Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Let’s Take a Look at 50 Years of the Internet

Let’s Take a Look at 50 Years of the Internet

Without a doubt, the Internet is one of humanity's most impressive inventions. 50 years ago, the predecessor to the Internet that most of the world depends on, called ARPANET, was launched. Today, we will talk about how that innovation turned into the Internet, and reorganized the way people interacted with computing systems. 

Development of ARPANET

In the mid-1960s the United States was firmly in the throes of the Cold War. The U.S. Department of Defense was attempting to find a way to communicate clandestinely. For this purpose they created the Advanced Research Projects Agency (ARPA). A scientist named Joseph Lickliter convinced the DoD to fund a network of connected computers through the country so that engineers and intellectuals from several colleges could collaborate on projects together, effectively making progress a priority. This network was finished in 1969 and was called ARPANET. It is the precursor of the modern-day Internet.

Over the next couple of decades there were major innovations to this network, many of which are the basis for much of the shared computing we have today. One of those innovations is called packet-switching. Packet-switching allows the computer you are using to connect to several other computers at once by sending individual packets of information through the wires. This provides users the ability to quickly get information that would be impossible through circuit switching, the technology that was used prior to the development of ARPANET.

As the network got bigger, the ARPANET engineers had to scrap the system because with packet-switching, each user would have to keep an updated address list in order to properly send and receive messages. This was not feasible with the technology at the time so they decided that Stanford University (who was a founding member of ARPANET) would be the safekeeper for all of the updated addresses on ARPANET in 1973.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing right around the corner, major changes were on the horizon. Other computing networks started to pop up, but with no continuity between them, communications became a headache for users. This was remedied early in the 1980s with the standardization of sending packets through the TCP/IP protocol.  TCP/IP (Transmission Control Protocol/Internet Protocol) is where the modern term Internet first comes up. We still use this protocol today, making the Internet possible. 

ARPANET, realizing that by connecting networks together using TCP/IP they would soon have a problem with too many users to manage. This problem was solved with the establishment of the Domain Name System (DNS). They split the system into domains. The top-level domains (.com, .edu, etc.) established what type of organization you were sending the packet to. Within these domains a second-level domain, provided the organization’s host (such as gmail.com, ucla.edu, etc.) so computers would tell where to specifically send messages. The establishment of the DNS Server would change computing more than any other for decades. 

The Modern Day Internet

In the late 1980s the U.S. Department of Defense was looking to shut down ARPANET as they believed they it had served its purpose. It was handed off to NSFNET in 1990, shortly after the first Internet Service Provider, The World, opened in Boston, Massachusetts, effectively introducing the general public to the Internet. It wasn’t until 1992, when congress passed a law allowing commercial traffic on the Internet when, the boom really started. 

As we all know now, the Internet, which was developed for research and messaging, was soon being used by individuals for those purposes and more. Companies started to look into the applications of selling and advertising products online. Since access was limited at first, the Internet was not looked at as a major commercial hub for companies. This soon changed, however; and, today, every business has some sort of Internet profile. 

Today, the United Nations looks on Internet service as a fundamental human right, which is a long way from four connected computers on a single network in 1969. Would you like to read more stories about the history of technology? Leave your suggestions in the comments section below or call us today at 1-844-237-4300 with your recommendations. 

Access Management Failings Keep Businesses Targete...
Help Desks Help Remedy the Following IT Problems
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 29 2020

