top of page

ITGS + Digital Society  IBDP

Digital Society Blog

3.4 Networks & the Internet: Digital Society Content Deep Dive

  • Writer: lukewatsonteach
    lukewatsonteach
  • Apr 4
  • 33 min read

Updated: May 8

"Network Nexus": A 4-Step Study Guide for IB DP Digital Society


Master Networks & Internet concepts for your IB Digital Society exams with this comprehensive, progressive study approach

Perfect for IB Diploma Programme students studying Digital Society who want to excel in Topic 3.4 Networks & the Internet. This structured approach helps you build knowledge systematically from basic recall to complex evaluation – exactly what examiners are looking for!


Step 1: "Boot Camp Basics" (AO1)

Keywords: IB Digital Society, network fundamentals, AO1 questions, technical vocabulary, syllabus 3.4

  • Complete a set of 2-mark AO1 questions testing prior knowledge

  • Create a personal glossary of technical terms from each subtopic (3.4A-3.4G)

  • Focus on definition-based questions and fundamental recall

  • Document knowledge gaps to guide further study

Begin your journey with essential network terminology and concepts. This foundation stage helps you master the vocabulary and core principles that underpin all network technologies. Ideal for quick revision and identifying knowledge gaps before diving deeper.


Step 2: "Connect the Dots" (AO1/AO2)

Keywords: network comparison, IB Digital Society matrix, visual learning, network architecture, real-world applications

  • Develop a comparative matrix of network types, components, and real-world applications

  • Create visual representations of network architectures and relationships

  • Practice simple comparison questions that begin to develop analytical skills

  • Connect theoretical concepts to everyday technology experiences

Develop crucial connections between theoretical concepts and their practical applications. This visual approach helps you understand relationships between different network types and components – essential for those comparison questions that frequently appear in IB exams.


Step 3: "Network Navigator" (AO2)

Keywords: IB case studies, network analysis, explain and analyze questions, real-world examples, Digital Society application

  • Analyze 6 contemporary case studies illustrating different network concepts

  • Explore examples of network implementations across various contexts

  • Practice "explain" and "analyze" question types using collected materials

  • Identify the practical applications of theoretical network concepts

Explore real-world implementations through carefully selected case studies. This step strengthens your ability to explain network concepts in context – a critical skill for scoring high marks in Paper 1 and Paper 2 analytical questions.


Step 4: "Digital Dilemmas" (AO3)

Keywords: ethical considerations, network governance, IB evaluation questions, cybersecurity issues, digital privacy

  • Examine key dilemmas in networking (privacy, cybercrime, surveillance, etc.)

  • Compare multiple perspectives on network governance and regulation

  • Practice "evaluate" and "discuss" question types

  • Develop arguments addressing both benefits and challenges of networking technologies

Tackle the complex ethical and societal implications of networking technologies. This step prepares you for higher-order thinking questions that require evaluation of different perspectives – essential for achieving Level 7 marks in your IB assessments.


This progressive 4-step approach aligns perfectly with IB assessment objectives and command terms, guiding students from foundational knowledge to the evaluative thinking required for top marks. Each step builds strategically on previous learning, creating a seamless pathway to exam success in Digital Society Topic 3.4.



Step 1: "Boot Camp Basics" (AO1)

Getting Started

Welcome to the first step of your Networks & Internet study journey! In this foundational phase, we'll focus on building the essential knowledge you need before diving deeper. Think of this as creating your network knowledge "infrastructure" – just like you can't build the internet without routers and cables, you can't master this topic without the basics!


20 Key AO1 Questions (2 marks each)

Test your current understanding with these fundamental questions. For each question, write down your answer before checking against the syllabus. Mark each as "Confident," "Somewhat Familiar," or "Need to Learn."

  1. Define the term "Wide Area Network (WAN)."

  2. State two characteristics of wireless networks.

  3. Outline the difference between client-server and peer-to-peer networks.

  4. Identify two components required in a basic computer network.

  5. Define the term "router" and state its primary function.

  6. List two examples of network protocols.

  7. State what is meant by "interoperability" in networking.

  8. Identify two methods of network authentication.

  9. Define the term "bandwidth" in computing networks.

  10. Outline what is meant by "net neutrality."

  11. State two services provided by Internet Service Providers.

  12. Define what a domain name is and give an example.

  13. Explain the difference between the Internet and the World Wide Web.

  14. State two responsibilities of the World Wide Web Consortium (W3C).

  15. Identify two early innovations that contributed to the development of the internet.

  16. Define what is meant by "Internet of Things."

  17. State two examples of cybercrime.

  18. Outline what is meant by "social engineering" in the context of cybersecurity.

  19. Define the term "firewall" in network security.

  20. Identify two characteristics of the dark web.


Personal Glossary Project

Create your own comprehensive glossary covering all key terms from subtopics 3.4A through 3.4G. For each term:

  1. Write the definition in your own words

  2. Include a simple diagram or example where helpful

  3. Add a "real-life connection" note


Recommended format: Create a digital or physical flashcard system with the term on one side and the information on the other. Alternatively, use a study app like Quizlet or Anki.


Must-Include Terms for Your Glossary:

Network Types (3.4A):

  • Wired network

  • Wireless network

  • Cloud network

  • Personal Area Network (PAN)

  • Local Area Network (LAN)

  • Metropolitan Area Network (MAN)

  • Wide Area Network (WAN)

  • Client-server network

  • Peer-to-peer (P2P) network


Network Components (3.4B):

  • Client

  • Server

  • Modem

  • Router

  • Switch

  • Hub

  • Channel

  • Network interface


Network Characteristics (3.4C):

  • Protocol

  • Interoperability

  • Domain name

  • IP address

  • Authentication

  • Encryption

  • Firewall

  • Proxy server

  • Virtual Private Network (VPN)

  • Security layer

  • Bandwidth

  • Data compression

  • Net neutrality

  • Internet backbone


Network Providers & Services (3.4D):

  • Internet Service Provider (ISP)

  • Chat service

  • Texting service

  • Email service

  • File sharing

  • VOIP (Voice Over Internet Protocol)

  • Online messaging

  • Hosting

  • Video conferencing


World Wide Web (3.4E):

  • URL (Uniform Resource Locator)

  • HTTP (Hypertext Transfer Protocol)

  • Browser

  • W3C (World Wide Web Consortium)


Internet Evolution (3.4F):

  • Early internet innovators (e.g., Tim Berners-Lee)

  • Social media platform

  • Internet of Things (IoT)

  • Ubiquitous networking


Internet Dilemmas (3.4G):

  • Privacy

  • Anonymity

  • Surveillance

  • Right to be forgotten

  • Spyware

  • Identity theft

  • Cybercrime

  • Hacking

  • Computer virus

  • Spam

  • Social engineering

  • Ransomware

  • Denial of service attack

  • Dark web

  • Trolling


Building Connections

Now that you've established your network vocabulary foundation, it's time to start making connections between concepts and seeing how they relate to real-world applications. This step is all about creating meaningful structures that help you visualize and understand how different network elements interact with each other.


