3.4 Networks & the Internet: Digital Society Content Deep Dive
- lukewatsonteach
- Apr 4
- 21 min read
Core Concept
Network: An interconnected system of computers and other devices that can communicate and share resources with each other.
Examples:
Office computer networks connecting workstations, printers, and servers
Home Wi-Fi networks connecting smartphones, laptops, and smart home devices
University campus networks linking academic buildings, libraries, and student centers
Internet: A global system of interconnected computer networks that uses standardized communication protocols to link devices worldwide.
Examples:
The global infrastructure that enables services like email, web browsing, and video streaming
Undersea fiber optic cables connecting continents
Satellite internet systems providing connectivity to remote areas
3.4A Types of Computing Networks
Based on Connectivity
Wired Network: Networks that use physical cables to transmit data between devices.
Examples:
Ethernet office networks using CAT6 cables
Fiber optic networks for high-speed internet backbones
USB connections between devices
Wireless Network: Networks that use radio waves or other electromagnetic signals to transmit data without physical connections.
Examples:
Wi-Fi networks in homes and businesses
Bluetooth connections between smartphones and headphones
5G cellular networks for mobile devices
Cloud Network: Computing resources accessed over the internet rather than from local infrastructure.
Examples:
Microsoft Azure cloud computing services
Amazon Web Services (AWS) global infrastructure
Google Cloud Platform's distributed resources
Based on Geographic Scope
Personal Area Network (PAN): Network for connecting devices within an individual person's workspace.
Examples:
Bluetooth connection between a laptop and wireless headphones
Apple Watch connected to an iPhone
Wireless keyboard and mouse connected to a computer
Local Area Network (LAN): Network connecting devices within a limited area, such as a home, school, or office building.
Examples:
Office network connecting computers to a shared printer
School computer lab network
Home Wi-Fi network connecting multiple devices
Metropolitan Area Network (MAN): Network spanning a city or large campus.
Examples:
City-wide public Wi-Fi networks
University campus networks connecting multiple buildings
Traffic management systems connecting traffic lights across a city
Wide Area Network (WAN): Network covering a broad geographical area, often connecting multiple LANs.
Examples:
Corporate networks connecting offices in different countries
Banking networks linking branches nationwide
Government agency networks spanning multiple locations
Based on Architecture
Client-Server Network: Network where centralized servers provide resources to client devices.
Examples:
Email systems with centralized mail servers
Online gaming platforms with dedicated game servers
Corporate file sharing systems with central file servers
Peer-to-Peer (P2P) Network: Network where devices connect directly to each other without requiring a central server.
Examples:
BitTorrent file sharing
Blockchain networks like Bitcoin
Skype's direct call routing between users
3.4B Components of Computing Networks
Client: End-user device that requests and uses resources from the network.
Examples:
Laptops running web browsers
Smartphones accessing email
Smart TVs streaming content
Server: Specialized computer that provides resources, services, or data to clients.
Examples:
Web servers hosting websites
Database servers storing company records
Mail servers managing email communication
Modem: Device that converts digital signals from computers to signals suitable for transmission over communication lines, and vice versa.
Examples:
Cable modems connecting homes to ISP networks
DSL modems for telephone line internet access
Fiber optic modems for high-speed connections
Router: Device that forwards data packets between computer networks, determining the best path.
Examples:
Home Wi-Fi routers
Enterprise-grade Cisco routers
5G cellular routers for mobile connectivity
Switch: Device that connects multiple devices on a local network and directs traffic only to the intended recipient.
Examples:
Office network switches connecting workstations
Data center switches managing server connections
Home network switches expanding connectivity
Hub: Basic network device that connects multiple Ethernet devices, broadcasting data to all connected devices.
Examples:
Simple Ethernet hubs in legacy networks
USB hubs connecting multiple peripherals
KVM (Keyboard, Video, Mouse) hubs for controlling multiple computers
Channels: Pathways through which data is transmitted in a network.
Examples:
Wi-Fi channels on different frequencies
Fiber optic channels using different wavelengths of light
Multiple frequency channels in cellular networks
Network Interface: Hardware component that connects a device to a network.
Examples:
Network Interface Cards (NICs) in computers
Wi-Fi adapters in laptops
Ethernet ports on routers and switches
3.4C Characteristics of Computing Networks
Standards and Protocols
Interoperability: Ability of different systems, devices, and applications to connect and communicate seamlessly.
Examples:
USB standards allowing devices from different manufacturers to connect
Wi-Fi protocols enabling diverse devices to connect to wireless networks
Bluetooth standards for wireless device communication
Domain Names: Human-readable addresses that correspond to numerical IP addresses of servers on the internet.
