Unit 1 - The Internet
Lesson 3: Sending Binary Messages with the Internet Simulator
How do we create a physical network for digital communication? We will be trying to develop a communication protocol.
- We will see if you can decode the message in this flashlight test.
- We will define the terms protocol & bit
- Experiment with your partner and try to figure out the Internet Simulator
- We will clarify any misconceptions about the Internet Simulator as a group
- After experimenting, we will watch this video about the Internet Simulator
- Use the Internet Simulator to complete this activity
- We will finish by watching the video The Internet: Wires, Cables, & Wifi
Binary Numbers & Characters - 8 bits, use this chart to write your name (whichever is shortest) in binary
Sending Formatted Text Activity - Use the Internet Simulator (from Unit 1 Overview link) to complete this activity
- Use 7 bits per chunk
ASCII Characters/Code - The Dec number is what you would use for binary, 7 bits
Lesson 8: The Internet Is for Everyone
Lesson 9: The Need for Addressing
Take a few minutes and discuss your protocol for communicating hits and misses during the game. Here's the catch, you won't be able to talk.
We'll check out the new version of the Internet Simulator and you can try to play a few silent rounds using your protocol.
Now that you've had a chance to play, take it a step further. In your groups, use the link below to create a binary protocol for this game. Send this to me on Schoology.
We'll look at one possible solution after you've finished. Here are a few key terms from this lesson:
- IP Address
Lesson 10: Routers and Redundancy
What is an internet router? Find a definition. We'll look at how our curriculum defines a router.
- We'll look at the new internet simulator and how it works
- We'll send some experimental messages with the simulator
- Complete this activity: Routers and Redundancy
.. Send it to me on Schoology with your names
Here are some key takeaways we want to get:
- Not all messages will go through
- Messages can travel different routes and end up at the same place
- It is possible for a router to read the traffic that moves across it
- Redundancy is important
Minimal Spanning Trees
Sometimes we use computers to find the best solution to a problem. There are many situations where a network will connect together different pieces. In computer science we may call these networks 'graphs'.
The Mud City Problem - You will try to solve this problem in class
How does it apply? - How this applies to the real world
Scribble Maps - Use this tool to apply what you learned to a real life situation. Use the same conditions as the Mud City problem for Kensal, ND.
Lesson 12: The Need for DNS
This lesson explains the importance of DNS and looks at some vulnerabilities.
First we'll use the internet simulator to interview a classmate. Here are the instructions and interview questions. As you are working, I will randomly come around and have you disconnect and reconnect from the simulation. This will simulate changing IP addresses.
- Growing Threat of DDoS on DNS
- The Details Behind a Denial of Service Attack: What it is, Why it Matters, and What You can do to Stop it
- How to Launch a 65Gbps DDoS, and How to Stop One
- How DNS Works
- DDoS Attacks Against NATO Likely DNS Amplification or NTP Reflection, Expert Suggests
- DNS Flood DDoS Attack Hit Video Gaming Industry with 90 Million Requests per Second
- St. Louis Federal Reserve Suffers DNS Breach
- China Great Firewall Causing DDoS Attacks
- Turkish ISPs Intercept Google DNS Service to Spy on Internet Users
- DDoS Attacks Double But Could go Bigger Still With IPv6
- New Zealand Internet Providers Threatened with Legal Action for Providing Access to US Netflix
Send your sheets to me on Schoology.
Here are some main questions we want to be able to answer from this section:
- Why does the Internet use IP addresses?
- Why don’t we need to know IP addresses?
- Why do we need a Domain Name System?
- Why don’t we all maintain our own DNS?
- Is there one big DNS for the entire Internet?
- How do you think all these DNS servers are maintained?
- What is one vulnerability of DNS and how is that vulnerability attacked?
- What are the implications of an attack on a DNS server (or severs) - how does this affect your life?
Lesson 13: HTTP and Abstraction on the Internet
In this lesson, we want to learn what HTTP is and what it does. We also want to understand that HTTP is a high level protocol (same level as DNS) and sits above the other layers. Each layer uses the functionality of other layers, but doesn't care about how it happens. Each layer is focused on their own job.