Skip to content
Technologies · Year 6 · Connected Worlds: Networks and Security · Term 2

How Information Travels Online

Students explore the idea that information sent online is broken into small pieces and sent along different paths, eventually rejoining at its destination.

ACARA Content DescriptionsAC9TDI6K02

About This Topic

Cybersecurity and Privacy is an increasingly vital topic for Year 6 students as they become more active in online spaces. This topic covers how to protect personal information, the importance of strong, unique passwords, and how to identify common digital threats like phishing and malware. In the Australian Curriculum, this falls under the 'Networks and Security' strand, where students are expected to implement protocols for safe and ethical online behavior.

Students also explore the concept of a 'digital footprint' and how the data they share today can have long-term consequences. They learn that privacy is not just about hiding secrets, but about having control over their own information. This topic is particularly effective when students can engage in role plays or mock scenarios, allowing them to practice their 'skepticism' and decision-making in a safe, controlled environment.

Key Questions

  1. Explain why sending information in small pieces might be a good idea.
  2. Compare sending a letter directly to someone versus sending it through many different post offices.
  3. Predict what might happen if one path for information is blocked on the internet.

Learning Objectives

  • Explain how breaking information into packets improves transmission efficiency and resilience.
  • Compare the journey of a data packet across a network to the postal service delivery of a letter.
  • Predict the impact of network congestion or a blocked path on data packet delivery.
  • Analyze the role of routers and network infrastructure in directing data packets.

Before You Start

Digital Citizenship and Online Safety

Why: Students need a foundational understanding of online interactions and the concept of sending information digitally before exploring how it travels.

Basic Computer Hardware

Why: Familiarity with devices like computers and modems helps students visualize the physical components involved in sending and receiving information.

Key Vocabulary

PacketA small, fixed-size piece of data sent over a network. Information is broken into packets for transmission.
RouterA device that forwards data packets between computer networks. Routers direct packets along the most efficient path.
IP AddressA unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
Network PathThe sequence of connections and devices that data packets travel through from source to destination.
Data TransmissionThe process of sending digital information from one device to another over a communication channel.

Watch Out for These Misconceptions

Common MisconceptionStudents often think that 'incognito mode' or deleting a post makes their data completely private or gone forever.

What to Teach Instead

Explain that once data is sent to a server, it is out of your control. Use the 'ink in water' analogy: once you drop it in, you can't really get it all back. Peer discussion about how servers store data helps reinforce this.

Common MisconceptionMany learners believe that hackers only target 'important' or 'rich' people.

What to Teach Instead

Clarify that many cyber threats are automated and look for *any* weak password or vulnerable account. A simulation showing how a 'bot' can try thousands of passwords a second helps students see they are all potential targets.

Active Learning Ideas

See all activities

Real-World Connections

  • Internet Service Providers (ISPs) like Telstra or Optus manage vast networks of routers and cables to ensure data packets reach homes and businesses efficiently. They troubleshoot issues when connections are slow or unavailable.
  • Cloud computing services rely on the efficient and resilient transmission of data packets. Companies like Amazon Web Services (AWS) design complex networks that can reroute data if one server or connection fails, ensuring services remain available.
  • Video conferencing platforms such as Zoom or Microsoft Teams depend on packets arriving in the correct order and with minimal delay. Network engineers work to optimize these paths to prevent lag and dropped calls.

Assessment Ideas

Quick Check

Present students with a scenario: 'Imagine you are sending a large drawing to a friend online. Why is it better to send it as many small pieces instead of one giant file?' Have students write down two reasons.

Discussion Prompt

Ask students to compare the internet to the postal service. 'If you wanted to send a secret message to someone across the country, would you send one big envelope or many small, numbered envelopes? What are the pros and cons of each method for both the internet and the post?'

Exit Ticket

Give students a diagram showing a simple network with a few routers. Ask them to draw a possible path for a data packet from computer A to computer B. Then, ask: 'What might happen if the connection between Router 1 and Router 2 was cut?'

Frequently Asked Questions

What makes a password 'strong' for a Year 6 student?
A strong password is long (at least 12 characters) and uses a mix of uppercase, lowercase, numbers, and symbols. A great tip for students is to use a 'passphrase', a string of random words like 'BlueToasterJumping7!', which is easy for them to remember but very hard for a computer to guess.
How do I explain 'phishing' simply?
Phishing is when someone 'fishes' for your private information by pretending to be someone you trust, like a bank, a game company, or even a friend. They usually send an email or message with a link that asks you to log in or provide details, but the link goes to a fake site they control.
Why is 'Two-Factor Authentication' (2FA) important?
2FA is like having two different locks on your front door. Even if a hacker steals your password (the first key), they still can't get in without the second 'key', which is usually a code sent to your phone. It's one of the best ways to keep accounts safe.
How can active learning help students understand cybersecurity?
Cybersecurity can feel like a list of 'don'ts.' Active learning, such as 'The Phishing Detective' role play, turns it into a skill-building exercise. By actively looking for red flags and debating the safety of different online behaviors, students develop the critical thinking 'muscles' they need to stay safe in real-world digital environments.