Skip to main content

Full text of "Applications of Information Networks"

See other formats


CIJ: 32463 M 

Licklider, J.C.R. 

Applications of information networks 
Proceedings of the IEEI, v.66 (11) pp. 
1330-1346 


32%3 



1330 


£ 


PROCEEDINGS OF THE IEEE, VOL. 66 , NO. 11, NOVEMBER 1978 

Applications of Information Networks 

J. C. R. LICKLIDER member, ieee, and ALBERT VEZZA, member, ieee 


Invited Paper 


Abstract—The present and* projected applications of computer- 
communication networks or information networks include electronic 
mail, teleconferencing, “the office of the future,” management informa¬ 
tion systems, modeling, “computerized commerce,” monitoring of 
patients, military command and control, home security, education, and 
news. This paper briefly examines 30 such applications and the net¬ 
work capabilities they require. It presents a way of estimating the 
relative importance of various network characteristics and of predicting 
the suitability of a network or network architecture for a given set of 
applications. The paper then considers several issues that relate to the 
political, social, and economic impacts of networks. Among the issues 
are privacy, security, compatibility, impact on productivity, the roles of 
networks in international technology transfer and economic competi¬ 
tion, and the confluence or collision of the fields of computers and 
telecommunications. j 

I. Introduction 

HE SUBJECT of this paper is applications of networks. 
The networks involve the use of computers, but com¬ 
putation in the narrow sense does not necessarily domi¬ 
nate the applications. The scope of the paper includes, no less 
than computation, computer-based applications in which the 
main emphasis is on communication among people, on access 
to information, or on control of systems, organizations, or—to 
mention early one of the deepest though least imminent 
concerns—societies. The applications of networks that we shall 
examine include electronic message communication [ 1 ] —[4], 
electronic funds transfer [5], access to information, computer- 
based office work and “telework,” management of organiza¬ 
tions and command and control of operations, education, 
entertainment and recreation, reservations and ticketing, and 
several others. 

Some of the problems and issues in network applications are 
mainly technical and some are mainly nontechnical, but almost 
all are mixtures of the two, and in most of them the technical 
and nontechnical factors interact strongly. For example, the 
relative merits of circuit switching and packet switching are 
mainly a technical matter, but the fact that the electronic 
switching stations of the existing telecommunications “plant” 
are circuit switches surely is an economic factor in the circuit¬ 
switching/packet-switching issue. The determination of what 
should be the individual citizen’s right to informational privacy 
is mainly a nontechnical matter, but the pragmatics of pro¬ 
viding informational security, the technical basis for assurance 
of privacy, must enter the decision process. The national 
telecommunications plant-in-being of the U.S. figures strongly 
in many of these problems and issues and forces them to in¬ 
volve both technical and nontechnical factors. The plant is 
valued at something like $120 billion, and most of it was de¬ 
signed to carry analog voice signals, which are quite different 

Manuscript received March 10, 1978;revised July 7, 1978. 

The authors are with the Laboratory for Computer Science, Massa¬ 
chusetts Institute of Technology, Cambridge, MA 02139. 


in their spectral and temporal parameters and in their require¬ 
ments for error handling and security, from digital computer 
signals of the kinds that will flow through the networks of the 
future. Because of its inherent redundancy, speech remains 
intelligible even when mixed with considerable amounts of 
noise, but even a single undetected error—a single bit—can 
have extremely serious consequences in electronic funds trans¬ 
fer (EFT) or seriously degrade the performance of a network 
carrying enciphered information. 

One of the major motivations for networking is the need to 
share resources. The main resources that are often advantageous 
to share are communications facilities, computer facilities, and 
information itself. The design of a network can make it easier 
or more difficult to share resources and thus directly influence 
the amount of resource sharing that will occur. The amount 
of communication facilities sharing depends upon many design 
factors, all of which influence how well the network is able to 
allocate resources dynamically in response to changing needs 
and availabilities. Though the need for sharing certain types 
of computational facilities may diminish with the arrival of 
the age of the personal computer, it is not at all likely that the 
need to share resources will disappear altogether. Geographi¬ 
cally distributed users can share, through a computer network, 
the costly high-performance computers that are required to 
solve certain large computational problems. Even those using 
personal computers to satisfy the bulk of their computing 
needs may wish to avail themselves through a network of spe¬ 
cial software services provided by vendors—and they will cer¬ 
tainly wish to communicate with one another. 

The sharing of information is the most important type of 
resource sharing. The term “information sharing” immediately 
conjures up the thought of sharing large data banks of in¬ 
formation among many users, but that is only one aspect of 
information sharing. All the applications discussed in this 
paper have aspects of information sharing. Applications con¬ 
cerned with communications, management, commerce, govern¬ 
ment, protection, education, and awareness all involve sharing. 
The convenience and effectiveness with which sharing can be 
accomplished and the facility with which information can flow 
across the boundaries of individual application programs will 
have profound effects on how well the applications serve their 
intended purposes. 

Many problems and issues arise from the interaction of in¬ 
formation sharing with information security. For example, 
should EFT have a network or networks of its own to simplify 
the problem of providing secure transmission, processing, and 
storage of funds data, or should EFT messages be carried over 
a general-purpose network so that a reservations and ticketing 
operation can be completed in a single transaction involving 
the traveler’s organization, the airline and the bank. 



0018-9219/78/1 100-1330S00.75 © 1978 IEEE 


iiLICKLIDER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


1331 


m 


II. Applications 


F" In the context of information networks, just as in the con¬ 
text of computer systems, an application is essentially the im¬ 
plementation of a purpose. Applications, like purposes, may 
be defined narrowly or broadly. When the airlines began to 
develop computer-based reservations systems and formed a 
consortium, ARINC, to interconnect several of their systems, 
the application was narrow: airline reservations. Now, after 
. years of growth and augmentation, one can rent a car, reserve 
a hotel room, and arrange to be greeted with flowers and 
mariachi music. The broadened application might be defined 
as reservations and ticketing for almost anything that flies to 
or can be purchased at a distant place. One can project the 
broader definition into the future and envision a general reser¬ 
vations and ticketing application, operating in a nationwide 
or worldwide common-carrier network, through which anyone 
could examine the availability of, and reserve or buy a ticket 
to, almost anything in the broad class to which reservations 
and tickets apply. But, of course, there is no reason to stop at 
that particular class. One can expand the scope further and 
arrive at “computerized commerce,” dealing with the wHole 
gamut of things that can be bought and sold. The very broadly 
defined application would include advertising, dynamic pricing, 
and computer-based purchasing strategies. It might even make 
a place for cartels of suppliers and cooperatives of consumers. 
No doubt there would be vigorous competition among several 
or many offerers of the application, and perhaps one can 
imagine even a “meta-market,” an over-arching system that 
interconnects and integrates the competing “computerized 
commerce applications.” 

In any event, that introduces -the notion of applications of 
information networks. It might serve to introduce, also, the 
notion of issues, which involve the interplay of the opportunity 
and the threat aspects of applications. It is not difficult to 
imagine the mischief that could be played by pranksters or 
dissidents in a poorly protected, ,-publicly accessible, nation¬ 
wide reservations system. 

A. Basic Applications 

Computer-communication networks perform three basic 
classes of operations upon information: transmission, process¬ 
ing, and storage. The earliest recognized applications of net¬ 
works were essentially separate exploitations of the three basic 
classes of operations. Transmission of information through a 
network from a program in one computer to a program in 
another, of course, requires some processing and some storage 
(memory), but in simple message communication and file 
transfer interest is focused sharply on transmission. In every 
practical computer, processing requires storage (memory or 
registers), but in early time-sharing services such as Quiktran 
[6] —[8], which when introduced did not provide intersession 
file storage, the (dial telephone) network application was 
essentially access to processing. In the Datacomputer [9] 
service available through the ARPANET [10] —[ 12], although 
processing is involved in both storage and retrieval, one of the 
main applications is essentially access to storage in and of it¬ 
self: the Datacomputer is a place to park bits. 

A fourth essential network function combines the basic 
transmission, processing, and storage operations to provide 
access to information—with the focus of interest on the in¬ 
formation itself, rather than on any of the three basic ele¬ 
mentary operations. 


Simple message communication and file transfer, access to 
time-shared processing, access to storage, and access to in¬ 
formation are important as well as fundamental network func¬ 
tions, but they are no longer typical of the activities or services 
we associate with the term “application.” In present-day 
parlance, “application” suggests something more highly differ¬ 
entiated and specialized and closer to some specific task or 
mission. 

B. Communication Applications 

In the developmental history of the ARPANET, electronic 
message service was a sleeper. Even before the network in¬ 
cluded a dozen computers, several message programs were 
written as natural extensions of the “mail” systems that had 
arisen in individual time-sharing systems in the early 1960’s. 
By the Fall of 1973, the great effectiveness and convenience of 
such fast, informal message services as SNDMSG [13] had 
been discovered by almost everyone who had worked on the 
development of the ARPANET—and especially by the then 
Director of ARP A, S. J. Lukasik, who soon had most of his 
office directors and program managers communicating with 
him and with their colleagues and their contractors via the net¬ 
work. Thereafter, both the number of (intercommunicating) 
electronic mail systems and the number of users of them on 
the ARPANET increased rapidly. 

lj Electronic Mail, Electronic Message Systems: It soon be¬ 
came obvious that the ARPANET was becoming a human- 
communication medium with very important advantages over 
normal U.S. mail and over telephone calls. One of the ad¬ 
vantages of the message systems over letter mail was that, in 
an ARPANET message, one could write tersely and type im¬ 
perfectly, even to an older person in a superior position and 
even to a person one did not know very well, and the recipient 
took no offense. The formality and perfection that most 
people expect in a typed letter did not become associated with 
network messages, probably because the network was so much 
faster, so much more like the telephone. Indeed, tolerance for 
informality and imperfect typing was even more evident when 
two users of the ARPANET linked their consoles together and 
typed back and forth to each other in an alphanumeric con¬ 
versation. Among the advantages of the network message 
services over the telephone were the fact that one could pro¬ 
ceed immediately to the point without having to engage in 
small talk first, that the message services produced a pre- 
servable record, and that the sender and receiver did not have 
to be available at the same time. A typical electronic mail 
system now provides a rudimentary editor to facilitate prepa¬ 
ration of messages, a multiple-addressee feature to make it 
easy to send the same message to several people, a file-inclusion 
scheme to incorporate already prepared text files into a mes¬ 
sage, an alerting mechanism to tell the user that he has new 
mail in his mailbox, facilities for reading received messages, 
and a “help” subsystem. The prospects of electronic mail ap¬ 
pear to have caught the attention of computer manufacturers 
and software and time-sharing firms as well as telephone com¬ 
panies, national telecommunication authorities, and the U.S. 
Post Office—and most of them now seem to be planning, de¬ 
veloping, or even offering some kind of electronic mail service. 

