Evolution of the Internet


EVOLUTION OF THE INTERNET AND WWW
Evolution
World Wide Web was created by Timothy Berners Lee in 1989 at CERN in Geneva. World Wide Web came into existence as a proposal by him, to allow researchers to work together effectively and efficiently at CERN. Eventually it became World Wide Web.
The following diagram briefly defines evolution of World Wide Web:
internet_technologies_tutorial
WWW Architecture
WWW architecture is divided into several layers as shown in the following diagram:
internet_technologies_tutorial
Identifiers and Character Set
Uniform Resource Identifier (URI) is used to uniquely identify resources on the web and UNICODE makes it possible to built web pages that can be read and write in human languages.
Syntax
XML (Extensible Markup Language) helps to define common syntax in semantic web.
Data Interchange
Resource Description Framework (RDF) framework helps in defining core representation of data for web. RDF represents data about resource in graph form.
Taxonomies
RDF Schema (RDFS) allows more standardized description of taxonomies and other ontological constructs.
Ontologies
Web Ontology Language (OWL) offers more constructs over RDFS. It comes in following three versions:
OWL Lite for taxonomies and simple constraints.
OWL DL for full description logic support.
OWL for more syntactic freedom of RDF
Rules
RIF and SWRL offers rules beyond the constructs that are available from RDFs and OWL. Simple Protocol and RDF Query Language (SPARQL) is SQL like language used for querying RDF data and OWL Ontologies.
Proof
All semantic and rules that are executed at layers below Proof and their result will be used to prove deductions.
Cryptography
Cryptography means such as digital signature for verification of the origin of sources is used.
User Interface and Applications
On the top of layer User interface and Applications layer is built for user interaction.
WWW Operation
WWW works on client- server approach. Following steps explains how the web works:
User enters the URL (say, http://www.tutorialspoint.com) of the web page in the address bar of web browser.
Then browser requests the Domain Name Server for the IP address corresponding to www.tutorialspoint.com.
After receiving IP address, browser sends the request for web page to the web server using HTTP protocol which specifies the way the browser and web server communicates.
Then web server receives request using HTTP protocol and checks its search for the requested web page. If found it returns it back to the web browser and close the HTTP connection.
Now the web browser receives the web page, It interprets it and display the contents of web page in web browser’s window.
internet_technologies_tutorial
Future
There had been a rapid development in field of web. It has its impact in almost every area such as education, research, technology, commerce, marketing etc. So the future of web is almost unpredictable.
Apart from huge development in field of WWW, there are also some technical issues that W3 consortium has to cope up with.
User Interface
Work on higher quality presentation of 3-D information is under deveopment. The W3 Consortium is also looking forward to enhance the web to full fill requirements of global communities which would include all regional languages and writing systems.
Technology
Work on privacy and security is under way. This would include hiding information, accounting, access control, integrity and risk management.
Architecture
There has been huge growth in field of web which may lead to overload the internet and degrade its performance. Hence more better protocol are required to be developed.
Web Page
web page is a document available on world wide web. Web Pages are stored on web server and can be viewed using a web browser.
A web page can cotain huge information including text, graphics, audio, video and hyper links. These hyper links are the link to other web pages.
Collection of linked web pages on a web server is known as website. There is unique Uniform Resource Locator (URL) is associated with each web page.
Static Web page
Static web pages are also known as flat or stationary web page. They are loaded on the client’s browser as exactly they are stored on the web server. Such web pages contain only static information. User can only read the information but can’t do any modification or interact with the information.
Static web pages are created using only HTML. Static web pages are only used when the information is no more required to be modified.
internet_technologies_tutorial
Dynamic Web page
Dynamic web page shows different information at different point of time. It is possible to change a portaion of a web page without loading the entire web page. It has been made possible using Ajax technology.
Server-side dynamic web page
It is created by using server-side scripting. There are server-side scripting parameters that determine how to assemble a new web page which also include setting up of more client-side processing.
Client-side dynamic web page
It is processed using client side scripting such as JavaScript. And then passed in to Document Object Model (DOM).
internet_technologies_tutorial
Scripting Laguages
Scripting languages are like programming languages that allow us to write programs in form of script. These scripts are interpreted not compiled and executed line by line.
Scripting language is used to create dynamic web pages.
Client-side Scripting
Client-side scripting refers to the programs that are executed on client-side. Client-side scripts contains the instruction for the browser to be executed in response to certain user’s action.
Client-side scripting programs can be embedded into HTML files or also can be kept as separate files.
internet_technologies_tutorial
Following table describes commonly used Client-Side scripting languages:
S.N.
Scripting Language Description
1.
JavaScript
It is a prototype based scripting language. It inherits its naming conventions from java. All java script files are stored in file having .js extension.
2.
ActionScriptIt is an object oriented programming language used for the development of websites and software targeting Adobe flash player.
3.
Dart
It is an open source web programming language developed by Google. It relies on source-to-source compiler to JavaScript.
4.
VBScript
It is an open source web programming language developed by Microsoft. It is superset of JavaScript and adds optional static typing class-based object oriented programming.
Server-side Scripting
Sever-side scripting acts as an interface for the client and also limit the user access the resources on web server. It can also collects the user’s characteristics in order to customize response.
internet_technologies_tutorial
