9. Archived ([Link]
[Link]/web/202011230
45652/[Link]
[Link]/books?id=yLDMDw
AAQBAJ) from the original
on 23 November 2020.
Retrieved 26 November
2020.
124. Moore, Keith (27 July

[Link] 8/1/25, 22 02
Page 192 of 270
:
2013). "Twitter 'report
abuse' button calls after
rape threats" ([Link]
[Link]/news/technology
-23477130) . BBC News.
Archived ([Link]
[Link]/web/20140904014
545/[Link]
news/technology-2347713
0) from the original on 4
September 2014. Retrieved
7 December 2014.
125. Kessler, Sarah (11 October
2010). "5 Fun and Safe

[Link] 8/1/25, 22 02
Page 193 of 270
:
2010). "5 Fun and Safe
Social Networks for
Children" ([Link]
com/2010/10/11/social-net
works-children/) .
Mashable. Archived (http
s://[Link]/web/2
0141220082237/[Link]
[Link]/2010/10/11/so
cial-networks-children/)
from the original on 20
December 2014. Retrieved
7 December 2014.
126. "Communication in our life"

[Link] 8/1/25, 22 02
Page 194 of 270
:
126. "Communication in our life"
([Link]
w/2987063/) . StudFiles
(in Russian). Retrieved
16 May 2023.
127. Goldman, Russell (22
January 2008). "Do It
Yourself! Amateur Porn
Stars Make Bank" (https://
[Link]/web/20111
230075056/[Link]
[Link]/Business/Small
Biz/story?id=4151592) .
ABC News. Archived from

[Link] 8/1/25, 22 02
Page 195 of 270
:
ABC News. Archived from
the original ([Link]
[Link]/Business/SmallBi
z/story?id=4151592) on
30 December 2011.
128. Spohn, Dave (15 December
2009). "Top Online Game
Trends of the Decade" (htt
ps://[Link]/web/2
0110929074221/[Link]
[Link]/od/
gamingnews/a/trendsdeca
[Link]) . [Link].
Archived from the original (

[Link] 8/1/25, 22 02
Page 196 of 270
:
Archived from the original (
[Link]
com/od/gamingnews/a/tre
[Link]) on 29
September 2011.
129. Spohn, Dave (2 June
2011). "Internet Game
Timeline: 1963–2004" (htt
ps://[Link]/web/2
0060425091409/[Link]
[Link]/od/
gamingnews/a/[Link]
m) . [Link]. Archived
from the original ([Link]

[Link] 8/1/25, 22 02
Page 197 of 270
:
[Link]/od/g
amingnews/a/[Link])
on 25 April 2006.
130. Carole Hughes; Boston
College. "The Relationship
Between Internet Use and
Loneliness Among College
Students" ([Link]
[Link]/web/20151107031
736/[Link]
~hughesc/[Link]) .
Boston College. Archived
from the original ([Link]

[Link] 8/1/25, 22 02
Page 198 of 270
:
[Link]/~hughesc/abs
[Link]) on 7 November
2015. Retrieved 11 August
2011.
131. Barker, Eric (2017). Barking
Up the Wrong Tree.
HarperCollins. pp. 235–
236. ISBN 978-0-06-
241604-9.
132. Thornton, Patricia M.
(2003). "The New
Cybersects: Resistance
and Repression in the

[Link] 8/1/25, 22 02
Page 199 of 270
:
Reform era". In Perry,
Elizabeth; Selden, Mark
(eds.). Chinese Society:
Change, Conflict and
Resistance (2 ed.). London
and New York: Routledge.
pp. 149–150. ISBN 978-0-
415-56074-0.
133. "Net abuse hits small city
firms" ([Link]
[Link]/news/net-abuse-hits
-small-city-firms-1-89216
3) . The Scotsman.
Edinburgh. 11 September

[Link] 8/1/25, 22 02
Page 200 of 270
:
Edinburgh. 11 September
2003. Archived ([Link]
[Link]/web/201210
20041820/[Link]
[Link]/news/net-abuse
-hits-small-city-firms-1-89
2163) from the original on
20 October 2012.
Retrieved 7 August 2009.
134. Carr, Nicholas G. (2010).
The Shallows: What the
Internet Is Doing to Our
Brains ([Link]
details/shallowswhatinte00