Even before electronic mail was well established, it had be¬ 
come apparent that users would need computer aids for 
scanning, indexing, filing, retrieving, summarizing, and re¬ 
sponding to messages. Indeed messages are usually not isolated 
documents but documents prepared and transmitted in the 


1332 


PROCEEDINGS OF THE IEEE, VOL. 66, NO. 11, NOVEMBER 


course of performing complex activities often called “tasks.” 
Within task contexts, messages are related to other messages 
and to documents of other kinds, such as forms and reports. 
It seems likely that we shall see a progressive escalation of the 
functionality and comprehensiveness of computer systems that 
deal with messages. If “electronic mail” refers to an early 
stage in the progression, “electronic message system” is appro¬ 
priate for a later stage and “computer-based office system” or 
some comparable term for the stage of full integration. At 
some intermediate point, message service will no doubt be 
blended with direct user-to-user linking to provide for delay- 
free conversation whenever both sender and receiver are on-line 
at the same time an3 prefer conversation^ sequential ex¬ 
change of messages. 

2) Duologue and Teleconferencing: Although there has not 
been, .thus, far, very much use of networks for one-on-one 
interaction between users, it seems likely that some kind of 
computer-augmented two-person telephone communication 
will one day be one of the main modes of networking. In 
order to displace the conventional telephone, “teleduologue” 
will probably have to offer speech, writing, drawing, typing, 
and possibly some approximation to television, all integrated 
into a synergic pattern with several kinds of computer support 
and facilitation. The two communicators (and their supporting 
programs) will then be able to control displays in certain 
areas of each other’s display screens and processes in certain 
sectors of each other’s computers. Throughout a duologue, 
each communicator will be advised by his own programs and 
will use information from his own data bases and other sources 
accessible to him. The effect will be to provide each com¬ 
municator with a wide choice of media for each component of 
his communication and with a very fast and competent sup¬ 
porting staff. 

A teleconference [14]-[17] is an organized interaction, 
through a communication system or network, of geographically 
separated members of a group. The term “teleconference” has 
been used recently mainly to refer to interactions organized 
or presided over by or with the aid of programmed computers. 
In some teleconferences, the members of the group participate 
concurrently; in others, each member logs in when it is con¬ 
venient for him to do so, reviews what has happened in his 
absence, makes his contribution, and logs out, perhaps to re¬ 
turn later in the day or later in the week. 

During the last five years, a considerable amount of experi¬ 
ence has been gained with computer-facilitated teleconfer¬ 
encing, but it is evidently a complex and subtle art, and 
teleconference programs still have a long way to go before 
teleconferences approach the naturalness of face-to-face inter¬ 
action. On the other hand, we note the inefficiency of travel¬ 
ing to meetings and the inefficiency of letting one participant 
take up the time of n - 1 participants when only m < n - 1 
are interested in what he is saying. As teleconferencing is per¬ 
fected (especially n'onconcurrent teleconferencing), it will be¬ 
come an extremely important technique. 

C. Neopaperwork 

“Office automation,” “computer-based officework,” “the 
high-technology office,” and a few other such phrases refer to 
the aggregation and integration of several applications of com¬ 
puters and networks in office work. (“Automation” is in¬ 
tended in its weak sense, which includes computer “aiding” 
and “semi-automation.”) Office automation includes every¬ 


thing presently called “word processing” (dictation, docun 
preparation, etc.) plus computer-based filing (informs 
storage and retrieval), communication (electronic mail, t 
tronic message services, duologue, teleconferencing), 
modeling (simulation), and it connects with electronic fu 
transfer, management information systems, and parts—if 
all—of computerized commerce. 

Office automation is expected to make heavy use of ; 
Works, both local and geographically distributed. Much of: 
work is organized in an approximately hierarchical mam 
with component desk functions such as transcription, editi 
filing, retrieval, scheduling, and telephone answering at 1 
echelons and corporate or divisional functions such as planni: 
marketing, operations, and public relations at high echelo 
Low-echelon functions typically are carried out locally, witl 
a single office or suite of offices, and, when low-echelon fui 
tions are supported by minicomputers or microcompute 
local networks will be required in their integration, 
geographically distributed organizations, of course, geograpl 
cally distributed networks will be required as higher level fur 
tions are integrated. 

1) Telework: Networks will make it possible for people 
do informational work effectively at locations remote fro 
their managers, their co-workers, the people who report 
them, and, indeed, even from customers and clients with who; 
they must interact. Such telework will require facilities fc 
duologue, teleconferencing, and all the other aspects of offic 
automation—but little beyond what automation of a nondi: 
persed office will require. 

Telework will offer the possibility of saving the hours anc 
the energy spent in commuting. It may burden some familie: 
with more togetherness than was contracted for through the 
marriage vows (“for richer or poorer, but not for lunch”). But 
its strongest impact on individual lives will surely be felt by 
persons immobilized by prolonged illness, physical handicap, 
or children. For many of them, networks will open many 
doors—including the door to gainful employment. 

2) Augmentation of the Intellect: The at-a-distance aspect 
of computer-based work that is emphasized by the term “tele¬ 
work” will be overshadowed, in the opinion of many, by what 
Engelbart [18]-[21] has called “augmentation of the in¬ 
tellect.” Computers will help people do informational work 
faster and better by providing fast and accurate tools to 
supplement such slow and fallible human functions as looking 
up words in dictionaries, copying references for citation, 
stepping through checklists, and searching for matching pat¬ 
terns. Augmentation is needed at levels that range from 
A) helping poor typists who cannot spell to put out neat and 
accurate reports, to Z) improving the content and style of top- 
level policy statements. Expectations differ concerning the 
prospect for significant early contributions from artificial in¬ 
telligence, but it is clear that relatively unsophisticated aug¬ 
mentation systems can make major contributions. Consider 
the help provided by descriptor-based and citation-index-based 
information retrieval systems to a person looking for refer¬ 
ences pertinent to a particular fact or concept. Or consider 
the impact that would be made, on writing such as this, by a 
text editor that automatically displayed the Flesch Count [22] 
of every paragraph it helped compose. 

3) Task Management and Coordination: In addition to help¬ 
ing the individual worker, computers will facilitate teamwork. 
Each office task will have its planned course of actions, in- 


1333 


LICKL1DER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


volving particular workers at particular projected times. A 
:: computer-based task management system will monitor the 
task as it moves along the course, checking the actions as they 
are taken, arranging that planned coordinations and approvals 
are obtained, and revising the plan (or calling for human help) 
when the schedule slips. In the early days of office automa¬ 
tion, the task management process will be mainly a matter of 
maintaining orderly work queues for the office workers and 
displaying for them at each moment 1) what needs to be done 
and 2) the information needed in doing it. What will need to 
be done will usually be, of course, to solve a problem or to 
make a decision—ritost of the preliminary work will have been 
performed automatically by computers. With the passage of 
time, as people come to understand the problem-solving and 
decision-making processes and the supporting.information in 
programmers’ terms, computers will chip away at the problem¬ 
solving and decision-making substance of office work, but we 
expect the now-rising wave of office automation to succeed or 
fail on the measure of its help to human workers and to 
human teamwork. 

D. Management Applications 

Office automation will have its impact upon management, 
of course, as well as upon the office workers. Manage/nent 
deals almost exclusively with information. (Money is essentially 
information, of course.) The comptroller’s department was 
computerized early. Electronic funds transfer will be a major 
application of special-purpose, limited-purpose, or general- 
purpose networks. On-line financial services may burgeon. In¬ 
ventory, ordering, production, pricing, and planning will all be 
interrelated with the aid of networks and computer modeling. 

1) Management Information Systems: The widespread feel¬ 
ing of disappointment in the management information systems 
(MIS’s) [23]-[26] of the 1960’s and early 1970’s had, we be¬ 
lieve, a simple basis: the activities that generated the informa¬ 
tion required to support management decision making had not 
yet been brought on line to computers, and, therefore, the re¬ 
quired information was not available to the management in¬ 
formation systems. To some extent, information important 
to the manager is so global in scope that capturing it all on 
line is still not possible. (It was not worthwhile to keypunch all 
the basic operating data just to feed them into the manage¬ 
ment information system, for only a small fraction of the 
totality would ever be used. It was impossible to anticipate 
just what subsets or aggregations of the basic operating data 
would be required.) As soon as all the informational activities 
involved in operating an organization are on line, however, the 
basis for an effective management information system will 
exist. A few organizations are already approaching that state, 
but most are just entering—or just beginning to contemplate— 
office automation. 

Local and geographically distributed networks will make it 
possible, at a cost, for top management to access all the facts 
and figures involved in the minute-to-minute operations of a 
business. Top management should resist the temptation to 
convert that possibility into actuality. The principle that 
looks best at present is to let the data of a corporation reside 
where the managers most conversant with them reside (“keep 
the data near the truth points”) and to have conversant man¬ 
agers “sign off” on the release of data upwards in the corpo¬ 
rate tree. Certain data should be abstracted and moved upward 
according to preset schedules; other data may be queried from 


above—but queried through an authenticating release process. 
Of course, the release process may in some instances be medi¬ 
ated by programs operating on behalf of the human conversant 
manager rather than by the human conversant manager himself 
or herself. 

The foregoing discussion pertains, indeed, to most of the 
data management functions in office automation. In dis¬ 
tributed organizations, data will be distributed, and one of the 
main uses of networks will be to move data from points of 
residence to points of use. 

2) Modeling and Simulation: Computer-based modeling and 
simulation are applicable to essentially all problem solving and 
decision making. At present, however, modeling and simula¬ 
tion are computer applications much more than they are net¬ 
work applications—and they are far from ubiquitous even as 
computer applications. 

The trouble at present is that most kinds of modeling and 
simulation are much more difficult, expensive, and time con¬ 
suming than intuitive judgment and are cost-effective only 
under special conditions that can justify and pay for facilities 
and expertise. But those are prime conditions for resource 
sharing and, hence, networking. Whereas very large organiza¬ 
tions will be able to afford their own concentrations of facili¬ 
ties and expertise, small organizations will not. As management 
grows tighter and more sophisticated, therefore, there may 
come to be a place for management consultation and service 
firms that specialize in modeling and simulation and offer very 
large or special facilities—and deliver their products through 
networks. Perhaps a glimpse of such a future has been given 
by the large array-processing computer, Illiac IV [27], [28], 
which has been used through the ARPANET in modeling the 
world climate and the space shuttle. Similarly, MIND [29], a 
system accessible through a value added packet network, is 
being used to design communication networks. 