Following table describes commonly used Server-Side scripting languages:
S.N.
Scripting Language Description
1.
ASP
Active Server Pages (ASP)is server-side script engine to create dynamic web pages. It supports Component Object Model (COM) which enables ASP web sites to access functionality of libraries such as DLL.
2.
ActiveVFP
It is similar to PHP and also used for creating dynamic web pages. It uses native Visual Foxpro language and database.
3.
ASP.net
It is used to develop dynamic websites, web applications, and web services.
4.
Java
Java Server Pages are used for creating dynamic web applications. The Java code is compiled into byte code and run by Java Virtual Machine (JVM).
5.
Python
It supports multiple programming paradigms such as object-oriented, and functional programming. It can also be used as non-scripting language using third party tools such as Py2exe or Pyinstaller.
6.
WebDNA
It is also a server-side scripting language with an embedded database system.
Web Browser
web Browser is an application software that allows us to view and explore information on the web. User can request for any web page by just entering a URL into address bar.
Web browser can show text, audio, video, animation and more. It is the responsibility of a web browser to interpret text and commands contained in the web page.
Earlier the web browsers were text-based while now a days graphical-based or voice-based web browsers are also available. Following are the most common web browser available today:
Browser
Vendor
Internet Explorer
Microsoft
Google Chrome
Google
Mozilla Firefox
Mozilla
Netscape Navigator
Netscape Communications Corp.
Opera
Opera Software
Safari
Apple
Sea Monkey
Mozilla Foundation
K-meleon
K-meleon
Architecture
There are a lot of web browser available in the market. All of them interpret and display information on the screen however their capabilities and structure varies depending upon implementation. But the most basic component that all web browser must exhibit are listed below:
Controller/Dispatcher
Interpreter
Client Programs
Controller works as a control unit in CPU. It takes input from the keyboard or mouse, interpret it and make other services to work on the basis of input it receives.
Interpreter receives the information from the controller and execute the instruction line by line. Some interpreter are mandatory while some are optional For example, HTML interpreter program is mandatory and java interpreter is optional.
Client Program describes the specific protocol that will be used to access a particular service. Following are the client programs tat are commonly used:
HTTP
SMTP
FTP
NNTP
POP
internet_technologies_tutorial
Starting Internet Explorer
Internet explorer is a web browser developed by Microsoft. It is installed by default with the windows operating system howerver, it can be downloaded and be upgraded.
To start internet explorer, follow the following steps:
Go to Start button and click Internet Explorer.
internet_technologies_tutorial
The Internet Explorer window will appear as shown in the following diagram:
internet_technologies_tutorial
Accessing Web Page
Accessing web page is very simple. Just enter the URL in the address bar as shown the following diagram:
internet_technologies_tutorial
Navigation
A web page may contain hyperlinks. When we click on these links other web page is opened. These hyperlinks can be in form of text or image. When we take the mouse over an hyperlink, pointer change its shape to hand.
internet_technologies_tutorial
Key Points
In case, you have accessed many web pages and willing to see the previous webpage then just click back button.
You can open a new web page in the same tab, or different tab or in a new window.
Saving Webpage
You can save web page to use in future. In order to save a webpage, follow the steps given below:
Click File > Save As. Save Webpage dialog box appears.
Choose the location where you want to save your webpage from save in: list box. Then choose the folder where you want to save the webpage.
Specify the file name in the File name box.
Select the type from Save as type list box.
Webpage, complete
Web Archive
Webpage HTML only
Text File
From the encoding list box, choose the character set which will be used with your webpage. By default, Western European is selected.
Click save button and the webpage is saved.
Saving Web Elements
Web elements are the pictures, links etc. In order to save these elements follow the steps given below:
Right click on the webpage element you want to save. Menu options will appear. These options may vary depending on the element you want to save.
internet_technologies_tutorial
Save Picture As: This option let you save the picture at specific location with its name. When you click this option, a dialog box is opened where you can sepcify its name and location.
Favourites
The Favourites option helps to save addresses of the webpages you visited oftenly. Hence you need not to remember long and complex address of websites you visit often.
In order to open any webpage, you just need to double click on the webpage that you have marked from bookmarks list.
Adding a web page to your Favourites
In ordered to add website to your favourite list, follow the steps given below:
Open webpage that you want to add to your favourite.
Click on favourite menu and then click on Add to Favourites opton. Addfavourites dialog box appears.
You can also click Favourites button available in the toolbar. Favourites panel will open in the left corner of the internet explorer window. Click add button, AddFavourites dialog box will apppear.
internet_technologies_tutorial
In AddFavourites dialog box, the Name: text box will contains the name of the web page that you want to add to favourites.
Click the Create in button, Favoutites folder will appear. Move to the folder where you want to store the favourites by clicking on the folder name.
Now click OK button to save the favourites.
Opening Favourites
In order to open favourites, follow the steps given below:
In the Favourite Panel, take the mouse over the site that you want to open. Now click on the address to open that site.
internet_technologies_tutorial
Favourite can also be opened from the Favourites menu by selecting the appropriate one.
internet_technologies_tutorial
Organizing Favourites
Favourites can be organized by categorizing web pages, creating folder for each category and then storing web pages into them. In order to organize favourites, follow the steps given below:
Click Favourites menu > Organize Favourites. Organize favourites dialog box will appears.
In order to organize the webpages, drag the individual webpage to the respective folder. Similarly to delete a favourite, Click on delete button.
internet_technologies_tutorial

