Return to Video

Reflection on Early Communication

  • 0:00 - 0:04
    So, welcome back. Now the purpose, of
    course, of all this stuff that you had in
  • 0:04 - 0:09
    your office, and all that banging, and all
    the sqweeee squealing noise where we're
  • 0:09 - 0:15
    sending the data across the across the
    phone using sound. All the purpose was the
  • 0:15 - 0:21
    fact that computation was rare and
    extremely valuable. And for scientists who
  • 0:21 - 0:27
    were trying to solve research problems,
    access to computers was essential. And you
  • 0:27 - 0:33
    couldn't all sit, sort of in a little ring
    around the computer. It's so we would have
  • 0:33 - 0:38
    phones in our offices and we would, you
    know, work in our office, just like I'm
  • 0:38 - 0:45
    working in my office right now. But there
    wasn't enough computation [inaudible], any
  • 0:45 - 0:51
    work in my office so I had to connect to
    something outside. And so this was the way
  • 0:51 - 0:57
    of science. And, it, it, it was the fact
    that comp-, computing was rare, and access
  • 0:57 - 1:03
    to computing was a critical enabler of
    scientific research. Now, I'd mentioned
  • 1:03 - 1:09
    earlier, data transfer with leased lines.
    And so, while it. You tended to interact
  • 1:09 - 1:14
    with the computer that was rather local,
    geographically to you because you could
  • 1:14 - 1:19
    have this permanent dial up connection all
    day long without paying a permanent
  • 1:19 - 1:23
    charge. If you were a bank, or you had
    some really critical need you would lease
  • 1:23 - 1:29
    some line from the phone company 24 hours
    a day, seven days a week so you could send
  • 1:29 - 1:33
    data across that anytime that you wanted.
    No dialing, it's always connected and,
  • 1:33 - 1:39
    after while, I mean you can send data, we
    academics wanted to communicate with each
  • 1:39 - 1:44
    other. It would be nice to be able to use
    each other's computers, but we tended to
  • 1:44 - 1:48
    have too much, but sometimes we don't want
    to send a file, or some email, or
  • 1:48 - 1:53
    something like that. And so this led to
    the invention and the creation of store
  • 1:53 - 1:58
    and forward networking. And how this would
    work is we would sort of, you would sort
  • 1:58 - 2:04
    of have some thing and you would use a
    modem to do all your dialing, like that. I
  • 2:04 - 2:09
    mean maybe they had paper and, and didn't.
    That looks a little too advanced, but you
  • 2:09 - 2:13
    would have some geographically local
    computer that was your, sort of the compu
  • 2:13 - 2:17
    ter that did most of your work. You didn't
    have a computer in your office, you just
  • 2:17 - 2:21
    had a connection to the single campus
    computer or on a few campus computers. And
  • 2:21 - 2:26
    then what universities would do is they
    would lease a line. And then we could
  • 2:26 - 2:31
    send, write a mail program that would run
    on this computer and then would send mail
  • 2:31 - 2:36
    and then everyone else would read it. And
    what happened was is we sort of started
  • 2:36 - 2:42
    stringing them together in these snakelike
    structures and so, we could share this.
  • 2:42 - 2:48
    And so let me just show you kind of how
    the store and forward networking works. So
  • 2:48 - 2:52
    somebody sends a mail message in. Now
    let's say, let's say we are this bottom
  • 2:52 - 2:57
    person down here, okay. And so someone
    else has sent a mail message in, they're
  • 2:57 - 3:01
    sitting in there. And now the next person
    sends a mail message in and now ten
  • 3:01 - 3:06
    seconds later, you send a mail message in.
    Those mail messengers are sitting in a
  • 3:06 - 3:11
    cue. They're waiting just like waiting in
    line at the bus stop or waiting in line in
  • 3:11 - 3:15
    a train station. Waiting in line for a cup
    of coffee at Starbucks. They're waiting in
  • 3:15 - 3:19
    line, and what would happen is the
    computer that was our local computer would
  • 3:19 - 3:24
    then start sending that data across the
    line. Okay, and slowly but surely it would
  • 3:24 - 3:30
    take awhile. And everyone else had to sit
    and wait. Your poor message is last in
  • 3:30 - 3:34
    line so you have to wait. So finally this
    message gets across the closest link. And
  • 3:34 - 3:39
    then the, the next message starts being
    sent and you have to wait for that message
  • 3:39 - 3:43
    and wait and wait and wait and wait and
    wait. Wait and wait and wait! Hey wait.
