uccser/cs-field-guide

View on GitHub
csfieldguide/curriculum_guides/content/en/apcsp/sections/the-internet.md

Summary

Maintainability
Test Coverage
# The Internet

## Overview

- EU 6.1 The Internet is a network of autonomous systems.
- EU 6.2 Characteristics of the Internet influence the systems built on it.
- EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it.

## Reading from the Computer Science Field Guide

- [Network Communication Protocols]('chapters:chapter' 'network-communication-protocols')
- [Coding - Encryption]('chapters:chapter' 'coding-encryption')

## Learning objectives

The above chapter readings include specific knowledge for EKs marked in bold.
Work to include unmarked learning objectives in the CS Field Guide is currently in progress.

### LO 6.1.1 Explain the abstractions in the Internet and how the Internet functions.

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for LO 6.1.1):
  
Specific devices used to implement the abstractions in the Internet are beyond the scope of this course and the AP Exam.

{panel end}

- EK 6.1.1A The Internet connects devices and networks all over the world.
- EK 6.1.1B An end-to-end architecture facilitates connecting new devices and networks on the Internet.
- **EK 6.1.1C Devices and networks that make up the Internet are connected and communicate using addresses and protocols.**
- EK 6.1.1D The Internet and the systems built on it facilitate collaboration.
- EK 6.1.1E Connecting new devices to the Internet is enabled by assignment of an Internet protocol (IP) address.
- EK 6.1.1F The Internet is built on evolving standards, including those for addresses and names.

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.1.1F):
  
Specific details of any particular standard for addresses are beyond the scope of this course and the AP Exam.

{panel end}

- EK 6.1.1G The domain name system (DNS) translates domain names to IP addresses.
- EK 6.1.1H The number of devices that could use an IP address has grown so fast that a new protocol (IPv6) has been established to handle routing of many more devices.
- EK 6.1.1I Standards such as hypertext transfer protocol (HTTP), IP, and simple mail transfer protocol (SMTP) are developed and overseen by the Internet Engineering Task Force (IETF).

### LO 6.2.1 Explain characteristics of the Internet and the systems built on it.

- EK 6.2.1A The Internet and the systems built on it are hierarchical and redundant.
- EK 6.2.1B The domain name syntax is hierarchical.
- EK 6.2.1C IP addresses are hierarchical.
- EK 6.2.1D Routing on the Internet is fault tolerant and redundant.

### LO 6.2.2 Explain how the characteristics of the Internet influence the systems built on it.

- EK 6.2.2A Hierarchy and redundancy help systems scale.
- EK 6.2.2B The redundancy of routing (i.e., more than one way to route data) between two points on the Internet increases the reliability of the Internet and helps it scale to more devices and more people.
- EK 6.2.2C Hierarchy in the DNS helps that system scale.
- **EK 6.2.2D Interfaces and protocols enable widespread use of the Internet.**
- EK 6.2.2E Open standards fuel the growth of the Internet.
- **EK 6.2.2F The Internet is a packet-switched system through which digital data is sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data.**

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.2.2F):
  
Specific details of any particular packet-switching system are beyond the scope of this course and the AP Exam.

{panel end}

- **EK 6.2.2G Standards for packets and routing include transmission control protocol/Internet protocol (TCP/IP).**

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.2.2G):
  
Specific technical details of how TCP/IP works are beyond the scope of this course and the AP Exam.

{panel end}

- **EK 6.2.2H Standards for sharing information and communicating between browsers and servers on the Web include HTTP and secure sockets layer/transport layer security (SSL/TLS).**

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.2.2H):

Understanding the technical aspects of how SSL/TLS works is beyond the scope of this course and the AP Exam.

{panel end}

- EK 6.2.2I The size and speed of systems affect their use.
- EK 6.2.2J The bandwidth of a system is a measure of bit rateā€”the amount of data (measured in bits) that can be sent in a fixed amount of time.
- EK 6.2.2K The latency of a system is the time elapsed between the transmission and the receipt of a request.

### LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it.

- EK 6.3.1A The trust model of the Internet involves trade-offs.
- EK 6.3.1B The DNS was not designed to be completely secure.
- EK 6.3.1C Implementing cybersecurity has software, hardware, and human components.
- EK 6.3.1D Cyber warfare and cyber crime have widespread and potentially devastating effects.
- EK 6.3.1E Distributed denial-of-service attacks (DDoS) compromise a target by flooding it with requests from multiple systems.
- EK 6.3.1F Phishing, viruses, and other attacks have human and software components.
- EK 6.3.1G Antivirus software and firewalls can help prevent unauthorized access to private data.
- **EK 6.3.1H Cryptography is essential to many models of cybersecurity.**
- **EK 6.3.1I Cryptography has a mathematical foundation.**

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.3.1I):

Specific mathematical functions used in cryptography are beyond the scope of this course and the AP Exam.

{panel end}

- EK 6.3.1J Open standards help ensure cryptography is secure.
- **EK 6.3.1K Symmetric encryption is a method of encryption involving one key for encryption and decryption.**

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.3.1K):
  
The methods used in encryption are beyond the scope of this course and the AP Exam.

{panel end}

- **EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides.**

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.3.1L):
  
The mathematical methods used in public key cryptography are beyond the scope of this course and the AP Exam.

{panel end}

- EK 6.3.1M Certificate authorities (CAs) issue digital certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model.

{panel type="teacher-note"}

# EXCLUSION STATEMENT (for EK 6.3.1M):
  
The technical details of the process CAs follow are beyond the scope of this course and the AP Exam.

{panel end}