top of page

ITGS + Digital Society  IBDP

Digital Society Blog

3.4 Networks & the Internet: Digital Society Content Deep Dive

  • Writer: lukewatsonteach
    lukewatsonteach
  • Apr 4
  • 21 min read

Core Concept

Network: An interconnected system of computers and other devices that can communicate and share resources with each other.

Examples:

  1. Office computer networks connecting workstations, printers, and servers

  2. Home Wi-Fi networks connecting smartphones, laptops, and smart home devices

  3. University campus networks linking academic buildings, libraries, and student centers


Internet: A global system of interconnected computer networks that uses standardized communication protocols to link devices worldwide.

Examples:

  1. The global infrastructure that enables services like email, web browsing, and video streaming

  2. Undersea fiber optic cables connecting continents

  3. Satellite internet systems providing connectivity to remote areas


3.4A Types of Computing Networks

Based on Connectivity

  1. Wired Network: Networks that use physical cables to transmit data between devices.

    • Examples:

      • Ethernet office networks using CAT6 cables

      • Fiber optic networks for high-speed internet backbones

      • USB connections between devices

  2. Wireless Network: Networks that use radio waves or other electromagnetic signals to transmit data without physical connections.

    • Examples:

      • Wi-Fi networks in homes and businesses

      • Bluetooth connections between smartphones and headphones

      • 5G cellular networks for mobile devices

  3. Cloud Network: Computing resources accessed over the internet rather than from local infrastructure.

    • Examples:

      • Microsoft Azure cloud computing services

      • Amazon Web Services (AWS) global infrastructure

      • Google Cloud Platform's distributed resources


Based on Geographic Scope

  1. Personal Area Network (PAN): Network for connecting devices within an individual person's workspace.

    • Examples:

      • Bluetooth connection between a laptop and wireless headphones

      • Apple Watch connected to an iPhone

      • Wireless keyboard and mouse connected to a computer

  2. Local Area Network (LAN): Network connecting devices within a limited area, such as a home, school, or office building.

    • Examples:

      • Office network connecting computers to a shared printer

      • School computer lab network

      • Home Wi-Fi network connecting multiple devices

  3. Metropolitan Area Network (MAN): Network spanning a city or large campus.

    • Examples:

      • City-wide public Wi-Fi networks

      • University campus networks connecting multiple buildings

      • Traffic management systems connecting traffic lights across a city

  4. Wide Area Network (WAN): Network covering a broad geographical area, often connecting multiple LANs.

    • Examples:

      • Corporate networks connecting offices in different countries

      • Banking networks linking branches nationwide

      • Government agency networks spanning multiple locations


Based on Architecture

  1. Client-Server Network: Network where centralized servers provide resources to client devices.

    • Examples:

      • Email systems with centralized mail servers

      • Online gaming platforms with dedicated game servers

      • Corporate file sharing systems with central file servers

  2. Peer-to-Peer (P2P) Network: Network where devices connect directly to each other without requiring a central server.

    • Examples:

      • BitTorrent file sharing

      • Blockchain networks like Bitcoin

      • Skype's direct call routing between users


3.4B Components of Computing Networks

  1. Client: End-user device that requests and uses resources from the network.

    • Examples:

      • Laptops running web browsers

      • Smartphones accessing email

      • Smart TVs streaming content

  2. Server: Specialized computer that provides resources, services, or data to clients.

    • Examples:

      • Web servers hosting websites

      • Database servers storing company records

      • Mail servers managing email communication

  3. Modem: Device that converts digital signals from computers to signals suitable for transmission over communication lines, and vice versa.

    • Examples:

      • Cable modems connecting homes to ISP networks

      • DSL modems for telephone line internet access

      • Fiber optic modems for high-speed connections

  4. Router: Device that forwards data packets between computer networks, determining the best path.

    • Examples:

      • Home Wi-Fi routers

      • Enterprise-grade Cisco routers

      • 5G cellular routers for mobile connectivity

  5. Switch: Device that connects multiple devices on a local network and directs traffic only to the intended recipient.

    • Examples:

      • Office network switches connecting workstations

      • Data center switches managing server connections

      • Home network switches expanding connectivity

  6. Hub: Basic network device that connects multiple Ethernet devices, broadcasting data to all connected devices.

    • Examples:

      • Simple Ethernet hubs in legacy networks

      • USB hubs connecting multiple peripherals

      • KVM (Keyboard, Video, Mouse) hubs for controlling multiple computers

  7. Channels: Pathways through which data is transmitted in a network.

    • Examples:

      • Wi-Fi channels on different frequencies

      • Fiber optic channels using different wavelengths of light

      • Multiple frequency channels in cellular networks

  8. Network Interface: Hardware component that connects a device to a network.

    • Examples:

      • Network Interface Cards (NICs) in computers

      • Wi-Fi adapters in laptops

      • Ethernet ports on routers and switches


3.4C Characteristics of Computing Networks

Standards and Protocols

  1. Interoperability: Ability of different systems, devices, and applications to connect and communicate seamlessly.

    • Examples:

      • USB standards allowing devices from different manufacturers to connect

      • Wi-Fi protocols enabling diverse devices to connect to wireless networks

      • Bluetooth standards for wireless device communication

  2. Domain Names: Human-readable addresses that correspond to numerical IP addresses of servers on the internet.

  3. Addresses (IP): Numerical labels assigned to devices participating in a network, used to identify and locate devices.

    • Examples:

      • IPv4 addresses like 192.168.1.1

      • IPv6 addresses like 2001:0db8:85a3:0000:0000:8a2e:0370:7334

      • MAC addresses like 00:1A:2B:3C:4D:5E

Security

  1. Identification: Process of claiming an identity within a system.

    • Examples:

      • Username entry in a login screen

      • Email address used to identify accounts

      • Employee ID numbers in corporate systems

  2. Authentication: Process of verifying the claimed identity.

    • Examples:

      • Password verification

      • Biometric authentication (fingerprint, face recognition)

      • Two-factor authentication via SMS or authenticator apps

  3. Encryption: Process of encoding information so only authorized parties can access it.

    • Examples:

      • HTTPS encryption for secure websites

      • WhatsApp end-to-end encryption for messages

      • BitLocker drive encryption for Windows computers

  4. Firewall: Security system that monitors and controls incoming and outgoing network traffic.

    • Examples:

      • Windows Defender Firewall

      • Corporate hardware firewalls from Cisco or Palo Alto Networks

      • Application-specific firewalls like ModSecurity for web servers

  5. Proxy Server: Server that acts as an intermediary between clients and other servers.

    • Examples:

      • Corporate proxy servers filtering web content

      • NGINX reverse proxy for load balancing

      • Web proxies for anonymous browsing

  6. Virtual Private Network (VPN): Technology that creates a secure, encrypted connection over a less secure network.

    • Examples:

      • NordVPN and ExpressVPN for personal use

      • Cisco AnyConnect for corporate remote access

      • OpenVPN for self-hosted solutions

  7. Security Layers: Multiple levels of security measures working together to protect systems.

    • Examples:

      • Defense in depth strategies combining firewalls, antivirus, and access controls

      • OSI security model implementation

      • Zero Trust security architecture in modern enterprises

Capacity

  1. Bandwidth: Maximum rate of data transfer across a network connection.

    • Examples:

      • 1 Gbps fiber optic home internet connection

      • 100 Mbps business Ethernet connection

      • 5G cellular networks with up to 10 Gbps theoretical bandwidth

  2. Data Compression: Techniques to reduce the size of data being transmitted or stored.

    • Examples:

      • JPEG compression for images

      • H.265/HEVC compression for video streaming

      • ZIP/RAR compression for file transfers

  3. Net Neutrality: Principle that all internet traffic should be treated equally by ISPs.

    • Examples:

      • Regulations preventing ISPs from blocking competing services

      • Policies ensuring equal access to all legal websites

      • Rules against prioritizing certain types of content

Infrastructure

  1. Internet Backbone: Principal data routes between large, strategically interconnected networks and core routers on the internet.

    • Examples:

      • Transatlantic fiber optic cables connecting continents

      • Level 3 Communications global network infrastructure

      • Internet Exchange Points (IXPs) where different networks connect


3.4D Computing Network Providers and Services

Providers

  1. Internet Service Provider (ISP): Company that provides internet access to customers.

    • Examples:

      • Comcast/Xfinity in the United States

      • BT in the United Kingdom

      • Airtel in India

Services

  1. Chat: Real-time text-based communication between users.

    • Examples:

      • WhatsApp chat functionality

      • Discord chat channels

      • Microsoft Teams chat

  2. Texting: Sending short messages typically between mobile devices.

    • Examples:

      • SMS messaging on cellular networks

      • Apple iMessage

      • RCS messaging on Android devices

  3. Email: Method of exchanging digital messages between computers over a network.

    • Examples:

      • Gmail by Google

      • Microsoft Outlook

      • ProtonMail encrypted email service

  4. File Sharing: Distributing or providing access to digital media.

    • Examples:

      • Dropbox cloud file sharing

      • Google Drive collaborative documents

      • Microsoft OneDrive personal and business file sharing

  5. VoIP (Voice over Internet Protocol): Technology for delivering voice communications over the internet.

    • Examples:

      • Skype voice calls

      • Zoom VoIP capabilities

      • Cisco IP phones in business environments

  6. Online Messaging: Platform-based communication systems.

    • Examples:

      • Facebook Messenger

      • Slack workplace messaging

      • Telegram encrypted messaging

  7. Hosting: Services that store websites, applications, or data making them accessible via the internet.

    • Examples:

      • Bluehost web hosting

      • AWS EC2 cloud hosting

      • GitHub Pages for project websites

  8. Video Conferencing: Real-time video communication between multiple users.

    • Examples:

      • Zoom video meetings

      • Microsoft Teams video conferencing

      • Google Meet collaborative video calls


3.4E The World Wide Web

  1. World Wide Web: An information system where documents and resources are identified by URLs, interlinked by hypertext links, and accessible via the internet.

    • Examples:

      • Collection of all websites accessible through browsers

      • Network of interlinked web pages

      • System of HTML documents accessible over HTTP/HTTPS

  2. URL (Uniform Resource Locator): Web address specifying the location of a resource on the internet.

  3. HTTP (Hypertext Transfer Protocol)

    1. Definition: HTTP is an application layer protocol that forms the foundation of data communication on the World Wide Web. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands.