E. Commerce 

Shifting our attention from activities within an organization, 
such as a business firm, to interactions among organizations, 
we can see another kind of application for networks. 

1 ] Electronic Markets: Networks will serve as marketplaces, 
providing meeting grounds for buyers and sellers. At first, 
networks will displace telephone and mail, which now serve 
the marketplace function for most businesses. Later, networks 
will begin to displace stock exchanges and commodity markets. 
Ordinary office automation and funds transfer facilities will 
adequately support negotiations and transactions when the 
“commodities” bought and sold are purely informational or 
sufficiently specifiable by words and figures. Wide-band facili¬ 
ties for examining products at the time of purchase (“squeezing 
the grapefruit”) may extend the scope of the electronic market¬ 
place to commodities that must be selected or approved in¬ 
dividually by prospective purchasers. We can expect networks 
to go beyond the role of the mere place or medium for trans¬ 
actions and, with the aid of sophisticated programs, actively 
to “make a market” in the sense that certain stock brokers 
make markets in certain stocks. 

2) Computerized Commerce: Computerized commerce [30] 
is based on the idea of electronic markets. It goes beyond pro¬ 
viding a marketplace and making a market—and back into the 
primary motivation of the business firm—by using computers 
to develop and carry out the strategies and tactics of buying 
and selling. The concept of computerized commerce is appli- 



IflCKLIDER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


: 133 ** 


5 *¥- 

* 5 ’ 




If 




jmiactice [34], [35]. Human expert consultation will, of 
Pfcouxse, be available to supplement the computer knowledge 
biases, but considerations of cost and availability will almost 
Isurely favor the computer. Difficult problems of legal re¬ 
sponsibility and liability may have to be solved: advice from a 
^knowledge base may be similar to advice from a book, but a 
|| knowledge-based program that controls the administration of 
an anesthetic would appear to introduce a new factor. 

Possibly even more far reaching in its implications than 
. access to medical knowledge bases by physicans is access to 
jjf- medical knowledge bases by ^laymen. Knowledge bases for 
IT laymen would have to be quite different in content and pack- 
aging from knowledge bases for physicians, and ideally the 
two applications would complement each other. The layman- 
oriented application might deal mainly with the complaints 
not ordinarily taken to a doctor or with the decision process 
that determines whether or not to seek a physician’s help. In 
either case, if the knowledge-base program had access to the 
individual’s medical record, and if it could make simple 
observations such as temperature and pulse rate through the net¬ 
work, it could go rather far beyond the limits of the conven¬ 
tional book of medicine for the layman. Society should ex¬ 
amine such incursions by the computer into medicine ?r even 
paramedicine very carefully before making up its collective 
mind about them. They obviously mix benefits with dangers. 
Unfortunately, they tend to be approached with prejudice. 

G. Government Applications 

Actual and potential government applications of networks 
include military command and control, communications, 
logistics, acquisition and interpretation of intelligence data, 
dissemination of intelligence, law enforcement, delivery of 
government services such as Social Security benefits to citizens, 
knd converting the paperwork of the bureaucracy into bits. 
Paperwork in the government is rather like paperwork in the 
private sector, but earned a step or two further into detail. 
The other government applications, on the other hand, seem 
rather special. Military command and control, communica¬ 
tions, intelligence, and to a considerable extent logistics sys¬ 
tems’must be able to operate fast, move fast or hide, and 
function in the presence of physical (as well as other) counter¬ 
measures. Law enforcement information systems are in some 
ways like highly amplified credit reference systems: derrogatory 
information seems especially crucial, for to be forewarned is to 
be forearmed, and action must often be taken on the basis of 
whatever data can be assembled in a few seconds. Serving all 
the citizens and collecting taxes from most of them requires 
that certain personal data be held about almost everyone- 
enough in sum to make a several-trillion-character data base 
that at least conceivably could be subverted to political or 
economic exploitation. There are strong lessons about govern¬ 
ment applications of networks in the recent rejection by the 
Office of Management and the Budget (OMB), at the well- 
timed suggestion of several members of Congress, of the pro¬ 
posed new Tax Administration System of the Internal Revenue 
Service 

1) Military Command and Control and Military Communica¬ 
tions: Military command and control and military communi- 
•••: »•.-*•-» ' r ' t, VC'lC ' ,r ^ic 5 it'0 T !S. Both interactive 


?nu n'.ar.v * . ac .au 


works. For reasons we do not fully understand— since.fasti 
response to a changing situation is the essence of command;.: 
and control-the World-Wide Military Command and Control; 
System (WWMCCS)- is actually not very interactive, aud its " 
computers, which use the GECOS operating system [36] do- 
signed for batch processing, are not interconnected by an elec¬ 
tronic network. But surely WWMCCS will in due course be-up¬ 
graded. Autodin II is under development and will supplement 
or replace Autodin I [37], the Department of Defense’s present 
store-and-forward digital telecommunications network, with a 
modem packet-switching network based on modified and 
secured ARPANET technology. Networking is being pursued 
actively, also, in the intelligence community. One of the most 
significant possibilities for the military that is opened up by 
advances in information technology is the achievement of a 
much tighter coupling between intelligence and command and 
control. One can envision a reduction in the time required for 
the distribution of intelligence information from days or hours 
to minutes or seconds. Such an advance would, of course, put 
pressure on intelligence gathering and processing to operate on 
faster time scales. 

2) Military Logistics: There is less progress, but also less 
pressure, in the logistics area, where more than 20 large batch 
inventory systems can be counted, diverse in respect of hard¬ 
ware, programming language, and data management system. 
Over the coming years, however, even the logistics situation 
will probably be brought under control and onto a network. 
The overall objective is to make the entire operation of a mili¬ 
tary effort responsive to coherent hierarchical command in the 
fight of valid and current intelligence-with security against 
enemy actions and countermeasures. 

3) The Network of the National Crime Information Center 
(NCIC): The NCIC is operated by the FBI and connects with 
state and local police units in most of the states. The NCIC 
contains, among other things, data on stolen cars and stolen 
license plates and the police histories of convicted criminals. 
The case of the NCIC network is an interesting study because, 
in it, the informational needs of the police and the information- 
providing capabilities of computers and telecommunications 
run head-on into Congressional concern for the right of in¬ 
formational privacy. When a police officer stops a speeding 
car and approaches it to make an arrest, he would like to know 
something about the car and driver. Is the car stolen? Does 
the owner have a history of resisting arrest? Forewarned is 
forearmed. About two years ago, however, an innocent man 
was killed by an arresting officer forearmed by forewarning 
with incorrect information. In the most recent chapter, the 
Senate Committee on Government Operations caused to be 
rejected the NCIC’s request for permission to acquire a message- 
switched network to speed up communication with state and 
local police. 

4} Social Security: In the U.S., the Social Security Adminis¬ 
tration (SSA) distributes more than $100 billion a year to 
more than 20 million people and interacts with millions of 
clients each year through about 1300 offices manned full-time 
and 3000 manned part-time. The set of computer processible 
data bases that support SSA operations contains more than a 
trillion characters, and it is estimated that in those operations 
-far several trillions of characters flow from one location 
, u - a tenth of a trillion by a network and process- 
vvrlr*’.- DARS system,” and the rest mainly 


1336 


PROCEEDINGS OF THE IEEE, VOL. 66, NO. 11, NOVEMBER 1978 


In 1976, the SSA began planning the modernization of the 
process through which it discharges its massive responsibilities 
[38], The new process will make even heavier use of com¬ 
puters than does the present one and there will be much con¬ 
sultation and updating of central or regional data bases from 
local offices. (The present process requires several computer 
areas, each with multiple mainframes, more than a hundred 
disk drives, and more than a hundred tape drives—and, in all, 
approximately 400 000 magnetic tapes.) The new communica¬ 
tion subsystem will, therefore, be a network of very major 
proportions, probably a dedicated SSA network operated by 
the General Services Administration or (improbably in the near 
term) a part of an even larger and more comprehensive net¬ 
work. Most technologically developed countries will sooner 
or later have social security networks. 

- H. Protection 

If military, intelligence, and police networks are reckoned 
as networks for protection, then protection is a very large 
category of network applications. There is another member 
of the class that deserves mention. i? 

1) Home and Neighborhood Security: Several of ihe pro¬ 
jected applications of computers in the home relate tojsecurity: 
sentry against intrusion, fire, and gas and water leakage, moni¬ 
toring the well-being of the elderly and infirm, and “electronic 
babysitting.” In most of these applications, computers will 
be better at detecting trouble than in correcting it, and there 
will be a strong requirement for communication with remote 
persons or agencies. At present, some burglar alarms are con¬ 
nected by dedicated lines to central security offices or police 
stations and some “dial up” in the event of trouble. If a packet 
network were available, it would probably be less expensive 
; and it would provide a wider range of options, including absent 
members of the family, friends, and neighbors as well as se¬ 
curity companies and public agencies. 

It seems possible that a neighborhood communication 
medium (with a broader fan-out or faster sequencing of calls 
than the telephone) might be just what is required for the 
elderly to help one another achieve a higher level of security 
and peace of mind. CB radio or house-to-house (or apartment- 
to-apartment) wiring or a multipurpose packet network could 
provide the medium. 

Probably just conversation of the kind that prevails on CB 
radio interconnections would go a long way, but it could be 
reinforced by slightly higher technology. Home computers 
could be programmed to interpret a variety of indicators of 
trouble—the sound of a fall, too long a flow of water, the re¬ 
frigerator door open, prolonged quiescence-and to ask for an 
“all’s well” report whenever there was cause for concern. Fail¬ 
ing to be satisfied that all was indeed well, the computer could 
call for help. It would have a list of participating neighbors 
and a schedule of probable availability for each, and—by com¬ 
municating with their home computers—it could quickly find 
someone to look in and check, or provide assistance. It has 
been suggested that a neighborhood net could monitor its 
clients while they were walking on the sidewalks as well as 
while they were at home, and a small device has been demon¬ 
strated that sends out a radio signal when its wearer falls 
down—or for some other reason becomes horizontal [31]. If 
neighborhood networks existed, there would probably be no 
end of inventions to exploit them in the interest of security: 
heartbeat monitors, breathing monitors, footstep sensors, and 
so on. And if the present trend of population statistics con¬ 


tinues, security applications might constitute a significant 
sector of the network application pie. 