Examples:
google.com (instead of 142.250.191.238)
microsoft.com (instead of 20.112.52.29)
wikipedia.org (instead of 91.198.174.192)
Addresses (IP): Numerical labels assigned to devices participating in a network, used to identify and locate devices.
Examples:
IPv4 addresses like 192.168.1.1
IPv6 addresses like 2001:0db8:85a3:0000:0000:8a2e:0370:7334
MAC addresses like 00:1A:2B:3C:4D:5E
Security
Identification: Process of claiming an identity within a system.
Examples:
Username entry in a login screen
Email address used to identify accounts
Employee ID numbers in corporate systems
Authentication: Process of verifying the claimed identity.
Examples:
Password verification
Biometric authentication (fingerprint, face recognition)
Two-factor authentication via SMS or authenticator apps
Encryption: Process of encoding information so only authorized parties can access it.
Examples:
HTTPS encryption for secure websites
WhatsApp end-to-end encryption for messages
BitLocker drive encryption for Windows computers
Firewall: Security system that monitors and controls incoming and outgoing network traffic.
Examples:
Windows Defender Firewall
Corporate hardware firewalls from Cisco or Palo Alto Networks
Application-specific firewalls like ModSecurity for web servers
Proxy Server: Server that acts as an intermediary between clients and other servers.
Examples:
Corporate proxy servers filtering web content
NGINX reverse proxy for load balancing
Web proxies for anonymous browsing
Virtual Private Network (VPN): Technology that creates a secure, encrypted connection over a less secure network.
Examples:
NordVPN and ExpressVPN for personal use
Cisco AnyConnect for corporate remote access
OpenVPN for self-hosted solutions
Security Layers: Multiple levels of security measures working together to protect systems.
Examples:
Defense in depth strategies combining firewalls, antivirus, and access controls
OSI security model implementation
Zero Trust security architecture in modern enterprises
Capacity
Bandwidth: Maximum rate of data transfer across a network connection.
Examples:
1 Gbps fiber optic home internet connection
100 Mbps business Ethernet connection
5G cellular networks with up to 10 Gbps theoretical bandwidth
Data Compression: Techniques to reduce the size of data being transmitted or stored.
Examples:
JPEG compression for images
H.265/HEVC compression for video streaming
ZIP/RAR compression for file transfers
Net Neutrality: Principle that all internet traffic should be treated equally by ISPs.
Examples:
Regulations preventing ISPs from blocking competing services
Policies ensuring equal access to all legal websites
Rules against prioritizing certain types of content
Infrastructure
Internet Backbone: Principal data routes between large, strategically interconnected networks and core routers on the internet.
Examples:
Transatlantic fiber optic cables connecting continents
Level 3 Communications global network infrastructure
Internet Exchange Points (IXPs) where different networks connect
3.4D Computing Network Providers and Services
Providers
Internet Service Provider (ISP): Company that provides internet access to customers.
Examples:
Comcast/Xfinity in the United States
BT in the United Kingdom
Airtel in India
Services
Chat: Real-time text-based communication between users.
Examples:
WhatsApp chat functionality
Discord chat channels
Microsoft Teams chat
Texting: Sending short messages typically between mobile devices.
Examples:
SMS messaging on cellular networks
Apple iMessage
RCS messaging on Android devices
Email: Method of exchanging digital messages between computers over a network.
Examples:
Gmail by Google
Microsoft Outlook
ProtonMail encrypted email service
File Sharing: Distributing or providing access to digital media.
Examples:
Dropbox cloud file sharing
Google Drive collaborative documents
Microsoft OneDrive personal and business file sharing
VoIP (Voice over Internet Protocol): Technology for delivering voice communications over the internet.
Examples:
Skype voice calls
Zoom VoIP capabilities
Cisco IP phones in business environments
Online Messaging: Platform-based communication systems.
Examples:
Facebook Messenger
Slack workplace messaging
Telegram encrypted messaging
Hosting: Services that store websites, applications, or data making them accessible via the internet.
Examples:
Bluehost web hosting
AWS EC2 cloud hosting
GitHub Pages for project websites
Video Conferencing: Real-time video communication between multiple users.
Examples:
Zoom video meetings
Microsoft Teams video conferencing
Google Meet collaborative video calls
3.4E The World Wide Web
World Wide Web: An information system where documents and resources are identified by URLs, interlinked by hypertext links, and accessible via the internet.
Examples:
Collection of all websites accessible through browsers
Network of interlinked web pages
System of HTML documents accessible over HTTP/HTTPS
URL (Uniform Resource Locator): Web address specifying the location of a resource on the internet.