    2. Key Characteristics

      1. Stateless Protocol: Each request from a client to server is treated as a completely new request with no memory of previous interactions.

      2. Request-Response Model: Communication occurs through a client making a request to a server, which then provides a response.

      3. Plain Text Format: HTTP messages are transmitted in human-readable format (though they can contain binary data).

      4. Connectionless: By default, HTTP establishes a new connection for each request and closes it once the response is delivered.

      5. Media Independent: Can transfer any type of data as long as both client and server understand how to process the content type.

    3. Core Components

      1. HTTP Methods/Verbs:

        • GET: Requests data from a specified resource

        • POST: Submits data to be processed to a specified resource

        • PUT: Updates a specified resource with new data

        • DELETE: Removes the specified resource

        • HEAD: Similar to GET but only requests headers (not the body)

        • OPTIONS: Returns supported HTTP methods for a URL

        • PATCH: Applies partial modifications to a resource

      2. HTTP Headers: Provide additional information about the request or response

        • Request Headers: User-Agent, Accept, Cookie, Authorization

        • Response Headers: Content-Type, Content-Length, Server, Set-Cookie

        • General Headers: Date, Connection, Cache-Control

      3. HTTP Status Codes:

        • 1xx (Informational): Request received, continuing process

        • 2xx (Success): Request successfully received, understood, and accepted

          • 200 OK: Standard success response

          • 201 Created: Resource successfully created

        • 3xx (Redirection): Further action needed to complete the request

          • 301 Moved Permanently: Resource has been permanently moved

          • 302 Found: Resource temporarily moved

        • 4xx (Client Error): Request contains bad syntax or cannot be fulfilled

          • 404 Not Found: Resource does not exist

          • 403 Forbidden: Server understood but refuses to authorize

        • 5xx (Server Error): Server failed to fulfill a valid request

          • 500 Internal Server Error: Generic server error

          • 503 Service Unavailable: Server temporarily unavailable

  4. Browser: Software application for accessing information on the World Wide Web.

    • Examples:

      • Google Chrome

      • Mozilla Firefox

      • Apple Safari

  5. World Wide Web Consortium (W3C): International community that develops open standards for the web.

    • Examples:

      • HTML5 standard development

      • CSS specification maintenance

      • Web accessibility guidelines


3.4F Evolution of the Internet and the Web

Innovators and Innovations in Early Development:

  • Examples:

    • Tim Berners-Lee's invention of the World Wide Web at CERN in 1989

    • ARPANET as the precursor to the internet, connecting first nodes in 1969

    • Vint Cerf and Bob Kahn developing TCP/IP protocols in the 1970s


Web 1.0 (Early Web): The first iteration of the web, characterized by static websites with limited interactivity.

  • Characteristics:

    • Static, read-only content

    • Limited user interaction

    • One-way communication from creators to users

    • Mostly text-based with simple designs

  • Examples:

    • Early personal homepages on GeoCities

    • Corporate "brochure" websites with company information

    • Yahoo! Directory and early search engines like AltaVista


Web 2.0 (Social Web): The second generation of the web, characterized by user participation, interactivity, and collaboration.

  • Characteristics:

    • User-generated content

    • Interactive applications

    • Social networking

    • Rich user interfaces

    • Cloud-based applications

    • APIs and mashups

  • Examples:

    • YouTube allowing anyone to create and share videos

    • Wikipedia's collaborative knowledge creation model

    • WordPress and blogging platforms enabling personal publishing

    • Facebook and Twitter's social networking capabilities

    • Google Docs enabling real-time collaborative document editing


Web 3.0 (Semantic/Decentralized Web): The emerging third generation of the web, focusing on machine-readable information, decentralization, and user data ownership.

  • Characteristics:

    • Semantic data and artificial intelligence

    • Decentralized applications (dApps)

    • Blockchain technology and smart contracts

    • User data control and ownership

    • 3D visualization and immersive experiences

    • Trustless transactions without intermediaries

  • Examples:

    • Ethereum platform for decentralized applications

    • NFT (Non-Fungible Token) marketplaces like OpenSea

    • Decentralized finance (DeFi) applications like Uniswap

    • Brave browser focusing on privacy and user control

    • Decentralized storage solutions like Filecoin and IPFS

    • Self-sovereign identity systems like Sovrin


Rise of Online Social Media Platforms: The emergence of websites and applications that enable users to create and share content or participate in social networking.

  • Examples:

    • Facebook connecting billions of users worldwide

    • Twitter's microblogging platform for real-time updates

    • Instagram's photo and video sharing community

    • TikTok's short-form video platform driving cultural trends

    • LinkedIn's professional networking ecosystem


Internet of Things (IoT): Network of physical objects embedded with sensors, software, and connectivity.

  • Examples:

    • Smart home devices like Nest thermostats and Ring doorbells

    • Industrial IoT sensors monitoring machinery performance

    • Wearable fitness trackers uploading health data to the cloud

    • Smart city infrastructure including connected traffic systems

    • Agricultural IoT solutions for automated farming


Ubiquitous Networking: Computing concept where connectivity is available anywhere, anytime.

