0% found this document useful (0 votes)
61 views

CSP Unit 2 - The Internet

how the internet works and an overview of the internet components

Uploaded by

sanad.a.haddad
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

CSP Unit 2 - The Internet

how the internet works and an overview of the internet components

Uploaded by

sanad.a.haddad
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 140

Unit 2: The Internet

Table of Contents

Lesson 1: Welcome to the Internet


Lesson 2: Building a Network
Lesson 3: The Need for Addressing
Lesson 4: Routing & Redundancy
Lesson 5: Packets
Lesson 6: HTTP and DNS
Lesson 7: Internet Dilemmas, Pt 1
Lesson 8: Internet Dilemmas, Pt 2
Lesson 9: Assessment Day
Unit 2 - Lesson 1
Welcome to the Internet
Unit 2 Lesson 1 - Warm Up

Prompt:

We’ve learned to represent


images, and text digitally - but
we haven’t discussed what we
do with all this digital data.
How do you see people sharing
this kind of data in the real
world? Who do they want to
share it with and why?
Unit 2 Lesson 1 - Activity

Objectives

You will be able to:

 Identify questions that you have about how the Internet works

 Use the Internet Simulator to communicate information with a


partner

 Create a human/computer network


Unit 2 Lesson 1 - Activity

Prompt: Answer each of these


questions in your notebook

1. What is the Internet?


2. What questions do you have AP CSP
about how the Internet works? n o t eb o o k
Unit 2 Lesson 1 - Activity

Do This: Join your partner in the Internet Simulator on


Level 2

Partner #1 -
(Dani)

Partner #2 -
(Hannah)
Unit 2 Lesson 1 - Activity

Do This:
Explore the Internet
Simulator. How does
it work? What can I
do with it?
Unit 2 Lesson 1 - Activity

Teacher
Demo
Unit 2 Lesson 1 - Activity

Prompt:

How is the Internet Simulator similar to the


Internet?

How is it different?
Unit 2 Lesson 1 - Activity

There are two major issues to think about:

• Net Neutrality: is a raging legal debate about the


principle that Internet service providers should enable
access to all content and applications regardless of the
source, and without favoring or blocking particular
products or websites.

• Internet Censorship: is the attempt to control or


suppress of what can be accessed, published, or viewed
on the Internet by certain people. This can be used to
protect people, but can also be used to limit free speech
Unit 2 Lesson 2 - Warm Up

Prompt:

We explored how the Internet Simulator works,


where each of you were connected to one other
person by a single wire. What are the potential
problems with this setup?
Unit 2 Lesson 2 - Activity

Computer Network
Name:

We are going to build a computer network that will let us communicate with
multiple people. We will be using lines to represent our connections - if two
people are connected with a line, then they are allowed to speak to each other.
Only two people can be connected by a single line, but you can be connected to
multiple people at the same time via multiple lines

Guidelines for all Challenges:


● Only two people can be connected by a single line.
● You can be connected to multiple people at the same time via multiple lines.
Challenge #1:
Create a network where people at each letter can speak directly to everyone else at the
other letters.
Insert as many lines as needed
A

B C
F

D E
Guideline #1:
Lines cost money, so try to use the least number of lines possible
Challenge #2:
Create a network that uses the least number of lines
Insert as many lines as needed

B C
F

D E
Guideline #1:
Lines cost money, so try to use the least number of lines possible

Guideline #2:
Lines can be cut, which might disconnect people from the
network
Challenge #3:
Create a network that keeps everyone connected even if one of the lines is cut
Insert as many lines as needed

B C
F

D E
Guideline #1:
Lines cost money, so try to use the least number of lines possible

Guideline #2:
Lines can be cut, which might disconnect people from the
network

Guideline #3:
Direct Connections are faster than long paths with indirect
connections
Challenge #4:
Create a network that you feel balances all 3 guidelines
Insert as many lines as needed

B C
F

Guideline #1: D E
Lines cost money, so try to use the least number of lines possible

Guideline #2:
Lines can be cut, which might disconnect people from the network

Guideline #3:
Direct Connections are faster than long paths with indirect connections
Prompt:

Thinking about our 3 guidelines, what is a strength of the network you created?
● Answer:

What is a weakness for the network you created?


● Answer:
Unit 2 Lesson 2 - Wrap Up

Computing Device: a machine that can run a program, including


computers, tablets, servers, routers, and smart sensors

Computing System: a group of computing devices and programs


working together for a common purpose

Computing Network: a Path: the series of


group of interconnected connections between
computing devices capable computing devices on a
of sending or receiving data. network starting with a
sender and ending with a
receiver.

