HomeInformation Systems → Unit 3

Networking, Communication, and the Social Internet

A comprehensive lecture on networking, wireless communication, online platforms, digital ethics, and connected technologies.

UNIT 3

Introduction

Information systems are valuable not only because they process and store data, but because they connect people, devices, and organizations. A computer that cannot communicate with anything else is far less useful than one that can exchange information across a classroom, an office, a city, or the world. Networking and communication technologies make that exchange possible. They allow users to browse websites, send messages, collaborate on documents, join video calls, stream media, connect industrial sensors, and automate business operations.

This unit expands the study of information systems from individual devices to connected systems. It moves from physical and logical network design to internet history, wireless access, and organizational networking. It also looks at how communication technologies reshape society. Social media platforms influence culture and strategy. Wireless access increases convenience while introducing new risks. Digital inequality affects who benefits from technological change. Intelligent chatbots raise new questions about trust, authenticity, and social interaction. Finally, the Internet of Things extends networking into homes, factories, vehicles, and wearable devices.

A modern information system is almost always a connected information system. Communication is no longer optional. It is foundational.

Why Networks Matter

A network is a collection of computers and other hardware components connected by communication channels so they can share information and resources. Those resources may include printers, storage, applications, internet access, databases, or cloud services. Networks can connect desktops, laptops, phones, tablets, servers, switches, routers, sensors, and other digital devices into a system that works together instead of in isolation.

Networks matter because they make collaboration and scale possible. Within a small setting, a network allows users to share a single printer or access a common set of files. In a larger setting, it allows an organization to support email, websites, enterprise applications, authentication, databases, security monitoring, and remote access. Across the public internet, networking makes it possible for billions of devices to exchange information using standardized protocols.

Resource Sharing

Networks let multiple users access printers, files, servers, and internet connectivity without duplicating every device and service.

Communication

Email, messaging, web services, voice, and video all depend on reliable data transmission between endpoints.

Coordination

Organizations use networks to connect departments, automate workflows, manage transactions, and make information available in real time.

A Brief History of the Internet and the Web

The roots of modern networking reach back to the Cold War era. After the Soviet launch of Sputnik in 1957, the United States created the Advanced Research Projects Agency to support research that could strengthen national capabilities. One major challenge was that many computers could not communicate with one another. In 1969, ARPANET connected its first four nodes, establishing an early network that became a foundational step toward the modern internet.

As more networks were created, a new problem emerged: different networks used different rules, or protocols, and could not easily communicate. The development of TCP/IP solved this by creating a common protocol framework that allowed separate networks to interconnect. This gave rise to the term internet, meaning a network of networks.

The World Wide Web came later. In 1990, Tim Berners-Lee introduced a way to navigate the internet through linked documents using hypertext. Browsers such as Mosaic and later Netscape made the web graphical and easy to use, which accelerated public adoption. The web then evolved again as platforms enabled ordinary users to create and share content through blogs, social media, wikis, and user-generated communities often associated with Web 2.0.

The internet and the World Wide Web are not the same thing. The internet is the global network infrastructure. The web is one service that runs on top of that infrastructure.

Why This History Matters

Understanding this history clarifies why modern networking depends so heavily on standards. The internet scaled because many different systems agreed to exchange data using common protocols. It also shows how usability changes adoption. The internet existed before the web, but the web made it accessible to ordinary users. Later, social and mobile platforms made participation even easier, shifting users from passive readers to active creators.

Core Networking Vocabulary

Networking has its own vocabulary, but the core concepts are straightforward once they are organized around how data moves from one place to another.

Term Meaning
Packet A small unit of data sent across a network. Messages are broken into packets and reassembled at the destination.
Protocol A set of rules that allows devices to exchange information in a predictable way.
IP Address A numeric identifier assigned to a device on a network so data can be routed correctly.
Domain Name A human-friendly name for a system on the internet, such as a website name.
DNS The domain name system that translates human-friendly names into IP addresses.
Packet Switching The process of moving packets through different network paths until they reach their destination.
IPv4 and IPv6 Two versions of internet addressing. IPv6 greatly expands the number of available addresses.

These concepts help explain why networks are resilient and scalable. Data does not travel as one giant object. It is segmented, labeled, routed, and reconstructed. This process allows networks to recover from delays, reroute around congestion, and connect enormous numbers of devices.

