SlideShare a Scribd company logo
1 of 23
3rd Theorical
                           Carmen Suárez Palomares
                           Abraham José Silva Orozco
                            Gabriela García Cárdenas




Sunday, November 20, 11
Net working
           Devices interconnected
           Share information, files, and resources.




Sunday, November 20, 11
NETWORKING

                          A sending system:

                          Segments -> adds header bytes

                          Packets

                          Protocol:

                          1) Format and Order -> Message exchanges

                          2) Actions taken of a message



Sunday, November 20, 11
Socket
   Sockets allow the implementation
   of a client-server model.
   Communication must be started by
   one of the clients. The server waits
   for the client to start the
   communication.

   A socket is a process or an
   existing thread in the client and
   server machine, it      allows the
   client and server to read and write
   information.                           !

Sunday, November 20, 11
NETWORK CONNECTIONS
         1. Fully connected network                         2
         2. Partially connected network
         3. Hierarchical Network
         4. Star Network
                                                    1
         5. Ring Network
         6. Multiaccess bus network (shared link)
         7. Hybrid Networks
                                                        4       3
       6                    7
                                                                5


Sunday, November 20, 11
Client-Server
                 Clients connected to server

           Example: Accessing a web
           page
           Chat
           Client: Sends a demand or           !

           messages
           Server: Listen for incoming calls
           or messages


Sunday, November 20, 11
Nachos
                          Nachos/code/network


                          -m 1 -o 0             Server
                                                 (Buffer)
                          Me Receiver




Sunday, November 20, 11
PING
         Ping test the state
          of connection of         Protocol
          host with one or
         others computers,
         sending package
                ICMP            Ping works in the network layer, this
                               use the encapsulate the message, in the
                                      package and then it send

Sunday, November 20, 11
Example
                          You
                                 Sister


                           n.n            Lost


                          You
                                 Sister


                          n.n
Sunday, November 20, 11
Ok, she is              n.n   n.n
    alive




Sunday, November 20, 11
Pseudocode
                          ///request

              Ping()                   ////answer
                ping.txt               receive_request()
              validate()               validate(request)
                verify structure       if request = true{
              execute()                 answer->send
                do ping->send          }
              receive_ans(answer)
              validate()
              if answer = true{
                echo “Connected”
              }
              else{
              echo “Not Connected”
              }


Sunday, November 20, 11
SECURITY
                                    Virus
     Malware
                                Warms
                                             Zombies
                      Trojans
    Others
                                        Botnets    Funny
                                                           DoS


Sunday, November 20, 11
Network
       Zombies & Botnets +                 =   :(
                           (Client-Server)




                             !




                                                    !

Sunday, November 20, 11
Important Points

                   Sending Pings (easy)
                   Server attacks
                   Receive Information
                   Broke elisa’s server


Sunday, November 20, 11
Cryptography

                         rap hy          En c r y p t at i o
                    t o g io n
                 yp i t                                       n
               Cr f in                     de f i n i t i o n
                  de
                                          C = E( P, K e )


                   C i ph e r te x
                                     t


Sunday, November 20, 11
Cryptography
                                              De c r y p t i o n
                                  of f s’s    de f i n i t i o n
                               k h le
                           e rc c i p
                          K in               P = D(C, K d)
                             pr


                     P l a i n te x t



Sunday, November 20, 11
Secret-key criptography
           Definition symmetric encryption
           Example          In this example the plaintext HELLO would become the cyphertext SVOOL.

           All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on
                          key
                Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
                Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A

                          encryption key
                                    Monoalphabetic sustitution
Sunday, November 20, 11
Secret-key criptography




Sunday, November 20, 11
Public-key cryptography

                                                                  ri v a te
                di f f e re n t k e ys                     y, p
                                                         ke )
                                                 p ub lic e y
                                               (          k
                                     ic
                                    r n                     App l ic at i o n
                                 e t t io
                               m a                        -A u t h e n t ic    s:
                             m pt                                           at io n
                           sy r y
                          a c                          - D igi t a l S ig
                                                                          n at u re s
                           en              Prov ides:
                                        -Con fide ntia lity
                                          - Inte grit y
Sunday, November 20, 11
Public-key cryptography




Sunday, November 20, 11
Pseudocode
                          a = “xxx”;

       b = encrypt_algorithm
       ke = encrypt_key

       t_encrypt = b ( a, key)
       t_encrypt = send ( )

       receive ( t_encrypt)
       kd = decrypt_key
       if (kd == true){
              t_decrypt = b (t_encrypt, kd)
              a = t_decrypt
              }
       else
            {
            print “you need the key to decrypt”