  • 3:43 - 3:49
    Okay. Now its finally your turn. So your
    message finally gets to use the one
  • 3:49 - 3:53
    connected line. So they, they are sought
    of stand in line until your turn
  • 3:53 - 3:58
    [inaudible] runs acrossed. And they all,
    these messages aren't destined for just
  • 3:58 - 4:03
    one computer away, then they got to go
    through the whole thing again, move across
  • 4:03 - 4:08
    the next link until you know eventually
    you move across one link over here and
  • 4:08 - 4:12
    then go another, and then finally talks to
    the people who get their email. So its a
  • 4:12 - 4:17
    sought of dedicat ed line and you had to
    stand in line to get your chance. And the
  • 4:17 - 4:23
    key thing here is each of these lease
    lines has a fixed cost 24 hours a day
  • 4:23 - 4:29
    seven days a week, and it's very dependent
    on the distance, so we saw a weird
  • 4:29 - 4:33
    phenomena. ≫> And that is. ≫>
    If we could add hops, it would slow our
  • 4:33 - 4:38
    message down, but it would reduce our cost
    greatly. And so let's just say we have
  • 4:38 - 4:44
    Michigan State University, which is where
    I got all my degrees from. University of
  • 4:44 - 4:49
    Michigan here in Ann Arbor, which is where
    I work. And let's say, you know, we're
  • 4:49 - 4:54
    connecting to the rest of the world, and
    we're going through Cleveland, where Case
  • 4:54 - 5:00
    Western Reserve is. Case Western Reserve
    was the early innovator in, in networking,
  • 5:00 - 5:04
    and so we have two leased lines with a
    certain distance, right? One from East
  • 5:04 - 5:09
    Lansing to Ann Arbor and one from Ann
    Arbor to Cleveland and so we're sharing
  • 5:09 - 5:14
    the cost of these lines between three
    schools and we can all kind of connect to
  • 5:14 - 5:19
    the rest of the internet, all connect to
    the rest of the internet out here and, and
  • 5:19 - 5:24
    we just, some of us have, are farther
    away, and so we take longer. The folks in
  • 5:24 - 5:29
    Cleveland are closer. Like all the rest of
    the connection to like the East Coast and
  • 5:29 - 5:35
    the West Coast come through, say like here
    Cleveland, but if we can simply convince
  • 5:35 - 5:43
    somebody in between us like say Toledo to
    add a connection. Now of course. Of
  • 5:43 - 5:51
    course, this, [inaudible] Give me green.
    There we go.'Course this line probably
  • 5:51 - 5:56
    goes, probably went around when we just
    went straight to Cleveland, here. But
  • 5:56 - 6:02
    basically if we can convince Toledo to
    sort of put in their computer and hold
  • 6:02 - 6:07
    onto our messages for a while, we could
    send now one hop, two hops, three hops.
  • 6:07 - 6:12
    But the cost now is not that different,
    because the original long line between Ann
  • 6:12 - 6:17
    Arbor and Cleveland was distance
    sensitive. And, so, you can think of this
  • 6:17 - 6:22
    as, you can get this almost for free. And
    now we have a whole additional university.
  • 6:22 - 6:27
    Both to send stuff to, and they can send
    to the whole world as well. And so this
  • 6:27 - 6:32
    motivation to effectively take the same c
    ost, and now basically we're taking this
  • 6:32 - 6:37
    cost, and dividing it by four schools. And
    if you start thinking about it, it doesn't
  • 6:37 - 6:41
    take long to say, "You know what, let's
    put one here, one here, one here, one
  • 6:41 - 6:46
    here, and one here." Because the cost of
    the phone company isn't that different.