[Link] 8/1/25, 22 02
Page 201 of 270
:
details/shallowswhatinte00
00carr/page/276) . W.W.
Norton. p. 276 ([Link]
[Link]/details/shallowswha
tinte0000carr/page/276) .
ISBN 978-0-393-07222-
8.
135. "The New Digital Economy:
How it will transform
business" ([Link]
[Link]/web/20140706101
452/[Link]
[Link]/web/documents/Th
e%20New%20Digital%20

[Link] 8/1/25, 22 02
Page 202 of 270
:
e%20New%20Digital%20
[Link]) (PDF).
Oxford Economics. 2 July
2011. Archived from the
original ([Link]
[Link]/web/document
s/The%20New%20Digita
l%[Link]) (PDF)
on 6 July 2014.
136. Badger, Emily (6 February
2013). "How the Internet
Reinforces Inequality in the
Real World" ([Link]
[Link]/web/201302110

[Link] 8/1/25, 22 02
Page 203 of 270
:
[Link]/web/201302110
95334/[Link]
[Link]/technology/2
013/02/how-internet-reinf
orces-inequality-real-worl
d/4602/) . The Atlantic.
Archived from the original (
[Link]
[Link]/technology/2013/0
2/how-internet-reinforces-i
nequality-real-world/460
2/) on 11 February 2013.
Retrieved 13 February
2013.

[Link] 8/1/25, 22 02
Page 204 of 270
:
137. "E-commerce will make the
shopping mall a retail
wasteland" ([Link]
[Link]/article/e-commerc
e-will-make-the-shopping-
mall-a-retail-wasteland/) .
ZDNet. 17 January 2013.
Archived ([Link]
[Link]/web/201302190113
01/[Link]
-commerce-will-make-the-
shopping-mall-a-retail-was
teland-7000009960/)
from the original on 19

[Link] 8/1/25, 22 02
Page 205 of 270
:
from the original on 19
February 2013.
138. " 'Free Shipping Day'
Promotion Spurs Late-
Season Online Spending
Surge, Improving Season-
to-Date Growth Rate to 16
Percent vs. Year Ago" (http
s://[Link]/web/2
0130128191411/[Link]
[Link]/Insights/P
ress_Releases/2012/12/Fre
e_Shipping_Day_Promotio
n_Spurs_Late-Season_Onli

[Link] 8/1/25, 22 02
Page 206 of 270
:
n_Spurs_Late-Season_Onli
ne_Spending_Surge) .
Comscore. 23 December
2012. Archived from the
original ([Link]
[Link]/Insights/Press_Rel
eases/2012/12/Free_Shipp
ing_Day_Promotion_Spurs
_Late-Season_Online_Spen
ding_Surge) on 28
January 2013.
139. "The Death of the
American Shopping Mall" (
[Link]

[Link] 8/1/25, 22 02
Page 207 of 270
:
[Link]
b/20130215044619/htt
p://[Link]
m/jobs-and-economy/201
2/12/death-american-shop
ping-mall/4252/) . The
Atlantic – Cities. 26
December 2012. Archived
from the original ([Link]
[Link]/jobs
-and-economy/2012/12/de
ath-american-shopping-ma
ll/4252/) on 15 February
2013.

[Link] 8/1/25, 22 02
Page 208 of 270
:
140. Harris, Michael (2 January
2015). "Book review: 'The
Internet Is Not the Answer'
by Andrew Keen" ([Link]
[Link]/o
pinions/book-review-the-in
ternet-is-not-the-answer-b
y-andrew-keen/2015/01/0
2/8627999a-7973-11e4-9
a27-6fdbc612bff8_story.ht
ml) . The Washington Post.
Archived ([Link]
[Link]/web/20150120000

[Link] 8/1/25, 22 02
Page 209 of 270
:
258/[Link]
[Link]/opinions/book-
review-the-internet-is-not-t
he-answer-by-andrew-kee
n/2015/01/02/8627999a-
7973-11e4-9a27-6fdbc61
2bff8_story.html) from the
original on 20 January
2015. Retrieved 25 January
2015.
141. MM Wanderley; D
Birnbaum; J Malloch
(2006). New Interfaces For
Musical Expression (http://

[Link] 8/1/25, 22 02
Page 210 of 270
:
Musical Expression (http://
[Link]/[Link]
m?id=1142215.1142259) .
IRCAM – Centre Pompidou.
p. 180. ISBN 978-2-
84426-314-8.
142. Nancy T. Lombardo (June
2008). "Putting Wikis to
Work in Libraries". Medical
Reference Services
Quarterly. 27 (2): 129–145.
doi:10.1080/0276386080
2114223 ([Link]
0.1080%2F02763860802

