Focus on retaining data about individuals’ online activities.
Context of discussion: Understanding how the Internet works to address data retention.
Key Question: How can one determine the real-world identity of individuals committing online crimes?
Common misconception: Identifying users through their IP addresses is straightforward.
In reality, determining identity through IP addresses is complex and multifaceted.
Purpose: A framework to support communication between computers over networks.
Layering Structure: Explanation of the lower layers necessary for computer communication.
Definition: The physical means of establishing a connection between devices.
Components: Wiring (e.g., twisted pair cables) and signal specifications.
Standards: Includes types of cables (Category standards for twisted pairs, Ethernet standards).
Role: Establishes protocols to send data over the physical layer.
Addressing: MAC (Media Access Control) addresses identify devices on a local network.
Collision Management: Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
Explanation of how nodes detect and manage data traffic collisions on a network.
Function: Determines how data is sent between devices on different networks.
Routing: Focuses on how data packets are directed across multiple networks using routers.
IP Addresses: Two versions discussed:
IPv4: 32-bit addresses (e.g., 192.168.1.1).
IPv6: 128-bit addresses to accommodate more unique endpoints.
Subnetting: The use of netmasks to define local network addresses and help routers determine pathway.
Objective: Ensures reliable communication of data across networks.
TCP (Transmission Control Protocol): Offers reliability through sequencing packets and acknowledgments.
Three-way Handshake: Establishes a connection by synchronizing sequence numbers between sender and receiver.
UDP (User Datagram Protocol): Used when reliability isn’t essential (e.g., streaming video).
Purpose: Provides the protocols needed for applications to communicate over the network.
Example Protocols: HTTP (web traffic), FTP (file transfers), SMTP (email).
Data Interpretation: The format defined by application layer protocols is essential for data exchange.
NAT (Network Address Translation): Used to conserve IPv4 addresses; many devices share a single external IP, complicating tracking.
Essential for cybersecurity concerns surrounding criminal activities online.
How NAT leads to ambiguity in identifying users behind a single router IP.
Anticipated need to transition from IPv4 as the pool of IP addresses diminishes.
Challenges in interoperability between IPv4 and IPv6 devices.
Understanding the architecture of the internet is fundamental to discussing data retention and identifying users online.
Questions remain on the effectiveness of current methods in determining online criminal activities.