Week 8

Introduction to Data Retention

  • Focus on retaining data about individuals’ online activities.

  • Context of discussion: Understanding how the Internet works to address data retention.

  • Key Question: How can one determine the real-world identity of individuals committing online crimes?

The Complexity of Identifying Online Users

  • Common misconception: Identifying users through their IP addresses is straightforward.

  • In reality, determining identity through IP addresses is complex and multifaceted.

Understanding the Internet

The OSI Model

  • Purpose: A framework to support communication between computers over networks.

  • Layering Structure: Explanation of the lower layers necessary for computer communication.

Physical Layer

  • Definition: The physical means of establishing a connection between devices.

  • Components: Wiring (e.g., twisted pair cables) and signal specifications.

  • Standards: Includes types of cables (Category standards for twisted pairs, Ethernet standards).

Data Link Layer

  • Role: Establishes protocols to send data over the physical layer.

  • Addressing: MAC (Media Access Control) addresses identify devices on a local network.

  • Collision Management: Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

    • Explanation of how nodes detect and manage data traffic collisions on a network.

Network Layer (IP)

  • Function: Determines how data is sent between devices on different networks.

  • Routing: Focuses on how data packets are directed across multiple networks using routers.

  • IP Addresses: Two versions discussed:

    • IPv4: 32-bit addresses (e.g., 192.168.1.1).

    • IPv6: 128-bit addresses to accommodate more unique endpoints.

  • Subnetting: The use of netmasks to define local network addresses and help routers determine pathway.

Transport Layer

  • Objective: Ensures reliable communication of data across networks.

  • TCP (Transmission Control Protocol): Offers reliability through sequencing packets and acknowledgments.

    • Three-way Handshake: Establishes a connection by synchronizing sequence numbers between sender and receiver.

  • UDP (User Datagram Protocol): Used when reliability isn’t essential (e.g., streaming video).

Application Layer

  • Purpose: Provides the protocols needed for applications to communicate over the network.

  • Example Protocols: HTTP (web traffic), FTP (file transfers), SMTP (email).

  • Data Interpretation: The format defined by application layer protocols is essential for data exchange.

Additional Considerations

Problems in Identifying Users

  • NAT (Network Address Translation): Used to conserve IPv4 addresses; many devices share a single external IP, complicating tracking.

  • Essential for cybersecurity concerns surrounding criminal activities online.

  • How NAT leads to ambiguity in identifying users behind a single router IP.

Discussion of Future Developments

Transition to IPv6

  • Anticipated need to transition from IPv4 as the pool of IP addresses diminishes.

  • Challenges in interoperability between IPv4 and IPv6 devices.

Conclusion

  • Understanding the architecture of the internet is fundamental to discussing data retention and identifying users online.

  • Questions remain on the effectiveness of current methods in determining online criminal activities.

robot