HTTP (Hypertext Transfer Protocol)
Definition: HTTP is an application layer protocol that forms the foundation of data communication on the World Wide Web. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands.
Key Characteristics
Stateless Protocol: Each request from a client to server is treated as a completely new request with no memory of previous interactions.
Request-Response Model: Communication occurs through a client making a request to a server, which then provides a response.
Plain Text Format: HTTP messages are transmitted in human-readable format (though they can contain binary data).
Connectionless: By default, HTTP establishes a new connection for each request and closes it once the response is delivered.
Media Independent: Can transfer any type of data as long as both client and server understand how to process the content type.
Core Components
HTTP Methods/Verbs:
GET: Requests data from a specified resource
POST: Submits data to be processed to a specified resource
PUT: Updates a specified resource with new data
DELETE: Removes the specified resource
HEAD: Similar to GET but only requests headers (not the body)
OPTIONS: Returns supported HTTP methods for a URL
PATCH: Applies partial modifications to a resource
HTTP Headers: Provide additional information about the request or response
Request Headers: User-Agent, Accept, Cookie, Authorization
Response Headers: Content-Type, Content-Length, Server, Set-Cookie
General Headers: Date, Connection, Cache-Control
HTTP Status Codes:
1xx (Informational): Request received, continuing process
2xx (Success): Request successfully received, understood, and accepted
200 OK: Standard success response
201 Created: Resource successfully created
3xx (Redirection): Further action needed to complete the request
301 Moved Permanently: Resource has been permanently moved
302 Found: Resource temporarily moved
4xx (Client Error): Request contains bad syntax or cannot be fulfilled
404 Not Found: Resource does not exist
403 Forbidden: Server understood but refuses to authorize
5xx (Server Error): Server failed to fulfill a valid request
500 Internal Server Error: Generic server error
503 Service Unavailable: Server temporarily unavailable
Browser: Software application for accessing information on the World Wide Web.
Examples:
Google Chrome
Mozilla Firefox
Apple Safari
World Wide Web Consortium (W3C): International community that develops open standards for the web.
Examples:
HTML5 standard development
CSS specification maintenance
Web accessibility guidelines
3.4F Evolution of the Internet and the Web
Innovators and Innovations in Early Development:
Examples:
Tim Berners-Lee's invention of the World Wide Web at CERN in 1989
ARPANET as the precursor to the internet, connecting first nodes in 1969
Vint Cerf and Bob Kahn developing TCP/IP protocols in the 1970s
Web 1.0 (Early Web): The first iteration of the web, characterized by static websites with limited interactivity.
Characteristics:
Static, read-only content
Limited user interaction
One-way communication from creators to users
Mostly text-based with simple designs
Examples:
Early personal homepages on GeoCities
Corporate "brochure" websites with company information
Yahoo! Directory and early search engines like AltaVista
Web 2.0 (Social Web): The second generation of the web, characterized by user participation, interactivity, and collaboration.
Characteristics:
User-generated content
Interactive applications
Social networking
Rich user interfaces
Cloud-based applications
APIs and mashups
Examples:
YouTube allowing anyone to create and share videos
Wikipedia's collaborative knowledge creation model
WordPress and blogging platforms enabling personal publishing
Facebook and Twitter's social networking capabilities
Google Docs enabling real-time collaborative document editing
Web 3.0 (Semantic/Decentralized Web): The emerging third generation of the web, focusing on machine-readable information, decentralization, and user data ownership.
Characteristics:
Semantic data and artificial intelligence
Decentralized applications (dApps)
Blockchain technology and smart contracts
User data control and ownership
3D visualization and immersive experiences
Trustless transactions without intermediaries
Examples:
Ethereum platform for decentralized applications
NFT (Non-Fungible Token) marketplaces like OpenSea
Decentralized finance (DeFi) applications like Uniswap
Brave browser focusing on privacy and user control
Decentralized storage solutions like Filecoin and IPFS
Self-sovereign identity systems like Sovrin
Rise of Online Social Media Platforms: The emergence of websites and applications that enable users to create and share content or participate in social networking.
Examples:
Facebook connecting billions of users worldwide
Twitter's microblogging platform for real-time updates
Instagram's photo and video sharing community
TikTok's short-form video platform driving cultural trends
LinkedIn's professional networking ecosystem
Internet of Things (IoT): Network of physical objects embedded with sensors, software, and connectivity.
