Hawke, G.L. “The Internet and its Role in the Future”
The Electrical Engineering Handbook
Ed. Richard C. Dorf
Boca Raton: CRC Press LLC, 2000
99
The Internet and Its
Role in the Future
99.1 Introduction
99.2 History
99.3 The Internet Today
Send/Receive Capacity?Login?Password?The World Wide Web
(WWW, Web)
99.4 The Future
99.1 Introduction
The creation of the computer rivals any invention in our history. The wide use of computers and their resultant
affect on all communication is tied directly to their ability to contact and interface with each other. This ability
to link computers together is the basis for all global success of computer usage. It is the key to sharing knowledge,
data, conversation, and discovery on a global scale.
The Internet is the adolescent offspring developed from the creation of a backbone connecting computers
and computer networks. These Local Area Networks (LANs) within internal locations can now be linked to
other networks worldwide. The Internet, not really a place but a concept, is intended to connect global
information resources. The value of the Internet is more than its ability to link computers and networks, its
real value is in bringing information to any who need it.
This chapter will attempt to give a broad overview of the Internet, condensing the major points of interest
into one short chapter. There are, of course, hundreds of books on the subject. At the end of the chapter there
is a list of just a few publications the reader may wish to check for more in-depth information.
The rapid advances in technology and innovations in operating software make any published account of the
Internet obsolete before they arrive in the reader’s hands. As we look at the Internet as it exists today, we also
try to take a glimpse at the future of this creation. There are, however, as many visions of the future as there
are dreamers. So, with due respect to those who envision the developments and uses of the Internet in the years
to come, here is a basic introduction.
99.2 History
Early in the development of the mainframe computer, the creators realized these machines would have to be
able to talk to each other for the technology to be of real meaning. They began by connecting one computer
to another through direct cable hook-up, then to printers, and eventually they sought a means of connection
outside their own building. The telephone system seemed like a logical choice. It was virtually everywhere. It
was flexible, inexpensive, and one could simply dial up the location one wanted to reach. The modem was
invented to send computer information over telephone lines instead of a direct wire connection. It provided
the modulated (Mo) computer signal from one location and the demodulated (dem) to the other end of the
connection. Protocols were developed that would translate the computer signal to telephone tones. Modems
Gary L. Hawke
University of Kansas
? 2000 by CRC Press LLC
are limited by the speed at which they can make this translation. Later in the chapter, modem speeds and types
will be discussed at greater length.
Computers can speak with each other in various methods over telephone lines. Circuit switching is when
one computer directly dials up another. As phone lines in and out of locations began to become “busy” at
times, the multiplexing idea was born. This allows an electronic cue system where computers may line up to
access the next available line when one computer is done. Various forms of multiplexing have been developed
to hold the data to be transmitted until an outgoing line is available, then delivering it. This eliminates the
need for the entire computer waiting for a path. Other tasks can be undertaken while the outgoing data is in
the hold position.
This same early system is still the main access to the Internet for businesses and personal use. It allows anyone
access to the Internet anywhere in the world that telephone service is available. This now includes cellular
applications and even direct satellite transmission for extremely remote locations. The system works very well
and is expanding on a local access basis.
As the Cold War continued, the government began the search for a system that would be less vulnerable to
damage or sabotage. The U.S. Advanced Research Projects Agency (ARPA) began to explore an alternate path
for government, business, and research locations to interconnect. This national network would allow different
operating systems the ability to talk to each other and to route this path in a multitude of connects. Thus, if
one path was damaged, the system would seek another path to its destination. The packet system of transmitting,
which divides the information into streams of small packets of information, each with an I.D. number for final
assembly, was developed. This new network would allow scientists from around the country to connect to one
another to further computer technology. The system would be able to share equipment, transfer data files, and
use long distance login capabilities. However, according to one of its early developers, Vint Cerf, vice-president
of the Corporation for National Research Initiatives, “...we didn’t know that e-mail was important...we weren’t
even sure what it was at the time” [Dern, 1994]. This new network would be called ARPAnet.
Soon researchers at private companies and institutions of higher learning were cranking out new software
protocols to allow computers access to this new highway. In 1969, the first three ARPAnet participants were
linked between Stanford University in Palo Alto, California, and the University of California at Los Angeles and
the University of California at Santa Barbara. The system grew slowly for the first decade, a bit faster over the
next 10 years, and exploded in the 1990s as protocols, access, and individual desk top computers increased.
