WEBVTT

00:13.240 --> 00:17.880
Good morning, welcome to this course on algorithms for internet

00:17.880 --> 00:18.500
applications.

00:20.150 --> 00:21.380
My name is Hartmut Schmeck.

00:22.180 --> 00:27.500
I guess that most of you know myself, maybe some not, but then you get

00:27.500 --> 00:28.080
to know me.

00:29.500 --> 00:35.920
Let me just briefly tell you a few things about my person.

00:36.160 --> 00:38.140
So, as I said, my name is Hartmut Schmeck.

00:38.620 --> 00:40.420
This should be a picture of myself.

00:40.620 --> 00:41.440
Yes, there it is.

00:42.040 --> 00:49.460
So, I'm located in the Institute for Applied Informatics and Formal

00:49.460 --> 00:50.660
Description Methods.

00:51.540 --> 00:55.780
And so I'm in the Faculty of Economics and Business Engineering.

00:56.840 --> 01:04.680
And you can contact me, if you like, through using different media.

01:04.940 --> 01:12.480
You can meet me face-by-face, just by... leave it like that.

01:12.620 --> 01:18.260
So, you can meet me face-by-face in my office hours, Tuesdays, right

01:18.260 --> 01:23.800
after these lecture times, then certainly by email, standard email

01:23.800 --> 01:24.360
address.

01:24.580 --> 01:28.020
By the way, if I get email messages from you, usually I would like to

01:28.020 --> 01:29.960
see that you're actually a student of the KIT.

01:30.580 --> 01:34.480
So, I usually assume that a student from the KIT who is sending me a

01:34.480 --> 01:38.760
message uses his KIT email address.

01:39.080 --> 01:41.680
Otherwise, I don't know where that person is coming from.

01:43.600 --> 01:49.020
My research areas are in the area of algorithms.

01:49.240 --> 01:52.160
My core competence is efficient algorithms.

01:52.980 --> 01:57.600
Then, I have been working for quite some time on bio-inspired

01:57.600 --> 01:58.320
optimization.

01:58.880 --> 02:02.440
Now, what does that have to do with Internet applications?

02:02.780 --> 02:05.780
In the Internet, you certainly also have all kinds of algorithms.

02:06.540 --> 02:09.440
In particular, you have distributed systems.

02:09.860 --> 02:13.760
And a topic that has to do with distributed systems is also organic

02:13.760 --> 02:19.580
computing, where we talk about very widely distributed systems, which

02:19.580 --> 02:23.460
have to adapt in a self-organized way to changing requirements.

02:24.320 --> 02:28.360
And usually, these systems are interconnected using Internet

02:28.360 --> 02:29.020
technologies.

02:29.580 --> 02:33.700
And a topic that I am working on recently quite intensively is the

02:33.700 --> 02:43.460
area of smart energy systems, where more and more components of the

02:43.460 --> 02:45.620
energy system are addressable.

02:45.820 --> 02:50.380
So, we get something which has to do with what some people call an

02:50.380 --> 02:51.420
Internet of energy.

02:52.220 --> 02:56.920
And that means the methods that are designed for the Internet are

02:56.920 --> 03:00.360
transferred to some extent into the energy system.

03:00.820 --> 03:02.840
Very interesting application areas.

03:03.540 --> 03:09.440
And these application areas are dealt with in several projects.

03:09.640 --> 03:15.480
So, the project Miragio for moving towards minimum emission regions is

03:15.480 --> 03:16.340
one of the projects.

03:16.660 --> 03:19.920
Miragio Mobile is another project having to do with the energy system,

03:20.060 --> 03:26.400
where we look or talk about the integration of electric vehicles into

03:26.400 --> 03:27.420
the energy system.

03:28.200 --> 03:35.220
And in these projects, Internet technologies, like communication

03:35.220 --> 03:39.320
technologies, using the Internet for application scenarios.

03:39.560 --> 03:45.260
Then further projects are organic traffic control, where we control

03:45.260 --> 03:51.440
traffic loads in street networks in a self-organized adaptive way.

03:51.960 --> 03:57.160
We talk about collaboration and we also talk about or work on a

03:57.160 --> 04:00.700
project called KIM, Council for Integrated Information Management.

04:01.200 --> 04:04.520
One result of that project, which has been going on for several years

04:04.520 --> 04:14.180
now, is the study portal that you use for getting the material for all

04:14.180 --> 04:15.360
the courses.

04:16.420 --> 04:21.540
And so, the study services are provided using that portal.

04:22.140 --> 04:26.860
And as you might have noticed, this fall, this portal has changed

04:26.860 --> 04:33.600
because the campus management project replaced the previous databases

04:33.600 --> 04:42.760
for the resources for the study portal or the course content or course

04:42.760 --> 04:43.820
information.

04:44.760 --> 04:54.060
The calendar system, the examination system, like examination

04:54.060 --> 04:57.900
administration system, all these have been replaced with a new system.

04:58.620 --> 05:02.400
And therefore, this fall, several things don't work or work in a very

05:02.400 --> 05:03.160
different way.

05:03.300 --> 05:08.820
Not in a way that we are completely satisfied with, but I think this

05:08.820 --> 05:12.420
will be improved over the course of this term.

05:13.260 --> 05:17.900
And then, I'm very active in the KIT focus, computation.

05:18.300 --> 05:25.400
Computation is an artificial word made up from the combination of

05:25.400 --> 05:26.920
communication and computation.

05:27.680 --> 05:35.100
So, we talk about the inherent combination of communication and

05:35.100 --> 05:40.020
computation, which is just inevitable.

05:40.760 --> 05:45.860
Nowadays, everything has to be able to communicate and to compute the

05:45.860 --> 05:50.180
information, to process the information that is communicated in a

05:50.440 --> 05:51.880
reasonable way.

05:52.140 --> 05:55.820
And computation is one of the strategic research areas of the KIT,

05:55.820 --> 06:02.000
where we combine large projects in these areas.

06:02.540 --> 06:07.800
Okay, let me just give you some information on this course.

06:08.000 --> 06:11.160
The course will be presented as live lectures.

06:11.340 --> 06:15.900
You are here in this room, certainly, but you are not the only ones

06:15.900 --> 06:19.400
who will listen to this course, because there will be some people,

06:19.400 --> 06:25.360
some students who, for many different reasons, don't come to this

06:25.360 --> 06:29.780
lecture hall, but listen to the course at a different place, maybe at

06:29.780 --> 06:31.920
home, maybe somewhere else in a different city.

06:32.700 --> 06:34.720
So, the lectures are recorded.

06:35.720 --> 06:40.480
That's why I'm wearing this headset microphone, so everything is

06:40.480 --> 06:41.000
recorded.

06:41.380 --> 06:45.780
I guess you have all, like, who of you has never accessed a recorded

06:45.780 --> 06:46.260
lecture?

06:47.360 --> 06:47.980
Nobody.

06:48.200 --> 06:49.220
So you know all this.

06:49.500 --> 06:52.260
We record the lectures with Camtasia.

06:53.340 --> 06:54.400
I do it that way.

06:54.460 --> 06:56.200
There are different methods for that around.

06:56.720 --> 07:01.120
And the important point is that you have access to the AVI documents,

07:01.120 --> 07:05.340
so you can completely access these recorded lectures.

07:05.540 --> 07:11.340
It is inadequate to use them in a streamed way, so you should also use

07:11.340 --> 07:13.140
a reasonable media player.

07:13.920 --> 07:19.680
Let me switch to the 10, so you definitely can use any media player

07:19.680 --> 07:30.180
for playing these recorded lectures, but it is very important to use a

07:30.180 --> 07:33.720
player that is reasonable, and a player that is reasonable should

07:33.720 --> 07:36.940
always allow for visible scrolling.

07:37.200 --> 07:44.540
That means you should be able to just have a fast view, just to scroll

07:44.540 --> 07:48.780
very fast through such a recorded lecture, because it just does not

07:48.780 --> 07:54.640
make sense to look at such a recorded lecture from the beginning in

07:54.640 --> 07:55.500
the streaming mode.

07:55.740 --> 08:00.640
Normally, you would just like to look at several specific points in

08:00.640 --> 08:04.280
the lecture, in particular, if at a later point you would like to re

08:04.280 --> 08:05.940
-access certain parts of the lecture.

08:06.420 --> 08:12.960
You have to be able to do that in an efficient, effective way, and for

08:12.960 --> 08:16.820
that it is important to have visible scrolling, which is offered by

08:16.820 --> 08:22.080
the Camtasia player, but it is not offered, for example, by the

08:22.700 --> 08:23.940
Windows Media Player.

08:24.080 --> 08:27.620
The Windows Media Player does not allow visible scrolling.

08:27.820 --> 08:30.880
Some other players also don't allow that, and these are just useless.

08:31.240 --> 08:34.240
So, in particular, for e-learning purposes.

08:34.400 --> 08:39.000
For looking at a movie, that might be okay, but not for e-learning

08:39.000 --> 08:39.460
purposes.

08:39.720 --> 08:43.280
So, for that, you should use the Camtasia player, and if you don't use

08:43.280 --> 08:49.820
that, you have to download this TechSmith codec, because that's a

08:49.820 --> 08:51.640
specific codec that is used by Camtasia.

08:52.660 --> 09:00.800
Okay, all the information on this course is available in the Vollisons

09:00.800 --> 09:12.300
Arbeitsbereich, the course site, so let me briefly go to the site of

09:12.300 --> 09:12.960
the course.

09:14.080 --> 09:16.960
This is funny, I could not... oh, I know why.

09:17.740 --> 09:18.450
I did not...

09:19.370 --> 09:20.410
I should briefly

09:24.660 --> 09:28.300
access the network.

09:29.280 --> 09:29.860
This

09:33.530 --> 09:34.490
is not correct.

09:40.520 --> 09:44.380
I'm not connected to the network, so I briefly have to connect to the

09:44.380 --> 09:44.780
network.

09:45.000 --> 09:52.120
There you see the homepage of my institute, and now I can access the

09:52.120 --> 10:04.020
network, and now we can go back to the slides, and I can access the

10:04.020 --> 10:09.180
course website.

10:10.320 --> 10:11.560
Yeah, you

10:17.350 --> 10:21.270
know that always takes a bit of time.

10:21.630 --> 10:26.490
Like, my experience is that the new system is rather slow.

10:26.730 --> 10:31.330
I've used it in the previous weeks a few times, and it was rather

10:31.330 --> 10:31.830
slow.

10:32.870 --> 10:39.210
If you have, or if you notice things that are not okay with the new

10:39.210 --> 10:50.030
system, you should report them to the team or to the... yeah, I just

10:50.030 --> 10:54.230
want to say you should report them to somebody, but I'm not aware

10:54.230 --> 10:58.770
whether there is actually... or you could always address criticism to

10:58.770 --> 11:00.570
the bit8000 address.

11:00.890 --> 11:06.110
They are the channel for getting, for at least collecting all this

11:06.110 --> 11:10.430
information of people who have problems with the system, and then they

11:10.430 --> 11:13.610
will transfer that to the adequate other people.

11:14.110 --> 11:17.130
So it's still trying to access my course.

11:17.270 --> 11:25.150
So here is now the course website, and there you see all the important

11:25.150 --> 11:30.830
information, some information on dates, and I will in a moment come to

11:30.830 --> 11:33.050
the subscription for tutorials.

11:35.610 --> 11:41.430
And you know that there are all these links here to the content of the

11:41.430 --> 11:47.710
course, so we make available for you several different things.

11:50.650 --> 11:56.610
This takes a moment to load the information again.

12:09.010 --> 12:13.390
This is really annoying that it takes that much of time.

12:13.770 --> 12:17.790
So we have the assignments which are listed there always.

12:18.050 --> 12:19.130
It's empty in the moment.

12:19.270 --> 12:26.090
The lecture slides here, you can see that there are already the slides

12:26.090 --> 12:28.850
of today's lecture are there already.

12:29.210 --> 12:33.590
I will try to make these slides always available ahead of the

12:33.590 --> 12:41.810
lectures, but I cannot guarantee that there will always be the most

12:41.810 --> 12:43.490
current versions there.

12:43.570 --> 12:44.450
I will try to do that.

