Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-g8jcs Total loading time: 0 Render date: 2024-11-22T10:16:51.270Z Has data issue: false hasContentIssue false

8 - The Internet and the Advantages of Autocratic Design, 1970s–1990s

Published online by Cambridge University Press:  05 June 2014

Andrew L. Russell
Affiliation:
Stevens Institute of Technology, New Jersey
Get access

Summary

The standards elephant of yesterday - OSI.

The standards elephant of today - it’s right here.

As the Internet and its community grows, how do we manage the process of change and growth?

  • Open process – let all voices be heard.

  • Closed process – make progress.

  • Quick process – keep up with reality.

  • Slow process – leave time to think.

  • Market driven process – the future is commercial.

  • Scaling driven process – the future is the Internet.

We reject: kings, presidents and voting.

We believe in: rough consensus and running code.

– David D. Clark, “A Cloudy Crystal Ball,” 1992

By all accounts, David Clark’s plenary address at the July 1992 meeting of the Internet Engineering Task Force (IETF) was a transformative moment in the history of networking. There was a palpable tension in the sessions leading up to Clark’s talk, which occurred at the end of the final session on the fourth day of a contentious i ve-day meeting. Clark, a senior research scientist in MIT’s Laboratory for Computer Science, had been a leading member of the Internet technical community since 1976. Clark’s title, “A Cloudy Crystal Ball,” suggested uncertainty, but his “alternate title” – “Apocalypse Now” – better encapsulated the tone of his remarks. He used the occasion to cajole Internet engineers into paying more attention to technical problems that threatened the Internet’s continued growth and success. Like many people in the audience, Clark worried about the strains that the commercialization of the early 1990s was placing on the technical capabilities of the Internet. However, he was more deeply concerned by fundamental problems with the security of the Internet, as one of his slides made plain: “Security is a CRITICAL problem. Lack of security means the END OF LIFE AS WE KNOW IT.”