Examples:
Smart home devices like Nest thermostats and Ring doorbells
Industrial IoT sensors monitoring machinery performance
Wearable fitness trackers uploading health data to the cloud
Smart city infrastructure including connected traffic systems
Agricultural IoT solutions for automated farming
Ubiquitous Networking: Computing concept where connectivity is available anywhere, anytime.
Examples:
Seamless transition between Wi-Fi and cellular networks
Public Wi-Fi hotspots in urban areas
Smart cities with comprehensive network coverage
5G networks enabling new applications through higher bandwidth
Edge computing bringing processing closer to data sources
Mobile Internet Revolution: The shift from desktop to mobile internet access.
Examples:
Smartphone app ecosystems (iOS App Store, Google Play)
Mobile-first design approach for websites
Location-based services using GPS
Mobile payment systems like Apple Pay and Google Wallet
Progressive Web Apps bridging mobile and web experiencese
3.4G Internet Dilemmas
Privacy, Security, and Identity
Privacy Concerns: Issues related to the collection, use, and sharing of personal information online.
Examples:
Google's collection of user data for targeted advertising
Facebook's tracking of user activity across the web
Smart speakers recording conversations in homes
Anonymity and Surveillance: The ability to remain unidentified online versus monitoring of online activities.
Examples:
Tor browser enabling anonymous browsing
Government surveillance programs monitoring internet traffic
Employer monitoring of workplace internet usage
Right to be Forgotten: Legal concept that individuals have the right to request deletion of their personal information.
Examples:
EU GDPR right to erasure provisions
Google's process for removing outdated search results
Facebook account deletion options
Spyware: Malicious software that gathers information about users without their knowledge.
Examples:
Keyloggers recording keystrokes to steal passwords
Tracking cookies monitoring browsing habits
Stalkerware apps monitoring smartphone activity
Identity Theft: Criminal activity where someone impersonates another person, typically for financial gain.
Examples:
Phishing emails attempting to steal login credentials
Data breaches exposing personal information
SIM swapping attacks to take over phone numbers
Cybercrime and Malicious Activities
Cybercrime: Criminal activities carried out using computers or the internet.
Examples:
Credit card fraud through compromised websites
Cryptocurrency theft from digital wallets
Online scams targeting vulnerable users
Hacking: Unauthorized access to computer systems or networks.
Examples:
Corporate data breaches exposing customer information
Account hacking to steal virtual goods in online games
Website defacement for political purposes
Computer Viruses: Malicious software that can replicate itself and spread to other computers.
Examples:
Trojan horse programs disguised as legitimate software
Worms spreading through network vulnerabilities
Polymorphic viruses that change their code to avoid detection
Spam: Unsolicited messages sent in bulk, typically for commercial purposes.
Examples:
Unwanted marketing emails
Comment spam on blogs and forums
Messaging app spam promoting scams
Social Engineering: Psychological manipulation to trick users into revealing confidential information.
Examples:
Phishing emails impersonating trusted organizations
Pretexting calls where scammers pose as authority figures
Baiting attacks offering free downloads containing malware
Ransomware: Malware that encrypts the victim's files and demands payment for decryption.
Examples:
WannaCry ransomware attack affecting organizations worldwide
REvil ransomware targeting businesses for large ransoms
Locky ransomware distributed through malicious email attachments
Denial of Service (DoS): Attack aimed at making a system unavailable by overwhelming it with traffic.
Examples:
Distributed Denial of Service (DDoS) attacks on banking websites
Botnets of compromised IoT devices launching attacks
Application-layer DoS attacks targeting specific web services
Dark Web: Content that exists on darknets, overlay networks that use the internet but require specific software to access.
Examples:
Tor network hosting hidden services
I2P anonymous network
Freenet peer-to-peer platform for censorship-resistant communication
Trolling: Deliberate provocative or offensive online behavior intended to cause conflict.
