17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Generative Pattern 69<br />

<strong>the</strong>mselves. Layers facil<strong>it</strong>ate polyarchies, and <strong>the</strong> proprietary networks were<br />

hierarchies. 3<br />

The second design insight <strong>of</strong> <strong>the</strong> hourglass is represented by <strong>it</strong>s shape. The<br />

framers <strong>of</strong> <strong>Internet</strong> Pro<strong>to</strong>col did not undertake <strong>to</strong> predict what would fill <strong>the</strong><br />

upper or lower layers <strong>of</strong> <strong>the</strong> hourglass. As a technical matter, anyone could become<br />

part <strong>of</strong> <strong>the</strong> network by bringing a data-carrying wire or radio wave <strong>to</strong> <strong>the</strong><br />

party. One needed only <strong>to</strong> find someone already on <strong>the</strong> network willing <strong>to</strong><br />

share access, and <strong>to</strong> obtain a unique IP address, an artifact not intended <strong>to</strong> be<br />

hoarded. Thus, wireless <strong>Internet</strong> access points could be developed by outsiders<br />

w<strong>it</strong>hout any changes required <strong>to</strong> <strong>Internet</strong> Pro<strong>to</strong>col: <strong>the</strong> Pro<strong>to</strong>col embodied so<br />

few assumptions about <strong>the</strong> nature <strong>of</strong> <strong>the</strong> medium used that going wireless did<br />

not violate any <strong>of</strong> <strong>the</strong>m. The large variety <strong>of</strong> ways <strong>of</strong> physically connecting is<br />

represented by <strong>the</strong> broad base <strong>to</strong> <strong>the</strong> hourglass. Similarly, <strong>the</strong> framers <strong>of</strong> <strong>Internet</strong><br />

Pro<strong>to</strong>col made few assumptions about <strong>the</strong> ultimate uses <strong>of</strong> <strong>the</strong> network.<br />

They merely provided a scheme for packaging and moving data, whatever <strong>it</strong>s<br />

purpose. This scheme allowed a proliferation <strong>of</strong> applications from any interested<br />

and talented source—from <strong>the</strong> Web <strong>to</strong> e-mail <strong>to</strong> instant messenger <strong>to</strong> file<br />

transfer <strong>to</strong> video streaming. Thus, <strong>the</strong> <strong>to</strong>p <strong>of</strong> <strong>the</strong> hourglass is also broad. It is<br />

only <strong>the</strong> middle that is narrow, containing <strong>Internet</strong> Pro<strong>to</strong>col, because <strong>it</strong> is<br />

meant <strong>to</strong> be as feature-free as possible. It simply describes <strong>how</strong> <strong>to</strong> move data,<br />

and <strong>it</strong>s basic parameters have evolved slowly over <strong>the</strong> years. Innovation and<br />

problem-solving are pushed up or down, and <strong>to</strong> o<strong>the</strong>rs: Chapter Two’s procrastination<br />

principle at work.<br />

This same qual<strong>it</strong>y is found w<strong>it</strong>hin trad<strong>it</strong>ional PC arch<strong>it</strong>ecture. It greatly facil<strong>it</strong>ates<br />

<strong>the</strong> way that <strong>the</strong> overall network operates, although those joining <strong>the</strong><br />

debate on <strong>Internet</strong> openness have largely ignored this qual<strong>it</strong>y. Operating system<br />

designers like Micros<strong>of</strong>t and Apple have embraced <strong>the</strong> procrastination<br />

principle <strong>of</strong> <strong>the</strong>ir counterparts in <strong>Internet</strong> network design. Their operating systems,<br />

as well as Unix and <strong>it</strong>s variants, are intentionally incomplete; <strong>the</strong>y were<br />

built <strong>to</strong> allow users <strong>to</strong> install new code wr<strong>it</strong>ten by third parties. Such code could<br />

entirely revise <strong>the</strong> way a computer operates, which gives individuals o<strong>the</strong>r than<br />

<strong>the</strong> original designers <strong>the</strong> capac<strong>it</strong>y <strong>to</strong> solve new problems and redirect <strong>the</strong> purposes<br />

<strong>of</strong> PCs. 4 We could even sketch a parallel hourglass <strong>of</strong> PC arch<strong>it</strong>ecture<br />

(Figure 4.2).<br />

The PC can run code from a broad number <strong>of</strong> sources, and <strong>it</strong> can be physically<br />

placed in<strong>to</strong> any number and style <strong>of</strong> physical chassis from many sources,<br />

at least as a technical matter. (Sometimes <strong>the</strong> operating system maker may object<br />

as a strategic and legal matter: Apple, for example, has w<strong>it</strong>h few exceptions

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!