I. Education and Awareness 

Beginning with the last section and continuing now into this 
one, the focus of interest has moved from the organization-or 
the individual as a member of an organization—to the in¬ 
dividual as an individual in the primary family group in the 
home. Probably the most important network prospects for 
the individual in this century lie in education and training. 

1) Computer-Based Education and Training: We assume 
that advances in computer representation of knowledge and in 
computer mediation of interactions between people and 
knowledge bases will advance computer-based education and 
training far beyond the “expensive page turners” and drill and 
practice routines that are associated in many minds with the 
term “computer assisted instruction.” We assume that knowl¬ 
edge bases accessible through networks will eventually accumu¬ 
late more knowledge, in each of many fields of learning, than 
typical teachers are able to master and retain, and that the 
knowledge in the knowledge bases will be well organized (by 
experts in each field) and effectively accessible to students at 
all levels of mastery and aptitude. However, computer-based 
techniques for the representation, organization, and exploration 
of knowledge are at present still topics of research-and even if 
they were fully developed today, it would still take a decade or 
two to translate the content of the many fields of learning into 
computer-processible knowledge bases. During the coming 
years, therefore, application of networks in the area of 
computer-based education and training will be preliminary and 
propaedeutic. Perhaps toward the end of the century it will 
approach its ultimate volume and significance-and be among 
the top three or four uses of networks. 

2) News: At present, most people gain their awareness of 
what is going on in the world mainly through mass media that 
report on events rather than processes, that select a few news 
items instead of covering the news, and that give everyone, 
regardless of his or her interest pattern, the same few selec¬ 
tions. Networking has the potential of changing the news into 
a multidimensional dynamic model of the world that each in¬ 
dividual can explore in his own way, selecting for himself the 
topics, the time scales, the levels of depth and detail, and the 
modes of interrogation and presentation. Interest profiles and 
other techniques of selective dissemination may play im¬ 
portant roles, but networking in principle removes the neces¬ 
sity of disseminating (with its implication that the initiative 
lies mainly with the transmitter) and opens the door to self- 
directed exploration and investigation by the receiver of the 
news. To provide the multidimensional dynamic model for 
exploration and investigation would, of course, be a demand¬ 
ing responsibility for the gatherers and organizers of news, but 
they gather and organize much more even now than they print 
or (especially) broadcast. There will probably be a long slow 
evolution from the newspaper/newsmagazine format and the 
nightly news format through increasing levels of user initiative 
toward truly user-dominated interaction with a whole-world 
knowledge base. 

III. Requirements Imposed Upon Networks 
by Applications 

Now that we have sketched out several applications we 
should examine briefly the network characteristics they re¬ 
quire. The applications do not all require the same network 
characteristics, of course. One application may require one 





JCKLIDER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


1337 


Rttttero of characteristics, while another application may re- 
Kjpire another pattern. Some of the frequently required char- 
gacteristics are the following. 

g-; 1 ) Bidirectional Transmission: Most applications require 
»two-way communication—if not the capability of sending and 
^receiving simultaneously (full duplex), then at least the capa- 
i bility of alternating between sending and receiving (half duplex). 

2) Freedom from Error: One wrong bit may completely 
| change the meaning, especially if numerical data are repre- 
•isented nonredundantly. In such cases, even though the basic 
^communication channel itself is ijot error free, the end-to-end 
I communications must be made error free through the use of 

adequate error handling mechanisms. 

3) Efficiency Despite Burstiness: A source that transmits 
short bursts of information and is quiescent between bursts 
typically does not wish to pay for channel time while it is 
quiescent. Both human beings and computers are bursty 
sources. 

4) Low Cost per Bit: The cost of network service depends, 
of course, upon many nontechnical factors as well as upon the 
technical efficiency of the network in converting its resources 
into services. But technical efficiency is a very strong and 
basic factor. This characteristic refers to the cost of trans¬ 
mitting one bit from source to destination. The relation of 
cost to distance is considered separately. 

5) High Connectivity: A source may need to transmit, to any 
one or more of many destinations. A destination (i.e., user) 
may need to examine many sources. 

6j High Information Rate: Wide-band channels are capable 
of transmitting many bits per second. The criteria for “high,” 
“wide,” and “many” vary widely with type of signal and level 
of expectation. The 50 000-bits/s information rate of most of 
the ARPANET channels seems like a high information rate for 
ordinary interactive computing, but it is too low for con¬ 
venient transmission of large files (e.g., high-resolution photo¬ 
graphs) and far too low for moving pictures, even low-resolution 
television pictures. 

7) Security: Security is a complex of characteristics, some 
of which provide the technical basis for the protection of 
privacy. Others have to do with preventing disruption of 
service and protecting against fraud and theft. 

8) Privacy: In the U.S., this complex of informational 
rights, including but by no means limited to protection against 
eavesdropping, has been formulated by the President’s Com¬ 
mission on Privacy and, to a considerable extent, expressed in 
legislation in the Privacy Act of 1977. Other nations also have 
privacy laws, of course, some of them in some respects more 
stringent than ours. 

9) Authentication: A good authentication scheme provides 
the electronic equivalent of a signature. Ideally, authentication 
identifies the author of a document and makes it impossible 
for him to escape responsibility for the authorship. Ideally, 
also, authentication makes it impossible for anyone to change 
even one character or bit of the document without destroying 
the “signature.” 

10} High Reliability: Low probability that network service, 
as seen by the application, will be impaired by macroscopic 
malfunctions. For present purposes, we distinguish between 
macroscopic malfunctions and microscopic errors in bit 
transmission. 

11) Full-Duplex Transmission: Some applications require, 
and most are favored by, the capability of sending to another 
station and receiving from it at the same time. 


12) Priority Service: Guaranteed or preferential service, es¬ 
pecially when the network is congested, is widely regarded as 
essential for certain very important functions or for certain 
very important persons. 

13) Speech Capability: Present speech circuits transmit 
alphanumeric information inefficiently, and most present data 
networks were not designed to transmit speech. It will be ad¬ 
vantageous, however, to integrate speech with data. 

14) Pictures: It will be advantageous to integrate pictures, 
also, into the repertoire. Graphs, charts, diagrams, and simple 
sketches fit readily into the pattern of data transmission, but 
high-resolution pictures and, especially, moving pictures re¬ 
quire high information transmission rates. This characteristic 
is essentially a second “information rate”—but scaled in such a 
way as to be more demanding of very-wide-band capabilities. 

15) Insensitivity to Distance: Synchronous satellites and 
packet switching both tend to make the difficulty and cost of 
transmission less dependent on distance than they are in tradi¬ 
tional communication systems. Rarely is it an absolute re¬ 
quirement that difficulty and cost be independent of distance, 
but often it is desirable. 

16) Short Transit Time Delay: If the sum of the signal- 
transit time and the signal-waiting-in-buffer time is too great, 
an application may be slowed down too much or disrupted. 
The 0.2-s delay introduced by transmission via a synchronous 
satellite somewhat disturbs two-way speech communication. 
The delay introduced by transmission from one processor to 
another may slow down the operation of a multiprocessor that 
is a network of minicomputers or microcomputers. 

1 7) Uniform Time Delay: In some applications, successive 
segments of the signal must reach the destination in sequence 
(or be put back into sequence if they arrive in scrambled 
order). Note that reordering may cause all the segments to be 
delayed as much as the most-delayed segment. 

18) Broadcast Capability: Some applications require, and 
some are favored by, the capability of transmitting to many or 
all destinations concurrently. 

19) Mobility: Some or all of the stations may need to move 
from place to place and may need to communicate in transit. 

To obtain rough measures of the requirements imposed upon 
networks by the several applications, we filled in the body of 
(an early version of) Table I. 1 Into each cell we entered a 
number to indicate our intuitive rating of the importance of 
the characteristic for the application. The rating scale we used 
runs from 0 (lowest) to 5 (highest). For example, we con¬ 
sidered connectivity to rate at 4 in importance for mail and 
message systems because mail and messages typically fan out 
widely from senders to receivers and fan in to receivers from a 
wide distribution of senders. We did not assign a 5 because 
mail and message systems would still be valuable (cf., the plans 
of Satellite Business Systems) if connectivity were limited to 
within organizations. In the case of the column 6, information 
rate, we used a somewhat special scheme. The numbers from 
1 through 5 encode five class intervals of information rate in 


1 In order to obtain a broader basis on which to think about, and 
possibly model, the relations between networks and applications, we 
suggest that you (the reader) photocopy Table I and fill in some rows 
with your estimates of the importance of the characteristics to the ap¬ 
plications. We have also provided room for you to define additional 
applications or characteristics. If you are willing to share your estimates 
with us, despite the fact we are not bold enough to share our raw-data 
estimates with you, please post them to J. C. R. Licklider and A. Vezza, 
MIT-LCS Rm. 219, 545 Tech Sq., Cambridge, MA 02139. 



PROCEEDINGS OF THE IEEE, VOL. 66, NO. 11, NOVEMBER 1978 


TABLE I 

Importance Coefficients op Network Characteristics for Various Classes of Network Applications (Each Cell Entry Should Be 
Subjective Rating of Importance on a Scale from 0 (Low) to 5 (High)) 


NETWORK 

CHARACTERISTICS 


1.23456789 


10 11 12 13 14 15 16 17 18 19 SPACE FOR ADDITIONAL 

CHARACTERISTICS 



NETWORK 

APPLICATIONS 


Information 

COMMUNICATION 



si m m as m s ss ss m m m i 


nw 


im 


i 

[ Si $5 


sism ansi 


IS! 


