Chapter 4 - Networking and the Internet
General Outcomes
- Explain how a network consists of a number of autonomous systems communicating through established protocols.
- Identify and define the main components and terminology of computer networks.
- Explain how the Internet consists of multiple networks connected together through packet switching.
- Identify and define the main components and terminology of the Internet.
- Explain the abstractions in the Internet and how the Internet functions.
- Describe how the Web is an example protocol used on the Internet that displays web pages in a client-server model.
- Identify and define the main components and terminology of the World Wide Web.
- Explain how cybersecurity is an important concern for networks and the software that is built on them.
- Identify cybersecurity concerns concerning networks and users.
- Consider how the implementation of networks and software that is built on them can have important societal and ethical concerns.
- Discuss ethical issues when networks or network software fail to do what the user intends them to do.
Reading Guide
In order to guide your reading we have designated each section into one of three categories:
- Essential - You should thoroughly read this material and be prepared to answer questions about this material in both discussions and on assessments.
- Important - You should read this material and be prepared to participate in potential discussions/activities about this material. While this material will not be directly assessed, your understanding of this may help you support/improve your answers to "Essential" material.
- Useful - We feel that this material is worth knowing and may supplement other material in the chapter. However, we do not plan on assessing or discussing (unless you ask questions).
Section | Essential | Important | Useful |
---|---|---|---|
4.1 Network Fundamentals | |||
4.2 The Internet | |||
4.3 The World Wide Web | |||
Web Implementation | |||
HTML | |||
XML | |||
Client-Side and Server-Side Activities | |||
4.4 Internet Protocols | |||
4.5 Simple Client Server | |||
4.6 Security | |||
Forms of Attack | |||
Protection and Cures | |||
Cryptography | |||
Legal Approaches to Network Security |
Video Resources
The following videos are used in individual lessons during the study of this chapter. Their links are consolidated here for easy reference.- Crash Course Computing #: Computer Networks
- Crash Course Computing #: The Internet
- Crash Course Computing #: The World Wide Web
- Crash Course Computing #: Cybersecurity
- Crash Course Computing #: Hackers & Cyber Attacks
- Crash Course Computing #: Cryptography (optional)
The following were UNI produced supplemental videos.
- Dr. Diesburg explains networks
- Network traffic to load a webpage
- Firewalls
- Dr. Diesburg explains the elements of a URL
- Dr. Diesburg explains internet applications
Study Guide
The competency demo for this chapter will consist of several questions from the following study guide. As you study this chapter we suggest you work through the materials in this study guide and ask questions if you need clarifications.