Posts

Showing posts from October, 2017

Activity Guide- B&W Pixelation Widget

Image
0000 1010 0000 1010 0 0 0 0 0 0 0 0 0 0  1 1 1 1 1 1 0 1 1 1  1 1 1 1 1 1 0 1 1 1  1 1 1 1 1 1 0 1 1 1  1 1 1 1 1 1 0 1 1 1  1 1 1 1 1 1 0 1 1 1  1 1 1 1 1 1 0 1 1 1  1 1 1 1 1 1 0 1 1 1  0 1 1 1 1 1 0 1 1 1  0 0 0 0 0 0 0 1 1 1 

Lesson 2: Text Compression Activity

Look for patterns (repeated words or phrases) in the text. Enter the patterns you see into the dictionary on the right. As you type entries into the dictionary, the symbol for the entry is inserted into the text in place of the pattern. Need help? See these videos and hints Text compression widget Compressed Text: So_wake_me_up_when_it's_all_over_When_ ☆ _wiser_and_ ☆ _older_All_this_time ☂☃ _finding_myself_And ☂☀☂★ __ ☀☂★☂☀☂★☂☀☂★☂☀ _( ☀ ,_ ☀ ) The Dictionary: ☀  didn't_know ☂ _I_ ☃  was ☄ lost ★ ☃_☄ ☆ I'm ☇ when Compression Rate: 37.5%

Flash Talk Mini Project Reflection (Internet Censorship/DNS Spoofing)

Part 3. Presentation and Explanation-  Internet Censorship Rubric (Olivia)      Internet Censorship is an ongoing issue over 3 billion people. Many people believe that "filtering" presents freedom of people and has someone decide on which type of content is allowed or not allowed. A blacklist of sites can be made by packets. When the DNS was entered from a blocked site, the site will redirect you to a page that states that you can not go any further. Blocked sites in Germany include child pornography, facts that the Holocaust never happened, and Nazi information. Censorship the government made said is to make a safe environment for everybody. DNS Spoofing Rubric (Andrei) DNS spoofing is when a computer acts like it has a DNS instead of the actual computer with the DNS which allows hackers to infiltrate other users on the internet. Usually the computer that's "spoofing" sends information to the servers that is is somewhere else. Because of this...

Net Neutrality- Flash Talk

Part 1:  Part 1: Pick and Research your Issue (Josh Lim) ●      Your selected issue: Pick one of the issues listed above that interests you the most or that you’d like to know more about.      Reference 1: Start by looking at the wikipedia article and scan the article for content related to Internet topics covered in class. ●      The focus of your speech: Find an item or element of the article that interests you on which to base your 2-minute flash talk. ●      Reference: 2 and beyond: Read further about the issue. Find at least two other articles (outside of Wikipedia) that relates to the issue. Record your research in the organizer provided here: My Selected issue: Net Neutrality Focus of my flash talk: Data Discrimination The position I will take in my talk: Striving for internet equality What is the reference? What did I learn from this reference? Wh...

Blown to Bits pp. 309-316 & pp.73-77 Reflection (Homework- 9/13/17)

Homework:   Blown to Bits (www.bitsbook.com), Appendix The Internet as System and Spirit, pp. 309-316 (The Internet Spirit) Answer the following questions: The layers of protocols used in network communication is an example of abstraction. Can you give other examples of abstraction in everyday life? When you browse to a web page, maybe with some animated advertisements embedded on it, describe in detail what happens behind the scenes to display that page on your browser. Blown to Bits (www.bitsbook.com), Chapter 3 , Ghosts in the Machine: Secrets and Surprises of Electronic Documents, pp. 73-77 Question about abstraction: Discuss how not knowing some basics of how a software tool or computer works, and the abstractions they use, could lead to bad outcomes. Blown to Bits pp. 309-316 & pp.73-77 Reflection: I think that the same concept of abstraction would be like a television monitor protocol because if we swap channels and games on a console/...

HTTP and Abstraction Reflection

Day 2: HTTP  and Abstraction            Important vocabulary and concepts                Abstraction: what is it?                Server and clients: What are they, how do they interact with each                     other?            Use of some Developer Tools                Paired partner activity to discover and observe HTTP traffic What surprised you about the HTTP traffic you observed? What does it mean to say that high-level layers of the Internet use low-level layers “abstractly”? What other examples of abstraction have we seen in this course? Hint: Unit 1 is basically all about abstraction. HTTP Refle...