„ -Modeling 
C OMMERCE 

non 

Computerized Coi 


<sSo&W >> 

msmmi 

33&SS 

imm 

« m m * 

As sw M am $ 



gt^ggs 


rce /, 


p; 




-Monitoring Non-Rattenls 

,, Medical,Knowledge Bases 
GOVERNMENT 
— 


ssmssmsm 



immm 
111111111111 


iiiiiiisisBiaaaasis 

isaiiissiiiiaasi 
aBiiiaiiaaaaaigs 


BiaiiaiiaiaBiiiB 


News' •' ; 

SPACE FOR ADDITIONAL 
APPLICATIONS 



iasasasii8|||BB 

gg *'t,gg?g gg! ggl §Si &*«l 






CRUDER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


IMPORTANCE COEFFICIENTS OF 19 NETWORK 
CHARACTERISTICS* 


RANK IN IMPORTANCE ® 

AMONG 19 CHARACTERISTICS 1 


o d 

£ o> 


3 IS s = 


71 81 9 1 101 111 121 121141151 161171 18 119 I 


DEMANDINGNESS COEFFICIENTS OF 30 NETWORK 
APPLICATIONS* 


. .**5S 


z 5 30 

<3 < 

z g 25 

9 s! 20 

Z Q_ 

< < 15 


1 




$ 


RANK IN DEMANDINGNESS 
AMONG 30 APPLICATIONS 


C « S «0 ^ 

fc ct © c Z 

<2 © « s 3 

y S o o £ 5 

w h w £ £ 5 

< o 

CD * O 

24 261916 


W © © ©3 

03 -5 G) ■*— 

3 § S 4= Q .H 


« s 11 

ti 3 r > 

© ~ “• cr 


^ ™ £ 5 

■£ c ra 3 


=o®Su=><® 

™3Q>OC=0°r(D 

!SQi-wiuw50(- 


iIfs 

= s 2 ^ E> 2 < 


^ w -j ra 7 

o h < h- 5- 

LU <C 


= CL 
© LU 
^ T5 *5 

S5 I 

o 


= vJ 

E 05 

to £ « 

O © 

<5 *d w -J 
o *c © ? 

cl E9 
Sgojjj 
(3 P QIU 

05 o E U- 
U-l O LU O 

cr 

Q_ 


5 

2 

^ Z n 
^ ui U 


C C T3 
O O ©j 

2 2 5 


© LU = g O 

5 > 2 3 2 


/-><»! ou MrruiUM MV-/JNO ia id 2166852116 sjj^ou l^lii <: o <:o is co ;z s> i 10 o ^ 

* Fig. 1. Importance Coefficients of 19 network characteristics and demandingness coefficients of 30 network applications. ('Divide each num 

ber by 1000 to scale the sum to unity.) 


< "O 

> > Q S 

•z £ Z © 

3 _ 3 < DO 
OZo_k_ 

© o © 2 © 

WpWO 3 
© O © H £■ w 
y LU £ < £ 5 

o f— o O o © 
to O X ID o z 
X o 

Q_ UJ 

24 28 15 21 


8a 


bits/s: 1) 75-300, 2) 300-1000, 3) 1000-10 000, 4) 10 000- 
! 1 000 000, and 5) above 1 000 000. For the rough purposes 
of our analysis, nevertheless, we shall interpret the entries in 
column 6, as all the other entries, to be estimates of the im¬ 
portance of The (columnar) characteristic for the (row) 
application. 


Fig. 1 shows the relative importance of the 19 network char¬ 
acteristics. As one examines the average ratings of the charac¬ 
teristics, it comes as no surprise that bidirectionality is very 
important. It is the “co” in “communication.” 

It may be slightly surprising, however, that freedom from 
error is so important. It is freedom from error as seen by the 


PROCEEDINGS OF THE IEEE, VOL. 66, NO. 11, NOVEMBER 1978 


.• application, of course. There are bound to be errors in the raw 
-• network channels, but they may be detected and eliminated by 
= error-correcting circuits or by retransmission. “Error-free” 
■may in practice mean one bit error in 10 n or 10 14 bits, on 
the average. The importance of achieving an extremely low 
error rate stems in part from the fact that many of the applica¬ 
tions involve information, such as financial data,,in which 
changing a single character could make a great difference. 
Freedom from error is required, also, by most cryptographic 
schemes. Where freedom from grror is not required by an 
application, one can usually firfd error detecting and correcting 
mechanisms within the application itself. Such mechanisms 
are quite evident, for example, in human conversation. But it 
greatly simplifies most network applications if the network 
can be counted on to do the error handling. 

Ability to handle bursty transmissions efficiently ranks third. 
The advantage provided by this characteristic translates di¬ 
rectly into a cost advantage. 

Low cost ranks fourth in importance. It did not rank higher 
because we recognized that certain of the applications, such as 
military command, control, and communication, are relatively 
insensitive to cost. Also, other network applications such/as 
mail and messages are already quite cost competitive with their 
conventional counterparts and do not demand very-low-cost 
facilities. 

Connectivity ranks fifth in importance. The reason con¬ 
nectivity does not rank higher is that we assigned only a 
medium score for connectivity to applications that required 
only connectivity within an organization or within a region, 
and many applications could function—though perhaps at 
some disadvantage—with such limited connectivity. 

Information rate ranks sixth. We interpret that to mean that 
very wide-band transmission is not vital to most of the applica¬ 
tions and that most of them could be satisfied with an in¬ 
formation rate in the range 1000-10 000 bits/s. However, that 
is the information rate seen by the application. To handle 
heavy traffic, and to handle a few of- the applications, a net¬ 
work should have channels of considerably greater bandwidth 
than that. 

Security, the complex that includes assurance of service 
when required and protection against fraud and theft, ranks 
seventh. 

Privacy, the complex that includes protection against dis¬ 
closure of personal information and unauthorized use of it, 
ranks eighth. 

Authentication, a characteristic closely associated with se¬ 
curity, ranks ninth. 

v At the other end of the ranking, mobility (19th) is not re¬ 
quired by most of the classes of applications we considered— 
but, of course, is essehtial for some applications. ■ 

Broadcast capability (18 th) was scored low because it is not 
needed at all in many applications and is needed only oc¬ 
casionally in others such as mail and message systems—and, 
when needed, usually can be simulated adequately by repeated 
point-to-point transmissions. 

Uniformity of time delay (17th) is important mainly for 
speech transmission. If speech had been given a weighting pro¬ 
portional to its probable eventual importance in networking, 
uniformity of time delay would have ranked higher. 

The capability of giving preferential treatment to high 
priority traffic (12th) ranks as high as it does because we 
viewed priority in. the context of present-day systems that 
dnay introduce considerable delays into the delivery of some 
or:all of their messages. In the context of future systems in 


which a whole transmission will take less than a second, 
priority may be much less important. However, the need for 
priority is unlikely to-vanish. Priority classes are useful in 
queuing messages for processing by people and in indicating 
the prioritizer’s sense of urgency or importance to the re¬ 
cipient. Moreover, even very wide-band systems tend to be 
designed just barely to handle expected peak loads, and even 
such systems can be overloaded—in which case, prioritization 
might be helpful. On the other hand, it is conceivable that the 
processing of priorities might slow a system down more than 
eliminating low priority traffic could speed it up. 

We do not want to attribute too much value to our no- 
doubt-ideosyncratic subjective estimates of the importance of 
network characteristics to applications, but we would like to 
carry the analysis another step to illustrate what we think 
might be a valuable method. It attempts to deal with the rela¬ 
tive merits of various networks or network architectures. 

The method begins with a table of applications versus char¬ 
acteristics similar to Table I except that each application has 
an importance weight and all its cell values are multiplied by 
that weight before the columns are totaled. The method as¬ 
sumes, also, a table of networks or network architectures versus 
network characteristics such as Table II. The entries in Table II 
represent our very subjective impressions of the degrees to 
which the characteristics at the top characterize the networks 
at the left-hand side. The values are certainly not definitive. In 
the case of the hypothetical augmentation of the ARPANET, 
they assume major increases in number of subscribers and in 
information rate, and they assume that advanced provisions are 
made for security, privacy, authentication, and priority service. 
They assume, also, that satellite relays are incorporated into the 
network along with wide-band surface channels and that there 
is a packet-radio subsystem to serve mobile applications. 

In the case of the projected SBS service, indeed, they are 
based only on the most informal information, and they make 
rather optimistic estimates about the characteristics of the 
hypothetical networks that would be developed on the basis 
of the SBS facilities. The reader is invited to substitute his or 
her own estimates. 

To determine the suitability of a network or network archi¬ 
tecture to a set of applications, one simply multiplies each cell 
value in its row in (the table like) Table II by the importance 
of the corresponding characteristic at the bottom of (the table 
like) Table I—and then finds the sum (across the row) of the 
products. 

To illustrate the use of the method, we worked with the four 
networks of Table II and with four sets of applications. Appli¬ 
cation set 1 was the set shown in Table I. Sets 2, 3, and 4 were 
subsets consisting of—set 2: speech and encrypted speech, 
set 3: still and moving pictures, and set 4:. duologue and aug¬ 
mentation. (We gave equal or uniform weighting to the appli¬ 
cations in each set-to all 30 in the first set and to both of the 
two in each of sets 2, 3, and 4.) 

We obtained the 16 appropriateness indexes shown in Table 
III. The dial telephone network performs best in the speech 
applications, of course, but it does not appear to do badly in 
the others. (Giving more weight to cost tends to reduce its 
scores.) The experimental ARPANET appears to perform well 
on speech, which surprised us despite the fact that experiments 
on the transmission of compressed speech over the ARPANET 
have been very successful, but best on duologue and augmenta¬ 
tion, which we expected. In the scoring, the ARPANET suffers 
Because, being experimental, it was not developed in respect to 
some of the important network characteristics. Assuming such 




:KLIDER AND VEZZA: applications of information networks 


1341 


TABLE II 

Estimated Degrees to Which Four Selected Networks Possess the 19 Network Characteristics 
(The Ratings Are the Authors’ Intuitive Estimates on a Scale from 0 (Low) to 5 (High) 



*A hypothetical network based on ARPANET technology but with very wide-band ground and satellite chan¬ 
nels, very many subscribers, advanced provisions /or security, an authentication scheme, arrange¬ 
ments /or priority, and a mobile/ponable radio adjunct based on the ARPA Radio Net. 

**A hypothetical network of the kind that might be based on the projected facilities of the Satellite Business 
Systems Corporation and used by a large corporation with geographically distributed branches, it is assumed 
that this network is used only within the corporation and therefore has restricted connectivity. 


TABLE III 

^Appropriateness Scores for Four Selected Networks, Each Rated 
qfr: on Four Different Sets of Applications (The Appropriateness 
Scores Are Based on a Scale from 0 (Low) to 5 (High). 

The Way They Were Determined Is Described in the Text.) 


BaY' 


'v APPLICATION 

N. SETS 

NETWORKS N. 

30 Applications 
of Table 1 ' 

Speech and Encrypted 

Speech 

Still and Moving 

Pictures 

Duologue and 

Augmentation 

Dial Telephone 

2.5 

2.8 

2.4 

2.6 

Experimental ARPANET 

2.8 

2.8 

2.5 

3.0 

Hypothetical Augmented 





ARPANET . 