[Link] 8/1/25, 22 02
Page 211 of 270
:
0.1080%2F02763860802
114223) . PMID 18844087
([Link]
[Link]/18844087) .
S2CID 11552140 ([Link]
[Link]/Cor
pusID:11552140) .
143. Noveck, Beth Simone
(March 2007). "Wikipedia
and the Future of Legal
Education" ([Link]
[Link]/HOL/LandingPage?c
ollection=journals&handle=
[Link]/jled57&div=

[Link] 8/1/25, 22 02
Page 212 of 270
:
[Link]/jled57&div=
8&id=&page=) . Journal of
Legal Education. 57 (1).
Archived ([Link]
[Link]/web/20140703005
842/[Link]
HOL/LandingPage?collecti
on=journals&handle=hein.j
ournals%2Fjled57&div=8&i
d=&page=) from the
original on 3 July 2014.
(subscription required)

144. "WikiStats by S23" (https://


[Link]/web/2014

[Link] 8/1/25, 22 02
Page 213 of 270
:
[Link]/web/2014
0825164715/[Link]
g/wikistats/largest_html.ph
p?sort=users_desc&th=80
00&lines=500) . S23Wiki.
3 April 2008. Archived
from the original ([Link]
[Link]/wikistats/largest_htm
[Link]?sort=users_desc&th=
8000&lines=500) on 25
August 2014. Retrieved
7 April 2007.
145. "Alexa Web Search – Top
500" ([Link]

[Link] 8/1/25, 22 02
Page 214 of 270
:
m/topsites) . Alexa Internet.
Archived ([Link]
[Link]/web/20150302173
920/[Link]
topsites) from the original
on 2 March 2015.
Retrieved 2 March 2015.
146. "The Arab Uprising's
Cascading Effects" (https://
[Link]/web/2011
0227051329/[Link]
[Link]/politic
s/the-cascading-effects-of

[Link] 8/1/25, 22 02
Page 215 of 270
:
-the-arab-spring-28575/) .
[Link]. 23
February 2011. Archived
from the original ([Link]
[Link]/politi
cs/the-cascading-effects-o
f-the-arab-spring-28575/)
on 27 February 2011.
Retrieved 27 February
2011.
147. "The Role of the Internet in
Democratic Transition:
Case Study of the Arab
Spring" ([Link]

[Link] 8/1/25, 22 02
Page 216 of 270
:
Spring" ([Link]
[Link]/web/201207051552
48/[Link]
2011/chokoshvili_davit.pdf)
(PDF). 5 July 2012.
Archived from the original (
[Link]
1/chokoshvili_davit.pdf)
(PDF) on 5 July 2012.,
Davit Chokoshvili, Master's
Thesis, June 2011
148. Kirkpatrick, David D. (9
February 2011). "Wired
and Shrewd, Young

[Link] 8/1/25, 22 02
Page 217 of 270
:
and Shrewd, Young
Egyptians Guide Revolt" (ht
tps://[Link]/20
11/02/10/world/middleeas
t/[Link]) . The New
York Times. Archived (http
s://[Link]/web/2
0170129225903/[Link]
[Link]/2011/02/1
0/world/middleeast/10yout
[Link]) from the original
on 29 January 2017.
149. Ronald Deibert; John
Palfrey; Rafal Rohozinski;

[Link] 8/1/25, 22 02
Page 218 of 270
:
Palfrey; Rafal Rohozinski;
Jonathan Zittrain (2008).
Access Denied: The
Practice and Policy of
Global Internet Filtering (htt
ps://[Link]/boo
ks?id=l6ry0NeJ1N8C) .
MIT Press. ISBN 978-0-
262-29072-2.
150. Larry Diamond; Marc F.
Plattner (2012). Liberation
Technology: Social Media
and the Struggle for
Democracy ([Link]

[Link] 8/1/25, 22 02
Page 219 of 270
:
Democracy ([Link]
[Link]/books?id=xhw
FEF9HD2sC) . JHU Press.
ISBN 978-1-4214-0568-1.
151. Manoharan, Aroon P.;
Melitski, James; Holzer,
Marc (20 January 2022).
"Digital Governance: An
Assessment of
Performance and Best
Practices" ([Link]
[Link]/pmc/article
s/PMC8769785) . Public
Organization Review. 23

[Link] 8/1/25, 22 02
Page 220 of 270
:
Organization Review. 23
(1): 265–283.
doi:10.1007/s11115-021-
00584-8 ([Link]
0.1007%2Fs11115-021-00
584-8) . ISSN 1573-7098
([Link]
g/issn/1573-7098) .
PMC 8769785 ([Link]
[Link]/pmc/arti
cles/PMC8769785) .
152. Caves, R. W. (2004).
Encyclopedia of the City.
Routledge. p. 180.