Sunday, November 20, 11
Sunday, November 20, 11
References
            Chat application using Nachos Networking Module
            http://bit.ly/vtbL63
            Uso de criptografía en aplicaciones
            http://bit.ly/sXGWkx
            Networking tutorial
            http://bit.ly/vkb1wQ
            Protocolo ICMP
            http://bit.ly/tOAC6c
            Computer Networking - Kurose Ross
            Security
            technolifeandmore.blogspot.com
Sunday, November 20, 11

More Related Content

Similar to Nachos3T

Beginners guide-concurrency
Beginners guide-concurrencyBeginners guide-concurrency
Beginners guide-concurrencyMichael Barker
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlOpenDNS
 

Similar to Nachos3T (6)

Beginners guide-concurrency
Beginners guide-concurrencyBeginners guide-concurrency
Beginners guide-concurrency
 
Internet security
Internet securityInternet security
Internet security
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Nachos3T

  • 1. 3rd Theorical Carmen Suárez Palomares Abraham José Silva Orozco Gabriela García Cárdenas Sunday, November 20, 11
  • 2. Net working Devices interconnected Share information, files, and resources. Sunday, November 20, 11
  • 3. NETWORKING A sending system: Segments -> adds header bytes Packets Protocol: 1) Format and Order -> Message exchanges 2) Actions taken of a message Sunday, November 20, 11
  • 4. Socket Sockets allow the implementation of a client-server model. Communication must be started by one of the clients. The server waits for the client to start the communication. A socket is a process or an existing thread in the client and server machine, it allows the client and server to read and write information. ! Sunday, November 20, 11
  • 5. NETWORK CONNECTIONS 1. Fully connected network 2 2. Partially connected network 3. Hierarchical Network 4. Star Network 1 5. Ring Network 6. Multiaccess bus network (shared link) 7. Hybrid Networks 4 3 6 7 5 Sunday, November 20, 11
  • 6. Client-Server Clients connected to server Example: Accessing a web page Chat Client: Sends a demand or ! messages Server: Listen for incoming calls or messages Sunday, November 20, 11
  • 7. Nachos Nachos/code/network -m 1 -o 0 Server (Buffer) Me Receiver Sunday, November 20, 11
  • 8. PING Ping test the state of connection of Protocol host with one or others computers, sending package ICMP Ping works in the network layer, this use the encapsulate the message, in the package and then it send Sunday, November 20, 11
  • 9. Example You Sister n.n Lost You Sister n.n Sunday, November 20, 11
  • 10. Ok, she is n.n n.n alive Sunday, November 20, 11
  • 11. Pseudocode ///request Ping() ////answer ping.txt receive_request() validate() validate(request) verify structure if request = true{ execute() answer->send do ping->send } receive_ans(answer) validate() if answer = true{ echo “Connected” } else{ echo “Not Connected” } Sunday, November 20, 11
  • 12. SECURITY Virus Malware Warms Zombies Trojans Others Botnets Funny DoS Sunday, November 20, 11
  • 13. Network Zombies & Botnets + = :( (Client-Server) ! ! Sunday, November 20, 11
  • 14. Important Points Sending Pings (easy) Server attacks Receive Information Broke elisa’s server Sunday, November 20, 11
  • 15. Cryptography rap hy En c r y p t at i o t o g io n yp i t n Cr f in de f i n i t i o n de C = E( P, K e ) C i ph e r te x t Sunday, November 20, 11
  • 16. Cryptography De c r y p t i o n of f s’s de f i n i t i o n k h le e rc c i p K in P = D(C, K d) pr P l a i n te x t Sunday, November 20, 11
  • 17. Secret-key criptography Definition symmetric encryption Example In this example the plaintext HELLO would become the cyphertext SVOOL. All As are replaced by Zs, all Bs by Ys, all Cs by Xs and so on key Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A encryption key Monoalphabetic sustitution Sunday, November 20, 11
  • 19. Public-key cryptography ri v a te di f f e re n t k e ys y, p ke ) p ub lic e y ( k ic r n App l ic at i o n e t t io m a -A u t h e n t ic s: m pt at io n sy r y a c - D igi t a l S ig n at u re s en Prov ides: -Con fide ntia lity - Inte grit y Sunday, November 20, 11
  • 21. Pseudocode a = “xxx”; b = encrypt_algorithm ke = encrypt_key t_encrypt = b ( a, key) t_encrypt = send ( ) receive ( t_encrypt) kd = decrypt_key if (kd == true){ t_decrypt = b (t_encrypt, kd) a = t_decrypt } else { print “you need the key to decrypt” Sunday, November 20, 11
  • 23. References Chat application using Nachos Networking Module http://bit.ly/vtbL63 Uso de criptografía en aplicaciones http://bit.ly/sXGWkx Networking tutorial http://bit.ly/vkb1wQ Protocolo ICMP http://bit.ly/tOAC6c Computer Networking - Kurose Ross Security technolifeandmore.blogspot.com Sunday, November 20, 11