4.1 

3.9 

4.0 

3.8 

Hypothetical Corporate 





Net Based on SBS Service 

3.8 

3.5 

3.9 

3.8 


Obviously, the result obtained with the method is no better 
than the ratings it processes, and we do not make any claims 
for our ratings. We believe, nonetheless, that the Scheme puts 
into an orderly array some of the basic factors that determine 
the relative appropriatenesses of various networks for various 
sets of applications, and that it leads the users of the method— 
or at least it led us, as we used it—to consider the factors care¬ 
fully and to think about how they act and interact. Upon 
examining the interactions, it soon becomes clear that the 
linear weighting scheme smooths over many nonlinear logical 
interactions, and that a more advanced model would have to 
be more like a computer program than three tables and a 
pocket calculator. Nevertheless, the first step has to be to 
survey the variables that are active in networking, and the 
simple scheme provides a start on that. 


IV. Issues 


A. Brittleness 


jr development (Hypothetical Augmented ARPANET) yields the 
appropriateness scores in the third row of Table III, which are 
all toward the upper end of the five-point scale. The hypo- 
jjb thetical corporate network based on the projected SBS service 
i. appears to perform almost as well as the hypothetically aug- 
0,mented ARPANET, suffering in the comparison only because 
^i. we assumed for it limited connectivity (intercorporate com- 
munication only), no surface channels (and therefore always 
jss!-. *h e 0.2-s satellite delay), and no mobility. Those lacks showed 
jjk U P °hly in the average over the 30 applications and in the 
s Peech applications. 


Brittleness is approximately the inverse of the lauded com¬ 
plex of system attributes: flexibility, robustness, and graceful¬ 
ness of degradation. Brittleness often arises from a quest for 
efficiency or economy. If you space the pony express posts 
as far apart as a fresh pony can run, then the mail does not get 
through when an emergency forces you to use a tired pony. A 
socioeconomic unit with a minimum-capacitance supply sys¬ 
tem avoids the waste inherent in having products stagnate in 
the pipeline but crumbles in a siege. Networks will almost 
surely be more efficient than the systems they supplant. 
Should not that expectation prompt us to ask whether they 
will also be more brittle? 

From an engineering point of view, the preferred approach 
is to avoid brittleness through judicious choices in the archi¬ 
tecture and design of networks. The dynamic routing feature 








1342 


^ t ^ Le tf f' RPANET ’ for “ample, pennits the network to con- 

power supply, and redundancy of information storage More 
over, sophisticated uses of redundancy J•, M 

B Electronic Imperialism or Technology Transfer to the World 

kfesssssk 

ready had working transportation, systems hefn* , 

™ £ 

WS opmg world with the concentrated supercritical inters of 

the developed world, bringing the former deeply int Jhe Z° 

action patterns of the latter and making it much“S“he' 

ism, J f ~ 

^ may l0 ° k “» *> so™ 

*«* * 

sms”~ irjr tF^ 

1 but of knowledge and it flows through h ^ ° mformation 
• Perhaps the most effective pattern involves by 

promising young people from developing co^Mes in w Y 
graduate schools in developed countriM-fX ,h , g 

experience in the developed countries and then return fo 7°^ 
foa of advanced technology in the a. , ™ to form 

mained functionally and motivational mlhe , I6 ' 

s^Sr«®s2= 

could as well be in foreign countries poStdoctoraI locations 
technology, if only they had net ’ £ V6n Countries with little 
cient funtog to keep local te^ , 0 COnnefiti °™ and suffi- 
to pay for computing time and 0peration “d 

Indeed, it seems likely that teeh i 8 somewhere on the net. 
countries couM becomf j t0 devel °P^ 

than informal exSon 3 n ° m ° re 

become well established in the ARPANEtTo*^ ^ 


Fo^aT 2 o rti 0 ons t0 Seen e 

Uie^^^not-te^^iolo^'Kn^^^s^would^^'^^^^^^ 
Productiveness of the technology-transfer'ent^ST ^ 

cannot "hope to^ffer^olutito^t^th* ^ reSPeCt t0 ’ “ d we 
the juxtaposition of “electro* ■ t0 the problem suggested by 
we,- p '“ " a ° b ‘° i ™ 
working between the developed aild the d Pr !° SPeCt ° f Het ' 
deserves very serious study. From the potat f 0 *"” 8 Tf 

jar how * ^ t6 ' 


S'\- 

‘<efefe&3s&v 


c - Unity, Federation, or Fragmentation 

is: would we see a side ’ 01 3 fra 8 men tation? That 

11 applications and fr^g “ C ° mp “ si ” s 

coherent system ot intercommunicating neTOoriS' 0 /“ 
incoherent assortment of isolated ? ° r “ 

works, most of them d.dic.fcd 'J.TST' 
single organizations’ The first le™« U " nS or semng 

engender pluralistic solutions to mo t ’ Z wIuch seems to 
alternative-many seMelit Pr ° blemS - ™ e ^ 
what woufd be rLchJd >V 

fore, may be Judged rathe, probable butit woSbT ' T 

Serbs’” ^ »d =o™b y „,°e f “ eP on; 

combinatorial^ ^e^ddf^l ^ ^ grow 

woblem of ho.°toacwTnt'gi She” „TS s^poi* £ 

ssr is “ " a i -ssx 

Coherence” characterizes a system in Which ah the n , rt 
culate well and function in synergy and in which th v, S 
systems are compatible and cooperative.' In an in forma tT 
network, coherence is desirable partly for*the same r ° n 
is desirable in a telephone system: the* value to a ,. ea ^ on lf 
mcreases as the number of other^ccessible users increases' 

This is true no matter whether the users are nennie 
Puters. The importance of coherence,'is amplified h** C ° m " 
by the fact that some of the -'applications of ’ 0wever > 
works will involve several functio&”operafino° mPUter net ’ 
information. Planning a trip]:*for:' > example will ° D . COI ^ mon 
action among: your calenda&'pfogram and'th require 
grams of people you will'/viStffthe, reserve« 6 C endar pro " 
airlines, car rental services*md;hotels 'the r, ° nS I 510 ® 111118 of 
terns of your banlcvan'd^venSFotherbani- trans ^ er sys- 
■ ‘ your company’s 







OER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


office, and perhaps data bases pertinent to business to 
cted on the trip. The computers could not be of 
help in the planning if each function or service had its 
iparate network or if their networks were physically 
hnectable but incompatible at various levels of proto- 
Indeed, coherent interconnection of diverse functions will 
Essential if networks are to live up to expectations in elec- 
nic message services, computerized commerce, delivery of 
aal services that involve both federal'and state governments, 


ministrative policies can be defined clearly and networks can 
be designed responsively. 

D. Privacy 

It is now very widely understood that the collection of large 
amounts of personal information in computer processible data 
banks tends to jeopardize personal privacy. The main reason, 
of course, is that aggregation and computerization open up the 
possibility of invading privacy efficiently and on a massive 




■d many military and intelligence applications. 

Coherence, however, is a condition that has to be planned 
(fstriven for. It does not arise in a short time through evolu- 
h—at least not through evolution that conforms to the 

ontaneous-variation-plus-natural-selection model. Will the 

Srces that are operating in the present network situation 
bster a sufficient degree of coherence for networks to fulfill 
•their promise? On the positive side is the fact that a standard 
packet-switching interface protocol X.25 [40] was formulated 
and agreed upon in an unusually short time and that the inter¬ 
connection of such dissimilar networks as Telenet [3] and the 
Canadian data network has already occurred. Also on the 
;positive side is the possibility: that one or two commercial 
networks, such as the one being developed by AT&T and t^e 
v one being developed by Satellite Business Systems, vyill 

■ dominate the network market and thereby create the kind of 
.. coherence that IBM has created in a large part of the computer 

■ software field. 

However, the other factors seem to work against coherent 
interconnection. First, the network situation is evolving with- 
y out any national policy. (Within the U.S. government, it is 
evolving without any federal policy.) Several countries are 
■V building networks independently. Many companies are 
building networks independently. Second, although the lines 
may be leased from the same telephone company that leases 
lines to everyone else, there is some security in having one’s 
own dedicated network. The need for security in such areas 
as EFT may be stronger than the nped for interconnection. 
Third, wherever personal information is concerned, and 
especially in the federal government, privacy has become a 
major issue, and a simplistic interpretation of the privacy 
problem sets interconnection into opposition with privacy. 
Fourth, research and development in the area of network 
security and privacy assurance have not been and are not being 
supported at a high enough level to create-soon enough-a 
technology that will let one say: "You can have both intercon¬ 
nection and security, both interconnection and privacy; you 
can have your cake and eat it, too.” Actually, the technology 
of communications security is rather well developed [41] — 
[ 44 ] —except for uncertainties arising from the “56-bit contro¬ 
versy” [45] —as a result of many years of work in the military 
• intelligence area, but the technology of computer security is 
less well developed [46], and nontechnological aspects-plant, 
personnel, and operational aspects—of network security are 
not in good condition at all. 

The conclusion with respect to unification, federation, or 
fragmentation must be: we should strive for the kind of feder¬ 
ation of networks that will provide coherent interconnection 
where needed and justified and, at the same time, provide 
informational privacy and security. That will require planning 
at national and international levels. It will require intensified 
research and development in network security and in inter¬ 
netting. And it will require an elevation of the ongoing dis¬ 
course about privacy—to a level on which legislative and ad- 


scale. At the same time, they open up the possibility of pro¬ 
tecting privacy tirelessly and algorithmically and of using the 
personal data effectively in the effort to accomplish the legiti¬ 
mate purposes for which the data were collected. Indeed, the. 
stage is set for a battle between the forces of good and evil. 

The stage is, however, not set in reasonable balance. The 
things required for the protection of privacy in information 
networks are policy and technology: legislative and admin¬ 
istrative policy to define what is to be achieved and a tech¬ 
nological basis for achieving it. In the U.S., the legislation is 
the Privacy Act of 1974 and the administrative policy is an 
OMB Circular [47]. Both are cast in terms of absolutes. The 
technological basis, as mentioned in the preceding section, is 
a combination of communications security and computer 
security. Because computer security is a relatively new and 
neglected subject, it is difficult to provide convincing assur¬ 
ance to an intelligent skeptic that any proposed intercon¬ 
nection of personal data, transmission channels, information 
processors, and interrogation-and-display facilities will not 
jeopardize privacy. Repeatedly, indeed, the advocates of pro¬ 
posed federal data networks have failed to present convincing 
analyses of the threats to privacy and of the trade-offs be¬ 
tween privacy and mission effectiveness—and, repeatedly, their 
requests for permission to procure such networks (e.g., FED- 
NET, NCIC upgrade, IRS Tax Administrative System) have 
been sidetracked or denied with good reason. 

