Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking Back at ARPANET

Looking Back at ARPANET

I don’t think we’re going too far out on a limb when we say that the Internet is one of the most amazing inventions ever concocted by humans. 50 years ago, the precursor to the Internet, ARPANET was launched by the U.S. Department of Defense at four west coast universities, changing the way people shared data forever. Let’s take a look at ARPANET and how it grew into the Internet we all use constantly today.

DoD Advanced Research

During the Cold War there was a constant need for coded systems to transmit data quickly. In the mid-1960s, the U.S. Department of Defense created what they called the Advanced Research Projects Agency (ARPA), which worked on integrating new technologies that would help the United States achieve its foreign policy goals. One of the scientists that was commissioned was Joseph Lickliter, who had the idea of connecting computers at important research centers. It was a way for engineers and intellectuals to collaborate on DoD-funded projects. The network, called ARPANET, was launched in 1969.

At first, growth was slow. Small packets were sent over telephone lines, but along the way there were many innovations that set the tone for the shared computing constructs that we regularly use today. One such innovation was packet-switching. Packet-switching allows a computer to connect to several other computers at once by sending individual packets of information. In this way, computers were able to constantly send and receive information. With this method each computer on ARPANET would have (what amounts to) an address book that is constantly updated. 

As the network grew, however, this packet switching model, which was beneficial, was just too slow to facilitate an accurate account of addresses on the system. So in 1973, the engineers at ARPA decided that Stanford University (a founding member) would keep a master address book that was kept up to date by network administrators. This decongested the network significantly.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing starting to rear its head, changes started to come fast. It was about this time that other computing networks began to pop up. As they first started to connect with each other there was no interoperability between them, but this problem was remedied early in the 1980s with the standardization of what is called Transmission Control Protocol/Internet Protocol (TCP/IP). This was the first time the world Internet was used. 

ARPA engineers realized pretty quickly that the connecting networks that were now using the same protocol set (TCP/IP) were too numerous and were going to be unmanageable. This is when the modern Domain Name System (DNS) was introduced. They separated all addresses by domains. The first level, or top-level, domains would dictate the type of organization that a packet was being sent to. Examples include .com and .edu. Today, there are over 1,000 top-level domains out there. 

A second-level domain provided the host where data packets would be delivered. Examples that you see today are amazon.com or cornell.edu. This system provided specific data packet routing, setting the stage for the modern-day Internet. 

The Internet

By the late 1980s the DoD decided that ARPANET was a success and shut it down. It was handed off to a private company called NSFNET in 1990. In 1992, the modern Internet Service Provider (ISP) was created as the U.S. Congress passed a law allowing commercial traffic on the newly formed Internet. 