Comparative Matrix Project

Create a detailed comparison matrix that allows you to see relationships between network types, components, and their real-world applications. Your matrix should include:


Network Comparison DIGITAL SOCIETY
Network Comparison DIGITAL SOCIETY

Real-World Connection Exploration

For each major network type and component, identify at least two real-world examples or applications:

  1. Where might you encounter this network/component in everyday life?

  2. How does it affect your daily activities?

  3. What would happen if this network/component failed?

  4. How has this network/component evolved over time?


Network Technologies Timeline

Create a visual timeline showing the evolution of networking technologies:

  • Early development of ARPANET

  • Introduction of TCP/IP protocols

  • Development of the World Wide Web

  • Rise of wireless networking

  • Emergence of social media platforms

  • Development of cloud computing

  • Growth of the Internet of Things

  • Current and emerging network technologies


Early AO2 Comparison Questions

Practice these comparison questions to begin developing your analytical skills:

  1. Compare and contrast wired and wireless networks in terms of security, speed, and reliability.

  2. Explain two differences between client-server and peer-to-peer networks, with examples.

  3. Compare the roles of a switch and a router in a computer network.

  4. Describe two ways in which a LAN differs from a WAN, with real-world examples.

  5. Compare two different network security measures in terms of effectiveness and implementation.

  6. Explain how cloud computing differs from traditional network architectures.

  7. Compare the benefits and limitations of high vs. low bandwidth for different network applications.

  8. Describe two differences between the Internet and the World Wide Web.

  9. Compare the functions of a browser and a server in accessing web content.

  10. Explain how VPNs and proxy servers differ in their approach to network security.


Step 3: "Network Navigator" (AO2)

Exploring Real-World Network Applications

In this step, you'll analyze how network concepts are applied in real-world contexts, strengthening your ability to explain and analyze network implementations—key skills for AO2 exam questions.


Six Case Studies for Exploration

Case Study 1: Netflix's Content Delivery Network (CDN)

Netflix utilizes a sophisticated content delivery network spanning thousands of servers worldwide. Instead of streaming all content from central locations, Netflix places content on servers closer to users, reducing buffering and improving streaming quality. Their network employs advanced bandwidth management, adaptive streaming technologies, and partnerships with Internet Service Providers to optimize performance. This case exemplifies how large-scale content providers solve the challenges of delivering high-bandwidth content to millions of simultaneous users.


AO2 Practice Questions:

  1. Explain how Netflix's CDN demonstrates the concept of distributed networking. (6 marks)

  2. Analyze the relationship between server location and streaming performance in Netflix's CDN. (9 marks)

  3. Explain how Netflix's network architecture addresses bandwidth limitations. (6 marks)

  4. Analyze how Netflix's CDN implementation differs from traditional client-server models. (9 marks)


Case Study 2: Estonia's e-Government Network

Estonia has developed one of the world's most advanced digital government infrastructures. Their X-Road system connects various government databases and services through a secure distributed network. Citizens can vote, file taxes, access healthcare records, and use nearly all government services online using digital ID cards. This case highlights how network infrastructure can transform public services, addressing challenges of security, interoperability, and user authentication on a national scale.


AO2 Practice Questions:

  1. Explain how Estonia's e-Government system implements secure user authentication. (6 marks)

  2. Analyze the role of network interoperability in Estonia's X-Road system. (9 marks)

  3. Explain two network security features essential to Estonia's digital identity system. (6 marks)

  4. Analyze how Estonia's network architecture balances data accessibility with privacy protection. (9 marks)


Case Study 3: Internet Blackouts During Political Unrest

During periods of political unrest, some governments have restricted or completely shut down internet access. These interventions can occur at various network levels—from targeting specific websites to disabling cellular networks or cutting international connections. This case examines how network infrastructure can be controlled, the technical methods used to restrict access, and how networks can be designed for resilience against disruption.


AO2 Practice Questions:

  1. Explain two technical methods governments can use to restrict internet access. (6 marks)

  2. Analyze how the internet's distributed architecture both enables and complicates censorship efforts. (9 marks)

  3. Explain how VPNs and proxy servers can help users circumvent network restrictions. (6 marks)

  4. Analyze the relationship between network infrastructure ownership and freedom of information. (9 marks)


Case Study 4: Hospital Network Security

Modern hospitals implement specialized networks that balance accessibility with strict security requirements. These networks must protect sensitive patient data while allowing doctors, nurses, and staff to access critical information quickly. Hospital networks typically feature segmentation (separating clinical, administrative, and guest networks), strong encryption, and access controls. This case demonstrates how organizations address competing requirements for security, accessibility, and reliability in life-critical environments.


AO2 Practice Questions:

  1. Explain how network segmentation enhances security in hospital environments. (6 marks)

  2. Analyze three challenges in balancing data accessibility with security in healthcare networks. (9 marks)

  3. Explain how wireless networks in hospitals must be configured differently than in other environments. (6 marks)

  4. Analyze the role of authentication protocols in protecting patient data across hospital networks. (9 marks)


Case Study 5: Smart City Implementation (Barcelona)

Barcelona has implemented a comprehensive smart city initiative featuring thousands of IoT sensors, free public Wi-Fi, smart traffic management, and intelligent utility systems. The city's network infrastructure connects everything from parking sensors and streetlights to waste management systems and public transportation. This case illustrates how metropolitan area networks can integrate diverse technologies to improve urban living, while addressing challenges of scale, interoperability, and privacy.


AO2 Practice Questions:

  1. Explain the role of IoT devices in Barcelona's smart city network. (6 marks)

  2. Analyze how Barcelona's smart city implementation demonstrates metropolitan area network principles. (9 marks)

  3. Explain two networking challenges that arise when connecting thousands of diverse sensors. (6 marks)

  4. Analyze how Barcelona's network architecture handles data from multiple systems and services. (9 marks)


Case Study 6: Cryptocurrency Network Security

Cryptocurrencies like Bitcoin operate on decentralized peer-to-peer networks without central authorities. These networks use blockchain technology—a distributed ledger maintained across thousands of computers worldwide. Security relies on cryptographic protocols, consensus mechanisms (like proof-of-work), and network redundancy rather than traditional security measures. This case examines alternative network architectures that prioritize decentralization and trustless verification over efficiency and central control.


AO2 Practice Questions:

  1. Explain how peer-to-peer networking principles are applied in cryptocurrency systems. (6 marks)

  2. Analyze how blockchain networks achieve security without central authentication. (9 marks)

  3. Explain two differences between cryptocurrency networks and traditional financial networks. (6 marks)

  4. Analyze the relationship between network decentralization and fault tolerance in blockchain systems. (9 marks)



Step 4: "Digital Dilemmas" (AO3)

Ethical Considerations & Social Impact

In this step, you'll move beyond technical understanding to evaluate the ethical and societal implications of networking technologies. This develops your ability to discuss and evaluate multiple perspectives—essential skills for AO3 exam questions.


Key Internet Dilemmas

Privacy & Surveillance Dilemmas

The networked world creates tension between privacy, security, and convenience. Networks enable extensive data collection and monitoring, raising questions about rights and responsibilities.


Exploration Topics:

  • State surveillance vs. national security

  • Corporate data collection vs. personalized services

  • Right to be forgotten vs. public interest

  • Anonymity vs. accountability online


AO3 Practice Questions:

  1. Evaluate the claim that "privacy is no longer possible in the age of modern networks." (10 marks)

  2. Discuss the ethical implications of government surveillance of internet traffic. (8 marks)

  3. To what extent should individuals have the right to be forgotten online? (8 marks)


Cybersecurity Challenges

Networks face constant security threats that evolve alongside defensive measures, creating ongoing tensions between accessibility, usability, and protection.


Exploration Topics:

  • Ransomware and critical infrastructure

  • Social engineering vs. technical exploits

  • Individual responsibility vs. institutional security

  • Public disclosure of vulnerabilities


AO3 Practice Questions:

  1. Evaluate the effectiveness of different approaches to preventing cybercrime. (8 marks)

  2. Discuss the ethical considerations when security researchers discover network vulnerabilities. (10 marks)

  3. To what extent should users bear responsibility for network security? (8 marks)


Digital Divide & Network Access

Network access varies greatly across geographical, socioeconomic, and demographic lines, raising questions about equity and opportunity.


Exploration Topics:

  • Urban vs. rural network infrastructure

  • Economic barriers to internet access

  • Accessibility for people with disabilities

  • Language and cultural barriers online


AO3 Practice Questions:

  1. Evaluate the impact of the digital divide on educational opportunities. (8 marks)

  2. Discuss the ethical implications of unequal access to high-speed networks. (8 marks)

  3. To what extent should internet access be considered a human right? (8 marks)


Network Governance & Control

Networks span national boundaries but operate within local legal frameworks, creating complex questions about jurisdiction and governance.


