Book contents
- Frontmatter
- Contents
- Preface
- Acknowledgments
- 1 TALKING WITH COMPUTERS
- 2 THE SHELL GAME
- 3 KEEPING TRACK OF YOUR STUFF
- 4 DON'T SWEAT THE SYNTAX
- 5 COMPUTATIONAL MUDDLES
- 6 GETTING ORIENTED
- 7 THANKS FOR SHARING
- 8 YOU'VE GOT (JUNK) EMAIL
- 9 MODERN ARCHITECTURE
- 10 DO ROBOTS SLEEP?
- 11 UNDER THE HOOD
- 12 ANALYZE THIS
- 13 FOREST FOR THE TREES
- 14 SEARCHING THE WILD WEB
- 15 DARWIN'S DANGEROUS ALGORITHM
- 16 AIN'T NOBODY HERE BUT US MACHINES
- Bibliography
- Index
11 - UNDER THE HOOD
Published online by Cambridge University Press: 05 June 2012
- Frontmatter
- Contents
- Preface
- Acknowledgments
- 1 TALKING WITH COMPUTERS
- 2 THE SHELL GAME
- 3 KEEPING TRACK OF YOUR STUFF
- 4 DON'T SWEAT THE SYNTAX
- 5 COMPUTATIONAL MUDDLES
- 6 GETTING ORIENTED
- 7 THANKS FOR SHARING
- 8 YOU'VE GOT (JUNK) EMAIL
- 9 MODERN ARCHITECTURE
- 10 DO ROBOTS SLEEP?
- 11 UNDER THE HOOD
- 12 ANALYZE THIS
- 13 FOREST FOR THE TREES
- 14 SEARCHING THE WILD WEB
- 15 DARWIN'S DANGEROUS ALGORITHM
- 16 AIN'T NOBODY HERE BUT US MACHINES
- Bibliography
- Index
Summary
Have you ever wondered what's going on when you click your mouse on some underlined text in a browser window and suddenly the screen fills with text and graphics that clearly come from some other faraway place? It's as if you've been transported to another location, as if a window has opened up on another world. If you're on a fast cable or DSL (“digital subscriber line”, the first of many acronyms in this chapter) connection, the transformation is almost instantaneous; if you're using a slow modem, then updating the screen can take several seconds or even minutes, but in any case the behind-the-scenes machinations making this transformation possible leave little evidence. Occasionally, however, you'll catch fleeting glimpses of the machinery through little cracks in the user interface.
If you use a dial-up connection and modem to connect with your Internet service provider, you may hear an awful squawking as your modem and the service provider's modem initiate two-way communication. Similar noisy exchanges can occur when one fax machine attempts to communicate with a second. In both cases, computer programs at each end of a telephone connection are validating, handshaking, synchronizing and otherwise handling the transmission of information. As smarter modems and fax machines replace older technology, these noisy accompaniments are being silenced, since a human need no longer overhear them to check that things are proceeding as desired.
- Type
- Chapter
- Information
- Talking with ComputersExplorations in the Science and Technology of Computing, pp. 185 - 195Publisher: Cambridge University PressPrint publication year: 2004