12:44.570 --> 12:49.090
Usually I'm always looking at the slides the day before, and very

12:49.090 --> 12:55.670
often I'm changing things, at least to some extent, sometimes only

12:55.670 --> 12:56.510
very few things.

12:58.150 --> 13:05.070
So that's why these slides are there usually just only a few hours

13:05.070 --> 13:06.490
before the lecture.

13:06.790 --> 13:13.330
But you can always look at the slides of last year and then there is

13:13.330 --> 13:16.710
quite some overlap, like most of them are almost the same.

13:17.750 --> 13:24.750
There is a link on all kinds of literature that is relevant for this

13:24.750 --> 13:25.130
course.

13:25.290 --> 13:26.150
There is the forum.

13:26.990 --> 13:28.990
There is no message there in the forum.

13:29.130 --> 13:30.850
There should have been a welcome message in there.

13:31.310 --> 13:34.590
So if you have information that you would like to exchange with

13:34.590 --> 13:40.830
others, or if you would like to ask a question, the team of the course

13:40.830 --> 13:44.130
just use the forum and you will get answers.

13:44.330 --> 13:49.250
The forum is watched all the time, and so you get a response to a

13:49.250 --> 13:50.610
question that's posed there.

13:51.290 --> 13:55.190
There are a number of links to all kinds of things, in particular to

13:55.190 --> 13:58.670
the recorded slides.

13:59.450 --> 14:07.270
These will be links to the recorded lectures that are listed in the

14:07.270 --> 14:12.410
DIVA, the digital video and audio archive of our library.

14:13.470 --> 14:19.970
And that's what we have there in that course website.

14:20.690 --> 14:24.330
Okay, let's go back to the presentation.

14:25.030 --> 14:30.130
So all the information is available there, and if you have new

14:30.130 --> 14:36.350
information, then this is also available on that site.

14:36.470 --> 14:43.690
I would like to briefly mention one more thing, that you can always

14:43.690 --> 14:52.170
use this button here, actions, and you can you can get this

14:52.170 --> 14:56.190
information, automatic information service, which informs you about

14:56.190 --> 14:58.390
any changes on a particular area.

14:58.650 --> 15:05.410
So you get informed whenever we put some new lecture slides on the

15:05.410 --> 15:12.350
lecture slide list, or just changes in these specific directories will

15:12.350 --> 15:16.130
be sent to you, if you register for that service.

15:17.090 --> 15:20.990
Okay, so that's some organizational information.

15:21.650 --> 15:25.790
Just what I said, you should bookmark the resource directories, which

15:25.790 --> 15:28.850
makes it much more convenient to use these things.

15:30.430 --> 15:35.030
The course Algorithms for Internet Applications has been present for

15:35.030 --> 15:40.130
some time in the in some cooperation of different universities on

15:40.130 --> 15:41.350
informatics courses.

15:42.770 --> 15:50.830
The ULI, Universitärer Lehrverbund Informatik, was a project some time

15:50.830 --> 15:54.610
ago already, but it had had some consequence of some implications,

15:54.610 --> 15:59.230
because there are still some students which are listening to this

15:59.230 --> 16:04.990
course, not here at Karlsruhe, but at, for example, at Hanover, there

16:04.990 --> 16:08.890
are always some students, there's a special arrangement meanwhile for

16:08.890 --> 16:13.930
that university, so that they can also attend this course, get, or

16:13.930 --> 16:21.030
they can submit assignments, and sometimes there are also students

16:21.030 --> 16:26.650
from Freiburg or Mannheim, and we also have this EUKOR cooperation in

16:26.650 --> 16:30.510
the Upper Rhine region, like the European cooperation in the

16:30.510 --> 16:36.610
Oberrheingraben, Upper Rhine area, and as you know, every student in

16:36.610 --> 16:44.750
this Upper Rhine area has the right to just, or can just go to any of

16:44.750 --> 16:50.150
those universities and attend courses there, by just being a student

16:50.150 --> 16:51.630
of one of these universities.

16:51.950 --> 16:57.110
So this is the cooperation of all these universities, and students

16:57.110 --> 17:01.970
coming from some of those universities here, either from Hanover,

17:02.350 --> 17:07.830
Freiburg, or Mannheim, or from these EUKOR universities, should

17:07.830 --> 17:13.470
address questions to my assistant Mark Möhltein, so if somebody

17:13.470 --> 17:17.790
listens to this lecture without being in this room, that's the way

17:17.790 --> 17:22.330
they can get contact to my team.

17:23.130 --> 17:27.750
Okay, time and locations of this course, you know that we are here on

17:27.750 --> 17:32.870
a Tuesday between 9.45 and 11.15, we are here in the multimedia

17:32.870 --> 17:36.730
lecture hall, so all those who are present know where we are, those

17:36.730 --> 17:41.390
who are not here in this room see it in this way, and we have

17:41.390 --> 17:50.750
tutorials which are offered by my assistant Mark Möhltein, so he has

17:50.750 --> 17:58.150
office hours Wednesdays 15 to 16 in the afternoon, so 3 to 4 pm, and

17:58.150 --> 18:00.310
he has also the standard email address.

18:00.690 --> 18:07.070
We have three tutors who will assist you in, or who will lead the

18:07.070 --> 18:13.550
tutorials, so we have three standard times for the tutorials.

18:13.810 --> 18:17.250
The tutors are Melina Schwarz, Christian Elling, Philipp Flöser, is

18:17.250 --> 18:18.390
one of them here in this room?

18:19.690 --> 18:20.970
No, they're not here, okay.

18:21.670 --> 18:26.790
Mark Möhltein is also not here, he's just taking part in a trip to the

18:26.790 --> 18:31.390
United States where he's attending Smart Grid conference, but he will

18:31.390 --> 18:33.110
be back next week.

18:34.010 --> 18:40.110
And if you would like to take part in the tutorials, which I

18:40.110 --> 18:45.950
definitely recommend, you should register for one of those tutorials,

18:46.050 --> 18:49.570
or you should register for the tutorials using the uSubscribe service.

18:49.730 --> 18:53.430
The uSubscribe service is a service that has been designed by your

18:53.430 --> 18:57.170
fellow students in an advanced lab that we offered within the KIM

18:57.170 --> 19:03.630
project, so this web service allows you to just put in all your

19:03.630 --> 19:07.930
preferences for assignment to tutorials, and then you are assigned

19:07.930 --> 19:14.910
after the registration period, you are assigned automatically to those

19:14.910 --> 19:21.710
groups that are the best or that comply with your preferences in the

19:21.710 --> 19:22.210
best way.

19:22.970 --> 19:26.790
So I guess you know how to access that, there is the link on the

19:26.790 --> 19:33.270
homepage of this course, so you can register for the tutorial, it

19:33.270 --> 19:38.310
should be accessible now already, but it's not a first come first

19:38.310 --> 19:43.550
serve system, you just put in your preferences, you can form groups of

19:43.550 --> 19:49.170
students who would like to get registered for the same tutorial, and

19:49.170 --> 19:54.210
only after this registration period has ended, the assignments are

19:54.210 --> 19:54.510
made.

19:54.910 --> 19:58.630
So no problem if you don't do it right away, but during the next days,

19:58.690 --> 20:03.310
but you should do it before the 27th of October, before next week,

20:03.490 --> 20:03.810
Wednesday.

20:05.290 --> 20:11.630
Okay, the tutorials will start on November 2nd, so two weeks from now,

20:12.090 --> 20:13.530
you will have the first tutorials.

20:14.510 --> 20:17.830
And what is the concept of the tutorials?

20:18.050 --> 20:23.170
You know that learning works only with doing something with the

20:23.170 --> 20:27.470
material that is presented to you, you have to do something actively,

20:27.810 --> 20:34.030
and so you get assignments where you can work on the topics that are

20:34.030 --> 20:38.050
presented, so you will do some exercises in the tutorials, you will

20:38.050 --> 20:42.790
get some home assignments, and these assignments will be reviewed in

20:42.790 --> 20:47.530
the tutorials, you will get solutions there, you can present your own

20:47.530 --> 20:52.830
solutions, and you can also submit solutions to home assignments, and

20:52.830 --> 20:57.690
then they will be looked at, you will get feedback to your solutions.

20:58.310 --> 21:02.130
There will be a programming assignment, which is a bit larger than the

21:02.130 --> 21:07.970
other assignments, and if you do that successfully, if you complete

21:07.970 --> 21:19.970
that successfully, it will be counted as one of the tasks that you

21:19.970 --> 21:28.010
have to do in the bonus examination, which is offered on Saturday,

21:28.790 --> 21:30.530
January 15th.

21:31.410 --> 21:37.470
You will get three exercises that you have to, or three problems that

21:37.470 --> 21:42.770
you have to solve, and everybody who has worked successfully in the

21:42.770 --> 21:47.590
tutorials, worked on the assignment successfully, will be able to

21:47.590 --> 21:56.950
complete those exercises in the exam in a successful way, and you have

21:56.950 --> 22:03.590
to solve completely two of the three tasks in that bonus examination

22:03.590 --> 22:05.190
in order to pass.

22:05.670 --> 22:09.210
If you have done the programming assignment successfully, it's

22:09.210 --> 22:14.450
sufficient to do one more of those tasks in the bonus examination.

22:15.430 --> 22:20.430
Okay, information on that will also be available on the BAB, the

22:20.430 --> 22:21.190
course website.

22:22.130 --> 22:26.350
The bonus that you get is rather, you could say, marginal, but

22:26.350 --> 22:28.570
nevertheless, it's worth doing that.

22:29.250 --> 22:34.470
You get an improvement of your mark by one step, that means you get 0

22:34.470 --> 22:41.890
.3 or 0.4, or an improvement by 0.3 or 0.4, depending on where you end

22:41.890 --> 22:44.170
up in your final exam.

22:44.490 --> 22:48.470
So you have to pass the final exam, and then the bonus will improve

22:48.470 --> 22:49.530
your mark.

22:52.290 --> 22:56.650
Yeah, that's everything, I think, with respect to this bonus

22:56.650 --> 22:57.430
examination.

22:58.270 --> 23:03.170
So, as I said, participation in the tutorials is something which

23:03.170 --> 23:09.050
always gives you a bonus, because you learn more intensively what has

23:09.050 --> 23:16.430
been presented in the course, and so that is the bonus for the final

23:16.430 --> 23:16.870
exam.

23:17.150 --> 23:20.130
And then, if you are successful in the bonus examination, you get this

23:20.130 --> 23:25.050
additional bonus of one more step in the final mark.

23:26.170 --> 23:31.330
Okay, this course offers 4.5 or 5 credits.

23:31.790 --> 23:37.570
This is something which is very annoying, this calculation of credits.

23:38.190 --> 23:40.470
This has been changed over the years.

23:41.570 --> 23:48.250
Initially, at some time, we offered 4.5, then people agreed to compute

23:48.250 --> 23:50.750
those credit numbers in a different way.

23:51.190 --> 23:52.190
We switched to 5.

23:52.570 --> 24:01.570
One reason, actually, was that some people said it's not acceptable to

24:01.570 --> 24:03.630
have something like 4.5.

24:03.730 --> 24:09.450
You can only have integer values as credit values.

24:10.070 --> 24:14.970
The reason for that, certainly, it was actually written in the rules

24:14.970 --> 24:17.270
for setting up credit values.

24:17.970 --> 24:26.690
But the reason, certainly, was that in the information processing

24:26.690 --> 24:31.930
systems, using those credits, they only had integer types there, and

24:31.930 --> 24:38.490
so they could not handle a value like 4.5, a real value, which is just

24:38.490 --> 24:38.930
ridiculous.

24:39.530 --> 24:43.830
But this happened, and so we switched to 5.

24:44.230 --> 24:46.290
Now we are switching back to 4.5.

24:46.930 --> 24:50.630
We just have to look what kind of credits you need in your specific

24:50.630 --> 24:55.130
program of study, because in the modules, we specify how many credits

24:55.130 --> 24:55.490
you get.

24:56.170 --> 25:01.450
And I think this credit system is something which is not really an

25:01.450 --> 25:04.230
improvement of the teaching scenarios that we offer.

25:04.470 --> 25:09.390
It is part of this Bologna process of switching to a more transferable

25:14.630 --> 25:19.910
study achievement, but it does not really work in a reasonable way.

