Feeds

Ethernet — a networking protocol name for the ages

Michelson, Morley, and Metcalfe

Securing Web Applications Made Simple and Scalable

In the beginning, Ethernet was optional. When Bob Metcalfe and David Boggs cooked up their network protocol at Xerox PARC in the early 1970s, it was meant to connect the research haven’s now famous Alto machines — but only if researchers felt the need. “Each scientist would get a kind of Alto order form,” Metcalfe remembers, “and you had to check a box if you wanted Ethernet.”

Then, one afternoon, with maybe ten Altos on the desks of ten PARC researchers, someone accidentally disconnected a networking cable. When ten people stood up to ask “What happened?,” Metcalfe realized his fledgling network protocol might be a keeper. “From then on,” he says, “Ethernet was not an option.”

More than thirty years later, Metcalfe went looking for a new Ethernet cable, strolling into an everyday American electronics retailer. “The woman at the cash register took me to a twenty-foot-wide wall filled with cables and said ’What color do you want?’”

After Metcalfe brokered an epic Ethernet group handshake between Intel, Xerox, and DEC in the late 1970s and brought his protocol to market through a new company he called 3Com, Ethernet shed its optional status on a global scale, evolving from LAN hardware into mainstay internet plumbing. In 2008, according to IDC, 350 million Ethernet switch ports were pushed out into the world. And that doesn’t include WiFi gear.

Last year, in honor of his Ethernet exploits, Silicon Valley’s Computer History Museum anointed Metcalfe with its annual Fellow Award, and this week, he turned up at the Mountain View geek mecca to reminisce — and, in that inimitably-opinionated Metcalfe way, trumpet his version of the future.

Harvard’s dark little heart

Metcalfe joined the Palo Alto Research Center in 1972, just after some Harvard profs failed his PhD thesis defense. His research focused on, yes, packet communication. And packet communication wasn’t a place where he and Harvard saw eye-to-eye.

When he first arrived at Harvard, Metcalfe offered to plug the venerable university into the Arpanet, a fledgling research network that would one day evolve into the modern interwebs. But Harvard declined.

“Harvard to this day is ambivalent about engineering, in their dark little heart of hearts,” he tells The Reg. “When I said I wanted to get them on the Arpanet, I was behaving like an engineer in a department of applied mathematics, and they said 'No, we’re going to hire a company do it.’”

That company was Bolt, Beranek, and Newman, a major cog in the rise of the Apranet. But the way Metcalfe tells it, BBN promptly hired another grad student to do all the work he was willing to do for free.

So, he went down the road to MIT, his undergraduate alma mater, offering his networking services to their DEC PDP-10 mainframe. MIT said “Yes,” and Metcalfe spent his Harvard career doing research on MIT’s Arpanet IMP (interface message processor). In the end, his Harvard overlords were not amused.

“I was — I still am — naive about politics,” Metcalfe says. “I didn’t really understand the process. The professors should have noticed this, but they didn’t. I showed up for my thesis defense and they gunned me down.”

But a new job was already in place at PARC — the Xerox research center that would give rise to everything from laser printing to the GUI interface — and PARC agreed to let him finish his PhD there. This, Metcalfe says, is the sort of luck that turns a life into history.

“My first stroke of luck was being born to my parents. My second stroke of luck was being given the networking job in a building full of personal computers. This was a problem that had never before occurred in the history of the world. The solution was not as amazing as the luck of getting that assignment.”

The Essential Guide to IT Transformation

Next page: Into the ether

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.