During these years many operating systems, high speed (including fiber optic) transmission lines, access
providers, and language protocols were developed. The Defense Advanced Research Projects Agency developed
a protocol for network interconnection called Transmission Control Protocol/Internetworking Protocol
(TCP/IP). In 1983 this protocol was adopted as the standard for what would later be called Internet.
99.3 The Internet Today
Today the Internet is a conglomeration of a huge number of interconnected LANs around the world. These are
a series of linked IPs, functioning on their own, but able to instantly connect with any other LAN likewise
connected to the Internet. It also covers the thousands of personal computers at home or in the office. The
Internet can also connect to a wide range of other networks, including privately operated ones like America
On Line, Prodigy, and Compuserve, plus hundreds of other special networks now in use throughout the world.
All you need is their IP, email account, or Web site address. As more and more users access the Internet problems
of speed, capacity, and reliability begin to crop up. These will be discussed later in the chapter.
The operating system most used by computers on the Internet is Unix. This system was developed by AT&T
Bell Labs. This system uses characters on a menu or command message to access files. For more detailed
information on Unix see [Dern, 1994].
The Internet has four major services: (1) electronic mail (email), (2) telnet, (3) file transfer protocol (FTP),
and (4) client/server connections. Discussion on each service follows.
1.Email—Probably the most used process on the Internet, email is a text transfer of messages from one
point to another. Email addresses will route a message anywhere in the world in seconds. Several email
programs are in use, from free shared systems such as Elm, Pine, Mailx, and Eudora. Recently some
? 2000 by CRC Press LLC
advanced features have been added to mail programs and many have been released at low cost. Eudora
Pro is an example. Email is a low-cost instant information carrier. It can be used internally or on the
Internet and will continue to expand in usage.
2.Telnet—This program allows the user to log onto other computers in distant locations and to operate
those computers from their own terminal, running systems or downloading data. This defines how
computers speak to each other for login applications. Of course, most computers require a password to
be able to access their information. The use of telnet to open other computers has spawned a rash of
hacking, which attempts to forge passwords for unauthorized access. These can be criminal acts and are
the very situations seen on occasional newscasts! Telnet is available on a public domain basis and can
operate with almost all computer hardware.
3.FTP—This allows you to transfer files from one computer to another or from one remote site to another
remote site. The user has the ability to download files from shareware servers or from private files using
a password for entry. FTP can download small files and huge databases. It is the primary method for
those doing research or fact finding to acquire massive amounts of information in a very short time. As
was mentioned previously, the time it takes to download files is directly related to the speed of your
modem, or direct connection. This can take a very long time in the case of large files.
4.Client/server—Much of the current use of the Internet is to share information. This can happen when
one computer accesses another that operates separately and serves information to the client who has
logged in. You request another computer to send files to you, the client. In the early days of the Internet,
most of these were text files only. One such text-based browse is Lynx, developed at the University of
Kansas for exploration of the documents on the Internet and the World Wide Web (www) Web, for
short. WWW is a system for finding and accessing Internet resources. The Web’s most innovative feature
is the ability to “point and click” on a text word or graphic to hypertext link you to another Web site
holding the information you request. This process allows you to move from one computer to the next
hop-scotching across the globe to find the information you seek. By using hypertext-based protocol, the
world is at your fingertips in an instant. The Lynx program is only text-based, but later developments
brought graphics to the Web search vehicles. In order to search the vast reserves of information, browsers
were developed. An early public domain browser, developed by the National Center for Supercomputing
Applications, is Mosaic. Mosaic is all you need for Web site access. Later, Netscape Navigator was
commercially developed with lots of bells and whistles for quick and easy access. There is a cost for
Netscape.
Send/Receive Capacity
Computers function using binary numbers. This series of 0 or 1 format exists at the smallest level as a bit. This
digital system is transmitted over modems or direct connections in a series of 8-bit packets called bytes. The
number of bits per second that can be transmitted or received equates to the speed at which you can send or
receive information over the Internet. This bandwidth of the transmission line is expressed in bits per second,
normally in metric form.
Early computer connects were made at 56 bits per second (56 bps). As the speed of machine and systems
improved, rates of transmission have increased to kilobits (kbs), megabits (mps), gigabits (gbs), and so on.
Early modems operated at 14.4 kbs (14,000 bps), more modern modems function at 28.8 kbs (28,800 bps).
