Unit 3. Information and the Internet
Revision Date: Jan 04, 2020 (Version 3.0)Pre-lesson Preparation
This lesson will require some room setup or prep for best delivery of instruction. Some of the setup should have been done in the previous lesson.
Summary
In this lesson, students will expand their knowledge of how the Domain Name System (DNS) works by acting as a class to simulate the use of DNS to retrieve web pages.
Once the simulation is functioning students enhance its efficiency through the use of caching.
Poison the DNS cache by adding false DNS replies (DNS poisoning).
Students discuss with their groups how DNS works and how it supports Internet growth.
Then they explain in their journals how:
DNS works
Caching is both a benefit and a security risk.
DNS supports Internet growth.
In this lesson, students will expand their knowledge of how DNS works by acting out a simulation of DNS in action and using it to retrieve web pages. This is a two-session lesson. The first session is for students to get the simulation functioning, with the teacher serving as director. As students realize they need to "fix" their implementation of the simulation (modify their scripts), they record the insights in their journals.
In Session Two, students take on different roles and conduct a dress rehearsal that is entirely student-led. Teachers then introduce DNS caching and DNS poisoning. Once the simulation is functioning, students will address both increased efficiency due to DNS caching, and cybersecurity concerns associated with DNS.
Outcomes
Overview
Session 1 - Acting the Simulation
Session 2 - Round 2 of Simulations
The characteristics of the Internet influence the systems built on it.
Domain Name Servers are essentially the "address book" of the Internet and store information to help Internet systems route transmission requests and replies.
A list of character protocols is provided as a resource. These may help students learn their roles.
Student computer usage for this lesson is: required
This lesson requires extensive preparation.
Acquire:
24 envelopes per class – one or two per host per rehearsal and production.
Post-it Notes
One color for students to use to self-select roles.
One color for students to use to record DNS information.
One color for students to use to initiate requests.
Print:
One copy of character protocols for each student.
One copy of Routing Table.docx for each student router.
One copy of DNS cache for each root, TLD, ANS and local DNS server and each host.
Four copies of each device/character role page (web, router, root, TLD, ANS and local DNS and host).
Three or four copies of the first page web page, grouped by domain.
Warm Up:
Distribute post-it notes to each student.
Casting Characters:
Beside each device listed on the board, there should be the number of students needed to play each role. As soon as students complete their post it notes, have them choose their role by placing the post it notes next to the device name.
Below are suggested numbers of actors per role for two class sizes. Students take their seats and add their name and IP address to their router table.
Device List |
16 Students |
30 students |
Host |
4 |
8 |
Local DNS |
2 |
4 |
Root |
1 |
1 |
Top Level Domain |
2 |
3 |
Authoritative Name |
4 |
6 |
Web Server |
4 |
6 |
Router |
1 |
2 |
Once students select a role, each device group should meet briefly to discuss what information they have to collect from the post-it notes on the board. They will go and obtain either a script that informs them what to do during the play, (how their device works) or all the printed web pages from their server.
Gathering Data:
Post this list of directions and allow devices to go to the board and obtain the required IP address information.
Before the play can start, these seven sets of data still have to be collected.
Notes:
Steps to complete the play:
Explain: Both domain names rules name and IP address rules have changed over time.
Have students watch these two videos:
Afterwards, they should record responses to these two prompts:
Set the stage:
Distribute scripts, envelopes, and post-it notes.
Note: Use the character protocols from the previous session during the dress rehearsal, especially if the students are struggling.
This play is improvisational with Hosts requesting whichever pages they want. Restart the system with all Hosts online.
Introduce the security problems associated with plain text messages and with DNS poisoning:
Students will research this topic and report on security issues (among other aspects of DNS) in their summary report.
If the previous lesson has not been assessed, assign the entire summary in the document entitled "DNS Summary."
The simulation will be acted out at least three times. Students should change to a new role each time.
Use the character protocols during the dress rehearsal.
Students are to reopen their spreadsheets from the previous lesson.
Show the students how to create a simple "if statement" in a spreadsheet. The spreadsheet will become a tool where a user can type a domain name into a cell. If the respective IP address of that domain name is found, then that IP address is shown. If it is not then a "0" appears.
(See the sample spreadsheet in the Lesson Resources folder called "Sample Spreadsheet")
A. Describe one rule change for names used on the Internet. Describe the rule before and after the change.
B. Describe one rule change for IP addresses used on the Internet. Describe the rule before and after the change.
C. Describe briefly the process by which the Domain Name System operates.
D. Briefly describe one way the Domain Name System was not designed to be completely secure.
E. Briefly describe one security concern and one coping strategy for the Domain Name System insecurity.