25:20.150 --> 25:24.330
So I would say we don't need it really, but we have to use them.

25:25.410 --> 25:29.410
And this course is offered to different programs of study, so

25:29.410 --> 25:33.290
certainly for business engineering, for economics engineering, and for

25:33.290 --> 25:36.590
information engineering and management, so for all the courses that

25:36.590 --> 25:40.970
are offered in the Faculty of Economics and Business Engineering.

25:43.250 --> 25:49.290
And you know that there are many different modules, so somehow this

25:49.290 --> 25:51.410
course got into quite a few of them.

25:51.770 --> 26:02.010
In particular, this course is available in in third year modules in

26:02.010 --> 26:06.770
information engineering, also in master programs, master modules.

26:07.550 --> 26:14.810
We emphasize always the fact that the third year of the bachelor

26:14.810 --> 26:22.970
studies is of the same quality and requirements as the master program.

26:23.270 --> 26:27.270
Certainly the master program is a bit more intensive at the end, but

26:27.270 --> 26:31.250
in principle the courses that we offer for third year bachelor

26:31.250 --> 26:37.570
students and for master students are very comparable, and so it makes

26:37.570 --> 26:42.690
sense to have courses that are both in the third year bachelor and in

26:42.690 --> 26:43.590
the master program.

26:43.810 --> 26:48.210
We don't want to get into a situation where undergraduate studies,

26:48.310 --> 26:52.290
that means studies in the bachelor program, are of a very low level

26:52.290 --> 26:55.930
and only the master program is at a standard that we think is

26:55.930 --> 26:59.210
necessary in order to do reasonable work afterwards.

27:00.210 --> 27:04.290
Okay, with respect to those students from Hanover, they have to check

27:04.290 --> 27:09.070
with their local program where they fit this course in.

27:10.430 --> 27:12.310
What kind of exam do we offer?

27:12.790 --> 27:17.030
There will be a written exam on Tuesday or Wednesday in the week after

27:17.030 --> 27:25.210
the lectures end, so February 15 or 16 will be the days where we have

27:25.210 --> 27:27.170
this final exam.

27:27.950 --> 27:35.330
We cannot fix that beforehand because this depends on which students

27:35.330 --> 27:37.330
register for this exam.

27:37.750 --> 27:40.670
We have to make sure that there are no overlaps in time between

27:40.670 --> 27:41.590
different exams.

27:42.690 --> 27:45.410
The exam questions will be in English.

27:45.670 --> 27:48.890
I'm teaching this course in English, but you may definitely answer in

27:48.890 --> 27:49.250
German.

27:49.490 --> 27:53.030
What I would like to check in the exam is whether you know the know

27:53.030 --> 27:56.390
the contents and whether you know how to deal with algorithms and

27:56.390 --> 28:01.830
internet applications, but I'm not checking whether you are correct in

28:01.830 --> 28:02.690
using English.

28:03.230 --> 28:05.530
This is just not the point.

28:06.170 --> 28:10.030
So one could ask why do we actually present English courses.

28:10.950 --> 28:13.710
One topic is internationalization.

28:14.510 --> 28:21.830
So you as German students would like to improve your skills in talking

28:21.830 --> 28:22.470
in English.

28:23.250 --> 28:26.510
Then there will also be foreign students.

28:26.710 --> 28:31.190
Is there any student in this room who's a foreign student, an exchange

28:31.190 --> 28:31.610
student?

28:32.670 --> 28:33.750
You are an exchange student.

28:33.850 --> 28:34.650
Where are you coming from?

28:35.530 --> 28:35.890
Australia.

28:36.710 --> 28:37.030
Perfect.

28:37.430 --> 28:38.130
Which town?

28:39.490 --> 28:40.230
Melbourne.

28:41.170 --> 28:41.890
From which university?

28:42.290 --> 28:43.530
From RMIT.

28:44.110 --> 28:44.510
Perfect.

28:45.190 --> 28:47.490
Because we had cooperation with the RMIT.

28:47.990 --> 28:53.030
I had an exchange program and the RMIT canceled that program because

28:53.030 --> 28:57.350
they said there's no interest whatsoever from RMIT students in going

28:57.350 --> 28:58.050
to Karlsruhe.

28:58.530 --> 29:01.130
And so they didn't want to continue that program.

29:01.250 --> 29:02.330
So I'm glad that you are here.

29:02.930 --> 29:04.650
We have to talk about that.

29:05.350 --> 29:09.270
So this is strange, but you are very welcome to this course.

29:11.450 --> 29:13.470
But you are fluent in German also?

29:13.910 --> 29:14.150
No.

29:16.010 --> 29:18.970
So this is important for you to have a course in English.

29:19.610 --> 29:20.050
Perfect.

29:20.850 --> 29:24.270
So you see, I have to teach this course in English, even if most of

29:24.270 --> 29:26.950
you understand, certainly understand German.

29:28.190 --> 29:31.890
So this is a preparation for foreign studies.

29:32.150 --> 29:35.990
If you would like to spend some time in a foreign country, go to a

29:35.990 --> 29:40.210
foreign university, which is something like... how many of you have

29:40.210 --> 29:42.230
already spent some time at a foreign university?

29:43.550 --> 29:44.310
A few.

29:44.710 --> 29:44.970
Okay.

29:45.230 --> 29:47.270
How many of you intend to do that?

29:47.970 --> 29:48.630
Okay.

29:50.550 --> 29:52.750
But I should also ask one more question.

29:52.890 --> 29:55.390
How many of you are students of business engineering?

29:57.050 --> 29:58.710
Aha, the same hands are going up.

29:59.770 --> 30:03.590
How many students are from information engineering and management?

30:03.910 --> 30:04.490
Okay.

30:06.150 --> 30:08.270
And economics engineering?

30:09.870 --> 30:10.530
Nobody.

30:11.090 --> 30:11.390
Okay.

30:12.250 --> 30:15.770
And we know that most of the business engineering students usually

30:15.770 --> 30:20.110
spend some time at a foreign university, although it's more difficult

30:20.110 --> 30:24.630
to fit that into this bachelor master structure.

30:25.230 --> 30:29.450
But I hope that we can really maintain that.

30:29.590 --> 30:35.030
And in particular, we are very interested in having students who spent

30:35.030 --> 30:38.590
some time in a foreign country, studied there, and then come back to

30:38.590 --> 30:40.290
Karlsruhe and get their degree here.

30:40.290 --> 30:45.490
Because then we have the students or the graduates who are qualified

30:45.490 --> 30:50.450
not only with respect to their program of study, but also with respect

30:50.450 --> 30:54.550
to experience in foreign countries, which is a very important

30:54.550 --> 30:55.310
competence.

30:56.250 --> 30:56.330
Okay.

30:57.430 --> 30:58.070
Good.

30:58.510 --> 31:03.650
So this is... and certainly for your job life, this is an important

31:03.650 --> 31:09.790
thing, because nowadays you can never expect to talk only to German

31:09.790 --> 31:13.530
colleagues, German partners, but you will have to do with

31:13.530 --> 31:14.970
international partners.

31:15.750 --> 31:20.110
And therefore, just for example, to make it possible for a student

31:20.110 --> 31:26.710
from, for example, Australia or the United States, to spend some time

31:26.710 --> 31:32.090
here in Karlsruhe and study here in a reasonable way, we are offering

31:32.650 --> 31:36.010
English courses in almost all subjects of this faculty.

31:37.490 --> 31:39.690
So you have a choice of different courses.

31:40.110 --> 31:43.970
I hope you found a significant number of courses that you can attend.

31:45.030 --> 31:45.630
Okay.

31:46.890 --> 31:49.650
So what is the content of this course?

31:52.310 --> 31:55.330
Certainly, I have to tell you something about internet applications.

31:55.910 --> 32:00.170
There are, as you know, huge numbers of internet applications that we

32:00.170 --> 32:03.450
can look at, electronic commerce, digital libraries, distributed

32:03.450 --> 32:07.470
companies, computing in the web, social networks, I could add many,

32:07.470 --> 32:08.430
many, many things.

32:09.050 --> 32:13.230
But I talk about algorithms, so I should also give you some

32:13.230 --> 32:19.010
information on, well, what is the technology of the internet?

32:19.670 --> 32:24.210
And we have to briefly look at the history, look at the basic

32:24.210 --> 32:27.810
technology, the communication technology, that means communication

32:27.810 --> 32:32.690
protocols, routing protocols, how do we send information back and

32:32.690 --> 32:33.450
forth in the internet.

32:34.130 --> 32:38.590
And I will tell you something about the way we actually search for

32:38.590 --> 32:42.910
information in the internet, in particular, in the World Wide Web.

32:44.590 --> 32:49.290
And if we communicate in the internet, an important point is to do

32:49.290 --> 32:50.430
that in a secure way.

32:51.110 --> 32:54.770
So I'm also telling you something about cryptographic algorithms and

32:54.770 --> 32:59.510
how we use them to ensure secure communication.

33:00.070 --> 33:03.070
I will talk about electronic payment systems.

33:03.310 --> 33:07.170
This is a topic which is changing over the time quite heavily.

33:08.530 --> 33:12.750
And I will just give you some information on what kind of requirements

33:12.750 --> 33:17.250
we have for electronic payment systems and what kind of systems are

33:17.250 --> 33:19.450
around to actually pay in an electronic way.

33:19.950 --> 33:22.510
I will briefly tell you something about firewalls.

33:22.670 --> 33:27.150
And if time allows, I will also tell you something about data

33:27.150 --> 33:30.630
compression, because we send information over the network with huge

33:30.630 --> 33:37.950
data packets or data items, data objects, and compression is necessary

33:37.950 --> 33:43.610
to reduce the traffic that is necessary for that communication.

33:44.750 --> 33:48.290
There are many more interesting topics that you can look at.

33:49.030 --> 33:54.990
We have interesting things with respect to digital libraries, then

33:54.990 --> 33:57.190
representation of audio-visual data.

33:57.550 --> 34:02.270
When we talk about search engines, usually we only look at syntactic

34:02.270 --> 34:06.790
information, looking for textual information, but it is interesting to

34:06.790 --> 34:13.910
also look at audio or video information, or image information, like

34:13.910 --> 34:19.890
looking for, let's say, red cards or whatever, just objects on a

34:19.890 --> 34:20.510
picture.

34:21.030 --> 34:23.890
Usually we only look for textual descriptions of pictures.

34:24.870 --> 34:34.870
Or if you would like to search through news channels, if you look at

34:34.870 --> 34:39.110
all the information that you get within news, it should be searchable,

34:39.290 --> 34:42.770
but that's a difficult thing because you need language processing for

34:42.770 --> 34:43.030
that.

34:43.150 --> 34:46.750
And then we have all kinds of topics of web computing, which is a very

34:46.750 --> 34:50.050
old topic and also a very new topic at the same time.

34:50.490 --> 34:53.630
There have been things like hypercomputing, metacomputing around in

34:53.630 --> 34:58.030
the beginning of the 90s of the last century, so almost 20 years ago.

34:59.470 --> 35:04.870
And this changed its name and always got a new hype.

35:04.990 --> 35:10.250
We had hypercomputing combining different computing facilities into

35:10.250 --> 35:15.650
some virtualized computing object or resource.

35:16.290 --> 35:17.830
Metacomputing, similar thing.

35:18.190 --> 35:21.230
And then all of a sudden we got grid computing and everybody jumped on

35:21.230 --> 35:21.570
that.

35:22.070 --> 35:26.410
Now grid computing is almost completely out and people don't talk

35:26.410 --> 35:32.990
anymore about grid computing, but about cloud computing, which is grid

35:32.990 --> 35:35.950
computing plus a bit more service orientation.

35:37.170 --> 35:40.130
And so these would also all be interesting topics, but they are

35:40.130 --> 35:42.750
treated in more depth in other courses and not in this course.

35:43.370 --> 35:45.870
And then an important point is also spam protection.

35:46.010 --> 35:52.910
How can we filter out the unwanted information from all this

35:52.910 --> 35:55.090
information that we have in the internet?

35:55.890 --> 35:58.550
But that's not the topic of this course.

