Reflection:
What data can an IP Packet Contain?
The data that an IP packet contains is the information that will help carry the packet, to its destination. This is called the IP header. IT consists of the version, IHL, Type of service, packet length, Identification, flag, fragment offset, time to live, protocol, Header Checksum, Source Address, Destination address, Options, and padding. All of these will determine where the packet will go.
What is meant by the phrase "the IP packet is routed"?
What this means is that the packet is headed to the destination.
What is a Route?
A route is the path in which the packet takes to get to its destination
Where might things go wrong?
Things can go wrong if your internet connection has issues, and the header would not send.
Friday, December 2, 2011
4.6.1: Skills integration Challenge-Analyzing the Applications and Transport Layers
Reflection: Can you make a diagram of the sequence of protocol events involved in requesting a web page using a URL?
Sender : HTTP --> TCP ; HTTP --> IP ; TCP ; HTTP --> Ethernet ; IP ; TCP ; HTTP --> Electric impulse
Receiver: (Cont.) --> Ethernet ; IP ; TCP ; HTTP --> IP ; TCP ; HTTP --> TCP ; HTTP --> HTTP
Where might things go wrong?
Things might go wrong in the Transport Layer or the Network layer, because those are Layers that are more prone to having an issue.
Compare and contrast DNS and HTTP, and UDP and TCP.
DNS is the alias for the website. Websites were originally suppose to be typed in through IP addresses. Instead of IP addresses, you can type in the "website" such as google.com
HTTP is Hyper text Transfer protocol. This is the protocol in which browsers come in.
--------
TCP connection is connection based, its reliable, and it has flow control
UDP connection is connectionless, unreliable, but low overhead
--------
In this Lab, I observed how four different services work together in a network. the four services were DNS, UDP, HTTP, and TCP.
Sender : HTTP --> TCP ; HTTP --> IP ; TCP ; HTTP --> Ethernet ; IP ; TCP ; HTTP --> Electric impulse
Receiver: (Cont.) --> Ethernet ; IP ; TCP ; HTTP --> IP ; TCP ; HTTP --> TCP ; HTTP --> HTTP
Where might things go wrong?
Things might go wrong in the Transport Layer or the Network layer, because those are Layers that are more prone to having an issue.
Compare and contrast DNS and HTTP, and UDP and TCP.
DNS is the alias for the website. Websites were originally suppose to be typed in through IP addresses. Instead of IP addresses, you can type in the "website" such as google.com
HTTP is Hyper text Transfer protocol. This is the protocol in which browsers come in.
--------
TCP connection is connection based, its reliable, and it has flow control
UDP connection is connectionless, unreliable, but low overhead
--------
In this Lab, I observed how four different services work together in a network. the four services were DNS, UDP, HTTP, and TCP.
Thursday, December 1, 2011
3.5.1: Skills Integration Challenge-Configuring Hosts and Servers
First I added a PC with the display name of 1B to the network. I configured it with the settings the lab said. We then connected the Eagle Server to the Fast access port on the R1-ISP router. We tested the connectivity, in realtime, by using a simple PDU in order to test a connectivity between PC 1B and Eagle_server.
Can you now explain the process that occurs when you type a URL into a browser and a web page returns?
The web page sends a request to the router, the router then sends a request to the internet. The internet sends a request to the server that the webpage is trying to reach. The server sends it back, all the way to the browser, then the page is finally open.
What types of client-server interactions are involved?
The client is requesting data from the server in order to visit the web-page.
Can you now explain the process that occurs when you type a URL into a browser and a web page returns?
The web page sends a request to the router, the router then sends a request to the internet. The internet sends a request to the server that the webpage is trying to reach. The server sends it back, all the way to the browser, then the page is finally open.
What types of client-server interactions are involved?
The client is requesting data from the server in order to visit the web-page.
Lab 2.7.1 Skills Integration Challange-Examining Packets
In this lab, we have tested sending packets from one device to another. First we have tried to send a packet from PC- PT 1B, to Server-PT Eagle_server. At first it had failed several times. There was an issue with connecting the packet from the R2-Central Router to the R1-ISP. I needed to configure each device properly until the packet successfully passed through them. After I finished sending Packets in Simulation mode, then I started experimenting with more packets. If something did not send properly, then I needed to configure it until it did send properly
HANDOUT #1
a. How does this video relate to you and this class?
This video inspires me to get more into programming. It relates to this class because it expands our knowledge and understanding in technology. We will be able to create our own business using our knowledge in networking and programming. We could possibly use our knowledge in programming to create an app, and that app will be able to connect with other people who have the app via internet
b. Why is it a good reflection of self discipline?