Topologies and Network Components

A topology is the structure or shape of a network. A physical topology describes how devices are actually connected. A logical topology describes how signals or data flow through the network. Understanding topology helps explain cost, reliability, and troubleshooting behavior.

Common Physical Topologies

The diagrams below give you a quick visual reference for the most common network layouts. These are intentionally small enough to fit inside the lecture while still showing the pattern that defines each topology.

Bus topology diagram

Bus

All devices share one backbone cable. It is easy to understand, but if the main line fails, every connected device is affected.

Ring topology diagram

Ring

Each device connects to two neighbors to form a loop. This creates a predictable path, but a break can interrupt traffic unless the design includes redundancy.

Star topology diagram

Star

Every endpoint connects back to one central switch or hub. This is common in modern Ethernet networks because one cable failure usually affects only one device.

Tree topology diagram

Tree

A tree topology links multiple star segments into a hierarchy. It scales well for buildings and campuses, but the upper branches become critical points of dependency.

Mesh topology diagram

Mesh

Devices have multiple paths to one another. That improves resilience and fault tolerance, but the cost and management overhead increase as links multiply.

Logical flow diagram

Logical Flow

The visible cabling is only part of the story. Logical topology focuses on how traffic actually moves, which may differ from the physical layout users can see.

Reading the diagrams: Physical topology explains the cable or radio layout. Logical topology explains the traffic path. In troubleshooting, both views matter because a network may look like a star but behave like a different pattern once switching, VLANs, routing, and protocol rules are involved.

Core Network Components

Networks also depend on specialized hardware components that connect, amplify, separate, and direct traffic.

Component Role in the Network
Network Adapter / NIC Provides the interface between a device and the network and is identified by a unique MAC address.
Repeater Amplifies or regenerates a signal so it can travel farther.
Bridge Connects network segments and helps filter traffic between them.
Hub Broadcasts received traffic to all connected devices. Simple but inefficient compared with modern alternatives.
Switch Forwards traffic to the correct destination based on MAC addressing, making better use of bandwidth.
Router Moves packets between networks and selects efficient paths using IP routing.
Gateway Connects different types of networks or communication systems and translates between them when needed.

Types of Networks

Networks are often categorized by geographic scope. The size of the area they cover affects their design, ownership, cost, and performance expectations.

LAN

A Local Area Network connects devices within a limited area such as a home, office, building, or campus. LANs are common in schools, homes, and businesses.

WAN

A Wide Area Network connects systems across larger distances such as cities, states, or countries. The internet is the best-known example of a WAN.

MAN

A Metropolitan Area Network spans a city or large urban area and sits conceptually between a LAN and WAN.

PAN

A Personal Area Network connects devices over very short distances, often using Bluetooth or Wi-Fi, such as a phone and wireless earbuds.

Wired vs. Wireless

Wired networks traditionally offer strong reliability and predictable performance. Wireless networks offer mobility and convenience. In practice, most modern environments use both. A home may rely on a wired internet connection to a router and then extend access to phones, tablets, laptops, and smart devices through Wi-Fi. Businesses do the same at larger scale, combining Ethernet switching, fiber uplinks, wireless access points, and mobile data networks.

OSI and TCP/IP Models

Because networking involves many technologies working together, it is helpful to think in layers. A layered model separates communication into smaller responsibilities so that engineers, vendors, and software designers can work on one part of the process without redesigning the entire system.

The OSI model is the classic teaching model. It breaks communication into seven layers: physical, data link, network, transport, session, presentation, and application. The model is especially useful in class because it forces us to ask a precise question: At what layer is the problem happening?

OSI model visual aid

The OSI model moves from raw signal transmission at the bottom to user-facing services at the top. Lower layers are closer to hardware. Upper layers are closer to software and user interaction.

OSI Layers Explained

Layer Purpose Examples and Clues
7. Application Provides the network services that users and applications directly interact with. Web browsing, email, file transfer, DNS lookups, browser errors, app connection failures.
6. Presentation Formats, translates, encrypts, or compresses data so two systems can interpret it consistently. Data conversion, SSL/TLS encryption, media encoding, file format translation.
5. Session Creates, maintains, and closes communication sessions between applications. Login sessions, checkpoints in a conversation, reconnect behavior in long exchanges.
4. Transport Handles end-to-end delivery, segmentation, reassembly, reliability, and port numbers. TCP, UDP, retransmissions, ports like 80 and 443, slow or unreliable app delivery.
3. Network Uses logical addressing and routing to move packets between networks. IP addresses, routers, subnets, default gateways, traceroute behavior.
2. Data Link Packages data into frames and manages local delivery across the same segment. MAC addresses, switches, VLANs, frame errors, access port problems.
1. Physical Transmits raw bits through cables, connectors, radio signals, and interfaces. Fiber, copper, Wi-Fi radios, damaged cables, bad transceivers, no link light.