[Link] 8/1/25, 22 02
Page 221 of 270
:
153. Roodman, David (2
October 2009). "Kiva Is
Not Quite What It Seems" (
[Link]
b/20100210045011/http://
[Link]/open_boo
k/2009/10/kiva-is-not-quit
[Link]) .
Center for Global
Development. Archived
from the original ([Link]
[Link]/open_book/2
009/10/kiva-is-not-quite-w
[Link]) on 10

[Link] 8/1/25, 22 02
Page 222 of 270
:
[Link]) on 10
February 2010. Retrieved
16 January 2010.
154. Strom, Stephanie (9
November 2009).
"Confusion on Where
Money Lent via Kiva Goes"
([Link]
2009/11/09/business/glob
al/[Link]) . The New
York Times. p. 6. Archived (
[Link]
b/20170129225155/http://
[Link]/2009/1

[Link] 8/1/25, 22 02
Page 223 of 270
:
[Link]/2009/1
1/09/business/global/09kiv
[Link]) from the original
on 29 January 2017.
155. Gralla, Preston (2007).
How the Internet Works (htt
ps://[Link]/details/ho
winternetworks00gral) .
Indianapolis: Que Pub.
ISBN 978-0-7897-2132-7.
156. Andriole, Steve (14 January
2020). "Cyberwarfare Will
Explode In 2020 (Because
It's Cheap, Easy And

[Link] 8/1/25, 22 02
Page 224 of 270
:
It's Cheap, Easy And
Effective)" ([Link]
[Link]/sites/steveandriol
e/2020/01/14/cyberwarfar
e-will-explode-in-2020-be
cause-its-cheap-easy--effe
ctive/) . Forbes. Retrieved
18 May 2021.
157. Kim, Jin-Young; Bu, Seok-
Jun; Cho, Sung-Bae (1
September 2018). "Zero-
day malware detection
using transferred
generative adversarial

[Link] 8/1/25, 22 02
Page 225 of 270
:
generative adversarial
networks based on deep
autoencoders" ([Link]
[Link]/web/202204
30072512/[Link]
[Link]/publications/Pape
rs/IJ/2018_IS_JYK.pdf)
(PDF). Information
Sciences. 460–461: 83–
102.
doi:10.1016/[Link].2018.04.0
92 ([Link]
6%[Link].2018.04.092) .
ISSN 0020-0255 ([Link]

[Link] 8/1/25, 22 02
Page 226 of 270
:
ISSN 0020-0255 ([Link]
[Link]/issn/00
20-0255) .
S2CID 51882216 ([Link]
[Link]/Cor
pusID:51882216) .
Archived from the original (
[Link]
blications/Papers/IJ/2018_I
S_JYK.pdf) (PDF) on 30
April 2022. Retrieved
2 December 2021 – via
Soft Computing Laboratory,
Dept. of Computer
Science, Yonsei University.

[Link] 8/1/25, 22 02
Page 227 of 270
:
Science, Yonsei University.
158. Razak, Mohd Faizal Ab;
Anuar, Nor Badrul; Salleh,
Rosli; Firdaus, Ahmad (1
November 2016). "The rise
of "malware": Bibliometric
analysis of malware study"
([Link]
com/retrieve/pii/S1084804
516301904) . Journal of
Network and Computer
Applications. 75: 58–76.
doi:10.1016/[Link].2016.08.
022 ([Link]

[Link] 8/1/25, 22 02
Page 228 of 270
:
022 ([Link]
6%[Link].2016.08.022) .
Retrieved 30 April 2022.
159. Xiao, Fei; Sun, Yi; Du,
Donggao; Li, Xuelei; Luo,
Min (21 March 2020). "A
Novel Malware
Classification Method
Based on Crucial Behavior"
([Link]
F2020%2F6804290) .
Mathematical Problems in
Engineering. 2020: 1–12.
doi:10.1155/2020/680429

[Link] 8/1/25, 22 02
Page 229 of 270
:
doi:10.1155/2020/680429
0 ([Link]
2F2020%2F6804290) .
ISSN 1024-123X ([Link]
[Link]/issn/10
24-123X) .
160. Morgan, Steve (13
November 2020).
"Cybercrime To Cost The
World $10.5 Trillion
Annually By 2025" (https://
[Link]
m/hackerpocalypse-cyberc
rime-report-2016/) .