Type
Chapter
Information
Open Standards and the Digital Age
History, Ideology, and Networks
, pp. 229 - 261
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abbate, Janet, “Privatizing the Internet: Competing Visions and Chaotic Events, 1987–1995,” IEEE Annals of the History of Computing 32 (2010): 10–22CrossRefGoogle Scholar
Simon, Craig Lyle, Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance (PhD dissertation, University of Miami, 2006)Google Scholar
Lessig, Lawrence, Code and Other Laws of Cyberspace (New York: Basic Books, 1999), 4Google Scholar
Flichy, Patrice, The Internet Imaginaire (Cambridge, MA: The MIT Press, 2007)Google Scholar
Bradner, Scott, “The Internet Engineering Task Force,” in DiBona, Chris, Ockman, Sam, and Stone, Mark, eds., Open Sources: Voices from the Open Source Revolution (Sebastopol, CA: O’Reilly Media, Inc., 1999), 50Google Scholar
Rutkowski, Anthony, “Today’s Cooperative Competitive Standards Environment and the Internet Standards-Making Model,” in Kahin, Brian and Abbate, Janet, eds., Standards Policy for Information Infrastructure (Cambridge, MA: The MIT Press, 1995)Google Scholar
Froomkin, A. Michael, “[email protected]: Toward a Critical Theory of Cyberspace,” Harvard Law Review 116 (2003): 749–873CrossRefGoogle Scholar
Brooks, Frederick P., Jr., The Mythical Man-Month: Essays on Software Engineering Anniversary Edition (Boston: Addison-Wesley, 1995), 40–50Google Scholar
Goldsmith, Jack and Wu, Tim, Who Controls the Internet? Illusions of a Borderless World (New York: Oxford University Press, 2006)Google Scholar
Dibbell, Julian, “A Rape in Cyberspace: How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society,” The Village Voice (December 23, 1993)Google Scholar
Russell, Andrew L., “Constructing Legitimacy: The W3C’s Patent Policy,” in DeNardis, Laura, ed., Opening Standards: The Global Politics of Interoperability (Cambridge, MA: The MIT Press, 2011)Google Scholar
Wolf, Gary, “Why Craigslist Is Such a Mess,” Wired 17 (2009)Google Scholar
Norberg, Arthur L. and O’Neill, Judy E., Transforming Computer Technology: Information Processing for the Pentagon, 1962–1986 (Baltimore: The Johns Hopkins University Press, 1996)Google Scholar
Abbate, Janet, Inventing the Internet (Cambridge, MA: The MIT Press, 1999), 129–130Google Scholar
Cerf, Vinton G., “Protocols for Interconnected Packet Networks,” Computer Communication Review 18 (October 1980): 10–11Google Scholar
Remini, Robert V., Andrew Jackson: The Course of American Freedom, 1822–1832 (Baltimore: The Johns Hopkins University Press, 1998), 315–330Google Scholar
Kahn, Robert E., “The Role of the Government in the Evolution of the Internet,” Communications of the ACM 37 (August 1994): 16CrossRefGoogle Scholar
Roberts, L., ”Expanding AI Research and Founding ARPANET,” in Bartee, Thomas C., ed., Expert Systems and Artificial Intelligence: Applications and Management (Indianapolis, IN: Howard W. Sams & Company, 1988), 229Google Scholar
Segaller, Stephen, Nerds 2.0.1: A Brief History of the Internet (New York: TV Books, 1998), 59Google Scholar
Slaton, Amy and Abbate, Janet, “The Hidden Lives of Standards: Technical Prescriptions and the Transformation of Work in America,” in Allen, Michael Thad and Hecht, Gabrielle, eds., Technologies of Power: Essays in Honor of Thomas Parke Hughes and Agatha Chipley Hughes (Cambridge, MA: The MIT Press, 2001), 95–144Google Scholar
Lukasik, Stephen J., “Why the Arpanet Was Built,” IEEE Annals of the History of Computing 33 (2011): 4–21CrossRefGoogle Scholar
Zimmermann, Hubert, “OSI Reference Model – The ISO Model of Architecture for Open Systems Interconnection,” IEEE Transactions on Communications 28 (1980): 425–432CrossRefGoogle Scholar
National Research Council, Transport Protocols for Department of Defense Data Networks: Report to the Department of Defense and the National Bureau of Standards Committee on Computer-Computer Communication Protocols (Washington, DC: National Academy Press, 1985)Google Scholar
Witt, Michael, “Moving from DoD to OSI Protocols: A First Step,” Computer Communication Review 16 (April/May, 1986): 2–7CrossRefGoogle Scholar
Hughes, Thomas P., Rescuing Prometheus (New York: Pantheon Books, 1998)Google Scholar
Press, Larry, “Seeding Networks: The Federal Role,” Communications of the ACM 39 (October 1996): 11–18CrossRefGoogle Scholar
Shapiro, Carl and Varian, Hal, “The Art of Standards Wars,” California Management Review 41 (1999): 8–32CrossRefGoogle Scholar
Stango, Victor, “The Economics of Standards Wars,” Review of Network Economics 3 (2004): 1–19CrossRefGoogle Scholar