The characteristics of the Internet that are clearly of importance in cyberlibel proceedings are:
its global nature;
interactivity;
its potential to shift the balance of power in the offline world;
accessibility;
anonymity;
its facilitation of republication;
the prominence of intermediaries;
its reliance on hyperlinks/hypertext;
its long-term impact — the use of permanent archives;
its multimedia character; and
its temporal indeterminacy.
1)      Global Nature:
The first feature of the Internet is its truly global nature. Presently, more than 1.9 billion people in more than 190 countries are linked through this massive interconnected web of computer networks.[1]
This feature immediately raises several interesting conflicts of law questions for the libel lawyer, such as:
a.  In which jurisdiction did the publication of the defamation occur?
Theoretically, every time a third party accesses a defamatory posting on the Internet, publication has occurred.
b.  In what jurisdiction should the plaintiff sue?
Where the plaintiff resides?
Where the defendant resides?
Wherever publication has occurred?

Defamation laws vary from country to country and in countries such as Australia, Canada, and the US, it can vary from province to province and state to state. Therefore, plaintiffs may have the luxury of “forum shopping” or choosing the jurisdiction in which the laws are most favourable.
The High Court of Australia heard a defamation claim instituted by a plaintiff, who was a resident of the State of Victoria in Australia, against Dow Jones, an American corporation, for allegedly defamatory statements made in articles published by Dow Jones on its website, which was maintained on servers located in the State of New Jersey, USA. Dow Jones brought a motion to have service of the claim set aside or the action permanently stayed on the basis that the courts in Australia did not have jurisdiction. The High Court of Australia rejected that argument and allowed the action to proceed. The majority of the High Court said at para. 44:
“In defamation, the same considerations that require rejection of locating the tort by reference only to the publisher’s conduct, lead to the conclusion that, ordinarily, defamation is to be located at the place where the damage to reputation occurs. Ordinarily that will be where the material which is alleged to be defamatory is available in comprehensible form assuming, of course, that the person defamed has in that place a reputation which is thereby damaged. It is only when the material is in comprehensible form that the damage to reputation is done and it is damage to reputation which is the principal focus of defamation, not any quality of the defendant’s conduct. In the case of material on the World Wide Web (web), it is not available in comprehensible form until downloaded on to the computer of a person who has used a web browser to pull the material from the web server. It is where that person downloads the material that the damage to reputation may be done. Ordinarily then, that will be the place where the tort of defamation is committed.
c.  Whose laws should apply?
For example, should the First Amendment protection and the public figure defence available in the US apply? Or should the common law of the commonwealth apply? Or the civil law?[2]
d.  Will it be possible to enforce any judgment obtained?
Currently, despite legislation allowing reciprocal enforcement of civil judgments, some courts in the US are unwilling to enforce defamation judgments from other jurisdictions because of First Amendment protection of freedom of expression.
e. What is the quantum of damages?
Theoretically, damages could be very large as a publication on the Internet potentially reaches millions of people. In practice, however, it is unlikely that millions of people will actually view each particular publication. In any event, publication on the Internet will generally be larger than in all but the largest print or broadcast media outlets.