Higher capacity “pipelines” include Integrated Services Digital Network (ISDN) lines that can now be installed
at home or business that operate at 56 kbs, direct Ethernet connections (a technology that can connect
computers at a 10 Mbps). Higher capacity lines such as T-1 (1.54 Mbs) and multiples of those, T-2, and T-3
lines are now being used for extremely high capacity systems. The T-1 and higher lines are very expensive to
install and maintain but offer extremely quick Internet work speed.
Login
In order to begin the process of logging in, you will need an account of some kind. This is established through
your service provider, which could be your own company or a commercial service such as Compuserve, America
? 2000 by CRC Press LLC
on Line, etc. If you are operating your own system, you’ll first need a TCP/IP plus a serial communications
protocol such as a Serial Line Internet Protocol (SLIP), Point to Point Protocol (PPP), or the like. If you access
one of these from your desktop computer you may start an email program, such as Eudora, without logging
in to your multiuser account. Your mail will be downloaded to your desktop, where you can read it, print it,
save it, or compose a new message. When you copy files from public acccess sites, your desktop system can
bring them directly to it. You can also use the full desktop visual capabilities of your system when attaching to
a Web site. If you are using a modem connection to another server/host, you’ll need to check the speed. From
Internet providers and accounts available you can select:
?full network sites
?dial in IP accounts
?telnet (long distance telephone service)
?public access accounts (terminal servers)
?commercial servers
Email and Web sites are identified by an address. On the Internet, address always refers to an electronic address.
The form is Userid, the name selected by the user, followed by the @ character, followed by the computer’s
name (all computers on the Internet have a specific name).
Example: ghawke@ukans.edu In this case “ukans” refers to the University of Kansas computer center. No
spaces are used in the address. The information after the “@” refers to a domain. There can be any number of
user names alike but each and every domain will have their own unique name.
After the userid –@– and domain name, there can be one or more sub-domains. In the example above, the
sub-domain is “edu” for educational institution. The sub-domains are listed with the most general information
about the domain computer being further to the right or end of the address and the most specific name being
to the immediate right of the domain name. Domains and their meanings are listed in Table 99.1.
Password
At this point of your login, you’ll be asked to create a password. This password is the key to your account and
the tighter you guard it, the more secure your system will be. Common passwords are a combination of letter
and number characters, usually eight or so in number. Obviously, these can be the subject of unauthorized
usage. The more creative the password, the more secure it will be.
The World Wide Web (WWW, Web)
The WWW has more Internet locations than any other resource. It serves as a huge reference book for the
world, with the added feature of hypertext links . Hypertext allows one to follow a topic line or reference idea
TABLE 99.1 Organizational Top-Level Domains
Domain Meaning
art Cultural and entertainment entities
com Commercial organization
edu Educational institution
firm Businesses or firms
gov Government
info Information services
int International organization
mil U.S. military
net Networking organization
nom Individual or personal nomenclature
org Non-profit organization
rec Recreational activity organizations
store Businesses offering goods to purchase
web WWW related activity organizations
? 2000 by CRC Press LLC
from one site to another, just by a point and “click” of a mouse. This link can take you to another page of the
site you initially addressed or it can automatically link you around the world to another computer with a totally
different Web site full of additional information. This is done through a computer program titled HyperText
Markup Language (HTML). This program will allow you to create your own Web site, or home page as they
are sometimes called, or connect your site to any others you wish to link.
With the millions of Web sites out there, the browsers we previously mentioned are invaluable in locating
the site you want. You may access these by topic name, individual name, address, or randomly. A list of searching
tools is provided in the Defining Terms section.
99.4 The Future
Obviously, the future of the Internet is as wide open as imagination itself. The author, therefore, can only
propose one person’s opinion. Those who have the vision and talent for the future needs of information and
services on the Internet will be the millionaires and experts in the years to come. There are a few areas that
current trends indicate will be open for expansion.
Advertising and Marketing
It seems clear that what is driving the expanse of the Internet’s development is directly linked to advertising
and marketing. When Netscape and Yahoo went public, the company founders became instant millionaires and
the value of those and other companies soared. Although theses two companies now charge for their software,
these search vehicles will create the majority of their income for advertising on their search pages and by the
sale of marketing research they can develop from the chronicling of data received from their visitors. Every
time one of these is accessed, computers can archive the visitor’s name and address, the sites they visited, the
time spent on each page, the links made to other sites and any purchases ordered. Advertisers can focus on the
exact customer profile they want in purchasing this information database or to advertise directly on the page.
