312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

Let’s Take a Look at 50 Years of the Internet

Let’s Take a Look at 50 Years of the Internet

Without a doubt, the Internet is one of humanity's most impressive inventions. 50 years ago, the predecessor to the Internet that most of the world depends on, called ARPANET, was launched. Today, we will talk about how that innovation turned into the Internet, and reorganized the way people interacted with computing systems. 

Development of ARPANET

In the mid-1960s the United States was firmly in the throes of the Cold War. The U.S. Department of Defense was attempting to find a way to communicate clandestinely. For this purpose they created the Advanced Research Projects Agency (ARPA). A scientist named Joseph Lickliter convinced the DoD to fund a network of connected computers through the country so that engineers and intellectuals from several colleges could collaborate on projects together, effectively making progress a priority. This network was finished in 1969 and was called ARPANET. It is the precursor of the modern-day Internet.

Over the next couple of decades there were major innovations to this network, many of which are the basis for much of the shared computing we have today. One of those innovations is called packet-switching. Packet-switching allows the computer you are using to connect to several other computers at once by sending individual packets of information through the wires. This provides users the ability to quickly get information that would be impossible through circuit switching, the technology that was used prior to the development of ARPANET.

As the network got bigger, the ARPANET engineers had to scrap the system because with packet-switching, each user would have to keep an updated address list in order to properly send and receive messages. This was not feasible with the technology at the time so they decided that Stanford University (who was a founding member of ARPANET) would be the safekeeper for all of the updated addresses on ARPANET in 1973.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing right around the corner, major changes were on the horizon. Other computing networks started to pop up, but with no continuity between them, communications became a headache for users. This was remedied early in the 1980s with the standardization of sending packets through the TCP/IP protocol.  TCP/IP (Transmission Control Protocol/Internet Protocol) is where the modern term Internet first comes up. We still use this protocol today, making the Internet possible. 

ARPANET, realizing that by connecting networks together using TCP/IP they would soon have a problem with too many users to manage. This problem was solved with the establishment of the Domain Name System (DNS). They split the system into domains. The top-level domains (.com, .edu, etc.) established what type of organization you were sending the packet to. Within these domains a second-level domain, provided the organization’s host (such as gmail.com, ucla.edu, etc.) so computers would tell where to specifically send messages. The establishment of the DNS Server would change computing more than any other for decades. 

The Modern Day Internet

In the late 1980s the U.S. Department of Defense was looking to shut down ARPANET as they believed they it had served its purpose. It was handed off to NSFNET in 1990, shortly after the first Internet Service Provider, The World, opened in Boston, Massachusetts, effectively introducing the general public to the Internet. It wasn’t until 1992, when congress passed a law allowing commercial traffic on the Internet when, the boom really started. 

As we all know now, the Internet, which was developed for research and messaging, was soon being used by individuals for those purposes and more. Companies started to look into the applications of selling and advertising products online. Since access was limited at first, the Internet was not looked at as a major commercial hub for companies. This soon changed, however; and, today, every business has some sort of Internet profile. 

Today, the United Nations looks on Internet service as a fundamental human right, which is a long way from four connected computers on a single network in 1969. Would you like to read more stories about the history of technology? Leave your suggestions in the comments section below or call us today at 312-253-4321 with your recommendations. 

Access Management Failings Keep Businesses Targete...
Help Desks Help Remedy the Following IT Problems


