Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking Back at ARPANET

Looking Back at ARPANET

I don’t think we’re going too far out on a limb when we say that the Internet is one of the most amazing inventions ever concocted by humans. 50 years ago, the precursor to the Internet, ARPANET was launched by the U.S. Department of Defense at four west coast universities, changing the way people shared data forever. Let’s take a look at ARPANET and how it grew into the Internet we all use constantly today.

DoD Advanced Research

During the Cold War there was a constant need for coded systems to transmit data quickly. In the mid-1960s, the U.S. Department of Defense created what they called the Advanced Research Projects Agency (ARPA), which worked on integrating new technologies that would help the United States achieve its foreign policy goals. One of the scientists that was commissioned was Joseph Lickliter, who had the idea of connecting computers at important research centers. It was a way for engineers and intellectuals to collaborate on DoD-funded projects. The network, called ARPANET, was launched in 1969.

At first, growth was slow. Small packets were sent over telephone lines, but along the way there were many innovations that set the tone for the shared computing constructs that we regularly use today. One such innovation was packet-switching. Packet-switching allows a computer to connect to several other computers at once by sending individual packets of information. In this way, computers were able to constantly send and receive information. With this method each computer on ARPANET would have (what amounts to) an address book that is constantly updated. 

As the network grew, however, this packet switching model, which was beneficial, was just too slow to facilitate an accurate account of addresses on the system. So in 1973, the engineers at ARPA decided that Stanford University (a founding member) would keep a master address book that was kept up to date by network administrators. This decongested the network significantly.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing starting to rear its head, changes started to come fast. It was about this time that other computing networks began to pop up. As they first started to connect with each other there was no interoperability between them, but this problem was remedied early in the 1980s with the standardization of what is called Transmission Control Protocol/Internet Protocol (TCP/IP). This was the first time the world Internet was used. 

ARPA engineers realized pretty quickly that the connecting networks that were now using the same protocol set (TCP/IP) were too numerous and were going to be unmanageable. This is when the modern Domain Name System (DNS) was introduced. They separated all addresses by domains. The first level, or top-level, domains would dictate the type of organization that a packet was being sent to. Examples include .com and .edu. Today, there are over 1,000 top-level domains out there. 

A second-level domain provided the host where data packets would be delivered. Examples that you see today are amazon.com or cornell.edu. This system provided specific data packet routing, setting the stage for the modern-day Internet. 

The Internet

By the late 1980s the DoD decided that ARPANET was a success and shut it down. It was handed off to a private company called NSFNET in 1990. In 1992, the modern Internet Service Provider (ISP) was created as the U.S. Congress passed a law allowing commercial traffic on the newly formed Internet. 

