INLS161-002 | Spring 2017

Session Date: Wednesday Sep 06, 2017

Basics: Networks


Preparations for this Networking Session

These Khan Academy videos serve as a great introduction to our Networking session. I want you to actively watch these videos before coming to class so read over the associate keywords I have listed on this page under each video link. Most of these keywords are at least briefly mentioned in the video.

If I have found any other relevant links or videos associated with the term, that term will have an link to the source. if you see this arrow symbol ⇒, then I have provided a related link that was not mentioned in the videos.

1. Wires Cables and Wifi (less than 7 minutes)

measuring data: binary, bit, byte, kilobyte, megabyte, gigabyte, terrabyte

data throughput and speed: bandwidth, bitrate, latency, requesting device

modes of transmitting data: copper wire, electricity, light, fiber optic cable, thread of glass, bounce angle, radio signal, wireless, signal degradation, wifi, satellite

https://www.submarinecablemap.com/

2. IP addresses and DNS (less than 7 minutes)

Vint Cerf, Bob Kahn, internet, internet protocol (IP), network, ISP, IP address(es), IP hierarchy

⇒ Pinging a a domain to find the IP address:

computername:~ username$ ping unc.edu

⇒ Result:

PING unc.edu (152.2.64.93): 56 data bytes

early numbers are usually country numbers and regional numbers then subnetworks the the address of the device

IP4,IPv6, DNS, DNS server, zones, domain, top level domain (official list)

DNS Propagation Checker

3. Packets Routers and reliability (less than 7 minutes)

IP packets, routes, cheapest path, TCP, TCP/IP  ⇒TCP Joke

TCP inventory, acknowledgment, verification, sign, scaleable

4. HTTP and HTML (just at 7 minutes)

URL, server, HTTP, GET Request, HTML

HTTP POST, SSL, TLS, HTTPS

5. Encryption and Public Keys (less than 7 minutes)

encryption, Caesar's Cipher, algorithm, key, 256 bit keys ⇒ random key generator, symmetric encryption, asymmetric key, private key, public key

6. Cybersecurity and Crime (just at 5 minutes)

Cybersecurity viruses, DDOS attacks, phishing, hacker, botnet

social engineering hacking is not mentioned in this video, but it is very important for you to understand

[top/reload prep panel]

We will spend more time working with git and Unix in this class session.



last page update: Sunday Sep 10, 2017

Instructor

Lawrence Jones

Office hours by appointment.