How to Think About the OSI Model

Each layer depends on the one below it. If the physical layer fails, the higher layers never get a chance to work. If the physical and data link layers are healthy but a system still cannot reach a remote site, the problem may sit at the network layer. If the path is good but a specific application still fails, the issue may live near the transport or application layers instead.

This is why the OSI model is so valuable in troubleshooting. It turns a vague complaint such as “the network is down” into smaller checks. Is there a signal? Is there a link? Is there an IP address? Can packets route correctly? Is the correct port open? Is the application itself responding?

TCP/IP as the Practical Internet Model

The TCP/IP model is the more practical architecture used on the modern internet. It groups similar responsibilities into fewer layers and reflects how real protocols are commonly implemented. While textbooks often present the model as four or five layers, the key idea is the same: network communication is divided into functions that work together.

TCP IP model visual aid

TCP/IP is streamlined compared with OSI. In practice, it groups the upper OSI layers together and focuses on the protocols that make internetworking work across real devices and real networks.

TCP/IP Layer Main Job Typical Protocols or Technologies
Application Delivers services directly to user applications and combines several upper-layer OSI functions. HTTP, HTTPS, DNS, SMTP, IMAP, FTP, DHCP, APIs, web browsers.
Transport Provides host-to-host delivery and decides how data should be segmented and controlled. TCP for reliable delivery, UDP for lightweight and fast delivery.
Internet Handles addressing and routing so packets can move between separate networks. IPv4, IPv6, ICMP, routing decisions, packet forwarding.
Network Access Covers how devices actually access the local medium and move frames and bits. Ethernet, Wi-Fi, switches, NICs, MAC addressing, cabling, radio signals.

OSI vs. TCP/IP

The models are not competitors. They serve different purposes. OSI is excellent for learning and structured troubleshooting because it draws fine distinctions between responsibilities. TCP/IP is excellent for understanding the real protocol stack that powers the internet.

A useful mental shortcut: OSI is more detailed. TCP/IP is more practical. If you want a clean teaching model, use OSI. If you want to describe how real internet communication usually works, use TCP/IP.

Layered models matter because they simplify troubleshooting. A failed cable, a bad IP configuration, a routing issue, an SSL certificate problem, and a browser problem may all interrupt communication, but they occur at different layers.

Wireless Communication and Mobile Access

Wireless networking changed the user experience by making information access portable. Instead of being tied to a desk or cable, users can connect through Wi-Fi, cellular data, Bluetooth, and other wireless technologies. This mobility supports modern work, travel, collaboration, and consumer behavior.

Wi-Fi

Wi-Fi converts network access into radio communication that nearby devices can receive using a wireless adapter. It is now common in homes, offices, schools, retail spaces, and public locations. Wi-Fi made laptops, tablets, and phones dramatically more useful because they could remain connected without physical Ethernet cables.

Mobile Networks

Cellular networks brought internet connectivity to phones and other mobile devices. As mobile standards improved from early data access to 3G and then 4G and beyond, smartphones became practical internet devices rather than just voice devices. This shift changed computing behavior by making connectivity constant rather than occasional.

Bluetooth

Bluetooth is a short-range wireless standard designed for device-to-device communication. It is commonly used for headsets, keyboards, mice, printers, watches, speakers, and phone accessories. Although it is not usually the primary path to the internet, it is central to personal area networking and wearable technology.

VoIP

Voice over IP, or VoIP, converts voice into digital data so it can be transmitted over networks. This allows phone calls and voice sessions to run through the same infrastructure that supports internet traffic. Many businesses use VoIP for internal and external communication because it can reduce cost and integrate with other digital services.

Wireless Security at Home and in Public

Wireless networking adds convenience, but it also expands exposure. A wired network usually requires physical access to a cable or switch port. A wireless network broadcasts through the air, which means nearby devices may detect it. If it is poorly secured, that convenience becomes risk.

