Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Let’s Take a Look at 50 Years of the Internet

Let’s Take a Look at 50 Years of the Internet

Without a doubt, the Internet is one of humanity's most impressive inventions. 50 years ago, the predecessor to the Internet that most of the world depends on, called ARPANET, was launched. Today, we will talk about how that innovation turned into the Internet, and reorganized the way people interacted with computing systems. 

Development of ARPANET

In the mid-1960s the United States was firmly in the throes of the Cold War. The U.S. Department of Defense was attempting to find a way to communicate clandestinely. For this purpose they created the Advanced Research Projects Agency (ARPA). A scientist named Joseph Lickliter convinced the DoD to fund a network of connected computers through the country so that engineers and intellectuals from several colleges could collaborate on projects together, effectively making progress a priority. This network was finished in 1969 and was called ARPANET. It is the precursor of the modern-day Internet.

Over the next couple of decades there were major innovations to this network, many of which are the basis for much of the shared computing we have today. One of those innovations is called packet-switching. Packet-switching allows the computer you are using to connect to several other computers at once by sending individual packets of information through the wires. This provides users the ability to quickly get information that would be impossible through circuit switching, the technology that was used prior to the development of ARPANET.

As the network got bigger, the ARPANET engineers had to scrap the system because with packet-switching, each user would have to keep an updated address list in order to properly send and receive messages. This was not feasible with the technology at the time so they decided that Stanford University (who was a founding member of ARPANET) would be the safekeeper for all of the updated addresses on ARPANET in 1973.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing right around the corner, major changes were on the horizon. Other computing networks started to pop up, but with no continuity between them, communications became a headache for users. This was remedied early in the 1980s with the standardization of sending packets through the TCP/IP protocol.  TCP/IP (Transmission Control Protocol/Internet Protocol) is where the modern term Internet first comes up. We still use this protocol today, making the Internet possible. 

ARPANET, realizing that by connecting networks together using TCP/IP they would soon have a problem with too many users to manage. This problem was solved with the establishment of the Domain Name System (DNS). They split the system into domains. The top-level domains (.com, .edu, etc.) established what type of organization you were sending the packet to. Within these domains a second-level domain, provided the organization’s host (such as gmail.com, ucla.edu, etc.) so computers would tell where to specifically send messages. The establishment of the DNS Server would change computing more than any other for decades. 

The Modern Day Internet

In the late 1980s the U.S. Department of Defense was looking to shut down ARPANET as they believed they it had served its purpose. It was handed off to NSFNET in 1990, shortly after the first Internet Service Provider, The World, opened in Boston, Massachusetts, effectively introducing the general public to the Internet. It wasn’t until 1992, when congress passed a law allowing commercial traffic on the Internet when, the boom really started. 

As we all know now, the Internet, which was developed for research and messaging, was soon being used by individuals for those purposes and more. Companies started to look into the applications of selling and advertising products online. Since access was limited at first, the Internet was not looked at as a major commercial hub for companies. This soon changed, however; and, today, every business has some sort of Internet profile. 

Today, the United Nations looks on Internet service as a fundamental human right, which is a long way from four connected computers on a single network in 1969. Would you like to read more stories about the history of technology? Leave your suggestions in the comments section below or call us today at (415) 295-4898 with your recommendations. 

Access Management Failings Keep Businesses Targete...
Help Desks Help Remedy the Following IT Problems
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 16 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Network Security IT Support Hosted Solutions Data Privacy Cloud Data Recovery Software Outsourced IT IT Services Internet Email Malware Tech Term Managed IT Services Business Hackers Innovation User Tips Computer Windows 10 Business Management Cloud Computing Small Business Ransomware Collaboration Microsoft Efficiency Paperless Office Upgrade Google Hardware Mobile Devices Android Phishing Business Continuity Server Encryption Managed Service Managed Service Provider Remote Monitoring VoIp Artificial Intelligence Communication Office 365 Communications Vulnerability Backup Smartphones Managed IT Workplace Tips Business Technology Applications Saving Money Holiday Internet of Things Laptops Managed IT services Cybersecurity Passwords Browser Wi-Fi Help Desk Save Money Document Management Quick Tips Data Management Healthcare Project Management Automation Antivirus Compliance Disaster Recovery Scam Blockchain BDR Processor Employer-Employee Relationship Information Mobile Device Tip of the week Microsoft Office Government Bandwidth Smartphone Avoiding Downtime Website Customer Relationship Management BYOD Two-factor Authentication Social Media Infrastructure VPN RMM Access Control Chrome Router Analytics Windows Data Security Vendor Management Windows 7 IT Management Assessment Employees Unified Communications Recycling Downtime Network Management Users Data Loss Alert Company Culture Consultation Gmail The Internet of Things Cooperation Network Risk Management Redundancy Maintenance Remote Workers Facebook Net Neutrality Regulations IoT Software as a Service Management Networking Tablet File Sharing Internet Exlporer Dark Web Unified Threat Management Smart Technology Proactive Files Mobility Monitoring Virtual Private Network Storage Bring Your Own Device HIPAA Financial Server Management Remote Monitoring and Management Operating System Word Machine Learning Mobile Security Patch Management Professional Services Training Downloads Shared resources Going Green Mobile Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech Websites WPA3 Legislation Consulting Specifications 5G Development Instant Messaging Address WiFi Settings Personal Information Employee-Employer Relationship Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Virtualization Batteries Cyberattacks Social Managed IT Service Techology GDPR Connectivity SaaS Fleet Tracking Zero-Day Threat Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Cookies Cables Customer Service Transportation Active Directory Touchscreen Hacking Wireless Mouse Language Password Vulnerabilities Favorites Apps Money Technology Laws Wasting Time Current Events Emergency Multi-Factor Security CIO applications Remote Work Managing Stress Read Only Security Cameras Break Fix Outlook Disaster Resistance Time Management Asset Tracking Backup and Disaster Recovery Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Nanotechnology Wires Heating/Cooling MSP Finance Permissions Printer Trending Computing Infrastructure Search Hard Disk Drives Mobile Computing Conferencing Microsoft Excel Unified Threat Management Database Miscellaneous Mirgation Hard Drive File Management Spam Enterprise Content Management Printing Augmented Reality Shortcut Proactive IT Notes Wearable Technology Star Wars Statistics Human Error User Management Identity Theft Enterprise Resource Planning E-Commerce Theft Proactive Maintenance App Servers Authentication Google Calendar Fraud Electronic Medical Records Computing Alerts Lenovo Solid State Drives Geography Meetings Voice over Internet Protocol Projects Cache Permission Travel Samsung Value of Managed Services Social Networking Recovery Remote Worker Virtual Reality IT Consulting PowerPoint Display Utility Computing Bluetooth OneNote SharePoint Teamwork Information Technology Identity Features Firewall Cybercrime Screen Reader Authorization Comparison Licensing Superfish Options Modem High-Speed Internet Politics Mail Merge User Error Return on Investment Remote Computing How To Test Technology Tips OneDrive Managed Services G Suite Gadgets Office Private Cloud Data Warehousing Flexibility Data Breach Tech Support Regulation Smart Devices Twitter Education Sensors CEO Printers Students Daniel Stevens Marketing

Latest Blog

Managed services offer businesses an improved means of obtaining and managing the technology they rely on. With data being so important to the modern business, much of this technology is devoted to storing, securing, and leveraging this data. Working with a managed service p...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...