At least in government circles, therefore, the issue of privacy 
is a very real and central network issue. Before it can be 
solved, three things have to be done. 1) The technology of 
information security has to be improved to the point at which 
reasonable analyses can be made and assurances can be given. 
2) Network advocates have to develop plans and justifications 
that take privacy into account and provide strong assurances 
that it will be protected. And 3) the members of the oversight 
committees and their staffs have to face the fact that to pro¬ 
tect privacy by precluding interconnection is not a very satis¬ 
factory solution for the long term. They should support and 
foster the accomplishment of steps 1) and 2) with the aim of 
receiving plans and proposals that they would not have to kill. 

E. Other Issues 

Space limitation precludes substantial discussion of other 
issues, but there are several that should be discussed. We shall 
discuss only a few of them, and those only very briefly. 

1) Transborder Data Flow: Several European countries are 
beginning to restrict the flow of personal (or personnel) data 
across their borders on the ground that they must protect the 
informational privacy of their citizens against threats implicit 
in data processing in countries with less stringent privacy laws. 
Some of the countries have laws or regulations that preclude 
the transmission of encrypted information through their 
public communication facilities. Many believe that such re¬ 
strictions may be used to discriminate against foreign (e.g., 




1344 


PROCEEDINGS OF THE IEEE, VOL. 66, NO. 11, NOVEMBER 1978 


American) data processing firms and against multinational 
corporations. 

2) Technology Export and Import: International networks 
can be expected to facilitate greatly the transfer of scientific 
and technical information and know-how among the tech¬ 
nologically developed nations. From a nationalistic point of 
view, one can see both advantages and disadvantages in such 
transfer to ideological, military, and economic competitors. 
The advantages are mainly humanistic and short-term eco¬ 
nomic. The disadvantages are mainly security-related and 
long-term economic. The interplay of advantages and dis¬ 
advantages is giving rise to issues that will probably intensify. 

3) Competition Versus Monopoly and Free Enterprise 

Versus Regulation: These are the issues of the “Bell Bill” 
(Consumer Communications Reform Act), Computer Inquiry 
II, and several recent decisions of the Federal Communications 
Commission that have favored competition in the telecom¬ 
munications industry. How these issues are settled will to a 
large extent determine who operates the networks of the 
future in the U.S. and how such applications as electronic 
message service and “the office of the future” are, imple¬ 
mented. / 

4) Nature of Office Work and Workforce: Some of the net¬ 
work applications we have discussed would tend to- alter 
markedly the nature of white-collar work and the knowledge 
and skills required of members of the workforce. . That fact 
will give rise to issues involving reeducation and retraining, pay 
commensurate with responsibility, and displacement of labor 
by automation. 

5) Impact on Productivity: Many people are expecting that 
applications such as electronic mail and office automation will 
significantly increase productivity, but there are as yet few if 
any definitive experiences with such applications or quantita¬ 
tive models of them that will convince skeptics. Impact-on- 
productivity may become a major issue in and of itself. 

6) Educational Applications of Networks: Packet-switched 
and satellite networks, together^with the great advances being 
made in computers, appear to open the door to revolutionary 
improvements in education, but much more than mere access 
and mere hardware will be required to achieve truly significant 
results. The issue that is arising is whether the society values 
education enough to support the long and difficult effort that 
will be required to develop effective computer- and network- 
based methods—or whether there will be' another wave of pre¬ 
mature exploitation followed by disappointment as there was 
in the computer-assisted-instruction “revolution” of the early 
■1960’s. 

j: 7) Networks Versus Stand-Alone Systems: Why do we need 
time sharing when everyone can have his or her own micro¬ 
computer?' What good is a network when one can have a 
'whole library on a video disk? Those questions have answers, 
of course, in such applications as electronic message systems, 
distributed but cooperating “offices of the future,” and 
computerized commerce, but the questions will nevertheless 
constitute a major issue. Microcomputers and inexpensive 
digital storage devices have significantly changed the network 
concept. Less than a decade ago, a computer network was 
something that provided access to a time-sharing system. Now 
it is a facility to support communication among spatially dis¬ 
tributed people and computers and to supply people and 
computers with common information bases and supple¬ 
mentary storage and processing capabilities. 

Id Leadership: An important latent issue is implicit 
people have quite different percep¬ 


tions of the importance of networking. A significant fraction 
of the people who have had experience as developers or inten¬ 
sive users of a packet-switching network believe they have 
been in on the beginning of a new era and that descendants of 
the ARPANET will constitute the nervous system of the 
world. On the other hand, most of the people who now deter¬ 
mine the kind of national policy that earlier fostered the 
merchant marine, the railroads, the airlines, and the interstates 
seem not to be aware that any significant new potential exists 
or that there may be any reason to move rapidly to take 
advantage of it. And, of course, if it is meanihgful at all to the 
man in the street, the term “information network” still 
suggests the telephone system, the radio, or a television net¬ 
work. In that situation, it is difficult to project as an issue the 
importance of networks to world economic leadership. We 
believe, nevertheless, that it is such an issue, and we hope that 
it will soon be recognized as such an issue. 

9) Totalitarian Control: If almost all the telecommunica¬ 
tions in an area were based on computerized networks con¬ 
trolled by an organization—say by a government—then, in the 
absence of effective safeguards, that organization could map 
the life space of every individual and record the business trans¬ 
actions of every company. The notion of telecommunications 
in the hands of a “big brother with computers” goes beyond 
the bounds of what is usually called “invasion of privacy” into 
the realm of totalitarian control. One can detect at least a 
trace of the “big brother” issue in the coldness of certain 
members of Congress toward, and the rejection by the OMB 
of, the plans (mentioned earlier) of the IRS to develop a 
computer- and network-based Tax Administration System. 
The mere possibility of subversion was enough to kill the 
system. It is of the utmost importance, of course, to develop 
truly effective safeguards against misuse of networks for pur¬ 
poses of social control. But such safeguards will be more 
difficult to devise than safeguards against ordinary invasion of 
privacy or against fraud and theft. Networks will have to be 
designed in such a way that representatives of diverse interests 
can satisfy themselves that there is no subversion and that the 
audit trails are not dossiers. And the arrangements will have to 
be dictator-proof. We think that that is a very great task and 
that it is being neglected. 

V. Conclusions 

Shakespeare could have been foreseeing the present situation 
in information networking when he said,” . . . What’s past is 
prologue; what to come, in yours and my discharge” [48]. 
Most of the applications that will shape the future of net¬ 
working are now in the stage of conceptualization or in the 
stage of early development. But it seems possible that a “net¬ 
work of networks” will, even in this century, become the 
nervous system of the world and that its applications will 
significantly change the way we live and work. The degree to 
which the potentials of networking will be realized will depend 
upon how we resolve some of the issues that have been 
discussed. 

The value of information networks will depend critically 
upon their connectivity and their ability to connect any one 
of many sources to any one or more of many destinations. 
High connectivity will be precluded if conditions force the 
development of many separate, independent, incompatible 
networks. One condition that would force such an incoherent 
development is the combination of 1) a need for security 
against loss of “electronic funds” and (other) proprietary 



IKLIDER AND VEZZA: APPLICATIONS OF INFORMATION NETWORKS 


1345 


formation and 2) the lack of a technology capable of pro- 
,g security in an interconnected network or network.of 
orks. That would lead to what we have called “frag- 
itation.” Another such condition is based in a similar way 
a combination of need for informational privacy and lack 
the technology necessary to protect it except by isolating 
: e- privacy-sensitive data. The rapid and intensive develop¬ 
ment of computer and network security technology is vital to 
'any network applications. 

y forces are fostering the development of networks to 
'terconnect organization or branches of organizations and the 
lopment of applications to serve organizations, but there 
few forces that foster networks to interconnect individuals 
.network applications to serve individuals. Perhaps the main 
ipe for the provision of network services to individuals— 
ecially network services to individuals at home—is that the 
ill System will move (as obviously it would like to do) into 
he processing, storage, and information-commodity parts of 
ie overall information business. But the telephone companies 
nil be very slow to provide high-in formation-rate services 
use they have such large investments in narrow-band 
lalities. To get inexpensive wide-band channels into homes 
;ian early date, we need a new departure in cable (or fiberi 
tics) communication, taking off from cable television, or 
imething truly revolutionary like a nation-wide network 'of 
'erostationary platforms: microwave platforms at 70 000 ft, 
pported by helium plus helicopter vanes, and relaying signals 
;om housetop “dishes” a meter in diameter. 

Examination of 30 actual and potential applications of net¬ 
works suggests that the following network characteristics or 
pabilities are especially important: bidirectionality, freedom 
im undetected errors, efficiency despite “burstiness” in the 
mission pattern, inherently low cost, high connectivity, 
gh.information transmission rate, security, privacy, authen¬ 
tication, and reliability. Mobility and broadcast capability 
ed out to be of the lowest priority in our analysis. Packet- 
tching and time-division-multiple-access networks, espe- 
:y such networks with satellite relays, were suggested by 
e analysis to have the patterns of characteristics required to 
irve best the full range of applications. The analysis suggests 
^approach to the selection of the best network to serve any 
ified application or set of applications. 


; 

Pi 

Ki 

m 

i 

a. 

i«i 

|i 


¥ 

L 9 i 


References 

T. H. Myer and C. D. Mooers, HERMES User's Guide. Cam¬ 
bridge, MA: Bolt Beranek and Newman, Inc, June 1976. 

A. Vezza and M. S. Broos, “An electronic message system: Where 
does it fit?” in Proc. IEEE Conf. Trends and Applications 1976: 
Computer Networks, New York, Nov. 1976. 

A. Vezza, “A model for an electronic postal system,” in Telecom¬ 
munications Policy Research Conf. Proc., Bruce M. Owen, Ed. 
s Palo Alto, CA: Aspen Institute Program on Communications and 
Society, Apr. 1975, pp. 146-15 3. 

SIGMA Message Service: Reference Manual, Information Sciences 
Inst., Univ. Southern California, Marina Del Ray, CA, ISI/TM- 
78-11. 

J. B. Rule, “Value choices in electronic funds transfer policy,” 
Office of Telecommunications Policy, Executive Office of the 
President, Washington, DC, Rep. Domestic Council Committee 
on the Right of Privacy, Oct. 1975. 

T. M. Dunn and J. H. Mirrissey, “Remote computing—An experi¬ 
mental system. Part 1: External specifications,” in Proc., Spring 
loint Computer Conf.. 1974. 