This is a good reflection of self discipline, because this boy followed what he really wanted to do in life, so he just decided to take action. He had not hesitated since he is still young.
c. Is this subject as easy as creating an app? WHY?
This subject is harder than creating an app. Programming is a little simpler than networking. There are so many dimensions to networking, which is why it requires so many years of classes
This video inspires me to get more into programming. It relates to this class because it expands our knowledge and understanding in technology. We will be able to create our own business using our knowledge in networking and programming. We could possibly use our knowledge in programming to create an app, and that app will be able to connect with other people who have the app via internet
b. Why is it a good reflection of self discipline?
This is a good reflection of self discipline, because this boy followed what he really wanted to do in life, so he just decided to take action. He had not hesitated since he is still young.
c. Is this subject as easy as creating an app? WHY?
This subject is harder than creating an app. Programming is a little simpler than networking. There are so many dimensions to networking, which is why it requires so many years of classes
Wednesday, November 30, 2011
Lab 1.7.1 Skills Integration Challenge-Introduction to Packet Tracer
Reflection:
In my first packet tracer lab, i have learned that configuring routers, switches, servers, and computers are not simple. I was required to set up a small network that was composed of two routers, one switch, one server, and two desktop computers. At first I was having trouble connecting the two routers together, then I troubleshooted the both of them and finally found out that there was an issue with the physical layer
In my first packet tracer lab, i have learned that configuring routers, switches, servers, and computers are not simple. I was required to set up a small network that was composed of two routers, one switch, one server, and two desktop computers. At first I was having trouble connecting the two routers together, then I troubleshooted the both of them and finally found out that there was an issue with the physical layer
Tuesday, November 15, 2011
2nd MPD
I feel like i am doing better that the previous marking period, because many of my experiences in computers are being implemented in the lesson. I have been participating more in class, and my test grades are getting better.
Thursday, November 3, 2011
Benefits
|
Website Usage Agreement
Summery per each of the 16 policy point for Cisco Academy
- Using anything on their website, means you automatically accept the terms and conditions.
- I will allow Cisco to collect personal information about me. Anything I write about myself on the website will be viewable by other people who visit my profile. Everything I write down about myself will not be false. Anything I write about myself that may be obscene may lead to the disclosure of my academy
- We must follow the rules and regulations when chatting; such as no offensive language, putting in viruses, post infringed property, or post anything that may be illegal.
- This website is not to be used for solicitation, advertising, or business.
- Cisco is not responsible for anything that has to do with jobs and careers, and should confirm all information you receive from the website before relying on any information.
- Messages on message boards may be deleted if it is offensive, defamatory, libelous, illegally threatening, or harassing.
- Do not redistribute the contents of the website, as it is illegal
- Cisco is able to do whatever they want with your account if you fail to comply with the rules.
- Cisco disclaims any warranties of any kind
- Cisco is not responsible for damages or lost data, however, anything that Cisco is truly responsible for, should not exceed $50.00
- Any action or proceeding arising or relating to the terms and conditions must be bought in a federal court in the Northern District of California or in state court in San Francisco County.
- Terms of use could be amended by Cisco by posting the amended terms of use at the URL and affected message boards by posting notice of amendment
- Services offered under these use policies are provided by Cisco Systems, Inc. 170 W. Tasman Drive, San Jose, CA 95134. Email is Academy-alumini@cisco.netacat.net
- If you Submit content to the website, then cisco has the right to exercise all copyright, publicity, and moral rights in any media.
- Any suggestions I provide Cisco, will be non-confidential
- We are able to contact Cisco's Copyright Agent in case I believe my work had been infringed, we need to provide Cisco's Copyrite Agent with specific information
Thursday, October 27, 2011
What happened to the lab today?
My responsibility in the computer lab was to make sure that "computer "1 had access to certain applications throughout all the users. For example: Microsoft word needed to be "read and write" for Student 1, Student 2, and Student 3. One of the main things that i needed to do was make sure that all users were able to access parallels, in order to easily switch between 2 operating systems.
First off, before I am able to change anything, I needed adminstrator access to the computer, which I did not at the time. To solve this problem, I had done a simple hack to the computer. I went into single user mode, then I deleted ".AppleSetupDone" using this command:
rm -rf /var/db/.AppleSetupDone
Have you ever gotten a new Mac computer before? If you have then you should be familiar with the very first setup screen when you first turned on your computer. Once you have completed the setup, a file called ".AppleSetupDone" then instals on your computer to let the computer know, not to go to the setup screen anymore, but instead, bring you straight to the login process.
What I did, was delete this in order to go through the setup in order to gain my adminstrator access into the computer in order for me to make any changes. Once I set up my new administrator account, then I got straight to work.
I took the folders and applications of the programs that Ms. Ramirez had wanted me to make accessable to all the users, and one by one I changed the permission settings for each of them. It was time consuming, as I had to retype my password a thousand times, and I did not know any shortcut or command to temporarily disable the chain password.
Once I was done with that, I needed to put the parallels setup into the shared folder, for all the users of the computer to access it. Lastly, I checked two student accounts in order to make sure that my changes worked. "student 2" and "student 3".
I had discovered that my changes were successful, and that every user was able to access the parallels setup.
First off, before I am able to change anything, I needed adminstrator access to the computer, which I did not at the time. To solve this problem, I had done a simple hack to the computer. I went into single user mode, then I deleted ".AppleSetupDone" using this command:
rm -rf /var/db/.AppleSetupDone
Have you ever gotten a new Mac computer before? If you have then you should be familiar with the very first setup screen when you first turned on your computer. Once you have completed the setup, a file called ".AppleSetupDone" then instals on your computer to let the computer know, not to go to the setup screen anymore, but instead, bring you straight to the login process.
What I did, was delete this in order to go through the setup in order to gain my adminstrator access into the computer in order for me to make any changes. Once I set up my new administrator account, then I got straight to work.
I took the folders and applications of the programs that Ms. Ramirez had wanted me to make accessable to all the users, and one by one I changed the permission settings for each of them. It was time consuming, as I had to retype my password a thousand times, and I did not know any shortcut or command to temporarily disable the chain password.
Once I was done with that, I needed to put the parallels setup into the shared folder, for all the users of the computer to access it. Lastly, I checked two student accounts in order to make sure that my changes worked. "student 2" and "student 3".
I had discovered that my changes were successful, and that every user was able to access the parallels setup.
Tuesday, October 18, 2011
How Does UDP Work?
UDP
UDP also known as User Datagram Protocol, is a simple protocol using basic functionality. With UDP, computer applications can send messages to other hosts on an IP network without requiring prior communications to set up transmission channels or data paths.
UDP also known as User Datagram Protocol, is a simple protocol using basic functionality. With UDP, computer applications can send messages to other hosts on an IP network without requiring prior communications to set up transmission channels or data paths.
Friday, October 14, 2011
Transport Layer Problems
Blackberry
On October 10, 2011, Blackberry had an outage in Europe, Middle East, and Africa. By October 12, Blackberry internet service went down in North America. Blackberry apparently had an unfortunate issue regarding data overload due to switch failures in their two data centers which was the main problem that had caused their service disruptions.
Playstation Network (PSN)
On april, PSN got hacked by "anonymous", who was known to be part of the 4chan website. Members of 4chan were also responsible for hacking other popular websites and sending DDoS attacks to their servers. The attack on PSN occured between April 17, 2011 and April 19, 2011. During the hacking, 77 million accounts were stolen, making it one of the largest data security breaches in history. Itprevented Playstation 3 and Playstation Portable users from playing online. This forced sony to turn off the PSN on April 20, 2011.
During the Attack, they discovered that the intruders planted a file on one of their Sony Online Entertainment servers named "Anonymous" with the words "We are Legion". Playstation is now using inhanced levels of data protection and encryption; enhanced abilities to detect software intrusions, unauthorized access and unusual activity patterns; additional firewalls, etc.
Sony had not released any information as of how they got hacked, or what they did to stop the intruders, as that even is now an ongoing criminal investigation. The inormation could be used to exploit vunerbilities in systems other thanSony's that have similar architecture to the PSN.
On October 10, 2011, Blackberry had an outage in Europe, Middle East, and Africa. By October 12, Blackberry internet service went down in North America. Blackberry apparently had an unfortunate issue regarding data overload due to switch failures in their two data centers which was the main problem that had caused their service disruptions.
Playstation Network (PSN)
On april, PSN got hacked by "anonymous", who was known to be part of the 4chan website. Members of 4chan were also responsible for hacking other popular websites and sending DDoS attacks to their servers. The attack on PSN occured between April 17, 2011 and April 19, 2011. During the hacking, 77 million accounts were stolen, making it one of the largest data security breaches in history. Itprevented Playstation 3 and Playstation Portable users from playing online. This forced sony to turn off the PSN on April 20, 2011.
During the Attack, they discovered that the intruders planted a file on one of their Sony Online Entertainment servers named "Anonymous" with the words "We are Legion". Playstation is now using inhanced levels of data protection and encryption; enhanced abilities to detect software intrusions, unauthorized access and unusual activity patterns; additional firewalls, etc.
Sony had not released any information as of how they got hacked, or what they did to stop the intruders, as that even is now an ongoing criminal investigation. The inormation could be used to exploit vunerbilities in systems other thanSony's that have similar architecture to the PSN.