Home Wireless Risks

An unsecured home wireless network may allow unauthorized users to piggyback on the internet connection, consume bandwidth, monitor traffic, access shared files, or attempt direct attacks on devices. Another risk is wardriving, in which individuals search for exposed wireless networks while moving through neighborhoods or public spaces.

Public Wireless Risks

Public wireless introduces additional threats. An attacker may set up an evil twin access point that impersonates a legitimate hotspot. Unencrypted traffic may be captured through wireless sniffing. Laptops may also be exposed through unsafe file sharing, peer-to-peer connections, or simple shoulder surfing in public places.

Safer Wireless Practices Why They Help
Change default router passwords and IDs Reduces the risk of easy, well-known default access.
Use strong encryption Protects wireless traffic from casual interception.
Disable unnecessary file sharing Limits exposure of local files and folders.
Keep router software updated Patches vulnerabilities and improves protection.
Use a VPN on public networks when possible Adds an encrypted tunnel for traffic in less-trusted environments.
Avoid sensitive activity on untrusted Wi-Fi Reduces the chance of credential theft or financial exposure.
Convenience is one of wireless networking’s greatest strengths, but security must be intentionally configured. The default state is often not the safest state.

Organizational Networking

Networking does not only connect homes and devices. It shapes how organizations function. As computers spread through the workplace, organizations needed ways to share printers, scanners, files, applications, and data. This led to the rise of local area networks, server-based computing, and enterprise communication platforms.

Client-Server Computing

In a client-server model, user devices act as clients that request services from more powerful systems called servers. A file server may store shared documents. A database server may support applications. An authentication server may verify user identity. This model allows organizations to centralize control while still supporting many individual users.

Intranets and Extranets

An intranet is an internal network or collection of internal web resources available to employees inside an organization. It provides a shared digital space for procedures, forms, communication, and collaboration. An extranet extends part of that access to trusted outside users such as customers, suppliers, or partners. In both cases, networking becomes part of organizational strategy, not just technical infrastructure.

VPN and Cloud Services

Organizations also support remote work through virtual private networks and cloud services. A VPN gives an outside user a secure path into internal resources. Cloud computing allows applications and storage to be consumed over the internet rather than kept entirely on local infrastructure. Together, these approaches blur the line between the traditional office network and the broader internet.

Why Networks Become More Valuable as They Grow

Metcalfe’s Law suggests that the value of a network grows rapidly as more users join it. A collaboration platform used by only two people has limited value. A collaboration platform used by an entire organization becomes much more powerful because each person can interact with many others. This helps explain the importance of enterprise communication platforms and social networks alike.

Social Media and Strategic Communication

The social web transformed the internet from a mostly informational environment into an interactive one. Instead of merely viewing content, users now publish, comment, share, react, follow, and participate. For organizations, social platforms are not just marketing channels. They are communication environments where publics expect responsiveness, clarity, and relevance.

Platform Strategy

Effective social media use depends on matching message style to platform behavior. Post length, media format, hashtags, posting frequency, timing, and audience targeting all influence effectiveness. A short post may work well on one platform while a more visual format performs better on another. Strategic communicators must think about the technical rules of the platform and the habits of the audience.

Two-Way Communication

Social media is not just broadcast media. Its power comes from two-way interaction. Polls, comments, shares, likes, direct questions, and public replies create opportunities for dialogue. This feedback loop can strengthen communities, surface concerns, and help organizations measure sentiment. It also means communication can no longer be fully scripted. Audiences respond in real time.

Hashtags, Timing, and Geofencing

Hashtags can help people discover content, join conversations, and locate topic-specific communities. Timing and posting frequency affect visibility and engagement. Geofencing allows organizations to target messages to users in particular geographic areas, which can be valuable for events, alerts, campaigns, or localized information. These tools show that social networking is a blend of communication, analytics, and infrastructure.

Digital and Ethical Issues

Communication technologies do not affect everyone equally, and they do not create only benefits. As networks spread, they raise important questions about access, power, fairness, privacy, and identity.

The Digital Divide

The digital divide refers to the gap between people who have reliable access to digital tools and internet connectivity and those who do not. Access can vary because of income, geography, education, disability, age, or infrastructure limitations. This divide matters because digital access is increasingly tied to education, employment, government services, social participation, and economic opportunity.