There are huge dollars waiting to be spent on this form of advertising. The user of the Internet may feel they
are an independent wanderer through the garden of knowledge, with no forced direction and no guided path.
They should know, however, that the most popular search vehicles, most exciting Web site pages, and most
creative browsers will be paid for by advertising dollars. Their use of these sites will contribute to databases
designed to exploit these visitors.
One of the major reasons the Internet and, more specifically, the World Wide Web will increase in use is its
ability for interactive use by the public. This takes the form of game playing, research responses, banking,
entertainment, and purchases. Recent trade shows have unveiled incredible interactive games designed for all
ages that can be played over the Internet from Scrabble to Super Mario. The Web already contains hundreds of
sites that allow you to respond directly to research questions, interest levels and personal inquiry. There are
many sites that already involve banking and the ordering of goods and services. Obviously, the popularity of
these services is directly related to the public’s confidence in their security. Just as with Automated Teller
Machines, I believe this aspect of technology will be mastered on the Internet, although any code or security
system designed by one can be broken by another.
The entertainment side will grow rapidly. Movies on demand, archival information from existing print media
and traditional radio and TV will be available. In December of 1994, KJHK, the student FM radio station at
the University of Kansas, was the first station to provide a real time, live and continuous programming source
to the Internet. The on-air programming of the station can be heard anywhere in the world by attaching to
their Web site. There are many radio stations now “broadcasting” over the Internet and several commercial
software companies around to facilitate that use. On January 2, 1996, the University of Kansas provided a live
television signal to the Internet that could be viewed by computers connected to the Internet with 28.8 modems
or higher. These real time audio and video services will be used in all kinds of applications in the future. They
not only provide good quality and diverse choice, but can be delivered at very low costs since most long distance
telephone charges are not present.
The huge growth in the use of the Internet is even more amazing when one considers that the ownership of
personal computers is still rather low when compared with the entire population, although 1995 was the first
? 2000 by CRC Press LLC
year that the purchase of computers outpaced the purchase of television sets! The use of the Internet for email
will continue to increase. This will also take the form of video conferencing. The speed and low cost of both
of these systems make contact between family and student or between corporations and their clients a very
desirable advantage of the Internet.
No discussion about the Internet’s future would be complete without a quick look at the legal aspects. We
have already seen an attempt by the government to censor content on the Internet. The recent Telecommuni-
cations Act called for criminal penalties for certain obscene material provided to the Internet. This was struck
down by the Supreme Court, but look for more attempts to regulate this new media. In addition, the concerns
about intellectual property and copyright infringement are already being addressed. Many Internet users “use”
material on their Web sites without permission from their creators. This applies to music licenses for entertain-
ment, reprints of news stories and books, cartoons, artists creations, and copyrighted research. Be careful in this
area. The larger the pockets of the user, the more apt they are to be sued for copyright infringement. As the years
go by, you will see many new regulations and judicial decisions in favor of the creators of this material.
Finally, the anonymity for Internet users, the personal soap box it offers, and the ability to gather even the
most obscure interest groups together in the privacy of their very own home means a huge use of the Internet
for personal expression. This new technology will be as great, if not greater, an influence on world society than
television has been. Your predictions on its future are as good as mine.
Defining Terms
The following list of terms is based in large part from the published list compiled by Academic Computing
Services, University of Kansas, and is reprinted with their permission.
Anonymous FTP: Used to log into public access file sites and download files by logging in the user name
“anonymous”
Archie: A search system for locating publicly available files by anonymous FTP.
ARPA: The United States Advanced Research Projects Agency was the original source for the development of
a network to inter-connect computers.
ARPAnet: The original inter-connecting network that was the basis for the Internet.
ASCII: American Standard Code for Information Interchange. An industry-wide computer standard for the
encoding of numeric characters.
ASCII file: American Standard Code for Information Interchange. A file type where characters are stored as
a series of eight binary digits (A=01000001).
Buad rate: The primary signaling rate of a carrier. A 9600 “baud” modem transfers data at 2400 baud, but
the signal rate is 4 bits per cycle allowing for a transfer rate of 9600 bps. Baud and bps are used
synonymously but they not the same.