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 01 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Data Data Backup Network Security IT Services Privacy Hosted Solutions IT Support Malware Software Internet Email Hackers Efficiency Outsourced IT Microsoft Innovation Data Recovery Computer Business Hardware Business Continuity Small Business Cloud Computing Mobile Devices Cybersecurity Managed IT Services Productivity Managed IT Services Google Ransomware Collaboration User Tips Backup Tech Term Upgrade Communication Phishing Business Management Windows 10 VoIP Workplace Tips IT Support Paperless Office Android Disaster Recovery Smartphones Remote Monitoring Mobile Device Office 365 Data Management Managed Service Managed Service Provider Managed IT Smartphone Server Communications Quick Tips Internet of Things Facebook Encryption Passwords Network Browser Save Money Social Media Wi-Fi BDR Virtualization Help Desk Holiday Artificial Intelligence Miscellaneous Saving Money Windows 10 Business Technology BYOD Healthcare Compliance Windows 7 Health Government Document Management Training Employer-Employee Relationship Automation Password Remote Work Microsoft Office Vendor Management Risk Management Laptops Windows Applications Infrastructure SaaS Tip of the week Data loss Storage Avoiding Downtime Telephone Systems Two-factor Authentication Unified Threat Management File Sharing Bandwidth Apps Antivirus Recovery Mobility Going Green Redundancy Processor Maintenance Vulnerability IT Management Scam Analytics Project Management Users Blockchain Chrome Information Data Security Office Mobile Device Management Firewall Computers Robot Company Culture Gmail Software as a Service Computing Tablet App Files Proactive Meetings OneDrive Money Gadgets Router Word Regulations Customer Relationship Management Data Storage RMM Politics Big Data Website Flexibility VPN Machine Learning IoT Access Control Virtual Reality Work/Life Balance Bring Your Own Device Virtual Private Network IT Service Wireless Hosted Solution Upgrades Identity Theft Licensing Monitoring Recycling Alert Utility Computing Electronic Health Records Display Assessment How To Consulting Augmented Reality Dark Web Time Management Patch Management Apple Samsung Unified Communications Uninterrupted Power Supply Social Network How To Monitors Consultation Managed Services Provider The Internet of Things Employees Employee-Employer Relationship Network Management File Management Management Smart Technology Search Net Neutrality Chromebook Remote Monitoring and Management Professional Services Server Management Payment Cards HIPAA Settings Twitter Remote Workers Networking Social Internet Exlporer Hard Drive Solid State Drive Co-Managed IT Customer Service Operating System Mobile Office Printing Remote Computing Electronic Medical Records Managed Services Cooperation Downtime Covid-19 Mobile Security Outlook Digital Payment Current Events Biometric Permissions Star Wars Features Wasting Time Statistics SharePoint Mobile VoIP Mirgation High-Speed Internet Spyware Human Error Firefox IT Solutions Processors ROI Technology Laws Legal Law Enforcement Vendor Staff Authentication Mail Merge USB Database Management IT Assessment Break Fix Nanotechnology Asset Tracking Theft Techology Personal Information Batteries Hotspot Unsupported Software Favorites Teamwork Shortcut Private Cloud Solid State Drives Virtual Machines Black Friday Motherboard Projects Gamification Fraud Disaster 3D Printing Database Bluetooth Downloads Update Cyber security Migration Development MSP Permission Lenovo Software Tips Notes Heating/Cooling Unified Threat Management Gadget Smart Devices Operations Managing Stress WiFi VoIP Dark Data Authorization Address GDPR Digitize Screen Reader OneNote Financial Disaster Resistance Virus Wireless Technology Language 5G eWaste Mobile Data Conferencing Shared resources Technology Tips Options Credit Cards Cyber Monday Tech Support Mobile Computing Social Engineering Return on Investment Outsource IT Safety Cybercrime Cyberattacks Voice over Internet Protocol Multi-Factor Security IBM Chatbots Cables Test Superfish Data Warehousing Hacker Smart Tech PowerPoint Servers User Error Sensors Wearable Technology Enterprise Content Management GPS YouTube Black Market Shadow IT Procurement Proactive IT Computer Repair Crowdsourcing Computing Infrastructure Information Technology Mouse Wireless Internet Holidays Budget Google Maps Notifications Active Directory Laptop Cost Management Travel Read Only Hacking Google Calendar Botnet Windows Server 2008 Identity Supercomputer Microsoft Excel Connectivity Content Filtering History Point of Sale Printer Sports Vulnerabilities Tracking Network Congestion Wires Zero-Day Threat Physical Security Outsourcing Security Cameras Touchscreen IT Consulting Value of Managed Services Alerts Enterprise Resource Planning Corporate Profile Humor Instant Messaging Manufacturing Comparison Business Growth Employer/Employee Relationships IT Distributed Denial of Service Modem Windows Server Remote Working Cortana Transportation Trending Legislation IT Budget End of Support WPA3 Bitcoin Video Conferencing G Suite Cabling E-Commerce Virtual Assistant Websites Telephony Telephone IT Technicians Geography Digital Education Backup and Disaster Recovery Remote Worker Data Breach Mobile Computer Care WannaCry Office Tips Finance Hard Disk Drives Specifications Automobile Proactive Maintenance Business Telephone Managed IT Service Cookies Google Drive User Management Cache Taxes Hard Disk Drive Bookmarks Emoji Optimization Spam Social Networking Fleet Tracking Tech Terms Hiring/Firing Regulation Sync Public Speaking Staffing Presentation IT Consultant Fun Lithium-ion battery CrashOverride Mobile Device Managment Error Administrator Hard Drives Marketing Public Cloud Competition IP Address Cleaning Hacks Motion Sickness Printers Emergency Domains Students Relocation