Nowadays, the United Nations has proclaimed that Internet service is now a fundamental human right. This marvel of human ingenuity would not have been possible without ARPA and ARPANET. If you would like to see more articles about technology’s history, subscribe to the Total Tech Care blog today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Virtualization Tech Term Saving Money Holiday Social Media Chrome Gadgets Managed Service Automation Managed IT Services Microsoft Office Computers Facebook Operating System Cybercrime Artificial Intelligence BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Spam Office 365 Remote Telephone Systems Information Technology Managed Service Provider Covid-19 Alert Information Bandwidth Router BDR Social Engineering Recovery Employer-Employee Relationship Mobility Password Mobile Computing Money Remote Monitoring Encryption Application Applications App History Law Enforcement Big Data Human Resources Data Breach Apps Mobile Office How To Office Tips Training Government Data Storage Patch Management VPN Private Cloud Blockchain Paperless Office Managed IT Remote Computing Marketing Work/Life Balance Mouse HaaS WiFi Infrastructure Voice over Internet Protocol IT solutions Entertainment Website Data Security Budget Google Drive Wireless Avoiding Downtime Gmail Vulnerability Settings Windows 7 Word Two-factor Authentication Servers Flexibility Bring Your Own Device Data Management Cleaning Social User Error End of Support Meetings Education USB Physical Security Safety Sports Risk Management HIPAA Data Protection Hacker Redundancy Keyboard The Internet of Things Vendor Lithium-ion battery Managed Services Display Conferencing Scam Firewall Save Time Staff Employee/Employer Relationship Software as a Service Telephone System Machine Learning RMM Virtual Reality Apple Connectivity Remote Work Vendor Management Network Congestion Unsupported Software Computing Infrastructure Google Docs Going Green eWaste Identity Theft Charger Digital Signage Printer Compliance Battery Bluetooth OneNote Computer Care Current Events Shadow IT Telephony Legal Augmented Reality Wearable Technology Retail Fraud Hard Drives Samsung Internet Exlporer Procurement Instant Messaging Robot Net Neutrality Excel Workplace Strategy Remote Worker IT Consultant Value PDF Cryptocurrency Biometrics Help Desk Printing Virtual Desktop Spam Blocking Electronic Medical Records Humor Proactive IT Comparison Hiring/Firing DDoS Best Practice Managed Services Provider YouTube SharePoint CES Database Black Market Business Technology Remote Workers Content Management Access Control Customer Service Processor Document Management Environment Business Intelligence Solid State Drive Wireless Technology Virtual Assistant Authentication Fax Server How to Audit Downtime Worker Hard Drive IT Management Virus SaaS Botnet Data storage Unified Threat Management Automobile IT Plan Update Computer Accessories Computing IBM PCI DSS HVAC Virtual Machine Google Apps Bloatware Analysis Employee Flash Cameras Smart Technology 2FA Fiber Optics Administrator Messaging Devices Cabling Tablets Reputation Streaming Media Supercomputer Tech Support Policy Enterprise Content Management Hypervisor Content Entrepreneur Software Tips Accountants Sync Techology Emails Laptop Dark mode MSP Trend Micro Microchip SMS Thought Leadership Shortcut Default App Credit Cards Customers Procedure Password Management Saving Time Audiobook Password Manager Cost Management Social Networking Google Search Multi-Factor Security Netflix Touchpad Printer Server Two Factor Authentication dark theme Shopping Search Engine AI Twitter IT Infrastructure Root Cause Analysis Advertising Knowledge Music FinTech NIST Politics Business Mangement Bing HBO Smart Tech Skype Trending Running Cable Social Network Notifications Addiction Investment Amazon Memory Data loss Leadership Troubleshooting Employees Employee/Employer Relationships Recycling Outlook Practices ISP Start Menu Windows 365 Wiring Video Conferencing Cache ROI Amazon Web Services Screen Mirroring Relocation Loyalty Shortcuts Frequently Asked Questions Books Sales Safe Mode Bitcoin Criminal Personal Hosted Computing Cryptomining Mobile Video Games Science Windows 10s Point of Sale GDPR Supply Chain Management Wireless Internet Worker Commute Online Shopping Cast Tip of the week Consultant webinar Emergency Monitoring File Sharing Batteries Experience Digitize Inventory Customer Relationship Management Professional Services Scalability Specifications Public Cloud Analytics Employer Employee Relationship Windows 8.1 Camera Distributed Denial of Service Assessment Wire Windows Server 2008 R2 Business Owner Evernote Analyitcs Windows Server 2008 Travel Best Available NarrowBand Customer relationships Programming Printers IT Assessment Manufacturing Tools Search Millennials WIndows 7 Email Best Practices Television Smart Office Wireless Charging iPhone Security Cameras Computer Tips Antivirus Managed IT Service Virtual Private Network OneDrive Biometric Security Workforce Windows 8 Virtual CIO Public Computer Peripheral IT service Cables Files Regulations Chromecast Transportation Digital Security Cameras Using Data Project Management Windows Media Player Copiers Nanotechnology 5G Telecommuting Tablet User Computer Fan PowerPoint Rootkit Uninterrupted Power Supply Quick Tip Domains Cortana Colocation Digital Signature Smartwatch Workers Benefits Ergonomics Warranty IaaS Development Maintenance OLED Managing Stress FENG Monitor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code