Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Let’s Take a Look at 50 Years of the Internet

Let’s Take a Look at 50 Years of the Internet

Without a doubt, the Internet is one of humanity's most impressive inventions. 50 years ago, the predecessor to the Internet that most of the world depends on, called ARPANET, was launched. Today, we will talk about how that innovation turned into the Internet, and reorganized the way people interacted with computing systems. 

Development of ARPANET

In the mid-1960s the United States was firmly in the throes of the Cold War. The U.S. Department of Defense was attempting to find a way to communicate clandestinely. For this purpose they created the Advanced Research Projects Agency (ARPA). A scientist named Joseph Lickliter convinced the DoD to fund a network of connected computers through the country so that engineers and intellectuals from several colleges could collaborate on projects together, effectively making progress a priority. This network was finished in 1969 and was called ARPANET. It is the precursor of the modern-day Internet.

Over the next couple of decades there were major innovations to this network, many of which are the basis for much of the shared computing we have today. One of those innovations is called packet-switching. Packet-switching allows the computer you are using to connect to several other computers at once by sending individual packets of information through the wires. This provides users the ability to quickly get information that would be impossible through circuit switching, the technology that was used prior to the development of ARPANET.

As the network got bigger, the ARPANET engineers had to scrap the system because with packet-switching, each user would have to keep an updated address list in order to properly send and receive messages. This was not feasible with the technology at the time so they decided that Stanford University (who was a founding member of ARPANET) would be the safekeeper for all of the updated addresses on ARPANET in 1973.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing right around the corner, major changes were on the horizon. Other computing networks started to pop up, but with no continuity between them, communications became a headache for users. This was remedied early in the 1980s with the standardization of sending packets through the TCP/IP protocol.  TCP/IP (Transmission Control Protocol/Internet Protocol) is where the modern term Internet first comes up. We still use this protocol today, making the Internet possible. 

ARPANET, realizing that by connecting networks together using TCP/IP they would soon have a problem with too many users to manage. This problem was solved with the establishment of the Domain Name System (DNS). They split the system into domains. The top-level domains (.com, .edu, etc.) established what type of organization you were sending the packet to. Within these domains a second-level domain, provided the organization’s host (such as gmail.com, ucla.edu, etc.) so computers would tell where to specifically send messages. The establishment of the DNS Server would change computing more than any other for decades. 

The Modern Day Internet

In the late 1980s the U.S. Department of Defense was looking to shut down ARPANET as they believed they it had served its purpose. It was handed off to NSFNET in 1990, shortly after the first Internet Service Provider, The World, opened in Boston, Massachusetts, effectively introducing the general public to the Internet. It wasn’t until 1992, when congress passed a law allowing commercial traffic on the Internet when, the boom really started. 

As we all know now, the Internet, which was developed for research and messaging, was soon being used by individuals for those purposes and more. Companies started to look into the applications of selling and advertising products online. Since access was limited at first, the Internet was not looked at as a major commercial hub for companies. This soon changed, however; and, today, every business has some sort of Internet profile. 

Today, the United Nations looks on Internet service as a fundamental human right, which is a long way from four connected computers on a single network in 1969. Would you like to read more stories about the history of technology? Leave your suggestions in the comments section below or call us today at (415) 295-4898 with your recommendations. 

