Posts

3/16 Create Project Update

Today I worked on adding the ability to translate numbers into Morse code. To do this I added the Morse code for numbers 0-9 to the beginning of my Morse code list. To account for this I am now subtracting 87 instead of 97 when translating letters into Morse code. I also added a check statement that ends the program if the entered character is not a letter or number.

Questions of the day answers:
4
a
1

Practice Question and Create Project

When building internet networks it is important to consider redundancy. Which of the following is an example of redundancy?

4. ensuring that if any single node in the network were to stop working, packets can still be delivered

Progress on Create Project

The overall goal of my create project is to be able to take in Morse code and translate it into text as well as translate text into Morse code which will be shown through a light. So far I have managed to build a program which takes in text and translates it to Morse code and then blinks a light corresponding with the Morse code. This program also accounts for spaces and upper and lower case.

10 Breakthrough technologies of 2017

Of the MIT list of ten breakthrough technologies of 2017 I am already familiar with "reversing paralysis", "self-driving trucks", "The 360 degree selfie", and "reinforced learning". Each of these things have gained a notable amount of attention in the last year whether it be over controversy or pure innovation. The articles which I should learn more about are "Paying with your face" and "Gene therapy 2.0" as these are both things which will only become bigger in the future. Another topic that I think will almost certainly not go away are botnets from the "Botnets of things" article. I think everyone who owns some form of a computer should be aware of this and be made aware of ways to potentially stop their own devices being used in a botnet. The only thing on this list that I think will go away or at least not become very popular are the 360 degree cameras which are unnecessary in most people's lives until they …

Cryptography Questions

1. Cryptography and ciphers have been used as far back as 2000 B.C. in Egyptian hieroglyphics.

2. FV LV FRRO

3. A Caesar Cipher is an example of a large class of ciphers known as substitution ciphers.

4. Random substitution is much more secure than a Caesar shift because all of the replacements are random rather than the shift which follows a pattern. Because of this the random substitution has around 4x10^26 different possibilities while the shift has only 25.

5. Frequency Analysis

6. According to the reading, a random substitution cipher looks easy to crack but is actually hard to crack.

7. I think it would take me about 5-10 minutes

favicon

Image

IP Blog Post

What is a Protocol?
A well known set of rules and standards used to communicate between machines.

What is an Internet Protocol (IP) address?
A unique set of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

How is it organized hierarchically?
from most broad to most specific it is organized in country/network, region/network, subnetwork, device.

How many bits are in an IPv4 address?
Ipv4 addresses have 32 bits.

How many IPv4 addresses does that mean there are?
This means there are more than 4 billion unique addresses.

What is the difference between IPv4 and IPv6 ?
IPv4 have only 32 bits and provides only 4 billion addresses while IPv6 uses 128 bits and provides 340 undecillion unique addresses.

Why do we need IPv6?
We need IPv6 to accommodate for the increasing number of internet users as it can provide IP addresses for more people than it will ever need to, while IPv4 can only provide for about half of the worlds cur…