The network layer then uses its protocol (IP) and translates that www.yahoo.com into an IP address. The network layer is also in charge for determining the best route through the network in order to get to the IP address destination. The data link layer is, unlike the other two which are virtual, a physical address with is permanently encoded to a device through its network card. The data link layer is a unique identifier to each computer in a network. Thus a MAC address is the only address that will always remain the same, transport and data layer address can change depending on the network.
What is a ping sweep and how does it work? A ping sweep is a, “diagnostic technique used in computing to see what range of IP addresses are in use by live hosts, which are usually computers.” (What is a Ping Sweep?, 2013). Using just the ping command in a command prompt, you can verify whether a host is alive or not if it returns the ping. In a ping sweep, this is done on a larger scale to see which IPs are active on a network. Doing this, the attacker will know which computers are alive and which aren’t so they know where they should concentrate their attacks on.
A person creates a user name and a password that they only know. Another form of authentication is a multifactor this is where a user will have a user name and a password and then will be asked a question that only they will know. This adds another level of security for the user. The last form is a biometric method. This method uses a fingerprint, eye scan or signature to verify that this person is who they say they are.
When using traffic analysis, this process reveals the amount, type, origin and destination of the traffic flow on a network. This process is used when there is an infected computer presumed in the network. Also, the process can identify which computer is downloading something that is legal or potentially illegal. If for some reason that there is an infected computer, traffic analysis could expose which computer(s) that are infected on the network. Using traffic analysis could also identify the amount of bandwidth that each computer(s) on the network are
Server computers and other systems that need to be accessed reliably by network clients should be configured with a static IP address. The method of breaking up IP address space into address ranges of flexible size is called Classless Inter-domain Routing. Multiple Choice What must each host on a TCP/IP network be configured with in order to communicate with other hosts? C) IP Addressing What is the process of transmitting TCP/IP traffic from one IP sub-net to another? B) Routing An IP network that is formatted such as 192.168.1.0/25 is referred to as what type of notation?
Addresses: An address is given to a computer by the router. The router gives out the IP address so that when the networks sending data or receiving data from the computer it knows which computer to send it too through the IP address. This makes it a lot easier for the networks to communicate to each other. Sequence numbers: Sequence numbers are numbers that are in a certain order, which are referred to as a string. The numbers sort out error correction and
It’s imperative that we not only protect against these types of activities on the network, but that we also conduct them ourselves. Ping sweeps are what they sound like. They’re a regular ping that almost anyone in the IT field uses as a basic troubleshooting step but, they are conducted across an entire range of addresses. Whereas a normal administrator would only ping one or two destinations, a malicious user may conduct a ping sweep to find every endpoint on a network that they are allowed a connection to. Most utilities that perform this operation can also perform a DNS lookup on all the IP addresses as well to produce the end points names.
Unit 2 Subnetting Lab 1 Read the lab details listed below, and then answer the questions listed in the lab exercise. When networks were first used all hosts on the network were allocated hostnames such as PC 1 or admin_PC but it was soon discovered that it was hard to keep track of all of these names and then routing across a WAN was almost impossible. An “RFC” (Request For Comment) was submitted which suggested that we could allocate numbers to hosts on networks instead of hostnames. The current implementation of this scheme is IP version 4 although IPv6 is now replacing this. The idea is that every address would be made up from four groups of eight binary numbers.
C. Not being one to use instant messaging, I feel that this does not pertain to me, although it does mention personal information which I generally do not share online. Most of the people that I know online know my personal information such as name, address, phone number, if they do not have this information they may not be close friends or family. D. Shopping online is also another item I do not do. I am not comfortable giving out personal information online. I did learn that the “http:” and “Locked padlock symbol” are signs of a secure site for this kind of information, still not sure that I trust them.
When we open the Deep Freeze program, then we notice that our PC gets extremely slow. So, we cannot do anything in our system. We need to uninstall the Deep Freeze immediately. But, we cannot do that manually. So, we need to download a free removal tool to uninstall the Deep Freeze 7.00 utility from our