[Link] 8/1/25, 22 02
Page 230 of 270
:
rime-report-2016/) .
Cybercrime magazine
website. Cybersecurity
ventures. Archived (https://
[Link]/web/2022
0305072352/[Link]
[Link]/hack
erpocalypse-cybercrime-re
port-2016/) from the
original on 5 March 2022.
Retrieved 5 March 2022.
161. Eder-Neuhauser, Peter;
Zseby, Tanja; Fabini,
Joachim (1 June 2019).

[Link] 8/1/25, 22 02
Page 231 of 270
:
Joachim (1 June 2019).
"Malware propagation in
smart grid networks:
metrics, simulation and
comparison of three
malware types" ([Link]
org/10.1007%2Fs11416-01
8-0325-y) . Journal of
Computer Virology and
Hacking Techniques. 15
(2): 109–125.
doi:10.1007/s11416-018-
0325-y ([Link]
1007%2Fs11416-018-032
5-y) . ISSN 2263-8733 (ht

[Link] 8/1/25, 22 02
Page 232 of 270
:
5-y) . ISSN 2263-8733 (ht
tps://[Link]/is
sn/2263-8733) .
S2CID 255164530 (http
s://[Link]
g/CorpusID:255164530) .
162. Razak, Mohd Faizal Ab;
Anuar, Nor Badrul; Salleh,
Rosli; Firdaus, Ahmad (1
November 2016). "The rise
of "malware": Bibliometric
analysis of malware study"
([Link]
com/science/article/pii/S10

[Link] 8/1/25, 22 02
Page 233 of 270
:
com/science/article/pii/S10
84804516301904) .
Journal of Network and
Computer Applications. 75:
58–76.
doi:10.1016/[Link].2016.08.
022 ([Link]
6%[Link].2016.08.022) .
ISSN 1084-8045 ([Link]
[Link]/issn/10
84-8045) .
163. Spring, Tom (12 June
2023). "Obfuscation tool
'BatCloak' can evade 80%

[Link] 8/1/25, 22 02
Page 234 of 270
:
'BatCloak' can evade 80%
of AV engines" ([Link]
[Link]/news/o
bfuscation-batcloak-80-pe
rcent-av-engines) . SC
Media. Retrieved
21 December 2023.
164. Nam, Nguyen (10 January
2023). "Kiểm tra ip" (http://
[Link]) . Retrieved
21 December 2023.
165. Amos, Zac. "How
Ransomware Can Evade
Antivirus Software" (http

[Link] 8/1/25, 22 02
Page 235 of 270
:
Antivirus Software" (http
s://[Link]/blog/how-ra
nsomware-can-evade-antiv
irus-software) . [Link].
Retrieved 21 December
2023.
166. Diffie, Whitfield; Susan
Landau (August 2008).
"Internet Eavesdropping: A
Brave New World of
Wiretapping" ([Link]
[Link]/[Link]?id=in
ternet-eavesdropping) .
Scientific American.

[Link] 8/1/25, 22 02
Page 236 of 270
:
Scientific American.
Archived ([Link]
[Link]/web/200811132121
37/[Link]
[Link]?id=internet-eave
sdropping) from the
original on 13 November
2008. Retrieved 13 March
2009.
167. "CALEA Archive" ([Link]
[Link]/web/20081
025074518/[Link]
rg/Privacy/Surveillance/CA
LEA/?f=[Link]) .

[Link] 8/1/25, 22 02
Page 237 of 270
:
LEA/?f=[Link]) .
Electronic Frontier
Foundation (website).
Archived from the original (
[Link]
Surveillance/CALEA/?f=arc
[Link]) on 25 October
2008. Retrieved 14 March
2009.
168. "CALEA: The Perils of
Wiretapping the Internet" (
[Link]
calea) . Electronic Frontier
Foundation (website).

