SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Nachos 
Theoretical Presentation 3
Teammates:
Jorge
Jose
Daniel
Ricardo
Network Protocol

Defines rules and conventions for communication between
network devices.

 ● Ethernet
 ● ARP
 ● IP
 ● UDP
 ● TCP
 ● CAN
 ● SSH
UDP Protocol    
Used to communicate (unreliable) between application
programs in a network.

UDP header.




 Source port and destination port identifies the process that
sends a receives the data in the UDP packet.

The IP protocol needs network address to send the data to the
correct host in the network and needs a port number to send
the data to the correct program application.
Well-known ports
There's a list of currently assigned ports to some services, so
when you need to use a port number you must remember to
avoid those numbers.

          Port number                Name
    22                      SSH
    23                      Telnet
    88                      Kerberos

    80                      HTTP

    194                     IRC
UDP Properties
Does not need acknowledge.

It's not a reliable network protocol, that's why the messages
can be:
   ● lost
   ● arrive out of order
   ● duplicated

Does not provide feedback to control the rate at which
information flows between the machines.
TCP Protocol    
TCP is a reliable connection oriented protocol, which means
that:
  ● data it's received in the same order that was send.
  ● detects duplicated data.
  ● retransmits lost data.

TCP header
Establishing a TCP connection
Closing a TCP connection
Ping response delay




Google facebook and wikipedia takes more time to ack
a packet send than yahoo and twitter.
Ps: test realized at 11 pm.
Likelihood packet will be dropped.
Emulating lost packed.
Planning practical implementation

Nachos already send packets in order but it's protocol is not
reliable.

So with that in mind we propose build a protocol similar to TCP
in top of the nachos one.

The program for testing the new protocol will be a ping or a
chat.
Network Security

Confidence information and services available on a network
cannot be accessed by unauthorized users.

There's two fundamental techniques that form the basis for the
internet security:
  ● Perimeter security
  ● encryption

Perimeter security allows an organization to determine the
services and networks it will make available to outsiders and
the extend to which outsiders can use resources.
Aspects of information security    

 ● Data Integrity
 ● Data Availability
 ● Privacy Or Confidentiality
 ● Authorization
 ● Autentication
 ● Replay Avoidance
Internet Security    

Source authentication (accepts requests from computers on a
authorized list) is a weak security method.

Stronger authentication requires encryption.
IPsec    

Provides a set of security algorithms and a general framework
that allows a security communication .
HMAC algorithm
Firewall

Blocks all unauthorized communication between computers in
the organization and computers outside the organization.

Monitoring:
 ● a firewall notifies a manager whenever an incident occurs
   (active monitoring).
 ● a firewall logs a record of each incident in a file on disk
   (passive monitoring).
Planning practical implementation    

Some security in nachos programs execution and
comunication:
 ● Implement a list of nachos machines authorized to
   communicate with.
 ● Implement a list of users (id's) authorized to execute
   useprog programs.
DHCP

The Dynamic Host Configuration Protocol (DHCP) service
enables devices on a network to obtain IP addresses and
other information from a DHCP server. This service automates
the assignment of IP addresses, subnet masks, gateway and
other IP networking parameters.
Static Assignment of Addresses

With a static assignment, the network administrator must
manually configure the network information for a host, as
shown in the figure. At a minimum, this includes entering
the host IP address, subnet mask, and default gateway.
Dynamic Assignment of Addresses

DHCP enables the automatic assignment of addressing
information such as IP address, subnet mask, default
gateway, and other configuration information.
DNS

Domain Name Service Protocol (DNS) is used to resolve
Internet names to IP addresses.
DNS protocol communications use a single format called a
message. This message format is used for all types of client
queries and server responses, error messages, and the
transfer of resource record information between servers.

Weitere ähnliche Inhalte

Was ist angesagt?

Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol AnalysisKrishbathija
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkAl Imran, CISA
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesNathanAn
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduillaabdulllam
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsSachidananda Sahu
 

Was ist angesagt? (20)

Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Wireshark
WiresharkWireshark
Wireshark
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
Wireshark Wireshark
Wireshark
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
internet protocols
internet protocolsinternet protocols
internet protocols
 

Andere mochten auch

DAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITYDAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITYSara Flores
 
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovineMostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovineLamire
 
Theoretical presentation1nachos
Theoretical presentation1nachosTheoretical presentation1nachos
Theoretical presentation1nachoscolli03
 
Table of cardinal numbers
Table of cardinal numbersTable of cardinal numbers
Table of cardinal numbersSara Flores
 
Practical presentationnachos
Practical presentationnachosPractical presentationnachos
Practical presentationnachoscolli03
 
Comparativesuperlative
ComparativesuperlativeComparativesuperlative
ComparativesuperlativeSara Flores
 
To be-present-tense-1
To be-present-tense-1To be-present-tense-1
To be-present-tense-1Sara Flores
 
Physical appearance
 Physical appearance Physical appearance
Physical appearanceSara Flores
 

Andere mochten auch (9)

DAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITYDAILY ROUTINE. TRINITY
DAILY ROUTINE. TRINITY
 
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovineMostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
Mostarke u dvije verzije, bosanske studentice i capi iz zapadne hercegovine
 
Theoretical presentation1nachos
Theoretical presentation1nachosTheoretical presentation1nachos
Theoretical presentation1nachos
 
Prepositions
PrepositionsPrepositions
Prepositions
 
Table of cardinal numbers
Table of cardinal numbersTable of cardinal numbers
Table of cardinal numbers
 
Practical presentationnachos
Practical presentationnachosPractical presentationnachos
Practical presentationnachos
 
Comparativesuperlative
ComparativesuperlativeComparativesuperlative
Comparativesuperlative
 
