SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Nachos 
Theoretical Presentation 3
Teammates:
Jorge
Jose
Daniel
Ricardo
Network Protocol

Defines rules and conventions for communication between
network devices.

 ● Ethernet
 ● ARP
 ● IP
 ● UDP
 ● TCP
 ● CAN
 ● SSH
UDP Protocol    
Used to communicate (unreliable) between application
programs in a network.

UDP header.




 Source port and destination port identifies the process that
sends a receives the data in the UDP packet.

The IP protocol needs network address to send the data to the
correct host in the network and needs a port number to send
the data to the correct program application.
Well-known ports
There's a list of currently assigned ports to some services, so
when you need to use a port number you must remember to
avoid those numbers.

          Port number                Name
    22                      SSH
    23                      Telnet
    88                      Kerberos

    80                      HTTP

    194                     IRC
UDP Properties
Does not need acknowledge.

It's not a reliable network protocol, that's why the messages
can be:
   ● lost
   ● arrive out of order
   ● duplicated

Does not provide feedback to control the rate at which
information flows between the machines.
TCP Protocol    
TCP is a reliable connection oriented protocol, which means
that:
  ● data it's received in the same order that was send.
  ● detects duplicated data.
  ● retransmits lost data.

TCP header
Establishing a TCP connection
Closing a TCP connection
Ping response delay




Google facebook and wikipedia takes more time to ack
a packet send than yahoo and twitter.
Ps: test realized at 11 pm.
Likelihood packet will be dropped.
Emulating lost packed.
Planning practical implementation

Nachos already send packets in order but it's protocol is not
reliable.

So with that in mind we propose build a protocol similar to TCP
in top of the nachos one.

The program for testing the new protocol will be a ping or a
chat.
Network Security

Confidence information and services available on a network
cannot be accessed by unauthorized users.

There's two fundamental techniques that form the basis for the
internet security:
  ● Perimeter security
  ● encryption

Perimeter security allows an organization to determine the
services and networks it will make available to outsiders and
the extend to which outsiders can use resources.
Aspects of information security    

 ● Data Integrity
 ● Data Availability
 ● Privacy Or Confidentiality
 ● Authorization
 ● Autentication
 ● Replay Avoidance
Internet Security    

Source authentication (accepts requests from computers on a
authorized list) is a weak security method.

Stronger authentication requires encryption.
IPsec    

Provides a set of security algorithms and a general framework
that allows a security communication .
HMAC algorithm
Firewall

Blocks all unauthorized communication between computers in
the organization and computers outside the organization.

Monitoring:
 ● a firewall notifies a manager whenever an incident occurs
   (active monitoring).
 ● a firewall logs a record of each incident in a file on disk
   (passive monitoring).
Planning practical implementation    

Some security in nachos programs execution and
comunication:
 ● Implement a list of nachos machines authorized to
   communicate with.
 ● Implement a list of users (id's) authorized to execute
   useprog programs.
DHCP

The Dynamic Host Configuration Protocol (DHCP) service
enables devices on a network to obtain IP addresses and
other information from a DHCP server. This service automates
the assignment of IP addresses, subnet masks, gateway and
other IP networking parameters.
Static Assignment of Addresses

With a static assignment, the network administrator must
manually configure the network information for a host, as
shown in the figure. At a minimum, this includes entering
the host IP address, subnet mask, and default gateway.
Dynamic Assignment of Addresses

DHCP enables the automatic assignment of addressing
information such as IP address, subnet mask, default
gateway, and other configuration information.
DNS

Domain Name Service Protocol (DNS) is used to resolve
Internet names to IP addresses.
DNS protocol communications use a single format called a
message. This message format is used for all types of client
queries and server responses, error messages, and the
transfer of resource record information between servers.

Más contenido relacionado

La actualidad más candente

Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol AnalysisKrishbathija
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkAl Imran, CISA
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesNathanAn
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduillaabdulllam
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsSachidananda Sahu
 

La actualidad más candente (20)

Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Wireshark
WiresharkWireshark
Wireshark
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
Wireshark Wireshark
Wireshark
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
internet protocols
internet protocolsinternet protocols
internet protocols
 

Destacado

DAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITYDAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITYSara Flores
 
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovineMostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovineLamire
 
Theoretical presentation1nachos
Theoretical presentation1nachosTheoretical presentation1nachos
Theoretical presentation1nachoscolli03
 
Table of cardinal numbers
Table of cardinal numbersTable of cardinal numbers
Table of cardinal numbersSara Flores
 
Practical presentationnachos
Practical presentationnachosPractical presentationnachos
Practical presentationnachoscolli03
 
Comparativesuperlative
ComparativesuperlativeComparativesuperlative
ComparativesuperlativeSara Flores
 
To be-present-tense-1
To be-present-tense-1To be-present-tense-1
To be-present-tense-1Sara Flores
 
Physical appearance
 Physical appearance Physical appearance
Physical appearanceSara Flores
 

Destacado (9)

DAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITYDAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITY
 
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovineMostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
 
Theoretical presentation1nachos
Theoretical presentation1nachosTheoretical presentation1nachos
Theoretical presentation1nachos
 
Prepositions
PrepositionsPrepositions
Prepositions
 
Table of cardinal numbers
Table of cardinal numbersTable of cardinal numbers
Table of cardinal numbers
 
Practical presentationnachos
Practical presentationnachosPractical presentationnachos
Practical presentationnachos
 
Comparativesuperlative
ComparativesuperlativeComparativesuperlative
Comparativesuperlative
 