  • 6:46 - 6:50
    You can think of each of these as adding
    some delay to your message. You know, and
  • 6:50 - 6:55
    given the fact that each of these
    represents an outbound queue of messages
  • 6:55 - 7:00
    that are waiting to be sent, there's some
    delay. There's some cost adding this, but
  • 7:00 - 7:06
    It's so much cheaper. So our faculty have
    to wait another twenty minutes to get
  • 7:06 - 7:11
    their mail through if we can bring that
    many more universities on. And so this
  • 7:11 - 7:16
    just works out. There's this sorta
    motivation that if you can find an
  • 7:16 - 7:20
    intermediate person, geographically
    intermediate school or university or
  • 7:20 - 7:25
    company, and you can add them in, you can
    replace one long link with two short
  • 7:25 - 7:31
    links. And this led to long chains of
    mail. And so from the mid 70s to the late
  • 7:31 - 7:37
    80s most academics were communicating
    through a network that was like this. It
  • 7:37 - 7:43
    typically was email and I recall when I
    first started to use national email. It
  • 7:43 - 7:50
    took a long time for mail to go back and
    forth but it was actually quite magical I
  • 7:50 - 7:54
    mean who cares if it took an hour. Now we
    expect it in three seconds. We send an
  • 7:54 - 7:58
    email and hit the refresh buttons, hurry
    up, hurry up. You know, it could be hours,
  • 7:58 - 8:02
    it could be days if you were going far
    enough and your message was long enough
  • 8:02 - 8:06
    and you end up behind too many queues. And
    so you had this one computer locally and
  • 8:06 - 8:10
    every once in a while you'd do most of
    your communication computation locally.
  • 8:10 - 8:14
    And every once in a while you would fire a
    note off and that would kind of fight its
  • 8:14 - 8:19
    way through all those successive
    connections. This is sort of the life in
  • 8:19 - 8:24
    the early 1980s. One of the, most widely
    distributed networks of this kind was a
  • 8:24 - 8:29
    thing called Bitnet. And Princeton was
    kinda the hub of this and these tendrils
  • 8:29 - 8:34
    of connections ran out from Princeton. And
    by connecting to a, a network with lots of
  • 8:34 - 8:38
    oth er folks, then you had more people to
    talk to. And the more people that you,
  • 8:38 - 8:44
    that were connected the cheaper that it
    was for everybody. So it was a pretty, it
  • 8:44 - 8:48
    was the perfect kinda thing that caused
    people and com-, universities to want to
  • 8:48 - 8:53
    work together, because together their
    shared cost was much, much lower than to,
  • 8:53 - 8:58
    to provide this uniform connectivity and
    email. So at the same time, during that
  • 8:58 - 9:04
    same period, where most of us were using
    store and forward network, with our one on
  • 9:04 - 9:10
    campus computer, a bunch of computer
    scientists were funded by DARPA. The
  • 9:10 - 9:14
    Defense Advanced Research Projects
    Administration, to imagine a different
  • 9:14 - 9:21
    kind of network. And the idea was direct
    connections are expensive. The long trails
  • 9:21 - 9:26
    of store and forward networks, they're
    very slow, and if you had a giant message
  • 9:26 - 9:32
    that you got behind, then what, how do you
    get past that. It could clog the system up
  • 9:32 - 9:37
    for, for hours, if not days. And, and how
    do you keep from failures breaking the
  • 9:37 - 9:42
    entire system? If you think about a store
    and forward network, one computer going
  • 9:42 - 9:48
    down would cause data to back up on both
    sides of that computer until it's done.
  • 9:48 - 9:52
    And so, you don't really wanna have one
    outage and, and how if we have sort of
  • 9:52 - 9:57
    instead, instead of just a few messages,
    what if we just wanted all the messages to
  • 9:57 - 10:03
    go simultaneously, so that there's more of
    a fair allocation of the network, rather
  • 10:03 - 10:09
    than whoever gets there first gets it all
    until they're done with it. And, and so
  • 10:09 - 10:15
    Darpa wanted to solve the problem of
    outages. You know, many will say that it
  • 10:15 - 10:22
    had to do with, battlefield conditions,
    which is probably true They expected that
  • 10:22 - 10:28
    various connections would go out in, in,
    in dynamic situations. Maybe it was that
  • 10:28 - 10:34
    stuff was moving. But also how to be more
    efficient. And so, in effect, you can kind
  • 10:34 - 10:40
    of think of this as all a game, where the
    phone companies own the wire. So everyone,
  • 10:40 - 10:46
    even government, even military has to
    lease the wire from the phone companies.