Bandwidth: the maximum amount of data that can be sent in a fixed amount
of time, usually measured in bits per second.
Unit 2 Lesson 2 - Wrap Up

Prompt:

How would you use these words to describe


today’s activity?
Computing Device
Computing System
Computing Network
Path
Unit 2 - Lesson 2
The Need for Addressing
Unit 2 Lesson 3 – Objectives

Objectives
Students will be able to:

• Explain the need for open and shared protocols for communicating on the
Internet

• Describe the way the Internet Protocol helps uniquely identify one another
on the Internet
Unit 2 Lesson 3 - Warm Up

Prompt:

Imagine you were in a room with 5 other


people, all with the same name as you.

What might happen when you start


communicating?
This is a real group chat someone created on Facebook 😂 →

Prompt: Let’s say this group chat was used to plan and complete a
group project. What would be tricky about the communication?
What rules would you propose to overcome some of these
challenges?

Communication Challenges


Proposed Rules to Overcome Challenges





Unit 2 Lesson 3 - Activity

Internet Simulator
Do This:
● Go to Lesson 3 - Level 2
● Join a room with your group
mates.
● Agree on a communication
protocol that identify the
sender and the reciever
without using you names

● No talking!
Unit 1 Lesson 1 - Set Up

Create a Code Studio account at:


studio.code.org

Join our class section:


Block H: studio.code.org/join/NNKSWT
Block G: studio.code.org/join/BBZZNQ
Block E: studio.code.org/join/MZLNQX
Unit 2 Lesson 3 - Activity

Videos
Do This:
● Watch the videos in the lesson guide
Unit 2 Lesson 3 - Wrap Up

Protocol: An agreed-upon set of rules that specify the


behavior of some system

IP Address: The unique number assigned to each device


on the Internet.

Internet Protocol (IP): a protocol for sending data across


the Internet that assigns unique numbers (IP addresses) to
each connected device
How the internet works

What is IP?
A number that identifies each sender or receiver of information on the internet
TWO formats of IP:
● IPV4 --- 32 BITS
● IPV6 --- 128 BITS (accommodates many more devices)
Who controls the internet?
amazing thing is that no single person, government, or corporation is in charge.

Rather, it is a collection of citizens and volunteers interested in defining the standards


who formed a volunteer organization called the Internet Engineering Task Force to
develop and promote voluntary internet standards IETF.
Unit 2 Lesson 3 - Wrap Up

All devices and computers on the Internet use IP to connect and communicate
with each other.

Devices are assigned unique numbers (converted to binary sequences) called


IP addresses.

All devices format the sender and receiver information the same way so that
devices on different networks can still communicate.

These shared rules are called protocols. The Internet as we know it is actually
these sets of protocols that are used to communiate over networks.
Unit 2 Lesson 3 - Homework

Homework
Unit 2 - Lesson 3
Routing & Redundancy
Unit 2 Lesson 3 – Objectives

Objectives

Students will be able to:


• Explain how data is routed through the Internet
• Describe how the redundant nature of networks
can lead to dynamic, fault tolerant routes
Unit 2 Lesson 4 - Warm Up

Prompt:

At the end of the pervious class, we saw that the


Internet uses the Internet Protocol and IP Addresses
to communicate across the shared Internet. How is
this system similar to how we send letters in the
mail? And how is it different?
Unit 2 Lesson 4 - Activity

Updated Internet Simulator

Step 1: Open the Internet Simulator


● Connect to the same router number as your group

Step 2: Say Hello!


● Use the updated version of the Internet Simulator to send a
message saying hello to everyone in your group.
● Everyone now has an IP Address!
This will be important in today’s
simulation.
Unit 2 Lesson 4 - Activity

Open the Router Logs


Step 1: Open the Log Browser

Step 2: Look at the Messages


Unit 2 Lesson 4 - Activity

Open the Router Logs


Step 3: View All Messages (including other routers)
Unit 2 Lesson 4 - Activity

Silly Class Survey


Use the Router Logs to choose an IP address from each of the other routers.

Send each person a message asking who they are and choose one of the
following questions:

● What is your favorite food?


● What do you think about Mr. Sanad?
● Do you understand how routers work?
● What is your favorite type of animal?
● What is your favorite color?