Augereau, Angelique, Greenstein, Shane, and Rysman, Marc, “Coordination versus Differentiation in a Standards War: 56K Modems,” RAND Journal of Economics 37 (2006): 887–909CrossRefGoogle Scholar
Anderson, Benedict, Imagined Communities: Reflections on the Origins and Spread of Nationalism (New York: Verso, 1983)Google Scholar
Levinas, Emmanuel, Totality and Infinity: An Essay on Exteriority (Pittsburgh: Duquesne University Press, 1969)Google Scholar
Cohen, Daniel and Postel, Jonathan, “The ISO Reference Model and Other Protocol Architectures,” in Mason, R. E. A., ed., Information Processing 83: Proceedings of the IFIP 9th World Computer Congress (New York: North-Holland, 1983), 34Google Scholar
Padlipsky, M. A., The Elements of Networking Style, And Other Animadversions on the Art of Intercomputer Networking, 2nd ed. (Lincoln, NE: iUniverse, 2000; 1st ed. Prentice-Hall, 1985)Google Scholar
Jardins, Richard des, “OSI is (Still) a Good Idea,” ConneXions 6 (1992): 33Google Scholar
Huizer, Erik, “The IETF Integrates OSI Related Work,” ConneXions 7 (1993): 26–28Google Scholar
Schmidt, Susanne K. and Werle, Raymund, Coordinating Technology: Studies in the International Standardization of Telecommunications (Cambridge, MA: The MIT Press, 1998), 229–262Google Scholar
Rose, Marshall, The Open Book: A Practical Perspective on OSI (Englewood Cliffs, NJ: Prentice-Hall, 1990), 591–592Google Scholar
Malamud, Carl, Exploring the Internet: A Technical Travelogue (Englewood Cliffs, NJ: Prentice- Hall PTR, 1992), 191Google Scholar
Rose, Marshall T., “Comments on ‘Opinion: OSI Is (Still) a Good Idea,’ConneXions 6 (1992): 20–21Google Scholar
Mueller, Milton L., Ruling the Root: Internet Governance and the Taming of Cyberspace (Cambridge, MA: The MIT Press, 2002)Google Scholar
Messmer, Ellen, “Internet Architect Gives Long-Term View,” Network World 9 (May 18, 1992): 37Google Scholar
DeNardis, Laura, Protocol Politics: The Globalization of Internet Governance (Cambridge, MA: The MIT Press, 2009), 25–70CrossRefGoogle Scholar
Huitema, Christian, IPv6: The New Internet Protocol (Upper Saddle River, NJ: Prentice-Hall PTR, 1998), 2Google Scholar
Cargill, Carl, Open Systems Standardization: A Business Approach (Upper Saddle River, NJ: Prentice-Hall PTR, 1997), 257Google Scholar
Bradner, Scott, “The Internet Engineering Task Force,” OnTheInternet 7 (2001): 24Google Scholar
Kelty, Christopher M., Two Bits: The Cultural Significance of Free Software (Durham, NC: Duke University Press, 2008)CrossRefGoogle Scholar
Anonymous, “The 2nd Boston Tea Party,” Matrix News 10 (2000)Google Scholar
Crocker, Dave, “Making Standards the IETF Way,” StandardView 1 (1993): 48–54CrossRefGoogle Scholar
Salus, Peter H., Casting the Net: From ARPANET to INTERNET and Beyond (New York: Addison-Wesley Publishing Company, 1995), 123Google Scholar
Greenstein, Shane, “The Emergence of the Internet: Collective Invention and Wild Ducks,” Industrial and Corporate Change 19 (2010): 1521–1562CrossRefGoogle Scholar
Quarterman, John S., “The Demise of GOSIP,” Matrix News 4 (1994): 6Google Scholar
Wood, David C., “Federal Networking Standards: Policy Issues,” StandardView 2 (1994): 218–223CrossRefGoogle Scholar
Jakobs, Kai, “Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned,” Journal of Information Technology 28 (2013): 63–73CrossRefGoogle Scholar
Day, John, Patterns in Network Architecture: A Return to Fundamentals (Upper Saddle River, NJ: Prentice-Hall PTR, 2007)Google Scholar
Reagle, Joseph Michael, Jr., “The Benevolent Dictator,” in Good Faith Collaboration: The Culture of Wikipedia (Cambridge, MA: The MIT Press, 2011)Google Scholar
Borsook, Paulina, “How Anarchy Works,” Wired 3 (October 1995)Google Scholar
December, John, “Have We a Clue?CMC Magazine 2 (1995)Google Scholar
Branscomb, Lewis M. and Kahin, Brian, “Standards Processes and Objectives for the National Information Infrastructure,” in Kahin, Brian and Abbate, Janet, eds., Standards Policy for Information Infrastructure (Cambridge, MA: The MIT Press, 1995), 7–10Google Scholar
Kahin, Brian and Wilson, Ernest, National Information Infrastructure Initiatives: Vision and Policy Design (Cambridge, MA: The MIT Press, 1997)Google Scholar
Hanseth, Ole, Monteiro, Eric, and Hatling, Morten, “Developing Information Infrastructure: The Tensions between Standardization and Flexibility,” Science, Technology, & Human Values 21 (1996): 407–426CrossRefGoogle Scholar
Greenstein, Shane, “Markets, Standards, and the Information Infrastructure,” IEEE Micro (December 1993): 36–51CrossRefGoogle Scholar
Clark, David D., “Network Neutrality: Words of Power and 800-Pound Gorillas,” International Journal of Communication 1 (2007): 701–708Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×