  • 10:46 - 10:51
    And so everyone is like doing research to
    figure out or creating systems to figure
  • 10:51 - 10:57
    how not to pay t he phone company so much
    money, okay. So these research networks,
  • 10:57 - 11:03
    and so if we look for example at this one
    down here by 1972 they had this network. I
  • 11:03 - 11:08
    have my, I, yes I got a caller. So they
    have this network by 1972 and it's got,
  • 11:08 - 11:14
    like some [inaudible] right around twelve,
    fourteen, fifteen hosts in it, and it goes
  • 11:14 - 11:19
    cross-country. Now, now, the, the key
    about this is in 1972 to have leased lines
  • 11:19 - 11:24
    that were up 24 hours a day, seven days a
    week, all the way across the country? Very
  • 11:24 - 11:29
    expensive. But hey, it's a government
    project, and the government says this is
  • 11:29 - 11:34
    important so we're gonna spend the money
    because, so we're imagining battlefield
  • 11:34 - 11:39
    communications of the future and our own
    ability to do computations so they could
  • 11:39 - 11:44
    have comp-, computational equipment all
    over the place. So this was very
  • 11:44 - 11:49
    expensive, but research dollars were being
    flooded into it, because the q, they were
  • 11:49 - 11:54
    solving a research question. If you just
    think about this as a network, it was not
  • 11:54 - 11:59
    all [laugh], it wasn't sorta like, it was
    so costly that the average person wouldn't
  • 11:59 - 12:03
    like, pay $fifteen a month to use it. It
    would just be that costly. But it's okay.
  • 12:03 - 12:08
    Now if you look at this, you see that
    across the United States, there was always
  • 12:08 - 12:12
    at least one connection. They had three
    cross country links with totally
  • 12:12 - 12:17
    independent cross country links, with the
    ideas that you could take one of these
  • 12:17 - 12:22
    things out, and you could still be
    functioning. So they, they were able to
  • 12:22 - 12:27
    research all these things right, as well
    as the efficiency problem, which they
  • 12:27 - 12:33
    solved using packet switching. So, by the
    mid 70's there was quite a few folks on
  • 12:33 - 12:38
    this. And for a group of people they just
    started using it in production. It was
  • 12:38 - 12:43
    pretty cool, right? If you were, if you
    were one of these universities or
  • 12:43 - 12:48
    companies, you had a pretty cool,
    futuristic world. You could, you could
  • 12:48 - 12:53
    send email and get an answer back in two
    minutes, or a minute, or 30 seconds, even.
  • 12:53 - 12:59
    And so it was kind of this futuristic
    world that was heavily subsidized by the
  • 12:59 - 13:05
    government in the name of researching. And
    so there are two essential things that
  • 13:05 - 13:11
    really came out of this research. And one
    is the notion of what was called Packet
  • 13:11 - 13:16
    Switching. Packet Switching basically
    eliminates the problem where once the
  • 13:16 - 13:22
    message starts using that leased line
    wire, you have to wait till they're done.
  • 13:22 - 13:28
    As, as I showed in that in that store and
    forward. What you want is to be able to
  • 13:28 - 13:33
    send little pieces. Break the messages up
    into little pieces, and then they, they
  • 13:33 - 13:38
    Each, each message has a little bit of the
    network connectivity and then the next one
  • 13:38 - 13:42
    comes after it. And so you could have many
    messages going at the same time. And a
  • 13:42 - 13:46
    real long message won't fill up the
    network, fill up the connection forever
  • 13:46 - 13:51
    and ever and ever. So it and it also
    allows, if you to break the message up
  • 13:51 - 13:56
    into small parts, they can flow over
    different paths. The other thing that they
  • 13:56 - 14:00
    figured out was this notion of instead of
    oop, oop, oop come back here, come back
  • 14:00 - 14:04
    here. Instead of using computers as the
    intermediate stop points, because in store
  • 14:04 - 14:08
    and forward you could have a lot of
    messages so you tend to store them on
  • 14:08 - 14:13
    disks. Whereas routers, these packets were
    smaller individually than the entire
  • 14:13 - 14:19
    message and so they didn't need to store
    them nearly as long and they didn't need
  • 14:19 - 14:23
    as much storage. So these are, routers are
    just a form of computer, right? But they
  • 14:23 - 14:28
    were specialized for moving just data from
    one connection to the other without long
  • 14:28 - 14:33
    term, without storing that data for a long
    time. So, I like to think of packets as
  • 14:33 - 14:41
    postcards, letters and think of the Packet
    Switching Network as the postal system. So
  • 14:41 - 14:47
    let's say, for example, I had a friend,
    and his name is Glen, and I want to send
  • 14:47 - 14:53
    him a message. I want to send him a
    message that's hello there, have a nice
  • 14:53 - 14:58
    day. But I have a limitation. I have
    limitation. All I have is postcards that
  • 14:58 - 15:03
    it can, that can store ten characters on
    them, and I have to send my message to
  • 15:03 - 15:09
    Glenn using only 10-character postcards.