Examples:
Comment section harassment on YouTube videos
Coordinated harassment campaigns on Twitter
Inflammatory posts in online communities
3.4 Networks & the Internet - Key Terms and Their Characteristics
Core Concepts
Network
Characteristics:
Connects multiple devices together
Enables resource sharing between connected devices
Follows standardized protocols for communication
Can be configured in various topologies (star, mesh, bus, ring)
Ranges from small local connections to global systems
Requires addressing system to identify devices
May be physical (wired) or wireless
Internet
Characteristics:
Global system of interconnected networks
Decentralized with no single controlling entity
Uses TCP/IP protocol suite
Employs packet-switching technology
Hardware and software agnostic (works across platforms)
Constantly evolving infrastructure
Resilient through redundant connection paths
3.4A Types of Computing Networks
Wired Network
Characteristics:
Uses physical cables (copper, fiber optic)
Generally more stable connections than wireless
Higher potential bandwidth capacity
Limited by physical cable length
Requires physical infrastructure installation
Less susceptible to interference
More difficult to reconfigure than wireless
Wireless Network
Characteristics:
Uses radio waves or other electromagnetic signals
Provides mobility and flexibility
No physical connection constraints
Vulnerable to signal interference
Range limited by transmitter power and obstacles
Typically lower bandwidth than wired equivalents
Easier to extend to new areas
Cloud Network
Characteristics:
Resources accessed over the internet
On-demand service model
Shared resource pools
Rapid elasticity (easily scaled up or down)
Measured service (pay for what you use)
Location independence
Managed by third-party providers
Personal Area Network (PAN)
Characteristics:
Very limited range (typically <10 meters)
Connects personal devices
Low power consumption
Often uses Bluetooth or NFC technology
Minimal security infrastructure
Ad-hoc connections common
Limited number of connected devices
Local Area Network (LAN)
Characteristics:
Limited to a single building or campus
High data transfer rates
Low latency connections
Typically managed by a single organization
Often uses Ethernet or Wi-Fi technology
Private addressing scheme
Shared local resources (printers, servers)
Metropolitan Area Network (MAN)
Characteristics:
Spans a city or large campus
Connects multiple LANs
Medium to high data transfer rates
Often uses fiber optic backbones
May be owned by a single entity or consortium
Provides regional connectivity
Higher latency than LANs but lower than WANs
Wide Area Network (WAN)
Characteristics:
Covers broad geographical areas
Connects multiple LANs/MANs
Often uses leased telecommunication lines
Lower data rates compared to LANs
Higher latency due to distance
More complex routing requirements
May cross country or continental boundaries
Client-Server Network
Characteristics:
Centralized resource management
Clear differentiation of roles
Scalable for multiple clients
Centralized security administration
Easier backup and recovery processes
Potential single point of failure
Specialized hardware for server components
Peer-to-Peer (P2P) Network
Characteristics:
Decentralized architecture
Each node can be both client and server
Direct device-to-device communication
Distributed resource sharing
No central point of failure
Difficult to secure comprehensively
Scales horizontally through additional peers
3.4B Components of Computing Networks
Client
Characteristics:
End-user device requesting services
Provides user interface
Limited local processing of network data
Initiates communication with servers
Displays or processes received information
Varies widely in computing power
Includes desktops, laptops, smartphones, IoT devices
Server
Characteristics:
Provides resources to clients
Specialized for specific services
Higher processing power than typical clients
Often runs continuously
Optimized for simultaneous connections
Advanced storage capabilities
Specialized operating systems
Modem
Characteristics:
Converts digital to analog signals and vice versa
Connects to external communication lines
Contains modulation/demodulation circuitry
Interface between different network types
Typically connects to ISP networks
Limited internal routing capabilities
Handles signal encoding/decoding
Router
Characteristics:
Forwards data packets between networks
Determines optimal paths for data
Contains routing tables
Operates at network layer of OSI model
Provides network address translation (NAT)
Often includes basic firewall functionality
Can prioritize certain types of traffic
Switch
Characteristics:
Connects multiple devices on a local network
Directs traffic only to intended recipients
Operates at data link layer of OSI model
Uses MAC addresses for directing traffic
Creates virtual circuits for communication
More intelligent than hubs
Reduces network congestion
Hub
Characteristics:
Basic network connection device
Broadcasts data to all connected devices
No traffic management capabilities
Operates at physical layer of OSI model
Simpler and less intelligent than switches
Creates single collision domain
Becoming obsolete in modern networks
Channels
Characteristics:
Pathways for data transmission
Can be physical or logical
Have defined bandwidth capacity
May use frequency division or time division
Subject to noise and interference
Have measurable signal-to-noise ratios
Can be shared or dedicated
Network Interface
Characteristics:
Physical connection point to the network
Contains unique MAC address
Handles low-level protocol operations
Converts computer data to network signals
Available in various speeds and standards
Can be integrated or expansion cards
Includes both hardware and driver software
3.4C Characteristics of Computing Networks
Interoperability
Characteristics:
Allows different systems to work together
Based on common standards and protocols
Vendor-independent functionality
Enables heterogeneous network environments
Reduces proprietary lock-in
Supports backward compatibility
Facilitates network expansion
Domain Names
Characteristics:
Hierarchical naming structure
Human-readable addresses
Mapped to IP addresses through DNS
Organized into top-level domains (.com, .org, etc.)
