When using traffic analysis, this process reveals the amount, type, origin and destination of the traffic flow on a network. This process is used when there is an infected computer presumed in the network. Also, the process can identify which computer is downloading something that is legal or potentially illegal. If for some reason that there is an infected computer, traffic analysis could expose which computer(s) that are infected on the network. Using traffic analysis could also identify the amount of bandwidth that each computer(s) on the network are
What is the World Wide Web (WWW)? How was this developed The Internet is the actual network of networks where all the information resides. Things like Telnet, FTP, Internet gaming, Internet Relay Chat (IRC), and e-mail are all part of the Internet, but are not part of the World Wide Web. The Hyper-Text Transfer Protocol (HTTP) is the method used to transfer Web pages to your computer. With hypertext, a word or phrase can contain a link to another Web site.
TCP is the transport layer protocol that links the application layer to the network layer. TCP breaks the data into smaller packets, numbers the packets, ensures each packet is reliably delivered, and puts the packets in the proper order at the destination. IP is the network layer protocol and performs addressing and routing. IP software is used at each of the computers through which the message passes through; IP routes the message to the final destination. TCP/IP is the transport & network layer protocol used on the Internet.
The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called __________________. Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them.
Each device on the network has a unique numerical address and the Internet uses the DNS (Domain Name System) to allocate each a corresponding human-readable address (Woods, 2013a). Information is requested from a server and is sent using the packet switching and TCP/IP (Transmission Control Protocol/Internet Protocol) system (Jamison, 2001; Woods, 2013b). This involves breaking large files into smaller ‘packets’, allocating each packet addressing information, and sending them via different routes to be reassembled – including verification – at their destination (Jamison, 2001). Constantly evolving, the Internet has become an all-encompassing social, communicative and collaborative tool that is arguably essential to modern life (Leiner et al., 2012). 2.
What is the purpose of dynamic host control protocol (DHCP)? DHCP allows a computer to join an IP-based network without having a pre-configured IP address. DHCP is a protocol that assigns unique IP addresses to devices, then releases and renews these addresses as devices leave and re-join the network. 3. What was the DHCP allocated source IP host address for “student” VM and target VM?
4. B. PC and switch D. Router and hub E. wireless access point and switch 5. B. collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover. 6. C. two PCs, with one cabled to a router Ethernet port with a crossover cable and the other PC cabled to another router Ethernet port with a crossover cable.
The power lines in the system bus transfer power from the motherboard’s connection to the power supply to the integrated circuits (ICs or chips) and expansion boards connected to the motherboard. The control lines in the system bus controls the transmission and movement of information between devices connected to the motherboard. The address bus is used to “pick up” information from the correct memory location among the gigabytes of RAM in computer systems and “deliver” new programs and changes to the
Addresses: An address is given to a computer by the router. The router gives out the IP address so that when the networks sending data or receiving data from the computer it knows which computer to send it too through the IP address. This makes it a lot easier for the networks to communicate to each other. Sequence numbers: Sequence numbers are numbers that are in a certain order, which are referred to as a string. The numbers sort out error correction and
What is a ping sweep and how does it work? A ping sweep is a, “diagnostic technique used in computing to see what range of IP addresses are in use by live hosts, which are usually computers.” (What is a Ping Sweep?, 2013). Using just the ping command in a command prompt, you can verify whether a host is alive or not if it returns the ping. In a ping sweep, this is done on a larger scale to see which IPs are active on a network. Doing this, the attacker will know which computers are alive and which aren’t so they know where they should concentrate their attacks on.