  • Examples:

    • Seamless transition between Wi-Fi and cellular networks

    • Public Wi-Fi hotspots in urban areas

    • Smart cities with comprehensive network coverage

    • 5G networks enabling new applications through higher bandwidth

    • Edge computing bringing processing closer to data sources


Mobile Internet Revolution: The shift from desktop to mobile internet access.

  • Examples:

    • Smartphone app ecosystems (iOS App Store, Google Play)

    • Mobile-first design approach for websites

    • Location-based services using GPS

    • Mobile payment systems like Apple Pay and Google Wallet

    • Progressive Web Apps bridging mobile and web experiencese


3.4G Internet Dilemmas

Privacy, Security, and Identity

  1. Privacy Concerns: Issues related to the collection, use, and sharing of personal information online.

    • Examples:

      • Google's collection of user data for targeted advertising

      • Facebook's tracking of user activity across the web

      • Smart speakers recording conversations in homes

  2. Anonymity and Surveillance: The ability to remain unidentified online versus monitoring of online activities.

    • Examples:

      • Tor browser enabling anonymous browsing

      • Government surveillance programs monitoring internet traffic

      • Employer monitoring of workplace internet usage

  3. Right to be Forgotten: Legal concept that individuals have the right to request deletion of their personal information.

    • Examples:

      • EU GDPR right to erasure provisions

      • Google's process for removing outdated search results

      • Facebook account deletion options

  4. Spyware: Malicious software that gathers information about users without their knowledge.

    • Examples:

      • Keyloggers recording keystrokes to steal passwords

      • Tracking cookies monitoring browsing habits

      • Stalkerware apps monitoring smartphone activity

  5. Identity Theft: Criminal activity where someone impersonates another person, typically for financial gain.

    • Examples:

      • Phishing emails attempting to steal login credentials

      • Data breaches exposing personal information

      • SIM swapping attacks to take over phone numbers


Cybercrime and Malicious Activities

  1. Cybercrime: Criminal activities carried out using computers or the internet.

    • Examples:

      • Credit card fraud through compromised websites

      • Cryptocurrency theft from digital wallets

      • Online scams targeting vulnerable users

  2. Hacking: Unauthorized access to computer systems or networks.

    • Examples:

      • Corporate data breaches exposing customer information

      • Account hacking to steal virtual goods in online games

      • Website defacement for political purposes

  3. Computer Viruses: Malicious software that can replicate itself and spread to other computers.

    • Examples:

      • Trojan horse programs disguised as legitimate software

      • Worms spreading through network vulnerabilities

      • Polymorphic viruses that change their code to avoid detection

  4. Spam: Unsolicited messages sent in bulk, typically for commercial purposes.

    • Examples:

      • Unwanted marketing emails

      • Comment spam on blogs and forums

      • Messaging app spam promoting scams

  5. Social Engineering: Psychological manipulation to trick users into revealing confidential information.

    • Examples:

      • Phishing emails impersonating trusted organizations

      • Pretexting calls where scammers pose as authority figures

      • Baiting attacks offering free downloads containing malware

  6. Ransomware: Malware that encrypts the victim's files and demands payment for decryption.

    • Examples:

      • WannaCry ransomware attack affecting organizations worldwide

      • REvil ransomware targeting businesses for large ransoms

      • Locky ransomware distributed through malicious email attachments

  7. Denial of Service (DoS): Attack aimed at making a system unavailable by overwhelming it with traffic.

    • Examples:

      • Distributed Denial of Service (DDoS) attacks on banking websites

      • Botnets of compromised IoT devices launching attacks

      • Application-layer DoS attacks targeting specific web services

  8. Dark Web: Content that exists on darknets, overlay networks that use the internet but require specific software to access.

    • Examples:

      • Tor network hosting hidden services

      • I2P anonymous network

      • Freenet peer-to-peer platform for censorship-resistant communication

  9. Trolling: Deliberate provocative or offensive online behavior intended to cause conflict.

    • Examples:

      • Comment section harassment on YouTube videos

      • Coordinated harassment campaigns on Twitter

      • Inflammatory posts in online communities



3.4 Networks & the Internet - Key Terms and Their Characteristics


Core Concepts

Network

Characteristics:

  • Connects multiple devices together

  • Enables resource sharing between connected devices

  • Follows standardized protocols for communication

  • Can be configured in various topologies (star, mesh, bus, ring)

  • Ranges from small local connections to global systems

  • Requires addressing system to identify devices

  • May be physical (wired) or wireless


Internet

Characteristics:

  • Global system of interconnected networks

  • Decentralized with no single controlling entity

  • Uses TCP/IP protocol suite

  • Employs packet-switching technology

  • Hardware and software agnostic (works across platforms)

  • Constantly evolving infrastructure

  • Resilient through redundant connection paths


3.4A Types of Computing Networks

Wired Network

Characteristics:

  • Uses physical cables (copper, fiber optic)

  • Generally more stable connections than wireless

  • Higher potential bandwidth capacity

  • Limited by physical cable length

  • Requires physical infrastructure installation

  • Less susceptible to interference

  • More difficult to reconfigure than wireless


Wireless Network

Characteristics:

  • Uses radio waves or other electromagnetic signals

  • Provides mobility and flexibility

  • No physical connection constraints

  • Vulnerable to signal interference

  • Range limited by transmitter power and obstacles

  • Typically lower bandwidth than wired equivalents

  • Easier to extend to new areas


Cloud Network

Characteristics:

  • Resources accessed over the internet

  • On-demand service model

  • Shared resource pools

  • Rapid elasticity (easily scaled up or down)

  • Measured service (pay for what you use)

  • Location independence

  • Managed by third-party providers


Personal Area Network (PAN)

Characteristics:

  • Very limited range (typically <10 meters)

  • Connects personal devices

  • Low power consumption

  • Often uses Bluetooth or NFC technology

  • Minimal security infrastructure

  • Ad-hoc connections common

  • Limited number of connected devices


Local Area Network (LAN)

Characteristics:

  • Limited to a single building or campus

  • High data transfer rates

  • Low latency connections

  • Typically managed by a single organization

  • Often uses Ethernet or Wi-Fi technology

  • Private addressing scheme

  • Shared local resources (printers, servers)


Metropolitan Area Network (MAN)

Characteristics:

  • Spans a city or large campus

  • Connects multiple LANs

  • Medium to high data transfer rates

  • Often uses fiber optic backbones

  • May be owned by a single entity or consortium

  • Provides regional connectivity

  • Higher latency than LANs but lower than WANs


Wide Area Network (WAN)

Characteristics:

  • Covers broad geographical areas

  • Connects multiple LANs/MANs

  • Often uses leased telecommunication lines

  • Lower data rates compared to LANs

  • Higher latency due to distance

  • More complex routing requirements

  • May cross country or continental boundaries


Client-Server Network

Characteristics:

  • Centralized resource management

  • Clear differentiation of roles

  • Scalable for multiple clients

  • Centralized security administration

  • Easier backup and recovery processes

  • Potential single point of failure

  • Specialized hardware for server components


Peer-to-Peer (P2P) Network

Characteristics:

  • Decentralized architecture

  • Each node can be both client and server

  • Direct device-to-device communication

  • Distributed resource sharing

  • No central point of failure

  • Difficult to secure comprehensively

  • Scales horizontally through additional peers


3.4B Components of Computing Networks

Client

Characteristics:

  • End-user device requesting services

  • Provides user interface

  • Limited local processing of network data

  • Initiates communication with servers

  • Displays or processes received information

  • Varies widely in computing power

  • Includes desktops, laptops, smartphones, IoT devices


Server

Characteristics:

  • Provides resources to clients

  • Specialized for specific services

  • Higher processing power than typical clients

  • Often runs continuously

  • Optimized for simultaneous connections

  • Advanced storage capabilities

  • Specialized operating systems


Modem

Characteristics:

  • Converts digital to analog signals and vice versa

  • Connects to external communication lines

  • Contains modulation/demodulation circuitry

  • Interface between different network types

  • Typically connects to ISP networks

  • Limited internal routing capabilities

  • Handles signal encoding/decoding


Router

Characteristics:

  • Forwards data packets between networks

  • Determines optimal paths for data

  • Contains routing tables

  • Operates at network layer of OSI model

  • Provides network address translation (NAT)

  • Often includes basic firewall functionality

  • Can prioritize certain types of traffic


Switch

Characteristics:

  • Connects multiple devices on a local network

  • Directs traffic only to intended recipients

  • Operates at data link layer of OSI model

  • Uses MAC addresses for directing traffic

  • Creates virtual circuits for communication

  • More intelligent than hubs

  • Reduces network congestion


Hub

Characteristics:

  • Basic network connection device

  • Broadcasts data to all connected devices

  • No traffic management capabilities

  • Operates at physical layer of OSI model

  • Simpler and less intelligent than switches

  • Creates single collision domain

  • Becoming obsolete in modern networks


Channels

Characteristics:

  • Pathways for data transmission

  • Can be physical or logical

  • Have defined bandwidth capacity

  • May use frequency division or time division

  • Subject to noise and interference

  • Have measurable signal-to-noise ratios

  • Can be shared or dedicated


Network Interface

Characteristics:

  • Physical connection point to the network

  • Contains unique MAC address

  • Handles low-level protocol operations

  • Converts computer data to network signals

  • Available in various speeds and standards

  • Can be integrated or expansion cards

  • Includes both hardware and driver software


3.4C Characteristics of Computing Networks

Interoperability

Characteristics:

  • Allows different systems to work together

  • Based on common standards and protocols

  • Vendor-independent functionality

  • Enables heterogeneous network environments

  • Reduces proprietary lock-in

  • Supports backward compatibility

  • Facilitates network expansion


Domain Names

Characteristics:

  • Hierarchical naming structure

  • Human-readable addresses

  • Mapped to IP addresses through DNS

  • Organized into top-level domains (.com, .org, etc.)

  • Governed by ICANN globally

  • Can be registered through accredited registrars

  • Subject to trademark and legal considerations


IP Addresses

Characteristics:

  • Numerical identifiers for network devices

  • Hierarchical structure for routing

  • IPv4 (32-bit) or IPv6 (128-bit) formats

  • Can be static or dynamically assigned

  • Divided into network and host portions

  • Organized by regional internet registries

  • Subject to subnet masking for network division


Identification

Characteristics:

  • Process of claiming an identity

  • Uses credentials (usernames, IDs, etc.)