[Link] 8/1/25, 22 02
Page 238 of 270
:
Archived ([Link]
[Link]/web/20090316041
313/[Link]
es/calea) from the original
on 16 March 2009.
Retrieved 14 March 2009.
169. "CALEA: Frequently Asked
Questions" ([Link]
[Link]/pages/calea-faq) .
Electronic Frontier
Foundation (website). 20
September 2007. Archived
([Link]

[Link] 8/1/25, 22 02
Page 239 of 270
:
b/20090501072553/htt
p://[Link]/pages/cale
a-faq) from the original on
1 May 2009. Retrieved
14 March 2009.
170. "American Council on
Education vs. FCC,
Decision, United States
Court of Appeals for the
District of Columbia
Circuit" ([Link]
[Link]/web/201209070325
00/[Link]
pdfs/[Link]) (PDF). 9

[Link] 8/1/25, 22 02
Page 240 of 270
:
pdfs/[Link]) (PDF). 9
June 2006. Archived from
the original ([Link]
[Link]/pdfs/[Link])
(PDF) on 7 September
2012. Retrieved
8 September 2013.
171. Hill, Michael (11 October
2004). "Government funds
chat room surveillance
research" ([Link]
[Link]/tech/news/surv
eillance/2004-10-11-chatr
oom-surv_x.htm) . USA

[Link] 8/1/25, 22 02
Page 241 of 270
:
oom-surv_x.htm) . USA
Today. Associated Press.
Archived ([Link]
[Link]/web/20100511220
550/[Link]
om/tech/news/surveillance/
2004-10-11-chatroom-sur
v_x.htm) from the original
on 11 May 2010. Retrieved
19 March 2009.
172. McCullagh, Declan (30
January 2007). "FBI turns
to broad new wiretap
method" ([Link]

[Link] 8/1/25, 22 02
Page 242 of 270
:
method" ([Link]
[Link]/web/20100407040
227/[Link]
m/2100-9595_22-151059.
html) . ZDNet News.
Archived from the original (
[Link]
0-9595_22-[Link])
on 7 April 2010. Retrieved
13 March 2009.
173. "First round in Internet war
goes to Iranian intelligence"
([Link]
b/20131221173608/http://

[Link] 8/1/25, 22 02
Page 243 of 270
:
b/20131221173608/http://
[Link]/article/35
09/) . Debkafile. 28 June
2009. Archived from the
original ([Link]
com/article/3509/) on 21
December 2013.
174. "Freedom on the Net
2018" ([Link]
org/web/20181101192951/
[Link]
ites/default/files/FOTN_20
18_Final%20Booklet_11_1_
[Link]) (PDF). Freedom

[Link] 8/1/25, 22 02
Page 244 of 270
:
House. November 2018.
Archived from the original (
[Link]
ites/default/files/FOTN_20
18_Final%20Booklet_11_1_
[Link]) (PDF) on 1
November 2018. Retrieved
1 November 2018.
175. OpenNet Initiative
"Summarized global
Internet filtering data
spreadsheet" ([Link]
[Link]/research/data)

[Link] 8/1/25, 22 02
Page 245 of 270
:
Archived ([Link]
[Link]/web/201201102111
46/[Link]
arch/data) 10 January
2012 at the Wayback
Machine, 8 November
2011 and "Country
Profiles" ([Link]
t/research/profiles)
Archived ([Link]
[Link]/web/20110826003
215/[Link]
earch/profiles) 26 August
2011 at the Wayback

[Link] 8/1/25, 22 02
Page 246 of 270
:
2011 at the Wayback
Machine, the OpenNet
Initiative is a collaborative
partnership of the Citizen
Lab at the Munk School of
Global Affairs, University of
Toronto; the Berkman
Center for Internet &
Society at Harvard
University; and the SecDev
Group, Ottawa
176. "Enemies of the Internet
2014: Entities at the heart
of censorship and

[Link] 8/1/25, 22 02
Page 247 of 270
:
of censorship and
surveillance" ([Link]
[Link]/web/201403121
20731/[Link]
g/2014-en/#slide2) .
Reporters Without Borders.
Paris. 11 March 2014.
Archived from the original (
[Link]
-en/#slide2) on 12 March
2014.
177. "Internet Enemies" (https://
[Link]/web/2017
0703221044/[Link]

[Link] 8/1/25, 22 02
Page 248 of 270
:
0703221044/[Link]
[Link]/wp-content/uploa
ds/EN_RAPPORT_INTERN
ET_BD.pdf) (PDF).
Reporters Without Borders.
Paris. 12 March 2012.
Archived from the original (
[Link]
ontent/uploads/EN_RAPPO
RT_INTERNET_BD.pdf)
(PDF) on 3 July 2017.
178. Deibert, Ronald J.; Palfrey,
John G.; Rohozinski, Rafal;
Zittrain, Jonathan (2010).