35:59.790 --> 36:03.790
References are, well, there are many references that are available,

36:04.490 --> 36:08.810
many different sources of information on the internet, like the

36:08.810 --> 36:09.890
Request for Comments.

36:10.950 --> 36:15.270
There is the World Wide Web Consortium having information on all the

36:15.270 --> 36:17.610
different standards that are important there.

36:18.110 --> 36:21.410
There's information on the internet history available, like many

36:21.410 --> 36:22.710
different sources for that.

36:23.510 --> 36:27.170
And we will provide specific links on the web pages of this course.

36:27.570 --> 36:31.170
There are all kinds of journal articles and certainly also books.

36:32.170 --> 36:38.990
And for example, on cloud computing, there's a good, rather new book

36:38.990 --> 36:44.490
by my colleague Stefan Tei and Marcel Kunze from the Steinbruch Center

36:44.490 --> 36:49.830
of Computing and two assistants on cloud computing, web-based dynamic

36:49.830 --> 36:50.790
IT services.

36:52.090 --> 36:55.670
And as I said, that's not really the topic of this course, but it is

36:55.670 --> 36:59.570
related to using the internet in an effective way.

37:00.130 --> 37:04.390
And then there are many other books available on internet algorithms,

37:04.690 --> 37:08.490
like the standard books by Tannenbaum or books on information

37:08.490 --> 37:12.670
retrieval by Frakes and by the Yates or newer versions.

37:13.290 --> 37:20.810
There are books on security, so many different books available.

37:21.270 --> 37:24.810
You can also find the references in the website.

37:25.570 --> 37:29.170
So that is the introduction to the organizational things.

37:29.630 --> 37:32.910
Do you have questions with respect to these organizational things?

37:37.410 --> 37:38.410
No questions?

37:39.470 --> 37:51.730
Okay, then I look for the next... oops, this is the wrong... not where

37:51.730 --> 37:52.770
I wanted to get to.

37:53.530 --> 38:03.330
I have to get to my course and go to chapter one.

38:06.730 --> 38:11.550
So let us come now to some remarks on the internet.

38:13.410 --> 38:15.430
Okay, some remarks and motivation.

38:16.210 --> 38:17.610
What actually is the internet?

38:17.750 --> 38:21.950
When we talk about the internet, I guess some of you have already seen

38:21.950 --> 38:22.790
that definition.

38:23.130 --> 38:25.730
Actually, it has been defined what the internet is.

38:26.150 --> 38:31.570
Internet is not just some network, but there is a specific definition

38:31.570 --> 38:37.990
what constitutes the internet, has been defined in 95, so quite some

38:37.990 --> 38:38.570
time ago.

38:39.470 --> 38:43.310
So the Federal Networking Council, Federal Networking Council relates

38:43.310 --> 38:49.750
to some institution in the United States, agrees that the following

38:49.750 --> 38:52.850
language reflects our definition of the term internet.

38:53.550 --> 38:58.070
And there are three different or three essential aspects that

38:58.070 --> 39:01.010
constitute the notion of the internet.

39:01.190 --> 39:05.370
First of all, it is a global information system.

39:06.850 --> 39:12.890
So worldwide available, not only worldwide, but even beyond the earth.

39:14.290 --> 39:18.750
And this information system is logically linked together by a globally

39:18.750 --> 39:20.450
unique address space.

39:20.630 --> 39:24.550
A very important thing in the beginning of like when the internet was

39:24.550 --> 39:30.250
built, there were many different address, addressing conventions, and

39:30.250 --> 39:34.350
it was quite some complex task to actually find out how to address

39:34.350 --> 39:38.910
specific users in these different networks.

39:39.950 --> 39:45.090
The internet has a globally unique address space, which is based on

39:45.090 --> 39:50.590
the internet protocol format or its subsequent extensions follow on.

39:50.850 --> 39:55.030
So if you don't use the internet protocol addressing scheme in a

39:55.030 --> 39:56.530
network, it's not the internet.

39:57.450 --> 39:59.830
It is able to support communications.

40:00.310 --> 40:03.610
So we have to address components in the network.

40:03.790 --> 40:08.390
So if this is the global network, we have to be able to address each

40:08.390 --> 40:09.970
specific element in there.

40:10.490 --> 40:15.050
We have to be able to communicate between all these different

40:15.050 --> 40:15.630
components.

40:15.970 --> 40:20.350
And so we need some communication protocol, the TCP IP transmission

40:20.350 --> 40:25.350
control protocol, internet protocol, is the protocol that constitutes

40:25.350 --> 40:30.690
the internet and subsequent extensions follow on or other IP

40:30.690 --> 40:31.930
compatible protocols.

40:32.670 --> 40:36.230
But TCP IP is what defines the internet.

40:36.630 --> 40:39.510
And then on top of that, we need high level services.

40:39.590 --> 40:44.290
So we have addressability of the components, we have communication

40:44.290 --> 40:50.730
standards, and we have high level services on top of those protocols.

40:51.710 --> 40:58.730
And some entity having these properties is the internet.

40:59.370 --> 41:00.830
Okay, so that is the definition.

41:01.590 --> 41:05.450
If you visualize that this is the global information system having

41:05.450 --> 41:09.530
this globally unique address space, so you can address all the

41:09.530 --> 41:13.050
individual components or individual computers in Australia, in the

41:13.050 --> 41:15.090
States, in different countries.

41:15.970 --> 41:23.530
Also in Africa, where with respect to Africa, one could talk about

41:23.530 --> 41:29.450
interesting aspects with respect to connection of people toward the

41:29.450 --> 41:30.130
internet there.

41:30.270 --> 41:36.590
There are interesting scenarios where some buses or vehicles having a

41:36.590 --> 41:44.470
server, like a standalone server, just drive around certain areas in

41:44.470 --> 41:48.370
Africa, which are not connected to the internet, provide local access

41:48.370 --> 41:52.670
to the server that they carry with them for the local people.

41:52.850 --> 41:55.710
And then they can access the information that is on that server, they

41:55.710 --> 41:57.670
can send messages on that server.

41:58.130 --> 42:02.190
And it's the next connection of that bus or vehicle with some access

42:02.190 --> 42:04.330
point, all these messages are transferred.

42:04.990 --> 42:09.430
And this is some delayed communication, but it's a way of getting

42:09.430 --> 42:12.590
access for people who are not directly connected to the networks.

42:13.770 --> 42:20.670
Okay, so we have these different aspects of the internet.

42:22.070 --> 42:27.650
The informal characterization of the internet is that it is an easily

42:27.650 --> 42:31.750
accessible medium for information or communication, just because of

42:31.750 --> 42:36.310
the standardization of addressing space and protocol.

42:36.590 --> 42:40.430
It is easily accessible, usable for many different applications.

42:41.330 --> 42:45.510
And so we can have something like a globally connected computer, cloud

42:45.510 --> 42:50.570
computing is the name that is very important there.

42:50.650 --> 42:55.110
Although certainly we should always look at latency that is connected

42:55.110 --> 42:55.650
with that.

42:55.770 --> 43:00.570
Certainly we can say we can store our data on any node in the

43:00.570 --> 43:00.870
internet.

43:01.930 --> 43:06.110
But if you look at the transmission times, the latency of sending

43:06.110 --> 43:11.710
something from one node to another, you can do a lot of information

43:11.710 --> 43:17.250
processing while some data item is sent from one node to the other,

43:17.650 --> 43:23.710
just because it just takes some time in the milliseconds or seconds to

43:23.710 --> 43:25.530
just send information between the nodes.

43:25.930 --> 43:32.570
Whereas on your local computer, you can operate just in a different

43:32.570 --> 43:33.210
time scale.

43:34.370 --> 43:36.870
Okay, then we have large algorithm service.

43:37.850 --> 43:43.950
Cloud computing provides algorithm services for computing certain or

43:43.950 --> 43:51.070
for providing certain interesting services for any user.

43:52.150 --> 43:56.850
We always have to look at communication overhead, but certainly have

43:56.850 --> 44:02.250
to look at the benefits of using these easily available resources.

44:03.630 --> 44:07.470
We have a worldwide digital library, you know that, that we have like

44:07.470 --> 44:08.890
we have all kinds of information.

44:10.010 --> 44:14.970
The number of times you visit the library goes down and we just visit

44:14.970 --> 44:17.990
the digital library because we have access to all these resources

44:17.990 --> 44:18.350
there.

44:18.450 --> 44:22.730
We don't have to go into the library to access the proceedings of the

44:22.730 --> 44:24.510
conference, we just do it online.

44:25.830 --> 44:31.390
And then certainly if we look at the way we retrieve information, this

44:31.390 --> 44:35.350
is an important point, we have to do that in an intelligent way.

44:36.030 --> 44:40.670
And we have a huge amount of information, then we would like to get

44:40.670 --> 44:44.910
high quality responses to a query.

44:45.550 --> 44:49.310
How do we actually get the most valuable information from this huge

44:49.310 --> 44:50.970
database that we have in the internet?

44:51.510 --> 44:54.810
This is something which is dealt with in the information retrieval

44:54.810 --> 44:55.490
area.

44:56.670 --> 45:00.190
These economic aspects certainly also have to be dealt with.

45:00.630 --> 45:05.750
If information is easily available, how can anybody make a profit from

45:05.750 --> 45:08.210
providing this information?

45:09.470 --> 45:13.790
Previously, all the publishers published journals, books, and so on,

45:13.850 --> 45:15.750
they have to be had to be purchased.

45:16.530 --> 45:20.290
Now you can just access them, very often free of charge.

45:20.450 --> 45:25.310
So you need completely different business models for operating in the

45:25.310 --> 45:29.850
worldwide web or using internet services.

45:30.350 --> 45:35.410
If you have some kind of worldwide information exchange, we know about

45:35.410 --> 45:40.710
all these social networks where you can present yourself, your

45:40.710 --> 45:47.030
company, your institution, you get all kinds of services like culture

45:47.030 --> 45:47.810
programs.

45:48.250 --> 45:51.330
You can access online learning things.

45:51.510 --> 45:54.750
You get weather forecasts, environmental data.

45:54.890 --> 46:00.750
When you go somewhere to a conference or for vacations, usually you

46:00.750 --> 46:04.110
look at what kind of weather you get there.

46:04.530 --> 46:08.510
And it's just normal, meanwhile, to use all these services to book

46:08.510 --> 46:14.110
your train ticket using the internet to do route planning and so on.

46:14.390 --> 46:19.570
New services are standard applications, audio on demand, also more or

46:19.570 --> 46:20.930
less video on demand.

46:21.750 --> 46:27.530
Personal newspapers are more and more available.

46:28.150 --> 46:32.510
And certainly we have all these brokerage services for all kinds of

46:32.510 --> 46:37.510
information, for jobs, for different types of products that are just

46:37.510 --> 46:39.710
traded over the internet.

46:41.170 --> 46:45.250
We have a worldwide communication system using all kinds of different

46:45.870 --> 46:51.070
communication channels, electronic mail, telephone services, news

46:51.070 --> 46:54.510
groups, and so on, electronic button boards.

46:54.930 --> 46:59.550
Our problem is not that we can use a discussion group, but we have too

46:59.550 --> 47:04.350
many and the problem is to do that in an efficient way.

47:05.590 --> 47:08.930
We can use computer supported cooperative work scenarios.

47:09.870 --> 47:16.010
And the important point which really changed our industry is that the

47:16.010 --> 47:20.650
distance between communication partners is no longer determined by

47:20.650 --> 47:25.290
their spatial distance, but by their communication bandwidth and

47:25.290 --> 47:25.790
latency.

47:26.130 --> 47:30.830
So sometimes you have easier communication with some people in very

47:30.830 --> 47:36.050
different countries than with people sitting on the next floor of your

47:36.050 --> 47:36.410
building.

47:40.150 --> 47:47.050
So just due to all these changes, we see that the network more and

47:47.050 --> 47:48.890
more becomes the provider of services.

47:49.350 --> 47:53.730
It's not a particular server which provides you with services, but you

47:53.730 --> 47:56.850
just access service and you don't bother where the service is coming

47:56.850 --> 47:57.270
from.

47:57.670 --> 48:01.490
And this certainly is one of the major drivers for cloud computing.