Exploration Topics:

  • Net neutrality debates

  • International standards vs. national regulations

  • Private companies as network gatekeepers

  • Censorship and content filtering


AO3 Practice Questions:

  1. Evaluate the arguments for and against net neutrality regulations. (8 marks)

  2. Discuss the challenges of governing networks that cross international boundaries. (8 marks)

  3. To what extent should private companies control access to network infrastructure? (8 marks)


Case Analysis: Ethical Network Dilemmas

Examine these real-world cases and evaluate the ethical implications:


1. The Great Firewall of China

Since the early 2000s, China has implemented the world's most sophisticated network filtering system, known as the "Great Firewall." This massive technological undertaking employs DNS poisoning, IP blocking, deep packet inspection, and keyword filtering to control what Chinese citizens can access online. Major platforms like Google, Facebook, and Wikipedia are blocked, while Chinese alternatives like Baidu and WeChat operate under content restrictions. The system employs an estimated 50,000 people to monitor and censor content, creating a distinctly different internet experience for nearly a billion users. This case raises profound questions about sovereignty in cyberspace, cultural values across networks, and the technical feasibility of creating national "internets" within the global network.


Multiple Perspectives Exercise:

  • Chinese Government: Views the system as a necessary protection of national sovereignty and social stability

  • Chinese Citizens: Range from accepting the limitations as normal to actively seeking circumvention tools

  • Western Tech Companies: Must decide whether to comply with censorship requirements to access the Chinese market

  • Human Rights Organisations: Consider the firewall a violation of information rights and freedom of expression


2. Snowden NSA Revelations

In 2013, former NSA contractor Edward Snowden leaked thousands of classified documents revealing unprecedented global surveillance programs. These leaks exposed programs like PRISM, which collected data directly from major tech companies, and XKeyscore, which allowed analysts to search through vast databases of emails, online chats, and browsing histories of millions of individuals worldwide. The documents revealed the technical capabilities of modern network surveillance, including fiber optic cable tapping, encryption backdoors, and metadata collection. This case dramatically shifted the global conversation about privacy, raising questions about the appropriate balance between national security and individual rights in the digital age.


Multiple Perspectives Exercise:

  • Intelligence Agencies: View mass surveillance as essential for preventing terrorism and protecting national security

  • Privacy Advocates: Consider the programs a fundamental violation of civil liberties and constitutional protections

  • Tech Companies: Caught between government demands and user trust, leading to increased encryption efforts

  • Snowden Himself: Viewed his actions as necessary whistleblowing to inform the public about government overreach


3. Social Media Content Moderation

Major platforms like Facebook, Twitter, and YouTube face the enormous challenge of moderating billions of user posts across diverse cultural contexts. These companies employ combinations of AI systems and human reviewers to identify and remove content that violates platform policies or local laws. During major events like the COVID-19 pandemic or elections, content moderation decisions can significantly impact public discourse and information access. The challenges are particularly evident across international borders - content that is protected speech in one country may be illegal in another. This case highlights the immense power private companies have as de facto regulators of global communication networks.


Multiple Perspectives Exercise:

  • Platform Companies: Balance free expression with legal requirements and preventing harm

  • Content Creators: Concerned about arbitrary enforcement and lack of transparent appeal processes

  • Government Regulators: Push platforms to better control harmful content while potentially advancing political agendas

  • Free Speech Advocates: Worry about corporate censorship and the power of private companies to control public discourse


4. Ransomware Attacks on Critical Infrastructure

In recent years, ransomware attacks have increasingly targeted hospitals, power grids, fuel pipelines, and other essential services. The 2021 Colonial Pipeline attack demonstrated how network vulnerabilities could affect physical infrastructure, causing fuel shortages across the eastern United States. Similarly, hospital ransomware attacks have forced medical facilities to revert to paper records and postpone treatments, directly impacting patient care. These attacks highlight the growing convergence between network security and physical safety, raising questions about whether critical infrastructure networks should be treated differently than commercial networks. The case also presents ethical dilemmas about paying ransoms, which may fund criminal organizations but could save lives in critical situations.


Multiple Perspectives Exercise:

  • Infrastructure Operators: Face impossible choices between paying ransoms or enduring service disruptions

  • Cybersecurity Experts: Advocate for better preventative measures while acknowledging that perfect security is impossible

  • Government Agencies: Consider regulatory approaches and potential military/intelligence responses to attacks

  • Insurance Companies: Evaluate whether covering ransom payments encourages more attacks or provides necessary protection


Guide to Answering 12-Mark AO3 Exam Questions

Structure & Organization

Introduction (1-2 sentences)

  • Clearly address the question

  • Briefly outline your approach


Body (3-4 paragraphs)

  • Present different perspectives in separate paragraphs

  • Support each perspective with examples or evidence

  • Show relationships between different viewpoints


Conclusion (2-3 sentences)

  • Synthesize perspectives into a balanced judgment

  • Answer the question directly

  • Avoid introducing new ideas


Considering Multiple Perspectives

  • Identify stakeholders: Who is affected by this issue? Who has power or interest?

  • Contrast viewpoints: Show how different groups might evaluate the same situation

  • Balance technical and social factors: Consider both how networks function and their human impact

  • Acknowledge complexities: Recognize that there are rarely simple solutions to network dilemmas


Essential Elements for Maximum Marks

  • Demonstrate technical understanding: Show that you understand the network concepts underlying the ethical issue

  • Evaluate, don't just describe: Go beyond explaining perspectives to analyzing their strengths and limitations

  • Use specific examples: Reference real-world cases or scenarios to support your evaluation

  • Show connections: Link different perspectives to broader principles or themes

  • Make a reasoned judgment: Conclude with a nuanced position that acknowledges complexity


Practice AO3 Questions (12 marks each)

For each question, create a planning outline with key points for introduction, perspectives to consider, examples to include, and conclusion. Focus on planning rather than writing complete answers.

  1. To what extent is China's approach to internet filtering justified by principles of national sovereignty? (12 marks)

  2. "Mass network surveillance fundamentally undermines the secure functioning of the internet." Evaluate this statement. (12 marks)

  3. Evaluate the claim that social media platforms should be treated as publishers rather than neutral platforms. (12 marks)

  4. "Critical infrastructure networks should be completely isolated from the public internet." To what extent do you agree with this statement? (12 marks)



3.4A Types of Computing Networks

Based on Connectivity

  1. Wired Network: Networks that use physical cables to transmit data between devices.

    • Examples:

      • Ethernet office networks using CAT6 cables

      • Fiber optic networks for high-speed internet backbones

      • USB connections between devices

  2. Wireless Network: Networks that use radio waves or other electromagnetic signals to transmit data without physical connections.

    • Examples:

      • Wi-Fi networks in homes and businesses

      • Bluetooth connections between smartphones and headphones

      • 5G cellular networks for mobile devices

  3. Cloud Network: Computing resources accessed over the internet rather than from local infrastructure.

    • Examples:

      • Microsoft Azure cloud computing services

      • Amazon Web Services (AWS) global infrastructure

      • Google Cloud Platform's distributed resources


Based on Geographic Scope

  1. Personal Area Network (PAN): Network for connecting devices within an individual person's workspace.

    • Examples:

      • Bluetooth connection between a laptop and wireless headphones

      • Apple Watch connected to an iPhone

      • Wireless keyboard and mouse connected to a computer

  2. Local Area Network (LAN): Network connecting devices within a limited area, such as a home, school, or office building.

