Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Evolution of Internet Speeds

The Evolution of Internet Speeds

With the Internet cementing itself as one of the best tools to get work done, it’s easy to forget just how sluggish it used to be back when it first became available for use. Internet speeds have undergone some dramatic shifts over the years, so let’s remember the good old days when it took ages to do just about anything with it.

Internet speeds are measured in megabits. 1,000 kilobits (technically 1,024 KB) is equivalent to 1 megabit and 1,000 megabits (technically 1,024 MB) is equivalent to 1 gigabit. Keep these numbers in mind as we discuss Internet speeds and their development over the years.

Dial Up

Can you believe that it’s only been about 25 years since the Internet became widely accessible in offices and homes? It was first introduced to the mass market through the use of dial up Internet, which used the phone line to connect. In the 1990s, people would have one telephone line for both the telephone and the computer. If an individual wanted to connect to the Internet, they would be charged for long distance—even if the “call” was to the next village or city over.

Around 2000, the average modem was 56 KB/s with an uninterrupted signal. A one-megabyte image would take about 20 seconds to download. This snail’s-pace speed by today’s standards was enough to make instant messaging and email possible, but other media-based activities would take days or weeks to transmit across the connection.

DSL

“High-speed” Internet became popular as we moved into the 2000s. DSL, or Digital Subscriber Line, utilized cable connections, allowing ISPs to transmit data at much faster speeds compared to dial up. The bandwidth of a cable was able to transfer much more data compared to the traditional telephone wire. In fact, DSL was so revolutionary that it still makes up the vast majority of connections you’ll find out there. A DSL connection is capable of delivering speeds of up to 100 MB/s, but realistically, it is more likely to be around the 5 MB-to-20 MB/s range.

This large increase in speed allows for much more in terms of the work you can do. Cloud-hosted email, for example, can be utilized with these speeds, along with music streaming and website browsing. Around 2010, when DSL became widely available, there was a huge burst of application development utilizing the speeds—a new trend which is still happening to this day. Even video streaming, in the grand scheme of things, is quite new, but it wouldn’t have been possible without the inception of DSL connections.

Fiber Optic

Of course, there is also the fiber optic cable option, which is what many of today’s fastest Internet speeds utilize. Fiber optic uses light to transmit data, and is therefore much faster than DSL connections. DSL cable systems lose speed and performance the farther the signal must go, but with fiber optic, Internet speeds and bandwidth are exponentially better. Fiber optic is capable of speeds of up to tens of gigabits per second. Absolutely wild stuff.

Mobile computing has only further changed this fact, as people rely more on Wi-Fi signals than ever before. Otherwise people would be exceeding their data caps more frequently. Fiber has given people access to much faster connections—connections that systems and businesses rely on to function. It’s made working from home easier and more efficient, online schooling and telehealth more accessible, real-time data collection much simpler, and communication and collaboration more reliable.

If you’re curious about your current Internet speeds (and you should be), you can use free Internet speed test applications, like the one found at https://www.speedtest.net/. This should give you a decent enough look at your Internet speed, and if you find it’s not up to snuff, you can call us at 800.618.9844. We can’t increase the speed of your connection—that responsibility falls to your Internet service provider—but we can optimize your network and the hardware around it to make sure you’re not losing speed from things within your control, like blocked modems, network bottlenecks, and the like.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 30 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Business Management AI Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Remote Internet of Things Tech Term Automation Information Facebook Artificial Intelligence Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Blockchain Business Technology Windows 10 Virtualization Bandwidth Mobile Office Two-factor Authentication Vendor Data Security Apps App Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Gmail Chrome Networking Budget Employer-Employee Relationship Apple BYOD Hacker Avoiding Downtime Access Control Computing Marketing Information Technology HIPAA Applications Office 365 WiFi How To BDR Conferencing Computers Virtual Private Network Operating System Health Website Risk Management Router Retail Healthcare Analytics Office Tips Augmented Reality Managed IT Services Big Data Help Desk Storage 2FA Password Bring Your Own Device Customer Service Physical Security Going Green Display Printer Cooperation Paperless Office Infrastructure Cybercrime Document Management Remote Workers Firewall Scam Data loss Free Resource The Internet of Things Project Management Monitoring Windows 11 Windows 7 Social Microsoft 365 Patch Management Save Money Excel Solutions Remote Monitoring End of Support Vulnerability Vendor Management Telephone Meetings VPN Hacking Licensing Presentation Entertainment Computer Repair Holidays Settings Wireless Printing Wireless Technology Data Storage Data Privacy Content Filtering Telephone System Video Conferencing YouTube Cost Management Managed Services Provider Cryptocurrency Virtual Machines Professional Services Machine Learning Word Virtual Desktop LiFi Data storage Maintenance iPhone Modem Antivirus User Tip Safety Processor Mobile Security Outlook Vulnerabilities Money Humor Images 101 Smart Technology Multi-Factor Authentication Mobility Supply Chain Sports Robot Mouse Saving Time Administration Managed IT Service Customer Relationship Management Employees Integration Downloads IT Management Browsers Technology Care IT solutions Connectivity Network Congestion Managing Costs Break Fix Legal User Error Business Growth Upload eCommerce Business Communications SSID Virtual Assistant Multi-Factor Security Social Network Surveillance Scams Point of Sale Hybrid Work User IoT Virtual Machine Cortana Dark Web Reviews Alt Codes Trends Human Resources Medical IT Regulations Transportation Google Calendar Network Management Customer Resource management Tech Support Development Cables Downtime Data Analysis Hosted Solution Star Wars Monitors Hypervisor Microsoft Excel IP Address Shopping Typing Gamification Optimization Google Apps Staff PowerPoint Social Networking Employer/Employee Relationships Legislation Websites IT Maintenance Fileless Malware PCI DSS Business Intelligence Recovery Knowledge Navigation Google Drive SharePoint Gig Economy Hard Drives Content Electronic Medical Records Shortcuts Wearable Technology Motherboard Teamwork 5G Comparison Domains Health IT Internet Service Provider Ransmoware Directions Regulations Compliance Vendors Unified Communications Assessment Writing Experience Permissions Evernote Lenovo Google Docs Bitcoin Refrigeration Virtual Reality Memes Be Proactive Running Cable SQL Server Specifications Server Management Google Wallet Public Speaking Private Cloud Net Neutrality Workforce Lithium-ion battery Microchip Identity Theft Financial Data Threats Internet Exlporer History Fraud Superfish Smartwatch Windows 8 Username Twitter IT Workplace Strategies Laptop Entrepreneur Azure Black Friday Drones Error Procurement Meta Telework Amazon Database Social Engineering Cyber security Tech CES Undo Remote Computing Communitications Halloween IT Technicians Cookies Cyber Monday Proxy Server Supply Chain Management Outsource IT Tablet FinTech Environment Tactics Media Hotspot Term Hacks Alert IT Assessment Scary Stories Mirgation Nanotechnology Dark Data Value Fun Managed IT File Sharing Flexibility Small Businesses Organization Displays Deep Learning Application Addiction How To Language Digital Security Cameras Management Notifications Smart Devices Chatbots Remote Working Outsourcing Education Screen Reader Memory Distributed Denial of Service IBM Travel Techology Google Maps Service Level Agreement Data Breach Computing Infrastructure Google Play Videos Mobile Computing Electronic Health Records Workplace Identity Bookmark Unified Threat Management Hiring/Firing Smart Tech Wasting Time Search Unified Threat Management Best Practice Download Trend Micro Paperless Alerts Security Cameras Competition Software as a Service Co-managed IT Buisness

Blog Archive