Be sure to also respond to questions you get from people on other routers!
Unit 2 Lesson 4 - Activity

Open the Router Logs


Open the Router Logs Again. You should see a lot more messages
now
Unit 2 Lesson 4 - Activity

Prompt:

Can you predict why some messages are


appearing multiple times?
Unit 2 Lesson 4 - Activity

Do This:
1) Pick someone on a different router and send three separate
messages with your top three favorite movies or TV shows.

2) After you send the messages, open the router logs and find these
same messages in the logs. Notice how these messages traveled
through the network. Did they always take the same path from
your router to the other router?

3) Look at other messages that are being sent. Are there any patterns
in the paths that they take?
Unit 2 Lesson 4 - Activity

Prompt: What did you notice about the


messages you sent in the router logs?

Did they always take the same path from your


router to the other router?
TCP
TCP is a network protocol that allows two computer to
communicate and transfer data between them. It has the core
function of delivering packets of information from a source
device to a target device. It handles packet ordering or error
checking.
Unit 2 Lesson 4 - Wrap Up

Router: A type of computer that forwards data across a network

Redundancy: the inclusion of extra components so that a system can


continue to work even if individual components fail, for example by
having more than one path between any two connected devices in a
network.

Fault Tolerant: Can continue to function even in the event of individual


component failures. This is important because elements of complex
systems like a computer network fail at unexpected times, often in
groups.
Unit 2 Lesson 4 - Wrap Up

Prompt:
Thinking about these terms (router, redundancy,
and fault tolerant), how can we describe what
we’ve observed in the router logs at the end of this
activity?
What are some practical reasons that you think
messages might take different paths from one
router to the other?
Unit 2 - Lesson 5
Packets
Unit 2 Lesson 5 - Objectives

Objectives

1. Describe how information flows through the Internet as a


datastream of packets
2. Understand how packet numbering and re-ordering can allow
for large messages to be sent even if packets are dropped or
arrive out of order
3. understand the differences between the Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP
Unit 2 Lesson 5 - Warm Up

Prompt:
Suppose our school library is moving to a new building on
campus and the librarian has asked for your help.
1. What approach would you take if you just needed to clear out
the space by the end of the day?

2. How would your approach change if you had more time and
wanted to check that every book made it safely and was on the
same shelf it was on before the move?
Unit 2 Lesson 5 - Warm Up

Case 1: You would just load them into boxes and carry them
over. You might even be ok if some were lost or the order got
messed up. What matters is speed.

Case 2: You need to have some kind of record keeping to make


sure that every book was recorded as well as the order it was
placed in.

In both cases you wouldn't move the entire library at once, you
would move boxes or chunks of books at a time.
Unit 2 Lesson 5 - Warm Up

Today we’ll learn about two new protocols, one for when
speed is most important, and one when accuracy is most
important.
Unit 2 Lesson 5 - Warm Up

Two protocols used to send data as packets are UDP and TCP.

UDP  User Datagram Protocol: simply sends all the packets.


If some arrive out of order or are entirely missing there's no
system to fix the errors.
TCP Transmission Control Protocol: It numbers packets
before sending them so that the receiver can correctly reorder
the packets and request missing packets to be resent .
Unit 2 Lesson 5 - Activity

Do This:

● Navigate to Level 2
Unit 2 Lesson 5 - Activity

Updated Internet Simulator


Open the Internet Simulator
● Join a different router than your partner
● Ask your partner for their IP address.
● Using only the simulator, have a conversation about one of these
topics:
○ Your favorite movie
○ Your favorite band/artist
○ The one superpower you wish you had
● Try to discover every way the simulator is different than last time.
Unit 2 Lesson 5 - Activity

What changed?
● A single message can be made up of
many “packets” which you can add
with the “Add Packet” button
● Packets can only be 80 bits long
○ 16 bits are already used for
packet metadata, data added to
help route the messages
○ You only have 64 bits, or 8 ASCII
characters free for each of your
messages
Unit 2 Lesson 5 - Activity

Packets
You should have:
Activity Guide
Unit 2 Lesson 5 - Activity

Protocol 1 - Just Send the Packets

Send a single message that


includes 5 - 10 packets to your
partner.
Unit 2 Lesson 5 - Activity

Read the Traffic


Step 1: Open the Log Browser

Step 2: Filter to your traffic on all routers

Step 3: Read the traffic and answer the questions in your activity
guide.
Unit 2 Lesson 5 - Activity