    • Examples:

      • Office network connecting computers to a shared printer

      • School computer lab network

      • Home Wi-Fi network connecting multiple devices

  3. Metropolitan Area Network (MAN): Network spanning a city or large campus.

    • Examples:

      • City-wide public Wi-Fi networks

      • University campus networks connecting multiple buildings

      • Traffic management systems connecting traffic lights across a city

  4. Wide Area Network (WAN): Network covering a broad geographical area, often connecting multiple LANs.

    • Examples:

      • Corporate networks connecting offices in different countries

      • Banking networks linking branches nationwide

      • Government agency networks spanning multiple locations


Based on Architecture

  1. Client-Server Network: Network where centralized servers provide resources to client devices.

    • Examples:

      • Email systems with centralized mail servers

      • Online gaming platforms with dedicated game servers

      • Corporate file sharing systems with central file servers

  2. Peer-to-Peer (P2P) Network: Network where devices connect directly to each other without requiring a central server.

    • Examples:

      • BitTorrent file sharing

      • Blockchain networks like Bitcoin

      • Skype's direct call routing between users


3.4B Components of Computing Networks

  1. Client: End-user device that requests and uses resources from the network.

    • Examples:

      • Laptops running web browsers

      • Smartphones accessing email

      • Smart TVs streaming content

  2. Server: Specialized computer that provides resources, services, or data to clients.

    • Examples:

      • Web servers hosting websites

      • Database servers storing company records

      • Mail servers managing email communication

  3. Modem: Device that converts digital signals from computers to signals suitable for transmission over communication lines, and vice versa.

    • Examples:

      • Cable modems connecting homes to ISP networks

      • DSL modems for telephone line internet access

      • Fiber optic modems for high-speed connections

  4. Router: Device that forwards data packets between computer networks, determining the best path.

    • Examples:

      • Home Wi-Fi routers

      • Enterprise-grade Cisco routers

      • 5G cellular routers for mobile connectivity

  5. Switch: Device that connects multiple devices on a local network and directs traffic only to the intended recipient.

    • Examples:

      • Office network switches connecting workstations

      • Data center switches managing server connections

      • Home network switches expanding connectivity

  6. Hub: Basic network device that connects multiple Ethernet devices, broadcasting data to all connected devices.

    • Examples:

      • Simple Ethernet hubs in legacy networks

      • USB hubs connecting multiple peripherals

      • KVM (Keyboard, Video, Mouse) hubs for controlling multiple computers

  7. Channels: Pathways through which data is transmitted in a network.

    • Examples:

      • Wi-Fi channels on different frequencies

      • Fiber optic channels using different wavelengths of light

      • Multiple frequency channels in cellular networks

  8. Network Interface: Hardware component that connects a device to a network.

    • Examples:

      • Network Interface Cards (NICs) in computers

      • Wi-Fi adapters in laptops

      • Ethernet ports on routers and switches


3.4C Characteristics of Computing Networks

Standards and Protocols

  1. Interoperability: Ability of different systems, devices, and applications to connect and communicate seamlessly.

    • Examples:

      • USB standards allowing devices from different manufacturers to connect

      • Wi-Fi protocols enabling diverse devices to connect to wireless networks

      • Bluetooth standards for wireless device communication

  2. Domain Names: Human-readable addresses that correspond to numerical IP addresses of servers on the internet.

  3. Addresses (IP): Numerical labels assigned to devices participating in a network, used to identify and locate devices.

    • Examples:

      • IPv4 addresses like 192.168.1.1

      • IPv6 addresses like 2001:0db8:85a3:0000:0000:8a2e:0370:7334

      • MAC addresses like 00:1A:2B:3C:4D:5E

Security

  1. Identification: Process of claiming an identity within a system.

    • Examples:

      • Username entry in a login screen

      • Email address used to identify accounts

      • Employee ID numbers in corporate systems

  2. Authentication: Process of verifying the claimed identity.

    • Examples:

      • Password verification

      • Biometric authentication (fingerprint, face recognition)

      • Two-factor authentication via SMS or authenticator apps

  3. Encryption: Process of encoding information so only authorized parties can access it.

    • Examples:

      • HTTPS encryption for secure websites

      • WhatsApp end-to-end encryption for messages

      • BitLocker drive encryption for Windows computers

  4. Firewall: Security system that monitors and controls incoming and outgoing network traffic.

    • Examples:

      • Windows Defender Firewall

      • Corporate hardware firewalls from Cisco or Palo Alto Networks

      • Application-specific firewalls like ModSecurity for web servers

  5. Proxy Server: Server that acts as an intermediary between clients and other servers.

    • Examples:

      • Corporate proxy servers filtering web content

      • NGINX reverse proxy for load balancing

      • Web proxies for anonymous browsing

  6. Virtual Private Network (VPN): Technology that creates a secure, encrypted connection over a less secure network.

    • Examples:

      • NordVPN and ExpressVPN for personal use

      • Cisco AnyConnect for corporate remote access

      • OpenVPN for self-hosted solutions

  7. Security Layers: Multiple levels of security measures working together to protect systems.

    • Examples:

      • Defense in depth strategies combining firewalls, antivirus, and access controls

      • OSI security model implementation

      • Zero Trust security architecture in modern enterprises

Capacity

  1. Bandwidth: Maximum rate of data transfer across a network connection.

    • Examples:

      • 1 Gbps fiber optic home internet connection

      • 100 Mbps business Ethernet connection

      • 5G cellular networks with up to 10 Gbps theoretical bandwidth

  2. Data Compression: Techniques to reduce the size of data being transmitted or stored.

    • Examples:

      • JPEG compression for images

      • H.265/HEVC compression for video streaming

      • ZIP/RAR compression for file transfers

  3. Net Neutrality: Principle that all internet traffic should be treated equally by ISPs.

    • Examples:

      • Regulations preventing ISPs from blocking competing services

      • Policies ensuring equal access to all legal websites

      • Rules against prioritizing certain types of content

Infrastructure

  1. Internet Backbone: Principal data routes between large, strategically interconnected networks and core routers on the internet.

    • Examples:

      • Transatlantic fiber optic cables connecting continents

      • Level 3 Communications global network infrastructure

      • Internet Exchange Points (IXPs) where different networks connect


3.4D Computing Network Providers and Services

Providers

  1. Internet Service Provider (ISP): Company that provides internet access to customers.

    • Examples:

      • Comcast/Xfinity in the United States

      • BT in the United Kingdom

      • Airtel in India

Services

  1. Chat: Real-time text-based communication between users.

    • Examples:

      • WhatsApp chat functionality

      • Discord chat channels

      • Microsoft Teams chat

  2. Texting: Sending short messages typically between mobile devices.

    • Examples:

      • SMS messaging on cellular networks

      • Apple iMessage

      • RCS messaging on Android devices

  3. Email: Method of exchanging digital messages between computers over a network.

    • Examples:

      • Gmail by Google

      • Microsoft Outlook

      • ProtonMail encrypted email service

  4. File Sharing: Distributing or providing access to digital media.

    • Examples:

      • Dropbox cloud file sharing

      • Google Drive collaborative documents

      • Microsoft OneDrive personal and business file sharing

  5. VoIP (Voice over Internet Protocol): Technology for delivering voice communications over the internet.

    • Examples:

      • Skype voice calls

      • Zoom VoIP capabilities

      • Cisco IP phones in business environments

  6. Online Messaging: Platform-based communication systems.

    • Examples:

      • Facebook Messenger

      • Slack workplace messaging

      • Telegram encrypted messaging

  7. Hosting: Services that store websites, applications, or data making them accessible via the internet.

    • Examples:

      • Bluehost web hosting

      • AWS EC2 cloud hosting

      • GitHub Pages for project websites

  8. Video Conferencing: Real-time video communication between multiple users.

    • Examples:

      • Zoom video meetings

      • Microsoft Teams video conferencing

      • Google Meet collaborative video calls


3.4E The World Wide Web

  1. World Wide Web: An information system where documents and resources are identified by URLs, interlinked by hypertext links, and accessible via the internet.