    And so, before Glenn and I part ways, we
  • 15:09 - 15:14
    agree on the following protocol: that I
    will take the first ten characters of the
  • 15:14 - 15:20
    me ssage and put them on one postcard, and
    then I will put an address from Chuck to
  • 15:20 - 15:25
    Glenn, and I'll put a sequence number. So
    that says that hey, hey Glenn, here comes
  • 15:25 - 15:31
    a message, this is part one. Then we take
    the next ten characters. And I mark that
  • 15:31 - 15:37
    as part two, from Chuck to Glen. And then
    here's the third part, it's marked as part
  • 15:37 - 15:43
    three, from Chuck to Glenn. And, so, what
    can I do now? Well, I walk out to my post
  • 15:43 - 15:48
    office box, and I send'em, I just stack'em
    in. I might stack them neatly in order.
  • 15:48 - 15:54
    Now, they go through the postal system.
    Like, they get dropped, some get dropped
  • 15:54 - 15:59
    on the ground. A couple of them get lost.
    Or they end up on the wrong truck. They go
  • 15:59 - 16:05
    through Kansas City by mistake. Blah,
    blah, blah, blah, blah, blah, blah. Blah,
  • 16:05 - 16:10
    blah, blah, blah, blah, blah, blah, blah,
    blah, blah, blah. But, you know, some days
  • 16:10 - 16:15
    later. They start arriving at Glen's
    house. And so, Glenn goes out to his post
  • 16:15 - 16:20
    office box, and he gets a message. It's
    hello ther-, and it's sequence number one.
  • 16:20 - 16:25
    So it looks like Chuck is going to send me
    a message, and I've got the first part of
  • 16:25 - 16:30
    it. That's pretty cool. So then he goes
    out the next day, and out comes, nice day.
  • 16:30 - 16:35
    But this is #three. So, because I've
    numbered them, Glenn knows that there's
  • 16:35 - 16:40
    some missing bits, right? So Glenn just
    can hold on to them, and leave a little
  • 16:40 - 16:44
    space on his kitchen table for what he
    hopes to be message number two. And so
  • 16:44 - 16:49
    message two finally comes out. And now
    Glen is capable of saying, "Looks like I
  • 16:49 - 16:54
    got the whole message and I can reassemble
    them. And, surprise, surprise. I have just
  • 16:54 - 16:58
    sent him. With a lot of effort in three
    packets. Hello there! Have a nice day."
  • 16:58 - 17:04
    And so this notion of breaking the message
    into packets, labeling each packet with a
  • 17:04 - 17:09
    sequence number, and then sending them to
    this network that can take multiple paths,
  • 17:09 - 17:13
    You can even have a situation where the
    you know, the message would go across one
  • 17:13 - 17:18
    link, it would get lost and then it would,
    you know go across a different link. So
  • 17:18 - 17:22
    you have ways of recovering. You can
    recover the messages. We'll talk about
  • 17:22 - 17:28
    that later as well. So this ends up with a
    sort of a structure that has these
  • 17:28 - 17:36
    computers that are specialized routers in
    the middle. And the routers have multiple
  • 17:36 - 17:43
    connections. And if we take a campus, for
    example, and the campus has some computers
  • 17:43 - 17:47
    and we have high-speed networking on this
    campus. We have some, you know, stuff in
  • 17:47 - 17:52
    our offices on the campus, and then we
    have some stuff in the machine room and we
  • 17:52 - 17:56
    talk to these things. And then, somehow,
    our entire campus has a little spicket to
  • 17:56 - 18:01
    the outside world and this is our, sort
    of, campus router and we get this router,
  • 18:01 - 18:06
    and then there are, sort of, intermediate
    routers that are inside the network. And
  • 18:06 - 18:10
    if you sort of look at a router, a router
    sort of simply forwards traffic and the
  • 18:10 - 18:15
    traffic now is these small packets, rather
    than whole messages, so you don't need a
  • 18:15 - 18:19
    disk drive on these, on these routers.