Discuss: Responses to the


Activity Guide questions

● Packets can take different paths or be dropped, just like messages


in the previous lesson
● As a result, messages may arrive out of order or incomplete
● While a human might be able to understand the original message
based on context, a computer would not, the message would
simply be lost
● This protocol is simple and fast, but not very accurate
Unit 2 Lesson 5 - Activity

There’s two protocols commonly used to send packets online, and depending on the
situation websites will choose the one that makes sense.
User Datagram Protocol (UDP)

Main Idea Like Protocol 1 or clearing out the library


as fast as you can, the goal is to send
information quickly without worrying
about accuracy.
Basics of how it
works Send all the packets but don’t check if
they all get through or arrive in the
right order.
Use in real life
Useful when split seconds matter more
than correcting errors, like video-
conferencing, live streaming, online
gaming
Unit 2 Lesson 5 - Activity

Protocol 2 - Check for Errors


Unit 2 Lesson 5 - Activity

There’s two protocols commonly used to send packets online, and depending on the
situation websites will choose the one that makes sense.
User Datagram Protocol (UDP) Transmission Control Protocol (TCP)

Main Idea Like Protocol 1 or clearing out the library Like Protocol 2 or numbering every book
as fast as you can. The goal is to send in the library. It’s slower but more
information quickly without worrying accurate.
about accuray.
Basics of how it Number packets so they can be re-ordered,
works Send all the packets but don’t check if
confirm all were received, resend any
they all get through or arrive in the
missing packets. Multiple back and forth
right order.
confirmations between sender and receiver.

Use in real life


Useful when split seconds matter more Useful when accuracy matters more than
than correcting errors, like video- saving a split second, like sending emails,
conferencing, live streaming, online photos, or just browsing websites
gaming
Unit 2 Lesson 5 - Wrap Up
Datastream: Information Packet: A chunk of data sent
passed through the over a network. Larger
internet in packets. messages are divided into
packets that may arrive at the
destination in order, out-of-
order, or not at all.
Packet Metadata: Data
The IP address of the sender and
added to packets to help receiver helps route the message.
route them through the
network and reassemble
the original message.

Transmission Control Protocol User Datagram Protocol


(TCP): A protocol for sending (UDP): A protocol for sending
packets that does error-checking packets quickly with minimal
to ensure all packets are received error-checking and no
and properly ordered resending of dropped packets

X X
Unit 2 - Lesson 6
HTTP and DNS
Unit 2 Lesson 6 - Objectives

Objectives

Students will be able to:

• Learn about HTTP & DNS protocols


• Describe how HTTP is used for sharing the files and pages over the
internet
• Describe how the Domain Name System helps the Internet to be
scalable
• Explain how different layers of protocols on the Internet rely on
one another
Unit 2 Lesson 6 - Warm Up

Do This: Create a list in your notebooks of


7 of your classmates IP addresses. The only Name IP address
rules:

● You may walk around the room


● You may share information with only
ONE classmate at a time.
Unit 2 Lesson 6 - Warm Up

Prompt: Discuss with your classmates the following prompts

● Why do you think I was switching your classmates’ IP


addresses?
● If IP addresses can change, is there a better way for everyone to
know everyone else’s IP address?
Unit 2 Lesson 6 - Warm Up

If we want the Internet to scale up to billions of


devices, then we need a better way to figure out one
another’s IP addresses!
Unit 2 Lesson 6 - Warm Up

Main takeaways:

1) Devices are joining and leaving the Internet all the time. IP addresses don't
stay constant. If you go to a coffee shop or restart your browser your device
might be assigned a new IP address.

2) If IP addresses are switching, it's very hard for each computer to keep an
accurate list

3) It would make more sense if there were one system that kept track of all that
information.
Prompt: As we watch the following video take notes in your
notebook on:

● How does the DNS solve the problem of translating domain


names like example.com into IP addresses?
● How does the DNS help the Internet scale?
Unit 2 Lesson 5 - Activity

AP CSP
Journal

● How does the DNS solve


the problem of translating
domain names like
example.com into IP
addresses?
● How does the DNS help
the Internet scale?
Prompt: Discuss the following prompts with a partner:

● How does the DNS solve the problem of translating domain


names like example.com into IP addresses?
● How does the DNS help the Internet scale?
Main takeaways:

• The DNS is used to Translate human


friendly names to the associated IP address
(Like a telephone book)

• When you visit a website:


- you first ask the DNS for the IP address of the
domain you want to visit.
- The first server to ask may have to ask other
servers for this information.