[Link] 8/1/25, 22 02
Page 249 of 270
:
Access Controlled: The
Shaping of Power, Rights,
and Rule in Cyberspace (ht
tps://[Link]/web/
20110604102753/[Link]
[Link]/catalog/ite
m/[Link]?ttype=2&tid
=12187) . MIT Press.
ISBN 978-0-262-51435-
4. Archived from the
original ([Link]
[Link]/catalog/item/default.
asp?ttype=2&tid=12187)
on 4 June 2011.

[Link] 8/1/25, 22 02
Page 250 of 270
:
on 4 June 2011.
179. "Finland censors anti-
censorship site" ([Link]
[Link]/200
8/02/18/finnish_policy_cen
sor_activist/) . The
Register. 18 February
2008. Archived ([Link]
[Link]/web/200802
20075300/[Link]
[Link]/2008/02/1
8/finnish_policy_censor_ac
tivist/) from the original on
20 February 2008.

[Link] 8/1/25, 22 02
Page 251 of 270
:
20 February 2008.
Retrieved 19 February
2008.
180. Albert, Réka; Jeong,
Hawoong; Barabási, Albert-
László (9 September
1999). "Diameter of the
World-Wide Web". Nature.
401 (6749): 130–131.
arXiv:cond-mat/9907038 (
[Link]
mat/9907038) .
Bibcode:1999Natur.401..13
0A ([Link]

[Link] 8/1/25, 22 02
Page 252 of 270
:
0A ([Link]
[Link]/abs/1999Natur.40
1..130A) .
doi:10.1038/43601 (http
s://[Link]/10.1038%2F43
601) . S2CID 4419938 (htt
ps://[Link]
g/CorpusID:4419938) .
181. "Georgian woman cuts off
web access to whole of
Armenia" ([Link]
[Link]/world/2011/ap
r/06/georgian-woman-cuts
-web-access) . The

[Link] 8/1/25, 22 02
Page 253 of 270
:
-web-access) . The
Guardian. 6 April 2011.
Archived ([Link]
[Link]/web/20130825075
603/[Link]
[Link]/world/2011/apr/06/
georgian-woman-cuts-web
-access) from the original
on 25 August 2013.
Retrieved 11 April 2012.
182. Cowie, James. "Egypt
Leaves the Internet" (http
s://[Link]/web/2
0110128080518/[Link]

[Link] 8/1/25, 22 02
Page 254 of 270
:
[Link]/blog/2011/
01/egypt-leaves-the-intern
[Link]) . Renesys.
Archived from the original (
[Link]
og/2011/01/egypt-leaves-t
[Link]) on 28
January 2011. Retrieved
28 January 2011.
183. "Egypt severs internet
connection amid growing
unrest" ([Link]
[Link]/news/technology-123

[Link] 8/1/25, 22 02
Page 255 of 270
:
06041) . BBC News. 28
January 2011. Archived (htt
ps://[Link]/web/2
0120123164134/[Link]
[Link]/news/technolo
gy-12306041) from the
original on 23 January
2012.
184. Coroama, Vlad C.; Hilty,
Lorenz M. (February 2014).
"Assessing Internet energy
intensity: A review of
methods and results" (htt
p://[Link]/dat

[Link] 8/1/25, 22 02
Page 256 of 270
:
p://[Link]/dat
a/[Link]/ref-218/2014
_Coroama_Hilty_Assessing
_Internet_Energy_Intensity_
[Link]) (PDF).
Environmental Impact
Assessment Review. 45:
63–68.
Bibcode:2014EIARv..45...6
3C ([Link]
[Link]/abs/2014EIARv..4
5...63C) .
doi:10.1016/[Link].2013.12.0
04 ([Link]

[Link] 8/1/25, 22 02
Page 257 of 270
:
04 ([Link]
6%[Link].2013.12.004) .
Archived ([Link]
[Link]/web/20200923042
203/[Link]
org/data/[Link]/ref-21
8/2014_Coroama_Hilty_As
sessing_Internet_Energy_In
tensity_AAM.pdf) (PDF)
from the original on 23
September 2020.
Retrieved 9 March 2020.
185. Giles, Jim (26 October
2011). "Internet

[Link] 8/1/25, 22 02
Page 258 of 270
:
2011). "Internet
responsible for 2 per cent
of global energy usage" (htt
ps://[Link]/web/2
0141001113334/[Link]
[Link]/blogs/o
nepercent/2011/10/307-g
w-the-maximum-energy-th
[Link]) . New Scientist.
Archived from the original (
[Link]
m/blogs/onepercent/2011/
10/307-gw-the-maximum-
[Link]) on 1

