Class Session: Wednesday Sep 05, 2018
Here is a screen shot of the group you are in and term to research before class.
Next to your name is a topic that you need to learn about in a bit more depth. You should be able to learn about the topic from the video, so watch the video first. Try to understand your topic in the context of the video. Then Google the topic and find out a bit more about it. Look it up on more than one site. Just be able to explain it. Don't go overboard with a long report. One or two sentences. A paragraph at the most.Be prepared before class starts. You will get into your groups and make sure everyone in the group understands all the terms for your group. After everyone in each group discusses these topics in the group, we will have an overall class discussion about what you have learned through this process.
These Khan Academy videos serve as a great introduction to our Networking session. I want you to actively watch these videos before coming to class so read over the associate keywords I have listed on this page under each video link. Most of these keywords are at least briefly mentioned in the video.
This class will be collaborative in nature and you will have the opportunity to get to know your classmates better.
If I have found any other relevant links or videos associated with the term, that term will have an link to the source. if you see this arrow , then I have provided a related link that was not mentioned in the videos.
measuring data: binary, bit, byte, kilobyte, megabyte, gigabyte, terrabyte
data throughput and speed: bandwidth, bitrate, latency, requesting device
modes of transmitting data: copper wire, electricity, light, fiber optic cable, thread of glass, bounce angle, radio signal, wireless, signal degradation, wifi, satellite
⇒ Pinging a a domain to find the IP address:
computername:~ username$ ping unc.edu
PING unc.edu (18.104.22.168): 56 data bytes
early numbers are usually country numbers and regional numbers then subnetworks the the address of the device
IP packets, routes, cheapest path, TCP, TCP/IP ⇒TCP Joke
TCP inventory, acknowledgment, verification, sign, scaleable
URL, server, HTTP, GET Request, HTML
HTTP POST, SSL, TLS, HTTPS
encryption, Caesar's Cipher, algorithm, key, 256 bit keys ⇒ random key generator, symmetric encryption, asymmetric key, private key, public key
Cybersecurity viruses, DDOS attacks, phishing, hacker, botnet
We will spend more time working with Unix in this class session.