AP CSP Internet

Anonymity and Censorship on the Internet

  • Anonymity: Ability of users to operate without revealing their identities.
      - Pros: Offers equal standing to all users, eliminates discrimination.
      - Cons: Can lead to lack of accountability (e.g., cyberbullying).

  • Censorship: Regulation of content on the internet by governments or corporations.
      - Considerations: Balancing freedom of speech with preventing harmful content.


Internet Infrastructure

  • The Internet is a massive network of networks, made possible by various protocols.

  • Protocols: Sets of rules that allow different computing devices to communicate, similar to spoken languages.


Types of Computing Devices

  1. Computing Devices: Physical artifacts that can run a program and process data.
       - Examples: Laptops, smartphones, tablets.
       - Definition: A machine that takes input, processes it, and provides output.

  2. Input Devices: Used to send data to a computer.
       - Examples: Keyboard, mouse, microphone, scanner.
       - User Input Devices: Specific input devices operated by humans, such as keyboards and mice.

  3. Output Devices: Used to convey data from a computer to a user.
       - Examples: Monitors, printers, speakers.

  4. Storage Devices: Used to save data for later use.
       - Examples: Hard drives, SSDs, USB flash drives.

  5. Network Devices: Allow communication between computers.
       - Examples: Routers, modems.


Networking Basics

  • Computer Network: A collection of interconnected devices that can send/receive data.

  • Bandwidth: Maximum data transfer capacity of a network.

  • Latency: Time taken for data to travel from sender to receiver (lower latency is preferred).

  • Bitrate: Number of bits processed in a given amount of time.


Internet Addresses and Protocols

  • IP Address: Unique address for each device on the Internet, structured hierarchically.
       - IPv4: 32-bit addresses (4 octets); limited supply.
       - IPv6: 128-bit addresses; allows for a vastly larger number of devices.

  • Domain Name System (DNS): Translates human-readable domain names (like www.example.com) to IP addresses.

  • URL: Uniform Resource Locator; consisting of the domain and path to a specific resource.


Data Transfer and Communication

  • Data is sent in packets, which are units of data broken down for transmission.

  • HTTP (HyperText Transfer Protocol): Defines how messages are formatted and transmitted over the web.
       - HTTP Request: The message sent by a client (browser) requesting information.
       - HTTP Response: The server's reply containing requested information.

  • Cookies: Small pieces of data stored on a user's device to enhance the web experience.


Cybersecurity Concerns

  • Cybercrime: Criminal acts involving the use of computers or networks.
       - DDoS Attacks: Distributed denial of service attacks that overwhelm a server, causing service outage.
       - DNS Spoofing: A hacker redirects a user from a legitimate site to a malicious one by providing a fake IP address.

  • SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols for encrypting internet communication to ensure data privacy.

  • Phishing: Attempting to obtain sensitive information by impersonating legitimate institutions.

  • Public Key Encryption: A system where one key encrypts data, and a different key decrypts it, enhancing security.


Computing Models

  • Sequential Computing: Tasks are completed one after another.

  • Parallel Computing: Multiple tasks are completed simultaneously on multiple processors.

  • Distributed Computing: Uses multiple connected computers to work on tasks concurrently, enhancing reliability and scalability.


Impact of the Internet

  • Positive Effects:
      - Enhanced collaboration across geographical barriers.
      - Increased access to information and knowledge sharing.
      - Online learning opportunities and e-commerce growth.

  • Negative Effects:
      - Anonymity leading to potential misbehavior online (bullying, harassment).
      - Censorship and control over content accessibility.


Legal and Ethical Issues

  • Copyright Issues: Protects creators' rights over their intellectual property.
     - Digital Millennium Copyright Act (DMCA): Legislation to combat unauthorized sharing of copyrighted content.
     - Creative Commons: Licensing that allows creators to grant certain usage rights to the public while retaining specific rights.


Ethical Debate on Internet Access

  • Digital Divide: Unequal access to the internet across different demographics or regions impacting education and opportunity.

  • Efforts to bridge the gap include projects to enhance internet infrastructure in underserved areas, underlying the necessity of connectivity for modern life.