Access Management Failings Keep Businesses Targete...
Help Desks Help Remedy the Following IT Problems
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, November 15 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Network Security Data IT Support Hosted Solutions Data Recovery Privacy Software Cloud Email IT Services Outsourced IT Tech Term Internet Managed IT Services Malware Business User Tips Innovation Computer Windows 10 Efficiency Hackers Cloud Computing Small Business Business Management Upgrade Microsoft Collaboration Hardware Phishing Ransomware Google Paperless Office Cybersecurity Business Continuity Managed Service Workplace Tips Android Communication VoIp Mobile Devices Communications Server Office 365 Remote Monitoring Managed Service Provider Encryption Internet of Things Passwords Artificial Intelligence Vulnerability Managed IT Smartphones Backup Saving Money Healthcare Browser Applications Mobile Device Managed IT services BDR Business Technology Holiday Data Management Disaster Recovery Laptops Wi-Fi Government Document Management Help Desk Quick Tips Save Money Windows 7 Automation Microsoft Office Blockchain Compliance Smartphone Employer-Employee Relationship Tip of the week Project Management Processor Information Scam Redundancy Avoiding Downtime Antivirus Bandwidth Machine Learning BYOD Social Media Access Control Website Windows Data Security Infrastructure Vendor Management Chrome Miscellaneous Two-factor Authentication RMM IT Management VPN Analytics Router Customer Relationship Management Operating System Unified Communications OneDrive Facebook Professional Services Training Files Virtual Private Network Employees Downtime The Internet of Things Gmail Recycling Risk Management Cooperation Employee-Employer Relationship Company Culture Word Unified Threat Management Software as a Service Net Neutrality Patch Management Network Password Apps Mobility Remote Workers Regulations Tablet IoT Internet Exlporer Server Management Data Loss Dark Web Management File Sharing Smart Technology Hard Drive Alert File Management Gadgets Maintenance Proactive Assessment Storage Monitoring Bring Your Own Device Users Networking HIPAA Utility Computing Network Management Consultation Search Financial Mobile Security Remote Monitoring and Management Legislation Options Telephone Modem High-Speed Internet Shortcut Proactive IT Politics Distributed Denial of Service Return on Investment Remote Computing Managed Services G Suite Office Private Cloud Specifications Tech Support Touchscreen Hacking How To Test Mobile Lenovo Electronic Health Records Procurement Digital Payment Hotspot Database Management Smart Tech Time Management WPA3 Operations Shared resources Going Green Samsung Consulting 5G Mobile VoIP Development Heating/Cooling IT Consulting Instant Messaging Managed IT Service Settings Personal Information Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Black Friday Virtual Assistant Bitcoin IT Technicians Cost Management Trending SharePoint Superfish Cyberattacks Social Mouse Language GDPR Connectivity Statistics Mail Merge User Error Fleet Tracking Zero-Day Threat Money Virtualization Batteries Managed Services Provider Mobile Device Management Wireless Internet Big Data Cookies Cables Servers Data Breach Customer Service Break Fix Transportation Active Directory Migration eWaste Permissions Smart Devices Vulnerabilities Favorites Cyber Monday Staff Wasting Time Current Events Downloads Wireless Remote Work Managing Stress Recovery Read Only Security Cameras Computing Infrastructure Bluetooth Address WiFi Asset Tracking Backup and Disaster Recovery Microsoft Excel CIO applications Point of Sale Tech Terms Employer/Employee Relationships Apple Nanotechnology Wires MSP Finance Augmented Reality Windows Server Chatbots Google Calendar Fraud Hard Disk Drives Sensors Mobile Computing Techology Conferencing Database Mirgation Spam Enterprise Content Management Printing Computing Alerts Notes Wearable Technology Star Wars Human Error E-Commerce Theft Travel Proactive Maintenance Solid State Drive App Websites Technology Laws Authentication Virtual Reality User Management Identity Theft Enterprise Resource Planning Electronic Medical Records Solid State Drives Payment Cards Geography Outlook Disaster Resistance Meetings Firewall Voice over Internet Protocol Projects Cache Emergency Multi-Factor Security Value of Managed Services Social Networking Remote Worker Comparison Licensing PowerPoint Display Printer OneNote Permission Features Technology Tips Cybercrime Cyber security Screen Reader SaaS Unified Threat Management Authorization Data Warehousing Flexibility Teamwork Information Technology Identity Regulation Twitter Education Marketing CEO Printers Students Daniel Stevens

Latest Blog

Cybersecurity has become an overly complicated, increasingly important part of our lives. These days, many people are concerned about their privacy; who is collecting their data, what data is being collected, how to prevent information from being stolen, how to prevent breac...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...