The global nature of the Internet also raises some interesting procedural questions for the libel lawyer. In traditional libel law, there are three different types of defamatory statements:
a.  A statement that is defamatory on its face and which is obviously defamatory.
b.  A statement which contains false innuendo. False innuendo is a defamatory statement that has an inferential meaning, therefore only persons with the necessary contextual knowledge appreciate that the statement is defamatory. Since statements on the Internet are published globally, their inferential meanings may vary depending on the geographic or cultural location of the reader or the newsgroups or the Usenet group involved.
c.  A statement of legal innuendo. While not defamatory on their face, these statements are defamatory when viewed together with extrinsic circumstances. Once again, contextual knowledge may render a statement defamatory in one jurisdiction but not in another.[3]
The geographical indeterminancy of the technology of the Internet collides regularly with the stark reality of the geographical determinacy of defamation actions. This reality is above and beyond the conflicts of law questions that bedevil all international litigation. It is an example of a larger problem facing other areas of the law and the Internet, as stated by Binnie J. in the Supreme Court of Canada decisions of Society of Composers, Authors and Music Publishers of Canada v. Canadian Assn. of Internet Providers, 2004 SCC 45, [2004] 2 S.C.R. 427 at para. 41:
“The issue of the proper balance in matters of copyright plays out against the much larger conundrum of trying to apply national laws to a fast-evolving technology that in essence respects no national boundaries. Thus in Citron v. Zundel (2002), 41 C.H.R.R. D/274, the Canadian Human Rights Tribunal wrestled with jurisdiction over an alleged hate Web site supplied with content from Toronto but posted from a host server in California. In Reference re Earth Future Lottery, 2003 SCC 10 (CanLII), [2003] 1 S.C.R. 123, 2003 SCC 10, the issue was whether sales of tickets from an Internet lottery in Prince Edward Island constituted gambling “in the province” when almost all of the targeted on-line purchasers resided elsewhere. The “cyber libel” cases multiply. In Braintech, Inc. v. Kostiuk 1999 BCCA 169 (CanLII), (1999), 171 D.L.R. (4th) 46, the British Columbia Court of Appeal refused to enforce a Texas judgment for Internet defamation against a B.C. resident where the B.C. resident’s only connection with Texas was “passive posting on an electronic bulletin board” (para. 66). There was no proof that anyone in Texas had actually looked at it. On the other hand, in Dow Jones & Co. v. Gutnick (2002), 194 A.L.R. 433, [2002] HCA 56, the High Court of Australia accepted jurisdiction over a defamation action in respect of material uploaded onto the defendant’s server in New Jersey and downloaded by end users in the State of Victoria. The issue of global forum shopping for actions for Internet torts has scarcely been addressed. The availability of child pornography on the Internet is a matter of serious concern. E-commerce is growing. Internet liability is thus a vast field where the legal harvest is only beginning to ripen. It is with an eye to this broader context that the relatively precise questions raised by the Copyright Board must be considered. [Emphasis added].
Emphasis on reputation and freedom of speech varies greatly even within the English-speaking common law world.[4] Jurisdictions such as the UK provide remedies for defamation but, until recently, only limited recourses for invasion of privacy,[5] while the converse is true in other jurisdictions such as France.
The use of legal innuendos, community standards for defamatory meaning, local procedural rules, and jurisdiction arguments accentuate the geographical determinacy of defamation law. This clash has several consequences, for example:
jurisdictional disputes are a common feature of cyberlibel cases,
there are limited extraterritorial applications for injunctions against cyberlibel statements published globally (see Barrick Gold Corp. v. Lopehandia, 2004 CanLII 12938 (ON C.A.));
abuse of process motions based on limited publications in the jurisdiction are used in UK cases (see “abuse of process,” below Chapter 9, section F; Chapter 11, sections E, F, and G; and Chapter 15, section C (2)); and
a very uneven “landscape” for the liability or immunity of intermediaries. Section 230 of the Communications Decency Act of 1996, 47 U.S.C.A. (CDA) provides complete immunity for the Internet Service Provider (ISP). No legislative protection exists for the ISP in defamation claims in Canada.
2)       Interactivity:
The interactive character of the Internet utterly changes the libel playing field. It is completely different from the Industrial Age paradigm where newspapers and television stations had dominant if not monopolistic relationships with readers and viewers.
Someone who is damaged by the press has limited remedies. In the Internet Age a person whose reputation is attacked now has a wide range of offensive and defensive remedies, including juridical, technological, and public relations options. In many cases, the scope of re-publication is as wide or can even be wider than the original publication.
The ease with which users of the Internet can access bulletin boards and Usenets and communicate with each other has engendered in its users a false sense of freedom in their communications. This is exemplified by the prevalence of activities such as “spamming”[6] and “flaming”[7] in Internet communications. As a result, the Internet is qualitatively different from any other medium. Consequently, Mike Godwin, counsel for the Electronic Frontier Foundation, says that “the public figure defence” should apply to statements made on the Internet. The ability to reply, he claims, is much more gratifying, immediate, and potent than launching a libel action.[8]
Some American commentators[9] have proposed that when a libel plaintiff has been defamed by a message posted on an electronic bulletin board and she has access to the bulletin board to post a reply, the First Amendment requires that the plaintiff prove that the defendant acted with “actual malice” in defaming the plaintiff.[10] They argue that “Libel Plaintiffs who have been defamed by bulletin board speech and who have both access to the bulletin board on which the defamatory material appeared and a history of participation on the bulletin board are functionally equivalent to public figures.”[11] This proposal raises numerous questions such as:
Should the conceptual basis of this defence be the First Amendment or the technological ease of reply on the Internet?
What will be the reactions of courts outside the US to a defence based on the First Amendment?
Should the elements of such a defence include: (i) access to the Internet? (ii) access to the Internet and a particular bulletin board system where the defamatory statement was published? (iii) participation in the discussion?; (iv) a previous history of participation and discussions in that particular bulletin board system?
More broadly, counsel must consider: (i) what subject matters should be covered? (ii)how to define issues of public interest on a global medium of communication?
Is this defence only available to the operators of bulletin board systems or to the original publishers as well?
Should this concept be a defence or simply a mitigation of damages?
These issues have not yet been decided by the courts, but they need to be addressed as the Internet does provide a unique means of a quick and responsive reply to an attack on a person’s reputation.
3)      Shifting the Balance of Power in the Offline World[12]
In some situations the Internet can actually change the balance of power that exists normally in the offline world. Any enterprise that has been the target of a concerted cyber-attack comes to realize that the terms of the debate are not what it is accustomed to, where, for example it is able to gain favourable attention for its press releases. On the contrary, the attackers are the persons with the power. The ferocity, ubiquity, and tenacity of cyblerlibel attacks often stun their targets.
Secondly, the motions judge failed to appreciate, and in my opinion misjudged, the true extent of Mr. Lopehandia’s target audience and the nature of the potential impact of the libel in the context of the Internet. She was alive to the fact that Mr. Lopehandia “[had] the ability, through the Internet, to spread his message around the world to those who take the time to search out and read what he posts” and indeed that he had “posted messages on many, many occasions.” However, her decision not to take the defamation seriously led her to cease her analysis of the Internet factor at that point. She failed to take into account the distinctive capacity of the Internet to cause instantaneous, and irreparable, damage to the business reputation of an individual or corporation by reason of its interactive and globally all-pervasive nature and the characteristics of Internet communications.
Had the motions judge taken these characteristics of the Internet more fully into account, she might well have recognized Barrick’s exposure to substantial damages to its reputation by reason of the medium through which the Lopehandia message was conveyed.

Comments

Popular posts from this blog

Work certified and uncertified

Sale of Goods Act- Conditions and Warranties

E Commerce Security environment