48:03.210 --> 48:05.590
Okay, then we have the worldwide marketplace.

48:06.050 --> 48:10.130
Electronic commerce is more and more there.

48:10.350 --> 48:14.730
It's more and more standard that you do business online, that you shop

48:14.730 --> 48:15.290
online.

48:16.190 --> 48:22.810
And so advertising is the major source of funding of the internet

48:22.810 --> 48:23.450
providers.

48:23.450 --> 48:29.670
Every company has to have a homepage, has to have a presence in the

48:29.670 --> 48:30.310
worldwide web.

48:31.010 --> 48:37.770
So there are all kinds of assistant services for doing business on the

48:37.770 --> 48:38.450
worldwide web.

48:41.550 --> 48:47.350
And then the companies themselves can use virtualization, can combine

48:47.350 --> 48:52.050
into virtual companies and do that in a temporary way.

48:52.370 --> 48:57.010
So for specific projects, you can just combine your competences with

48:57.010 --> 49:03.290
other companies and form just some virtual company which can sign a

49:03.290 --> 49:08.610
contract with some partner and then do a project and dissolve

49:08.610 --> 49:09.110
afterwards.

49:09.910 --> 49:14.110
And another point is that nowadays many companies are distributed

49:14.110 --> 49:14.610
worldwide.

49:14.610 --> 49:18.490
So you can have 24 hours effective operation.

49:19.130 --> 49:24.930
People are just working at different times during the day in Europe,

49:25.070 --> 49:25.810
Asia and America.

49:26.170 --> 49:33.630
And so you can have 24 hours people who are actively working on your

49:33.630 --> 49:35.010
company's tasks.

49:36.090 --> 49:38.070
And then we have things like virtual universities.

49:38.630 --> 49:44.310
This has been a hype in the beginning, like end of the 90s, beginning

49:44.310 --> 49:46.530
of this century.

49:47.030 --> 49:50.290
There have been many projects and we have been involved in quite a few

49:50.290 --> 49:54.690
of these projects like the virtual university in the Upper Rhine

49:54.690 --> 50:00.990
region, the university of ULI, the corporation of informatics

50:00.990 --> 50:10.230
universities, the Wissenswerkstatt Rechensysteme was a combination of

50:10.230 --> 50:15.650
people to design projects and to design e-learning modules for

50:15.650 --> 50:17.130
computer engineering.

50:17.730 --> 50:24.890
NUCART, the notebook university at the university of Karlsruhe TH, you

50:24.890 --> 50:28.730
know that the KIT has been known before as the Universität Karlsruhe

50:28.730 --> 50:30.570
TH, Technische Hochschule.

50:31.890 --> 50:35.350
And maybe some of you still remember that there has once been a

50:35.350 --> 50:36.490
university of Karlsruhe.

50:37.430 --> 50:44.310
And so we also have this Eukorpe Virtuale, where we just provided

50:44.310 --> 50:51.210
information that we usually teach in face-to-face classes in just some

50:51.210 --> 50:52.010
digital way.

50:52.430 --> 50:57.950
We designed all kinds of e-learning modules and we experimented with,

50:58.090 --> 51:02.590
for example, tele-teaching, teaching a course that is available at the

51:02.590 --> 51:07.230
same time for people at Karlsruhe, at Freiburg, at Mannheim.

51:07.810 --> 51:13.010
We taught in these scenarios and found out it's not really the best

51:13.010 --> 51:13.590
scenario.

51:13.750 --> 51:17.090
The best thing is to have something what we are doing now, record a

51:17.090 --> 51:20.210
lecture and then provide it to others afterwards so that they can

51:20.210 --> 51:23.230
actually access all the information.

51:23.830 --> 51:24.390
And they get

51:27.730 --> 51:34.670
also the possibility to take part in the tutorials in a distance

51:34.670 --> 51:36.490
learning way.

51:37.050 --> 51:42.790
And in that way, they get the attention that they need and they have

51:42.790 --> 51:46.090
access to all the information that we provide in our lectures.

51:46.970 --> 51:47.090
Okay.

51:47.490 --> 51:52.630
The idea of the politicians certainly was that, oh, we can design a

51:52.630 --> 51:57.990
virtual university, then we only need one highly qualified course on,

51:58.190 --> 52:01.850
for example, efficient algorithms, one on, let's say, algorithms for

52:01.850 --> 52:05.010
internet applications or only one course on database systems.

52:05.390 --> 52:08.710
And all the other universities will just access that information and

52:08.710 --> 52:14.350
we don't need that many professors who are quite extensive.

52:15.070 --> 52:21.790
And we can do that in a more effective, that means less costly way.

52:22.090 --> 52:27.370
This hope of the politicians did not work out because you have to

52:27.370 --> 52:35.830
spend time with the students in order to make sure that they learn

52:35.830 --> 52:36.150
something.

52:36.450 --> 52:46.270
And so this always is expensive and it's just not the adequate idea to

52:46.270 --> 52:49.890
do this under the objective of saving money.

52:50.170 --> 52:53.830
But the objective of having a virtual university is that you as a

52:53.830 --> 52:57.950
student have a way of accessing information on demand.

52:58.110 --> 53:02.050
If you have the need for certain information on a certain topic, you

53:02.050 --> 53:04.630
should be able to access that information.

53:05.410 --> 53:05.810
And so

53:09.110 --> 53:15.610
that's the major benefit of these e-learning efforts that had been

53:15.610 --> 53:21.890
very widespread at the beginning of the century.

53:23.310 --> 53:23.590
Okay.

53:24.010 --> 53:26.250
There are many applications that are available.

53:26.770 --> 53:32.290
I already said that the internet has definitely changed our lives and

53:32.290 --> 53:35.750
it will change our lives in the future even more.

53:36.230 --> 53:38.970
The way we communicate has changed quite a bit.

53:39.110 --> 53:41.890
We have video conferencing, voice over IP.

53:42.550 --> 53:47.870
It's now quite normal to communicate using Skype or things like that.

53:50.010 --> 53:52.910
So this is something which we all use.

53:53.130 --> 53:57.390
The question is what are the things that we have to address as a

53:57.390 --> 53:58.150
computer scientist?

53:58.850 --> 54:04.450
So we have to ensure reliable communications that the connection in

54:04.450 --> 54:06.450
voice over IP does not break down.

54:06.890 --> 54:10.450
We have to make sure that we don't get undesired messages.

54:10.790 --> 54:14.750
We are all just flooded with undesired messages.

54:15.430 --> 54:18.850
What can we do about undesired communication of criminals?

54:19.190 --> 54:25.210
You know that for some time in the 80s and beginning of the 90s, or in

54:25.210 --> 54:31.010
the 90s actually, until the mid or almost the end of the 90s, the

54:31.010 --> 54:38.070
politicians actually said that it should be forbidden to use encrypted

54:38.070 --> 54:43.070
information because only somebody who is interested in hiding the

54:43.070 --> 54:49.570
contents of the communication because of criminal reasons will

54:49.570 --> 54:50.550
actually use that.

54:50.850 --> 54:58.430
Nobody who just uses that for communication of normal things will need

54:58.430 --> 54:58.910
encryption.

54:59.510 --> 55:04.550
And we know that encryption is an essential prerequisite for all kinds

55:04.550 --> 55:10.810
of methods for secure access to systems using authentication, using

55:10.810 --> 55:12.830
digital signatures, and things like that.

55:13.690 --> 55:16.970
So encryption is something which is very important.

55:18.430 --> 55:24.530
And if you don't allow encryption, criminals can always encode their

55:24.530 --> 55:28.390
messages in a way that you don't see the real contents.

55:28.530 --> 55:33.170
If you just look at the words that are in the message, you can always

55:33.170 --> 55:38.870
hide important information in other information that looks very

55:38.870 --> 55:39.410
normal.

55:40.230 --> 55:45.370
But still, we have to, like this is an important point, how can we

55:45.370 --> 55:52.590
actually deal with malicious attacks on the communication system?

55:53.690 --> 55:58.070
Then how do we make sure the person we communicate with is the person

55:58.070 --> 55:58.970
we think it is?

55:59.090 --> 56:01.110
So this has to do with authentication.

56:02.530 --> 56:05.190
This is a very, very difficult thing.

56:05.430 --> 56:09.490
Usually we cannot really make sure that it is exactly the person.

56:09.830 --> 56:15.370
Maybe we can only make sure that a certain personal secret is used.

56:15.570 --> 56:19.350
And so we assume that the person is actually our communication

56:19.350 --> 56:19.890
partner.

56:21.670 --> 56:23.750
But that usually is sufficient.

56:24.470 --> 56:28.050
Then we have to make sure that a message has not been modified on its

56:28.050 --> 56:32.250
way from one communication partner to the other communication partner.

56:32.430 --> 56:35.210
It should go this way, but it might have gone this way.

56:35.330 --> 56:39.430
And here, the message might have been modified by somebody.

56:40.570 --> 56:47.050
Sometimes it's also important that nobody is able to actually just

56:47.050 --> 56:53.330
read the information that has been communicated between different

56:53.330 --> 56:53.670
nodes.

56:54.350 --> 56:58.970
So these things have to do with security, and we will address that in

56:58.970 --> 57:01.870
the chapter on cryptographic systems.

57:02.630 --> 57:06.610
The topic, how we can transfer and store large amounts of data, is

57:06.610 --> 57:08.450
also an important topic.

57:09.150 --> 57:14.390
In particular, for example, in cloud computing, one of the first

57:14.390 --> 57:19.970
services that was offered in cloud computing, or that started cloud

57:19.970 --> 57:25.710
computing actually, was the storage services offered by Amazon.

57:27.190 --> 57:32.830
So you can just store large amounts of data there, but you have to do

57:32.830 --> 57:37.770
that in a secure way, in a reliable way, such that the data is not

57:37.770 --> 57:42.130
accessible to other people, that it is really available over a long

57:42.130 --> 57:43.770
period of time, and things like that.

57:45.170 --> 57:48.410
The way we search for information definitely has changed

57:48.410 --> 57:49.510
significantly.

57:50.270 --> 57:53.230
Nowadays, everybody is just using search engines.

57:53.810 --> 57:56.490
Somehow, most of the people are using Google.

57:57.050 --> 58:00.370
Almost everybody is using Google for searching information.

58:00.510 --> 58:03.350
Who of you is using a different search engine than Google?

58:05.190 --> 58:06.190
None of you.

58:07.870 --> 58:10.850
Do you know that there are other search engines available?

58:10.850 --> 58:14.570
So this is an interesting topic.

58:14.770 --> 58:17.370
I certainly also know that there are other search engines available,

58:17.810 --> 58:19.430
but I'm also using Google.

58:20.370 --> 58:24.170
And I will come back to the topic of Google later on in the course,

58:24.410 --> 58:29.110
because this is a very controversial subject.

58:29.450 --> 58:36.510
Wikipedia is one source which everybody uses, and we know that it is a

58:36.510 --> 58:38.750
self -organized source of information.

58:39.690 --> 58:47.070
The quality assurance process there is, well, it is there, but we know

58:47.070 --> 58:50.250
that information is not really reliable there.

58:50.510 --> 58:52.790
There can be incorrect information.

58:53.370 --> 58:59.750
So if you, in your thesis, would just refer to Wikipedia sources, that

58:59.750 --> 59:00.930
is never acceptable.

59:01.450 --> 59:03.950
You always have to go to the original information.

59:04.150 --> 59:09.010
Wikipedia is just no quality control, and you always have to look at

59:09.010 --> 59:13.250
the most adequate information, the most reliable information, which is

59:13.250 --> 59:14.010
not in Wikipedia.

59:15.130 --> 59:17.930
There are all kinds of news groups where we look for information.

59:18.850 --> 59:20.670
Okay, job markets, electronic journals.

59:22.430 --> 59:28.310
And so what we have to look at is how we can do that efficiently.

59:28.670 --> 59:32.550
We know that there are billions of information sources, and when we

59:32.550 --> 59:37.570
submit a query, we get responses within milliseconds.

59:39.090 --> 59:44.790
So this information has to be provided in a very efficient way, and

59:44.790 --> 59:49.150
this is one of the major topics of research and information retrieval.

59:49.670 --> 59:52.530
How can we actually identify the relevant information?