    • Examples:

      • Collection of all websites accessible through browsers

      • Network of interlinked web pages

      • System of HTML documents accessible over HTTP/HTTPS

  2. URL (Uniform Resource Locator): Web address specifying the location of a resource on the internet.

  3. HTTP (Hypertext Transfer Protocol)

    1. Definition: HTTP is an application layer protocol that forms the foundation of data communication on the World Wide Web. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands.

    2. Key Characteristics

      1. Stateless Protocol: Each request from a client to server is treated as a completely new request with no memory of previous interactions.

      2. Request-Response Model: Communication occurs through a client making a request to a server, which then provides a response.

      3. Plain Text Format: HTTP messages are transmitted in human-readable format (though they can contain binary data).

      4. Connectionless: By default, HTTP establishes a new connection for each request and closes it once the response is delivered.

      5. Media Independent: Can transfer any type of data as long as both client and server understand how to process the content type.

    3. Core Components

      1. HTTP Methods/Verbs:

        • GET: Requests data from a specified resource

        • POST: Submits data to be processed to a specified resource

        • PUT: Updates a specified resource with new data

        • DELETE: Removes the specified resource

        • HEAD: Similar to GET but only requests headers (not the body)

        • OPTIONS: Returns supported HTTP methods for a URL

        • PATCH: Applies partial modifications to a resource

      2. HTTP Headers: Provide additional information about the request or response

        • Request Headers: User-Agent, Accept, Cookie, Authorization

        • Response Headers: Content-Type, Content-Length, Server, Set-Cookie

        • General Headers: Date, Connection, Cache-Control

      3. HTTP Status Codes:

        • 1xx (Informational): Request received, continuing process

        • 2xx (Success): Request successfully received, understood, and accepted

          • 200 OK: Standard success response

          • 201 Created: Resource successfully created

        • 3xx (Redirection): Further action needed to complete the request

          • 301 Moved Permanently: Resource has been permanently moved

          • 302 Found: Resource temporarily moved

        • 4xx (Client Error): Request contains bad syntax or cannot be fulfilled

          • 404 Not Found: Resource does not exist

          • 403 Forbidden: Server understood but refuses to authorize

        • 5xx (Server Error): Server failed to fulfill a valid request

          • 500 Internal Server Error: Generic server error

          • 503 Service Unavailable: Server temporarily unavailable

  4. Browser: Software application for accessing information on the World Wide Web.

    • Examples:

      • Google Chrome

      • Mozilla Firefox

      • Apple Safari

  5. World Wide Web Consortium (W3C): International community that develops open standards for the web.

    • Examples:

      • HTML5 standard development

      • CSS specification maintenance

      • Web accessibility guidelines


3.4F Evolution of the Internet and the Web

Innovators and Innovations in Early Development:

  • Examples:

    • Tim Berners-Lee's invention of the World Wide Web at CERN in 1989

    • ARPANET as the precursor to the internet, connecting first nodes in 1969

    • Vint Cerf and Bob Kahn developing TCP/IP protocols in the 1970s


Web 1.0 (Early Web): The first iteration of the web, characterized by static websites with limited interactivity.

  • Characteristics:

    • Static, read-only content

    • Limited user interaction

    • One-way communication from creators to users

    • Mostly text-based with simple designs

  • Examples:

    • Early personal homepages on GeoCities

    • Corporate "brochure" websites with company information

    • Yahoo! Directory and early search engines like AltaVista


Web 2.0 (Social Web): The second generation of the web, characterized by user participation, interactivity, and collaboration.

  • Characteristics:

    • User-generated content

    • Interactive applications

    • Social networking

    • Rich user interfaces

    • Cloud-based applications

    • APIs and mashups

  • Examples:

    • YouTube allowing anyone to create and share videos

    • Wikipedia's collaborative knowledge creation model

    • WordPress and blogging platforms enabling personal publishing

    • Facebook and Twitter's social networking capabilities

    • Google Docs enabling real-time collaborative document editing


Web 3.0 (Semantic/Decentralized Web): The emerging third generation of the web, focusing on machine-readable information, decentralization, and user data ownership.

  • Characteristics:

    • Semantic data and artificial intelligence

    • Decentralized applications (dApps)

    • Blockchain technology and smart contracts

    • User data control and ownership

    • 3D visualization and immersive experiences

    • Trustless transactions without intermediaries

  • Examples:

    • Ethereum platform for decentralized applications

    • NFT (Non-Fungible Token) marketplaces like OpenSea

    • Decentralized finance (DeFi) applications like Uniswap

    • Brave browser focusing on privacy and user control

    • Decentralized storage solutions like Filecoin and IPFS

    • Self-sovereign identity systems like Sovrin


Rise of Online Social Media Platforms: The emergence of websites and applications that enable users to create and share content or participate in social networking.

  • Examples:

    • Facebook connecting billions of users worldwide

    • Twitter's microblogging platform for real-time updates

    • Instagram's photo and video sharing community

    • TikTok's short-form video platform driving cultural trends

    • LinkedIn's professional networking ecosystem


Internet of Things (IoT): Network of physical objects embedded with sensors, software, and connectivity.

  • Examples:

    • Smart home devices like Nest thermostats and Ring doorbells

    • Industrial IoT sensors monitoring machinery performance

    • Wearable fitness trackers uploading health data to the cloud

    • Smart city infrastructure including connected traffic systems

    • Agricultural IoT solutions for automated farming


Ubiquitous Networking: Computing concept where connectivity is available anywhere, anytime.

  • Examples:

    • Seamless transition between Wi-Fi and cellular networks

    • Public Wi-Fi hotspots in urban areas

    • Smart cities with comprehensive network coverage

    • 5G networks enabling new applications through higher bandwidth

    • Edge computing bringing processing closer to data sources


Mobile Internet Revolution: The shift from desktop to mobile internet access.

  • Examples:

    • Smartphone app ecosystems (iOS App Store, Google Play)

    • Mobile-first design approach for websites

    • Location-based services using GPS

    • Mobile payment systems like Apple Pay and Google Wallet

    • Progressive Web Apps bridging mobile and web experiencese


3.4G Internet Dilemmas

Privacy, Security, and Identity

  1. Privacy Concerns: Issues related to the collection, use, and sharing of personal information online.

    • Examples:

      • Google's collection of user data for targeted advertising

      • Facebook's tracking of user activity across the web

      • Smart speakers recording conversations in homes

  2. Anonymity and Surveillance: The ability to remain unidentified online versus monitoring of online activities.

    • Examples:

      • Tor browser enabling anonymous browsing

      • Government surveillance programs monitoring internet traffic

      • Employer monitoring of workplace internet usage

  3. Right to be Forgotten: Legal concept that individuals have the right to request deletion of their personal information.