Governed by ICANN globally
Can be registered through accredited registrars
Subject to trademark and legal considerations
IP Addresses
Characteristics:
Numerical identifiers for network devices
Hierarchical structure for routing
IPv4 (32-bit) or IPv6 (128-bit) formats
Can be static or dynamically assigned
Divided into network and host portions
Organized by regional internet registries
Subject to subnet masking for network division
Identification
Characteristics:
Process of claiming an identity
Uses credentials (usernames, IDs, etc.)
First step in access control
Can be anonymous or authenticated
May use biometric factors
Increasingly linked across services
Subject to identity management systems
Authentication
Characteristics:
Verifies claimed identity
Uses various factors (knowledge, possession, inherence)
Can be single or multi-factor
Provides access control foundation
Ranges from simple to complex methods
Increasingly biometric-based
Critical security component
Encryption
Characteristics:
Transforms data into protected format
Uses mathematical algorithms
Requires keys for encryption/decryption
Can be symmetric or asymmetric
Variable strength based on key length
Computationally intensive
Fundamental to secure communications
Firewall
Characteristics:
Monitors and filters network traffic
Enforces access control policies
Can inspect at different OSI layers
Maintains connection state information
Available as hardware or software
Often includes logging capabilities
First line of network defense
Proxy Server
Characteristics:
Acts as intermediary for client requests
Can cache frequently requested content
Provides anonymity for clients
Filters content based on policies
Can improve performance
Logs client activities
Centralizes access control
Virtual Private Network (VPN)
Characteristics:
Creates encrypted tunnel over public networks
Extends private network across public infrastructure
Provides authenticated remote access
Masks user's original IP address
Circumvents geographical restrictions
Various protocols (OpenVPN, IPsec, etc.)
Increasingly used for privacy protection
Security Layers
Characteristics:
Multiple defensive mechanisms working together
Provides redundancy in security controls
Different controls address different threats
Implements defense-in-depth strategy
Includes technical and procedural elements
Adapts to changing threat landscape
More robust than single security measures
Bandwidth
Characteristics:
Maximum data transfer capacity
Measured in bits per second
Limited by physical medium
Shared among network users
Can be symmetric or asymmetric
Subject to contention during high usage
Critical factor in network performance
Data Compression
Characteristics:
Reduces data size for transmission
Can be lossless or lossy
Various algorithms for different data types
Trade-off between size and quality/precision
Improves effective bandwidth utilization
Reduces storage requirements
Computation overhead in encoding/decoding
Net Neutrality
Characteristics:
Principle of equal treatment of all internet traffic
Prevents throttling or prioritization based on content
Subject to varying regulatory approaches
Impacts business models of ISPs
Affects innovation and market competition
Political and economic implications
Controversial policy area globally
Internet Backbone
Characteristics:
Principal high-capacity data routes
Uses fiber optic technology
Connects major network providers
Transcontinental and transoceanic connections
Managed by tier 1 network providers
Multiple redundant pathways
High bandwidth capacity
3.4D Computing Network Providers and Services
Internet Service Provider (ISP)
Characteristics:
Provides internet connectivity to customers
Various connection technologies (DSL, cable, fiber)
Different service tiers based on speed
Often bundled with other services
Subject to telecommunications regulations
Regional or national coverage areas
Variable quality of service guarantees
Chat Services
Characteristics:
Real-time text-based communication
Often includes multimedia sharing
Group or one-on-one conversations
Persistent or ephemeral message history
Increasingly encrypted
Often integrated with other platforms
Synchronous communication model
Texting Services
Characteristics:
Short message communication
Originally limited to 160 characters (SMS)
Cell network or internet-based transmission
Often asynchronous usage pattern
Delivery confirmation capabilities
Increasingly supports rich media
Ubiquitous across mobile platforms
Email Services
Characteristics:
Store-and-forward message system
Headers and body structure
Support for attachments
Address-based routing
Asynchronous communication
Various protocols (SMTP, IMAP, POP3)
Vulnerable to spam and phishing
File Sharing Services
Characteristics:
Enables distribution of digital content
Various permission models
Centralized or distributed architectures
Version control capabilities
Synchronization across devices
Size limitations vary by service
Integration with productivity tools
VoIP Services
Characteristics:
Voice transmission over IP networks
Lower cost than traditional telephony
Variable quality depending on network conditions
Requires minimal bandwidth
Increasingly integrated with video
Subject to latency concerns
Compatible with traditional phone systems
Online Messaging Services
Characteristics:
Platform-specific communication tools
Often includes presence indicators
Increasingly multimedia-capable
Persistent conversation history
Cross-device synchronization