J- M. Keller, E. C.Strum, and G. H. Yang, "Remote computing— 
An experimental system. Part 2: Internal design,” in Proc, Spring 
Joint Computer Conf., 1974. 

J■ E. Sammet, Programming Languages: History and Funda¬ 
mentals. Englewood Cliffs, NJ: Prentice-Hall, 1969, pp.226-229. 
T. Marill and D. Stem, “The datacomputer—A network data 
utility,” in AFIPS Conf. Proc., Montvale, NJ: AFIPS Press, May 
1975. 


[10] L. G. Roberts and B. D. Wessler, “Computer network develop¬ 
ment to achieve resource sharing,” AFIPS Conf. Proc., May 1970. 

[11] L. G. Roberts, “ARPA network implications,” ARPA Network 
Information Center Doc, 12 982, 1972. 

[12] R. M. Metcalfe, “Packet communication,” M.I.T. Lab. for Com¬ 
puter Science, MAC/TR-114, Dec. 1973. 

[13] “SNDMSG,” Tenex User’s Guide, Bolt Beranek and Newman, 
Inc, Cambridge, MA, Oct. 1977. 

[14] J. Vallee, “The forum project: Network conferencing and its 
future applications,” Comput. Networks (Netherlands), vol. 1, 
no. 1, pp. 39-52, June 1976. 

[15. M. Turoff, “Party-line and discussion: Computerized conference 
systems,” Office of Emergency Preparedness, Washington, DC, 
Rep, Apr. 1972. 

[16] — “Delphi conferencing. Computer-based conferencing with 
anonymity,” in Technological Forcasting and Social Change. 
Washington, DC: National Resource Analysis Center, 1972, vol. 
3, no. 2, pp. 159-204. 

[17] M. Turoff and J. Scher, “Computerized conferencing and its “ 
impact on engineering management,” in Proc. 23rd Annu. Engi¬ 
neering Management Conf. on Effective Management of Engi¬ 
neering Resources, Washington, DC, Oct. 1975. 

[18] D. C. Engelbart, “Coordinated information services for a dis¬ 
cipline- or mission-oriented community,” in Computer Communi¬ 
cation Networks, R. L. Grimsdale and F. F. Kuo, Eds. The 
Netherlands: Noordhoff International, 1975, pp. 89-99. 

[19] D. C. Engelbart, R. W. Watson, and J. C. Norton, “The aug¬ 
mented knowledge workshop,” in AFIPS Conf. Proc., vol. 42, 
New York, June 1973. 

[20] - , Advanced Intellect-Augmentation Techniques. Menlo Park, 

CA: Stanford Research Institute, Feb. 1972. 

[21] -, “Human intellect augmentation techniques,” Stanford Re¬ 

search Institute, Menlo Park, CA, Final Rep, 1969. 

[22] R. Flesch, The Art of Plain Talk. New York: Harper & Brothers, 
1946. 

[23] J. O. Mason, Jr, “Management-information-systems—the audi¬ 
tor’s role,” The Internal Auditor, vol. 32, no. 5, pp. 40-48, Sept./ 
Oct. 1975. 

[24] S. J. Pokemper, “Management information-systems—A pragmatic 
survey,” Conf. Board Rec., vol. 10, no. 5, pp. 49-54, May 1973. 

[25] R. G. Schroeder, “A survey of management science in university 
operations,” Manage. Sci.—Appl., vol. 19, no. 8, pp. 895-906, 
Apr. 1973. 

[26] P. A. Strassman, “Managing the costs of information,” Harvard 
Bus. Rev., vol. 54, no. 5, pp. 133-142, Sept.-Oct. 1976. 

[27] G. H. Barnes, R. M. Brown, M. Kato, D. J. Kuck, D. L. Slotnick, 
and R. A. Stoker, “The Dliac IV computer,” IEEE Trans. 
Comput., vol. C-17, pp. 746-757, 1968. 

[28] W. J. Bouknight, S. A. Denenberg, D. E. McIntyre, J. M. Randall, 
A. H. Sameh, and D. L. Slotnick, “The Illiac IV system,” Proc. 
IEEE, vol. 60, pp. 369-388, 1972. 

[29] “Self-teaching design and analysis tools offered on timeshared 
basis,” Comput. Des., vol. 17, no. 2, pp. 18-20, Feb. 1978. 

[30] I. E. Sutherland, Computerized Commerce. Santa Monica, CA: 
The Rand Paper Series, Rand Corp., Sept. 1975. 

[31 ] National Research Council, Telecommunication for metropolitan 
areas: Near-term needs and opportunities. Washington, DC: Nat. 
Acad. Sci., 1977. 

[32] L. L. Weed, “Technology is a link, not a barrier, for doctor and 
patient,” Modem Hospital, vol. 114, pp. 80-83, Feb. 1 970. 

[33] -, Medical Records, Medical Education, and Patient Care. The 

Problem-Oriented record as a Basic Tool. Chicago, IL: Year 
Book Medical Publishers, Inc., 1970. 

[34] R. Davis, B. Buchanan, and E. Shortliffe, “Production rules as a 
representation for a knowledge-based consultation program,” 
Stanford Univ. Artificial Intelligence Lab., Stanford, CA, Memo 
AIM-266, Oct. 1975. 

[35] H. Silverman, “A digitalis therapy advisor,” M.I.T. Lab. for 
Computer Science, MAC/TR-143, Jan. 1975. 

[36] “GECOS: General Comprehensive Operating Supervisor,” Honey¬ 
well Information Systems, Waltham, MA, Rep. DD19. 

[37] A. Stathopoulos and H. F. Caley, “The Autodin II network,” 
in EASCON-77 Rec. Proc. IEEE Electronics and Aerospace Sys¬ 
tems Convention (Arlington, VA), Sept. 1977. 

[38] Social Security Administration, Office of Advanced Systems, 
Recommended Design Concept for the Future SSA Process, 
Washington, DC, OAS Pub. No. 005, Apr. 1977. 

[39] V. Slamenka, private communication. May 1978. 

[40] CCITT, “Recommendation X.25: Interface between data termi¬ 
nal equipment (DTE) and data circuit-terminating equipment 
(DCE) for terminals operating in the packet mode on public data 
networks,” in Public Data Networks, Orange Book (vol. VII.2). 
Geneva, Switzerland: Sixth Plenary Assembly, International Tele¬ 
communications Union, 1977, pp. 70-108. 

[41] W. Diffie and M. Heilman, “New directions in cryptography,” 
IEEE Trans. Inform. Theory, pp. 644-654, Nov. 1976. 


1346 


PROCEEDINGS OF THE IEEE, VOL. 66, NO. 11, NOVEMBER 1978 


[42] R. Rivest, A. Shamir, and L. Adleman, A method for obtaining 
digital signatures and public-key cryptosystems,” M J.T. Lab. for 
Computer Science, LCS/TM-82, Apr. 1977. 

[43] Federal Register, vol. 40, no. 52, Mar. 17, 1975. 

44] Federal Register, vol. 40, no. 149, Aug. 1, 1975. 

45] W. Diffie and M. Heilman, “Exhaustive cryptanalysis of the NBS 
data encryption standard,” Computer, vol. 10, no. 6, pp. 74-84, 


June 1977. 

[46] J. H. Saltzer and M. D. Schroeder, “The protection of informa¬ 
tion in computer systems,” Proc. IEEE, vol. 63, pp. 1278-1308, 
Sept. 1975. 

[47] Office of Management and the Budget, OMB Circular A-108, 
Washington, DC, July 1975. 

[48] William Shakespeare, The Tempest, act II, scene I. 


A Tutorial on Protocols 

/ 


LOUIS POUZIN and HUBERT ZIMMERMANN 


Invited Paper 


Abstract—Protocols ate common tools for controlling information 
transfer between computer systems. The concept of a protocol, which 
grew out of experimental computer networking, is now fundamental to 
system design. In this paper, basic protocol functions are explained and 
discussed. Then, the concept of a distributed system architecture is 
presented. It provides the framework for layers and protocols to operate 
across heterogeneous systems. The purpose and functions of each 
protocol layer such as, transmission, transport, virtual terminal, are 
described. Interactions between design and performance are discussed, 
and typical mechanisms are reviewed. CCITT and ISO relevant standards 
are summarized. Finally, the similarity between protocob and program¬ 
ming languages is emphasized as it points to the major impact brought 
about by protocob in system design. 

I. Introduction 

VERYONE has had the opportunity to overhear such 
cryptic conversations exchanged over the radio by taxi 
drivers, policemen, and aircraft pilots. Although upon 
hearing these conversations at first do not mean much to the 
layman, these abbreviated languages carry well-defined mean¬ 
ings and obey well-defined rules. Speakers give their name, ask 
correspondents if they are listening, confirm reception, etc. 
This form of conversation differs drastically from a face-to-face 
chat. The communication channel is shared by many speakers. 
To save bandwidth and reduce interferences, messages are short 
and coded. External noise and other interferences are com¬ 
mon occurences, hence, repetition and confirmation are normal 
practice. These rules are known as protocols. 

Manuscript received February 27, t978; revised July 24, t978. 

The authors are with IRLA, 78150 Rocquencourt, France. 


The term protocol entered the computer jargon at the turn 
of the 70’s, when the U.S. Defense Advanced Research Project 
Agency set out to build a network of geographically distribute 
heterogeneous computers [71 ]. Up to that time, communica¬ 
tion between computer programs or processes was limited to 
processes which were located within the same machine. Inter¬ 
process communication was accomplished through the use of 
shared memory and special signals exchanged through the 
mediation of the operating system. This technique represented 
the analog of a face-to-face chat between processes. Inter¬ 
process communication between geographically distant systems 
would have left processes with the same kind of constraints 
that taxi drivers encounter. They would have to interact 
through a potentially hostile environment with limited band¬ 
width, delay and unreliable transmission. In addition, the 
processes in the different computer systems did not even speak 
the same native tongue, having been created by different 
manufacturers. 

Computer veterans remember the sinuous evolution that led 
from binary programming to assembly code, to Fortran, Cobol, 
Algol, and other high-level languages. Originally viewed as a 
collection of tricks and hobbies, programming languages have 
developed into a major branch of computer science. The 
evolution of protocols has followed a strikingly similar path. 
Indeed, Protocols are common tools designed for controlling 
information transfer between computer systems. They are 
made up of sequences of messages with specific formats and 
meanings. These messages are equivalent to the instructions 
of a programming language, although protocol languages are 
still in an early stage of ad hoc development. 



0018-9219/78/1100-1346S00.75 © 1978 IEEE