    There's no disk drive on these routers, so
  • 18:19 - 18:23
    that they just kind of grab a packet and
    they forward it. And the systems are
  • 18:23 - 18:27
    trained. And the software does not
    overflow the network. We'll talk about
  • 18:27 - 18:32
    that later, much later. And so these
    routers have these real simple view of the
  • 18:32 - 18:37
    world, they've got some incoming traffic,
    they've got some outgoing traffic,
  • 18:37 - 18:42
    outgoing traffic. And so they just grab
    and forward. It's like a intermediate
  • 18:42 - 18:47
    postal spot, right? They, they grab big
    thing of. Postcards and books. Send them
  • 18:47 - 18:54
    to the right place and, and they get where
    they do and so eventually the data gets.
  • 18:54 - 18:58
    Getting a little sloppy, getting a little
    messy, here. Eventually, the data sort of
  • 18:58 - 19:03
    is broken up, finds its way to the other
    end, and then dumps out in some campus
  • 19:03 - 19:08
    local area network and then somebody sees
    the data on the far end, okay? And so it
  • 19:08 - 19:13
    might different, take different routes,
    you know? It might get lost that might
  • 19:13 - 19:17
    crash and then it has to get sent again on
    a different route. And so these things,
  • 19:17 - 19:21
    these little pieces, these little
    postcards, find their way through the
  • 19:21 - 19:26
    series of routers. And we can, we both can
    see sort of like a, a whole campus being
  • 19:26 - 19:32
    connected. We can see individual folks who
    are, buying, buying some dial up through
  • 19:32 - 19:37
    cable or DSL, and at some point we like to
    represent this whole thing. Here is this
  • 19:37 - 19:42
    big cloud, this you don't worry about the
    detail inside here. Call that the cloud.
  • 19:42 - 19:46
    We'll see it in the future slides it`s
    just a cloud, a white, fluffy cloud. That
  • 19:46 - 19:49
    means that we are trying to hide the
    detail. But in there it`s just a bunch of
  • 19:49 - 19:53
    things that are connected. In a way it`s
    not that different in the store and
  • 19:53 - 19:58
    forward network, except for the fact that
    every message is tiny, so it doesn't clog
  • 19:58 - 20:02
    the whole network up, which means that
    routers don`t have to have a lot of
  • 20:02 - 20:06
    intermediate storage to hold on to these
    packets in flight. And it also means that
  • 20:06 - 20:11
    every packet can take a different path and
    if things get loaded up, they can
  • 20:11 - 20:15
    dynamically move. And so. Here's just sort
    of an example problem to solve. If you
  • 20:15 - 20:20
    think about it, these routers have a very
    limited view of the world. And there are
  • 20:20 - 20:25
    hundreds of thousands of routers around
    this world right now. And they don't know
  • 20:25 - 20:29
    the entire network, they kind of know the
    lines that come in to them and the lines
  • 20:29 - 20:34
    that go out, just like a post office in
    Kansas city doesn't know every address,
  • 20:34 - 20:39
    every house in the world. It just knows
    the trucks that are coming in and the
  • 20:39 - 20:45
    trucks going out. And so these packets
    that have to and from addresses can get a
  • 20:45 - 20:51
    little confused at times. So we won't
    solve this but if, if we had a situation
  • 20:51 - 20:56
    where This particular packet would come
    into a router, and it would route it here,
  • 20:56 - 20:59
    and then this packet would see it and then
    it would route it this way, this packet
  • 20:59 - 21:03
    would see it and route it this way, this
    packet would see that this router would
  • 21:03 - 21:07
    see it again and say, oh, I gotta route it
    that way. And so we end up in this
  • 21:07 - 21:12
    situation where we would create a loop.
    Okay. So this is the kind of technical
  • 21:12 - 21:17
    things they had to solve to keep these
    things from going round and round and
  • 21:17 - 21:23
    round and sort of melting the network.
    We'll talk more about that in a bit. So.
  • 21:23 - 21:28
    This was DARPANET. It was doing research
    on these kin ds of problems. The kinds of
  • 21:28 - 21:33
    problems of, you know what's the best way
    to do this? How big should packets be?