[Link] 8/1/25, 22 02
Page 259 of 270
:
October 2014.,
186. Raghavan, Barath; Ma,
Justin (14 November
2011). "The energy and
emergy of the internet" (htt
ps://[Link]/web/2
0140810075940/[Link]
[Link]/hot
nets/2011/papers/hotnetsX
-[Link]) (PDF).
Proceedings of the 10th
ACM Workshop on Hot
Topics in Networks.
Cambridge, MA.: ACM

[Link] 8/1/25, 22 02
Page 260 of 270
:
Cambridge, MA.: ACM
SIGCOMM. pp. 1–6.
doi:10.1145/2070562.207
0571 ([Link]
45%2F2070562.207057
1) . ISBN 978-1-4503-
1059-8. S2CID 6125953 (
[Link]
[Link]/CorpusID:6125953) .
Archived from the original (
[Link]
[Link]/hotnets/2011/paper
s/[Link])
(PDF) on 10 August 2014.

[Link] 8/1/25, 22 02
Page 261 of 270
:
(PDF) on 10 August 2014.
187. Cwienk, Jeannette (11 July
2019). "Is Netflix bad for
the environment? How
streaming video
contributes to climate
change | DW | 11.07.2019"
([Link]
-netflix-bad-for-the-enviro
nment-how-streaming-vide
o-contributes-to-climate-c
hange/a-49556716) .
Deutsche Welle. Archived (
[Link]

[Link] 8/1/25, 22 02
Page 262 of 270
:
[Link]
b/20190712203905/http
s://[Link]/en/is-netfl
ix-bad-for-the-environment
-how-streaming-video-con
tributes-to-climate-chang
e/a-49556716) from the
original on 12 July 2019.
Retrieved 19 July 2019.
188. " "Climate crisis: The
Unsustainable Use of
Online Video": Our new
report" ([Link]
[Link]/en/article/unsustain

[Link] 8/1/25, 22 02
Page 263 of 270
:
able-use-online-video/) .
The Shift Project. 10 July
2019. Archived ([Link]
[Link]/web/201907
21144259/[Link]
[Link]/en/article/unsust
ainable-use-online-video/)
from the original on 21 July
2019. Retrieved 19 July
2019.

Sources

[Link] 8/1/25, 22 02
Page 264 of 270
:
This article incorporates text
from a free content work. Text
taken from World Trends in
Freedom of Expression and
Media Development Global
Report 2017/2018 ([Link]
[Link]/images/0026/
002610/[Link]) , 202,
UNESCO.
Abbate, Janet (1999).
Inventing the Internet (https://
[Link]/details/inventingint
erne00abba) . Cambridge,

[Link] 8/1/25, 22 02
Page 265 of 270
:
Massachusetts: MIT Press.
ISBN 978-0-262-01172-3.

Further reading

First Monday ([Link]


[Link]/) , a peer-
reviewed journal on the
Internet by the University
Library of the University of
Illinois at Chicago, ISSN 1396-
0466 ([Link]
g/search?fq=x0:jrnl&q=n2:139

[Link] 8/1/25, 22 02
Page 266 of 270
:
6-0466)
The Internet Explained (http
s://[Link]/articles/interne
t-explained/) , Vincent Zegna
& Mike Pepper, Sonet Digital,
November 2005, pp. 1–7.
Castells, Manuel (2010). The
Rise of the Network Society.
Wiley. ISBN 978-1-4051-
9686-4.
Yeo, ShinJoung (2023),
Behind the Search Box:

[Link] 8/1/25, 22 02
Page 267 of 270
:
Google and the Global
Internet Industry, U of Illinois
Press, ISBN 978-0-252-
04499-1,
JSTOR 10.5406/jj.4116455 (h
ttps://[Link]/stable/10.
5406/jj.4116455)

External links

The Internet Society ([Link]


[Link]/)
Living Internet ([Link]

[Link] 8/1/25, 22 02
Page 268 of 270
:
[Link]/) , Internet history
and related information,
including information from
many creators of the Internet

Retrieved from
"[Link]
title=Internet&oldid=1266230519"

This page was last edited on 30


December 2024, at 18:23 (UTC). •
Content is available under CC BY-SA

[Link] 8/1/25, 22 02
Page 269 of 270
:
4.0 unless otherwise noted.

[Link] 8/1/25, 22 02
Page 270 of 270
:

You might also like