Class Session: Wednesday Jan 24, 2018
We are doing this class Monday, January 29, in place of the lab. Here is a link to the class exercise we will do today.
Don't forget about making blog posts or other parts of your Value Added grade component.
These Khan Academy videos serve as a great introduction to our Networking session. I want you to actively watch these videos before coming to class so read over the associate keywords I have listed on this page under each video link. Most of these keywords are at least briefly mentioned in the video.
This class will be collaborative in nature and you will have the opportunity to get to know your classmates better, so this class will affect your value added grade more significantly than any other class this semester. If you are 🤧contagious🤒, though, don't bring your germs to class; I will find a way for you to make up the class 👍 .
If I have found any other relevant links or videos associated with the term, that term will have an link to the source. if you see this arrow , then I have provided a related link that was not mentioned in the videos.
measuring data: binary, bit, byte, kilobyte, megabyte, gigabyte, terrabyte
data throughput and speed: bandwidth, bitrate, latency, requesting device
modes of transmitting data: copper wire, electricity, light, fiber optic cable, thread of glass, bounce angle, radio signal, wireless, signal degradation, wifi, satellite
Vint Cerf, Bob Kahn, internet, internet protocol (IP), network, ISP, IP address(es), IP hierarchy
⇒ Pinging a a domain to find the IP address:
computername:~ username$ ping unc.edu
⇒ Result:
PING unc.edu (152.2.64.93): 56 data bytes
early numbers are usually country numbers and regional numbers then subnetworks the the address of the device
IP4,IPv6, DNS, DNS server, zones, domain, top level domain (official list)
IP packets, routes, cheapest path, TCP, TCP/IP ⇒TCP Joke
TCP inventory, acknowledgment, verification, sign, scaleable
URL, server, HTTP, GET Request, HTML
HTTP POST, SSL, TLS, HTTPS
encryption, Caesar's Cipher, algorithm, key, 256 bit keys ⇒ random key generator, symmetric encryption, asymmetric key, private key, public key
Cybersecurity viruses, DDOS attacks, phishing, hacker, botnet
We will spend more time working with git and Unix in this class session.