BBS: Bulletin board system. An electronic multi-user system that often includes a message database people
can login to and leave messages for a particular group.
binary file: A file in which all 8 bits of a byte are used to encode information. Binary is also a file transfer
type used for .zip and executable files in ftp.
BITNET: An academically oriented international network using a different protocol than the Internet,
although email may be exchanged via gateways. A typical BITNET address might look like joe@ukanvm.
bps: Bits per second.
Bridge: A connection using software or hardware to connect two segments of a network not necessarily using
the same protocol.
Browser: any program that reads hypertext. Mosaic, Lynx, and Netscape Navigator are browser clients used
to access World Wide Web sites.
Client: A software application that exists to extract some service from a remote server somewhere on the
network. (Think of your telephone as the client and the telephone company as the server).
Compression: A utility used on many platforms to make files smaller for transport. On a Mac common
compression formats are .sit (use Stuffit to uncompress) or .cpx (use Compact Pro to uncompress). On
a PC, .zip is common (use pkunzip to uncompress).
? 2000 by CRC Press LLC
Domain name server: A distribution database system for translating mnemonic computer addresses (like
kuhub.cc.ukans.edu into numeric addresses (like 129.237.32.1) and vice versa.
Domain name: The exclusive name assigned to a site on the Internet.
Email: Electronic mail. The exchange of messages between people on an electronic network.
Ethernet: A computer communications technology designed to connect computer systems together to form
local area networks (LANs). Ethernet transmits information at 10 million bits per second over different
physical media ranging from twisted pair wires to fiber optic cable.
Fetch: An easy to use public domain ftp program for the Macintosh.
FTP: File Transfer Protocol. The process of moving a file from one computer to another. The application
program that moves files using the file transfer protocol.
Gateway: Device that converts messages from one protocol to another allowing two different networks to
communicate.
Gopher: A menu-based system for exploring the Internet.
HTML: HyperText Markup Language. Used to define the various components of a World Wide Web docu-
ment. HTML tells Web browsers like Netscape how to display text.
Hypertext: Documents that contain links to other documents or other areas of the same document. Selecting
a link in a hypertext document automatically displays the second location.
IP: Internet Protocol. Allows a packet to transverse multiple networks to find a destination.
LAN: Local area network. A hardware/software combination that allows a group of computers in a limited
area to share resources.
Lynx: A cursor-based hypertext browser for exploring the Web. Developed at the University of Kansas by
members of the Distributed Computing Group of User Services.
Modem: A piece of equipment that connects a computer to a data transmission line (usually a telephone line).
Mosaic: An Internet navigating tool for exploring the Web.
Multiplexing: As it relates to the modem connection of computer, the ability to process on command while
waiting for another to “cue up” and wait for a connection to another site.
Netscape Navigator: An Internet navigating tool for exploring the Web, sometimes called Netscape.
NIC: Network Information Center. As close as the Internet gets to a central office.
Packet: A bundle of data. Data on the Internet is broken up into small chunks called packets. When packets
arrive at an addressed location, they are reassembled into the original data stream.
PPP: Point to point protocol. A format that allows a computer to use Internet protocols over a serial dial-in
connection.
Protocol: A definition of a formal process. For example, a communications protocol allows computers from
different manufacturers to talk to each other.
Public domain: A file is said to be in the public domain if it can be downloaded free without restrictions
such as shareware fees.
Router: A combined hardware/software system to transfer data between two networks that use the same
protocol.
Searching tools: Programs that aide you in finding the many Internet sites you wish to connect to, searchable
by name, subject, or category. Some of these are:
Archie: A toll for locating files on publicly accessible sites. The results of an Archie search are the names
and directories of files on anonymous ftp sites. Access Archie at: http://www.lerc.nasa.gov/Doc/archieplezht-
tpd.html
Finger: Designed to give information about a person with an account on a particular system. From the
system prompt enter the command: talk address
Gopher: A menu-based system for exploring Internet resources. Accessed files may be on an anonymous
ftp, library, or database that is accessible only with Gopher. To access Gopher:
http://www.cc.ukans.edu/cwis/ reference/gopher_ resources.html
WAIS: Access at: http://www.w3.org/hypertext/DataSources/WAIS/ByHost.html
Whois: Access from your multiuser account by entering the command: whois name
Server: A computer that provides files and other facilities to anyone with proper access and authorization.
? 2000 by CRC Press LLC
Shareware: Software that is distributed for use by the public. If found to be useful, a fee is expected by the
developer.