Integration with other platform services
Both synchronous and asynchronous use
Hosting Services
Characteristics:
Provides infrastructure for websites/applications
Various service levels (shared, dedicated, cloud)
Managed or unmanaged options
Includes storage, bandwidth, computing resources
Different pricing models
Technical support offerings
Range of performance guarantees
Video Conferencing Services
Characteristics:
Real-time video/audio communication
Multiple participant capability
Screen sharing and collaboration tools
Recording capabilities
Bandwidth-intensive
Various quality options based on connection
Increasingly AI-enhanced features
3.4E The World Wide Web
World Wide Web
Characteristics:
Information system accessible via internet
Interconnected hypertext documents
Accessed through browsers
Built on HTTP protocol
Contains static and dynamic content
Organized through URL addressing
Constantly evolving content and standards
URL (Uniform Resource Locator)
Characteristics:
Standard format for web resource addresses
Contains protocol, domain, path components
Hierarchical structure
Can include query parameters
Case-sensitive paths
Supports internationalized domains
Fundamental to web navigation
HTTP (Hypertext Transfer Protocol)
Characteristics:
Application layer protocol
Request-response model
Stateless by design
Plain text format
Multiple request methods
Status code responses
Extensible header system
Browser
Characteristics:
Software for accessing web content
Renders HTML, CSS, JavaScript
Manages cookies and local storage
Extension/plugin capabilities
Security sandboxing for content
Increasingly standards-compliant
Varied rendering engines
World Wide Web Consortium (W3C)
Characteristics:
International standards organization
Develops web standards
Open membership model
Consensus-based process
Focus on accessibility
Technology-neutral approach
Promotes interoperability
3.4F Evolution of the Internet and the Web
Web 1.0
Characteristics:
Static content
Read-only experience
Limited user interaction
Directory-based navigation
Simple HTML design
Clear separation between creators and users
Limited multimedia capabilities
Web 2.0
Characteristics:
User-generated content
Social interaction emphasis
Dynamic content
Rich user interfaces
API-based service integration
Cloud-based applications
Collaborative content creation
Web 3.0
Characteristics:
Semantic data structures
Decentralized architecture
Blockchain integration
User data ownership
AI-driven experiences
Interoperable platforms
Trustless transactions
Social Media Platforms
Characteristics:
User profile-centered design
Content sharing capabilities
Network/connection visualization
Engagement metrics
Algorithmic content curation
Advertising-based business models
Mobile-first experiences
Internet of Things (IoT)
Characteristics:
Embedded computing devices
Network connectivity for physical objects
Sensor integration
Automated data collection
Often limited user interfaces
Variable security implementations
Machine-to-machine communication
Ubiquitous Networking
Characteristics:
Anytime, anywhere connectivity
Seamless transition between networks
Location-aware services
Always-on connections
Distributed computing resources
Edge processing capabilities
Background synchronization
3.4G Internet Dilemmas
Privacy Concerns
Characteristics:
Tension between service personalization and data collection
Question of informed consent
Metadata collection issues
Cross-platform tracking
Data retention policies
Increasingly regulated area
Cultural differences in expectations
Anonymity and Surveillance
Characteristics:
Technology enabling anonymous activity
State and corporate monitoring capabilities
Balance between security and privacy
Chilling effect on expression
Technological arms race
Legal framework variations globally
Metadata analysis capabilities
Right to be Forgotten
Characteristics:
Tension with historical record
Implementation challenges
Jurisdictional limitations
Balance with public interest
Technical complexity of complete removal
Evolving legal framework
Question of who decides what should be forgotten
Spyware
Characteristics:
Covert operation
Data exfiltration capabilities
Various infection vectors
Range from marketing tools to state-sponsored
Difficult to detect
Often bundled with legitimate software
Privacy and security implications
Identity Theft
Characteristics:
Misuse of personal information
Financial motivation typical
Long-term impact on victims
Increasingly sophisticated methods
Exploits verification weaknesses
Preventive measures struggle to keep pace
Cross-jurisdictional enforcement challenges
Cybercrime
Characteristics:
Digital means or targets
Evolution of traditional crimes to digital realm
Jurisdictional complexity
Attribution challenges
Increasingly organized criminal enterprises
Technical and non-technical elements
Rapid evolution of techniques
Hacking
Characteristics:
Unauthorized system access
Various motivations (financial, political, personal)
Range of technical sophistication
Exploits known and unknown vulnerabilities
Both automated and manual techniques
Defensive and offensive variations
Legal and illegal applications
Computer Viruses
Characteristics:
Self-replicating code
Various propagation methods
Payload execution capabilities
Evolution to evade detection
Range from nuisance to destructive
Increasingly targeted
Defense requires multiple approaches
Spam
Characteristics:
Unsolicited bulk messages
Commercial motivation typically