59:52.790 --> 59:58.050
You know that very often you get a range of responses to a query where

59:58.050 --> 01:00:02.470
you are not really convinced that they are that relevant, but this is

01:00:02.470 --> 01:00:03.370
an important point.

01:00:03.490 --> 01:00:05.270
How can we do that in an automatic way?

01:00:06.190 --> 01:00:09.070
So quality of information is an important topic.

01:00:10.370 --> 01:00:14.270
Previously, you had all kinds of publishers which have their boards of

01:00:14.270 --> 01:00:20.510
editors who control the quality of all the information that is

01:00:20.510 --> 01:00:21.050
published.

01:00:21.870 --> 01:00:25.990
All kinds of reviewing processes in the internet, this is just

01:00:25.990 --> 01:00:29.850
available normally without any quality checks.

01:00:30.710 --> 01:00:32.350
What is the price for information?

01:00:32.550 --> 01:00:38.610
The major topic of the study or the study program, information

01:00:38.610 --> 01:00:42.530
engineering, information as some asset.

01:00:43.290 --> 01:00:45.450
So what is the price for that?

01:00:45.550 --> 01:00:46.210
How can you...

01:00:47.070 --> 01:00:52.630
like if we search for information, it has some value, but this is a

01:00:52.630 --> 01:00:56.150
difficult topic, not my topic, but the topic of other people.

01:00:56.750 --> 01:01:00.830
How can we protect intellectual property if information is available

01:01:00.830 --> 01:01:01.410
freely?

01:01:02.110 --> 01:01:05.550
What about protecting your intellectual property?

01:01:06.370 --> 01:01:10.930
Can you actually... and we know there are certain strange patterns

01:01:10.930 --> 01:01:16.890
that have been filed, for example, for the one-click shopping, where

01:01:16.890 --> 01:01:21.170
you can just do one click and you buy a certain object.

01:01:22.390 --> 01:01:29.410
This is a patent or you know these progress bars where you have some

01:01:29.410 --> 01:01:35.470
indication that a certain task is being worked on and this is just

01:01:35.470 --> 01:01:41.010
moving over this rectangle here.

01:01:41.530 --> 01:01:45.490
And this progress bar, something which has been patented, strange

01:01:45.490 --> 01:01:45.850
thing.

01:01:46.110 --> 01:01:49.770
There are many strange things are patented and it is not an easy

01:01:49.770 --> 01:01:53.190
question how to actually deal with intellectual property.

01:01:53.970 --> 01:01:55.870
What is actually intellectual property?

01:01:56.030 --> 01:01:56.910
What is freely available?

01:01:57.570 --> 01:02:03.650
And how can you really protect your very creative own things?

01:02:04.190 --> 01:02:06.430
And what are the consequences of the internet for politics?

01:02:06.650 --> 01:02:09.330
We know that there are quite a few consequences.

01:02:10.390 --> 01:02:14.670
We also know that there have been contracts between information

01:02:14.670 --> 01:02:21.870
providers like Google with countries like China, where they agreed

01:02:21.870 --> 01:02:26.110
that certain information is not available for people looking at or

01:02:26.110 --> 01:02:27.610
trying to access that from China.

01:02:29.190 --> 01:02:34.810
But we know that Google ended that cooperation.

01:02:35.330 --> 01:02:38.730
But this is one consequence for politics.

01:02:39.030 --> 01:02:42.030
It is hard for a country to actually restrict the access to

01:02:42.030 --> 01:02:42.590
information.

01:02:43.230 --> 01:02:49.670
Another point is that the way our country is run is just different

01:02:49.670 --> 01:02:50.150
now.

01:02:50.270 --> 01:02:55.590
You can discuss certain political issues using worldwide web

01:02:55.590 --> 01:02:58.930
communication facilities in a much different way, much more

01:02:58.930 --> 01:03:01.090
spontaneous way than before.

01:03:01.710 --> 01:03:06.090
And so the internet, as we know from many elections, has quite some

01:03:06.090 --> 01:03:17.490
influence on decisions that are taken in elections or in other areas.

01:03:18.230 --> 01:03:19.690
The way we shop has changed.

01:03:19.830 --> 01:03:22.750
Definitely we buy things in a different way from before.

01:03:23.390 --> 01:03:26.150
And here we have to look at the way we can actually pay

01:03:26.150 --> 01:03:26.650
electronically.

01:03:26.990 --> 01:03:31.890
We have some standard ways meanwhile, but there are some ideas that

01:03:31.890 --> 01:03:34.390
are not really solved.

01:03:34.530 --> 01:03:39.330
For example, how we can remain anonymous if we buy something.

01:03:39.330 --> 01:03:46.350
If you use money, cash, to buy something, then you cannot just look at

01:03:46.350 --> 01:03:50.270
the coins and say, oh, these were the coins who have been given by

01:03:50.270 --> 01:03:51.010
Hartmut Schmeck.

01:03:52.450 --> 01:03:58.450
My name is not attached to the cash coins that I give to a merchant.

01:03:59.610 --> 01:04:05.490
But if you pay using your credit card, definitely your credit card

01:04:05.490 --> 01:04:08.850
information, your name, and all kinds of information is attached to

01:04:08.850 --> 01:04:09.150
that.

01:04:09.770 --> 01:04:14.510
And so the payment events are not anonymous.

01:04:15.250 --> 01:04:20.330
There are ideas how to do that in an anonymous way, but we have to

01:04:20.330 --> 01:04:21.150
talk about that.

01:04:21.830 --> 01:04:23.730
And how do we find the products we want?

01:04:23.870 --> 01:04:28.530
It's another point that we certainly want to get the most adequate

01:04:28.530 --> 01:04:30.730
products if you want to buy something.

01:04:31.310 --> 01:04:35.750
But if you use the service, how can you make sure that you actually

01:04:35.750 --> 01:04:40.190
get the most adequate products and not just the ones that certain

01:04:40.190 --> 01:04:45.050
product manufacturers have paid for, that they are presented to you?

01:04:45.830 --> 01:04:51.630
So you have to trust that a service finding for you the best offer for

01:04:51.630 --> 01:04:54.710
a certain product, that these services are actually trustworthy.

01:04:56.630 --> 01:04:58.110
The way we compute has changed.

01:04:58.670 --> 01:05:04.210
Grid computing, city at home, cloud computing, all topics that are of

01:05:04.210 --> 01:05:04.670
interest.

01:05:06.530 --> 01:05:10.730
So the question is, how do we actually distribute the computing power

01:05:11.650 --> 01:05:13.270
in a centralized way?

01:05:13.650 --> 01:05:17.490
The best way to do that in a decentralized way, very decentralized.

01:05:18.150 --> 01:05:21.350
This is, for example, a very interesting topic with respect to the

01:05:21.350 --> 01:05:28.370
energy system, where there is much research going on, research and

01:05:28.370 --> 01:05:36.210
development on the way we enhance the energy system with an

01:05:36.210 --> 01:05:37.770
information processing system.

01:05:38.390 --> 01:05:41.810
And the question is, where do we actually provide the computing

01:05:41.810 --> 01:05:42.470
facilities?

01:05:42.650 --> 01:05:44.370
Where do we need computing power?

01:05:44.850 --> 01:05:47.170
Do we need that only with utility companies?

01:05:47.390 --> 01:05:48.690
Do we need that in every home?

01:05:49.490 --> 01:05:52.750
So it is not obvious what is the best solution.

01:05:52.910 --> 01:05:58.630
And in particular, one should also certainly look at not the computing

01:05:58.630 --> 01:06:01.170
power, but also the power consumption.

01:06:01.530 --> 01:06:08.250
So the electric energy energy that is consumed by information

01:06:08.250 --> 01:06:14.410
processing over large networks is an important topic and that has also

01:06:14.410 --> 01:06:15.350
to be addressed.

01:06:16.350 --> 01:06:20.410
Then how do we protect ourselves against faulty data?

01:06:21.730 --> 01:06:26.590
If a company would like to use a cloud computing service, it will not

01:06:26.590 --> 01:06:32.470
really do that with proprietary data, because that might be too

01:06:32.470 --> 01:06:32.910
dangerous.

01:06:33.730 --> 01:06:37.050
If, for example, you are providing financial services in the banking

01:06:37.050 --> 01:06:43.010
business, you cannot use computing resources or data storage

01:06:43.010 --> 01:06:45.950
facilities in some anonymous cloud.

01:06:46.510 --> 01:06:52.450
You have to make sure that you can always provide information on where

01:06:52.450 --> 01:06:55.830
your data actually is sitting and what is being done with that.

01:06:56.730 --> 01:07:02.790
Then we have all kinds of different systems which should be

01:07:02.790 --> 01:07:04.030
interoperable.

01:07:04.190 --> 01:07:06.590
That means you should be able to move data back and forth.

01:07:06.670 --> 01:07:10.990
You should be able to switch between different services.

01:07:12.050 --> 01:07:15.970
And this is certainly a topic.

01:07:16.690 --> 01:07:20.190
How can we make sure these things, for example, in the moment, we know

01:07:20.190 --> 01:07:23.790
that there's Apple providing the iPhone applications.

01:07:24.610 --> 01:07:26.970
Then we have the Android applications.

01:07:27.230 --> 01:07:28.070
We have Windows phone.

01:07:28.630 --> 01:07:33.050
And they all, in the moment, try to set up their own systems so that

01:07:33.050 --> 01:07:37.490
you can design apps for the iPhone, apps for the Android, and apps for

01:07:37.490 --> 01:07:38.330
the Windows phone.

01:07:38.770 --> 01:07:40.430
And they are not compatible with each other.

01:07:41.370 --> 01:07:42.470
Does that make sense?

01:07:42.870 --> 01:07:46.190
Maybe for the companies, because they build up their own app stores,

01:07:46.430 --> 01:07:48.510
but it doesn't make sense for the end user.

01:07:49.390 --> 01:07:54.830
And so this is something which has to also be addressed if you look at

01:07:54.830 --> 01:07:55.930
the way we compute nowadays.

01:07:56.730 --> 01:08:01.310
And then the question is how we can protect ourselves from access to

01:08:01.310 --> 01:08:01.770
others.

01:08:04.010 --> 01:08:09.610
We know that that is a problem, although some people sometimes seem to

01:08:09.610 --> 01:08:14.870
be very happy to be accessible by anybody or by everybody.

01:08:14.870 --> 01:08:18.490
If you look at the way people present themselves on Facebook and

01:08:18.490 --> 01:08:25.530
similar social networks, it is interesting to see that some people

01:08:25.530 --> 01:08:30.710
actually provide information on everything that they feel about, that

01:08:30.710 --> 01:08:33.470
they do in the moment, and things like that, which is very strange.

01:08:35.170 --> 01:08:37.350
Okay, so Internet has changed our lives.

01:08:38.050 --> 01:08:39.430
Algorithms make the difference.

01:08:39.610 --> 01:08:41.250
And so we are talking about algorithms.

01:08:41.910 --> 01:08:46.530
And we talk about some basic algorithms, some advanced algorithms for

01:08:46.530 --> 01:08:48.290
specific Internet applications.

01:08:50.010 --> 01:08:54.730
I'm only addressing some part of the wealth of different topics that

01:08:54.730 --> 01:08:55.590
one could address.

01:08:56.230 --> 01:09:00.430
And I hope that this is something which is of interest to you.

01:09:00.530 --> 01:09:01.570
Otherwise you wouldn't be here.

01:09:02.530 --> 01:09:09.790
And so we have to... so this is the introduction into the topic.

01:09:10.190 --> 01:09:18.350
And I would then like to come immediately to the first real... I'll go

01:09:18.350 --> 01:09:20.950
more into details.

01:09:23.890 --> 01:09:29.530
If I am too fast, you should just interfere.

01:09:29.890 --> 01:09:33.870
Just in general, you're very welcome to ask questions.

01:09:35.410 --> 01:09:38.810
Sometimes I just tend to talk and talk and talk.

01:09:39.390 --> 01:09:43.790
And then you don't listen really that much.

01:09:43.990 --> 01:09:47.730
I would try to get you involved now and then.

01:09:48.170 --> 01:09:51.270
And you're welcome, as I said, to ask questions.

