Nt1310 Unit 2 Lab 1

Improved Essays
Lab 2: OSI Model
Introduction:
This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people. If this flow is manipulated, there can be vulnerabilities for unauthorised entries, bringing in malware or other harmful or unwanted data.
Method:
Within the lab, we employed the command prompt to discover connection
…show more content…
Netstat displays network connections for TCP, routing tables and a number of network interface and network protocol statistics. It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement (Luo, 2005).
The DNS serves as a hierarchical decentralised naming system for computers, services and any other resource connected to the internet or private networks. Most importantly it translates ‘plain-English’ domain names to the numerical IP addresses which locate and identify computer services with underlying network protocols. The DNS is a worldwide distributed directory service, and as such, is an indispensable part of the functioning internet (Hurter, 2011).
The final tool we covered was traceroute, used for computer network diagnostics by displaying the path taken and measuring transit delays in packets across an IP network. Traceroute can be used to help identify incorrect routing table definitions or a firewall which may be blocking ICMP traffic, or high port UDP. It is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host (Mahajan, Spring, Wetherall, & Anderson,

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2

    • 703 Words
    • 3 Pages

    During the laboratory section two devices were used; these were the DE2-115 board and a computer, containing the software system Quartus II. Each of these devices were very significant for gathering information during the duration of the lab and shall be explained further. The DE2-115 board was the device provided in the lab that displayed the output for viewing by the student. The portions of the DE2-115 board that were used during the duration of the lab were the switches, the LEDs, and the seven segment displays.…

    • 703 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 5 Lab

    • 778 Words
    • 4 Pages

    After the data was collected it was formulated into 4 tables relating to Alpha Amplitude, Alpha Frequency, Beta Amplitude and Beta Frequency, the tables can be found in the appendix section below. The tables contain ID numbers to identify the volunteers as well as columns to show the amplitude (μV)/frequency (Hz) of alpha and beta during the four periods of no music (NM1, NM2, NM3, NM4),CL, CH, RL and RH. The percentage increase for all the different types of music compared to no music was calculated. Each type of music was compared with the individual period of no music prior to it. Calculations are as follows: inc CL % =…

    • 778 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Lab 2

    • 458 Words
    • 2 Pages

    On January 29th, we conducted lab 2 which involved learning the basic tools of Dartfish and how to publish Dartfish videos to our own mediabook. The first step in the lab involved going to dartfish.tv and looking at the “3302 Class Resources folder and downloading the video trim file. I then opened the Dartfish software and as a class we reviewed some of the various resources in the software like the different screen options such as split screen or mosaic mode and different tools such as analyzing angle and distance of the video. I learned how to transfer the downloaded video from the computer library to the tray. It’s important to note that you can delete videos from your tray and it will still be on the computer’s library.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers and workstations deployed on the network. b. IP address related to a certain domain c. Zone file of DNS server might have information of domain or sub domains 3. How would you fingerprint the network?…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 6

    • 910 Words
    • 4 Pages

    The following diagrams show how the user would act and interact with the system and the various activities that user would perform: 2.3.1 NOTATIONS DATA FLOW…

    • 910 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays