The Internet - Lesson 4: Routers and Redundancy

Overview

In this lesson you will explore the benefits (and potential security concerns) associated with routing traffic across the Internet. Building on the introduction to IP addresses in the previous lesson, you will simulate the Internet in groups that allow messages to be sent only to an intended recipient, as indicated by an IP address. This simulation will also allow you to examine the traffic that goes through all of the (simulated) routers on the network. You will notice that messages go through many different routers, may not always take the same path to reach the final destinaton, and that the routers (and their owners) can see all of this traffic!

Goals

Students will be able to:

  • Explain how data is routed through the Internet
  • Describe how the redundant nature of networks can lead to dynamic, fault tolerant routes

Purpose

After yesterday's lesson that motivated the need for some kind of addressing system, today's lesson has students use IP Addresses to send messages to specific people. Today's focus is on how routers help manage the paths that different messages take. Simulating the router traffic provides a tool for students to discover the extra work that routers are doing to send messages - they can see that messages are passed between routers and that messages take different paths along the way. Importantly, students should make a connection between these observations about multiple pathways and the concept of fault-tolerance - because there are multiple pathways, the internet can continue to function even when there may be an issue that the routers need to address.

Getting Started (5 minutes)

Prompt: At the end of class yesterday, we saw that the Internet uses the Internet Protocol and IP Addresses to communicate across the shared Internet. How is this system similar to how we send letters in the mail? How is it different?

Discussion Goal

Students will probably identify that both systems involve a numerical address that helps identify where the letter should go, and that both a 'to' and 'from' address are needed.

However, something that may be less obvious is that our postal system has several intermediary steps before it reaches the destination - it is picked up by a postal worker, sorted in a postal center, and eventually directed to the recipient. This point is helpful in foreshadowing how today's lesson builds on yesterday's activity and the introduction of routers.

Remarks

  • Today we will investigate how the Internet Protocol helps us communicate on the internet, and we will use new devices called routers to help manage how we communicate.

Activity (35 minutes)

Group: Place students into groups of 3-4. Assign each group a number.

Do This: Assign each student a unique 8-bit "IP address" with two numbers, where the first number is the student's group. For example, three students in Group 1 might have the addresses "1.1 (0001 0001)", "1.2 (0001 0010)", and "1.3 (0001 0011)". Each student should have several index cards or another way of communicating separate messages. Each message should include a "To" and "From" address field which will allow for messages to be sent to a single intended recipient. This simulation will ask the teacher to route messages across a network, with messages possibly being routed across multiple routers (groups) in unpredictable sequences before finally being delivered to the intended "IP address". This is done to simulate the way traffic travelling across the Internet is constantly rebalanced in response to over-usage or under-usage of some channels. A message will usually make it to its destination, but we can't know for sure how it will get there.

Teaching Tip

Alternatively, students could send emails or text messages to the teacher to be "routed" (forwarded) to its final destination.

Challenge #1: Send a Message

Do This: Have students send a simple "hello" to a classmate who is connected to the same router.

  • Find your classmate's (small) IP address
  • Use that IP address in the "To" field on your message.
  • Write your IP address in the "From" field.
  • Write "hello" as your message.
  • Place the message in the center of the group to be picked up by your teacher and "routed" to its destination.
Teaching Tip
As you are routing messages to their final destination, take different paths to get there and read some messages aloud to enforce the notion that messages may take different paths to the same location, and routers can theoretically read all traffic moving across them.

Challenge #2: Have a Conversation

Do This:Ask students to conduct a short conversation (e.g. a simple greeting or a question and answer) with two classmates on their "router". They should verbally confirm that both sides are receiving their messages. Provide students a few minutes to practice. Help students construct their messages. If their "To" address is not constructed properly the message will be dropped (not delivered).

Remarks

  • Routing messages functions very differently from broadcasting.
  • The messages are only sent to the user they are intended for.
  • This is just like when you write a letter to a friend, where an address on the outside of the letter tells the mail service how to properly route your letter.
  • A router needs to read the header of a message to route it correctly, but the contents of the message are right there too, and if it wanted, a router could read all the messages going across it, just like I did with some of the messages today.
  • This should raise some questions about privacy and security -- we will talk more about this later.

Challenge #3: Find a Classmate on a Different Router

Do This: Ask students to find two classmates on a different router and ask for their IP address (they will need to actually talk in order to do this). Again students should conduct a short conversation with their two partners, confirming verbally that the messages are being received.

Prompt:What did you notice about the messages you sent in the router logs? Did they always take the same path from your router to the other router?

Discussion Goal

Students should notice that their messages are taking different paths between routers to get to their destination - one message may take a certain path, while the next message takes a different path. Once this observation is made, the discussion can move to the wrap-up prompt.

Wrap up (5 Minutes)

Journal

Have students record the vocabulary definitions for the following words:

  • Router: A type of computer that forwards data across a network
  • Redundancy: The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.
  • Fault Tolerance: Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.

Prompt: Thinking about these terms, how can we describe what we've observed in our router simulation? What are some practical reasons that you think messages might take different paths from one router to the other?

Discussion Goal

Students may brainstorm several reasons why the messages are taking different paths, such as:

  • Some paths have lots of traffic, which can slow down the message. Instead, the router sends the message long a different path.
  • One of the paths may have been "cut" like in the activity from Unit 2-Lesson 2, requiring the message to take a different path.

Students should use these new vocabulary words to describe these reasons, especially how the different paths can help make the network fault-tolerant. Students may see these words as having a cause & effect relationship: the redundancy in the network is what helps make it fault-tolerant.

Assessment: Check for Understanding

For Students

Open a word doc or google doc and copy/paste the following 2 questions.

Question 1

If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? (Pick Two from the following list)

  • One mailman would be responsible for delivering a letter from sender to receiver
  • The mailman would sometimes take a different path to deliver each letter to your home
  • Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes
  • Your mail could not be delivered if a road your mailman was planning to take were under construction.

Question 2

What are the benefits of building redundancy into a network? What are the potential issues with building redundancy?

Standards Alignment

  • CSTA K-12 Computer Science Standards (2017): 2-NI-04, 3A-NI-04, 3B-NI-03
  • CSP2021: CSN-1.B.5, CSN-1.E.1, CSN-1.E.2, CSN-1.E.3, CSN-1.E.4, CSN-1.E.5, CSN-1.E.6, CSN-1.E.7

Next Tutorial

In the next tutorial, we will discuss The Internet Lesson 5, which describes Learn about how large messages are sent through the Internet.