01:09:51.350 --> 01:09:55.970
But certainly so far, there have not been really that difficult

01:09:55.970 --> 01:09:56.310
things.

01:09:56.310 --> 01:10:00.830
It was a more general overview of preparatory things.

01:10:01.730 --> 01:10:05.450
So again, this was this definition which I just showed you.

01:10:05.890 --> 01:10:11.650
And we have to look at these things, these different parts of... like

01:10:11.650 --> 01:10:15.630
we have to look at the address space, the routing protocols.

01:10:16.450 --> 01:10:18.970
Oops, I have to change the pen again.

01:10:21.130 --> 01:10:24.150
And so this is what we will do in this chapter.

01:10:24.510 --> 01:10:30.530
Look at the address space, the protocols, the routing algorithms, and

01:10:30.530 --> 01:10:31.450
some of the services.

01:10:32.350 --> 01:10:37.950
I will briefly give you some overview of historic things, just to know

01:10:37.950 --> 01:10:40.210
what we are talking about when we talk about the Internet.

01:10:40.750 --> 01:10:47.850
So the origin of the Internet was actually an event that stirred up

01:10:47.850 --> 01:10:52.610
the Americans, in particular, when the first Soviet satellite, the

01:10:52.610 --> 01:10:59.930
Sputnik, Sputnik was launched, the Americans got very afraid of the

01:10:59.930 --> 01:11:02.990
prospects that they could be attacked from space.

01:11:03.910 --> 01:11:09.730
And so they established a research agency, the Advanced Research

01:11:09.730 --> 01:11:15.250
Projects Agency, ARPA, which is meanwhile the DARPA, Defense Advanced

01:11:15.250 --> 01:11:22.850
Research Projects Agency, which in the United States is the source of

01:11:22.850 --> 01:11:28.070
the major funding for university or for academic research or in

01:11:28.070 --> 01:11:31.910
general for research, very different from Europe, very different from

01:11:31.910 --> 01:11:39.410
Germany, where defense-oriented research is not really done to that

01:11:39.410 --> 01:11:41.090
extent as in the United States.

01:11:41.550 --> 01:11:45.430
In the United States, this is just the normal way that you get some

01:11:45.430 --> 01:11:46.550
grant from DARPA.

01:11:47.890 --> 01:11:53.110
And this is just a different attitude towards defense-oriented

01:11:53.110 --> 01:11:54.330
research subjects.

01:11:54.670 --> 01:12:00.750
We usually tend to concentrate on more civilian topics, and I think

01:12:00.750 --> 01:12:02.290
that is very adequate to do that.

01:12:02.290 --> 01:12:09.930
But certainly it's also adequate to provide very high-level and

01:12:09.930 --> 01:12:15.070
intelligent tools for people that have to defend a country.

01:12:16.370 --> 01:12:23.430
Okay, so the idea was to defend or to be able to protect against

01:12:23.430 --> 01:12:25.590
attacks on the communication infrastructure.

01:12:26.730 --> 01:12:34.210
And so the task that was here given to some people was to design a

01:12:34.210 --> 01:12:36.850
network that would be fault-tolerant.

01:12:37.090 --> 01:12:46.350
And even if some of the nodes would be destroyed, there still should

01:12:46.350 --> 01:12:53.170
be some path around those nodes and still offer some type of reliable

01:12:53.170 --> 01:12:53.890
communication.

01:12:54.610 --> 01:12:58.270
And the idea they had then was the packet switching idea to split up

01:12:58.270 --> 01:13:03.710
messages into packets and send these packets as smaller entities over

01:13:03.710 --> 01:13:09.550
the network in some flooding way until finally the destination address

01:13:09.550 --> 01:13:10.370
has been reached.

01:13:10.890 --> 01:13:15.630
So the idea was to send packets again and again until actually the,

01:13:15.890 --> 01:13:20.510
like if you send something from there to there, you should just send

01:13:20.510 --> 01:13:24.910
packets all the time until finally they are all received at this

01:13:24.910 --> 01:13:25.670
destination B.

01:13:26.290 --> 01:13:30.810
And even if some intermediate nodes fail, there should be alternate

01:13:30.810 --> 01:13:34.850
ways in order to make sure information is available.

01:13:35.110 --> 01:13:40.190
And we know that packet switching is a very efficient way of

01:13:40.190 --> 01:13:40.850
communication.

01:13:43.150 --> 01:13:46.350
Like then, this idea has been looked at.

01:13:46.650 --> 01:13:51.770
They actually built the ARAPANet, which was the first network built on

01:13:51.770 --> 01:13:53.150
this concept.

01:13:53.890 --> 01:13:58.510
There had been a few universities connected by the first ARAPANet in

01:13:58.510 --> 01:14:00.810
California and Utah.

01:14:01.570 --> 01:14:05.370
So these were the starting nodes of the internet, just four

01:14:05.370 --> 01:14:10.570
universities, four hosts, owned 50 kilobit per second at that time.

01:14:11.050 --> 01:14:15.690
Very interesting topic because at that time it was not the normal

01:14:15.690 --> 01:14:17.630
thing to connect computers into a network.

01:14:19.050 --> 01:14:20.230
So that was in 69.

01:14:21.010 --> 01:14:27.950
And then this certainly grew into some other or some larger scale.

01:14:28.530 --> 01:14:35.490
The first email has been sent or has been designed in 72, very long

01:14:35.490 --> 01:14:35.910
ago.

01:14:37.750 --> 01:14:40.950
And like ARPA was redefined in DARPA.

01:14:41.830 --> 01:14:47.870
Then at that time the ARAPANet didn't use TCP IP that came later.

01:14:48.010 --> 01:14:50.030
They used the network control protocol.

01:14:50.610 --> 01:14:56.750
They had something like in the time from 68 to 72, the network grew to

01:14:56.750 --> 01:14:57.790
23 hosts.

01:14:58.790 --> 01:15:04.550
73, Cerf and Kahn designed the network protocol TCP IP, which now the

01:15:04.550 --> 01:15:05.710
basis for the internet.

01:15:06.850 --> 01:15:11.750
And here the idea was to actually communicate also between different

01:15:11.750 --> 01:15:16.310
computer networks, not just use it in one network, but also for

01:15:16.310 --> 01:15:18.050
communication between different networks.

01:15:18.990 --> 01:15:23.390
And one year later Cerf and Kahn used for the first time the term

01:15:23.390 --> 01:15:23.770
internet.

01:15:23.970 --> 01:15:28.230
Before it was the ARPANet, specifically military oriented.

01:15:29.390 --> 01:15:35.790
And so the original idea was to have a network providing secure

01:15:35.790 --> 01:15:38.130
communication for military applications.

01:15:39.710 --> 01:15:43.970
And later on there came the other protocols.

01:15:44.230 --> 01:15:51.150
The Ethernet was designed for data transfer over coaxial lines, which

01:15:51.150 --> 01:15:53.610
is still the basis for local area networks.

01:15:54.010 --> 01:15:59.590
And then we had more networks like the subnet, which provided

01:15:59.590 --> 01:16:02.390
communication between Europe and the United States.

01:16:03.850 --> 01:16:15.290
Then a protocol for communication between Unix systems was designed,

01:16:15.490 --> 01:16:16.670
the UUCP.

01:16:19.470 --> 01:16:23.390
And you see in 76 we already had more than 100 hosts.

01:16:24.350 --> 01:16:30.790
In 79 we had several different additional networks.

01:16:31.530 --> 01:16:41.310
So the Usenet was another network developed by some people in the

01:16:41.310 --> 01:16:46.350
States using this Unix to Unix copy system.

01:16:46.910 --> 01:16:54.090
The Bitnet was designed, a network called Bitnet because it's a time

01:16:54.090 --> 01:16:56.790
network defined by IBM.

01:16:57.570 --> 01:17:03.110
And that was mainly used for email and list service was the start for

01:17:03.110 --> 01:17:03.610
TheoryNet.

01:17:03.890 --> 01:17:09.830
It's interesting that TheoryNet was one of the first lists like email

01:17:09.830 --> 01:17:10.830
listing services.

01:17:11.490 --> 01:17:16.910
So theory or people in theoretical computer science were exchanging

01:17:16.910 --> 01:17:19.450
their ideas using TheoryNet.

01:17:19.630 --> 01:17:23.850
Then this spread into other areas, but it was one of the first list

01:17:23.850 --> 01:17:24.210
service.

01:17:24.730 --> 01:17:29.930
And then later on we had here like 81 we already had something like

01:17:29.930 --> 01:17:31.870
200 hosts.

01:17:33.070 --> 01:17:40.750
In 83 here TCP-IP became the standard protocol for the ARPANET.

01:17:41.210 --> 01:17:44.370
And we got a European academic and research network.

01:17:44.550 --> 01:17:48.050
Before that in Europe we didn't have anything similar to ARPANET or

01:17:48.050 --> 01:17:49.010
Usenet or Bitnet.

01:17:49.250 --> 01:17:50.830
It started in 83.

01:17:51.730 --> 01:17:56.310
It was the Urn network and this only came to Europe because IBM needed

01:17:56.310 --> 01:17:56.630
it.

01:17:57.090 --> 01:18:02.850
IBM needed a network, wanted to extend the use of the networks that

01:18:02.850 --> 01:18:07.490
was common in the States at that time or North America at that time.

01:18:07.610 --> 01:18:09.270
They wanted to extend that to Europe.

01:18:09.730 --> 01:18:16.130
And so they just provided the facilities and offered the network

01:18:16.130 --> 01:18:17.670
services they needed themselves.

01:18:18.390 --> 01:18:21.870
And so they provided it for academic reasons or for academic

01:18:21.870 --> 01:18:22.590
institutions.

01:18:23.210 --> 01:18:26.350
And so academic institutions could connect to this Urn.

01:18:26.670 --> 01:18:32.730
And at that time in 83 the first email message was actually sent here

01:18:32.730 --> 01:18:33.370
from Karlsruhe.

01:18:33.470 --> 01:18:38.010
So Karlsruhe was one of the first locations which used that technology

01:18:38.010 --> 01:18:39.410
in Europe.

01:18:40.190 --> 01:18:48.410
At the same time I was in Canada as a visiting professor.

01:18:49.530 --> 01:18:59.150
And I came back to Germany in 84 and tried to get access to or try to

01:18:59.150 --> 01:19:00.190
get an email address.

01:19:01.270 --> 01:19:03.950
And I was asked, why do you need an email access?

01:19:04.110 --> 01:19:04.810
Do you have a telephone?

01:19:06.290 --> 01:19:07.770
What do you want to do with an email?

01:19:08.450 --> 01:19:11.750
Why would you like to communicate with somebody using your computer?

01:19:11.930 --> 01:19:15.730
You use a computer for computing, not for communication.

01:19:17.050 --> 01:19:22.250
And I got a special permission to use an email address.

01:19:23.030 --> 01:19:30.990
And the computing center head was afraid that because they had a

01:19:30.990 --> 01:19:35.610
connection where you had to pay for the data that was sent to you.

01:19:36.330 --> 01:19:39.870
So they said, how can you control that there is nobody who sends a

01:19:39.870 --> 01:19:43.290
huge amount of data and we have to pay for all this data that is sent

01:19:43.290 --> 01:19:45.850
over this Dydax L connection?

01:19:46.370 --> 01:19:52.170
So they were very afraid and they limited the amount of money that I

01:19:52.170 --> 01:19:52.890
could use there.

01:19:53.110 --> 01:19:56.670
But I got an email address and then I tried to send messages.

01:19:57.210 --> 01:20:00.470
And since it was difficult at that time to actually send messages to

01:20:00.470 --> 01:20:04.730
different people in these different networks, I talked to the people

01:20:04.730 --> 01:20:08.090
in the computing center and they said, well, they were really not

01:20:08.090 --> 01:20:11.550
allowed to give me information on that.

01:20:11.950 --> 01:20:14.190
But since we were good friends, I got that information.

01:20:14.730 --> 01:20:20.590
They were advised by the computing center head to not support in any

01:20:20.590 --> 01:20:25.150
way people who would like to use the computer for communication, for

01:20:25.150 --> 01:20:25.430
email.