    • Examples:

      • EU GDPR right to erasure provisions

      • Google's process for removing outdated search results

      • Facebook account deletion options

  4. Spyware: Malicious software that gathers information about users without their knowledge.

    • Examples:

      • Keyloggers recording keystrokes to steal passwords

      • Tracking cookies monitoring browsing habits

      • Stalkerware apps monitoring smartphone activity

  5. Identity Theft: Criminal activity where someone impersonates another person, typically for financial gain.

    • Examples:

      • Phishing emails attempting to steal login credentials

      • Data breaches exposing personal information

      • SIM swapping attacks to take over phone numbers


Cybercrime and Malicious Activities

  1. Cybercrime: Criminal activities carried out using computers or the internet.

    • Examples:

      • Credit card fraud through compromised websites

      • Cryptocurrency theft from digital wallets

      • Online scams targeting vulnerable users

  2. Hacking: Unauthorized access to computer systems or networks.

    • Examples:

      • Corporate data breaches exposing customer information

      • Account hacking to steal virtual goods in online games

      • Website defacement for political purposes

  3. Computer Viruses: Malicious software that can replicate itself and spread to other computers.

    • Examples:

      • Trojan horse programs disguised as legitimate software

      • Worms spreading through network vulnerabilities

      • Polymorphic viruses that change their code to avoid detection

  4. Spam: Unsolicited messages sent in bulk, typically for commercial purposes.

    • Examples:

      • Unwanted marketing emails

      • Comment spam on blogs and forums

      • Messaging app spam promoting scams

  5. Social Engineering: Psychological manipulation to trick users into revealing confidential information.

    • Examples:

      • Phishing emails impersonating trusted organizations

      • Pretexting calls where scammers pose as authority figures

      • Baiting attacks offering free downloads containing malware

  6. Ransomware: Malware that encrypts the victim's files and demands payment for decryption.

    • Examples:

      • WannaCry ransomware attack affecting organizations worldwide

      • REvil ransomware targeting businesses for large ransoms

      • Locky ransomware distributed through malicious email attachments

  7. Denial of Service (DoS): Attack aimed at making a system unavailable by overwhelming it with traffic.

    • Examples:

      • Distributed Denial of Service (DDoS) attacks on banking websites

      • Botnets of compromised IoT devices launching attacks

      • Application-layer DoS attacks targeting specific web services

  8. Dark Web: Content that exists on darknets, overlay networks that use the internet but require specific software to access.

    • Examples:

      • Tor network hosting hidden services

      • I2P anonymous network

      • Freenet peer-to-peer platform for censorship-resistant communication

  9. Trolling: Deliberate provocative or offensive online behavior intended to cause conflict.

    • Examples:

      • Comment section harassment on YouTube videos

      • Coordinated harassment campaigns on Twitter

      • Inflammatory posts in online communities



3.4 Networks & the Internet - Key Terms and Their Characteristics


Core Concepts

Network

Characteristics:

  • Connects multiple devices together

  • Enables resource sharing between connected devices

  • Follows standardized protocols for communication

  • Can be configured in various topologies (star, mesh, bus, ring)

  • Ranges from small local connections to global systems

  • Requires addressing system to identify devices

  • May be physical (wired) or wireless


Internet

Characteristics:

  • Global system of interconnected networks

  • Decentralized with no single controlling entity

  • Uses TCP/IP protocol suite

  • Employs packet-switching technology

  • Hardware and software agnostic (works across platforms)

  • Constantly evolving infrastructure

  • Resilient through redundant connection paths


3.4A Types of Computing Networks

Wired Network

Characteristics:

  • Uses physical cables (copper, fiber optic)

  • Generally more stable connections than wireless

  • Higher potential bandwidth capacity

  • Limited by physical cable length

  • Requires physical infrastructure installation

  • Less susceptible to interference

  • More difficult to reconfigure than wireless


Wireless Network

Characteristics:

  • Uses radio waves or other electromagnetic signals

  • Provides mobility and flexibility

  • No physical connection constraints

  • Vulnerable to signal interference

  • Range limited by transmitter power and obstacles

  • Typically lower bandwidth than wired equivalents

  • Easier to extend to new areas


Cloud Network

Characteristics:

  • Resources accessed over the internet

  • On-demand service model

  • Shared resource pools

  • Rapid elasticity (easily scaled up or down)

  • Measured service (pay for what you use)

  • Location independence

  • Managed by third-party providers


Personal Area Network (PAN)

Characteristics:

  • Very limited range (typically <10 meters)

  • Connects personal devices

  • Low power consumption

  • Often uses Bluetooth or NFC technology

  • Minimal security infrastructure

  • Ad-hoc connections common

  • Limited number of connected devices


Local Area Network (LAN)

Characteristics:

  • Limited to a single building or campus

  • High data transfer rates

  • Low latency connections

  • Typically managed by a single organization

  • Often uses Ethernet or Wi-Fi technology

  • Private addressing scheme

  • Shared local resources (printers, servers)


Metropolitan Area Network (MAN)

Characteristics:

  • Spans a city or large campus

  • Connects multiple LANs

  • Medium to high data transfer rates

  • Often uses fiber optic backbones

  • May be owned by a single entity or consortium

  • Provides regional connectivity

  • Higher latency than LANs but lower than WANs


Wide Area Network (WAN)

Characteristics:

  • Covers broad geographical areas

  • Connects multiple LANs/MANs

  • Often uses leased telecommunication lines

  • Lower data rates compared to LANs

  • Higher latency due to distance

  • More complex routing requirements

  • May cross country or continental boundaries


Client-Server Network

Characteristics:

  • Centralized resource management

  • Clear differentiation of roles

  • Scalable for multiple clients

  • Centralized security administration

  • Easier backup and recovery processes

  • Potential single point of failure

  • Specialized hardware for server components


Peer-to-Peer (P2P) Network

Characteristics:

  • Decentralized architecture

  • Each node can be both client and server

  • Direct device-to-device communication

  • Distributed resource sharing

  • No central point of failure

  • Difficult to secure comprehensively

  • Scales horizontally through additional peers


3.4B Components of Computing Networks

Client

Characteristics:

  • End-user device requesting services

  • Provides user interface

  • Limited local processing of network data

  • Initiates communication with servers

  • Displays or processes received information

  • Varies widely in computing power

  • Includes desktops, laptops, smartphones, IoT devices


Server

Characteristics:

  • Provides resources to clients

  • Specialized for specific services

  • Higher processing power than typical clients

  • Often runs continuously

  • Optimized for simultaneous connections

  • Advanced storage capabilities

  • Specialized operating systems


Modem

Characteristics:

  • Converts digital to analog signals and vice versa

  • Connects to external communication lines

  • Contains modulation/demodulation circuitry

  • Interface between different network types

  • Typically connects to ISP networks

  • Limited internal routing capabilities

  • Handles signal encoding/decoding


Router

Characteristics:

  • Forwards data packets between networks

  • Determines optimal paths for data

  • Contains routing tables

  • Operates at network layer of OSI model

  • Provides network address translation (NAT)

  • Often includes basic firewall functionality

  • Can prioritize certain types of traffic


Switch

Characteristics:

  • Connects multiple devices on a local network

  • Directs traffic only to intended recipients

  • Operates at data link layer of OSI model

  • Uses MAC addresses for directing traffic

  • Creates virtual circuits for communication

  • More intelligent than hubs

  • Reduces network congestion


Hub

Characteristics:

  • Basic network connection device

  • Broadcasts data to all connected devices

  • No traffic management capabilities

  • Operates at physical layer of OSI model

  • Simpler and less intelligent than switches

  • Creates single collision domain

  • Becoming obsolete in modern networks


Channels

Characteristics:

  • Pathways for data transmission

  • Can be physical or logical

  • Have defined bandwidth capacity

  • May use frequency division or time division

  • Subject to noise and interference

  • Have measurable signal-to-noise ratios

  • Can be shared or dedicated


Network Interface

Characteristics:

  • Physical connection point to the network

  • Contains unique MAC address

  • Handles low-level protocol operations

  • Converts computer data to network signals

  • Available in various speeds and standards

  • Can be integrated or expansion cards

  • Includes both hardware and driver software


3.4C Characteristics of Computing Networks

Interoperability

Characteristics:

  • Allows different systems to work together

  • Based on common standards and protocols

  • Vendor-independent functionality

  • Enables heterogeneous network environments

  • Reduces proprietary lock-in

  • Supports backward compatibility

  • Facilitates network expansion


Domain Names

Characteristics:

  • Hierarchical naming structure

  • Human-readable addresses

  • Mapped to IP addresses through DNS

  • Organized into top-level domains (.com, .org, etc.)