  • First step in access control

  • Can be anonymous or authenticated

  • May use biometric factors

  • Increasingly linked across services

  • Subject to identity management systems


Authentication

Characteristics:

  • Verifies claimed identity

  • Uses various factors (knowledge, possession, inherence)

  • Can be single or multi-factor

  • Provides access control foundation

  • Ranges from simple to complex methods

  • Increasingly biometric-based

  • Critical security component


Encryption

Characteristics:

  • Transforms data into protected format

  • Uses mathematical algorithms

  • Requires keys for encryption/decryption

  • Can be symmetric or asymmetric

  • Variable strength based on key length

  • Computationally intensive

  • Fundamental to secure communications


Firewall

Characteristics:

  • Monitors and filters network traffic

  • Enforces access control policies

  • Can inspect at different OSI layers

  • Maintains connection state information

  • Available as hardware or software

  • Often includes logging capabilities

  • First line of network defense


Proxy Server

Characteristics:

  • Acts as intermediary for client requests

  • Can cache frequently requested content

  • Provides anonymity for clients

  • Filters content based on policies

  • Can improve performance

  • Logs client activities

  • Centralizes access control


Virtual Private Network (VPN)

Characteristics:

  • Creates encrypted tunnel over public networks

  • Extends private network across public infrastructure

  • Provides authenticated remote access

  • Masks user's original IP address

  • Circumvents geographical restrictions

  • Various protocols (OpenVPN, IPsec, etc.)

  • Increasingly used for privacy protection


Security Layers

Characteristics:

  • Multiple defensive mechanisms working together

  • Provides redundancy in security controls

  • Different controls address different threats

  • Implements defense-in-depth strategy

  • Includes technical and procedural elements

  • Adapts to changing threat landscape

  • More robust than single security measures


Bandwidth

Characteristics:

  • Maximum data transfer capacity

  • Measured in bits per second

  • Limited by physical medium

  • Shared among network users

  • Can be symmetric or asymmetric

  • Subject to contention during high usage

  • Critical factor in network performance


Data Compression

Characteristics:

  • Reduces data size for transmission

  • Can be lossless or lossy

  • Various algorithms for different data types

  • Trade-off between size and quality/precision

  • Improves effective bandwidth utilization

  • Reduces storage requirements

  • Computation overhead in encoding/decoding


Net Neutrality

Characteristics:

  • Principle of equal treatment of all internet traffic

  • Prevents throttling or prioritization based on content

  • Subject to varying regulatory approaches

  • Impacts business models of ISPs

  • Affects innovation and market competition

  • Political and economic implications

  • Controversial policy area globally


Internet Backbone

Characteristics:

  • Principal high-capacity data routes

  • Uses fiber optic technology

  • Connects major network providers

  • Transcontinental and transoceanic connections

  • Managed by tier 1 network providers

  • Multiple redundant pathways

  • High bandwidth capacity


3.4D Computing Network Providers and Services

Internet Service Provider (ISP)

Characteristics:

  • Provides internet connectivity to customers

  • Various connection technologies (DSL, cable, fiber)

  • Different service tiers based on speed

  • Often bundled with other services

  • Subject to telecommunications regulations

  • Regional or national coverage areas

  • Variable quality of service guarantees


Chat Services

Characteristics:

  • Real-time text-based communication

  • Often includes multimedia sharing

  • Group or one-on-one conversations

  • Persistent or ephemeral message history

  • Increasingly encrypted

  • Often integrated with other platforms

  • Synchronous communication model


Texting Services

Characteristics:

  • Short message communication

  • Originally limited to 160 characters (SMS)

  • Cell network or internet-based transmission

  • Often asynchronous usage pattern

  • Delivery confirmation capabilities

  • Increasingly supports rich media

  • Ubiquitous across mobile platforms


Email Services

Characteristics:

  • Store-and-forward message system

  • Headers and body structure

  • Support for attachments

  • Address-based routing

  • Asynchronous communication

  • Various protocols (SMTP, IMAP, POP3)

  • Vulnerable to spam and phishing


File Sharing Services

Characteristics:

  • Enables distribution of digital content

  • Various permission models

  • Centralized or distributed architectures

  • Version control capabilities

  • Synchronization across devices

  • Size limitations vary by service

  • Integration with productivity tools


VoIP Services

Characteristics:

  • Voice transmission over IP networks

  • Lower cost than traditional telephony

  • Variable quality depending on network conditions

  • Requires minimal bandwidth

  • Increasingly integrated with video

  • Subject to latency concerns

  • Compatible with traditional phone systems


Online Messaging Services

Characteristics:

  • Platform-specific communication tools

  • Often includes presence indicators

  • Increasingly multimedia-capable

  • Persistent conversation history

  • Cross-device synchronization

  • Integration with other platform services

  • Both synchronous and asynchronous use


Hosting Services

Characteristics:

  • Provides infrastructure for websites/applications

  • Various service levels (shared, dedicated, cloud)

  • Managed or unmanaged options

  • Includes storage, bandwidth, computing resources

  • Different pricing models

  • Technical support offerings

  • Range of performance guarantees


Video Conferencing Services

Characteristics:

  • Real-time video/audio communication

  • Multiple participant capability

  • Screen sharing and collaboration tools

  • Recording capabilities

  • Bandwidth-intensive

  • Various quality options based on connection

  • Increasingly AI-enhanced features


3.4E The World Wide Web

World Wide Web

Characteristics:

  • Information system accessible via internet

  • Interconnected hypertext documents

  • Accessed through browsers

  • Built on HTTP protocol

  • Contains static and dynamic content

  • Organized through URL addressing

  • Constantly evolving content and standards


URL (Uniform Resource Locator)

Characteristics:

  • Standard format for web resource addresses

  • Contains protocol, domain, path components

  • Hierarchical structure

  • Can include query parameters

  • Case-sensitive paths

  • Supports internationalized domains

  • Fundamental to web navigation


HTTP (Hypertext Transfer Protocol)

Characteristics:

  • Application layer protocol

  • Request-response model

  • Stateless by design

  • Plain text format

  • Multiple request methods

  • Status code responses

  • Extensible header system


Browser

Characteristics:

  • Software for accessing web content

  • Renders HTML, CSS, JavaScript

  • Manages cookies and local storage

  • Extension/plugin capabilities

  • Security sandboxing for content

  • Increasingly standards-compliant

  • Varied rendering engines


World Wide Web Consortium (W3C)

Characteristics:

  • International standards organization

  • Develops web standards

  • Open membership model

  • Consensus-based process

  • Focus on accessibility

  • Technology-neutral approach

  • Promotes interoperability


3.4F Evolution of the Internet and the Web

Web 1.0

Characteristics:

  • Static content

  • Read-only experience

  • Limited user interaction

  • Directory-based navigation

  • Simple HTML design

  • Clear separation between creators and users

  • Limited multimedia capabilities


Web 2.0

Characteristics:

  • User-generated content

  • Social interaction emphasis

  • Dynamic content

  • Rich user interfaces

  • API-based service integration

  • Cloud-based applications

  • Collaborative content creation


Web 3.0

Characteristics:

  • Semantic data structures

  • Decentralized architecture

  • Blockchain integration

  • User data ownership

  • AI-driven experiences

  • Interoperable platforms

  • Trustless transactions


Social Media Platforms

Characteristics:

  • User profile-centered design

  • Content sharing capabilities

  • Network/connection visualization

  • Engagement metrics

  • Algorithmic content curation

  • Advertising-based business models

  • Mobile-first experiences


Internet of Things (IoT)

Characteristics:

  • Embedded computing devices

  • Network connectivity for physical objects

  • Sensor integration

  • Automated data collection

  • Often limited user interfaces

  • Variable security implementations

  • Machine-to-machine communication


Ubiquitous Networking

Characteristics:

  • Anytime, anywhere connectivity

  • Seamless transition between networks

  • Location-aware services

  • Always-on connections

  • Distributed computing resources

  • Edge processing capabilities

  • Background synchronization


3.4G Internet Dilemmas

Privacy Concerns

Characteristics:

  • Tension between service personalization and data collection

  • Question of informed consent

  • Metadata collection issues

  • Cross-platform tracking

  • Data retention policies

  • Increasingly regulated area

  • Cultural differences in expectations


Anonymity and Surveillance

Characteristics:

  • Technology enabling anonymous activity

  • State and corporate monitoring capabilities

  • Balance between security and privacy

  • Chilling effect on expression

  • Technological arms race

  • Legal framework variations globally

  • Metadata analysis capabilities


Right to be Forgotten

Characteristics:

  • Tension with historical record

  • Implementation challenges

  • Jurisdictional limitations

  • Balance with public interest

  • Technical complexity of complete removal

  • Evolving legal framework

  • Question of who decides what should be forgotten


Spyware

Characteristics:

  • Covert operation

  • Data exfiltration capabilities

  • Various infection vectors

  • Range from marketing tools to state-sponsored

  • Difficult to detect

  • Often bundled with legitimate software

  • Privacy and security implications


Identity Theft

Characteristics:

  • Misuse of personal information

  • Financial motivation typical

  • Long-term impact on victims

  • Increasingly sophisticated methods

  • Exploits verification weaknesses

  • Preventive measures struggle to keep pace

  • Cross-jurisdictional enforcement challenges


Cybercrime

Characteristics:

  • Digital means or targets

  • Evolution of traditional crimes to digital realm

  • Jurisdictional complexity

  • Attribution challenges

  • Increasingly organized criminal enterprises

  • Technical and non-technical elements

  • Rapid evolution of techniques


Hacking

Characteristics:

  • Unauthorized system access

  • Various motivations (financial, political, personal)

  • Range of technical sophistication

  • Exploits known and unknown vulnerabilities

  • Both automated and manual techniques

  • Defensive and offensive variations

  • Legal and illegal applications


Computer Viruses

Characteristics:

  • Self-replicating code

  • Various propagation methods

  • Payload execution capabilities

  • Evolution to evade detection

  • Range from nuisance to destructive

  • Increasingly targeted

  • Defense requires multiple approaches


Spam

Characteristics:

  • Unsolicited bulk messages

  • Commercial motivation typically

  • Low success rate compensated by volume

  • Various filtering techniques to combat

  • Adapts to circumvent filters

  • Economic model relies on minimal response

  • Present across multiple communication channels


Social Engineering

Characteristics:

  • Psychological manipulation rather than technical exploitation

  • Exploits human trust and behavior patterns

  • Often precursor to technical attacks

  • Difficult to defend through technical means alone

  • Various techniques (phishing, pretexting, baiting)

  • Highly effective despite awareness

  • Targets organizational weaknesses


Ransomware

Characteristics:

  • Encrypts victim data

  • Demands payment for decryption

  • Often uses cryptocurrency for payment

  • Increasingly targeted at high-value victims

  • Double extortion techniques emerging

  • Significant financial and operational impact

  • Growing as a criminal business model


Denial of Service (DoS)

Characteristics:

  • Overwhelms system resources

  • Distributed attack sources (DDoS)

  • Various attack vectors

  • Amplification techniques

  • Difficult to distinguish from legitimate traffic

  • Often used as distraction for other attacks

  • Mitigation requires specialized techniques


Dark Web

Characteristics:

  • Requires specialized software to access

  • Not indexed by standard search engines

  • Enhanced anonymity for users

  • Mix of legitimate and illegal activities

  • Decentralized structure

  • Fluctuating accessibility

  • Alternative to censored communications


Trolling

Characteristics:

  • Intentionally provocative behavior

  • Aims to cause emotional response

  • Ranges from mild to severe harassment

  • Often exploits platform features

  • Community norm violations

  • Response often amplifies impact

  • Challenging content moderation problem


IB DP Digital Society - Section 3.4 Networks & the Internet Practice Exam Questions

Define/State Questions

  1. Define the term "network" as used in digital society.

  2. State three different types of computing networks based on geographic scope.

  3. Define the term "internet backbone" and state its importance in network infrastructure.

  4. State four components typically found in a computing network.

  5. Define "virtual private network (VPN)" and state one primary purpose for its use.

  6. State three differences between the internet and the World Wide Web.

  7. Define "bandwidth" as it relates to computing networks.

  8. State two characteristics of peer-to-peer (P2P) networks.

Identify Questions

  1. Identify three types of security measures used to protect computing networks.

  2. Identify four network services commonly provided by Internet Service Providers.

  3. Identify two key differences between HTTP and HTTPS protocols.

  4. Identify three components of a URL (Uniform Resource Locator).

  5. Identify four internet dilemmas related to privacy and security.

  6. Identify three characteristics that distinguish Web 2.0 from Web 1.0.

  7. Identify two roles of the World Wide Web Consortium (W3C).

Outline Questions

  1. Outline three key differences between wired and wireless networks.

  2. Outline the relationship between domain names and IP addresses in computing networks.

  3. Outline two ways that data compression affects network performance.

  4. Outline how client-server architecture functions in a typical network environment.

  5. Outline the concept of net neutrality and its significance for internet users.

Describe Questions

  1. Describe three security challenges associated with the Internet of Things (IoT).

  2. Describe how encryption contributes to network security.

  3. Describe two ways that firewalls protect networks from unauthorized access.

  4. Describe the role of protocols in ensuring interoperability between different network systems.

  5. Describe how social engineering differs from technical hacking as a cybersecurity threat.

Explain Questions

  1. Explain how distributed denial of service (DDoS) attacks impact network availability.

  2. Explain two ways that Web 3.0 differs from previous iterations of the World Wide Web.

  3. Explain how routers and switches perform different functions in a computer network.

  4. Explain the significance of the transition from IPv4 to IPv6 addressing.

  5. Explain how ransomware attacks have evolved as a cybersecurity threat.

Compare Questions

  1. Compare local area networks (LANs) and wide area networks (WANs) in terms of scale and typical applications.

  2. Compare the client-server model with the peer-to-peer model of network architecture.

  3. Compare Web 1.0 and Web 2.0 in terms of user participation and content creation.

  4. Compare wired and wireless networks in terms of security vulnerabilities.

  5. Compare HTTP and HTTPS in terms of data security and user privacy.

Suggest Questions

  1. Suggest two ways that computing networks might evolve in the next decade.

  2. Suggest three strategies that individuals can implement to protect their privacy online.

  3. Suggest two potential impacts of widespread IoT adoption on network infrastructure requirements.

  4. Suggest how the concept of the "right to be forgotten" presents both opportunities and challenges for digital society.

  5. Suggest two ways that network providers could address issues of digital inequality in access to high-speed internet.

Discuss Questions

  1. Discuss how the evolution from Web 1.0 to Web 3.0 has changed user engagement with online content.

  2. Discuss the relationship between increasing network connectivity and potential cybersecurity vulnerabilities.

  3. Discuss how issues of anonymity and accountability create tensions in online environments.

  4. Discuss the role of standards and protocols in enabling global internet communication.

  5. Discuss how the dark web represents both legitimate privacy concerns and potential for criminal activity.



network study in DIGITAL SOCIETY
Network study in DIGITAL SOCIETY


Comments


  • Instagram
  • Youtube
  • X

2024 IBDP DIGITAL SOCIETY | LUKE WATSON TEACH

bottom of page