To be-present-tense-1
To be-present-tense-1To be-present-tense-1
To be-present-tense-1
 
Physical appearance
 Physical appearance Physical appearance
Physical appearance
 

Ähnlich wie Nachos Theoretical assigment 3

Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docxsodhi3
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxSunilNirmal9
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4Anne Starr
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 

Ähnlich wie Nachos Theoretical assigment 3 (20)

Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Mcse question
Mcse questionMcse question
Mcse question
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Lecture9
Lecture9Lecture9
Lecture9
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 

Mehr von colli03

Practical prestantion 1 nachOS
Practical prestantion 1 nachOSPractical prestantion 1 nachOS
Practical prestantion 1 nachOScolli03
 
Presentación POO
Presentación POOPresentación POO
Presentación POOcolli03
 
Diagramas uml2
Diagramas uml2Diagramas uml2
Diagramas uml2colli03
 
Diagramas uml
Diagramas umlDiagramas uml
Diagramas umlcolli03
 
Actividad 6
Actividad 6Actividad 6
Actividad 6colli03
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POOcolli03
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POOcolli03
 
Proyecto final de control moderno
Proyecto final de control modernoProyecto final de control moderno
Proyecto final de control modernocolli03
 
Proyecto final OOP
Proyecto final OOPProyecto final OOP
Proyecto final OOPcolli03
 

Mehr von colli03 (9)

Practical prestantion 1 nachOS
Practical prestantion 1 nachOSPractical prestantion 1 nachOS
Practical prestantion 1 nachOS
 
Presentación POO
Presentación POOPresentación POO
Presentación POO
 
Diagramas uml2
Diagramas uml2Diagramas uml2
Diagramas uml2
 
Diagramas uml
Diagramas umlDiagramas uml
Diagramas uml
 
Actividad 6
Actividad 6Actividad 6
Actividad 6
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POO
 
Proyecto final de POO
Proyecto final de POOProyecto final de POO
Proyecto final de POO
 
Proyecto final de control moderno
Proyecto final de control modernoProyecto final de control moderno
Proyecto final de control moderno
 
Proyecto final OOP
Proyecto final OOPProyecto final OOP
Proyecto final OOP
 

Kürzlich hochgeladen

GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

Kürzlich hochgeladen (20)

GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 

Nachos Theoretical assigment 3

  • 2. Network Protocol Defines rules and conventions for communication between network devices. ● Ethernet ● ARP ● IP ● UDP ● TCP ● CAN ● SSH
  • 3. UDP Protocol     Used to communicate (unreliable) between application programs in a network. UDP header. Source port and destination port identifies the process that sends a receives the data in the UDP packet. The IP protocol needs network address to send the data to the correct host in the network and needs a port number to send the data to the correct program application.
  • 4. Well-known ports There's a list of currently assigned ports to some services, so when you need to use a port number you must remember to avoid those numbers. Port number Name 22 SSH 23 Telnet 88 Kerberos 80 HTTP 194 IRC
  • 5. UDP Properties Does not need acknowledge. It's not a reliable network protocol, that's why the messages can be: ● lost ● arrive out of order ● duplicated Does not provide feedback to control the rate at which information flows between the machines.
  • 6. TCP Protocol     TCP is a reliable connection oriented protocol, which means that: ● data it's received in the same order that was send. ● detects duplicated data. ● retransmits lost data. TCP header
  • 7. Establishing a TCP connection
  • 8. Closing a TCP connection
  • 9. Ping response delay Google facebook and wikipedia takes more time to ack a packet send than yahoo and twitter. Ps: test realized at 11 pm.
  • 10. Likelihood packet will be dropped.
  • 12. Planning practical implementation Nachos already send packets in order but it's protocol is not reliable. So with that in mind we propose build a protocol similar to TCP in top of the nachos one. The program for testing the new protocol will be a ping or a chat.
  • 13. Network Security Confidence information and services available on a network cannot be accessed by unauthorized users. There's two fundamental techniques that form the basis for the internet security: ● Perimeter security ● encryption Perimeter security allows an organization to determine the services and networks it will make available to outsiders and the extend to which outsiders can use resources.
  • 14. Aspects of information security     ● Data Integrity ● Data Availability ● Privacy Or Confidentiality ● Authorization ● Autentication ● Replay Avoidance
  • 15. Internet Security     Source authentication (accepts requests from computers on a authorized list) is a weak security method. Stronger authentication requires encryption.
  • 16. IPsec     Provides a set of security algorithms and a general framework that allows a security communication .
  • 18. Firewall Blocks all unauthorized communication between computers in the organization and computers outside the organization. Monitoring: ● a firewall notifies a manager whenever an incident occurs (active monitoring). ● a firewall logs a record of each incident in a file on disk (passive monitoring).
  • 19. Planning practical implementation     Some security in nachos programs execution and comunication: ● Implement a list of nachos machines authorized to communicate with. ● Implement a list of users (id's) authorized to execute useprog programs.
  • 20. DHCP The Dynamic Host Configuration Protocol (DHCP) service enables devices on a network to obtain IP addresses and other information from a DHCP server. This service automates the assignment of IP addresses, subnet masks, gateway and other IP networking parameters.
  • 21. Static Assignment of Addresses With a static assignment, the network administrator must manually configure the network information for a host, as shown in the figure. At a minimum, this includes entering the host IP address, subnet mask, and default gateway.
  • 22. Dynamic Assignment of Addresses DHCP enables the automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information.
  • 23. DNS Domain Name Service Protocol (DNS) is used to resolve Internet names to IP addresses.
  • 24. DNS protocol communications use a single format called a message. This message format is used for all types of client queries and server responses, error messages, and the transfer of resource record information between servers.