  • Governed by ICANN globally

  • Can be registered through accredited registrars

  • Subject to trademark and legal considerations


IP Addresses

Characteristics:

  • Numerical identifiers for network devices

  • Hierarchical structure for routing

  • IPv4 (32-bit) or IPv6 (128-bit) formats

  • Can be static or dynamically assigned

  • Divided into network and host portions

  • Organized by regional internet registries

  • Subject to subnet masking for network division


Identification

Characteristics:

  • Process of claiming an identity

  • Uses credentials (usernames, IDs, etc.)

  • First step in access control

  • Can be anonymous or authenticated

  • May use biometric factors

  • Increasingly linked across services

  • Subject to identity management systems


Authentication

Characteristics:

  • Verifies claimed identity

  • Uses various factors (knowledge, possession, inherence)

  • Can be single or multi-factor

  • Provides access control foundation

  • Ranges from simple to complex methods

  • Increasingly biometric-based

  • Critical security component


Encryption

Characteristics:

  • Transforms data into protected format

  • Uses mathematical algorithms

  • Requires keys for encryption/decryption

  • Can be symmetric or asymmetric

  • Variable strength based on key length

  • Computationally intensive

  • Fundamental to secure communications


Firewall

Characteristics:

  • Monitors and filters network traffic

  • Enforces access control policies

  • Can inspect at different OSI layers

  • Maintains connection state information

  • Available as hardware or software

  • Often includes logging capabilities

  • First line of network defense


Proxy Server

Characteristics:

  • Acts as intermediary for client requests

  • Can cache frequently requested content

  • Provides anonymity for clients

  • Filters content based on policies

  • Can improve performance

  • Logs client activities

  • Centralizes access control


Virtual Private Network (VPN)

Characteristics:

  • Creates encrypted tunnel over public networks

  • Extends private network across public infrastructure

  • Provides authenticated remote access

  • Masks user's original IP address

  • Circumvents geographical restrictions

  • Various protocols (OpenVPN, IPsec, etc.)

  • Increasingly used for privacy protection


Security Layers

Characteristics:

  • Multiple defensive mechanisms working together

  • Provides redundancy in security controls

  • Different controls address different threats

  • Implements defense-in-depth strategy

  • Includes technical and procedural elements

  • Adapts to changing threat landscape

  • More robust than single security measures


Bandwidth

Characteristics:

  • Maximum data transfer capacity

  • Measured in bits per second

  • Limited by physical medium

  • Shared among network users

  • Can be symmetric or asymmetric

  • Subject to contention during high usage

  • Critical factor in network performance


Data Compression

Characteristics:

  • Reduces data size for transmission

  • Can be lossless or lossy

  • Various algorithms for different data types

  • Trade-off between size and quality/precision

  • Improves effective bandwidth utilization

  • Reduces storage requirements

  • Computation overhead in encoding/decoding


Net Neutrality

Characteristics:

  • Principle of equal treatment of all internet traffic

  • Prevents throttling or prioritization based on content

  • Subject to varying regulatory approaches

  • Impacts business models of ISPs

  • Affects innovation and market competition

  • Political and economic implications

  • Controversial policy area globally


Internet Backbone

Characteristics:

  • Principal high-capacity data routes

  • Uses fiber optic technology

  • Connects major network providers

  • Transcontinental and transoceanic connections

  • Managed by tier 1 network providers

  • Multiple redundant pathways

  • High bandwidth capacity


3.4D Computing Network Providers and Services

Internet Service Provider (ISP)

Characteristics:

  • Provides internet connectivity to customers

  • Various connection technologies (DSL, cable, fiber)

  • Different service tiers based on speed

  • Often bundled with other services

  • Subject to telecommunications regulations

  • Regional or national coverage areas

  • Variable quality of service guarantees


Chat Services

Characteristics:

  • Real-time text-based communication

  • Often includes multimedia sharing

  • Group or one-on-one conversations

  • Persistent or ephemeral message history

  • Increasingly encrypted

  • Often integrated with other platforms

  • Synchronous communication model


Texting Services

Characteristics:

  • Short message communication

  • Originally limited to 160 characters (SMS)

  • Cell network or internet-based transmission

  • Often asynchronous usage pattern

  • Delivery confirmation capabilities

  • Increasingly supports rich media

  • Ubiquitous across mobile platforms


Email Services

Characteristics:

  • Store-and-forward message system

  • Headers and body structure

  • Support for attachments

  • Address-based routing

  • Asynchronous communication

  • Various protocols (SMTP, IMAP, POP3)

  • Vulnerable to spam and phishing


File Sharing Services

Characteristics:

  • Enables distribution of digital content

  • Various permission models

  • Centralized or distributed architectures

  • Version control capabilities

  • Synchronization across devices

  • Size limitations vary by service

  • Integration with productivity tools


VoIP Services

Characteristics:

  • Voice transmission over IP networks

  • Lower cost than traditional telephony

  • Variable quality depending on network conditions

  • Requires minimal bandwidth

  • Increasingly integrated with video

  • Subject to latency concerns

  • Compatible with traditional phone systems


Online Messaging Services

Characteristics:

  • Platform-specific communication tools

  • Often includes presence indicators

  • Increasingly multimedia-capable

  • Persistent conversation history

  • Cross-device synchronization

  • Integration with other platform services

  • Both synchronous and asynchronous use


Hosting Services

Characteristics:

  • Provides infrastructure for websites/applications

  • Various service levels (shared, dedicated, cloud)

  • Managed or unmanaged options

  • Includes storage, bandwidth, computing resources

  • Different pricing models

  • Technical support offerings

  • Range of performance guarantees


Video Conferencing Services

Characteristics:

  • Real-time video/audio communication

  • Multiple participant capability

  • Screen sharing and collaboration tools

  • Recording capabilities

  • Bandwidth-intensive

  • Various quality options based on connection

  • Increasingly AI-enhanced features


3.4E The World Wide Web

World Wide Web

Characteristics:

  • Information system accessible via internet

  • Interconnected hypertext documents

  • Accessed through browsers

  • Built on HTTP protocol

  • Contains static and dynamic content

  • Organized through URL addressing

  • Constantly evolving content and standards


URL (Uniform Resource Locator)

Characteristics:

  • Standard format for web resource addresses

  • Contains protocol, domain, path components

  • Hierarchical structure

  • Can include query parameters

  • Case-sensitive paths

  • Supports internationalized domains

  • Fundamental to web navigation


HTTP (Hypertext Transfer Protocol)

Characteristics:

  • Application layer protocol

  • Request-response model

  • Stateless by design

  • Plain text format

  • Multiple request methods

  • Status code responses

  • Extensible header system


Browser

Characteristics:

  • Software for accessing web content

  • Renders HTML, CSS, JavaScript

  • Manages cookies and local storage

  • Extension/plugin capabilities

  • Security sandboxing for content

  • Increasingly standards-compliant

  • Varied rendering engines


World Wide Web Consortium (W3C)

Characteristics:

  • International standards organization

  • Develops web standards

  • Open membership model

  • Consensus-based process

  • Focus on accessibility

  • Technology-neutral approach

  • Promotes interoperability


3.4F Evolution of the Internet and the Web

Web 1.0

Characteristics:

  • Static content

  • Read-only experience

  • Limited user interaction

  • Directory-based navigation

  • Simple HTML design

  • Clear separation between creators and users

  • Limited multimedia capabilities


Web 2.0

Characteristics:

  • User-generated content

  • Social interaction emphasis

  • Dynamic content

  • Rich user interfaces

  • API-based service integration

  • Cloud-based applications

  • Collaborative content creation


Web 3.0

Characteristics:

  • Semantic data structures

  • Decentralized architecture

  • Blockchain integration

  • User data ownership

  • AI-driven experiences

  • Interoperable platforms

  • Trustless transactions


Social Media Platforms

Characteristics:

  • User profile-centered design

  • Content sharing capabilities

  • Network/connection visualization

  • Engagement metrics

  • Algorithmic content curation

  • Advertising-based business models

  • Mobile-first experiences


Internet of Things (IoT)