Wednesday, October 5, 2011
How DHCP works
Dynamic host configuration protocol is also known as DHCP. DHCP, is a protocol for hosts on internet protocol (IP) networks. This provides dynamic IP assignment. It means that a host can assign an IP address from a subnet or "pool"
Tuesday, October 4, 2011
Advantages of P2P and Client/Server
Which Network-type is more centralized?
Peer to peer networks (P2P) are more centralized than Client server networks. In P2P, Clients are able to interact with each P2P network participants without the need of servers or stable hosts. Therefore, if one computer is not responding, then it will only affect that one individual without disrupting other network participants.
However, In a Server/Client network, if a server or host crashes, or is responding slowly due to bandwidth or any other issue, it will affect all the clients that are trying to recieve data from that particular server.
-------------------------------------------------------------------------------------------
Advantages of Client/Server Network
Although Client/Server networks are not as centralized as P2P networks, there are termendous advantages to this type of network. Anyone who is running a server with information on it, and runs that information through HTTP and publishes it on the internet, then absolutely anyone who has access to the internet also have access to the information stored on the server, making it very easy for people to research.
For example: Google.com
Google.com one of the most popular search engines today. Their servers have information to the most visited websites based on how many people have searched it, or how people actually go on that website. Whichever website has the most, then that link would be first on the list when you look things up.
-P2P networking does not have this capability to share with others accross countries. Only the participants of the network is able to share data with each other, and no one else.
Peer to peer networks (P2P) are more centralized than Client server networks. In P2P, Clients are able to interact with each P2P network participants without the need of servers or stable hosts. Therefore, if one computer is not responding, then it will only affect that one individual without disrupting other network participants.
However, In a Server/Client network, if a server or host crashes, or is responding slowly due to bandwidth or any other issue, it will affect all the clients that are trying to recieve data from that particular server.
-------------------------------------------------------------------------------------------
Advantages of Client/Server Network
Although Client/Server networks are not as centralized as P2P networks, there are termendous advantages to this type of network. Anyone who is running a server with information on it, and runs that information through HTTP and publishes it on the internet, then absolutely anyone who has access to the internet also have access to the information stored on the server, making it very easy for people to research.
For example: Google.com
Google.com one of the most popular search engines today. Their servers have information to the most visited websites based on how many people have searched it, or how people actually go on that website. Whichever website has the most, then that link would be first on the list when you look things up.
-P2P networking does not have this capability to share with others accross countries. Only the participants of the network is able to share data with each other, and no one else.
Thursday, September 22, 2011
Lab 2.2.5
Task 3: Reflection
Review the purpise and usefulness of trace route programs.
Relate the displays of the output of NeoTrace to the concept of interconnected networks and the global nature of the Internet.
Answer:
Traceroute programs could be useful for a variety of reasons. First, it would help find information and who is responsible for successful websites that are being visited by thousands of people. They would also be able to see the origins of these websites and specifications about the specific network for educational purposes.
Task 4 Challange
Consider and discuss possible network security issues that could arise from the use of programs like traceroute and NeoTrace. Consider what technical details are revealed and how perhaps this information could be misused.
Answer:
Traceroute and NeoTrace could also be used as programs in order to hack networks. People who install these programs will be able to pinpoint the exact location of these networks, and go to it in order to be physically hack the network. Once the network is successfully hacked it would be vulnerable to remote access, or install malware, or send spam, or possibly even inflict the network with a virus, resulting the network to crash and the specific website or network would be forced to have "Down time" before they are able to be up and running again. The hacker also would be able to trace personal information of each person using the network such as passwords, Credit card ID's, and account information.
Review the purpise and usefulness of trace route programs.
Relate the displays of the output of NeoTrace to the concept of interconnected networks and the global nature of the Internet.
Answer:
Traceroute programs could be useful for a variety of reasons. First, it would help find information and who is responsible for successful websites that are being visited by thousands of people. They would also be able to see the origins of these websites and specifications about the specific network for educational purposes.
Task 4 Challange
Consider and discuss possible network security issues that could arise from the use of programs like traceroute and NeoTrace. Consider what technical details are revealed and how perhaps this information could be misused.
Answer:
Traceroute and NeoTrace could also be used as programs in order to hack networks. People who install these programs will be able to pinpoint the exact location of these networks, and go to it in order to be physically hack the network. Once the network is successfully hacked it would be vulnerable to remote access, or install malware, or send spam, or possibly even inflict the network with a virus, resulting the network to crash and the specific website or network would be forced to have "Down time" before they are able to be up and running again. The hacker also would be able to trace personal information of each person using the network such as passwords, Credit card ID's, and account information.
Subscribe to:
Posts (Atom)