SLIP: Serial Line Internet Protocol. A protocol that allows a computer to use Internet protocols over a serial
dial-in connection.
TCP/IP: The Transmission Control Protocol/Internet Protocol. One of the protocols on which the Internet
is based.
Telnet: A terminal emulation protocol that allows someone to sign-on to a remote system on the Internet
and an application that implements the telnet protocol.
Terminal server: Provides dial-in access to basic services (i.e., telnet) for file transfer and Internet service via
PPP of SLIP.
UNIX: A popular operating system developed by AT&T/Bell labs. This is the major system by which Internet
servers are programmed. The most common user interfaces on the Internet are character-based menu-
choice or command-line interfaces to Unix systems.
vt100: A type of terminal made by Digital Equipment Corp. Many terminal emulation programs provide
vt100 emulation.
WAIS: Wide Area Information Services. A system for searching databases across the Internet.
Whois: An application used to access a directory of domain names and addresses using the Network Infor-
mation Center database. To access whois from a multiuser account enter the command: whois name. The
name may be a registered person, Internet host name, or an organization.
Web (WWW): World Wide Web. A hypertext-based system for finding and accessing Internet resources.
The following are Internet program locaters.
Archie for Macintosh: Via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac/comm.
Eudora: Commercial version email eudora-info@qulcomm.com. No charge version available via anonymous
ftp from sumex-aim.stanford.edu in the directory info-mac/comm or from ftp.qualcomm.com in the
mac/eudora directory.
PC Eudora: Available via anonymous ftp from ftp.qualcomm.com.
Fetch: Via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac or dartmouth.edu in the
pub/mac directory.
Gopher Book for Widows: gophbook.zip is available via anonymous ftp from sunsite.unc.edu. Directory
pub/micro/pc-stuff/ms-windows/winsock/apps.
PC Gopher for DOS: From sunsite.unc.edu pub/package/gopher/PC_client.
HGopher for Windows: Available via anonymous ftp from lister.cc.ic.ac.uk in the directory pub/wingopher.
TurboGopher: Via anonymous ftp from sumex-aim.stanford.edu in the directory info-mac/comm.
Mosaic: Via anonymous ftp from ftp.ncsa.uiuc.edu in the Mosaic/mosaic-binaries directory.
NCSA Telnet: Via anonymous ftp from sumex-sim.stanford.edu in the directory info-mac/comm or from
ftp.nsca.uiuc.edu in Mac directory.
MacPPP: pub/pp directory at merit.edu. Combine this with MacTCP to get your Mac directly on the Internet.
PC/TCP Plus for DOS: info@ftp.com.
MacTCP: Contact apda@applelink.apple.com.
InterSLIP: pub/sales directory at ftp.intercon.com.
MacSLIP: For information, e-mail infor@hdepark.com.
Super-TCP//NFS for Windows: tcp@frontiertech.com.
Talk for the Macintosh: Via anonymous ftp from mac.archive.umich.edu in the directory mac/util/comm.
WAIS-for-Mac: Via anonymous ftp from ftp/wais.com. Go to the file wais-for-mac-1.2-alpha.sea.hqx from the
directory pub/freeware/mac.
WinWAIS for Windows: wnwais21.zip is available via anonymous ftp from ridgisd.er.usgs.gov in the directory
software/wais.
WWW Browser for Macintosh: In the directory pub/www/bin/mac via anonymous ftp from infor.cern.ch.
WorldWideWeb Browser: Via anonymous ftp from info.cern.ch in the directory pub.www.bin.next.
? 2000 by CRC Press LLC
Related Topics
72.3 Local-Area Networks ? 92.2 Local Area Networks
References
Hahn, Osborne, and Stout, The Internet Complete Reference, New York: McGraw-Hill, 1994.
D. Sachs and H. Stair, Hands on Internet: A Beginning Guide for PC Users, Englewood Cliffs, N.J.: Prentice-Hall,
1994.
A. Glossbrenner, Internet 101: A College Student’s Guide, 2nd ed., New York: McGraw-Hill., 1995.
D. Dern, The Internet Guide for New Users, New York: McGraw-Hill, 1994.
B. P. Kohoe, Zen and the Art of the Internet, Englewood Cliffs, N.J.: Prentice-Hall.
E. T. L. Hardie and V. Neov, Internet: Mailing Lists, Englewood Cliffs, N.J.: Prentice-Hall.
? 2000 by CRC Press LLC