Characteristics:

  • Embedded computing devices

  • Network connectivity for physical objects

  • Sensor integration

  • Automated data collection

  • Often limited user interfaces

  • Variable security implementations

  • Machine-to-machine communication


Ubiquitous Networking

Characteristics:

  • Anytime, anywhere connectivity

  • Seamless transition between networks

  • Location-aware services

  • Always-on connections

  • Distributed computing resources

  • Edge processing capabilities

  • Background synchronization


3.4G Internet Dilemmas

Privacy Concerns

Characteristics:

  • Tension between service personalization and data collection

  • Question of informed consent

  • Metadata collection issues

  • Cross-platform tracking

  • Data retention policies

  • Increasingly regulated area

  • Cultural differences in expectations


Anonymity and Surveillance

Characteristics:

  • Technology enabling anonymous activity

  • State and corporate monitoring capabilities

  • Balance between security and privacy

  • Chilling effect on expression

  • Technological arms race

  • Legal framework variations globally

  • Metadata analysis capabilities


Right to be Forgotten

Characteristics:

  • Tension with historical record

  • Implementation challenges

  • Jurisdictional limitations

  • Balance with public interest

  • Technical complexity of complete removal

  • Evolving legal framework

  • Question of who decides what should be forgotten


Spyware

Characteristics:

  • Covert operation

  • Data exfiltration capabilities

  • Various infection vectors

  • Range from marketing tools to state-sponsored

  • Difficult to detect

  • Often bundled with legitimate software

  • Privacy and security implications


Identity Theft

Characteristics:

  • Misuse of personal information

  • Financial motivation typical

  • Long-term impact on victims

  • Increasingly sophisticated methods

  • Exploits verification weaknesses

  • Preventive measures struggle to keep pace

  • Cross-jurisdictional enforcement challenges


Cybercrime

Characteristics:

  • Digital means or targets

  • Evolution of traditional crimes to digital realm

  • Jurisdictional complexity

  • Attribution challenges

  • Increasingly organized criminal enterprises

  • Technical and non-technical elements

  • Rapid evolution of techniques


Hacking

Characteristics:

  • Unauthorized system access

  • Various motivations (financial, political, personal)

  • Range of technical sophistication

  • Exploits known and unknown vulnerabilities

  • Both automated and manual techniques

  • Defensive and offensive variations

  • Legal and illegal applications


Computer Viruses

Characteristics:

  • Self-replicating code

  • Various propagation methods

  • Payload execution capabilities

  • Evolution to evade detection

  • Range from nuisance to destructive

  • Increasingly targeted

  • Defense requires multiple approaches


Spam

Characteristics:

  • Unsolicited bulk messages

  • Commercial motivation typically

  • Low success rate compensated by volume

  • Various filtering techniques to combat

  • Adapts to circumvent filters

  • Economic model relies on minimal response

  • Present across multiple communication channels


Social Engineering

Characteristics:

  • Psychological manipulation rather than technical exploitation

  • Exploits human trust and behavior patterns

  • Often precursor to technical attacks

  • Difficult to defend through technical means alone

  • Various techniques (phishing, pretexting, baiting)

  • Highly effective despite awareness

  • Targets organizational weaknesses


Ransomware

Characteristics:

  • Encrypts victim data

  • Demands payment for decryption

  • Often uses cryptocurrency for payment

  • Increasingly targeted at high-value victims

  • Double extortion techniques emerging

  • Significant financial and operational impact

  • Growing as a criminal business model


Denial of Service (DoS)

Characteristics:

  • Overwhelms system resources

  • Distributed attack sources (DDoS)

  • Various attack vectors

  • Amplification techniques

  • Difficult to distinguish from legitimate traffic

  • Often used as distraction for other attacks

  • Mitigation requires specialized techniques


Dark Web

Characteristics:

  • Requires specialized software to access

  • Not indexed by standard search engines

  • Enhanced anonymity for users

  • Mix of legitimate and illegal activities

  • Decentralized structure

  • Fluctuating accessibility

  • Alternative to censored communications


Trolling

Characteristics:

  • Intentionally provocative behavior

  • Aims to cause emotional response

  • Ranges from mild to severe harassment

  • Often exploits platform features

  • Community norm violations

  • Response often amplifies impact

  • Challenging content moderation problem


IB DP Digital Society - Section 3.4 Networks & the Internet Practice Exam Questions

Define/State Questions

  1. Define the term "network" as used in digital society.

  2. State three different types of computing networks based on geographic scope.

  3. Define the term "internet backbone" and state its importance in network infrastructure.

  4. State four components typically found in a computing network.

  5. Define "virtual private network (VPN)" and state one primary purpose for its use.

  6. State three differences between the internet and the World Wide Web.

  7. Define "bandwidth" as it relates to computing networks.

  8. State two characteristics of peer-to-peer (P2P) networks.


Identify Questions

  1. Identify three types of security measures used to protect computing networks.

  2. Identify four network services commonly provided by Internet Service Providers.

  3. Identify two key differences between HTTP and HTTPS protocols.

  4. Identify three components of a URL (Uniform Resource Locator).

  5. Identify four internet dilemmas related to privacy and security.

  6. Identify three characteristics that distinguish Web 2.0 from Web 1.0.

  7. Identify two roles of the World Wide Web Consortium (W3C).


Outline Questions

  1. Outline three key differences between wired and wireless networks.

  2. Outline the relationship between domain names and IP addresses in computing networks.

  3. Outline two ways that data compression affects network performance.

  4. Outline how client-server architecture functions in a typical network environment.

  5. Outline the concept of net neutrality and its significance for internet users.


Describe Questions

  1. Describe three security challenges associated with the Internet of Things (IoT).

  2. Describe how encryption contributes to network security.

  3. Describe two ways that firewalls protect networks from unauthorized access.

  4. Describe the role of protocols in ensuring interoperability between different network systems.

  5. Describe how social engineering differs from technical hacking as a cybersecurity threat.


Explain Questions

  1. Explain how distributed denial of service (DDoS) attacks impact network availability.

  2. Explain two ways that Web 3.0 differs from previous iterations of the World Wide Web.

  3. Explain how routers and switches perform different functions in a computer network.

  4. Explain the significance of the transition from IPv4 to IPv6 addressing.

  5. Explain how ransomware attacks have evolved as a cybersecurity threat.


Compare Questions

  1. Compare local area networks (LANs) and wide area networks (WANs) in terms of scale and typical applications.

  2. Compare the client-server model with the peer-to-peer model of network architecture.

  3. Compare Web 1.0 and Web 2.0 in terms of user participation and content creation.

  4. Compare wired and wireless networks in terms of security vulnerabilities.

  5. Compare HTTP and HTTPS in terms of data security and user privacy.


Suggest Questions

  1. Suggest two ways that computing networks might evolve in the next decade.

  2. Suggest three strategies that individuals can implement to protect their privacy online.

  3. Suggest two potential impacts of widespread IoT adoption on network infrastructure requirements.

  4. Suggest how the concept of the "right to be forgotten" presents both opportunities and challenges for digital society.

  5. Suggest two ways that network providers could address issues of digital inequality in access to high-speed internet.


Discuss Questions

  1. Discuss how the evolution from Web 1.0 to Web 3.0 has changed user engagement with online content.

  2. Discuss the relationship between increasing network connectivity and potential cybersecurity vulnerabilities.

  3. Discuss how issues of anonymity and accountability create tensions in online environments.

  4. Discuss the role of standards and protocols in enabling global internet communication.

  5. Discuss how the dark web represents both legitimate privacy concerns and potential for criminal activity.



network study in DIGITAL SOCIETY
Network study in DIGITAL SOCIETY


Commenti


  • Instagram
  • Youtube
  • X

2024 IBDP DIGITAL SOCIETY | LUKE WATSON TEACH

bottom of page