Internet Traffic Article Reflection (Homework- 10/12/17)

Day 1: Rapid research on articles below related to internet traffic. Think pair share jigsaw article rapid research Homework:   Read one of the articles from the attachment below.  In  a google doc shared with stark.brooklinehighschool@gmail.com, share what article you read and what questions you have after reading the article. I have read the China’s Great Firewall article. From reading the article, China’s government censor many non-verified websites to millions of internet users to other random websites. This is due to changing the Domain Name System (DNS). However, these types of rerouting can lead to malicious DDOS attacks. The government has power to commit these types of attacks to computers intentionally or accidentally. One main question I have about this article is that did any of the citizens from China have done anything to the government involving censorship online.

Blown to Bits Appendix/Ch.3 Reflection (Homework- 10/11/17)

Day 3: Packets and redundancy Homework due Wednesday, Oct 11: Blown to Bits (www.bitsbook.com), Appendix - The Internet as System and Spirit, pp. 301-309, “The Internet as a Communication System,” then answer the following question: It is interesting to think about the foresight (or luck?) that caused initial Internet designers to choose a packet-switched network as the basis for the Internet. What do you think, foresight or luck? Blown to Bits (www.bitsbook.com), Chapter 3 - Ghosts in the Machine, pp. 91-92, “Data Formats as Public Property,” then answer the following question: What do you think the Internet would be like today if different companies’ network protocols were still competing for adoption for the Internet, instead of TCP being the de facto standard? Blown to Bits Ch.3 Reflection- (by Josh Lim) I believe it is foresight because they were not fully aware on their issues at the time. The designers from the experiments would have trouble understan...

DNS Reflection

Day 4: DNS Unplugged Activity with addresses Code.org After the activities in class reflect on the following: What is DNS? Why does the Internet use IP addresses? The Internet uses IP addresses because when sending information over, the computer needs to know where to get it from and to send it. Why don’t we need to know IP addresses? We don’t need to know IP addresses because the Domain Name System (DNS) already does the job of searching for the IP address. Why do we need a Domain Name System? We need a Domain Name System (DNS) because it translates human-readable names into an IP address of a website or computer that we are unable to do ourselves. Why don’t we all maintain our own DNS? We all don’t maintain our own DNS because it would be very inefficient to keep everyone’s DNS on your record. Is there one big DNS for the entire Internet? There is no big DNS for the entire internet as it is not centralized. This system is just used to track down addre s...

Routed Traffic Reflection

Routed Traffic Reflection- 1.) Describe the relative benefits of routing over a broadcast style of communication. Is routed traffic more secure than broadcasting? Justify your answer. Routing messages to a certain IP address rather than broadcasting the message reduces the number of people who automatically see it, and addressed traffic is more secure than broadcasted. 2.) Can you know in advance the path a message will take between you and another computer on the Internet? Justify your answer. No, you don’t know the certain path a message will take in advance because the most efficient route between two computers will change depending on how heavy the traffic is and which other routers are online.

Security Reflection (Homework- 10/04/17)

Homework : Reflection for next class(google doc, share with stark.brooklinehighschool@gmail.com. Then post to your blog): If your messaging scheme your group designed was used on the Internet, what could go wrong in terms of security and privacy? What could a malicious person do? What if the messages sent were something personal such as a conversation or communication with a bank not just a game? Identify the security problems with your messaging scheme. Security Reflection- If my messaging scheme my group designed was used on the internet, security and privacy could go wrong because strangers are given clear details on the conversation that our group is having such as the names of everyone and the topic we are discussing about. A malicious person would steal this information or either impersonate someone of our group interfering with our protocol. If the messages were send to somewhere personal, malicious people could use this information for hacking, stealing, and releasin...

IP Addresses and DNS Reflection Questions

IP Addresses and DNS Reflection Overview This video features the father of the Internet, Vint Cerf, and Microsoft engineer, Paolo Mejia, addressing the question, “How does data know where to go on the Internet?” They introduce the concepts of Internet Protocol (IP) addresses and the Domain Name System (DNS). In this worksheet, you will use ideas covered in the video as well as search for information on the Internet to answer questions… about the Internet! Directions Watch the video, “IP Addresses and DNS.” Research any additional information required using an Internet search engine. Questions What is a protocol? A protocol is a standard procedure that everyone can follow in order to communicate with each other without any hassle of some sort. What is an Internet Protocol (IP) address? How is it organized hierarchically? An Internet Protocol (IP) address is an list of digits that describe your computer like an address to a home. It is o...