To be-present-tense-1
To be-present-tense-1To be-present-tense-1
To be-present-tense-1
 
Physical appearance
 Physical appearance Physical appearance
Physical appearance
 

Similar a Nachos Theoretical assigment 3

Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docxsodhi3
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxSunilNirmal9
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4Anne Starr
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 

Similar a Nachos Theoretical assigment 3 (20)

Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Mcse question
Mcse questionMcse question
Mcse question
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Lecture9
Lecture9Lecture9
Lecture9
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 

Más de colli03

Practical prestantion 1 nachOS
Practical prestantion 1 nachOSPractical prestantion 1 nachOS
Practical prestantion 1 nachOScolli03
 
Presentación POO
Presentación POOPresentación POO
Presentación POOcolli03
 
Diagramas uml2
Diagramas uml2Diagramas uml2
Diagramas uml2colli03
 
Diagramas uml
Diagramas umlDiagramas uml
Diagramas umlcolli03
 
Actividad 6
Actividad 6Actividad 6
Actividad 6colli03
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POOcolli03
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POOcolli03
 
Proyecto final de control moderno
Proyecto final de control modernoProyecto final de control moderno
Proyecto final de control modernocolli03
 
Proyecto final OOP
Proyecto final OOPProyecto final OOP
Proyecto final OOPcolli03
 

Más de colli03 (9)

Practical prestantion 1 nachOS
Practical prestantion 1 nachOSPractical prestantion 1 nachOS
Practical prestantion 1 nachOS
 
Presentación POO
Presentación POOPresentación POO
Presentación POO
 
Diagramas uml2
Diagramas uml2Diagramas uml2
Diagramas uml2
 
Diagramas uml
Diagramas umlDiagramas uml
Diagramas uml
 
Actividad 6
Actividad 6Actividad 6
Actividad 6
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POO
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POO
 
Proyecto final de control moderno
Proyecto final de control modernoProyecto final de control moderno
Proyecto final de control moderno
 
Proyecto final OOP
Proyecto final OOPProyecto final OOP
Proyecto final OOP
 

Último

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Último (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Nachos Theoretical assigment 3

  • 2. Network Protocol Defines rules and conventions for communication between network devices. ● Ethernet ● ARP ● IP ● UDP ● TCP ● CAN ● SSH
  • 3. UDP Protocol     Used to communicate (unreliable) between application programs in a network. UDP header. Source port and destination port identifies the process that sends a receives the data in the UDP packet. The IP protocol needs network address to send the data to the correct host in the network and needs a port number to send the data to the correct program application.
  • 4. Well-known ports There's a list of currently assigned ports to some services, so when you need to use a port number you must remember to avoid those numbers. Port number Name 22 SSH 23 Telnet 88 Kerberos 80 HTTP 194 IRC
  • 5. UDP Properties Does not need acknowledge. It's not a reliable network protocol, that's why the messages can be: ● lost ● arrive out of order ● duplicated Does not provide feedback to control the rate at which information flows between the machines.
  • 6. TCP Protocol     TCP is a reliable connection oriented protocol, which means that: ● data it's received in the same order that was send. ● detects duplicated data. ● retransmits lost data. TCP header
  • 7. Establishing a TCP connection
  • 8. Closing a TCP connection
  • 9. Ping response delay Google facebook and wikipedia takes more time to ack a packet send than yahoo and twitter. Ps: test realized at 11 pm.
  • 10. Likelihood packet will be dropped.
  • 12. Planning practical implementation Nachos already send packets in order but it's protocol is not reliable. So with that in mind we propose build a protocol similar to TCP in top of the nachos one. The program for testing the new protocol will be a ping or a chat.
  • 13. Network Security Confidence information and services available on a network cannot be accessed by unauthorized users. There's two fundamental techniques that form the basis for the internet security: ● Perimeter security ● encryption Perimeter security allows an organization to determine the services and networks it will make available to outsiders and the extend to which outsiders can use resources.
  • 14. Aspects of information security     ● Data Integrity ● Data Availability ● Privacy Or Confidentiality ● Authorization ● Autentication ● Replay Avoidance
  • 15. Internet Security     Source authentication (accepts requests from computers on a authorized list) is a weak security method. Stronger authentication requires encryption.
  • 16. IPsec     Provides a set of security algorithms and a general framework that allows a security communication .
  • 18. Firewall Blocks all unauthorized communication between computers in the organization and computers outside the organization. Monitoring: ● a firewall notifies a manager whenever an incident occurs (active monitoring). ● a firewall logs a record of each incident in a file on disk (passive monitoring).
  • 19. Planning practical implementation     Some security in nachos programs execution and comunication: ● Implement a list of nachos machines authorized to communicate with. ● Implement a list of users (id's) authorized to execute useprog programs.
  • 20. DHCP The Dynamic Host Configuration Protocol (DHCP) service enables devices on a network to obtain IP addresses and other information from a DHCP server. This service automates the assignment of IP addresses, subnet masks, gateway and other IP networking parameters.
  • 21. Static Assignment of Addresses With a static assignment, the network administrator must manually configure the network information for a host, as shown in the figure. At a minimum, this includes entering the host IP address, subnet mask, and default gateway.
  • 22. Dynamic Assignment of Addresses DHCP enables the automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information.
  • 23. DNS Domain Name Service Protocol (DNS) is used to resolve Internet names to IP addresses.
  • 24. DNS protocol communications use a single format called a message. This message format is used for all types of client queries and server responses, error messages, and the transfer of resource record information between servers.