Nowadays, the United Nations has proclaimed that Internet service is now a fundamental human right. This marvel of human ingenuity would not have been possible without ARPA and ARPANET. If you would like to see more articles about technology’s history, subscribe to the Total Tech Care blog today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 04 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Phishing Upgrade Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Office Cloud Computing Passwords Windows 10 Tech Term Gadgets Chrome Virtualization Social Media Saving Money Holiday Microsoft Office Automation Managed Service Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Networking Health Internet of Things IT Support Remote Managed Service Provider Alert Spam Office 365 Covid-19 Telephone Systems Information Technology Information Social Engineering Mobility Router Employer-Employee Relationship Bandwidth Recovery BDR Big Data Remote Monitoring Password Data Breach Money App Encryption Mobile Computing History Applications Application Law Enforcement Human Resources Remote Computing Data Storage Patch Management Managed IT Mobile Office Apps Office Tips Training Blockchain Paperless Office How To VPN Government Private Cloud Vulnerability Mouse HaaS Windows 7 Word Bring Your Own Device Data Management Work/Life Balance Servers Flexibility Marketing WiFi Wireless Data Security IT solutions Entertainment Google Drive Website Budget Gmail Settings Avoiding Downtime Infrastructure Two-factor Authentication Voice over Internet Protocol Apple Conferencing Save Time Social Scam User Error Data Protection Cleaning Vendor Meetings Managed Services Display Vendor Management Risk Management End of Support Hacker Education Physical Security Employee/Employer Relationship Safety The Internet of Things RMM Lithium-ion battery Sports HIPAA Software as a Service Redundancy Telephone System Staff USB Machine Learning Keyboard Connectivity Remote Work Firewall Virtual Reality Workplace Strategy Solid State Drive Wireless Technology Net Neutrality How to Downtime Augmented Reality Help Desk Network Congestion Fraud Printing Business Intelligence eWaste Data storage Remote Worker Audit Worker Automobile IT Management Cryptocurrency Managed Services Provider Botnet Computing Infrastructure Virus Going Green Database IT Plan Wearable Technology Retail Comparison Hard Drives Remote Workers Unified Threat Management Instant Messaging Computer Accessories Robot Excel Unsupported Software CES Battery Processor Shadow IT Charger Biometrics Virtual Desktop Legal Business Technology Content Management Access Control Compliance Hard Drive Internet Exlporer OneNote Computer Care Printer Virtual Assistant DDoS Current Events Bluetooth Authentication Telephony Computing SharePoint Samsung PDF Proactive IT Value Customer Service Update IT Consultant Spam Blocking Electronic Medical Records Environment Best Practice YouTube Digital Signage Fax Server Google Docs Black Market Humor Hiring/Firing Identity Theft SaaS Document Management Procurement Social Network Password Management Consultant Assessment Password Manager IaaS Analytics Maintenance Multi-Factor Security Investment Windows Server 2008 Employee/Employer Relationships Tools Search Engine Twitter Bloatware Employees Files Windows 365 Chromecast ISP NIST Best Available Television Business Mangement WIndows 7 Smart Tech Trending Tablets Video Conferencing ROI Bitcoin Uninterrupted Power Supply Shortcuts Addiction Amazon Entrepreneur Sales Colocation Point of Sale Personal Cryptomining Public Computer Recycling Practices Shortcut Transportation Supply Chain Management Monitor Regulations Wiring Batteries Computer Fan Cache Rootkit Amazon Web Services Cost Management Monitoring Social Networking Windows 8.1 Digitize Safe Mode Criminal User Workers Hosted Computing PowerPoint Benefits Windows Media Player Reputation Windows Server 2008 R2 Streaming Media GDPR Tech Support FENG Wireless Internet Online Shopping Content Customer relationships Email Best Practices Techology IT Assessment Laptop Manufacturing File Sharing Running Cable IBM Managing Stress Inventory Smart Technology Specifications Memory Customers Flash Camera Managed IT Service Security Cameras Wire Evernote Audiobook Computer Tips Cameras Virtual CIO Travel OneDrive Touchpad Biometric Security Software Tips Supercomputer Emails Millennials Peripheral Sync Printers Using Data Smart Office Wireless Charging Politics Digital Security Cameras Advertising Science Copiers 5G Netflix Two Factor Authentication Workforce Quick Tip Notifications Virtual Private Network Smartwatch Root Cause Analysis Cables Ergonomics Printer Server Customer Relationship Management Music Development OLED HBO Distributed Denial of Service Knowledge Nanotechnology Telecommuting Analyitcs PCI DSS Relocation Virtual Machine Skype Project Management Fiber Optics Employee Data loss Cortana Programming 2FA Troubleshooting Video Games Messaging Cabling Outlook Leadership Digital Signature Start Menu Warranty Worker Commute Policy Hypervisor Trend Micro Screen Mirroring HVAC Antivirus Loyalty Google Apps Experience Dark mode Analysis Books Scalability Windows 8 SMS Default App Frequently Asked Questions Mobile Administrator Windows 10s Devices IT service Business Owner Procedure Saving Time Shopping NarrowBand Google Search Cast Enterprise Content Management dark theme webinar Accountants Emergency Search Tablet AI IT Infrastructure Tip of the week MSP Professional Services Microchip Bing Public Cloud Thought Leadership Domains Employer Employee Relationship Credit Cards FinTech iPhone

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code