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Data Privacy Network Security IT Services Email Malware Data Backup Internet Hackers Software Outsourced IT Microsoft Business Innovation IT Support Productivity Computer Efficiency Managed IT Services Data Recovery Mobile Devices IT Support Hardware Upgrade Google Ransomware Backup Cloud Computing Phishing Business Continuity Small Business User Tips Tech Term Cybersecurity Communication Collaboration Windows 10 Managed IT Services Workplace Tips Internet of Things Managed Service Provider Smartphone Smartphones Android Business Management VoIP Disaster Recovery Paperless Office Data Management Remote Monitoring communications Facebook Managed IT Social Media Server Windows Artificial Intelligence Office 365 Encryption Save Money Managed Service Windows 10 Miscellaneous BDR Quick Tips Network Browser Virtualization Mobile Device Passwords BYOD Saving Money Holiday Risk Management Help Desk Wi-Fi Compliance Mobile Device Management App Healthcare Automation Business Technology Government Vendor Management Document Management Password Apps Windows 7 Gmail Robot Firewall Training Applications Laptops Big Data Employer-Employee Relationship Microsoft Office Chrome Bring Your Own Device Recovery Going Green Bandwidth Unified Threat Management Avoiding Downtime Analytics IT Management Processor Content Filtering Redundancy Tip of the week Telephone Systems SaaS Scam Apple Antivirus Project Management File Sharing Computers Users Money Infrastructure Data storage Data loss Vulnerability Hosted Solution Wireless Website Blockchain Information Settings RMM Regulations Office IT Service Gadgets Social Machine Learning Mobility VPN Tablet Software as a Service Two-factor Authentication Storage Router Unified Communications Customer Relationship Management Computing Files Maintenance Data Security Downtime Information Technology Operating System Politics Printing Work/Life Balance Customer Service IoT Access Control OneDrive Virtual Reality Remote Computing Twitter Employees Word Search Monitoring Business Growth Company Culture Professional Services Recycling Sports Display End of Support Health Mobile Computing Utility Computing Consulting Augmented Reality Hacker Dark Web Solid State Drive Proactive Monitors Networking Alert Wireless Technology Legal Patch Management Electronic Medical Records The Internet of Things Current Events Managed Services Provider Meetings Employee-Employer Relationship Management Smart Technology Spam Remote Monitoring and Management Virtual Private Network Network Management Social Network How To Samsung WiFi Net Neutrality YouTube Private Cloud Budget Remote Workers Assessment Server Management Flexibility Bitcoin How To Tech Support File Management Chromebook Hard Drive Administration Internet Exlporer Consultation Digital Payment Payment Cards HIPAA Education Mouse Uninterrupted Power Supply LiFi Outlook Cooperation Websites Identity Theft Electronic Health Records Licensing Co-Managed IT Upgrades IT solutions Google Drive Mobile Security Superfish Public Cloud Telephone Legislation IT Technicians High-Speed Internet Law Enforcement Video Conferencing Computer Repair Permissions Nanotechnology Star Wars SharePoint Staff Google Wallet Conferencing Bluetooth Travel Wireless Internet Business Telephone Physical Security Break Fix Social Networking Asset Tracking Botnet Managed Services Retail Cortana Cyberattacks Proactive IT Mobile Device Managment Manufacturing Software Tips Optimization 3D Printing Black Friday Roanoke — Central Technology Solutions Hard Drives Google Docs MSP Spyware Course Security Cameras User Management Unified Threat Management Hotspot Automobile Transportation Computer Care Mobile VoIP Processors Mirgation Marketing Development Zero-Day Threat Shortcut Gadget Fraud Screen Reader Humor Vendor Downloads Drones Managing Stress Instant Messaging Employer/Employee Relationships Office Tips IT Assessment Motherboard Buisness Backups OneNote Firefox Virtual Assistant Deep Learning eWaste Read Only Heating/Cooling IT Consulting Hard Disk Drives Virtual Machines Unsupported Software Virus Cyber Monday technology services provider Tech Terms Remote Worker GPS Batteries Update User Error Language Time Management Cyber security Migration Cables Backup and Disaster Recovery WannaCry Projects Smart Tech Wasting Time Supercomputer Smart Devices Social Engineering USB Operations Alt Codes Enterprise Content Management Finance Hacking Crowdsourcing Proactive Maintenance Digitize Data Warehousing Servers Data Breach G Suite Solid State Drives History Credit Cards Mobile Data Technology Assurance Group ’s 18 Cryptocurrency Theft ROI Tracking Remote Work Computing Infrastructure E-Commerce Teamwork Google Maps Technology Tips Chatbots Wires Human Error Taxes Return on Investment Cost Management Database IT Budget Sensors Safety Multi-Factor Security Wearable Technology Typing Vulnerabilities Authentication Disaster Trending Database Management Dark Data Shadow IT Personal Information Microsoft Excel Modem Hacks Connectivity Best Practice Enterprise Resource Planning Bookmarks Technology Laws Options Cabling Holidays Distributed Denial of Service Annual Convention WPA3 Financial Mail Merge Notes Printer Alerts Features Touchscreen Techology Shared resources Windows Server 2008 Notifications Comparison Identity Permission VoIP Sponsor Active Directory Lenovo Voice over Internet Protocol Black Market Google Calendar Geography Authorization Point of Sale GDPR Outsourcing Cookies Virtual Desktop Mobile Favorites Statistics Cybercrime 5G IT Managed IT Service San Diego Windows 8 Save Time Fleet Tracking Procurement Address PowerPoint Value of Managed Services Writing Emoji Cache Disaster Resistance Sync Specifications Identities Test Digital Obstacle Telephony Windows Server Network Congestion Web Server Hard Disk Drive Cameras Motion Sickness Administrator Students CCTV Emergency Relocation Printers CrashOverride Webcam IT Consultant Error Regulation