Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
The Generative Pattern 69<br />
<strong>the</strong>mselves. Layers facil<strong>it</strong>ate polyarchies, and <strong>the</strong> proprietary networks were<br />
hierarchies. 3<br />
The second design insight <strong>of</strong> <strong>the</strong> hourglass is represented by <strong>it</strong>s shape. The<br />
framers <strong>of</strong> <strong>Internet</strong> Pro<strong>to</strong>col did not undertake <strong>to</strong> predict what would fill <strong>the</strong><br />
upper or lower layers <strong>of</strong> <strong>the</strong> hourglass. As a technical matter, anyone could become<br />
part <strong>of</strong> <strong>the</strong> network by bringing a data-carrying wire or radio wave <strong>to</strong> <strong>the</strong><br />
party. One needed only <strong>to</strong> find someone already on <strong>the</strong> network willing <strong>to</strong><br />
share access, and <strong>to</strong> obtain a unique IP address, an artifact not intended <strong>to</strong> be<br />
hoarded. Thus, wireless <strong>Internet</strong> access points could be developed by outsiders<br />
w<strong>it</strong>hout any changes required <strong>to</strong> <strong>Internet</strong> Pro<strong>to</strong>col: <strong>the</strong> Pro<strong>to</strong>col embodied so<br />
few assumptions about <strong>the</strong> nature <strong>of</strong> <strong>the</strong> medium used that going wireless did<br />
not violate any <strong>of</strong> <strong>the</strong>m. The large variety <strong>of</strong> ways <strong>of</strong> physically connecting is<br />
represented by <strong>the</strong> broad base <strong>to</strong> <strong>the</strong> hourglass. Similarly, <strong>the</strong> framers <strong>of</strong> <strong>Internet</strong><br />
Pro<strong>to</strong>col made few assumptions about <strong>the</strong> ultimate uses <strong>of</strong> <strong>the</strong> network.<br />
They merely provided a scheme for packaging and moving data, whatever <strong>it</strong>s<br />
purpose. This scheme allowed a proliferation <strong>of</strong> applications from any interested<br />
and talented source—from <strong>the</strong> Web <strong>to</strong> e-mail <strong>to</strong> instant messenger <strong>to</strong> file<br />
transfer <strong>to</strong> video streaming. Thus, <strong>the</strong> <strong>to</strong>p <strong>of</strong> <strong>the</strong> hourglass is also broad. It is<br />
only <strong>the</strong> middle that is narrow, containing <strong>Internet</strong> Pro<strong>to</strong>col, because <strong>it</strong> is<br />
meant <strong>to</strong> be as feature-free as possible. It simply describes <strong>how</strong> <strong>to</strong> move data,<br />
and <strong>it</strong>s basic parameters have evolved slowly over <strong>the</strong> years. Innovation and<br />
problem-solving are pushed up or down, and <strong>to</strong> o<strong>the</strong>rs: Chapter Two’s procrastination<br />
principle at work.<br />
This same qual<strong>it</strong>y is found w<strong>it</strong>hin trad<strong>it</strong>ional PC arch<strong>it</strong>ecture. It greatly facil<strong>it</strong>ates<br />
<strong>the</strong> way that <strong>the</strong> overall network operates, although those joining <strong>the</strong><br />
debate on <strong>Internet</strong> openness have largely ignored this qual<strong>it</strong>y. Operating system<br />
designers like Micros<strong>of</strong>t and Apple have embraced <strong>the</strong> procrastination<br />
principle <strong>of</strong> <strong>the</strong>ir counterparts in <strong>Internet</strong> network design. Their operating systems,<br />
as well as Unix and <strong>it</strong>s variants, are intentionally incomplete; <strong>the</strong>y were<br />
built <strong>to</strong> allow users <strong>to</strong> install new code wr<strong>it</strong>ten by third parties. Such code could<br />
entirely revise <strong>the</strong> way a computer operates, which gives individuals o<strong>the</strong>r than<br />
<strong>the</strong> original designers <strong>the</strong> capac<strong>it</strong>y <strong>to</strong> solve new problems and redirect <strong>the</strong> purposes<br />
<strong>of</strong> PCs. 4 We could even sketch a parallel hourglass <strong>of</strong> PC arch<strong>it</strong>ecture<br />
(Figure 4.2).<br />
The PC can run code from a broad number <strong>of</strong> sources, and <strong>it</strong> can be physically<br />
placed in<strong>to</strong> any number and style <strong>of</strong> physical chassis from many sources,<br />
at least as a technical matter. (Sometimes <strong>the</strong> operating system maker may object<br />
as a strategic and legal matter: Apple, for example, has w<strong>it</strong>h few exceptions