• This system allows billions of devices to


get added to the network without putting
pressure on any one computer or server to
know all the IP addresses in the world.
Let’s go use the final version of the Internet Simulator

This time we won’t cheat and ask out loud for one another’s IP
addresses!

Do This:

Go to Level 2
on Code Studio
Do This:

● Log into this version of the Internet Simulator


● No talking at all, not even to get your
partner’s IP address
● Ask the DNS for the IP address of a user by
sending GET username
● Use the IP address you get back to
communicate with at least 2 friends. You can
talk about
○ In your ideal world what time would
school start?
○ What would you eat for your perfect
meal?
Do This: As we watch this video take notes on the HTTP protocol.

● What problem is HTTP solving?


● What is a GET request and what are your requesting?
● How does HTTP rely on the other layers of the Internet?
● What problem is HTTP solving?
● What do certificate authorities do and why are they necessary?
Unit 2 Lesson 5 - Activity
Prompt: Review these questions with a partner about HTTP

● What problem does it solve?


● How does it work?
● How does it rely on the other layers of the Internet?
Main takeaways:

HTTP is an ASCII text based protocol.

HTTP Stands for Hyper-text transfer protocol

HTTP is the language used to communicate between a web browser and a server.

HTTP used for sending and receiving web pages, images, video, audio, and files from the servers
containing them.
Unit 2 Lesson 6 - Wrap Up

Key Takeaways:

Scalability: the capacity for the The Domain Name System (DNS): the
system to change in size and scale to system responsible for translating
meet new demands domain names like example.com into IP
addresses

Hypertext Transfer Protocol


World Wide Web: a system of (HTTP): a protocol for computers to
linked pages, programs, and files request and share the pages that make
up the world wide web on the
Internet

● The World Wide Web is different from the Internet. The World Wide Web are files, web pages and media. The Internet
is the network we use to access those files.

● The DNS is an important system in helping the Internet scale.


Unit 2 Lesson 6 - Wrap Up

Prompt:
The internet is actually made of many protocls that all
work together to move inforamtion over the various
networks. These protocls build upon each other like
layers. Each higher layers rely on the one below them?
Application layer
Transport layer
Internet layer
Physical layer
Unit 2 Lesson 6 - Wrap Up

Prompt:
The internet is actually made Using your Layers of
the Internet activity guide to help you, explain how
each of the different layers is involved when you go
to a link like code.org?

code.org
Unit 2 Lesson 6 - Wrap Up

How Protocols work together!

We imagine outgoing information


going DOWN the stack and
incoming information going UP the
stack.

All of this happens in the network


software on each computer, whether
that computer is your phone, a
laptop, or a server like a DNS or web
server
Unit 2 - Lesson 7
Project - Internet Dilemmas Part 1
Unit 2 Lesson 7 - Warm Up

Review
What is the Questions about
Internet? how it works
Unit 2 Lesson 7 - Activity

Chief
Techno
log
Adviso y
r
Unit 2 Lesson 7 - Activity

Project Guide:
Unit 2 Lesson 7 - Activity

Options:
Net Neutrality Internet Censorship The Digital Divide
Unit 2 Lesson 7 - Activity

Step 1: Choose!
Net Neutrality Internet Censorship The Digital Divide
Unit 2 Lesson 7 - Activity

Step 2: Review the One-Pager


and Rubric
Unit 2 Lesson 7 - Activity

Step 3: Review the Concept Bank


Unit 2 Lesson 7 - Activity

Step 4: Review Your Sources


Unit 2 Lesson 7 - Wrap Up

Digital Divide - any uneven distribution in the


access to, use of, or impact of
information and communications technologies
(ICT) between any number of distinct groups,
which can be defined based on social,
geographical, or geopolitical criteria, or otherwise

Can affect both individual and groups.


● Raises ethical concerns of equity, access, and
influence globally and locally.
● Affected by the actions of individuals,
organizations, and governments.
Unit 2 - Lesson 8
Project - Internet Dilemmas Part 2
Unit 2 Lesson 7 - Activity

Internet Dilemma Policy One Pager

Don't forget to check


the rubric as you work!
Unit 2 Lesson 7 - Activity

Share Out

Net Neutrality
Unit 2 Lesson 7 - Activity

Share Out
Internet Censorship
Unit 2 Lesson 7 - Activity

Share Out

The Digital Divide


Unit 2 Lesson 8 - Wrap Up

Submit

● Your Project Guide


Unit 2 - Lesson 9
Assessment Day
Unit 2 Lesson 9 - Activity

Unit Assessment

You might also like