Digital Literacy

Access alone is not enough. People also need digital literacy, the ability to find, evaluate, use, share, and create information using digital technologies. Digital literacy includes understanding privacy settings, evaluating online information, participating responsibly in digital communities, and recognizing how online media shapes identity and public discourse.

Privacy, Surveillance, and Platform Power

Networks make constant communication possible, but they also create opportunities for tracking. Service providers, platforms, advertisers, and apps may collect data about behavior, location, preferences, and relationships. This raises questions about informed consent, profiling, data retention, and the responsibility of organizations that control communication infrastructure.

A central ethical issue in networking is not just whether data can be collected, but whether it should be collected, how it is used, and who truly benefits from that collection.

Chatbots, Authenticity, and Human Interaction

As communication shifts toward messaging and conversational interfaces, chatbots have become part of the networking landscape. A chatbot is a program that can send and receive messages, answer questions, or guide users through tasks. Some bots are simple and rule-based, while others use more advanced artificial intelligence techniques. Regardless of complexity, they introduce a new communication challenge: how should a machine behave when people interact with it as if it were socially present?

Why Authenticity Matters

Research on chatbot authenticity points to several traits that make conversational agents more acceptable and trustworthy. An effective agent should have a transparent purpose, learn from experience, behave coherently, demonstrate strong conversational behavior, and in some contexts adopt a more human-like or anthropomorphic style. These traits matter because users judge systems not only by whether they complete a task, but by whether the interaction feels understandable, appropriate, and trustworthy.

Social and Ethical Questions

Chatbots can simplify communication, but they also create risks. A system that appears too human-like may mislead users. A system that is opaque may reduce trust. A system that learns from user behavior may raise privacy concerns. Bots on social platforms may also be used manipulatively to simulate consensus, spread misinformation, or harvest personal information. As a result, designing conversational systems is not merely a technical problem. It is also a social and ethical one.

Trait of a Strong Conversational Agent Why It Matters
Transparent purpose Helps users understand who the agent represents and what it is trying to do.
Learning from experience Allows the system to improve responses and adapt to context.
Conversational skill Supports smoother, clearer, and more useful interaction.
Coherence Keeps responses consistent and connected across a conversation.
Appropriate human-like behavior Can increase comfort and trust when used ethically and transparently.

The Internet of Things

The Internet of Things, or IoT, extends networking beyond traditional computers into everyday objects. Sensors, appliances, industrial machines, wearables, environmental controls, vehicles, and embedded devices can now communicate through wired and wireless networks. This creates a constant flow of data from the physical world into information systems.

IoT environments support real-time analytics, automation, monitoring, and decision-making. In homes, IoT may include cameras, thermostats, locks, lighting, speakers, and energy devices. In business and industry, it may include manufacturing sensors, asset trackers, logistics tools, health monitors, and predictive maintenance systems. IoT helps organizations act faster because the environment itself becomes a source of data.

Why IoT Changes Information Systems

Traditional systems often depended on people entering data manually. IoT allows data to be generated directly by devices and sensors, sometimes continuously. This changes scale, speed, and complexity. The system must now capture, transmit, process, store, secure, and analyze much larger volumes of event data.

Security and Privacy Challenges

IoT also expands the attack surface. Every connected device can become a point of entry, a privacy risk, or a weak link in a larger network. Consumer IoT devices are often especially challenging because vendors vary widely in how they handle updates, support, authentication, and secure design. A smart device that is convenient for a homeowner can also become an attractive target for attackers if it is poorly maintained.

The more the physical world becomes networked, the more cybersecurity becomes a design requirement rather than an optional add-on.

Conclusion

Networking and communication technologies are what turn isolated computers into information systems that matter at scale. They connect users to data, employees to organizations, devices to services, and sensors to decision-makers. From LANs and routers to browsers, wireless hotspots, social platforms, and IoT devices, networking shapes how information moves and how people experience technology.

This unit also shows that communication technology is never purely technical. Every network design includes human consequences. Access can be unequal. Wireless convenience can create security exposure. Social platforms can amplify both participation and manipulation. Chatbots can support users while also challenging expectations about authenticity and trust. IoT can improve insight while increasing privacy and security risk.

To understand modern information systems, it is not enough to know what devices exist. It is necessary to understand how they connect, how they communicate, how they influence organizations and society, and how they should be governed responsibly.