  • 21:33 - 21:38
    What should, how long should we wait until
    we send a packet again? You know, this
  • 21:38 - 21:43
    kind of thing. And so that was our
    research network. And the, that could've
  • 21:43 - 21:50
    gone on forever, it might've been a purely
    military project, but. At the University
  • 21:50 - 21:57
    of Illinois - Urbana Champagne - folks
    started to think about super computers and
  • 21:57 - 22:04
    starting all the way back to Bletchley
    Park, science was enhanced by the use of
  • 22:04 - 22:09
    computations. And so as the 70's and 80's
    were happening, all these scientists were
  • 22:09 - 22:13
    sort of like, "Wow, I can do better
    physics. I can do better chemistry. I can
  • 22:13 - 22:18
    do better material science. I can invent
    new plastics. I can do pharmacy. I can do
  • 22:18 - 22:23
    all kinds of things. With computers. And
    so what happened was is everyone started
  • 22:23 - 22:27
    asking the government. For money. For
    computers. It's like, "I need a bigger
  • 22:27 - 22:32
    computer. And if I, if I had this bigger
    computer. I could do research." Matter of
  • 22:32 - 22:36
    fact. I was part of all this. Matter of
    fact I wrote a book. High Performance
  • 22:36 - 22:41
    Computing. Here's the book. That's kind of
    what I did before I became an internet
  • 22:41 - 22:46
    guy. These are beautiful things. Here's,
    this isn't, was my baby, I never got this.
  • 22:46 - 22:51
    This is like about $8,000,000, it's not
    small like this, this is a model of a
  • 22:51 - 22:57
    Convex C3800 supercomputer. And each of
    these was the size of a refrigerator, it's
  • 22:57 - 23:02
    slightly taller than me. I would be about
    this tall, right here. And each of these,
  • 23:02 - 23:08
    I think this is like, like I said, like
    $8,000,000 or something. And I wanted one
  • 23:08 - 23:13
    just for me. And so the problem is, is
    that, you know, I'm a nice guy, and I'm
  • 23:13 - 23:17
    probably worth $8,000,000 of the
    governments money without a doubt, but not
  • 23:17 - 23:21
    that the government didn't always think
    about that. So we couldn't all have out
  • 23:21 - 23:27
    own personal computer, or at least our own
    personal supercomputers. Today, of course.
  • 23:27 - 23:33
    This has about as much power as this, but
    this is not a history of computers.
  • 23:33 - 23:39
    Computation. The iPhone is as powerful as
    this thing, it literally with abou t as
  • 23:39 - 23:43
    much storage, But what happened was, is,
    all these scientists would say give me,
  • 23:43 - 23:46
    give me this supercomputer. I need a
    supercomputer to do this, I need a
  • 23:46 - 23:50
    supercomputer to do that. And the National
    Science Foundation said oh, hmm, well, why
  • 23:50 - 23:53
    don't we just buy a few of these
    supercomputers and put them in these
  • 23:53 - 23:57
    supercomputer centers and then let people
    connect to them. And then make people, and
  • 23:57 - 24:02
    make it so they could share, so we didn't
    have to give every single scientist one of
  • 24:02 - 24:08
    these things. And so. The notion that we
    would create a network to connect these
  • 24:08 - 24:16
    things, again, seems completely logical
    today, but in 1981, 1982, 1983, it wasn't
  • 24:16 - 24:23
    entirely the most logical idea. And of
    course, the telephone companies might have
  • 24:23 - 24:29
    something to say about that and so the
    next person that you're going to meet is
  • 24:29 - 24:34
    Larry Smarr from NCSA, the National Center
    for Supercomputing Applications. And Larry
  • 24:34 - 24:39
    Smarr was one of the early innovators that
    sort of realized that we had to build
  • 24:39 - 24:45
    computational infrastructure and internet
    computational infrastructure. And did a
  • 24:45 - 24:50
    lot of work to convince the federal
    government that this is something that we
  • 24:50 - 24:54
    should do. And so let's go ahead and meet
    Larry Smarr.
Title:
Reflection on Early Communication
Video Language:
English
stanford-bot edited English subtitles for Reflection on Early Communication
stanford-bot added a translation

English subtitles

Revisions