01:20:26.690 --> 01:20:31.390
Very strange, but this was reality at the beginning of the 80s in

01:20:31.390 --> 01:20:32.850
Germany, not at Karlsruhe.

01:20:33.070 --> 01:20:39.090
Karlsruhe was very progressive and saw the potential of that system.

01:20:39.670 --> 01:20:43.590
But to use the computer for things that are different from computing

01:20:43.590 --> 01:20:48.210
was an idea that was very new to the society at that point of time.

01:20:49.070 --> 01:20:54.630
And a few years later, we got then something like here.

01:20:55.130 --> 01:21:00.910
At some point in time, even later, got the German research network,

01:21:01.410 --> 01:21:02.670
Deutsches Forschungsnetz.

01:21:03.030 --> 01:21:05.970
And in that German research network, the first applications were

01:21:05.970 --> 01:21:08.010
remote computer access.

01:21:08.510 --> 01:21:13.310
So the first services were to provide access to computing facilities

01:21:13.310 --> 01:21:14.370
at different locations.

01:21:14.890 --> 01:21:18.830
So the only use was for computing, not for communicating.

01:21:19.710 --> 01:21:23.230
And the use of the computer for, for example, word processing and

01:21:23.230 --> 01:21:26.910
things like that, were unconceivable for certain people because you

01:21:26.910 --> 01:21:32.330
had your possibility to write things on paper.

01:21:32.510 --> 01:21:33.930
You don't need a computer for that.

01:21:34.890 --> 01:21:38.130
And the way we use the computer has just changed so much.

01:21:38.770 --> 01:21:42.110
And I just don't want to go into all these different things.

01:21:42.210 --> 01:21:47.250
You just see that the number of nodes just increased significantly

01:21:47.250 --> 01:21:48.150
over the years.

01:21:49.150 --> 01:21:56.870
And also the communication bandwidth, like initially there were the 50

01:21:56.870 --> 01:21:58.870
kilobit per second networks.

01:21:59.430 --> 01:22:07.070
And then here in 88, we had already 1.5 megabit per second backbones.

01:22:07.850 --> 01:22:10.990
And meanwhile, we even have more than that.

01:22:11.130 --> 01:22:15.310
We are at the 10 gigabit range.

01:22:15.930 --> 01:22:20.590
But before I come to that, I have to mention that here, for example,

01:22:20.690 --> 01:22:27.870
in 1990, ARPANET was replaced completely by NSFNet, so by National

01:22:27.870 --> 01:22:29.090
Science Foundation Network.

01:22:29.850 --> 01:22:34.810
So the military aspect was put more in the background.

01:22:35.610 --> 01:22:37.190
It is certainly still there.

01:22:37.310 --> 01:22:41.730
There is a military backbone, but we also have commercial backbones

01:22:41.730 --> 01:22:42.170
meanwhile.

01:22:43.130 --> 01:22:47.410
And in 1990, that was a very important year because Tim Berners-Lee

01:22:47.410 --> 01:22:53.270
implemented or conceived, designed the hypertext system to improve the

01:22:53.270 --> 01:22:56.970
exchange of information between researchers and high energy physics.

01:22:58.010 --> 01:23:01.310
That was his motivation to exchange information.

01:23:01.490 --> 01:23:05.230
For that, he designed the hypertext system so that if you have

01:23:05.230 --> 01:23:11.030
documents, you can just address another document in a simple way.

01:23:11.450 --> 01:23:13.870
And you can also present these documents in a simple way.

01:23:14.770 --> 01:23:19.670
And so we know that this is actually the start of what we now have as

01:23:19.670 --> 01:23:20.490
World Wide Web.

01:23:21.770 --> 01:23:28.410
In 91, Gopher started also an information service.

01:23:28.890 --> 01:23:37.490
But in 92, actually, the World Wide Web services were released for

01:23:37.490 --> 01:23:44.270
public use by CERN, not only for theoretical physicists, but also for

01:23:44.270 --> 01:23:45.310
the public.

01:23:46.530 --> 01:23:53.190
And so 92, 93 are the starting dates for the Internet.

01:23:53.310 --> 01:23:57.130
So it's a bit difficult to say what is actually the starting date for

01:23:57.130 --> 01:23:57.870
the World Wide Web.

01:23:58.610 --> 01:24:02.410
So what we need certainly is something like a browser.

01:24:03.010 --> 01:24:08.470
So the Mosaic browser was one of the first browsers that were

01:24:08.470 --> 01:24:12.370
available here, actually, from the University of Illinois.

01:24:12.690 --> 01:24:18.650
Certainly, Tim Berners-Lee also provided the definitions for

01:24:18.650 --> 01:24:22.270
presenting hypertext documents.

01:24:22.850 --> 01:24:29.010
But the browser technology was necessary to actually get some scalable

01:24:29.010 --> 01:24:34.130
or some service which is scalable and which can actually make

01:24:34.130 --> 01:24:37.790
documents available at many places in a standard way.

01:24:38.530 --> 01:24:42.170
And at that time, in 93, we already had about two million hosts.

01:24:42.610 --> 01:24:48.930
And then this certainly increased very much just due to this

01:24:48.930 --> 01:24:50.590
development of the World Wide Web.

01:24:50.850 --> 01:24:54.870
And before that, it had been something which was completely military

01:24:54.870 --> 01:24:55.710
and academic.

01:24:56.290 --> 01:25:03.010
And only after that, the industry discovered that it is something that

01:25:03.010 --> 01:25:03.630
is interesting.

01:25:04.510 --> 01:25:10.410
And so the first, like here, for example, in 94, there was a web page

01:25:10.410 --> 01:25:13.550
for buying pizza at Pizza Hut.

01:25:13.810 --> 01:25:16.310
It was the first bank, the first cyber bank.

01:25:16.790 --> 01:25:19.610
Shopping malls were available on the Internet using this World Wide

01:25:19.610 --> 01:25:20.370
Web technology.

01:25:22.130 --> 01:25:27.610
And then, for example, here in 95, the first private Internet service

01:25:27.610 --> 01:25:28.270
providers.

01:25:28.610 --> 01:25:33.310
We know that nowadays, Internet service providers are among the

01:25:33.310 --> 01:25:38.810
largest companies that are available or that are operating.

01:25:42.250 --> 01:25:47.990
Then 96, certainly restrictions on the Internet use came into over

01:25:47.990 --> 01:25:49.550
observable in China.

01:25:49.810 --> 01:25:53.630
We know that it's quite restricted in Germany.

01:25:54.310 --> 01:25:59.150
Also, like the German government had cut off access to some use groups

01:25:59.150 --> 01:26:04.150
because of content that was not wanted there on CompuServe.

01:26:04.810 --> 01:26:09.670
At that time, some politicians in Germany said, well, all this

01:26:09.670 --> 01:26:13.490
Internet or World Wide Web is only for people who are interested in

01:26:13.490 --> 01:26:15.970
pornography and all these things.

01:26:16.510 --> 01:26:20.910
And we cannot really ban that completely, but it should only be

01:26:20.910 --> 01:26:22.570
available at late hours.

01:26:22.670 --> 01:26:25.990
So maybe if it's only available after 11 p.m.

01:26:26.050 --> 01:26:29.030
at night, then it's OK, but not before that.

01:26:31.130 --> 01:26:36.030
Completely irrelevant, something like that, because we are talking

01:26:36.030 --> 01:26:37.010
about a World Wide Web.

01:26:38.290 --> 01:26:44.950
And in other countries, there are also problems, but Germany certainly

01:26:44.950 --> 01:26:48.830
is not among the countries who are known for their restrictions on the

01:26:48.830 --> 01:26:49.530
use of the Internet.

01:26:50.030 --> 01:26:54.030
But it's important to see that we are also restricting certain things

01:26:54.030 --> 01:26:56.490
that are available on the World Wide Web.

01:27:00.190 --> 01:27:04.290
Then in 1999, what was there?

01:27:04.650 --> 01:27:10.010
Like here, we have already gigabit per second networks, backbones for

01:27:10.010 --> 01:27:11.290
the Internet.

01:27:11.750 --> 01:27:16.810
We have certainly all these viruses that are playing around Internet

01:27:16.810 --> 01:27:17.410
worms.

01:27:17.750 --> 01:27:22.990
And so we have to deal more and more with these attacks on the

01:27:22.990 --> 01:27:23.330
Internet.

01:27:24.110 --> 01:27:31.230
In Europe, finally, people woke up and the European Commission made up

01:27:31.230 --> 01:27:38.350
a project called GEON, Gigabit European Research Network, which is in

01:27:38.350 --> 01:27:41.470
effect now, meanwhile, for some years already.

01:27:42.150 --> 01:27:47.530
Meanwhile, we have a very good network infrastructure, but it took

01:27:47.530 --> 01:27:48.050
some time.

01:27:48.690 --> 01:27:56.350
And I don't want to go into all these different topics here.

01:27:56.570 --> 01:27:58.450
I can certainly add more things.

01:27:59.130 --> 01:28:01.470
You can look it up in the slides at home.

01:28:01.590 --> 01:28:04.930
It's not that important, really, in all these details.

01:28:05.670 --> 01:28:09.550
It's just the important thing is that the growth of the Internet is

01:28:09.550 --> 01:28:11.110
just unbroken.

01:28:11.410 --> 01:28:13.290
It's still increasing quite a bit.

01:28:13.350 --> 01:28:15.490
The number of hosts increased significantly.

01:28:16.010 --> 01:28:18.970
Remember that we had these four hosts in the beginning.

01:28:19.610 --> 01:28:21.850
Then it doubled on almost every year.

01:28:22.730 --> 01:28:30.050
And then certainly this also extended in that way.

01:28:30.790 --> 01:28:39.830
There was a slight deviation from that curve around 2000, 2001, 2003

01:28:39.830 --> 01:28:44.270
or something because of this problem or these problems with the

01:28:44.270 --> 01:28:45.110
Internet companies.

01:28:46.050 --> 01:28:49.710
But this was not really essential, not on the long run.

01:28:50.290 --> 01:28:52.970
The number of networks is increasing.

01:28:52.970 --> 01:28:54.970
The number of websites is increasing.

01:28:55.170 --> 01:29:03.390
There we have this effect of the birth of the Internet hype.

01:29:04.150 --> 01:29:11.110
But we are far beyond the size of or the number of sites and networks

01:29:11.110 --> 01:29:13.770
and nodes from those times.

01:29:15.850 --> 01:29:19.870
What are the reasons for the tremendous growth of the Internet?

01:29:21.730 --> 01:29:26.030
Certainly the growth of bandwidth in the wide area networks.

01:29:26.730 --> 01:29:29.930
We are now in the range of gigabits per second.

01:29:30.570 --> 01:29:34.530
We have improved transmission performance over telephone lines.

01:29:35.910 --> 01:29:42.510
And we have meanwhile DSL bandwidth available at almost every house.

01:29:43.170 --> 01:29:45.270
And so this is an important topic.

01:29:45.710 --> 01:29:50.530
By the way, it's currently a very hot topic in Australia.

01:29:50.530 --> 01:29:55.170
As far as I know, the National Broadband Network is established in

01:29:55.170 --> 01:29:59.170
Australia, where the government says every home should have access to

01:29:59.170 --> 01:30:03.150
high bandwidth systems.

01:30:04.130 --> 01:30:07.970
And this is discussed in a very controversial way there because people

01:30:07.970 --> 01:30:12.870
say then most people are only sitting in front of their computer and

01:30:12.870 --> 01:30:19.450
don't do reasonable other things like looking into the countryside,

01:30:20.310 --> 01:30:21.630
hiking and things like that.

01:30:21.830 --> 01:30:24.630
But okay, we need access to the systems.

01:30:24.970 --> 01:30:29.430
We get that using broadband networks.

01:30:30.030 --> 01:30:31.590
I look at the time.

01:30:31.790 --> 01:30:34.090
It's 11.15, so I have to stop for today.

01:30:34.290 --> 01:30:38.550
I will step in there again next week.

01:30:39.050 --> 01:30:40.350
So thanks for your attention.

01:30:40.790 --> 01:30:45.390
Next week we will talk about protocols or the Internet protocol, the

01:30:45.390 --> 01:30:46.110
IP protocol.

01:30:46.670 --> 01:30:47.450
Okay, thank you.

