Introduction:
This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people. If this flow is manipulated, there can be vulnerabilities for unauthorised entries, bringing in malware or other harmful or unwanted data.
Method:
Within the lab, we employed the command prompt to discover connection …show more content…
Netstat displays network connections for TCP, routing tables and a number of network interface and network protocol statistics. It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement (Luo, 2005).
The DNS serves as a hierarchical decentralised naming system for computers, services and any other resource connected to the internet or private networks. Most importantly it translates ‘plain-English’ domain names to the numerical IP addresses which locate and identify computer services with underlying network protocols. The DNS is a worldwide distributed directory service, and as such, is an indispensable part of the functioning internet (Hurter, 2011).
The final tool we covered was traceroute, used for computer network diagnostics by displaying the path taken and measuring transit delays in packets across an IP network. Traceroute can be used to help identify incorrect routing table definitions or a firewall which may be blocking ICMP traffic, or high port UDP. It is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host (Mahajan, Spring, Wetherall, & Anderson,