Lab Name |
Sending data with or without encryption
|
Subject Area |
Math, and Computer Science
|
Grade |
7 - 12
|
Topic |
- Math: Function and inverse
- CS: Transferring data with Encryption
|
Experiment Title |
Sending coded/encrypted data
|
Hardware |
- COSMOS Toolkit: Computer Node
|
Software |
- COSMOS Toolkit: Framework
- https://www.asciitohex.com/
|
Number of Sessions to teach the topic |
1 - 3 days
|
Educational standards to be addressed |
- CCSS.Math.Content.HSF.IF.C.9
Compare properties of two functions each represented in a different way (algebraically, graphically, numerically in tables, or by verbal descriptions).
- CCSS.ELA-Literacy.WHST.6-8.2
Write informative/explanatory texts, including the narration of historical events, scientific procedures/ experiments, or technical processes.
|
COSMOS concepts to be used for the lab |
Network security (cryptography) is extremely important in wireless communication. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network.The exponential increase in the use of mobile devices will lead to an increase in security threats. Devices on an unsecured wireless network are vulnerable to attacks. Unauthorized users can steal your personal files, conduct illegal activities, and monitor your web traffic on unsecure networks. Therefore, the use of cryptography is necessary.
|
K12 Educational Goals (How the educational goals are achieved through teaching using the experiment, how the topic is connected to the COSMOS concepts used) |
In this lesson, students will be introduced how data is converted and transferred on between two computers. The activities demonstrates the difference between coding data vs. encrypted data which includes hash values. The connected topic to the COSMOS concept is network security.
|
Short Description and Walk-through of the experiment |
This is a scaffolded lesson as how data is transferred on the wireless internet. It is designed with multiparts where teacher has options to do all or part of the activities.
- First activity is demonstrating transferring ASCII values.
- Second activity is ASCII values plus hash values.
- Third activity is encrypting and decrypting data.
|
Testbed mapping of the experiment |
Network security (cryptography) is extremely important in wireless communication. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. It is a subset of network security that adds protection for a wireless computer network.The exponential increase in the use of mobile devices will lead to an increase in security threats. Devices on an unsecured wireless network are vulnerable to attacks. Unauthorized users can steal your personal files, conduct illegal activities, and monitor your web traffic on unsecure networks. Therefore, the use of cryptography is necessary.
|