Skip to content
Computer Science · 9th Grade · The Architecture of the Internet · Weeks 10-18

Internet Infrastructure and IP Addressing

Students will understand how IP addresses and routers manage the flow of packets across a decentralized network.

Common Core State StandardsCSTA: 3A-NI-04

About This Topic

Data routing and protocols are the invisible rules that keep the global internet running. For 9th graders, this topic covers how data is chopped into packets, addressed using IP, and sent across a decentralized network of routers. This aligns with CSTA standards regarding the scalability and reliability of the internet. Students learn that the internet was designed to be resilient, meaning it can still function even if parts of the network are destroyed or offline.

By studying protocols like TCP/IP, students understand how standardized 'languages' allow diverse devices from all over the world to communicate. This connection to global infrastructure helps students see the internet as a physical and logical achievement. Students grasp this concept faster through simulations where they act as routers and packets, experiencing the challenges of traffic and lost data firsthand.

Key Questions

  1. Explain how the internet remains functional even when individual nodes or connections fail.
  2. Analyze the role of IP addresses in directing data packets across the network.
  3. Compare IPv4 and IPv6 addressing schemes and their implications.

Learning Objectives

  • Analyze the path of a data packet from a source to a destination, identifying key routing decisions.
  • Compare and contrast the structure and address space of IPv4 and IPv6.
  • Explain how the decentralized nature of the internet contributes to its resilience against node failures.
  • Design a simple network diagram illustrating the role of IP addresses and routers in data flow.

Before You Start

Basic Networking Concepts

Why: Students need a foundational understanding of what a network is and how devices connect before learning about IP addressing and routing.

Data Representation

Why: Understanding how data is represented in binary is helpful for grasping the structure of IP addresses.

Key Vocabulary

IP AddressA unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves to identify the device and its location.
RouterA networking device that forwards data packets between computer networks. Routers perform the traffic-directing functions on the internet.
PacketA small segment of data that is transmitted over a network. Packets are reassembled at the destination to form the original data.
Decentralized NetworkA network architecture where control and decision-making are distributed among multiple nodes, rather than being concentrated in a single central authority.
IPv4The fourth version of the Internet Protocol, which uses a 32-bit address scheme, allowing for approximately 4.3 billion unique addresses.
IPv6The latest version of the Internet Protocol, which uses a 128-bit address scheme, providing a vastly larger number of unique addresses compared to IPv4.

Watch Out for These Misconceptions

Common MisconceptionData travels in one solid stream like water in a pipe.

What to Teach Instead

Data is broken into small packets that may take different paths to the same destination. Physical simulations where packets are sent out of order help students visualize the reassembly process.

Common MisconceptionThe internet is a centralized system controlled by one entity.

What to Teach Instead

The internet is a decentralized network of networks. Collaborative mapping activities show students that no single router knows the whole path, only the 'next hop' for the data.

Active Learning Ideas

See all activities

Real-World Connections

  • Network engineers at major internet service providers like Comcast or AT&T constantly monitor router performance and IP address allocation to ensure reliable internet access for millions of users.
  • The development of the Domain Name System (DNS) was a direct response to the challenge of remembering numerical IP addresses, allowing us to use human-readable names like google.com instead of long strings of numbers.
  • Cybersecurity analysts use IP address information to track malicious activity, identify the origin of network attacks, and implement security protocols to protect sensitive data.

Assessment Ideas

Exit Ticket

Provide students with a scenario: 'A data packet is sent from a laptop in New York to a server in London. List three devices or network components it will likely pass through and explain the role of its IP address at one of these points.'

Quick Check

Display two IP addresses on the board, one IPv4 and one IPv6. Ask students to write down: 1. Which version is which? 2. One advantage of the newer version. 3. One challenge of transitioning to the newer version.

Discussion Prompt

Pose the question: 'Imagine a major internet backbone cable is cut. Based on what we've learned about decentralized networks and routing, why is it unlikely that the entire internet would stop working?' Facilitate a class discussion, guiding students to mention redundancy and alternative paths.

Frequently Asked Questions

What is a packet?
A packet is a small unit of data sent over a network. It contains the actual information (the payload) plus metadata like the sender's address, the receiver's address, and the packet's order in the sequence.
Why do we need IP addresses?
IP addresses act like mailing addresses for computers. Without a unique address for every device, routers wouldn't know where to send the packets, and the data would never reach its destination.
How does the internet handle lost data?
Protocols like TCP (Transmission Control Protocol) check to see if all packets arrived. If a packet is missing or corrupted, the receiving computer asks the sender to transmit that specific packet again.
How can active learning help students understand routing?
Routing is a dynamic process. By participating in a 'Human Internet' simulation, students feel the pressure of traffic congestion and the need for rerouting. This physical experience makes the abstract logic of network protocols much more intuitive and memorable.