Low success rate compensated by volume
Various filtering techniques to combat
Adapts to circumvent filters
Economic model relies on minimal response
Present across multiple communication channels
Social Engineering
Characteristics:
Psychological manipulation rather than technical exploitation
Exploits human trust and behavior patterns
Often precursor to technical attacks
Difficult to defend through technical means alone
Various techniques (phishing, pretexting, baiting)
Highly effective despite awareness
Targets organizational weaknesses
Ransomware
Characteristics:
Encrypts victim data
Demands payment for decryption
Often uses cryptocurrency for payment
Increasingly targeted at high-value victims
Double extortion techniques emerging
Significant financial and operational impact
Growing as a criminal business model
Denial of Service (DoS)
Characteristics:
Overwhelms system resources
Distributed attack sources (DDoS)
Various attack vectors
Amplification techniques
Difficult to distinguish from legitimate traffic
Often used as distraction for other attacks
Mitigation requires specialized techniques
Dark Web
Characteristics:
Requires specialized software to access
Not indexed by standard search engines
Enhanced anonymity for users
Mix of legitimate and illegal activities
Decentralized structure
Fluctuating accessibility
Alternative to censored communications
Trolling
Characteristics:
Intentionally provocative behavior
Aims to cause emotional response
Ranges from mild to severe harassment
Often exploits platform features
Community norm violations
Response often amplifies impact
Challenging content moderation problem
IB DP Digital Society - Section 3.4 Networks & the Internet Practice Exam Questions
Define/State Questions
Define the term "network" as used in digital society.
State three different types of computing networks based on geographic scope.
Define the term "internet backbone" and state its importance in network infrastructure.
State four components typically found in a computing network.
Define "virtual private network (VPN)" and state one primary purpose for its use.
State three differences between the internet and the World Wide Web.
Define "bandwidth" as it relates to computing networks.
State two characteristics of peer-to-peer (P2P) networks.
Identify Questions
Identify three types of security measures used to protect computing networks.
Identify four network services commonly provided by Internet Service Providers.
Identify two key differences between HTTP and HTTPS protocols.
Identify three components of a URL (Uniform Resource Locator).
Identify four internet dilemmas related to privacy and security.
Identify three characteristics that distinguish Web 2.0 from Web 1.0.
Identify two roles of the World Wide Web Consortium (W3C).
Outline Questions
Outline three key differences between wired and wireless networks.
Outline the relationship between domain names and IP addresses in computing networks.
Outline two ways that data compression affects network performance.
Outline how client-server architecture functions in a typical network environment.
Outline the concept of net neutrality and its significance for internet users.
Describe Questions
Describe three security challenges associated with the Internet of Things (IoT).
Describe how encryption contributes to network security.
Describe two ways that firewalls protect networks from unauthorized access.
Describe the role of protocols in ensuring interoperability between different network systems.
Describe how social engineering differs from technical hacking as a cybersecurity threat.
Explain Questions
Explain how distributed denial of service (DDoS) attacks impact network availability.
Explain two ways that Web 3.0 differs from previous iterations of the World Wide Web.
Explain how routers and switches perform different functions in a computer network.
Explain the significance of the transition from IPv4 to IPv6 addressing.
Explain how ransomware attacks have evolved as a cybersecurity threat.
Compare Questions
Compare local area networks (LANs) and wide area networks (WANs) in terms of scale and typical applications.
Compare the client-server model with the peer-to-peer model of network architecture.
Compare Web 1.0 and Web 2.0 in terms of user participation and content creation.
Compare wired and wireless networks in terms of security vulnerabilities.
Compare HTTP and HTTPS in terms of data security and user privacy.
Suggest Questions
Suggest two ways that computing networks might evolve in the next decade.
Suggest three strategies that individuals can implement to protect their privacy online.
Suggest two potential impacts of widespread IoT adoption on network infrastructure requirements.
Suggest how the concept of the "right to be forgotten" presents both opportunities and challenges for digital society.
Suggest two ways that network providers could address issues of digital inequality in access to high-speed internet.
Discuss Questions
Discuss how the evolution from Web 1.0 to Web 3.0 has changed user engagement with online content.
Discuss the relationship between increasing network connectivity and potential cybersecurity vulnerabilities.
Discuss how issues of anonymity and accountability create tensions in online environments.
Discuss the role of standards and protocols in enabling global internet communication.
Discuss how the dark web represents both legitimate privacy concerns and potential for criminal activity.

Comments