Week 8
Introduction to Data Retention
Focus on retaining data about individuals’ online activities.
Context of discussion: Understanding how the Internet works to address data retention.
Key Question: How can one determine the real-world identity of individuals committing online crimes?
The Complexity of Identifying Online Users
Common misconception: Identifying users through their IP addresses is straightforward.
In reality, determining identity through IP addresses is complex and multifaceted.
Understanding the Internet
The OSI Model
Purpose: A framework to support communication between computers over networks.
Layering Structure: Explanation of the lower layers necessary for computer communication.
Physical Layer
Definition: The physical means of establishing a connection between devices.
Components: Wiring (e.g., twisted pair cables) and signal specifications.
Standards: Includes types of cables (Category standards for twisted pairs, Ethernet standards).
Data Link Layer
Role: Establishes protocols to send data over the physical layer.
Addressing: MAC (Media Access Control) addresses identify devices on a local network.
Collision Management: Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
Explanation of how nodes detect and manage data traffic collisions on a network.
Network Layer (IP)
Function: Determines how data is sent between devices on different networks.
Routing: Focuses on how data packets are directed across multiple networks using routers.
IP Addresses: Two versions discussed:
IPv4: 32-bit addresses (e.g., 192.168.1.1).
IPv6: 128-bit addresses to accommodate more unique endpoints.
Subnetting: The use of netmasks to define local network addresses and help routers determine pathway.
Transport Layer
Objective: Ensures reliable communication of data across networks.
TCP (Transmission Control Protocol): Offers reliability through sequencing packets and acknowledgments.
Three-way Handshake: Establishes a connection by synchronizing sequence numbers between sender and receiver.
UDP (User Datagram Protocol): Used when reliability isn’t essential (e.g., streaming video).
Application Layer
Purpose: Provides the protocols needed for applications to communicate over the network.
Example Protocols: HTTP (web traffic), FTP (file transfers), SMTP (email).
Data Interpretation: The format defined by application layer protocols is essential for data exchange.
Additional Considerations
Problems in Identifying Users
NAT (Network Address Translation): Used to conserve IPv4 addresses; many devices share a single external IP, complicating tracking.
Essential for cybersecurity concerns surrounding criminal activities online.
How NAT leads to ambiguity in identifying users behind a single router IP.
Discussion of Future Developments
Transition to IPv6
Anticipated need to transition from IPv4 as the pool of IP addresses diminishes.
Challenges in interoperability between IPv4 and IPv6 devices.
Conclusion
Understanding the architecture of the internet is fundamental to discussing data retention and identifying users online.
Questions remain on the effectiveness of current methods in determining online criminal activities.